INFORMATION

Site Map - The Workplace

You Earned It

- A look at the results of the 2009 ASIS International U.S. Security Salary Survey, which collects data for the current and preceding years from participants and analyzes compensation trends.

Insider Threats

- Despite evidence that suggests staff dissatisfaction increases insider threats, 78 percent of  small and medium enterprises (SME) are more concerned with external IT threats, such as viruses and spam, than employee-led information theft, according to a white paper from GFI, a software developer. Add to this another survey from RSA, a security service provider, that discovered that employees that should know better regularly engage in risky behavior that jeopardizes sensitive business information.

Who Handles Your Cash?

- Before contracting with a cash-in-transit firm, companies must be aware of the basic features offered and whether the vendor has solid business practices.

Retaliatory Discharge

- An employee who was fired after she complained that her manager was illegally discriminating against job applicants may not sue her employer for retaliatory discharge. Though the employee did engage in a protected activity, the court determined that she was fired by an upper-level supervisor for misuse of the company’s computer system. The court found that the supervisor had no knowledge of the employee’s complaints and that the timing was coincidental. (Lakeside-Scott v. Multnomah County, U.S. Court of Appeals for the Ninth Circuit, No. 05-35896, 2009)

Trade Secrets

- A federal appeals court has ruled that an injunction against a company accused of stealing trade secrets was inappropriate. The court determined that monetary damages were available for the plaintiffs if they prevailed in their claim.

Data Security

- Communicating with users and training them on data security policies was the most important measure for protecting information, according to a survey of European and North American security professionals. Find out how they rate their own companies.

Hot Tips for Hotlines

- Hotlines can help companies catch fraud but only if the program is properly set up and well publicized among staff and contractors.

Railroads Find Common Contractor Screening Solution

- An industry-driven program called e-RAILSAFE vets and credentials contract workers for railroad companies.

Don't Let the Plan Be the Disaster

- Drawing on firsthand experience and studies of after-action reports from disasters around the United States, the author examines lessons learned and presents some of the most effective disaster response practices companies have developed.

Developing an Antipiracy Program

- How security managers can protect the company’s intellectual property and contribute to the bottom line. (Web Exclusive)  

Getting the Boss's Ear

- By being ready with the right information at the right time, you can become the person the boss turns to for advice and counsel.

Employment Tests

- Although conducting credit checks aren't illegal during the hiring process, the Equal Employment Opportunity Commission (EEOC) is concerned it could lead to discriminatory hiring practices. To provide guidance, the EEOC has published an online fact sheet to help employers steer clear of discrimination.

How to Avoid Hiring Mishaps

- Knowing what data to search and what information to avoid is critical when vetting job candidates. Special care must be applied when using criminal databases compiled from public sources, for example. Other critical issues include the proper vetting of educational claims and the use of social networking sites.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.