human rights

Threat Landscape Briefing – April 2023

Video: Security Threat Intelligence

This monthly report covers topics such as cyberthreat and regulatory trends, nation states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and exposure to vulnerabilities to help you better understand the cybersecurity impact to business.

Iran-Linked Hacking Group Targets Women Working in Human Rights, Politics Cobalt Illusion is suspected of working in connection with Iran’s Islamic Revolutionary Guard Corps and has been targeting women working in fields connected to human rights and Middle-Eastern politics. . This monthly report covers topics such as cyberthreat and re...

Amnesty International Calls Google and Facebook a Threat to Human Rights

Vendor Research: Data & Business Intelligence

We recently covered Google’s lackadaisical approach to data privacy in the context of its partnership with Ascension, a US healthcare giant. Last month, Google was under fire again, along with Facebook, from Amnesty International.

The UN Human Rights Council states that “companies have a responsibility to respect all human rights.” And the UN Guiding Principles on Business and Human Rights require companies to “take ongoing, proactive, and reactive steps to ensure they do not cause or contribute to human rights abuses – a process called human rights due diligence.” Want to K...

Alphabet Draws Shareholder Ire Over Human Rights – Again

Vendor Research: Data & Business Intelligence

Alphabet is facing backlash from its shareholders over its approach to digital privacy, reports the Financial Times. And not for the first time. This time, however, things will need to change.

Ten large Alphabet shareholders have co-filed a resolution which calls on the company to strengthen its oversight of the risks to human rights created by its business model They are also concerned about bias and how Google reinforces, amplifies, and systematizes discrimination, disinformation, hate speech, and violence The investors include AXA Inv...

Microsoft Dynamics 365 Expands Talent and Human Resources Functions

Vendor Research: Applications

Microsoft has acquired the rights to talent and human resources intellectual property from vendors FourVision and Elevate HR.

Microsoft has acquired the rights to talent and human resources intellectual property from vendors FourVision and Elevate HR. Microsoft has acquired the rights to talent and human resources intellectual property from vendors FourVision and Elevate HR, according to an October 2 blog post With FourVision, Microsoft will expand Microsoft Dynamics 365...

Life, Liberty, and the Pursuit of Pandemic Containment: Contact Tracing and Data Privacy in Times of COVID-19

Note: Applications

Can we pursue an aggressive policy of technology-driven contact tracing without infringing on people’s fundamental right to privacy? In this moment of human history, should civil rights be ignored in favor of saving lives?

This application serves multiple purposes, useful for both diagnosed and healthy individuals The app uses government data to alert healthy individuals they are within a 100-meter radius of location(s) visited by a diagnosed patient(s) Along with this alert, users are also sent case numbers, ages, and genders of the patients In addition, the app is ...

Databricks and Immuta Partner to Provide End-to-End Data Governance for Machine Learning

Vendor Research: Data & Business Intelligence

Databricks, a data processing and analytics platform with a strong focus on AI and ML, has partnered with Immuta to deliver automated end-to-end data governance for AI, data science, and ML projects.

Its metadata-driven policy orchestration provides users with easy-to-manage, fine-grained end-to-end data governance controls for their data lake so that they can meet the data stewardship requirements of their organization.Source: Data Governance and Data Security for Cloud Analytics webinar Our take As organizations are embarking on – and in so...

Anti-Harassment Policy

Templates And Policies: Templates & Policies

The anti-harassment policy outlines the standards for preventing and dealing with harassment cases in the workplace.

The anti-harassment policy will help to prevent harassment in the workplace, communicate the rights and responsibilities of those involved in a harassment claim, and alleviate effects in the event harassment does occur.Risks addressed by this policy:Legal action associated with workplace harassment Reduced employee productivity associated with wor...

Federal Government Human Resources Management Systems Report

Industry: Industry Coverage

Federal Government Human Resources Management Systems Report

Federal Government Human Resources Management Systems Report. industry. Industry Coverage. products vendors review evaluation market features human resources management system human resources information system HRIS HRMS SAP SuccessFactors Oracle PeopleSoft Workday HCM US federal government Canadian federal government department ministry agency public sector. human resource management system large geographical areas large number Federal Governments varying levels specific terms specific wages key features leading vendors IT strategy people skills certifications agreements conditions benefits pensions hours work state market technology ability. Federal Government Human Resources Management Systems Report. Federal Governments employ a large number of people with varying levels of skills and certifications across large geographical areas internationally.Maintaining these agreements and the specific terms and conditions that include specific wages, benefits, pensions, and hours of work is daunting.Learn about what a human resource management system is, the state of the market, key features, and leading vendors to see how this technology can transform your IT strategy and the ability to deliver..

Info-Tech’s Tech Trends 2024: Insights for Product and Marketing

Note: Applications

This article offers an overview of Info-Tech’s top tech trends in 2024 related to product marketing, exploring how customers will approach investments in AI, spatial computing, security, digital sovereignty, and more in the upcoming year.

networks trained on historical data and human feedback Autonomized Back Office – Generative AI enhances automation in business systems, handling tasks like classification and content creation for more self-regulating systems Spatial Computing – This technology merges digital and physical worlds, using natural interactions and augmented reality/virt...

What You Need to Know About China’s Personal Information Protection Law

In The News:

Principal research director Alan Tang discusses what you need to know about China's Personal Information Protection Law in this CMSWire article.

What You Need to Know About China’s Personal Information Protection Law. in-the-news. Personal Information Protection Law Principal research director Alan Tang CMSWire article China customer-experience. Principal research director Alan Tang discusses what you need to know about China's Personal Information Protection Law in this CMSWire article.. Principal research director Alan Tang discusses what you need to know about China's Personal Information Protection Law in this CMSWire article: https://www.cmswire.com/customer-experience/what-y....

HRiQ Core

SoftwareReviews: Software Product

HRiQ Core. sr-software-product. IQ Dynamics Pte Ltd. HRiQ Core is a powerful human resource management system (HRMS) software that addresses the challenges faced by human resource departments..

Mitigate Machine Bias

Blueprint: Data & Business Intelligence

AI is changing the fabric of our world, from the way we conduct business, to how we work and live, make decisions, and engage with each other, to how we organize our society, to who we are. Organizations are starting to adopt AI to increase efficiency, better engage customers, and make faster,...

Control machine bias to prevent discriminating against your consumers and damaging your organization.

Biased AI systems may treat some of your customers (or employees) differently, based on their race, gender, identity, age, etc This is discrimination, and it is against the law It is also bad for business: leading to missed business opportunity, lost consumer confidence, reputational risk, regulatory sanctions, and lawsuits Read this Executive Brie...

Mitigate Machine Bias – Executive Brief

Note: Data & Business Intelligence

Read this Executive Brief to understand the dark side of AI – algorithmic (machine) biases, how they emerge, why they are dangerous, and how to mitigate them.

Build a Strategic IT Workforce Plan

Blueprint: CIO

Build a strategic workforce plan to drive IT staff engagement and productivity, and limit workforce gaps.

Staff your IT organization for success; availability is not a skill set.

Human Resources Management. academy-course. CIO. Have the right people, in the right place, at the right time.This course makes up part of the People & Resources Certificate..

Human Resources Management

Academy Course: CIO

Have the right people, in the right place, at the right time.This course makes up part of the People & Resources Certificate.

Embed Privacy and Security Culture Within Your Organization

Blueprint: Security

A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization. But building a privacy and security culture extends beyond projects, controls, and metrics, and it...

Drive employee engagement with privacy and security via governance and process integration.

Embed Privacy and Security Culture Within Your Organization – Executive Brief. note. Security. data privacy privacy program privacy culture security culture security training security awareness privacy training privacy awareness organizational culture privacy law executive scorecard campaign development privacy policy security policy. business leaders targeted approach top priorities privacy security headlines mind employees disengagement lack ownership role principles work misalignment culture levels outset. Privacy and security are two heavy-hitting items that all organizations need to account for. Technical controls are a start, but privacy and security need to become part of the organizational culture.. While privacy and security continue to make headlines and are top of mind for both IT and business leaders, employees still express disengagement and lack of ownership over their role in promoting these principles in their work. This misalignment calls for a more targeted approach to developing a culture of privacy and security, one that relies on engaging all levels of employees from the outset to ensure that both privacy and security are top of mind and top priorities. .

Embed Privacy and Security Culture Within Your Organization – Executive Brief

Note: Security

Privacy and security are two heavy-hitting items that all organizations need to account for. Technical controls are a start, but privacy and security need to become part of the organizational culture.

Develop and Deploy Security Policies

Blueprint: Security

Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities or compliance requirements, and they are rarely comprehensive. Without a strong lifecycle to keep policies up to date and easy to use, end users will ignore or work around poorly...

Enhance your overall security posture with a defensible and prescriptive policy suite.

Human Resource Security Policy Template. templates-and-policies. Security. NIST NIST 800-171 Security policy approval assess charter compliance enforce information security policies iso iso27001 make the case myPolicies nist 800 policies policy assessment policy awareness policy communication policy compliance policy deployment policy development policy enforcement policy lifecycle policy program policy stakeholder policy suite policy training policy update prioritize policy procedures security audit security policies security procedures security standards templates. Human Resource Security Policy Security Policies personnel requirements project blueprint Info-Tech employment tool conjunction. Info-Tech's Security Policy templates allow you to easily develop new policy documents.. Use Info-Tech's Human Resource Security Policy to document the personnel requirements prior to and during employment. Use this tool in conjunction with the project blueprint, Develop and Deploy Security Policies. .

Human Resource Security Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019