Skip to main content

Design a systematic transfer policy.

Organizations should clearly specify their policy regarding transfers. Otherwise,superiors may transfer their subordinates arbitrarily if they do not like them. It causes frustration among employees. Similarly, subordinates may also request for transfers even for the petty issues. Hence, an organization should formulate a systematic transfer policy. A systematic transfer policy should the following items:
  1. Specification of circumstances under which an employee will be transferred in the case of any company initiated transfer.
  2. Name of the superior who is authorized and responsible to initiate a transfer.
  3.  Jobs from and to which transfers will be made, based on the job specification,description and classification, etc.
  4. The region or unit of the organization within which transfers will be administered.
  5. Reasons which will be considered for personal transfers, their order of priority,etc.
  6. Reasons for natural transfer of employees.
  7. Norms to decide priority when two or more employees request for transfers like priority of reason, seniority.
  8. Specification of basis of transfer, like job analysis, merit, length of service.
  9. Specification of pay, allowances, benefits, etc., that are to be allowed to the employee in the new job,
  10. Other facilities to be extended to the transferee like special level during the period of transfer, special allowance for packaging luggage, transportation, etc. Generally, line managers administer the transfers and HR managers assist the line managers in this respect.


Comments

Popular posts from this blog

What is the responsibility of business towards society? Why is social responsibility at a low pitch in India?

Responsibility of business towards society
A society consists of individuals, groups, organizations, families etc. They all are the members of the society. They interact with each other and are also dependent on each other in almost all activities. Thus, it has certain responsibilities towards society, which may be as follows:
to help the weaker and backward sections of the societyto preserve and promote social and cultural valuesto generate employmentto protect the environmentto conserve natural resources and wildlifeto promote sports and cultureto provide assistance in the field of developmental research on education, medical science, technology etc.
In other words, the responsibility of business towards society are:
Protection of environment.Better living conditions like housing, transport, canteen, crèches etc.Promotion of sports and culture.Opportunity for better career prospectsRegular supply of goods and servicesProper working conditions and welfare amenitiesGoods and services at…

Explain the meaning, relevance and features of the Competition Act, 2002.

In 1969 Govt. has passed an act and it had given the name monopoly and restrictive trade practices (MRTP). It became popular with the name of MRTP 1969. This act has many provisions to control the monopoly and to promote the competition. It has defined RTP and also explained the powers of MRTP commission. But its scope was very narrow and Govt. of India has made new act called competition act 2002. On the place of MRTP ACT 1969 after this MRTP act 1969 was fully repealed.

Explanation of Competition Act 2002
Competition Act 2002 states that Indian traders must not do any activity for promoting monopoly. If they will do any activity in the form of production, distribution, price fixation for increasing monopoly and this will be against this act and will be void. This act is very helpful for increasing good competition in Indian economy.

Under this act following are restricted practice and these practices are stopped by this act.
Price fixing: If two or more supplier fixes the same price…

How is data and message security ensured in e-business?

The data and message security ensured in e-business via:

Encryption: This technology deploys a public key and a private key infrastructure to ensure security. The public key can be distributed but the private key remains only with the user and the service provider. So, it works just like the username and password system of your e-mail account.Digital signatures: This technology requires a recipient’s password to decode the encrypted data. The sender’s authentication gets confirmed through a digital certificate, issued by credible authorities such as Verisign and Thawte.Secure socket layers (SSL): This process involves both public key and digital certificate technologies to ensure privacy and authentication. To initiate the process, a client asks for authentication from the server, which is done through a digital certificate. Then, both the client and server design session keys for data transfer. The session will expire following any modification or prolonged period of inactivity.Firewa…