Studyspark Study Document

Security Management Civil Action Essay

Pages:2 (700 words)

Document Type:Essay

Document:#40936053


Security management

1. In a civil action, how can a claim of negligent hiring have a greater chance of succeeding?

Jurisdictions have been increasingly putting laws in place pertaining to what makes organizations a potential target for a lawsuit on negligent hiring. Though in most instances, claims of negligent hiring may be effectively fended off, it proves increasingly tricky in the following cases:

· If the individual harming or injuring another is an employee of the company.

· If the employee is found guilty of harming, injuring or doing any damage to the complainant.

· If the organization was aware of, or ought to have been aware of, the employee’s tendency to inflict harm or injury.

· If the organization was inattentive when hiring the individual and failed to carry out a proper background check which could have identified the individual’s tendency to cause harm to clients or colleagues (McCrie, 57-60).

2. What is the risk to security operations managers if they are personally cited in a civil action involving a claim of negligent security?

Under the due care principle, corporations and their management are duty-bound to offer information security despite their unawareness of these obligations, which stem from that part of American common law dealing with negligence-related problems (that is, the tort law). A company and its managers might find themselves facing a lawsuit in the event they leave information systems excessively insecure or do not take actions for ensuring reasonable security of their corporate information systems, leading to damages if anybody breaks into these systems.

Normally, the organization is accountable for its own operational expenses, which include any expense linked to personnel misconduct or negligence. But in case security operations managers are mentioned personally within the claim, the liability and responsibility will shift to him/her from the organization (Sennewald, 67; McCrie, 60-68). This is grounded in the idea that when a person employed by a company acts independently or from purely personal motives, the company may not be deemed culpable.

3. How have technology and the Internet changed pre-employment screening?

Technology has been making recruit background screening a smarter, quicker, and more convenient process. Information systems integration-related advancements have been allowing easy access to business information from a single source, transforming the systems of background screening which have traditionally been separate feeds. Furthermore, biomedical advancements regarded, at one…


Sample Source(s) Used

Works cited

Anderson, Ian U. "Social Media in the Hiring Process: Uncovering Top Talent or Lawsuits." Marriott Student Review1.3 (2017): 8.

McCrie, Robert. “Security Operations Management.” Butterworth-Heinemann. Waltham, MA. 3rd Edition. 2016.

Sennewald, Charles A., and Curtis Baillie. “Effective security management.” Butterworth-Heinemann, 2015.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Security Information Is the Power. The Importance

Pages: 15 (5012 words) Sources: 1+ Subject: Education - Computers Document: #659336

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Studyspark Study Document

Data Privacy and Security

Pages: 5 (2026 words) Sources: 3 Subject: Black Studies - Philosophy Document: #70051448

Security Management Plan John's Hospital Privacy of client information is an assurance that every patient wants and this assurance is what the hospital can build patient confidence on. The lack of it therefore may have consequences such as loss of confidence in the hospital, loss of clientele and the emergence of a poor reputation. This paper looks at the St. John's Hospital which has experienced the leakage of confidential information a problem

Studyspark Study Document

Securities Regulation of Nonprofit Organizations

Pages: 45 (12607 words) Sources: 40 Subject: Business - Management Document: #11212386

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Studyspark Study Document

Security Overview Businesses Today Are

Pages: 13 (3366 words) Sources: 5 Subject: Business Document: #63694499

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Studyspark Study Document

Security Vs. Privacy in the

Pages: 9 (2504 words) Sources: 1+ Subject: Government Document: #88918594

This has been the basic rationale for every totalitarian state during the Twentieth Century. It is the idea that if the people relinquish their rights -- especially their rights to keep anything hidden from the government -- then the government will be better able to ensure that no potential threats to the security of the citizenry ever manifest themselves. This premise, however, is based on the faulty idea that

Studyspark Study Document

Civil War the International Law Stands on

Pages: 4 (1685 words) Sources: 1+ Subject: Government Document: #30504376

Civil War The International law stands on two cornerstones of the Codified Law and Customary Law. The Codified Law is represented by the UN Charter that embodies the norms of sovereignty and non-interference in the domestic affairs of the state and contrary to this the Customary law progressively stresses upon the safeguarding of human rights and the security and well being of the individual. Taking into consideration the present situation and

Join thousands of other students and

"spark your studies".