Response To Sr-Rm-022

1460 Words6 Pages
Response to SR-RM-022 The current Human Resource Information System (HRIS) being used by Riordan Manufacturing is outdated, ineffective, and presents many risks. Implemented in 1992, Riordan’s HRIS is decentralized and relies heavily on each department to maintain various segmented excel spreadsheets with very little to no oversight. Understanding the risks of potential profit loss, compromising personnel data, and waste/loss of company resources associated with poor information management Viggo Industries offers Riordan Manufacturing an ability to mitigate these risk by creating a custom tailored HIRS that will meet Riordan’s HR needs stated in SR-RM-022 The request for an improved HRIS stated in SR-RM-022 holds value to many stakeholders.…show more content…
To be successful and provide the most value to Riordan, Viggo Industries proposes that our solution fulfill the following requirements: • Safeguard and secure HR data • Standardize HR processes • Consolidate information repositories and access points • Update network, storage, and system technology where needed • Document system processes • Provide configuration management • Enable global access and use of systems by all Riordan locations • Provide disaster recovery and continuity of operations capabilities The above listed requirements are subject to change based on timelines, outstanding requirements, or other factors as stated by the customer. The initial operating capabilities (IOC) of this system will be delivered in the second quarter of Fiscal Year (FY)…show more content…
The back end of our system will also allow users to only have to access one location for data entry instead of accessing a several different systems. With more than 13.9 million identity theft victims in the United States losing collectively an estimated 10 billion dollars in 2012 (Sullivan, 2013), Viggo industries understands the need to keep Personal Identifiable Information (PII) secure. The security controls listed below will be in addition to and run congruent with the controls and policies already in place today (Center for Strategic and International Studies, 2013): 1. Software Security a. All software will go through a Harding process prior to release b. All software will be tested prior to release into operational environment c. All patches and updates will be applied per company guidelines an policies d. Configuration, deletion, and installation of software will be restricted by user accounts and roles 2. Personnel Security a. All users will have individual accounts b. Access applications and data will be granted based on roles and work functions c. Account passwords will be changed every 30 days 3. Network
Open Document