Wednesday, 30 January 2013

The Canadian Perspective on Workplace Monitoring and Employee Surveillance

As a continuation of our series about employee surveillance, I would like to share with you this interesting pdf downloadable paper from the Canadian Law Firm - McCarthy Tetrault - Titled - "Workplace Monitoring and Employee Surveillance" by Christopher McHardy, Tina Giesbrecht & Peter Brady. 

We get a good overview from a top law firm and a Canadian perspective.  Although may I note that this is paper was authored in Western Canada and therefore regional differences in legislation may exist.
This paper looks at the way in which Canadian privacy legislation is influencing the way courts and arbitrators are balancing the right of employers to know and manage, versus privacy rights employees may have in the workplace.

You can download the McCarthy Document here as a pdf document

Workplace Monitoring and Employee Surveillance Extract / Summary

In the last decade, new technologies in the workplace have changed the way we do work and the way we manage employees. Beyond the production and cost benefits, these technologies have both increased employer risks relating to employee misconduct and improved employer tools to manage and address such misconduct.

The increased risks and improved tools have resulted in increased use of surveillance and monitoring and an increase in the tension between management rights and employee privacy. The introduction of privacy legislation in Canada has further increased this tension.

You can download the McCarthy Document here as a pdf document

A New Era

Since the implementation of the federal Personal Information Protection and Electronic Documents Act (“PIPEDA”)2 in January 2001, issues of privacy and protection of personal information have become a regular concern for human resources managers. PIPEDA now applies to all commercial activity in Canada except in those provinces which have substantially similar legislation and where the federal government has registered an exemption order. Personal information which flows across provincial or national borders will be subject to PIPEDA and PIPEDA will continue to apply, within provinces, to the activities of federal works, undertakings and businesses such as broadcasting, telecommunications, banking and transportation.

You can download the McCarthy Document here as a pdf document

This Article is brought to you by The Renwick Group - www.therenwickgroup.ca - The Renwick Group is a private investigation firm founded in 1997 and is based in Barrie, Ontario. We excel in delivering our core Private Investigation Services in the most efficient, secure, and professional manner.

Tuesday, 29 January 2013

The Basics You Should Know About Employee Surveillance

As employee surveillance is becoming more topical at the moment I thought I should get some help from www.Wikipedia.com  to better understand what it means and some of the current implications being discussed. While this is a general USA centric view only, I will continue my research to identify specific Canadian examples in my future blogs.

So here is an overview ... but please note - as with all aspects of this subject, legislation and prevailing laws are often different in different countries, states and provinces. So the information below may not be valid in your juristication., but may serve as a guideline.


Employee Surveillance
E-mail scanning
E-mail scanning is a process in which incoming and outgoing mail passes through E-mail filtering software to search for content which may violate the policies of the employer. Often E-mails which are flagged by the filtering software will be then reviewed by a human to verify the validity of the E-mail content.

While an employee has the right for privacy, using company property means a company may monitor the way their equipment is used. A wide misconception with electronic emails in a work environment is that privacy rights issued with electronic mail is exactly the same as the private communications of sending and receiving mail with an envelope. As long as the services being used are provided by the employer, it is not an invasion of privacy if they monitor their own systems. For the monitoring of employee electronic mail to be considered an invasion of privacy, it must fall under certain conditions.

The person reading the electronic mail must engage in this activity intentionally with the purpose of intruding on private affairs, and the intrusion must be highly offensive to a reasonable person.

Data entry, phone work, and retail

Monitoring systems can automatically count every keystroke of data-entry and data-processing clerks. Similarly, workers who answer telephone calls all day are monitored in detail. The exact number and duration of each call, and the idle time between calls, can go into an automatic log for analysis.

Video surveillance

One of the most effective forms of employee monitoring is through the use of Video surveillance equipment. Video feeds of employee activities are fed back to a central location where they are either recorded or monitored live by another person. "This is a benefit because it provides an unbiased method of performance evaluation and prevents the interference of a manager's feelings in an employee's review (Mishra and Crampton, 1998)." Management can review the performance of an employee by checking the surveillance and detecting problems before they become too costly.

Location monitoring

For employees that do not work in a static location, supervisors may chose to track their location. Common examples of this are delivery and transportation industries. In some of these cases the employee monitoring is incidental as the location is tracked for other purposes, such as determining the amount of time before a parcel will be delivered, or which taxi is closest.

Employee surveillance may lead to an executive's decision on whether to promote or demote and employee or in some cases even fire them.

Different techniques can be used, e.g. employees' cell phone or Mobile phone tracking.

Employee privacy and ethical issues

Companies need to make sure they remain moral in utilizing techniques for monitoring their employees. From an ethical point of view, the employee does not give up all of his or her privacy while they are in their work environment. Privacy can become a moral matter, but it is important to know what the employee and employer rights are. The ethical challenge that companies face involves protecting their interests through Internet monitoring while ensuring they don't go so far that employees lose all sense of privacy in the workplace. 

When a policy is in place, both the employer and employee will understand what is expected of each other. Without the proper policies and procedures there becomes no set standard and theoretically the employee has nothing to go by. The employee needs to understand what is expected of them while the employer needs to establish that rule.

Legal issues

In Canada, it is illegal to perform invasive monitoring, such as reading an employee's emails, unless it can be shown that it is a necessary precaution and there are no other alternatives.

The following uses of employee information are generally considered legal (Ed - but please check in your own juristiction for accuaracy)
  • Find needed business information when the employee is not available.
  • Protect security of proprietary information and data.
  • Prevent or investigate possible criminal activities by employees.
  • Prevent personal use of employer facilities.
  • Check for violations of company policy against sending offensive or pornographic email.
  • Investigate complaints of harassment.
  • Check for illegal software.
According to Computer Monitoring: The Hidden War Of Control,“The employer of today has the ability and legal right to read e-mail, review files stored on a company computer, examine computer usage, and track individual employee computer activities. The idea of anonymous actions is an illusion. Every action between a network and the computers connected to it can be tracked. Every action by an individual worker on a computer can be tracked, analyzed and used against the employee.

Security

In some cases, monitoring an employee's work leads to monitoring the employee's life in aspects that are not related to work. This leads to acquisition of information about the employee, compromising the security of the employee.

--------------------------------------------------------------------------------------------------------------------------

The Renwick Group is a private investigation firm founded in 1997 and is based in Barrie, Ontario. We excel in delivering our core Private Investigation Services in the most efficient, secure, and professional manner.www.therenwickgroup.ca

Wednesday, 23 January 2013

Did you know there is a PI Museum?

Yes that's right. a museum just for Private Investigators!

The P.I. Museum is located in San Diego, California and is the world’s only museum dedicated to finding, acquiring, preserving and displaying historic treasures from P.I. History.

Its owner and propriator, Private Investigator Ben Harroll has, for over 34 years, collected a vast number of P.I. historic treasures and artifacts.
Allan Pinkerton, an early American Private Investigator, with Abraham Lincoln and General
John Alexander McClernand, Commander of the
Army of The Mississippi during the Civil War.


The museum has a very serious research and documentation purpose and goal, yet retains a youthful sense of adventure and wonderment about this endlessly fascinating profession.

The museum balances its collecting efforts between the real and the fictional.

You are as likely to find an actual letter penned in 1852 by the hand of Eugene Francois Vidocq or a spy camera, as you are to find your favorite Dick Tracy collectible.

Ben began a lifelong endeavor towards collecting items of historical significance and authenticity from three eras - the 1890's the 1940's and contemporary.

The museum is located at:
923 Island Ave.
San Diego, California 92101.

You may also take a tour of the museum at http://pimuseum.org

Memberships are available for as little as $25, and of course Ben is always looking for unique items to add to the display.

You can also see some videos about the museum on our YouTube channel at www.youtube.com/user/TheRenwickGroup

The Renwick Group - Corporate Private Investigators - www.therenwickgroup.ca

Monday, 14 January 2013

OPP Fraud Prevention Resources

The Ontario Provincial Police (OPP) have recently updated their Website with some quality resources. These are all related to Fraud Prevention resources and are well worth checking out.

 
 
Further information:

•Canadian Anti-Fraud Centre - http://www.antifraudcentre-centreantifraude.ca/
•Scam Protection - Student's Guide
•Competition Bureau of Canada -  http://competitionbureau.gc.ca/eic/site/cb-bc.nsf/eng/home
•Association of Certified Forensic Investigators of Canada -  http://www.acfi.ca/
•International Association of Financial Crimes Investigators
•Crimes of Persuasion -  http://www.crimes-of-persuasion.com/Crimes/Business/nigerian.htm
•Reporting Economic Crime Online -  http://www.recol.ca/
•Financial Consumer Agency of Canada - http://www.fcac.gc.ca/
•Industry Canada - http://www.strategis.gc.ca/ic_wp-pa.htm

Source: http://www.opp.ca/ecms/index.php?id=133

Published By The Renwick Group

Saturday, 12 January 2013

Video Surveillance: The Privacy Implications and PIPEDA

In our blog today I want to draw to everyone's attention the privacy implications of video surveillance.
 

Understandably, the general public is becoming increasingly concerned about the use of video surveillance for the collection of personal information.
 
The Renwick Group is very familiar that privacy and surveillance has a high potential for infringing upon an individual’s right to privacy.
 
Therefore we follow all the government regulations and guidelines and keep well within the law and industry standards. 
 
We weigh all the factors of every surveillance carefully to determine whether its use is appropriate.
 
The Information and Privacy Commissioner/Ontario (IPC) is a complaints body and regulator who can make sure the collection, retention, use, and disclosure of the video-recorded information was in accordance with the Freedom of Information and Protection of Privacy Act and the Municipal Freedom of Information and Protection of Privacy Act (the Acts).
 
The Personal Information Protection and Electronic Documents Act (PIPEDA), is intended to outline the privacy obligations and responsibilities of private sector organizations contemplating and engaging in covert video surveillance and again we watch all the regulations very carefully and this has become the basis of a Best Practices approach to surveillance of all types.
 
According to the The Office of the Privacy Commissioner of Canada, "PIPEDA governs the collection, use and disclosure of personal information in the course of a commercial activity and in the employment context of federally regulated employers. The capturing of images of identifiable individuals through covert video surveillance is considered to be a collection of personal information. Organizations that are contemplating the use of covert video surveillance should be aware of the criteria they must satisfy in order to collect, use and disclose video surveillance images in compliance with PIPEDA. These criteria are outlined below and address the purpose of the covert video surveillance, consent issues, and the limits placed on collecting personal information through covert video surveillance."
 

Video Surveillance - Best practices for using private investigation firms


Many organizations hire private investigation firms to conduct covert video surveillance on their behalf. It is the responsibility of both the hiring organization and the private investigation firm to ensure that all collection, use and disclosure of personal information is done in accordance with privacy legislation. We strongly encourage the parties to enter into a service agreement that incorporates the following:
  • confirmation that the private investigation firm constitutes an “investigative body” as described in PIPEDA “Regulations Specifying Investigative Bodies”;
  • an acknowledgement by the hiring organization that it has authority under PIPEDA to collect from and disclose to the private investigation firm the personal information of the individual under investigation;
  • a clear description of the purpose of the surveillance and the type of personal information the hiring organization is requesting;
  • the requirement that the collection of personal information be limited to the purpose of the surveillance;
  • the requirement that the collection of third party information be avoided unless the collection of information about the third party is relevant to the purpose for collecting information about the subject;
  • a statement that any unnecessary personal information of third parties collected during the surveillance should not be used or disclosed and that it should be deleted or depersonalized as soon as is practicable;
  • confirmation by the private investigation firm that it will collect personal information in a manner consistent with all applicable legislation, including PIPEDA;
  • confirmation that the private investigation firm provides adequate training to its investigators on the obligation to protect individuals’ privacy rights and the appropriate use of the technical equipment used in surveillance;
  • the requirement that the personal information collected through surveillance is appropriately safeguarded by both the hiring organization and the private investigation firm;
  • the requirement that all instructions from the hiring company be documented;
  • a provision prohibiting the use of a subcontractor unless previously agreed to in writing, and unless the subcontractor agrees to all service agreement requirements;
  • a designated retention period and secure destruction instructions for the personal information;
  • a provision allowing the hiring company to conduct an audit.
Source: http://www.priv.gc.ca/information/pub/gd_cvs_20090527_e.asp

This article was written by The Renwick Group with information drawn from http://www.priv.gc.ca/information/pub/gd_cvs_20090527_e.asp

 
 
 
 
 




 

Tuesday, 8 January 2013

What Is Surveillance?

Here at The Renwick Group surveillance is an important part of our daily business for our corporate clients.  It is one of the most versatile and important skills any investigator can possess. And we are often asked - What is Surveillance?

Well, quite simply, surveillance is conducting observations to gain information.

This simple definition includes a plethora of techniques and methods that can be considered a form of surveillance.
Many of these are recognizable through common knowledge produced by popular culture. The most well known methods include stationary surveillance, technical surveillance (typically covert video or audio recordings), electronic surveillance (digital observations, keystroke counting), and many more.

Communications skills involving interviewing and report writing are usually thought of as the most critical investigative competencies. The primary skill used in surveillance is the power of observation, which always precedes reporting.

Surveillance, being such an important part of investigation, is a topic that should not be taken lightly. It is important for investigators to understand when surveillance should be used, the objectives of surveillance, stress related to surveillance, and ethical/legal concerns about surveillance.

Depending of the type of investigation, there are many reasons why surveillance can be beneficial.

The objectives of surveillance will vary from case to case, but are most often one or more of following:
  • Locate a subject, contraband, or the site of illegal activities.
  • Obtain intelligence about a subject, criminal group or location.
  • Prevent a crime from occurring through covert or overt surveillance.
  • Gather intelligence for a raid.
  • Provide protection for informants, undercover individuals or others.

Additionally, many cases end with no observations made. The credible report of no observations may be useful in re-evaluating the method of investigation, the feasibility of surveillance at a particular day or time of day. A lack of observations can also reinforce the positive information indicating that a situation is innocent, legitimate, non-criminal, or beneficial to the client or corporate interest.

The Goal of Surveillance

The observation and reporting mission of private security applies to surveillance. Most surveillance operatives are private investigators, security officers (including retail security and patrol officers), and corporate investigators. While the surveillance role of a police investigator is one of many duties, the specialty of surveillance is more prevalent in private security.

Operational budgets mirror this statistic, which is relevant to the importance of security officers and particularly the proactive side of asset protection.

The role of the surveillance investigator is to collect information for the furtherance of an investigation.

Private security is more function specific, being the protection of an organization through proactive and preventive services. The function of a private investigator is more specific and more reliant on the specific tasks of observation and surveillance.

If you are interested in surveillance for your business - contact us at The Renwick Group - www.therenwickgroup.ca

Monday, 7 January 2013

Corporate Mobile Device Security

The Renwick Group Mobile Security

The Renwick Group recommends 10 ways to secure your mobile devices.

In your mobile device you also carry a significant collection of important personal information, including your credit card number and there is a real threat of someone trying to steal it from you.

So be careful of Malware - it can be harmful to mobile devices and the information contained by a smart phone or tablet can easily get into the wrong hands.

Here are 10 ways we recommend to protect your mobile device.

1. Update the mobile device's operating system regularly. Updates are usually provided automatically.

2.  Install new programs only from reliable sources - like the app stores such as iTunes, Google Play or Nokia Store.  A game for one dollar may be available for free elsewhere, but it is also quite likely to contain Malware.

3. Be careful with "in-app" purchases - kids may add superpowers to their game characters without understanding that each addition or upgrade may cost money. In many mobile devices, these in-app purchases can be disabled.

4. Be aware of the rights you have granted to different applications. Go through the user rights and privacy policies you have accepted. For example, the right to location information and network connection may enable an application to track location remotely.

5.  Change the default access code and the PIN code of the SIM card. Do not use your birth year or other number combinations that would be too easy to guess. I know it's a pain but the safest way is to set your device to request a password every time you use it.

6. If your mobile device supports data encryption, enable it.

7. Use an online service that can remotely locate a lost or stolen device and, if needed, perform a remote wipe to erase all data.

8. If your mobile device gets stolen, inform your operator immediately so that the use of your SIM card can be disabled and your account can be transferred to a new SIM card.

9. When your old device is dead or you have a new device, erase all personal information by returning the device back to factory settings. Also, remove all information from old SIM cards and memory cards.

and lastly,

10. Make regular backups of all data. You can use cloud services for this purpose, but do not send your employer's information to these without permission.

Also when you are using mobile devices provided by your employer, you should always follow the related security instructions. You should not save work-related information to your own devices unless otherwise pre agreed.

The Renwick Group - www.therenwickgroup.ca

Sunday, 6 January 2013

Reference Checking in Canada - Reference checking is distinct from employment verification

Here is a great article about checking employment references from Monster.ca. This is good advise for any hiring manager and has some tips that we can all use. The Renwick Group - www.therenwickgroup.ca

------------------------------------------


Reference checking is distinct from employment verification

Article Source: http://hiring.monster.ca/hr/hr-best-practices/recruiting-hiring-advice/screening-job-candidates/reference-checking-in-canada.aspx
By Howard Levitt and Michael Mulroy
Lang Michener, Toronto Office
Monster Employment Legal Advisors

A good hire is the surest way to eliminate from your workforce problem employees, who consume their manager’s time with performance issues, waste recruitment, hiring and training dollars and generate severance costs, when they are dismissed. A good hire is the end result of an effective hiring process which identifies high quality job candidates well suited to the available position, thus eliminating the problem employee by never inviting the employee to step through your front door.

A crucial step in achieving a good hire is checking references. Conducting a reference check is not a risky business. It is a sound business practice, which surprisingly is not always done. Every hire should have a reference check.

There is no legal impediment to asking prospective candidates to provide the names of referees and permission to contact them. Reference checking is distinct from employment verification.

Verification is confirming the accuracy of information that has been provided by the applicant, either in an application form, resume or verbally, about such factual matters as service dates, job title and salary. Reference checks gather qualitative information about the applicant’s performance, skills, weaknesses and similar matters. How the applicant performed with a former employer is an indicator of how the candidate is likely to perform in the future for you.

You may elicit from referees pertinent information about the job candidate’s suitability for the position. The law of human rights requires hiring practices to be free of discrimination. An employer cannot consider factors which are protected by human rights legislation such as age, race, sex, family status and disability, among others, when making a hiring decision. Do not solicit information about any prohibited ground of discrimination identified by the applicable human rights statute in checking references. If you would not ask an applicant the question in your own job application and interview process, then do not ask it in the course of checking a reference. With that caution, you may obtain from referees information to assess the candidate’s qualifications to perform the position you are filling.

Your job candidate may present written references to support an application. Reference letters are helpful, but limited. Often, a reference letter is more useful for what is not mentioned, than what is. A written reference should be augmented by a conversation with the author. Details can be gleaned in a phone conversation, which otherwise would not appear in print. You will hopefully be speaking to a person who can provide a snapshot of the job candidate’s contribution to a prior workplace. You can assess possible fit and the likelihood of a mutually rewarding relationship.

Who signs the written reference speaks volume. Is it a former supervisor or a human resources manager? If the former supervisor, you can likely obtain good relevant feedback. If a human resources manager is the author, the letter may be a product of the settlement of a wrongful dismissal action initiated by the employee. Red flags are raised. These concerns will be confirmed if your questions are responded to with limited information, thus confirming an agreement has been made in which the former employer has agreed not to comment outside the written reference.

A skillfully executed reference check elicits an honestly held, forthcoming opinion by the referee of the former employee’s qualities and limitations.

A reference is considered a communication protected by qualified privilege and the person giving the reference cannot be sued for slander or defamation, provided the comments are the referee’s honestly held opinion. The information obtain in the reference check should only be used for the purpose of evaluating the candidate’s suitability. The information could lose any protection, if communicated to third parties for purposes unrelated to a hiring decision.

Prospective employers may face obstacles in checking references, such as policies against providing references, difficulty reaching referees and resultant delays in hiring decisions. However, the effort is well worth it, as hiring mistakes will be minimized.

Article Source: http://hiring.monster.ca/hr/hr-best-practices/recruiting-hiring-advice/screening-job-candidates/reference-checking-in-canada.aspx


If you need any reference checking information or assistance - call us www.therenwickgroup.ca

Saturday, 5 January 2013

It is a good time to be a corporate investigator



The Renwick Group - Corporate Investigation Services

 
Here is an excellent article from the January 2013 edition of The Economist magazine - it's about the state of the union of the American corporate investigation industry - take note of the comment that the 'due diligence side of resume background checks is a growing business.  It's a good read, so grab a cup of coffee and enjoy! The Renwick Group - www.therenwickgroup.ca
 
 
SHERLOCK HOLMES once remarked that: “It is my business to know what other people don’t know.” These days, detective work is a huge business. Thanks to globalisation, there is a lot that companies would like to know but don’t, such as: is our prospective partner in Jakarta a crook?

Corporate detectives sniff out the facts, analyse them, share them with clients and pocket fat fees. Yet, oddly for a multi-billion-dollar industry devoted to discovering the truth, little is known about private investigators. So your correspondent took up his magnifying glass and set off in pursuit of the bloodhounds of capitalism.

The best-known is Kroll, founded by Jules Kroll, a former assistant district attorney, in 1972. Along with a dozen or so rivals, it can undertake assignments anywhere in the world, at short notice, deploying teams of former cops and prosecutors, computer whizzes, accountants, investigative journalists and others. These firms are the big dogs of private detection. The industry has, ahem, a long tail of thousands of smaller ones. The precise number is unknown since the business is unregulated in some countries.

There is plenty of work to go round. Assignments linked to mergers and acquisitions have dwindled along with the number of deals, but other areas are expanding. One big source of work is the growing complexity of business regulation. Multinationals can never be sure that some employee, somewhere has not violated America’s Foreign Corrupt Practices Act, or some other anti-bribery law. Corporate compliance departments often bring gumshoes in to assist their own investigations.

An increase in whistleblowing has created more work. So has the push by Western firms into emerging markets (see Schumpeter). “It’s a business we win in America but serve in Asia, driven by the export of Western ethics,” says Tom Hartley, head of Kroll Advisory Solutions. “We’ve seen double-digit growth in each of the past four years.”

Another growth business is “due diligence” work, such as running background checks on a client’s potential hires or business partners. Last year Mintz Group, a medium-sized firm based in New York, conducted more than 20,000 checks, up 40% on 2010. “We tell clients to invest globally but investigate locally,” says Jim Mintz, the firm’s boss. Some clients ask for checks on everyone they deal with, even chauffeurs. Sleuths are also hired to probe the provenance of money. Amid a global crackdown on tax evasion, companies have grown warier of doing deals with dodgers.

Even downturns are not all bad for corporate gumshoes. Hard times often expose wrongdoing by causing scams to collapse. Industry figures report a rise in fraud litigation, asset-tracing and insolvency work. Headline-worthy mega-frauds, such as those perpetrated by Bernie Madoff and Allen Stanford, remind potential clients of the need for security.

Big jobs can occur anywhere. Kroll recently conducted a forensic audit of the failed Kabul Bank, from which nearly $1 billion was allegedly embezzled, for Afghanistan’s central bank. The client base is growing, too. Hedge funds and private-equity firms crave intelligence. In China, where accounts are unreliable, they vet acquisition targets by hiring sleuths to interview ex-employees. Post-Madoff, pension funds are doing more homework on their investments, often with outside help, says Ken Springer of Corporate Resolutions, an investigations and consulting firm.

You know my methods. Apply them

A curious development is the growth of what might be called “self due diligence”. Entrepreneurs from parts of the world where corruption is rife, such as eastern Europe and Africa, are increasingly hiring reputable corporate-intelligence firms to investigate them—sometimes with full access to their business records. If the investigator gives them a clean bill of health, they can wave it at banks, regulators or potential business partners who might doubt them. The head of one investigations firm says such work accounts for up to a third of its London office’s revenues.

Investigators have capitalised on the recent surge in cyberattacks and cyberspying. Some report an annual doubling of revenue in digital forensics. The least exciting digital work is possibly the most lucrative: electronic “discovery”, or the recovery and processing of e-documents to support litigation. Parties to big cases have to pass vast amounts of data to each other, especially in America. To cut costs, companies may hire a firm with smart technology to whittle down the e-material before the lawyers start expensively perusing it. This is done using programs that filter out e-mails and other documents that are irrelevant or privileged—though this “robotic” work needs to be supplemented with human judgment, says Vincent D’Eramo of Capstone Advisory.

Data! Data! Data!

In 2012 Kroll announced plans to double the size of its R&D team in e-discovery and data recovery over the next five years. Mr Hartley says the headcount in his division, the firm’s investigative core, grew by 15% in 2011. The number of Certified Fraud Examiners (CFEs) in the world has grown by 72% since 2007, to 37,400. (One of them, Harry Markopolos, gave the profession street credibility by spotting the Madoff fraud long before regulators.)

Kathy Lavinder, a headhunter, reckons the war for talent has driven up salaries for sleuths and security consultants by 20-25% since 2010. Members of “incident response” teams, who are expected to hop on a plane at a moment’s notice and are thus prone to burnout, have begun to ask for and receive guarantees of occasional time away from the daily grind for training courses, says Ms Lavinder.

The choice of employer has expanded as new firms enter the business, disrupting the established order. Physical-security companies, such as Securitas, Allied Barton and Andrews International, are trying to move further into investigations as a way to boost margins, which are thin in the guard business. The big accounting firms, led by Deloitte, are hiring more cybersleuths—though much of their work is internal: ie, scrutinising clients of other parts of the group. Some investigative firms, including Kroll, have counter-attacked by pushing into accountancy.

Law firms have long been big clients of the gumshoes, but they too are looking to do more investigations in-house. To this end, some are striking deals with investigative companies: in August, for instance, Pepper Hamilton, an American law firm, acquired a highly regarded boutique led by Louis Freeh, a former FBI director.

Most corporate investigators are privately held and publish little financial information. Kroll, probably the biggest, has had ups and downs. Its zenith was its sale in 2004 to Marsh & McLennan, an insurance broker, for a tidy $1.9 billion. By 2010, when Kroll was sold on to Altegrity, a security group, its valuation had tumbled by 40%. One slip-up between those two deals was to take on Allen Stanford as a client.

The firm is still admired by its rivals, whose upper ranks are stuffed with former Kroll people. But these days many consider the best in the business to be FTI Consulting, which also happens to be the only publicly traded firm of any size. Its forensic and litigation consulting division had revenues of $177m and a profit margin of 17% in the first six months of 2012.




After dozens of small acquisitions, FTI now employs 3,800 people. Its boss, Jack Dunn, has poached some of Kroll’s best snoops. FTI won much of the work of piecing together Mr Madoff’s money trail; ten years ago the Madoff trustee would probably have given the lion’s share to Kroll. FTI also gets a lot of work as a “corporate monitor”, checking whether firms that have promised to mend their ways as part of a legal settlement keep their word. The industry loves these assignments: they typically last a couple of years, providing a recurring revenue stream.

Another threat to the old order comes from K2 Intelligence, backed by Mr Kroll and run by his son, Jeremy. This was set up in 2009, when a non-compete clause with his old firm expired. These days Mr Kroll senior, now 71, is more focused on Kroll Bond Ratings, an attempt to disrupt the credit-ratings oligopoly.

K2 has started to make a mark, conducting the investigation into alleged bribery that forced Alcoa, an American aluminium firm, into a $447m settlement with Alba, a Bahraini one. Convinced that the future belongs to those with the technological savvy to “tell the story” by interpreting vast quantities of data, Jeremy Kroll has joined forces with Palantir, a security-software firm with past links to PayPal. Palantir and K2 have been crunching through 18 terabytes of transactions, e-mails and phone records in the hope of connecting dots to support the Madoff trustee’s litigation against investors who took more out of the Ponzi scheme than they put in. One program draws visual webs that show the length, destination and other features of phone calls made by Mr Madoff and his staff, and then looks for patterns.

A fast-growing business where technology will be crucial is fighting money-laundering. Banks are under pressure to weed out suspicious transactions, but they are drowning in data. They are willing to throw a lot of money at the problem because the damage if they mess up can be enormous. Witness the $1.9 billion in fines that HSBC recently paid to settle allegations that it had abetted money-laundering by clients in Mexico and elsewhere.

Mr Springer of Corporate Resolutions describes several recent assignments that turned into a game of technological one-upmanship with suspected wrongdoers. In one, his team eventually got the better of an IT employee at a non-profit who was suspected of fraud, by sneaking a black box into his office at night, using former National Security Agency experts to crack the administrator code and then blind-copying themselves into his e-mails. In many cases, the key is to combine digital expertise with traditional investigative techniques, argues Mr Mintz. Part of the job will continue to be “tracking down the disgruntled former secretary or book-keeper who knows where the bodies are buried, and knowing how to coax information from them,” he says.

The dog that barked at the right time

Jeffrey Katz, a former Kroll man who heads London-based Bishop International, which began life investigating claims in the Lloyds insurance market, sees new opportunities popping up all the time. His firm has been carving niches in intellectual property, from anti-counterfeiting (such as gathering evidence on how a particular faker operates) to buying trademarks on behalf of big companies before they launch a new brand. This must be done quietly, so as not to arouse suspicion and drive up prices. Bishop did a good job for Apple with names similar to “iPad”.

But the industry faces challenges, too. Large clients are looking to build their own investigative capabilities, especially in cyber-security, says Michael DuBose of Kroll, who used to run the US Department of Justice’s computer-crime division. This could cut demand for outside help. Barriers to entry in digital forensics have fallen. Competition is intense. Some big assignments are decided in beauty contests with 15 or more participants.

And even as the industry profits by helping clients cope with red tape, it can expect tougher rules itself. Private investigators in Britain face possible regulation in the wake of the News Corporation phone-hacking scandal. In America, the SEC and Congress may tighten rules on investigators and “knowledge brokers” that work for hedge funds, some of them suspected of abetting insider trading. Corporate detective work is anything but elementary.

 
If you are interested in corporate surveillance - please contact us at The Renwick Group - www.therenwickgroup.ca

Friday, 4 January 2013

Winter Workers Comp Surveillance Tips


I like this article - It's from the Workers Compensation organization in the USA, www.workerscompensation.com - it's a bit tongue in cheek in places, and it applies to us here in Canada. Enjoy!

Winter Workers Comp Surveillance Tips

Now that winter has arrived with a bang, it is always a ripe time for surveillance on those questionable claims.  The hustle and bustle of the Holiday season is over, and people settle in to their normal winter routines, waiting out the cold weather for the arrival of spring.
For those problematic claims out there, this time of year is always a busy one for surveillance companies.  Adjusters cannot wait to try and get some film of their injured claimant potentially violating their medical restrictions by shoveling out their driveways or partaking in a winter recreational sport.
Here are some tips to keep in mind for a successful hunt of trying to get that elusive film that can direct a claim from compensable to suspended:

Strike Not Only After the Big Storm, but During It

If you are like me and do not own a snowblower, the best way to make shoveling your driveway easier is to do it a few times while the storm is going on.  This makes it a bit easier to heave all the snow off of your driveway.  True, the snow you are pushing may not weigh 500lb, but that is the point. Anyone with a lingering back injury is going to have a hard time pushing a shovel, and I think any doctor will lighten the medical restrictions if they see their patient spending a lot of time outdoors with a shovel.
When caught, most claimants will try to say they were only pushing the snow, and not lifting the shovel.  However, any activity is showing that they are active, and it can be a way to get that person back to light duty work if they are currently on a no-work status.

Use Snow Blowing to Your Advantage

If your claimant does indeed have a snowblower, this can mean that they are not actually lifting anything.  But they are on their feet, for long periods of time, pushing and pulling the blower around and being active in general.  This may not mean that they are 100%, but they are certainly capable of doing light duty or sedentary work. 
Even if they claim that the snow blower is self-propelled, the claimant is still walking behind it, bending down, and doing this for a period of time. I would find it hard to believe that any doctor would keep this person from doing sedentary work if confronted with the video evidence. Use your tape to get them back to work, and doing something beneficial for your workplace.

Watch For Potential Aggravation of Injury

Snow and ice are slick, and people slip and slide while shoveling and snow blowing.  They are also bent over while using the snowblower which could lead to an aggravation of your current back injury claim.  I am not injured, but I am sore after shoveling.  If I were to already have had a lingering back injury, this is only going to make it worse. 
The same could be said if you are watching the video and your claimant slips and tweaks their back, or even worse they fall hard, probably making their current injury worse.  The best way to handle this is to wait to show the doctor the tape until after their next appointment.  In the medical notes, the claimant may show worsening signs of injury, and they probably will not tell the doctor that their symptoms worsened due to falling on their rear end while shoveling. 
At this time you have good evidence to show that their injury wasmade worse by slipping and/or falling down.  Make sure you have the doctor be objective.  By showing the doctor the film, you have concrete evidence when paired with the worsened medical report that their injury is now exacerbated by their outside activity. This should allow you to be able to be aggressive in trying to end your comp claim and move it to a personal medical condition.

Know if they Have any Outdoor Hobbies
Since you know these people for a period of months or years, you may already know that they love to ice fish, or to snowmobile.  Snowmobiling is very arduous, since riding on the machine can lead to jarring of the back, resulting in a worsening of the injury.  Even if they do not claim to be medically worsened, if you can show them active on a snowmobile, then it would seem that they are healthy enough to return to work. The best evidence you could get is if the snowmobile gets stuck and they have to get off and lift the back of the machine to get it working again.  These machines weigh hundreds of pounds, and if you can do that, you should be good enough to be returning to work.
Ice fishing is not as arduous, in fact it is pretty lazy, but it can still show a person hauling their gear out to their fishing shack and sitting for long periods of time.  You want to show the doctor that this person is more active than they are leading on.  Once you can show that, you have some great evidence to show that this person is healthy and ready for a return to work in some capacity.

If You Strike Out, Keep Trying

Getting some great surveillance film is luck of the draw.  Sometimes there will be times that you send your vendor out and they return with nothing.  That is OK, you won’t strike gold every time.  But be persistent. Watch the weather reports, be aware of local fishing and skiing competitions, and send your vendor out again.  If indeed you cannot gather any evidence then that is not necessarily a bad thing. This means your claimant is avoiding any activity that will make their pain worse or aggravate their injury.  My friend calls surveillance “the art of verification.”

Summary
There are a lot of people out there that love the snow and the winter weather.  I know people that have fishing shacks that are like a mini house, complete with TV and propane heaters.  Some people snowmobile for miles in the bitter cold, and they actually enjoy doing it.  This doesn’t mean that everyone out there is up to something bad, but it is a possibility.  So take my pal’s advice, and verify that your claimant is doing exactly what they are supposed to be doing–which is laying low, resting, and giving their injury time to heal before returning to work. 
The Renwick Group can meet all your WCB surveillance needs - please contact us at www.therenwickgroup.ca

Thursday, 3 January 2013

TIPS FOR MANAGERS ABOUT HANDLING STRIKES & LABOR DISPUTES



A few important tips about Labour Dispute Management for you to consider from The Renwick Group.  When your unionized company is the target of a strike or other form of labor dispute, your actions should be guided by two primary business objectives:
  • To negotiate a fair and workable agreement, that also protects managerial prerogatives to control your workforce
  • To minimize immediate and longer-range economic damage
By staying focused on these objectives, your management and security team will be less vulnerable to the legal, political and public relations tactics that have become potent weapons used by labor unions and protesting workers.
A time when friends turn against you:
Supervisors who’ve never gone through a major labor dispute can be caught off guard when formerly friendly subordinates turn belligerent.

Training should ingrain two points:

1. No matter what happens, don’t let your emotions get the best of you
2. Don’t do anything to jeopardize future working relationships.
The days when strikes involved angry mobs of hostile workers battling armed guards are rare in the present, thanks to labor law reform and social conditions, although they still have powerful political connections.

But labor disputes still create tensions – on both sides – so management must be prepared to deal with volatile outbreaks.

There are two kinds of picketing:
Orderly and peaceful informational picketing is intended to make the public aware of union grievances. It usually involves a relatively small number of reasonably well-behaved pickets.
Mass picketing has a very different purpose: to use sheer numbers to intimidate and otherwise discourage workers, truck drivers, customers and the general public from crossing the picket line.

Such picketing may be legal, if orderly, peaceful and it does not block ingress and egress to the facility, but large crowds and strong emotions frequently lead to threats and violence, and thereby become illegal.

For the best protection against work disruptions, management must:
  • Create and maintain detailed contingency plans
  • Establish a detailed labour dispute management plan
  • Establish effective means of internal and public communication involving all affected parties, and
  • Prepare for the proper documentation of strikers, union officials and others when they improperly interfere with company operations or engage in intimidation or outright attacks against people or property.
We recommend management plan ahead not only for strikes but also to other potentially damaging situations, such as,
  • Plant closings
  • Workforce downsizing
  • Union representation drives or boycotting of non-union operations
  • Acts of coercion, violence and destruction by disturbed individuals
  • Floods, fires and other events that jeopardize plant operations
  • Generalized riots that may effect company facilities
  • Terrorist threats and attacks
If you would like more information about Labour Dispute Management - Please contact us at The Renwick Group - www.therenwickgroup.ca

Wednesday, 2 January 2013

2013 Personal Security Tips Against Identity Theft



Last year was a big year for identity theft.
 
From data breaches to new technology, identity thieves were quite active and show no signs of slowing down in 2013.
 
So why not make your new year’s resolution about protecting yourself from identity theft?
 
Here are some great examples of resolutions you can make to make sure your 2013 isn’t marred by a nasty case of identity theft.
 
Clear out your wallet: Many people carry items in their purse or wallet that leave them vulnerable to identity theft. Take the time to remove your important ID cards that you dont need to have with you all the time, your cheque book, passport, extra credit cards, and anything else with personal identifying information.
 
If you want to take this one step further, make an inventory of what is still left in your wallet so that if it is stolen you will easily be able to protect yourself from identity theft.
 
Give your computer a fresh start: There are all kinds of nasty viruses out there which identity thieves use to commit their crimes. The best line of defense against these crooks is to be sure that you have an up-to-date antivirus installed on your computer.
 
Make sure all of the recommended patches are also updated and that your wireless network has a good strong password.
 
Change your passwords: One of the best lines of defense against having an account takeover is a strong password. Take this fresh opportunity to change your old passwords and create stronger ones. Do not use words that can be found in the dictionary.
 
Hackers can run a program that goes through the entire dictionary very quickly and crack any password which can be found in the dictionary. Use numbers, upper and lower case letters, punctuation in your passwords. Don’t forget that the longer the password, the harder it is to crack.
 
Create different passwords on each of your accounts.
 
If you have trouble remembering all of these passwords you can look into using a password manager.
 
Monitor your credit reports: Should you become a victim of identity theft, one of the best ways to find out is by monitoring your credit reports. There are different credit reporting agencies and consumers can receive one report from each, every year.
 
If you stagger your free accounts and pull one every four months, you can monitor your credit for free.
 
Shred Everything: Invoices, receipts, bills, bank statements, account updates, utility bills, anything with your personal account infomation.
 
If you don't need them, don't through it in the garbage - invest in a quality shredder from Staples or Grand and Toy, and dispose of your shredded paper carefully.
 
So this year, give it a try and protect yourself from identity theft and have a wonderful new year.
 
From The Renwick Group - www.therenwickgroup.ca

Tuesday, 1 January 2013

Corporate Security is an Important Part of Many Businesses



Corporate security deserves serious consideration, because companies can't afford to ignore the importance of both physical and data security.

That means taking steps to keep the confidential data on the company network, and to ensure the safety of the building.

We recommend companies can enhance the safety of their operations and protect their businesses by taking both physical and virtual security into account. Here are some of the basics to consider:

Internal Threats

While concern about physical break-ins and computer hackers is justified, it is as important for business owners and company management to address the threats that can come from inside the office walls.

From disgruntled employees to workers who are merely careless, companies face many internal threats.

Management teams should give workers access only to the files they need, and network administrators can greatly reduce the chance that valuable data will be lost, through either deliberate action or simple carelessness.

Physical Security

Physical security goes beyond simply locking the doors when the last employee leaves for the night. Every business should implement a systematic security strategy that includes employee training.

Everyone who works at the company needs to be aware of the importance of building security, and workers should be trained not to allow anyone they do not know on to the premises.

Company managers should implement a system that requires all visitors to sign in and be escorted while they are on the premises.

Badge System

A badge system can help keep the building safe and secure and provide other benefits as well.

A badge system helps ensure that no unauthorized users can enter the building, protecting the office when no workers are present. Badge codes can be updated instantly to prevent former employees from entering the building.

Badge systems also can be integrated into a timekeeping system, making it easy for company managers to keep track of employees' working hours.

If you need any Corporate Security Advice - Please contact The Renwick Group at www.therenwickgroup.ca