Which of the following methods is LEAST likely to protect the security of HRIS records?

A) Grant permission to access employee information only on a need-to-know basis
B) Develop policies and guidelines that govern utilization of the HRIS information
C) Require passwords and special codes to access different areas of the database
D) Provide access to the HRIS only to employees and their spouses

Answer: D

Business

You might also like to view...

Which of the following is NOT a design class?

A) standard B) control C) boundary D) utility

Business

List and briefly describe the stages in the five-stage model of group development

What will be an ideal response?

Business