Tutor Quora

BMHR5203 Human Resource Development

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

BMHR5203 Human Resource Development

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

BMHR5203 Human Resource Development

0 Download10 Pages / 2,290 Words

Course Code: BMHR5203
University: Open University Malaysia

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Malaysia


The purpose of this assignment is to develop learners’ ability to :  
1.Evaluate basic principles and current HRD issue on “employees’ career development programmes,” and
2.Apply HRD theory into real situations
You are required to answer the TWO (2) assignment questions below. These assignments should be completed individually.
Based on an interview with the Human Resource Manager of an organisation of your choice, write a real life case report on an issue related to “employees’ career development programmes.”
In your case report, you are advised to take into consideration the following:

Introduction – the opening section describes the rationale for the case study, including the firm’s background and profile, its current position and performance and its internal & external environment. Suggested to have pictures, graphs, tables etc, as illustrations the situation.
Issue/s – the following section states the main issue/s which needs to be resolved, related to employees’ career development programmes.   
Suggested Solutions – this is the heart of the document. It describes the solution in detail, how it was implemented, and the impact on users, methodologies, and other factors that contributed to the overall deployment. You may include sidebars, charts and graphs to highlight key points.

Evaluation – in the final section, conclude the report by evaluating the solutions, impact (usually positive), discuss lessons learned, and the next steps to be taken.

Answer all the questions:
1.In general, what skills and abilities do employees need for making ethical decisions about privacy? What else do they need besides skills and abilities? Discuss.
2.Suppose you became responsible for providing training in privacy at Claremont Savings Bank. Describe the training methods you think would be most effective, and explain why you chose those methods.  
3.Suppose you work in a company’s human resource department, and a rumour has reached you that one of the employees during her lunch hour sent out an e-mail to a few friends, describing an embarrassing but not illegal situation she had been in over the weekend. Someone from the company’s IT department came to you with the news. What should be your response to this situation? Where in the company are ethical (or legal) issues that should be addressed? How will you address them?


Privacy is a fundamental right of every individual. In workplace, privacy connotes securing the needs, demands and requirements of the employees and the customers. The managers are entrusted with the responsibility to train the employees about the importance of maintaining the privacy. Here, mention can be made of the Ethical Code of Conduct, which enhances the awareness about the correct approach towards the clients and the customers (Poell, 2017). Consideration of the standards and protocols of the employment legislations is assistance in terms of averting the illegal instances. This assignment attempts to skills, abilities and competencies needed for making ethical considerations within the workplace.
Skills and abilities needed for making ethical decisions
Before undertaking any task, the individuals need to assess whether they possess the skills, competencies and abilities needed. This assessment is crucial in terms of averting negative outcomes. Conducting self-assessment is appropriate for examining the feasibility of the possessed skills. This exercise is applicable for all of the tasks, including undertaking ethical decisions.
At the initial stage, the employees need to be proficient with the mission and vision statement. For this, the managers need to provide congenial environment to the workers, which do not support unethical actions. According to Weinberg et al. (2015), conscious approach is needed for the managers for enhancing the awareness of the staffs about the illegal actions. Possessing adequate and accurate information about the standards of Ethical Code of Conduct is crucial before making ethical decisions. Within this, awareness about how to handle the unethical instances is important for undertaking ethical decisions.
Mention can be made of Ethical Decision Making framework, which the employees need to be aware of. According to this framework, firstly the employees need to identify the ethical principles, which might be conflicting for a particular situation. Typical elements in this aspect are confidentiality, fair dealing, diligence and independence. The employees need to be aware of all these attributes. Consulting the senior and the experienced members is effective in terms of enhancing the preconceived skills, knowledge and expertise in these attributes (Bello, Armarego & Murray, 2015).
After identification of the principles, the employees need to consider the possible factors, which might influence the decision-making process. Situational influences or internal biases acts as obstacle in the process of making the ethical decisions. Accepting such offers is unethical and might compel the personnel to encounter negative results. Instead, evaluation needs to be conducted for assessing which factor might lead to the appropriate decision. At the initial stage, the tendency would be to accept all of the factors for undertaking the decisions. However, exposing open-mindedness is assistance for the employees in terms of expanding the thought horizons. Time management is an important aspect within ethical decision-making process. This is in terms of examining the feasibility and effectiveness of the adopted decision. This reflection provides the employees with effective learning opportunities. In the opinions of Hughes, (2018), using this method would enable the employees to gain familiarity with their strengths and weaknesses.
Apart from this, the employees need to have cognitive skills for handling the unethical situations. Placing themselves in different situations and applying various perspectives broadens the scope and arena of judgmental decision-making power. Taking help from the senior and the experienced managers is beneficial for the employees in terms of judging the effectiveness of the adopted learning process. These skills lay the foundation for appropriate ethical decision-making skills. Judgment of the decision-making skills enhances the awareness of the employees about the impact it creates on others’ thought process. The sub skills required in this aspect are implementing the decisions and reviewing it.
Here, mention can be made of the different approaches, which the employees need to possess for undertaking decisions, which are ethical (Simmel, 2017). These approaches are utilitarian, right based, fairness or justice and virtue. Utilitarian approach helps the employees to gain an insight into the consequences of the actions and decisions. Right based approach is fruitful in terms of assessing whether the rights of the people have been respected in the process of undertaking ethical decisions. Fairness or justice approach is productive in terms of assessing whether the undertaken decisions provides fair treatment to the clients and the customers. Virtue action is productive for examining the actions, which results in embodiment of the strengths.
Training methods for respecting privacy 
Training regarding privacy is crucial for inculcating the values of securing the feelings of privacy and security within the employees. However, I think adherence to integrated frameworks help in achieving positive outcomes. The managers take into consideration the modules, which consists of the basic ways for maintaining privacy, confidentiality and security. I can make the mention of the induction trainings, which helps the new joinees to gain familiarity with the confidentiality and security policies (Martin, 2016). Within this, I can point out c omputer based training module. When the systems receive the information of ID card, the course is delivered to the employees. The duration of the course is 20 minutes, within which the employees are made acquainted with the dynamics of security, privacy and confidentiality within the business networks. Special initiatives are taken for helping the employees in renewing their ID cards.
The managers take into consideration the latest versions of Privacy Act for transmitting the essential information about maintaining the security of the workplace. Within this, reference to Access to Information Act, is fruitful in terms of assessing whether the employees can access necessary information regarding their private and confidential information. Here, the managers undertake practical training methods, which provides an easy understanding to the employees about the basic ways and means of preserving the security (Birnstill, 2016).
Within the training methods, the trainers take into consideration, the statistics and the objectives. These consideration helps in improving the focus on teaching the employees the basic ways of preserving the privacy. After the provision of training, assessment needs to be made regarding whether accurate control and protective measures have been adopted. Practical training methods are adopted for enhancing the familiarity of the employees regarding accessing the confidential files and storing them effectively. Here, mention can be made of the practical trainings, which upgrade the knowledge, skills and expertise of the employees regarding averting the instances of cybercrimes (Boehm, Hey & Ortner, 2016).
Preparing frameworks for providing trainings help in systematizing the activities according to the priorities. This is on the grounds of dignity, respect, disagreement and other attributes. One of the typical components of the framework is the group work, which generates interest for collaborative output. Allow ample opportunities to the employees to read about the cases, which violates the privacy or respect the privacy, helps in enhancing their skills towards ensuring that the privacy and security is maintained. These group works seem effective for assessing the capability of the employees towards responding to the allocated tasks.
Evaluation of the adopted training methods helps the trainers in assessing its appropriateness, feasibility and effectiveness. Using checklists and templates for evaluation is assistance for the trainers for gaining an insight into the capability of the trainees to grasp the basic concepts related to securing the privacy (Gheorghe, 2017).
Self-approach towards the rumours of the ethical situations
If somebody from other department comes to me with the rumours, I would judge the reality of the news. This judgment would enhance the practicality of the situation, assisting me to assess whether the situation is ethical or not. However, in order to maintain the courtesy towards the clients and the customers, I would first thank the member, who informed me about the issue. I think his spontaneous nature needs to be applauded in terms of reporting the issues at the right time for averting the unethical situations in the workplace. I would instruct him to inform HR.
This is not the end of the actions for me. I need to study and research on the issue for excavating the circumstances, which compelled the member to consider the situation as unethical. Here, I think journey mapping would be effective in terms of assessing the appropriateness of the proposed decision. Involving the stakeholders and shareholders in the decision making process would be beneficial for me in terms of gaining an insight into their approach. I feel that conducting question answer session would help me to delve deep into their mindset. This insight would be fruitful for undertaking plans and programs for securing the privacy of the employees and the clients.
In the research, I would refer to the company policies. This approach would act assistance in terms of aligning the claims with the identified and the specified objectives. I would take special permission from the higher authorities and the statutory bodies of law for establishing contact with the third parties. I think privacy policies is vital for me in the process of referring to the third parties, which would help me to maintain safety, security and privacy of the personal belongings in case of the employees.
In the process of research, if I do not find any relevant policies, I would place request before the higher authorities conduct meetings and develop one. This needs to be done rationally and logically for gaining the trust, dependence and loyalty from the clients and the customers. I need to establish contact with the personnel of IT department for gaining accurate information on the issue reported by the member. Here, policies are important for aligning with the standards and codes of the requirements. I can make mention of Data Protection Act (1998), which would help me to protect the interest of the members as well as the victims of the concerned parties. Moreover, it would be my duty to protect the interest of the culprits in terms of maintaining their individualism within the workplace.
Apart from this, one of my duties would be to organize training programs for the employees. This would be done by me after the discovery of the negative results or drawbacks in the research process. In this case, if I follow the Ethical Decision Making framework, I would achieve positive results in the forms of enhancement of the skills, knowledge and expertise of the employees towards the ethical considerations in the workplace. I can relate the framework with Gibbs reflective Cycle. This is in terms of assessing the effectiveness of the proposed decisions. In this assessment, reflection and evaluation are the essential elements, enabling me to re-exercise my thought process about undertaking decisions for the reported incident.
Inclusion of the latest revisions of the laws and legislations would be beneficial for me in terms of enhancing the skills relates to handling of the unethical situations and cases. I think contacting the managers would help me to design quality training programs. Hiring law experts for delivering lectures and seminars would yield productive results. However, identity verification needs to be conducted for maintaining the safety and security of the organizational data and the personal data of the employees, clients and the customers. I would propose the installation of privacy cookies within the profile of the customers. This would help me to keep a track of what the employees are sending to others. Along with this, the cookies would assist in security the privacy of the personal information belonging to the employees.
Sending email to friends during the lunch hour is unethical. This is because emails are kept for contacting the managers and the supervisors regarding the completion of the allocated tasks or to sending drafts regarding the progress of the tasks. However, emails have been used by the employees for personal usage, which is unethical. Instead, if the employee notified the manager regarding the absence, it would not have been considered as unethical. Here, I would take the initiative of instructing the employees about sending emails directly to the supevisors in case of any issue. I think this step would be beneficial in enhancing the stability in the relationship between the managers and the employees.
Management of the human resources is vital in terms of maintaining the order and harmony within the workplace. Within this, mention needs to be made of the employees and their approach towards preserving the privacy in the organizational data. Training and development regarding maintaining security and privacy is effective in terms of enhancing their preconceived skills, expertise and knowledge. Taking into consideration, the privacy cookies and policies proves beneficial for the personnel for averting the illegal instances. Establishing contact with the statutory bodies of law is assistance in terms of maintaining the pace with the latest revisions and updates in the employment legislations.
Bello Garba, A., Armarego, J., & Murray, D. (2015). Bring your own device organizational information security and privacy. ARPN Journal of Engineering and Applied Sciences, 10(3), 1279-1287.
Birnstill, P. (2016). Privacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement (Vol. 25). KIT Scientific Publishing.
Boehm, F., Hey, T., & Ortner, R. (2016). How to measure IT security awareness of employees: a comparison to e-mail surveillance at the workplace. European Journal of Law and Technology, 7(1).
Gheorghe, M. (2017). Considerations on the conditions under which the employer may monitor their employees at the workplace. Juridical Trib., 7, 62.
Hughes, C. (2018). Conclusion: Diversity intelligence as a core of diversity training and leadership development. Advances in Developing Human Resources, 20(3), 370-378.
Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551-569.
Poell, R. F. (2017). Time to ‘flip’the training transfer tradition: Employees create learning paths strategically. Human Resource Development Quarterly, 28(1), 9-15.
Simmel, A. (2017). Privacy is not an isolated freedom. In Privacy and Personality (pp. 71-87). Routledge.
Weinberg, B. D., Milne, G. R., Andonova, Y. G., & Hajjat, F. M. (2015). Internet of Things: Convenience vs. privacy and secrecy. Business Horizons, 58(6), 615-624.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 10 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Human Resource Development. Retrieved from https://myassignmenthelp.com/free-samples/bmhr5203-human-resource-development/information-security-and-privacy.html.

“Human Resource Development.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/bmhr5203-human-resource-development/information-security-and-privacy.html.

My Assignment Help (2021) Human Resource Development [Online]. Available from: https://myassignmenthelp.com/free-samples/bmhr5203-human-resource-development/information-security-and-privacy.html[Accessed 18 December 2021].

My Assignment Help. ‘Human Resource Development’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Human Resource Development [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/bmhr5203-human-resource-development/information-security-and-privacy.html.

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



If you have question in your mind like ‘what is a thesis paper’ ask experts from MyAssignmenthelp.com. They will give you a complete guideline on it and also will provide you with some tricks to do an essay efficiently. They can also show you some examples of a thesis which will provide clarity. If you want better benefit than just seeing thesis examples, you can ask our experts to write your thesis paper for you. We have some of the best paraphrasing tools that will scan your paper and make it flawless at the end of the day.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »