{"id":1558,"date":"2013-09-20T11:15:29","date_gmt":"2013-09-20T11:15:29","guid":{"rendered":"http:\/\/www.hr-softwareblog.com\/?p=1558"},"modified":"2013-11-22T17:36:04","modified_gmt":"2013-11-22T17:36:04","slug":"hris-installation-data-security-question","status":"publish","type":"post","link":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/","title":{"rendered":"HRIS installation \u2013 The Data Security Question"},"content":{"rendered":"<p><a href=\"\/blog\/wp-content\/uploads\/2013\/09\/HRIS-Cloud-Security.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-1560\" alt=\"HRIS Cloud Security\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/HRIS-Cloud-Security-300x294.jpg\" width=\"266\" height=\"260\" srcset=\"https:\/\/i0.wp.com\/www.comparehris.com\/blog\/wp-content\/uploads\/2013\/09\/HRIS-Cloud-Security.jpg?resize=300%2C294&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.comparehris.com\/blog\/wp-content\/uploads\/2013\/09\/HRIS-Cloud-Security.jpg?w=450&amp;ssl=1 450w\" sizes=\"auto, (max-width: 266px) 100vw, 266px\" \/><\/a><a title=\"Compare HRIS and HRMS Systems\" href=\"http:\/\/www.comparehris.com\/products\/\" target=\"_blank\">Human Resources Information System<\/a> (HRIS) programs are fast becoming the norm for HR administration. Despite the expense, businesses are increasingly jumping onboard with the HRIS benefits for their company and employees. However, only a successful installation justifies the cost. And, some installations fail because of issues relating to data security.<\/p>\n<p>The problem is described with relative ease. Any employer\u2019s data is vulnerable to breaches of security within the company. It worries, too, about invasion or hacking of that data from the periphery. That is, it can be hacked by other data systems with which it communicates, such as that of vendors, customers, and out-placed functions. Software applications purchased from outside sources may bring vulnerabilities with them. And, competitors, individuals, and governments at one time or another have breached just about all systems.<\/p>\n<p><strong>Your part of the job<\/strong><\/p>\n<p>A simple in-house audit should launder the data before submission. You might check your HR data to see:<\/p>\n<ul>\n<li>If the count of records matches your expectations<\/li>\n<li>If there are duplicate records<\/li>\n<li>If there are obsolete files<\/li>\n<li>If there are empty data fields<\/li>\n<li>If data is updated<\/li>\n<li>If there are incorrect or outdated users<\/li>\n<\/ul>\n<p><strong>Your HRIS vendor\u2019s security is your problem<\/strong><\/p>\n<p>If the security of your in-house work were compromised, your HR functions would be severely damaged. If you are going to trust that data to an HRIS vendor, your job is to investigate and verify the vendor\u2019s security thoroughly.<\/p>\n<p>At some point, you have to trust your decision to outsource or purchase software systems. However, to build that trust in cloud-based solutions, you have to pump up your due diligence.<\/p>\n<ul>\n<li>A <a title=\"SaaS Security\" href=\"http:\/\/www.networkworld.com\/news\/2010\/092710-software-as-service-security.html?page=2\" target=\"_blank\">SaaS 70 audit<\/a> is \u201cdesigned to show that service providers have sufficient control over data.\u201d However, it was created prior to universal cloud roll out, and it may be a weak standard.<\/li>\n<li><a title=\"Information technology - Security techniques\" href=\"http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=42103\" target=\"_blank\">ISO\/IEC 27001<\/a>, on the other hand, specifies international standards on the establishment, implementation, operation, and monitoring of information security systems. It identifies the security controls needed for the individual organization\u2019s customization.<\/li>\n<li>The dense but thorough <a title=\"Systems Considerations in the Design of an HRIS planning for implementation\" href=\"http:\/\/www.corwin.com\/upm-data\/25451_Ch3.pdf\" target=\"_blank\">Systems Considerations in the Design of an HRIS<\/a> planning for implementation is necessary reading. The intent is not to overwhelm you but to help you position yourself for what you need to know and the questions you want to ask.<\/li>\n<li>You must secure all detection capabilities, encryption levels, security documentation, and dedicated security personnel.<\/li>\n<li>Your CEO and stakeholders share the right and need to have confidence in the system. You need to work with your IT experts and vendor to strike the right balance of security and change.<\/li>\n<\/ul>\n<p>You do not and should not be the master of this technology, but, between you and your Information Technology chief, you need to know the questions to press on your HRIS vendor. This is especially true of larger companies, global companies, and corporations with many locations and many users. Any security system up to global standards should be the optimum for any HRIS customer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Human Resources Information System (HRIS) programs are fast becoming the norm for HR administration. Despite the expense, businesses are increasingly jumping onboard with the HRIS benefits for their company and employees. However, only a successful installation justifies the cost. And, some installations fail because of issues relating to data security. The problem is described with &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;HRIS installation \u2013 The Data Security Question&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-1558","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>HRIS installation \u2013 The Data Security Question - HRIS - Compare HR Software Blog<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"HRIS installation \u2013 The Data Security Question - HRIS - Compare HR Software Blog\" \/>\r\n<meta property=\"og:description\" content=\"Human Resources Information System (HRIS) programs are fast becoming the norm for HR administration. Despite the expense, businesses are increasingly jumping onboard with the HRIS benefits for their company and employees. However, only a successful installation justifies the cost. And, some installations fail because of issues relating to data security. The problem is described with &hellip; Continue reading &quot;HRIS installation \u2013 The Data Security Question&quot;\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\" \/>\r\n<meta property=\"og:site_name\" content=\"HRIS - Compare HR Software Blog\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/compareHRIS\/\" \/>\r\n<meta property=\"article:published_time\" content=\"2013-09-20T11:15:29+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2013-11-22T17:36:04+00:00\" \/>\r\n<meta name=\"author\" content=\"CompareHRIS Team\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HR_softwareblog\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CompareHRIS Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\"},\"author\":{\"name\":\"CompareHRIS Team\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/#\/schema\/person\/18a77760b2a5f2db71188322799edc81\"},\"headline\":\"HRIS installation \u2013 The Data Security Question\",\"datePublished\":\"2013-09-20T11:15:29+00:00\",\"dateModified\":\"2013-11-22T17:36:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\"},\"wordCount\":496,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.comparehris.com\/blog\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\",\"url\":\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\",\"name\":\"HRIS installation \u2013 The Data Security Question - HRIS - Compare HR Software Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.comparehris.com\/blog\/#website\"},\"datePublished\":\"2013-09-20T11:15:29+00:00\",\"dateModified\":\"2013-11-22T17:36:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.comparehris.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HRIS installation \u2013 The Data Security Question\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/#website\",\"url\":\"https:\/\/www.comparehris.com\/blog\/\",\"name\":\"HRIS - Compare HR Software Blog\",\"description\":\"HRIS, HCM Systems, HR Software Information\",\"publisher\":{\"@id\":\"https:\/\/www.comparehris.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.comparehris.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/#organization\",\"name\":\"CompareHRIS.com\",\"url\":\"https:\/\/www.comparehris.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.comparehris.com\/blog\/wp-content\/uploads\/2017\/08\/comparehris-logo.png\",\"contentUrl\":\"https:\/\/www.comparehris.com\/blog\/wp-content\/uploads\/2017\/08\/comparehris-logo.png\",\"width\":404,\"height\":65,\"caption\":\"CompareHRIS.com\"},\"image\":{\"@id\":\"https:\/\/www.comparehris.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/compareHRIS\/\",\"https:\/\/www.linkedin.com\/company\/759204\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/#\/schema\/person\/18a77760b2a5f2db71188322799edc81\",\"name\":\"CompareHRIS Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.comparehris.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4288d02aec9562e73c308619b3813653152c621ea908cecd7f7e15725d0c9ac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4288d02aec9562e73c308619b3813653152c621ea908cecd7f7e15725d0c9ac?s=96&d=mm&r=g\",\"caption\":\"CompareHRIS Team\"},\"sameAs\":[\"https:\/\/www.comparehris.com\/\",\"https:\/\/x.com\/@HR_softwareblog\"],\"url\":\"https:\/\/www.comparehris.com\/blog\/author\/peocompare\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HRIS installation \u2013 The Data Security Question - HRIS - Compare HR Software Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/","og_locale":"en_US","og_type":"article","og_title":"HRIS installation \u2013 The Data Security Question - HRIS - Compare HR Software Blog","og_description":"Human Resources Information System (HRIS) programs are fast becoming the norm for HR administration. Despite the expense, businesses are increasingly jumping onboard with the HRIS benefits for their company and employees. However, only a successful installation justifies the cost. And, some installations fail because of issues relating to data security. The problem is described with &hellip; Continue reading \"HRIS installation \u2013 The Data Security Question\"","og_url":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/","og_site_name":"HRIS - Compare HR Software Blog","article_publisher":"https:\/\/www.facebook.com\/compareHRIS\/","article_published_time":"2013-09-20T11:15:29+00:00","article_modified_time":"2013-11-22T17:36:04+00:00","author":"CompareHRIS Team","twitter_card":"summary_large_image","twitter_creator":"@HR_softwareblog","twitter_misc":{"Written by":"CompareHRIS Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#article","isPartOf":{"@id":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/"},"author":{"name":"CompareHRIS Team","@id":"https:\/\/www.comparehris.com\/blog\/#\/schema\/person\/18a77760b2a5f2db71188322799edc81"},"headline":"HRIS installation \u2013 The Data Security Question","datePublished":"2013-09-20T11:15:29+00:00","dateModified":"2013-11-22T17:36:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/"},"wordCount":496,"commentCount":2,"publisher":{"@id":"https:\/\/www.comparehris.com\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/","url":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/","name":"HRIS installation \u2013 The Data Security Question - HRIS - Compare HR Software Blog","isPartOf":{"@id":"https:\/\/www.comparehris.com\/blog\/#website"},"datePublished":"2013-09-20T11:15:29+00:00","dateModified":"2013-11-22T17:36:04+00:00","breadcrumb":{"@id":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.comparehris.com\/blog\/hris-installation-data-security-question\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.comparehris.com\/blog\/"},{"@type":"ListItem","position":2,"name":"HRIS installation \u2013 The Data Security Question"}]},{"@type":"WebSite","@id":"https:\/\/www.comparehris.com\/blog\/#website","url":"https:\/\/www.comparehris.com\/blog\/","name":"HRIS - Compare HR Software Blog","description":"HRIS, HCM Systems, HR Software Information","publisher":{"@id":"https:\/\/www.comparehris.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.comparehris.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.comparehris.com\/blog\/#organization","name":"CompareHRIS.com","url":"https:\/\/www.comparehris.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.comparehris.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.comparehris.com\/blog\/wp-content\/uploads\/2017\/08\/comparehris-logo.png","contentUrl":"https:\/\/www.comparehris.com\/blog\/wp-content\/uploads\/2017\/08\/comparehris-logo.png","width":404,"height":65,"caption":"CompareHRIS.com"},"image":{"@id":"https:\/\/www.comparehris.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/compareHRIS\/","https:\/\/www.linkedin.com\/company\/759204\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.comparehris.com\/blog\/#\/schema\/person\/18a77760b2a5f2db71188322799edc81","name":"CompareHRIS Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.comparehris.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4288d02aec9562e73c308619b3813653152c621ea908cecd7f7e15725d0c9ac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4288d02aec9562e73c308619b3813653152c621ea908cecd7f7e15725d0c9ac?s=96&d=mm&r=g","caption":"CompareHRIS Team"},"sameAs":["https:\/\/www.comparehris.com\/","https:\/\/x.com\/@HR_softwareblog"],"url":"https:\/\/www.comparehris.com\/blog\/author\/peocompare\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2govE-p8","_links":{"self":[{"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/posts\/1558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/comments?post=1558"}],"version-history":[{"count":5,"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/posts\/1558\/revisions"}],"predecessor-version":[{"id":1616,"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/posts\/1558\/revisions\/1616"}],"wp:attachment":[{"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/media?parent=1558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/categories?post=1558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.comparehris.com\/blog\/wp-json\/wp\/v2\/tags?post=1558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}