Cyber Vetting Employees & Candidates. KJB Computer Forensics Consultancy
|
|
|
- Bryan Stokes
- 10 years ago
- Views:
Transcription
1 Cyber Vetting Employees & Candidates KJB Computer Forensics Consultancy
2 Background Since the beginning of the century the ease and speed of electronically searching for information on an individual has become dramatically easier. This is due to the increased use of the internet, availability of the internet and the availability of internet search engines. Nowadays the majority of individuals appear to be more at ease interacting socially via the internet than they are face to face. It is this very fact that should encourage us to explore employees or potential employees online social profiles Cybervetting. The aim of this paper is to explain what a Cybervetting check involves and how KJB Computer Forensics Consultancy can assist you. What is Cybervetting? Cybervetting is a process of assessing a person s suitability for employment within a company using information found on the internet. Cybervetting is a very useful extension to the normal vetting procedures conducted during the interview process, as part of an employee s annual appraisal or as part of your company s ongoing security review of employee internet use during work hours. When employee s access social networking websites on your company network; do you know what they are accessing and what are they saying about your company online? Is your company s reputation being damaged by disgruntled employees? Cybervetting canl help protect your Company s reputation. Why is Cybervetting different from any other background checks? Cybervetting is the process by which we use publicly available online tools or sites to search through social networking communities to gather information about current or future employees. Cybervetting has the potential to reveal more information on a person than the traditional reference. Anyone that has ever read someone else s CV will agree that a CV can sometimes appear to be too good to be true. Various surveys over the years continue to show up to 50% of job applicants lie on their CV s. Traditional forms of candidate persuasion the power suit, polished CV, great covering letter and the right connections are fast becoming a thing of the past. A candidate now requires a polished internet reputation ( net-rep ) as well. 2011
3 Social Networking Communities Social networking websites communities are freely accessible websites which allow individuals to create online profiles and share interests, photos, videos, contacts and much more. Subscribers , chat, and digitally interact in a variety of ways with friends or other contacts established through existing and developing networks. Social networking communities give millions of individuals a medium for both self-expression and connection within an online environment. They provide an audience for individuals and a context for the exploration and performance of (social) identity. The majority of the most popular social networking sites are socially focused without clearly established instrumental purposes. Positives and Negatives about Social Networking Communities Apart from the social benefits, social networking sites can be used to document school research, promote artistic talents and experiment with other forms of content creation. They provide a way to interact with others who share the same interests and to get constructive feedback on ongoing projects. Along with these benefits come some risks. Most social networking sites are open to all, which means that anyone could be exposed to harassment, bullying or sexual advances. Cyber-bullying and harassment may take several forms: publicizing private instant messages, text messages or s posting threatening messages posting photos that will cause embarrassment It's rare for harassment to spill over into real-world conflicts, but it can still be a cause of emotional distress. In my professional experience I know that an individual s online profile/personality is different from their real-life personality, sometimes the complete opposite. An example of this is the use of the social networking website, Second Life. The vast majority of individual s take on personalities of who they would aspire to be. Some of these individuals behave in a fashion that is not only socially unacceptable in the real world but on occasions would be considered illegal. Therein is the problem and the realisation that there is a very real need to ascertain what a person is like online, as well as in person Cybervetting. 2011
4 How can assist? Cybervetting policy It is important that you have a very clear and well thought out, Cybervetting policy. Failure to have such a policy may result in problems such as invasion of privacy, or inaccuracies with information obtained. can provide the expertise and experience to assist you in compiling a Cybervetting policy or reviewing any existing policy. Cybervetting service provides a comprehensive Cybervetting service. We will liaise with you and obtain the appropriate information about potential employees, provide advice on what information can be discovered and advise on any potential problems. KJB Computer Forensics Consultancy guarantees client confidentiality at all times. Cyber Vetting Report We will produce a user-friendly report together with an electronic copy of all information gathered during the Cybervetting process. The report will give you a detailed explanation of all facts gleaned during the investigation and recommendations we consider relevant. Our Expertise The Managing Director (MD) served in HM Forces for 24 years, serving with the Royal Military Police and the 1Bn Queens Own Highlanders. Following a successful military career the MD moved on to serve within law enforcement in Scotland. The MD has a Masters Degree in Computer Forensics and a wealth of experience with criminal investigations within the Scottish and English judicial system. KJB Computer Forensics examiners are experts at securing digital evidence and the investigation of all manners of digital crime. We are educated to degree level, have worked within law enforcement and are security vetted to SC level. Our evidence is produced to a standard acceptable within Scottish and English Courts. We have given oral evidence in the High Court on numerous occasions. 2011
5 Summary In today s modern culture we are all used to being afforded a far greater freedom of use of the internet at home and during the working day. The average person regularly uses the internet to socialise and interact with friends and family. It could be said that our use of social networking websites has increased to the point where we as a society are slowly drifting to an increasingly virtual social life. Evidence exists that shows a person s online persona can be completely different from that of their real life persona. These differences vary in extremes but have the potential to be a real threat to your business e.g. revelation of confidential company data online, damage to your company reputation etc. With these threats and the change in social trends it is important that you consider changing your vetting procedures to include Cybervetting. Cybervetting could protect your business assets and more importantly your reputation. Please do not hesitate to contact me if you require further information regarding this service. I am only to willing to meet up to discuss Cybervetting in more detail. Jim Borwick MSc [email protected] Website:
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Workplace Anti-Harassment Policy (Alberta)
Workplace Anti-Harassment Policy (Alberta) Intent It is public policy in Canada to recognize the dignity and worth of every person and to provide for equal rights and opportunities free of discrimination.
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low
Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
CyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
nationalcarestandards
nationalcarestandards dignity privacy choice safety realising potential equality and diversity SCOTTISH EXECUTIVE Making it work together nationalcarestandards dignity privacy choice safety realising potential
If you have been raped or sexually assaulted abroad
If you have been raped or sexually assaulted abroad This leaflet is aimed at anyone who usually lives in Scotland and has been, or still is, travelling abroad. supported by the Scottish Government About
Reporting the crime to the police
Section 4 Reporting the crime to the police Why report the crime to the police? It is your choice whether you report the crime to the police. Some people choose not to report or may not report straight
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
Who's chatting to your kids?
N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
Family law a guide for legal consumers
Family law a guide for legal consumers Image Credit - Jim Harper A relationship breakdown is a difficult time for anyone. It is one of the most stressful experiences in life. Where you have to involve
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
Eanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
Working to standard: a code of conduct for support workers in health care. 1.1 Welcome to this code of conduct for support workers in health care.
Code of conduct for Healthcare Support Workers Working to standard: a code of conduct for support workers in health care 1. Introduction 1.1 Welcome to this code of conduct for support workers in health
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position
NEW HAMPSHIRE E SCHOOL BOARDS ASSOCIATION Theodore E. Comstock, Executive Director Barrett M. Christina, Staff Attorney 603-228-2061 www.nhsba.
NEW HAMPSHIRE E SCHOOL BOARDS ASSOCIATION Theodore E. Comstock, Executive Director Barrett M. Christina, Staff Attorney 603-228-2061 www.nhsba.org Investigating Allegations of Employee Misconduct October
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
6.9 Social Media Policy
Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government
Guidance on using social media responsibly
Guidance on using social media responsibly We are the nursing and midwifery regulator for England, Wales, Scotland and Northern Ireland. We exist to protect the health and wellbeing of the public. We set
Cyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Social Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
2011-2012. Frisco ISD
2011-2012 Frisco ISD Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 Google Apps for Students... 3 Responsible Use Policy... 4 Wireless Information... 5 Frequently Asked Questions...
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.
FAQs - Harmful Digital Communications Bill What are harmful digital communications? Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. Examples include sending
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Networking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
Parents recording social workers - A guidance note for parents and professionals
Parents recording social workers - A guidance note for parents and professionals The Transparency Project December 2015 www.transparencyproject.org.uk [email protected] (Charity Registration
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures
State University of New York at Potsdam Workplace Violence Prevention Policy and Procedures Revision Date: September 15, 2015 Page 1 of 7 TABLE OF CONTENTS Policy... 3 Statement... 3 Definitions... 3 Application
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
Social Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
Social Media Guidance for Staff
Social Media Guidance for Staff May 2013 Social media guidance aims Establish practical and reasonable guidelines to help staff in their professional use of social media. Promote a safe environment to
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
XXX000YY Certificate IV in Government Security
XXX000YY Certificate IV in Government Security XXX000YY Certificate IV in Government Security Description This qualification allows for the attainment of generalist competencies in Security and also specialist
DIGITAL CITIZENSHIP QUIZ
1. Kelly is on Instagram and a boy she doesn t know begins to follow her and comment on her images. She should... A. Just go along with it (ignore it) B. Delete the follower C. Start a chat and get to
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Policy and Procedure for Handling and Learning from Feedback, Comments, Concerns and Complaints
Policy and Procedure for Handling and Learning from Feedback, Comments, Concerns and Complaints Author: Shona Welton, Head of Patient Affairs Responsible Lead Executive Director: Endorsing Body: Governance
Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013
Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
School Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
HUMAN RESOURCE PROCEDURE GUIDE CONDUCTING WORKPLACE INVESTIGATIONS
INTRODUCTION Inevitably, there comes a time in every employer s existence where a complaint, an accusation, alleged employee misconduct, or a rumor of something amiss comes to their attention requiring
Guidance on political campaigning
I ICO guidance Guidance on political campaigning 3 Guidance on political campaigning Data Protection Act Privacy and Electronic Communications Regulations Contents Introduction... 3 A. Why comply?... 5
LEGAL MANAGER - JOB DESCRIPTION
Job details LEGAL MANAGER - JOB DESCRIPTION Reference number: ESD/LM2011 Job title: Legal Manager Division: Legal Reports to: Company Secretary Location: Nairobi Job summary The job holder is responsible
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:
2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
Safer Internet Day Quiz
Safer Internet Day Quiz Safer Internet Day 2014 is all about helping to create a better internet together. But do you make good decisions online? Test your internet safety knowledge by taking our Safer
A Guide for Parents. of Elementary and Secondary School Students
A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.
COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS
RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS 1. WHY CAN T THE GOVERNMENT BAN USE OF THE INTERNET TO SPREAD HATEFUL AND RACIST IDEOLOGY IN THE UNITED STATES? The Internet is probably
WITHOUT. Boosting Your Value. Traditional Education
Boosting Your Value WITHOUT Traditional Education How to Get An Education Without Attending College and Without a Lifetime of Debt, Stress, and Family Strain Table of Contents Introduction... 3 Your Local
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
