INFORMATION

Site Map - The Workplace

Insider Threats

- Despite evidence that suggests staff dissatisfaction increases insider threats, 78 percent of  small and medium enterprises (SME) are more concerned with external IT threats, such as viruses and spam, than employee-led information theft, according to a white paper from GFI, a software developer. Add to this another survey from RSA, a security service provider, that discovered that employees that should know better regularly engage in risky behavior that jeopardizes sensitive business information.

Who Handles Your Cash?

- Before contracting with a cash-in-transit firm, companies must be aware of the basic features offered and whether the vendor has solid business practices.

Retaliatory Discharge

- An employee who was fired after she complained that her manager was illegally discriminating against job applicants may not sue her employer for retaliatory discharge. Though the employee did engage in a protected activity, the court determined that she was fired by an upper-level supervisor for misuse of the company’s computer system. The court found that the supervisor had no knowledge of the employee’s complaints and that the timing was coincidental. (Lakeside-Scott v. Multnomah County, U.S. Court of Appeals for the Ninth Circuit, No. 05-35896, 2009)

Trade Secrets

- A federal appeals court has ruled that an injunction against a company accused of stealing trade secrets was inappropriate. The court determined that monetary damages were available for the plaintiffs if they prevailed in their claim.

Data Security

- Communicating with users and training them on data security policies was the most important measure for protecting information, according to a survey of European and North American security professionals. Find out how they rate their own companies.

Hot Tips for Hotlines

- Hotlines can help companies catch fraud but only if the program is properly set up and well publicized among staff and contractors.

Railroads Find Common Contractor Screening Solution

- An industry-driven program called e-RAILSAFE vets and credentials contract workers for railroad companies.

Don't Let the Plan Be the Disaster

- Drawing on firsthand experience and studies of after-action reports from disasters around the United States, the author examines lessons learned and presents some of the most effective disaster response practices companies have developed.

Developing an Antipiracy Program

- How security managers can protect the company’s intellectual property and contribute to the bottom line. (Web Exclusive)  

Getting the Boss's Ear

- By being ready with the right information at the right time, you can become the person the boss turns to for advice and counsel.

Employment Tests

- Although conducting credit checks aren't illegal during the hiring process, the Equal Employment Opportunity Commission (EEOC) is concerned it could lead to discriminatory hiring practices. To provide guidance, the EEOC has published an online fact sheet to help employers steer clear of discrimination.

How to Avoid Hiring Mishaps

- Knowing what data to search and what information to avoid is critical when vetting job candidates. Special care must be applied when using criminal databases compiled from public sources, for example. Other critical issues include the proper vetting of educational claims and the use of social networking sites.

Fewer Contractors in Gates' Pentagon Budget

- Secretary of Defense Robert Gates wants to convert 11,000 private contractors to full-time government employees as part of his proposed budget for fiscal year 2010.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.