Wake STEM Early College High School at Protus3

Wake STEM Early College High School at Protus3

Protus3 Computer Forensics, Mobile Forensics, News, Security Schematic Design, Training

Protus3 was excited to invite four students from the Wake STEM Early College High School into the office for a day of Job Shadowing. This is one of the best ways to learn and gain experience all while making connections with professionals. The students were specifically interested in Forensic Science, IT Technology, Cyber Security, and Criminal Investigating. Our experts showed …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha D. Dyson Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

time

Why Do Background Investigations Take So Long?

Tasha D. Dyson Background Investigation

Time is the number one challenge for employers in the background investigations process. That was one finding in the study entitled “How Human Resource Professionals View the Use and Effectiveness of Background Screening Methods” published by NAPBS and HR.com in June 2018. You can read the entire report here. The report did not include the expectation about how long background …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, it can get very confusing. …

arrest records

Can You Consider Arrest Records?

Tasha D. Dyson Background Investigation, Compliance

Let’s consider arrest records for a moment. Enforcement Guidance on the Consideration of Arrest and Conviction Records in Employment Decisions Under Title VII of the Civil Rights Act of 1964, as amended, 42 U.S.C. § 2000e et seq. published by the Equal Employment Opportunity Commission is an excellent resource. Much of the information in this section comes from that source. …

background screening report

What Should You Expect in a Background Screening Report?

Tasha D. Dyson Background Investigation

You’ve read the application, reviewed the resume, and interviewed the candidate. She seems like a good fit, and you’ve made a conditional offer of employment that will be based on the results of background screening report. As part of the background check process, you ask the candidate for additional information, including her past criminal history. (Read more about when to …

criminal history question on application

What is “Ban the Box” and What Does it Mean to You?

Tasha D. Dyson Background Investigation, Compliance, News

Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …

computer forensics

Five Computer Forensics Myths Debunked

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …

Campus Safety article about Penn State fine

Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case

Christine L. Peterson, CPP, ISP Clery Act, Compliance, News, SaVE Act, Title IX, VAWA

It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …

Campus Safety threat assessment article

3 Mistakes That Can Derail Your Threat Assessment Process

Christine L. Peterson, CPP, ISP Security Policy and Procedure Development, Workplace Violence, WPV Threat Assessment

Campus Safety Magazine published 3 Mistakes That Can Derail Your Threat Assessment Process. Although this article addresses students in an educational environment, it includes lessons for employers as well. How can security professionals protect the individual as well as the whole community? Violence in the workplace is more common than many believe – and it is also often predictable and …