We have a client (let’s call them Sub) who is obtaining criminal history information as part of their compliance to another company (let’s call them Prime). Prime states that Sub should “Provide a criminal record check with the applicant’s full legal name.” Sub contracted with RMA to provide that information. When we search, we don’t limit our results to the …
Lock Your Computer
The other day I was in an office, and the receptionist had walked away from her desk. It was obvious that she had not logged out of or locked her computer. She was gone for quite a while, and fortunately no one else entered the area or went up to the desk while she was gone. We all need to …
Check Their References
I was working on a background investigation for a client recently, and I was reminded of a valuable lesson. (By the way, names and identifying information have been edited in this story, but the circumstances and situations have not.) When we verify employment, normally companies only provide dates of employment and position held. Sometimes companies will tell you whether the …
System Commissioning and Integrated Security Systems
As integrated security systems become more prevalent within the corporate, healthcare and government industries, security directors and mangers rely more heavily on their security integrator to verify that all systems work together properly, seamlessly, and as designed. Once an installation has been completed by the integration company, it is recommended that a third-party commission the entire system. This step is …
Access Card – Keys to the Building
As most of us know, an access card or credential is a key to gain entry to a parking lot, building, or other secured space. Why then do so many people leave their card in their car after work? Some even hang them from their mirror. When I ask, the response I usually get is “it is more convenient and …
Weather-Related emergencies
Weather-related emergencies create an operational environment in which the security department may have to stand alone for minutes, hours, or days without significant assistance from outside agencies. Although relatively localized on a broad geographic scale, a weather emergency may affect everyone and everything in a specific area. The scope of such disasters often overwhelms public safety response for hours or …
Massachusetts Drug Lab Scandal
On Saturday, September 29, 2012, the News and Observer covered the story of Annie Dookhan, a chemist at a Massachusetts drug lab. This story underscores some of the devastation that can result when an organization doesn’t follow basic security principles which require both screening and guardianship. The lack of screening and guardianship at the Massachusetts state drug lab has already …
Front Page News for All the Wrong Reasons
Over the last couple weeks we have had too many examples of workplace violence and the devastation and the long-term impact it has on the business and the community. As security consultants, we partner with clients to protect their assets, and two of the most critical assets that any company has are its people and its reputation/brand. With that said, …
Legal Requirements as Mobile Devices Inundate Offices
By Elizabeth Johnson Originally published in Business North Carolina’s Law Journal, May 2012 issue With 87% of employees confirming they use personal electronic devices for work, designing a workable “bring-your-own-device” program is probably overdue. BYOD is a tricky issue; 48% of companies claim they would never authorize employees to use personal devices for work, but 57% acknowledge that employees do …
Yahoo Chief Executive Scott Thompson Steps Down
Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. The assumption seems to be that since an applicant has worked at “Alpha Company”, there is no need for “Beta Company” to do a thorough background investigation. The faulty logic is …









