new model of leakage

Employment Law: Can You Police Social Media?

Protus3Compliance

Guest blogger Mimi Soule specializes in employment law at the Soule Law Firm in Raleigh, North Carolina. This article was originally published on the website of Forrest Firm. Lately, the National Labor Relations Board (NLRB) is taking a particularly active interest in employer polices regarding social media. For those of us living and working in a Right-to-Work state like North …

dictionary shown through glasses

Massachusetts Drug Lab Scandal

Christine L. Peterson, CPP, ISPBackground Investigation, Compliance, News, Theft, Embezzlement, and Fraud

On Saturday, September 29, 2012, the News and Observer covered the story of Annie Dookhan, a chemist at a Massachusetts drug lab. This story underscores some of the devastation that can result when an organization doesn’t follow basic security principles which require both screening and guardianship. The lack of screening and guardianship at the Massachusetts state drug lab has already …

employment application

Yahoo Chief Executive Scott Thompson Steps Down

Tasha Dyson, CFEBackground Investigation, Compliance, Theft, Embezzlement, and Fraud

Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. The assumption seems to be that since an applicant has worked at “Alpha Company”, there is no need for “Beta Company” to do a thorough background investigation. The faulty logic is …

BP texting

Government Files First Criminal Charges In BP Oil Spill

Protus3Compliance, Computer Forensics

As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …

Digital Message Resonance and Its Impact on Economic Advantage

Christine L. Peterson, CPP, ISPSecurity Program Development

Using Social Media Monitoring and Analytics to Protect Human Capital, Company Property, and Your Brand Social Media is a relatively new term that has become ingrained in our consciousness and language, but do you know what it means or encompasses? If you answered no, then you are in the majority. Everyone talks about Social Media, but few really understand it. …

cargo thefts

US Cargo Theft – A Five‐Year Review

Christine L. Peterson, CPP, ISPCrisis Management Planning, Security Assessment, Security Program Development, Theft, Embezzlement, and Fraud

Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …

arrest records

Applicant Address Histories

Tasha Dyson, CFEBackground Investigation

What’s wrong with this picture? The time the applicant spent in Tennessee. An employment application or resume from an applicant is a good place to start, but it should not be used as the sole source of information about the applicant’s previous locations. Relying solely on the information provided by the applicant can miss vital information about their suitability for …

woman holding a dog in the screen

Online Impersonation

Protus3News, Theft, Embezzlement, and Fraud

Impersonating someone online can take many forms. In some cases, the impersonation may constitute a criminal offense, such as when one individual pretends to be another for financial gain. In other instances, the impersonation does not reach that level. Regardless of whether the impersonation is or is not a crime, the victim of the impersonation feels violated and vulnerable. Depending …

Fine Tune Your Criminal Background Checks

Christine L. Peterson, CPP, ISPBackground Investigation, News

Background screening is an essential tool in today’s business. Choosing the best candidate for the job requires due diligence on the part of management. An effective screening policy protects the business, its assets, and ultimately increases a positive return on the investment. We recommend a policy that is flexible but non-discriminatory because it aligns the scope with the position. The …