hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Wk 2 Practice: Assignment
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
HRM/420T: Human Resource Risk Management
Terms in this set (12)
When are employers allowed to monitor the telephone calls of their employees?
To confirm suspicions that employees are violating company rules or planning to leave.
To prevent misrepresentation by secretly recording calls.
To evaluate their job performance on job-related calls.
To document excessive personal phone usage or the misuse of phone privileges.
To evaluate their job performance on job-related calls
If an employer restricted the movement of a suspected thief and detained this person for an unreasonable length of time, the employer could be charged with ________.
Invasion of privacy.
Assault and battery.
Defamation.
False imprisonment.
False imprisonment.
According to signal detection theory, a true miss occurs when ________.
An officer takes action when there is a threat.
An officer takes no action when there is a threat.
An officer takes no action when there is no threat.
An officer takes action when there is no threat.
An officer takes no action when there is no threat
What is an employer's responsibility when gangs of youth gather on the premises near the company's buildings and cause periodic disturbances?
The employer has no responsibility or authority if the youth are outside the buildings.
The employer should not allow them to gather if they are causing a disturbance and ask for police help if it continues.
The employer should use its own security forces to patrol the area and maintain the peace.
The employer should require them to move inside the buildings where they can be monitored.
The employer should not allow them to gather if they are causing a disturbance and ask for police help if it continues.
The most effective method of preventing computer breaches via the Internet is to use ________.
A virus detector.
A modem alarm.
Licensed software.
A firewall.
A firewall.
What is a good way for the company representatives to reduce feelings of hostility when firing an employee?
Always have two representatives of the company present for protection in case the employee reacts poorly.
Explain vaguely why the employee is being terminated and avoid specific details that might upset the employee.
If the employee is suicidal or depressed, offer the employee help from the employee assistance program and have a friend from work or a family member could accompany the person home.
Confiscate the employee's keys, access cards, and ID badge immediately and then allow the employee only a few minutes of supervised time to remove personal belongings from his or her office.
If the employee is suicidal or depressed, offer the employee help from the employee assistance program and have a friend from work or a family member could accompany the person home.
There is a growing expectation that companies have some legal liability for the well-being of their employees and customers. Where does this liability stem from?
Theories of negligence under federal law.
The "general duty clause" of the Occupational Safety and Health Act.
National Fire Protection Association Standard 1600.
Good Samaritan Laws.
The "general duty clause" of the Occupational Safety and Health Act
What is true about the protection of employees abroad?
The employees must make arrangements for their own protection.
The employees must rely on the local government and police force for protection.
The company has a "duty of care" responsibility for the protection of employees, except for employees working abroad.
The company has a "duty of care" responsibility for the protection of employees, including employees working abroad.
The company has a "duty of care" responsibility for the protection of employees, including employees working abroad.
What is the definition of Firewalls?
A system of computer components between two networks that checks and controls the transfer of information between the networks.
Security devices that allow access to people based on biological factors, such as their fingerprints, the iris or retina of their eye, or their voice.
The amount of inventory that stores actually have relative to what they should have based on how much merchandise they initially bought and what has been sold.
An analysis of the level of risk and frequency of losses to determine how secure a company's assets are and the potential threats to these assets.
A system of computer components between two networks that checks and controls the transfer of information between the networks.
What is the definition of Vulnerability Analysis?
An analysis of the level of risk and frequency of losses to determine how secure a company's assets are and the potential threats to these assets.
A system of computer components between two networks that checks and controls the transfer of information between the networks.
A report that may contain information regarding an individual's credit standing, character, reputation, personal characteristics, and mode of living.
A theory that explains the likelihood that a security officer will detect a problem based on two factors: the detectability of the problem relative to background noise and the expectancy of an occurrence.
An analysis of the level of risk and frequency of losses to determine how secure a company's assets are and the potential threats to these assets.
According to signal detection theory, what happens when there is an actual threat and no action is taken?
A security breach.
A true miss.
A false alarm.
A detection violation.
A security breach.
What is the definition of Biometric Access Devices?
The opening statement of an arbitration hearing. It outlines the issues to be resolved and the authority granted to the arbitrator by both the union and employer.
An analysis of the level of risk and frequency of losses to determine how secure a company's assets are and the potential threats to these assets.
Security devices that allow access to people based on biological factors, such as their fingerprints, the iris or retina of their eye, or their voice.
A system of computer components between two networks that checks and controls the transfer of information between the networks.
Security devices that allow access to people based on biological factors, such as their fingerprints, the iris or retina of their eye, or their voice
Other sets by this creator
Wk 4 Practice: Topic 8 Quick Check
10 terms
Wk 3 Apply Assignment
23 terms
Wk 3 Practice: Assignment
15 terms
Wk 3 Practice: Topic 7 Quick Check
10 terms
Other Quizlet sets
PTCB Baby
173 terms
Chapters 4 & 5
30 terms
ACC 329 Final Exam Mod. 10-12
75 terms