Emergency plans are for doing – not just for having. This recent verdict underlines an important discrepancy between the letter and intent of both the Clery requirements for campus warnings and emergency warning best practices and the way these procedures are implemented in reality in some crisis situations. No matter how comprehensive and well founded an emergency plan is or …
FedEx Settles Charges of Causing, Aiding and Abetting Unlicensed Exports
In 2010, Michael R. Epperly, Esq. who heads RMA’s Corporate Compliance consulting arm, wrote an insightful article that addressed the corporate compliance challenges that American companies face in the global marketplace. Through his experience as legal counsel, investigator, and consultant he is acutely aware of the importance of a solid corporate compliance program to an organization and the penalties that …
Applicant Address Histories
What’s wrong with this picture? The time the applicant spent in Tennessee. An employment application or resume from an applicant is a good place to start, but it should not be used as the sole source of information about the applicant’s previous locations. Relying solely on the information provided by the applicant can miss vital information about their suitability for …
Clear Your Google Web History
On March 1, 2012, Google will implement a new privacy policy. This new policy will affect any data Google has collected on you prior to that date, along with data collected from then on. Under the new policy, your Google Web History can be combined with other data Google has gathered about you from other services like Gmail, Google+, and …
Eye Scanners at England Airports Turned Off
Many companies or organizations assume that the addition of technology can be the single solution to a security concern. Companies and organizations depend upon these technologies only to find out later, and after considerable expense, that the technology may not be all it was presented to be. It is always important to remember that the technology is only as good …
When Employees Leave, Data Should Stay
As a security consultant, quite often I am asked to assist with the hiring and termination of employees. The hiring process generally includes background checks, reference interviews, and financial history, along with other information. My involvement in the termination process is as a third-party observer and advisor. As a computer forensics expert and consultant, I am often called in sometime …
Chinese Hackers Breached Nortel for Years
Why is your company in business? You’re probably thinking, “That is obvious. We provide a superior product or service that our customers need.” This leads to three key questions: Do you know what your economic advantage looks like? Are you protecting your economic advantage adequately? How early can you identify leaks and do you have a plan to stop the …
Iran Reports Killing of Nuclear Scientist in ‘Terrorist’ Blast
Move over Bering Sea crab fishermen. There is a new “Most Dangerous Job in the World” – scientist in the Iranian nuclear weapons program. The assassination in January was the fourth in two years. This is another successful use of a motorcycle team to attach a small but effective explosive device to a car trapped in traffic with immediate initiation. …
Online Impersonation
Impersonating someone online can take many forms. In some cases, the impersonation may constitute a criminal offense, such as when one individual pretends to be another for financial gain. In other instances, the impersonation does not reach that level. Regardless of whether the impersonation is or is not a crime, the victim of the impersonation feels violated and vulnerable. Depending …
Fine Tune Your Criminal Background Checks
Background screening is an essential tool in today’s business. Choosing the best candidate for the job requires due diligence on the part of management. An effective screening policy protects the business, its assets, and ultimately increases a positive return on the investment. We recommend a policy that is flexible but non-discriminatory because it aligns the scope with the position. The …







