logo

Presentation Summary.

   

Added on  2022-11-13

1 Pages271 Words1 Views
Presentation Summary
The presentation is focused on Department of Administrative Service (DAS) management.
Here is discussed about the way to implement a HR management software known as
BambooHR software. The application of SaaS provided by BambooHR software is focused
in this presentation. The presentation gives information about the problems that are faced by
the HR department of the organisation. And the way the software is used to solve the
problems. The presentation is focused on the security of data, specifically on the data security
regarding the employees of the organisation. The effect of operational location in the
organisation is mentioned in the presentation. It also mentions about the reasons behind the
threat on the employee data and the threat arises for the organisation along with the solutions
to mitigate the issues. It is also discussed about data privacy. The presentation also mentions
about the data sensitivity along with the issues. The issues regarding the trade secret is
mentioned in the presentation and the way BambooHR plays a role with trade secret. The
presentation also describes about the sovereignty of data along with the data sovereignty in
the organisation. After this discussions in the presentation a clear conclusion is drawn in the
end. The presentation discuss about all the mitigating process about all the issues of the
organisation. A list of recommendation is also provided in the assignment where more
techniques are recommended to mitigate all the discussed issues in the organisation. All of
this information are included in the well-designed PowerPoint presentation.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Privacy Risk Assessment for DAS Management
|28
|1169
|248

Security and Privacy Risk Assessment for DAS
|22
|1875
|77

Administrative Services Department Report 2022
|16
|4808
|23

Risk Management
|10
|1940
|69

Security Awareness Training: An Approach
|12
|961
|292

Cyber Security Issues and Challenges - PDF
|6
|1326
|55