pink slip

Termination Guidelines

Julius Stanley Carroll, CPP, CFE Security Program Development, Workplace Violence, WPV Support

Terminations are often a stressful situation, both for the terminated employee and for the individual responsible for conducting the termination. Listed below are some guidelines that could help diffuse volatile situations and make the process run more smoothly. Always plan the termination. Think it through. Always have two supervisors/managers present during the termination. The meeting should be cordial and professional …

Jeanne Clery

The Clery Act – Costs of Noncompliance

Christine L. Peterson, CPP, ISP Civil Rights, Clery Act, Compliance, Corporate Compliance, Ethics, Security Survey

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C. § 1092(f)(2011), is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. The U.S. Department of Education conducts reviews to evaluate an institution’s compliance with Clery Act requirements. A review may …

Research Triangle Park

RMA Completes Security Assessment of RTP

Protus3 News, Security Assessment, Security Program Development, Security Survey, Security Threat Assessment

Risk Management Associates, Inc. has completed a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation decided to conduct a security assessment to provide stakeholders with the current security …

Christine Peterson

RMA Presents BYOD Policies at RTP CFO Forum

Protus3 News, Security Program Development, Training

Chris Peterson and http://www.rmasecurity.com/about-rma/team-profiles/russell-w-gilmore/ presented BYOD (Bring Your Own Device): Issues and Implications for Companies at the September RTP CFO Forum. The program discussed security issues and considerations for companies when employees connect personal devices to the company network. What issues need to be considered to accommodate lawsuits, audits, and records requests? How can companies prepare for lost or stolen …

Security Design

Zoetis GSOC Needs Assessment Project Awarded

Protus3 News, Security Planning, Security Program Development

Risk Management Associates, Inc. has been requested by Zoetis to develop a Needs Assessment for a Global Security Operations Center. The assessment will define the mission, goals and objectives of the GSOC. Additionally, this assessment will include defining the support requirements of the GSOC that include personnel, technology and operations. Once the Needs Assessment is complete, Zoetis will be able …

Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISP Embezzlement, Fraud, Security Planning, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …

Research Triangle Park

Security Assessment of RTP

Protus3 News, Security Program Development

Risk Management Associates, Inc. will be conducting a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation needs to conduct a security assessment that will provide the stakeholders with …

Lone Star College

Lessons from Lone Star College System

Tasha D. Dyson News, Security Program Development, Workplace Violence

On January 22, 2013, gunshots were heard on the North Harris campus of Lone Star College System. It was later learned that an altercation between two individuals (one of whom may have been a student) had escalated to gun violence. The shooters were injured along with an innocent bystander. Incidents such as this immediately bring to mind topics such as …

Security Consulting

RMA Awarded Project for RockTenn

Protus3 News

RMA has been awarded a project to audit the security staffing requirements of the Fernandina Beach Facility and the Seminole Mill Facility. This audit will develop findings and recommendations for staffing needs at each facility. RockTenn is one of North America’s leading producers of corrugated and consumer packaging and recycling solutions. Based in Norcross, Ga., RockTenn employs approximately 26,000 people …

college students

Security Threat Assessments for Education

Protus3 Security Program Development

Download the complete article here. In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section …