The matrix is use to be able to provide equal opportunity to all the applicants on lawful job related and non-discriminatory criteria. A pre-designed tool was created by Texas Tech as a hiring selection matrix. The matrix composed of a spreadsheet, which helps to evaluate the applicant. The snapshot of the matrix is shown below (figure 1). To start with this matrix on the upper portion of the matrix just types the required qualification of the person needed for the job. The preferred skills may include education, Clerical experience, MS Office experience, ten key by touch, TTU experience, bookkeeping experience, keyboarding score and spelling score. On the lower part of the preferred skills you can rate the skills from 1 to 5 (with 5 as the highest scale).
Once the application received, the name of the applicant can be inserted on the applicants' column. Opposite to the applicant column are column wherein you can put your rate for a certain applicant (rate 1 to 5 - 5 is the highest). Once done with the rating an application score will be shown, this is where the basis as to who will be interviewed or not. If someone does not meet the minimum requirement, put an X on the minimum requirement column of the applicant. To better view who among the applicants got the highest rate click the "sort" button. The applicants name will be arranged from highest to lowest. From here it is easily to pick who among the applicants will continue to the next step and who are not. After the interview the score are place on the interview score column and the reference score are inserted. The Hiring Selection Matrix will automatically show the total scores of the applicants. To show who got the highest score click the "sort" button. The applicant who got the highest total score maybe consider best for the job. The Hiring Selection Matrix can be accessed thru
Developing Policy on How to Deal with Privacy Issues
Employees should take seriously the security of an organization. In order to do these good policies should be developed within the organization, familiarize the users on these policies and adopt the policy rigorously. Taking the security seriously would prevent any employee in the organization to involve their selves in any untoward situations. Due to the complication of the security matter, some organization seeks the help of other organization to handle their data. Hence, the organization's confidentiality will be lost. The one handling your data should be controlled and closely monitored to make sure that the company handles the data with confidentiality, integrity, and safety.
In order to develop a sound policy the following questions maybe consider in formulating the policy: (Edwards, 1997).
Does our organization have a security manual for our employees
Do we have guidelines to follow when ordering hardware and software
Do we require all purchasing to go through a centralized group or individual
Do we require cost/benefit analysis and risk analysis for all new systems, including