Thursday, 17 December 2015

5 New Year’s Resolutions for Better Online Security


With the new year approaching, you are probably thinking of making some new year’s resolutions for yourself. Eat better, be more generous, spend more time with family etc… The new year is the perfect time to get a fresh start on everything from your health to your finances. At renwick, we love New Year’s resolutions and so we’ve thought of 5 good ones you should use to keep yourself protected online in 2016.


  1. new Year Resolution Safety Online Fraud Scam Security Private Investigator BarrieUse stronger passwords. As tempting as it is to use your birthday, name, or “password123” so it’s easy to remember, it is important to use strong and secure passwords. Use a unique password for each application, unrelated to your personal information. You should make it a combo of numbers, capital and lowercase letters, and symbols. You can also use a password manager if you have a hard time remembering all of these passwords!
  2. Don’t overshare. Social media is a powerful thing. With millions of people using social media every day, and 65% of the adult american population using at least one type of social media, it’s no wonder it’s a popular setting for scam artists. If you want to share a photo of your sandwich go for it! But when it comes to personally identifying information such as banking institutions, birthdays, addresses, and when you’ll be on vacation: less is more.
  3. Keep your devices secure. This means a few things. Have a lock on your mobile devices like tablets and cell phones. It is also a good idea to install a security software on your computers. Also be wary of “shoulder surfing”, which is when someone stands behind you to look at your screen for passwords or other confidential information.
  4. Keep a closer eye on your finances. The sooner your report any discrepancies in your bank account, the better. Use online banking and check back often through your transaction history and ask about any purchases or withdrawals you don’t remember making. If you wait until your statement comes in, you might be too late.
  5. Shop smarter. When shopping online, only buy from stores you are familiar with. If a deal seems too good to be true, it probably is! Don’t give away more information than needed to make a purchase.. and follow our online shopping guide:

We hope you find these resolutions useful in the New Year! Happy Holidays!

The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information

Friday, 6 November 2015

5 Tips to Safely Shop Online

Tips to staying safe while shopping online


As the holiday season approaches, you might be itching to start ( or have already started!) your gift shopping. There are many benefits to shopping online; it saves you time, money, and footwork when looking for deals. It’s very appealing to do all of your shopping from the comfort of your home and having the goods delivered right to your doorstep. The downside is that there is a risk with sharing your personal information online. Follow these 5 steps when online shopping this season to stay safe and protect yourself and your finances.
Online Shopping Safety Security




Use trusted sellers
Trust your gut when it comes to selecting where to purchase from online. Amazon, Best Buy, Walmart, Indigo etc are all very well known brands who will offer secure online shopping through their websites. If you are using a new retailer that you are unfamiliar with, research them! Look for third party reviews and ratings, google their name and see what comes up etc..


Make sure you are typing the store’s URL directly into the browser address bar rather than clicking on ads or search results- as it is very easy for fraudulent websites to trick you into thinking they are legit. If the website looks off, shady, or poorly designed- trust your instincts and go somewhere else. You might be disappointed at losing a possible deal, but it is not worth risking your personal information getting into the wrong hands.


Know the policies
Read through the website's policies including their privacy statement, billing, guarantee, and shipping policies. Familiarize yourself with how the company conducts business so there are no surprises later on.


WiFi Safety
Try to use only secure and private networks when transmitting personal or identifying information. While it is not preferable, you may use public wifi to make your purchases as long as you keep in mind a few things:

  • Try not to use a public computer to make your purchases as you have no idea what  software has been installed or who else might be connected.
  • Use only well-known public hotspots. Walmart, McDonald’s, Chapters/Indigo, and Starbucks all have secure public hotspots, and keep in mind you always use those at your own risk.
  • If you do use a public hotspot, be aware of ‘shoulder surfers’- those people who might be looking over your shoulder to read personal information off your screen.


Protect your personal information
It should go without saying that you should never give away sensitive information needlessly.  Online retailers do not need to know your SIN number or birthdate for you to make purchases. It is generally best practice to give the least amount of information possible. It is also a good idea to avoid clicking on links in emails. Phishing is a common scamming practice by which emails will look like they are coming from legitimate sources but actually are only sent to retrieve your confidential informaiton such as passwords, account numbers, ID numbers etc...


Make sure payment pages have secure connections
Legit websites will use a secure protocol to encrypt your information. If you look in the address bar, the URL should start with HTTPS:// and have a little icon of lock next to it. HTTP:// is NOT a secure connection. By looking for this feature, you are ensuring a secure transfer of your personal information.


Secure Shopping Online HTTPS

Even with these best practices, there will always be a risk when shopping online. However by staying vigilant and following these tips you can greatly minimize this risk and enjoy all of the perks that come with shopping online.

The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information



Thursday, 22 October 2015

How to Protect Your Organization from Social Engineering in 6 Important Steps

What is social engineering and how can it be a threat to your organization? 

Social engineering or “social hacking” as it is sometimes referred to, is a way in which people manipulate someone into revealing their confidential information such as passwords, account numbers, network access, or ID’s. As computer networks and programs improve their security, social engineering becomes more prevalent as a way to gain access to this restricted information, often shockingly easily. Rather than breaking into a computer system, they play psychological tricks 
to gain this information.

Barrie Social Engineering FraudSome common ways people use social engineering might be posing as a repairman or company representative such as a financial advisor. Recently a teen in the US gained access to the CIA Director’s email by posing as a Verizon worker.

Social hackers may use phone, the web, or even face-to-face tactics to gain information. They might call you posing as a representative from your bank claiming that your account has been flagged for suspicious activity, and demand personal information to “verify” your identity. A hacker may even pose as a collections agency demanding payments and threatening to arrest you if you don’t pay. You may receive an email claiming to be from the IT dept of your own company requiring restricted information to perform audits or system tests. Some hackers are dedicated enough to gain employment at their target in order to gather privileged information.

So how do you protect yourself from these types of psychological attacks? By following some simple guidelines you can make sure your organization does not fall victim to social hackers.

  1. Implement a policy at your organization and train all employees on proper security procedures. Empower them to take responsibility for your company's security by using critical thinking and creating a security aware culture. Require them to verify visitor IDs, and report suspicious activity.
  2. Implement proper storage and disposal of sensitive documents. Locked filing cabinets, paper shredders, and high-end network security are your best practices.
  3. Remember that it is not enough to have a strong password. Have different logins and passwords for different programs, change passwords often, and never reveal your password to anyone.
  4. Stand your ground. If you suspect someone is attempting to use these tactics on you, do not give in to intimidation.
  5. Damage control. If you suspect you may have fallen victim to a social engineering attack report the incident immediately to authorities, change all passwords, update your network software, and call your financial institutions or monitor your accounts.
  6. Hire a private investigator to complete background checks on employees as well as to help you further protect your organization from hacking and fraud.


Social engineering is a common way to gain confidential information, however you can protect yourself and your organization by staying vigilant and following the steps outlined above.

The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.


Friday, 18 September 2015

10 Tips to Protect Yourself from Identity Theft and Fraud

identity theft renwick PI
Identity theft occurs when a person’s private identifying information is stolen for financial gain. An impostor will acquire key pieces of your personal information such as your social insurance number and drivers license … and impersonate you to commit fraud.

Here are some tips to protect yourself from identity theft:

  1. Ask questions. If someone is asking you for personal information, question them. Don’t simply answer. Your personal information is protected by Canadian legislation such a PIPEDA, so don’t give it away without questioning the reasons.
  2. Protect your pin. This seems simple, but it’s surprising how many people don’t do this! Shield the keypad every single time you enter your pin.
  3. Guard your information online. Remember to clear your logins and passwords from your computer, and change your password, at minimum, once per month. Consider paying online with credit card rather than online payment services or debit. Credit card companies usually have guarantees to protect you.
  4. Watch out for phishing scams. Be alert when you see “pop-ups” that seem like they’re from a bank. This scam will ask for your personal information which they will try to use to access your accounts.
  5. Monitor your bank and credit statements. Keep an eye out for any suspicious purchases. You can go one step further and monitor your credit report through companies such as Equifax.
  6. Shred sensitive information. Be careful with your personal information. Any piece of paper that has personal information – including your name, address, account numbers, identification numbers etc. – can be used to commit fraud. Don’t just throw it out on the street, shred the paper first. And this includes old credit and debit cards.
  7. Secure your mail. This tip goes along with number 6! Be sure to shred or destroy all documents containing personal information. Especially that pre-approved credit card application that is mailed out.
  8. Don’t give out your social insurance number. There are very few organizations that should ask for this information. More importantly, only give this information to organizations YOU have initiated contact with (like banks, employers and government.)
  9. Only enter payments on secured sites. Look for the “paddock” symbol and sites that begin with “https.”
  10. Use complicated passwords. There’s a reason why you can’t choose “1234” for pin codes. Unique complicated passwords will give you an extra layer of protection. Try to stay away from passwords that can be easily guessed (like your birthday or child’s name).


The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.




Friday, 21 August 2015

Why Should You Conduct Tenant Screening Background Checks?

tenant screening skip tracing PI BarrieWouldn’t it be nice is every tenant paid on time and worked hard to make sure they didn’t disturb their neighbours? Tenant screening can help you find the ideal occupant for your property by helping your learn everything you need to know about your potential tenants. There are plenty of great tenants out there, and tenant screening will help you make sure you choose the right one.

The screening process will help you determine if you’re choosing the right tenant. Most screening processes include a criminal background check, credit report, employment references, and rental history. But what if the screening process all checks out fine … but there is still something “off” about the potential new tenant?

Here are some red flags to watch out for:

  • Negative opiniona about current or previous landlord
  • Bad references (especially a poor reference from a landlord)
  • Unexplained “rush” to move in (could indicate a previous eviction) 
  • Aggressive pets
  • Late arrival to rental showing
  • Different people show up for the viewing than previously discussed
  • Excessive criticism of property before they move in
  • Frequent relocation
  • History living with relatives or at motels
  • Frequent job changes
  • Inability to pay deposit prior to move-in date
  • Unprofessional phone or email correspondence
  • Promises to “update” your property … at no cost
  • Income that is less than 2.5 – 3 times the monthly rent
  • Prior eviction(s)
  • Unexplained nervousness regarding the screening process 
And of course, a criminal record and poor credit history are the biggest red flags to consider.

A thorough tenant screening process will ensure will cover your bases and protect you from losses related to late/no payments and property damage. Everything that is on your screening application should be verified – don’t take your tenant’s word for it! Protect yourself and your property with a background check.

Property managers and landlords use The Renwick Group background checks to screen their potential tenants. We offer many instant background checks for tenant screening, including credit reports and criminal records.

Contact us today for more information about our tenant screening services.


The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.

Friday, 31 July 2015

Choosing the Right CCTV Camera for Corporate Surveillance

Video surveillance is a great tool for protecting employees, preventing theft and reducing the risk of criminal break-ins. In addition, it can assist your in supervising your employees to ensure safety protocols (including WCB rules) are followed, record that the right products were shipped or received without damage, and even prevent employee harassment.

CCTV Skip Tracing Surveillance BarrieThere are so many CCTV cameras on the market today. This presents a great opportunity for you to find a camera that does exactly what you need. The first step in choosing a CCTV camera is understanding the main types of cameras out there, and of course determining the main purpose for your surveillance.

What is a CCTV Camera System?

Closed-circuit television (CCTV) is the use of CCTV video cameras to transmit a video signal to a monitor for live viewing, or to a recording device for viewing at a later date. They are used primarily for surveillance and security purposes.


What Type of CCTV Camera Should I Buy?

Here is a selection of the different types of CCTV Cameras you can consider:

Dome Camera

Dome Cameras are often used for indoor security and surveillance. Typical applications are retail environments, where the camera is designed to be unobtrusive, but visible. In addition, the "dome" shape makes it difficult to tell the direction that these cameras are facing, and thus are ideal for deterring criminals. The “bad guys” will know the facility is being watched and customers will feel at ease knowing the facility is being protected. Units that allow the camera to pan/tilt/zoom and spin quickly within the housing are often referred to as “speed domes.” Speed domes are used to cover a wide area with only one camera, or to avoid poor light conditions at certain times of day.

Bullet Camera

Bullet Cameras have a long, cylindrical, and tapered shape, similar to that of a "rifle bullet", often used in applications that require long distance viewing. The camera is not typically designed to have pan/tilt/zoom control but instead to capture images from a fixed location, pointing at a particular area.

A bullet camera is a wall-mount or ceiling-mounted unit that is typically designed for indoor use, but can also be used for some outdoor applications. Many bullet cameras can also be waterproof by being installed inside protective casings, which protect against dust, dirt, rain, hail and other harmful elements.

C-Mount Camera

C-mount cameras have detachable lenses to fit different applications. Standard camera lenses can only cover distances of between 35 and 40ft, therefore with C-mount cameras, it is possible to use special lenses, which can cover distances greater than 40ft.

Day/Night Camera

Day/Night cameras have the distinct advantage of operating in both normal and poorly-lit environments. These cameras do not have Infrared illuminators because they can capture clear video images in varying light conditions and in the dark.

The camera is ideal for outdoor surveillance applications, where Infrared CCTV cameras cannot function optimally. These cameras are primarily used in outdoor applications and they can have a wide dynamic range to function in glare, direct sunlight, reflections and strong back light 24/7.

High-Definition HD Camera

Ultra high-definition cameras are often relegated to niche markets, such as casinos and banks. These give the operators the ability to zoom in with extreme clarity (to look at a poker player who might have something up their sleeve).

If you plan to conduct corporate surveillance, there are some additional factors to consider.  Click here to view our post: Corporate Surveillance | What You Need to Know.


We offer a variety of corporate surveillance services that will allow us to discreetly gather information and assist you in presenting unbiased facts and circumstances. We have a strict privacy policy in place, and can assist you in navigating your own privacy-related legislative requirements.

Contact us today for more information about our corporate surveillance services.



The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.




Tuesday, 30 June 2015

How Does Skip Tracing Work?


Skip Tracing Canada The Renwick Group - We find people
In the world of high personal debt loads, it's hardly surprising that many people fall into a bad debt situation, unable to pay their monthly commitments.  Being unable to pay and falling behind on your debts often means that your account will fall into delinquent collections.

Therefore the process of recovering the unpaid items such as cars, boats, and electronics, and / or  recovering the missing cash payments is a constant process for many businesses.

This type of problem is often sent firstly to a collections department and then if insufficient records are available, or the person has skipped out of town without leaving an address then a process called skip tracing kicks in. Many people have never heard of the term skip tracing here's a good definition for you.

“Skiptracing (also skip tracing) is a colloquial term used to describe the process of locating a person's whereabouts for any number of purposes. A skip tracer is someone who performs this task, which may be the person's primary occupation. The term comes from the word "skip" being used to describe the person being searched for, and comes from the idiomatic expression "to skip town," meaning to depart, perhaps in a rush, and leaving minimal clues behind for someone to "trace" the "skip" to a new location.”   (Skip Tracing - Wikipedia.com)

The days when you went to the phone book, criss-cross directory, or reverse directory are old-school and costly compared to the skip tracing technology options today.

With the advent of technology in general, and by using the Internet in particular, the availability and quality of information about people has expanded dramatically.

What types of information can be retrieved for skip tracing purposes. By contracting with a private investigator who specializes in skip tracing, you can gain access to all kinds of national information databases regarding a debtor.  Here are a few we frequently use as part of our skip tracing process:

Databases

Address directories
Phone directories
Nearby Information (those people who live next door to the address you are researching)
Social Security Number Verification
Credit reports/scores
Employment Departments
    Provide recent name, address, salary, etc.
Driver’s License/Vehicle Registration Departments
    Provide name, address, and asset information
Tax and Revenue Departments
    Provide name, address, and asset information
Court and Law Enforcement
Utility records
Property Assessor
Licenses (marriage, professional, business)
Business registration
Permits ... to name a few.

The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.

Friday, 15 May 2015

Corporate Video Suveillance | What You Need to Know

corporate surveillance video cctv security
Both large and small businesses recognize the importance of implementing video surveillance to protect employees, prevent theft and reduce risk of criminal break-ins. Video surveillance systems are relatively easy to install, however, you must consider privacy legislation to prevent potential litigation and ensure you’re following legislative privacy requirements such as those implemented under PIPEDA.

One of the first steps in protecting your business from litigation is implementing a Video Surveillance Policy and ensuring that all employees are aware of the system and its purpose.

 

Within your video surveillance policy, you should include:


· Purpose of the video surveillance system

· Where cameras will be used or not used

· Where the videos will be monitored

· Who will have access to the recordings and for what purpose

· Privacy procedures for requesting recordings

· Details and policies for archiving video footage


If your business is in the private sector, the privacy commission requires that your "… need to conduct video surveillance must be balanced with the individuals’ right to privacy, which includes the right lead their lives free from scrutiny. Given its inherent intrusiveness, organizations should consider all less privacy-invasive means of achieving the  same end before resorting to video surveillance."


Based on this requirement, the Privacy Commission has released a series of questions to help you decide whether or not you should implement corporate video surveillance. Check out their list below or view the entire article here.

10 things to do when considering, planning and using video surveillance

  1. Determine whether a less privacy-invasive alternative to video surveillance would meet your needs. 
  2. Establish the business reason for conducting video surveillance and use video surveillance only for that reason. 
  3. Develop a policy on the use of video surveillance. 
  4. Limit the use and viewing range of cameras as much as possible. 
  5. Inform the public that video surveillance is taking place. 
  6. Store any recorded images in a secure location, with limited access, and destroy them when they are no longer required for business purposes. 
  7. Be ready to answer questions from the public. Individuals have the right to know who is watching them and why, what information is being captured, and what is being done with recorded images. 
  8. Give individuals access to information about themselves. This includes video images. 
  9. Educate camera operators on the obligation to protect the privacy of individuals. 
  10. Periodically evaluate the need for video surveillance. 


We offer a variety of corporate surveillance services that will allow us to discreetly gather information and assist you in presenting unbiased facts and circumstances. We have a strict privacy policy in place, and can assist you in navigating your own privacy-related legislative requirements.


The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.



Thursday, 23 April 2015

5 Simple Tips to Protect Yourself From Intellectual Property Theft and Fraud

Many businesses are at risk of property theft and fraud, causing huge losses in revenue.  Implementing some simple preventative measures can decrease your risk and protect your intellectual property and goods.

Identity Theft Protection PI Barrie1.  The first step in protecting your business is installing a verified alarm system.  Verified alarm systems are different from traditional alarms because they verify the alarm for you.  You will not be dealing with false alarms in the middle of the night that require you to reset your alarm.  Verified alarm companies monitor audio or video security when the sound-based or motion-based alarms are tripped.  If a criminal is attempting to break-in to your business, they dispatch the police immediately.  Verified alarms receive prompt police response and result in criminal apprehensions.  If it is a false alarm, the monitoring station simply resets the alarm.

2.  The second step in protecting your business is a managed access control system.  This will help you monitor which employees access certain areas in your business and allows you to restrict access to certain hours of the day.  Additionally, a managed access control system restricts unauthorized persons from accessing your facility – without the proper key card access, they will be unable to enter.  Electronic key cards and fobs used with managed access control are also easy to disable – in the event that an employee no longer works at your business, it’s simple to remove their access.  This is a simple step you can take if you have a disgruntled employee who still has a key to your building.

3.  Criminal record checks are an important part of employee screening.  Your intellectual property is vulnerable to theft from outside criminals and also internal employees.  Reduce your risk by thoroughly screening employees prior to employment to identify any potential risk factors.

4.  If you’ve implemented a managed access system, you can take an extra step to protect intellectual property, client information or high-end products by limiting access to a specific office or server room.  Restrict access to managers or authorized persons to limit the amount of people who are able to access the room.

5.  Unsecured workstations increase your vulnerability to theft.  Secure your workstations, disable drives and protect your printers.  This will limit easy access to important internal information.  Securing your workstations will ensure the smash-and-grab criminal cannot remove a computer drive easily.  Disabling drives such as USB ports or other means of connecting external drives prevent employees from copying confidential data.  Protecting your printers reduces the chances of printer theft – printers often hold data in their on-board memory.

Implementing these five preventative security measures can considerably reduce your risk of theft.  Theft of intellectual property and confidential information can lead to many negative consequences for your business.  Make sure to take the steps to protect yourself from loss.



The Renwick Group has the knowledge and experience to help you or your business solve problems such as fraud, skip tracing, locating people, litigation support, labour dispute management, and more.. Please call us at 1 (888) 722-9807 to discuss your situation.




Saturday, 28 March 2015

Tips on Hiring a Private Investigator


People love detective stories and there have been many dramatic portrayals of Private Investigators in popular media. So when you find yourself needing to talk with someone about investigation services, you might think it's all cloak and dagger, but in reality it's a very professional, regulated, and customizable service.

Private investigators provide a broad range of services to personal and corporate clients.

Private Investigators are highly trained professionals with unique skill sets that assist you in gathering information for specific reasons. They are licensed and insured. They work closely with law enforcement and the legal community.

They know how to gather and protect evidence so that it is admissible in court. They are an independent third party professional not emotionally attached to your case.

There is a reason to hire lawyers, accountants and doctors. Private Investigators are professionals in the same right and in the proper circumstance they can be a valuable asset to your legal team.

 How do you hire a Private Investigator?

 So how do you go about choosing a private investigation agency that is right for your project? The following is a hiring guide published by the Council of Private Investigators - Ontario and you can download the full report here www.therenwickgroup.ca

 1. Go to the Council of Private Investigators - Ontario website, the yellow pages or search online for Agencies or Investigators who specialize in the type of investigation you require.
 2. Call your lawyer and ask for recommendations.
 3. Consult with a friend or acquaintance that may have been in similar circumstances.
 4. Identify three agencies local to you that provide the type of investigation services you require.
 5. Prepare a written list of questions you are going to ask each company.
 6. Confirm that the Private Investigation Companies or Private Investigators are licensed and insured.
 7. Check the company name and individual license number on the Ministry of Community Safety and Correctional Services.
a. Licensed Agencies
 b. Licensed Individuals
 8. Visit the agency office. It is required by law that all Private Investigation Agencies have a physical office address with a public entrance.
 9. The business licence to provide private investigation services should be clearly displayed in their office.  Request to see a copy of their certificate of insurance.
 10. Request to see a sample report format.
 11. Make an inquiry to the Better Business Bureau.
 12. Inquire about experience, education, training and length of time in the industry. What is their level of expertise in the areas of investigation you require?
 13. Ask for client references or letters of recommendation.
 14. If you retain a Private Investigation Agency insist on having a written receipt for any retainer/deposit you have provided and ask for the companies HST number.
 15. In most cases a Private Investigation Agency will require you to sign a contract or agreement. The agreement should clearly state what the investigation will entail, provide an estimated budget, identify a breakdown of the costs associated with the investigation and include a proposed timeline for completion. If progress payments are required clearly define the deliverables prior to signing the contract.
 16. Establish specific times when you will be updated about the investigation. Define if the updates are to be written or verbal.
17. Define the deliverables you will receive after the investigation is completed. Reputable Private Investigation.  Agencies will provide a full written report with details of the investigation, the time spent on investigation tasks (such as surveillance), and a detailed invoice itemizing costs associated with all phases of the investigation.

The Renwick Group is a private investigation firm founded in 1997 and is based in Barrie, Ontario. We excel in delivering our core Private Investigation Services in the most efficient, secure, and professional manner.​

 Source: http://www.cpi-ontario.com/default.asp

The Renwick Group has the knowledge and experience to help you or your business solve problems such as fraud, skip tracing, locating people, litigation support, labour dispute management, and more..  Please call us at 1 (888) 722-9807 to discuss your situation.

Saturday, 21 February 2015

Background Checks – Employee Screening or Online Dating?

Background Checks Barrie
Background Checks are no longer limited to employment screening. In fact, there is a growing trend of background checks conducted for online daters. With one-in-five adults ages 25-34 years using online dating to find that special someone (Pew Research), it’s becoming more and more common for online daters to conduct a background search on their potential new partner.

While online dating sites have implemented rules to help prevent emotional, physical or financial hardships, conducting your own background check can add an extra measure of protection against any scammers and ensure your personal safety.

The Better Business Bureau received more than 4,000 complaints regarding dating sites in 2014, some of which were related to scams. And with the growing trend in online dating, the potential for scammers and dishonestly online will continue to grow.

Background checks can identify dishonest online daters by revealing:

  • True identity 
  • Marital status 
  • Criminal records and convictions
  • Financial history
  • Undisclosed debt
  • Hidden addictions
  • False profile information 

You can expect a certain level of dishonestly in most online dating profiles – after all, the dating profile is more like a personal advertisement than a true reflection of personality. That being said, hiding criminal convictions and marital status are key pieces of information that could influence your dating decisions.

While the most common motivation for a background check is fear of getting hurt in a new relationship, it can also help weed out any potential partners that don’t fit in with your long-term plans. Once you make a connection, take the time to get to know each other before meeting. And when you do meet, protect yourself by meeting in a public place rather than somewhere secluded. Following a few dates, you can make the decision on whether or not to conduct a background check.


The Renwick Group offers flexible, comprehensive background check services to our clients.

Click here to learn more or contact us for more information.


The Renwick Group is Canada’s leading Private Investigation Company specializing in Skip Tracing – we locate hidden assets, people, missing autos & boats, witnesses, beneficiaries, property and missing persons.

Thursday, 29 January 2015

How To Run a Successful Workplace Investigation

Workplace investigations can cost thousands, and sometime millions, of dollars in lawsuits, especially if you make mistakes during your investigation. 4 Great Ways to Ruin a Workplace Investigation by i-Sight highlights the 4 most common mistakes that are made during a workplace investigation.

Here are some highlights from the article on what not to do, but make sure to check it out in full!

Corporate Investigation Barrie1. Don’t Go in Cold. Hire an expert interviewer to conduct your investigation. A skilled interviewer will use a variety of techniques and build rapport from the start of the interview.

2. Not Doing Your Homework. Research the case, the people and the circumstances surrounding the allegations prior to beginning your investigation. Being prepared will ensure you don’t botch the interview from the start. In addition, don't confront a suspect before you have gathered all of the evidence because if the suspect is aware the investigation is ongoing, they may have opportunity to destroy or delete evidence.

3. Handling Evidence Badly. Ensure you recognize and secure all evidence related to the case, and establish a chain of evidence for admittance to court. Part of recognizing evidence includes crosschecking the suspect’s story and verifying evidence with the suspect to make sure interpretations are correct.

4. Jumping to Conclusions. Don’t make up your mind before you have all the facts! If you already have a theory, you may filter out contrary evidence without even realizing it!


These four points truly summarize some of the main errors that could ruin a workplace investigation. If you plan to run your own workplace investigation to solve issues such as workplace disputes, allegations or accident investigations, there are some other points you should keep in mind.

Ensure you have policies in place that not only provide clear guidelines for employee behaviour, but also outline your investigation procedures. Employee privacy and corporate surveillance policies should be outlined in detail to ensure policies adhere to privacy legislation such as PIPEDA. Learn more about PIPEDA here.

Also plan out your interview process and create a list of people you plan to interview. If possible, bring in a professional interviewer and a lawyer in the early stages of the investigation. You may need to alter your investigation plan along the way as you continue to gather more facts.

If you are not sure where to begin with a workplace investigation, considering hiring a private investigation firm. The Renwick Group offers a full range of investigation services to help you make informed decisions. Undercover operations, fraud investigations and WSIB and LTD investigations are among the services we offer.

Click here to learn more or contact us for more information.


The Renwick Group is Canada’s leading Private Investigation Company specializing in Skip Tracing – we locate hidden assets, people, missing autos & boats, witnesses, beneficiaries, property and missing persons.

We will search and locate anyone.  Our success rate is over 90%.