- Parent Category: Human Resources
- Created on Tuesday, 06 December 2011 05:14
- Published Date
Experts within the business management solution arena say that whilst there is technology available that will improve protection, decision makers are advised to be more thorough in their inspection and evaluation of solutions before committing to investment.
According to HR and business management specialists when it comes to solution integration to improve overall system performance, the system is really only as strong as its weakest link.
“Matching up the requirements of the business with technology that is designed to address these specific requirements and can function effectively within a specific environment is very important,” says Teryl Schroenn, CEO at Accsys.
Accsys is a member of the Business Connexion Group and a national supplier of management solutions within HR, payroll administration, time & attendance and access control
“Factors such as mobility and the level of access that IT personnel have to the company’s data should be taken into account when assessing security risks,” adds Schroenn, “The reality of the market today is that core systems and the data that resides within a business are increasingly accessible to those with information communication technology experience and know-how. This access means that confidentiality and intellectual property can be less secure than is desirable and this is why decision makers continue to make security a number one priority.”
There are numerous HR and data management systems available to businesses, but certain features do not come standard – for example, the fact that modules run off a centralised platform.
Cost is often regarded as the main criteria upon which to evaluate solutions – but this could be a serious oversight and misjudgement claim experts at Accsys, particularly in light of the availability and growing appeal of cloud-based service and support.
Schroenn says cloud scenarios are attractive because they allow users to remotely store and manipulate resources.
“This is off-site and anonymous,” she adds.
This distance factor is relevant because it reminds investors of the value of anonymity in a market largely based on the differentiation between privacy and non-privacy. The question of what constitutes legitimate exposure within the public domain and what does not remains an issue of controversy and speculation.
Schroenn refers to the advent of legislation designed to regulate information, policy and good governance – such as POPI (Protection of Personal Information) – as indicative of a market that understands the power of data and the necessity to encourage responsible application.
Accsys anticipates that the data management and security arena will only become more competitive and rapidly so.For more information, go to Accsys.
We have 20 guests and no members online