Friday, February 25, 2011

Ignorance of E-mail Monitoring Rules in the UK

Source: OUT-LAW News

The Regulation of Investigatory Powers Act which came into force in October 2000 creates an offence of intercepting e-mails except in certain circumstances. In the case of employers, the rules for an employer to follow if wanting to monitor staff e-mail are set out in Regulations made under the Act, the Human Rights Act and a draft Code issued by the Information Commissioner (formerly the Data Protection Commissioner).

For the full story click here.

For a copy of The Legal Guide to Employee Monitoring, contact David.

ARC is Accredited by the UK’s Largest Academic and Vocational Training Awarding Body

ARC is Accredited by Edexcel, the UK’s largest awarding body offering academic and vocational qualifications and testing to schools, colleges, employers and other places of learning in the UK and internationally.

In its first inspection ARC scored an A Grade. This confirms ARC’s position as firmly in the elite of professional development centres.

Encrypt Your Laptops and Flash Drives

In the UK 2 councils were fined £150,000 after theft of 2 laptops which, contrary to the councils' policies, staff failed to encrypt.

Women Travellers and Hostile Environments

It's naive to assume that gender is irrelevant when making hostile environment deployments, says the BBC. Click here for the full story.

Staggering Cost of UK Cyber Crime Revealed

The days of the old-fashioned bank robber pulling a stocking over his head, and robbing a bank, are almost over, reports Sky News.

"Bank robbers have to go to banks – in the modern world they don’t even have to be in the same country as a bank to rob it,” said Martin Sutherland, managing director of Detica.

The threat posed by password thieves, phishers and hackers on home computers is well known.

Cyber crime is costing Britain at least £27bn a year, mostly though the theft of industrial secrets.

According to the study, the UK loses £9.2bn a year through the theft of the innovations and designs which drive industrial growth - what is known as intellectual property.

Another £7.6bn is lost through industrial espionage. The industries worst hit are defence, automobile, pharmaceuticals, software and computer services along with mining, and financial services.

Another Moscow-Style Airport Attack Highly Likely

Intelligence provider Stirling Assynt predicts that "It is highly likely that further terrorist attacks against landside (airport) facilities will be attempted".

Meanwhile, world events have drawn attention away from the continuing possibility of another Mumbai-style hotel attack, but the threat remains, ARC will warn in its forthcoming Security Management Stage 1 Course, 14-25 March 2011.

Credit Card Fraud

A third of us - almost 15m people - have been hit by card fraud over the past five years, according to new figures. It is a sharp rise on the 27% of British consumers that had fallen foul of fraudsters just 18 months ago.

ARC's best advice when travelling abroad: Always carry cards from more than one issuer in case your card gets cancelled by your issuer as a result of suspicious activity. It hurts and there is no appeal!

Read more.

Are You Ready for Global Change?

Climate change, extreme energy price volatility, water security, fragile states, food security, organised crime – these are all high probability/high impact scenarios predicted for the coming 10 years by the World Economic Forum in its 2001 Global Risks Report.

Strategic risk management forms one of the key foundations of the forthcoming Security Management Stage 3 Course, 16-27 May. Click here for details. Other topics addressed include kidnap, espionage, corporate social responsibility, malicious contamination, counterfeiting, terrorism, stakeholder engagement, business expansion, security intelligence, and dealing with protest activity.

Click here to go to the WEF 2011 report.

Global Kidnap Hotspots - and Ransom Costs

Kidnap and ransom trends are in constant flux, with Somali piracy and Mexican kidnapping on the upswing, while hostage-taking in Colombia and Iraq is in decline.

Click here for an overview of global kidnap trends with estimates of the numbers of foreigners taken captive every month, compiled largely with information from London-based risk consultancy AKE Ltd.'s quarterly kidnap and ransom report.

To discuss kidnap awareness programmes, contact Janet. ARC, through its partner red24, conducts one-day general awareness workshops, in addition to detailed First Responder workshops.

Personal Security - At Home, On the Street, While Traveling

For expatriates living overseas, the most serious obstacle to personal safety is an attitude of complacency or fatalism. "It can't happen to me" and "if it's going to happen, it's going to happen" is dangerous thinking.

Recent political events throughout the world are changing the threats you face. Today, the most prevalent threat you face overseas is crime.

A criminal attack against you or your family can take place anywhereost, as can a fire or other disaster. However, you can influence what happens to you by assuming more responsibility for your own security.

Protecting people at risk is one of 15 subjects covered on the forthcoming university-accredited Security Management Stage 1 Course, 14-25 March. Click here for details.

In the interim, follow this link to advice to make your life, and that of your family, safer.

How to Create Intelligent Security

Risk is pervasive in the modern World and in many areas is increasing. Security intelligence should drive security operations in order to focus operations on the most urgent issues, generate enhanced effectiveness in the design and delivery of risk mitigation strategies and solutions and deliver cost savings across the function. Security Intelligence = Intelligent Security.

The new Developing Intelligence in a Corporate Security Environment course (click here for details) is intended for security managers or security operators and advisors in a range of industry sectors which face significant threats from adversarial elements. It is designed to deliver understanding and capability enhancement of the advantages to be gained by using high-grade intelligence relating to threats to the people, assets, operations and reputation of a company. Using realistic scenarios drawn from experience gained in the corporate environment, the course will impart understanding of the value and effective employment of a security intelligence capability in the routine execution of business operations and corporate decision making.

The course is built on best practice and a vast amount of experience in both the government and corporate sectors. Experience in this functional area has recently been gained in oil and gas in the African and Middle East environments as well as in other sectors in Europe. However, the course is not specific to any one sector or geographical region. The processes taught can be applied to any data set and any environment, allowing the course to deliver value to the widest possible audience.

The course will deliver knowledge of how best to conceptualise, design, create and operationally manage such a capability. It will also examine the challenges and responsibilities that come with such a capability and offer guidance and solutions that allow business leaders to manage them. This course will offer delegates the opportunity to take advantage of experience gained while delivering an end-to-end solution for one of the World’s largest companies in two of the most hostile operating environments.

The Real Risk of Losing your Laptop

Headline points from Intel:

- According to a new study, more than 300 US businesses and other organizations lost more than 86,000 laptop PCs worth a staggering $2.1 billion.

- The majority of these companies with significant amounts of confidential data on their mobile PCs do not take advantage of even basic security practices.

- Transportation venues, such as airports and train stations are not the riskiest places; seemingly safe locations, such as homes and hotel rooms account for more than 40 percent of laptop disappearances.

- Workers face up to a 10 percent chance of losing their laptops, depending on the industry they work in.

Laptop security is discussed during the Information and IT Security Workshop, one of 15 subjects that make up the forthcoming Security Management Stage 1 Course, 14-25 March 2011. Click here for details.

Protecting against Terrorism

A man from Portsmouth has gone on trial to face seven counts of collecting information that could have been used to prepare or commit acts of terrorism. Take care what you are keeping on your computer!

Protection against Explosive Devices is one of 15 subjects covered on the forthcoming Security Management Stage 1 course, 14-25 March. For details click here.

In the interim, keep up to date with UK government best practice in protecting your business against terrorism by reading the Protecting against Terrorism manual.

Business Crime Prevention Advice

Crime prevention is one of 15 subjects covered during the forthcoming Security Management Stage 1 course, 14-25 March, UK. For details click here.

Good business crime prevention advice can be found at the website of the Thames Valley Police, click here.

BTEC Level 4 Professional Award in Security Coordination or Management

On Friday 25 February, 10 delegates from UK, Georgia, Estonia, Saudi Arabia & Nigeria 'graduated' with their Edexcel BTEC L4 Professional Award in Security Coordination and Management.

This one-week introductory security management programme is ideal for the multi-hatted manager, perhaps an HSSE Manager, or for a security manager who doesn't have the time to attend the more comprehensive university-accredited Security Management Stage 1 Course.

Forthcoming BTEC Level 4 SCM courses:

UK, 5-9 September
Dubai, 5-9 June
South Africa, 6-10 May, 10-14 October
Nigeria, 6-10 May

Forthcoming university accredited (postgraduate level) Security Management Stage 1 courses:

UK, 14-25 March, 8-19 August, 14-25 November
Dubai, 10-21 April
Singapore, 16-27 May
Kenya, 16-27 May
Nigeria, 3-14 October

For content details of the Security Coordination and Management Course, click here.

For content details of the Security Management Stage 1 Course, click here.

Enquiries or to make a booking, email Janet.

Breaking Security News

Follow ARC and breaking security news in real time on Twitter. Download the Twitter app to your mobile phone or log in on your PC. Get your personalised Twitter ID now before somebody else bags your name!!

If you need help in setting up your account, contact David.

PSP Programme about to Begin

14 candidates are provisionally signed up for ARC's 2011 ASIS Physical Security Professional (PSP) Certification Preparation Programme, beginning 1 March. The programme takes the form of 4 monthly distance learning tasks, followed by a one-week intensive classroom programme, 1-5 August.

If you are involved in the selection, specification, procurement, and project management of the installation of physical (electronic) security systems this is an ideal professional development certification, upon successful completion of which you will be entitled to use the post-nominal PSP after your name.

But it is not for the feint hearted. Despite 100% of ARC-trained candidates passing on first attempt in 2010, it is one of ARC’s most difficult and demanding programmes, requiring up to 40 hours of homework during the 4-month distance learning phase.

Contact Janet for more information.