1. ATM CUSTODIAN
There are 2 types of ATM Custodians : Internal and External
Internal : It will be either of the Branch Accountant or the Cash officer .He/she has the responsibility to fill cash in the ATM , do maintenance and other related issues related to cash errors in ATM .Usually such an ATM is attached to the branch .
External : It will be a third party agent appointed by Outside company who takes contract to maintain fill and do related activities for an ATM which is not attached to a bank branch .
2. FRONT OFFICE EMPLOYEES
The function of front office is to directly get in touch with customers, and is usually the first place that customers get to when they arrive to the company. The front office can discover more information about the customer by asking them questions, also helping the customers out. Staff working in the front office can also deal with simple tasks, such as sorting out emails, helping out on printing and typing works. Front office staff need to use different skills on technologies too, such as using the printers, fax machines and phone. This is the reason why training is needed before the staffs start to work, although some might only be simple tasks. The most common work for the front office worker will be a mix of getting in touch with customers and also helping out internally in the office.
3. BACK OFFICE EMPLOYEES
Back offices are often located somewhere other than company headquarters. Many are in areas and countries with cheaper rent and lower labor costs. Some office parks provide back offices for tenants whose front offices are in more expensive neighborhoods. Back office functions can be outsourced to consultants and contractors, including ones in other countries
4. COMPUTER OPERATOR
Employee behavior can have a big impact on Information Security in organizations. Cultural concepts can help different segments of the organization work effectively or work against effectiveness toward information security within an organization. Information security culture is the "...totality of patterns of behavior in an organization that contributes to the protection of information of all kinds."
5. IT EMPLOYEES
Staffing helps to find and hire people who are qualified for the job position and will benefit the company. It also improves the quality and quantity of work done by the company because they have staffed the optimum people. Job Satification rates are likely to increase because everyone is well-suited for their position and is happy to be doing their specialty of work. Higher rates of productive performance from the company are also common, as they have staffed the right people to do their jobs. It provides employees the opportunity for further growth and development
6. ACCOUNTANTS
A big advantage of computer-based accounting information systems is that they automate and streamline reporting, develop advanced modelling and support data mining. Reporting is major tool for organizations to accurately see summarized, timely information used for decision-making and financial reporting. The accounting information system pulls data from the centralized database, processes and transforms it and ultimately generates a summary of that data as information that can now be easily consumed and analyzed by business analysts, managers or other decision makers. These systems must ensure that the reports are timely so that decision-makers are not acting on old, irrelevant information and, rather, able to act quickly and effectively based on report results. Consolidation is one of the hallmarks of reporting as people do not have to look through an enormous number of transactions. For instance, at the end of the month, a financial accountant consolidates all the paid vouchers by running a report on the system. The system's application layer provides a report with the total amount paid to its vendors for that particular month. With large corporations that generate large volumes of transactional data, running reports with even an AIS can take days or even weeks.
7. CASHIERS
Cashier as a service (CaaS) refers to using a third party service as payment. When a shopper buys merchandise online, oftentimes, the shopper does not pay the merchant directly, but rather through a third party – the cashier. The cashier is trusted by both the shopper and the merchant and is expected to allow for reliable and secure transfer of money. By paying a merchant through a cashier, shoppers are able to pay for merchandise without giving away their financial information to the merchants.
8. SHORTER
The meaning of the word protection, as used in the electrical industry, is no different to that in everyday use. People protect themselves against personal or financial loss by means of insurance and from injury or discomfort by the use of protective clothing. They further protect their property by the installation of security measures such as locks and/or alarm systems.
9. DRIVER
Creating more secure drivers requires the cooperation of the system architect (consciously thinking of potential threats to the driver), the developer implementing the code (defensively coding common operations that can be the source of exploits), and the test team (proactively attempting to find weakness and vulnerabilities). By properly coordinating all of these activities, the security of the driver is dramatically enhanced.
10. AGRICULTURAL EMPLOYEES (LABOURS)
Nearly half of the world’s population, more than three billion people, live in rural areas. In many countries, rural areas play a significant economic role. Around 28 percent of the people in employment are estimated to work in the agricultural sector, which amounts to nearly one billion people around the globe. Many of them work in the informal sector of the economy (93.6 percent) with variable and often low income, and a largely insufficient social protection coverage.
11. BPO CALL CENTRE EMPLOYEES
If customers know an organization can keep their data safe, they have more positive experiences. These best practices can help establish trust and keep data safe in call centers.