How Does wolkvox Manage Personnel Selection and Offboarding in Terms of Security?
Table of Contents
Description
wolkvox implements a comprehensive personnel management process—from recruitment to offboarding—with a strong focus on information security and compliance with its Information Security Management System (ISMS). This process includes rigorous evaluations during hiring, ongoing security training, and clear offboarding procedures, ensuring that employees understand and comply with security policies throughout their relationship with the company.
The goal is to protect assets and sensitive information, foster a culture of security, and ensure that commitments made are upheld even after the employment relationship ends.
Features
Recruitment and Hiring
- Profile-based evaluation: Candidates are selected based on a Job Profile that includes technical and security requirements.
- Role and criticality matrix: The criticality level of the position is defined along with corresponding security validations (e.g., background checks, confidentiality agreements).
- Confidentiality agreement: All employees sign a confidentiality agreement at the start of their employment, committing to protect wolkvox’s information.
Training and Security Culture
- ISMS training plan: Employees receive training on policies, procedures, and best practices for information security.
- Weekly communications: Security reminders and updates are sent regularly to reinforce awareness and keep security top of mind.
- ISMS compliance: Strict adherence to wolkvox’s Information Security Policy is promoted across the organization.
Performance and Disciplinary Actions
- Compliance monitoring: Employee adherence to security policies is evaluated, and potential violations are identified.
- Violation and sanction scale: The internal work regulations establish a disciplinary procedure with sanctions proportional to the severity of the violations, ensuring individual accountability.
Employment Termination
- Secure offboarding process: Upon termination, the confidentiality commitment made in the initial agreement is reinforced.
- Access revocation: Access to systems, data, and company resources is immediately disabled to prevent security risks.
- Asset return: The return of equipment, documents, and any other company assets is ensured, guaranteeing that no sensitive information remains with the former employee.