High Stakes Cyber article

Private Companies Can be Liable for Failing to Maintain Adequate Cyber Security

How much customer data do you have? Is it secure? You should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate a minimum …

Campus Safety article on safety during investigations

Keeping the Campus Safe during a Title IX Investigation

There are cases in which campus security may be improved by conducting a behavioral threat assessment concurrent to a Title IX sexual violence investigation. Campus Safety’s feature on Threat Assessment Teams provides three steps to help maintain security during an investigation. Read more: 3 Steps to Keeping Victims and Campuses Safe During Title IX and VAWA Investigations

Michael Epperly

Michael Epperly Published in Campus Safety Magazine

Campus Safety magazine published “4 Questions Every Campus Should Ask When Hiring a Title IX Private Investigator” by Michael Epperly. Since 2011, the U.S. Department of Education, Office of Civil Rights (respectively, “ED” and “OCR”), has required that all persons involved in an institution’s Title IX grievance procedure – including its investigators – have demonstrable training or experience in conducting …

Protus3 Booth

Protus3 is a Regional Conference Sponsor at the International Association of Campus Law Enforcement Administrators (IACLEA) Southern Regional Conference

This year’s International Association of Campus Law Enforcement Administrators (IACLEA) Southern Regional Conference was held in conjunction with the National Association of Campus Safety Administrators (NACSA) on March 7 through March 9, 2016. This year’s conference was hosted by Chief Tom Saccenti and his team at Furman University. Protus3 was honored to be a Regional Conference Sponsor again this year. …

Clery Rethinking Role

Clery: Rethinking Your Role

Reputation equals funding: For many years researchers have investigated the influence of reputation on a university’s ability to raise capital. The general consensus is that even while reputation remains mercurial, its effect is hard to overstate. The better the reputation, the better the funding. As a result, many universities have begun to divert more resources towards what some scholars are …

NCACLEA Booth

Protus3 Participates in the NCACLEA Winter Conference

Protus3 is a long-term supporter of the NC Association of Campus Law Enforcement Administrators (NCACLEA) both as a presenter and a Corporate Sponsor. This year’s 2016 NCACLEA Winter Conference was hosted by Wake Tech Public Safety department at its Public Safety Center in Raleigh, NC on January 29, 2016.  The organization does an amazing job of assembling and presenting training …

IAHSS publication

Body Worn Camera Use in Health Care Facilities

As part of the “Evidence Based Healthcare Security Research” Series The IAHSS Foundation has published “Body Worn Camera Use in Health Care Facilities.” The Foundation’s research series’ summarizes the current state of knowledge regarding specific challenges in healthcare security. The report can be downloaded here: http://ihssf.org/PDF/ihssfbodyworncameras.pdf The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) was established …

Children's Healthcare of Atlanta

Protus3 Completes Security Assessment of Children’s Healthcare of Atlanta

Protus3 completed the security assessment of Children’s Healthcare of Atlanta. An assessment of the healthcare facility included an evaluation of the security operations, the level of security and safety education, the compliance and readiness of security related plans and programs, and an appraisal of the organization and management of their functions. Protus3 focused on three areas: • Physical Security, • …

Policy and Procedure Flow Chart

A Company Model for Developing Policies and Procedures

While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. What Mark shared with …

locked computer

Data Security: Where There Is Data, There Should Be Policy

The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. The part that concerns me are the reports that federal law enforcement officials are …