In today’s economic environment, all companies are looking for opportunities to increase their customer base and grow their market share. Technology and the effective use of technology is critical to all businesses, from the small “mom & pop” to the large Fortune 100 firm doing business around the globe. As Americans we love technology and can’t get enough of it. …
Government Files First Criminal Charges In BP Oil Spill
As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …
Digital Message Resonance and Its Impact on Economic Advantage
Using Social Media Monitoring and Analytics to Protect Human Capital, Company Property, and Your Brand Social Media is a relatively new term that has become ingrained in our consciousness and language, but do you know what it means or encompasses? If you answered no, then you are in the majority. Everyone talks about Social Media, but few really understand it. …
US Cargo Theft – A Five‐Year Review
Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …
Maintaining Security Management Systems
It is not a secret that most departments within corporations and governments including local, state, and federal have been asked to reduce their budgets by a certain percentage every year since the economy took a turn for the worse. This has been a challenge – especially for security departments. How do you maintain the level of security needed today with …
Fake Caller ID Attacks on The Rise
These kinds of phony calls have existed for years, but the sophistication has increased to combat our increased vigilance. Use the same cautions that you would use when opening an email that appears to be from your bank or other institution. When you receive a call or email from your bank, the safest course of action is to initiate the …
Race and Ethnicity
Why do we ask for race/ethnicity on background investigation request forms? Because all of these women are Julie Jones. Which one is applying for a job at your company? You may have seen them in person, but the person conducting the background investigation has not. When obtaining a criminal record in North Carolina, for example, results often look like this: …
Jury Says Virginia Tech Negligent
Emergency plans are for doing – not just for having. This recent verdict underlines an important discrepancy between the letter and intent of both the Clery requirements for campus warnings and emergency warning best practices and the way these procedures are implemented in reality in some crisis situations. No matter how comprehensive and well founded an emergency plan is or …
FedEx Settles Charges of Causing, Aiding and Abetting Unlicensed Exports
In 2010, Michael R. Epperly, Esq. who heads RMA’s Corporate Compliance consulting arm, wrote an insightful article that addressed the corporate compliance challenges that American companies face in the global marketplace. Through his experience as legal counsel, investigator, and consultant he is acutely aware of the importance of a solid corporate compliance program to an organization and the penalties that …
Applicant Address Histories
What’s wrong with this picture? The time the applicant spent in Tennessee. An employment application or resume from an applicant is a good place to start, but it should not be used as the sole source of information about the applicant’s previous locations. Relying solely on the information provided by the applicant can miss vital information about their suitability for …








