The third edition of The Business Response to Misconduct Allegations is a step-by-step guide for what to do—and what not to do—in performing an investigation into claims of employee policy violations. It has been created for corporate professionals who are often the first to be contacted during a suspected employee-related claim, and who may not have investigative training. This revised edition has been expanded to include background information for audit, facilities and building management, human resources, IT security, and other non-security business functions. Sections of this book address the decision whether to investigate, the naming of investigators, investigation planning, interview techniques and issues, the importance of taking notes and written statements, investigations in union settings, and much more. Also included are a series of checklists and templates to aid the investigative team before, during, and after an investigation. This playbook is an excellent risk management resource for audit professionals, human resources managers, site or facility managers, small business owners, or anyone who may be the first to receive reports of wrongdoing, regulatory violations, or prohibited workforce behavior. The Business Response to Misconduct Allegations is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesn’t include the effects such security breaches have on the reputation of the companies that suffer attacks. PCI Compliance, 3e, helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure.
Workplace violence in all its forms is becoming more prevalent and pervasive every year. Workplace Violence: Planning for Prevention and Response gives a comprehensive account of the problem using a multi-faceted approach to the issues surrounding workplace violence incidents, addressing how the topic affects victims, witnesses, the workforce, family members, and management. A series of chapters helps organizations to form action and response plans to manage incidents both large and small. The focus also includes organizations that are forced to address violent individuals in settings where law enforcement may not be immediately available. Kerr speaks first-hand about complex issues like corporate liability for violent or threatening acts committed by employees, as well as issues of privacy, and he includes chapters written by experts on legal issues, cyberthreats, and anger in the workplace. This book belongs on the desk of every security manager and HR professional, and offers solid advice to all managers regardless of the size of their organization.
This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program. The author’s intent is to provide the reader with a practitioner’s guide (a “how-to” book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.