Site Map - The Workplace

Don't Silo Crisis Solutions

- A veteran security professional of 25 years shows how businesses can smash the silos that hamper enterprise preparedness. (Extended Online Exclusive)

Stolen Contractor Laptop Compromises 131,000 Guardsmen's Identities

- A contractor for the National Guard whose laptop was stolen has compromised the personal data of 131,000 current and former guardsmen.


- An employee who was denied a promotion because of her family obligations can pursue a sex discrimination claim against her employer. In the case, a mother of four who had worked for the company for nine years and had positive performance reviews was told that she would not be given a promotion because she was likely “overwhelmed” at home.

Behind the Numbers

- What data would IT employees steal if fired?

You Earned It

- A look at the results of the 2009 ASIS International U.S. Security Salary Survey, which collects data for the current and preceding years from participants and analyzes compensation trends.

Insider Threats

- Despite evidence that suggests staff dissatisfaction increases insider threats, 78 percent of  small and medium enterprises (SME) are more concerned with external IT threats, such as viruses and spam, than employee-led information theft, according to a white paper from GFI, a software developer. Add to this another survey from RSA, a security service provider, that discovered that employees that should know better regularly engage in risky behavior that jeopardizes sensitive business information.

Who Handles Your Cash?

- Before contracting with a cash-in-transit firm, companies must be aware of the basic features offered and whether the vendor has solid business practices.

Retaliatory Discharge

- An employee who was fired after she complained that her manager was illegally discriminating against job applicants may not sue her employer for retaliatory discharge. Though the employee did engage in a protected activity, the court determined that she was fired by an upper-level supervisor for misuse of the company’s computer system. The court found that the supervisor had no knowledge of the employee’s complaints and that the timing was coincidental. (Lakeside-Scott v. Multnomah County, U.S. Court of Appeals for the Ninth Circuit, No. 05-35896, 2009)

Trade Secrets

- A federal appeals court has ruled that an injunction against a company accused of stealing trade secrets was inappropriate. The court determined that monetary damages were available for the plaintiffs if they prevailed in their claim.

Data Security

- Communicating with users and training them on data security policies was the most important measure for protecting information, according to a survey of European and North American security professionals. Find out how they rate their own companies.

Hot Tips for Hotlines

- Hotlines can help companies catch fraud but only if the program is properly set up and well publicized among staff and contractors.

Railroads Find Common Contractor Screening Solution

- An industry-driven program called e-RAILSAFE vets and credentials contract workers for railroad companies.

Don't Let the Plan Be the Disaster

- Drawing on firsthand experience and studies of after-action reports from disasters around the United States, the author examines lessons learned and presents some of the most effective disaster response practices companies have developed.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.