Cyber Vetting Employees & Candidates. KJB Computer Forensics Consultancy



Similar documents
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

Internet Safety/CIPA Lesson Plan

EADS up. stop think connect

Social Media Guidelines Resource

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Teen Online & Wireless Safety Survey

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

E-Safety Issues and Online Safety

September A Anti Bullying (Cyber Bullying) version 9

HEADS up. stop think connect

Workplace Anti-Harassment Policy (Alberta)

E-Safety Issues and Online Safety. Parents Evening

Staying Safe Online. A Practical Guide for Parents and Children.

Acceptable Use of Information Technology

SOCIAL NETWORKING SITES

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

E-Safety Issues and Online Safety

CyberbullyNOT Student Guide to Cyberbullying

Today s teens use technology more than ever. Most have

nationalcarestandards

If you have been raped or sexually assaulted abroad

Reporting the crime to the police

South Australia Police POSITION INFORMATION DOCUMENT

Who's chatting to your kids?

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Family law a guide for legal consumers

Cyber safety Parent Easy Guide 63

Eanes Independent School District Responsible Use Guidelines for Technology

Working to standard: a code of conduct for support workers in health care. 1.1 Welcome to this code of conduct for support workers in health care.

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

South Australia Police POSITION INFORMATION DOCUMENT

NEW HAMPSHIRE E SCHOOL BOARDS ASSOCIATION Theodore E. Comstock, Executive Director Barrett M. Christina, Staff Attorney

How To Deal With Social Media At Larks Hill J & I School

John of Rolleston Primary School

6.9 Social Media Policy

Guidance on using social media responsibly

Cyberbullying: What Parents Can Do to Protect Their Children

Digital Citizenship Lesson Plan

Social Networking Policy

Online Safety for Middle and High School

Frisco ISD

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.

[Example] Social Media Acceptable Use Policy

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

COMPUTER USAGE -

Networking and Social Media Policy

Parents recording social workers - A guidance note for parents and professionals

Revised: 6-04, 8-09, 1-12 REGULATION #5420

State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures

Code of Virginia, 1950, as amended, Sections , :1, , , and

Social Networking Policy

Social Media Guidance for Staff

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

XXX000YY Certificate IV in Government Security

DIGITAL CITIZENSHIP QUIZ

COMPUTER USE POLICY. 1.0 Purpose and Summary

Policy and Procedure for Handling and Learning from Feedback, Comments, Concerns and Complaints

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013


School Policy Regarding Computer Use, Technology and Internet Access

HUMAN RESOURCE PROCEDURE GUIDE CONDUCTING WORKPLACE INVESTIGATIONS

Guidance on political campaigning

LEGAL MANAGER - JOB DESCRIPTION

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

2012 NCSA / McAfee Online Safety Survey

Safer Internet Day Quiz

A Guide for Parents. of Elementary and Secondary School Students

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

WITHOUT. Boosting Your Value. Traditional Education

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Transcription:

Cyber Vetting Employees & Candidates KJB Computer Forensics Consultancy

Background Since the beginning of the century the ease and speed of electronically searching for information on an individual has become dramatically easier. This is due to the increased use of the internet, availability of the internet and the availability of internet search engines. Nowadays the majority of individuals appear to be more at ease interacting socially via the internet than they are face to face. It is this very fact that should encourage us to explore employees or potential employees online social profiles Cybervetting. The aim of this paper is to explain what a Cybervetting check involves and how KJB Computer Forensics Consultancy can assist you. What is Cybervetting? Cybervetting is a process of assessing a person s suitability for employment within a company using information found on the internet. Cybervetting is a very useful extension to the normal vetting procedures conducted during the interview process, as part of an employee s annual appraisal or as part of your company s ongoing security review of employee internet use during work hours. When employee s access social networking websites on your company network; do you know what they are accessing and what are they saying about your company online? Is your company s reputation being damaged by disgruntled employees? Cybervetting canl help protect your Company s reputation. Why is Cybervetting different from any other background checks? Cybervetting is the process by which we use publicly available online tools or sites to search through social networking communities to gather information about current or future employees. Cybervetting has the potential to reveal more information on a person than the traditional reference. Anyone that has ever read someone else s CV will agree that a CV can sometimes appear to be too good to be true. Various surveys over the years continue to show up to 50% of job applicants lie on their CV s. Traditional forms of candidate persuasion the power suit, polished CV, great covering letter and the right connections are fast becoming a thing of the past. A candidate now requires a polished internet reputation ( net-rep ) as well. 2011

Social Networking Communities Social networking websites communities are freely accessible websites which allow individuals to create online profiles and share interests, photos, videos, contacts and much more. Subscribers email, chat, and digitally interact in a variety of ways with friends or other contacts established through existing and developing networks. Social networking communities give millions of individuals a medium for both self-expression and connection within an online environment. They provide an audience for individuals and a context for the exploration and performance of (social) identity. The majority of the most popular social networking sites are socially focused without clearly established instrumental purposes. Positives and Negatives about Social Networking Communities Apart from the social benefits, social networking sites can be used to document school research, promote artistic talents and experiment with other forms of content creation. They provide a way to interact with others who share the same interests and to get constructive feedback on ongoing projects. Along with these benefits come some risks. Most social networking sites are open to all, which means that anyone could be exposed to harassment, bullying or sexual advances. Cyber-bullying and harassment may take several forms: publicizing private instant messages, text messages or e-mails posting threatening messages posting photos that will cause embarrassment It's rare for harassment to spill over into real-world conflicts, but it can still be a cause of emotional distress. In my professional experience I know that an individual s online profile/personality is different from their real-life personality, sometimes the complete opposite. An example of this is the use of the social networking website, Second Life. The vast majority of individual s take on personalities of who they would aspire to be. Some of these individuals behave in a fashion that is not only socially unacceptable in the real world but on occasions would be considered illegal. Therein is the problem and the realisation that there is a very real need to ascertain what a person is like online, as well as in person Cybervetting. 2011

How can assist? Cybervetting policy It is important that you have a very clear and well thought out, Cybervetting policy. Failure to have such a policy may result in problems such as invasion of privacy, or inaccuracies with information obtained. can provide the expertise and experience to assist you in compiling a Cybervetting policy or reviewing any existing policy. Cybervetting service provides a comprehensive Cybervetting service. We will liaise with you and obtain the appropriate information about potential employees, provide advice on what information can be discovered and advise on any potential problems. KJB Computer Forensics Consultancy guarantees client confidentiality at all times. Cyber Vetting Report We will produce a user-friendly report together with an electronic copy of all information gathered during the Cybervetting process. The report will give you a detailed explanation of all facts gleaned during the investigation and recommendations we consider relevant. Our Expertise The Managing Director (MD) served in HM Forces for 24 years, serving with the Royal Military Police and the 1Bn Queens Own Highlanders. Following a successful military career the MD moved on to serve within law enforcement in Scotland. The MD has a Masters Degree in Computer Forensics and a wealth of experience with criminal investigations within the Scottish and English judicial system. KJB Computer Forensics examiners are experts at securing digital evidence and the investigation of all manners of digital crime. We are educated to degree level, have worked within law enforcement and are security vetted to SC level. Our evidence is produced to a standard acceptable within Scottish and English Courts. We have given oral evidence in the High Court on numerous occasions. 2011

Summary In today s modern culture we are all used to being afforded a far greater freedom of use of the internet at home and during the working day. The average person regularly uses the internet to socialise and interact with friends and family. It could be said that our use of social networking websites has increased to the point where we as a society are slowly drifting to an increasingly virtual social life. Evidence exists that shows a person s online persona can be completely different from that of their real life persona. These differences vary in extremes but have the potential to be a real threat to your business e.g. revelation of confidential company data online, damage to your company reputation etc. With these threats and the change in social trends it is important that you consider changing your vetting procedures to include Cybervetting. Cybervetting could protect your business assets and more importantly your reputation. Please do not hesitate to contact me if you require further information regarding this service. I am only to willing to meet up to discuss Cybervetting in more detail. Jim Borwick MSc Email: jim@kjbcomputerforensics.com Website: www.kjbcomputerforensics.com 2011