My Account
Call for support:
Call support at 770-410-1219 770-410-1219

Documentation And Security Protocols For Evidence For An Internal Investigation

4/18/2026

As information is gathered during an internal investigations, the amount of paper collected can be quite significant. This may include samples of employee's work products, spreadsheets, reports, work schedules, photocopies of time cards, security logs, etc. Listed below are some recommendations for Security Protocols:

    • A common mistake is allowing investigative files to be stored in the same file cabinet as personnel files. This practice can allow any number of human resource professionals or administrative staff members to view sensitive documentation from investigations. This process can cause breaches in confidentiality.

Internal Investigations

  • A separate file area should be established within the records retention area of organizations or within a security, safety, or human resource department. The file cabinets must have the ability to be locked, and only the investigators should have access. For an HR Generalist, maintaining these workplace investigation boundaries is essential for human resources compliance.
  • Once secure file cabinets have been established for retention of hard copy documentation, the next step is securing data files. Every investigator utilizing case management software, or even simply a Microsoft Office application, must ensure that files are backed up every few hours. The loss of power, a system update, or any number of technological issues can cause a loss of investigative files.
  • Ensure that related databases are password protected, that passwords are alphanumeric, and that members of the Information Technology department sign a confidentiality agreement. All digital medical or sensitive personnel data must follow HIPAA privacy standards and labor law. IT professionals should be able to reset passwords, but should not be able to gain access to the investigative data files. If they are given this access, they must be made aware of consequences if security is breached.
  • Internal breaches in security and confidentiality are not the only breaches to be concerned about, however. External sources may potentially try to access secure files, so it is best to get reassurances from Information Technology professionals that the data is secured by a firewall and/or other protective measures.
  • Documentation created or collected during the course of an investigation should be retained for a significant length of time, usually the length of employment plus seven years. Once an investigation is completed, the documentation should be under the control of counsel to help protect the attorney-client and attorney work-product privileges.
HR Training Center
mailing address
5755 North Point Parkway Suite 227 Alpharetta, GA 30022
phone1-770-410-1219 emailsupport@HRTrainingCenter.com
Trusted Provider Of
Stay Up To Date
Need Training Or Resources In Other Areas? Try Our Other Training Center Sites:
Accounting Banking Insurance Financial Services Real Estate Mortgage Safety
Training By Delivery Format & Subjects Covered:
Seminars Webinars Online Training Certifications For TPAs All HR Subjects
© Copyright HRTrainingCenter.com 2026Facebook