Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …
Prevention or Mitigation: Which Do You prefer?
How important is a security program? The first role of any organization’s leadership is the protection of the organization. In higher education, reputation is an institution’s greatest asset. Reputation attracts the talent – students, faculty/staff, business collaboration, and academic and non-academic recruitment. Reputation also attracts the resources – research, innovation, donors/investors, and funding. As security consultants, we have seen organizations …
Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case
It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …
What Can We Learn From Baylor University?
The Dallas Morning News recently published an article entitled “Sex assault reports at Baylor nearly quadrupled in 2015, report says”. Read the full article here. What can we learn from Baylor University? If campus leaders do not set the example and provide the necessary resources, it is nearly impossible to engage the population in a comprehensive and effective manner. A …
Is Your Customer Data Your Greatest Asset or Your Greatest Liability (or Both)?
This article about customer data was originally published by Matthew A. Cordell at Ward and Smith, P.A. Customer data can be a treasure trove for an organization. Many businesses believe customer and prospect data to be their most valuable asset. Unfortunately, some have discovered that, unless handled with care, it can also be their greatest liability. Organizations of all kinds …
Companies Can be Liable for Failing to Maintain Adequate Cyber Security
How much customer data do you have? Is it secure? If so, you should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate …
Keeping the Campus Safe during a Title IX Investigation
Should campus security conduct a behavioral threat assessment concurrent to a Title IX sexual violence investigation? Campus Safety’s feature on Threat Assessment Teams provides three steps to help maintain security during an investigation. Read more: 3 Steps to Keeping Victims and Campuses Safe During Title IX and VAWA Investigations Plan. Protect. Prosper. Protus3 specializes in security system design, …
Clery: Rethinking Your Role
Reputation equals funding: For many years researchers have investigated the influence of reputation on a university’s ability to raise capital. The general consensus is that even while reputation remains mercurial, its effect is hard to overstate. The better the reputation, the better the funding. As a result, many universities have begun to divert more resources towards what some scholars are …
Body Worn Camera Use in Health Care Facilities
>As a result of the “Evidence Based Healthcare Security Research” Series, the IAHSS Foundation published Body Worn Camera Use in Health Care Facilities. The Foundation’s research series summarizes the current state of knowledge regarding specific challenges in healthcare security. You can downloaded the report here. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) began in 1981. …
A Company Model for Developing Policies and Procedures
While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. Mark shared with the …










