Which of the following methods is LEAST likely to protect the security of HRIS records?
A) Grant permission to access employee information only on a need-to-know basis
B) Develop policies and guidelines that govern utilization of the HRIS information
C) Require passwords and special codes to access different areas of the database
D) Provide access to the HRIS only to employees and their spouses
Answer: D
Business