criminal history question on application

What is “Ban the Box” and What Does it Mean to You?

Tasha Dyson, CFEBackground Investigation, Compliance, News

Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …

plan, protect, prosper

Prevention or Mitigation: Which Do You prefer?

Christine L. Peterson, CPP, ISPCompliance, News

How important is a security program? The first role of any organization’s leadership is the protection of the organization. In higher education, reputation is an institution’s greatest asset. Reputation attracts the talent – students, faculty/staff, business collaboration, and academic and non-academic recruitment. Reputation also attracts the resources – research, innovation, donors/investors, and funding. As security consultants, we have seen organizations …

Campus Safety article about Penn State fine

Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case

Christine L. Peterson, CPP, ISPCompliance, News

It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …

Baylor University headline

What Can We Learn From Baylor University?

Amanda StricklandCompliance, Security Program Development, Training

The Dallas Morning News recently published an article entitled “Sex assault reports at Baylor nearly quadrupled in 2015, report says”. Read the full article here. What can we learn from Baylor University? If campus leaders do not set the example and provide the necessary resources, it is nearly impossible to engage the population in a comprehensive and effective manner. A …

circuitboard with keys

Is Your Customer Data Your Greatest Asset or Your Greatest Liability (or Both)?

Amanda StricklandCompliance, Computer Forensics, Electronic Data Recovery, Intellectual Property

This article about customer data was originally published by Matthew A. Cordell at Ward and Smith, P.A. Customer data can be a treasure trove for an organization. Many businesses believe customer and prospect data to be their most valuable asset. Unfortunately, some have discovered that, unless handled with care, it can also be their greatest liability. Organizations of all kinds …

High Stakes Cyber article

Companies Can be Liable for Failing to Maintain Adequate Cyber Security

Christine L. Peterson, CPP, ISPCompliance, Intellectual Property, News, Security Program Development

How much customer data do you have? Is it secure? If so, you should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate …

Campus Safety article on safety during investigations

Keeping the Campus Safe during a Title IX Investigation

Christine L. Peterson, CPP, ISPCompliance, Training, Workplace Violence

Should campus security conduct a behavioral threat assessment concurrent to a Title IX sexual violence investigation? Campus Safety’s feature on Threat Assessment Teams provides three steps to help maintain security during an investigation. Read more: 3 Steps to Keeping Victims and Campuses Safe During Title IX and VAWA Investigations     Plan. Protect. Prosper. Protus3 specializes in security system design, …

sign that says rethink

Clery: Rethinking Your Role

Amanda StricklandCompliance, News

Reputation equals funding: For many years researchers have investigated the influence of reputation on a university’s ability to raise capital. The general consensus is that even while reputation remains mercurial, its effect is hard to overstate. The better the reputation, the better the funding. As a result, many universities have begun to divert more resources towards what some scholars are …

IAHSS publication

Body Worn Camera Use in Health Care Facilities

Dana Frentz, CHPA, PSPCompliance, News, Security Program Development

>As a result of the “Evidence Based Healthcare Security Research” Series, the IAHSS Foundation published Body Worn Camera Use in Health Care Facilities. The Foundation’s research series summarizes the current state of knowledge regarding specific challenges in healthcare security. You can downloaded the report here. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) began in 1981. …

Policy and Procedure Flow Chart

A Company Model for Developing Policies and Procedures

Christine L. Peterson, CPP, ISPCompliance, Security Program Development

While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. Mark shared with the …