Cyber Vetting Employees & Candidates KJB Computer Forensics Consultancy
Background Since the beginning of the century the ease and speed of electronically searching for information on an individual has become dramatically easier. This is due to the increased use of the internet, availability of the internet and the availability of internet search engines. Nowadays the majority of individuals appear to be more at ease interacting socially via the internet than they are face to face. It is this very fact that should encourage us to explore employees or potential employees online social profiles Cybervetting. The aim of this paper is to explain what a Cybervetting check involves and how KJB Computer Forensics Consultancy can assist you. What is Cybervetting? Cybervetting is a process of assessing a person s suitability for employment within a company using information found on the internet. Cybervetting is a very useful extension to the normal vetting procedures conducted during the interview process, as part of an employee s annual appraisal or as part of your company s ongoing security review of employee internet use during work hours. When employee s access social networking websites on your company network; do you know what they are accessing and what are they saying about your company online? Is your company s reputation being damaged by disgruntled employees? Cybervetting canl help protect your Company s reputation. Why is Cybervetting different from any other background checks? Cybervetting is the process by which we use publicly available online tools or sites to search through social networking communities to gather information about current or future employees. Cybervetting has the potential to reveal more information on a person than the traditional reference. Anyone that has ever read someone else s CV will agree that a CV can sometimes appear to be too good to be true. Various surveys over the years continue to show up to 50% of job applicants lie on their CV s. Traditional forms of candidate persuasion the power suit, polished CV, great covering letter and the right connections are fast becoming a thing of the past. A candidate now requires a polished internet reputation ( net-rep ) as well. 2011
Social Networking Communities Social networking websites communities are freely accessible websites which allow individuals to create online profiles and share interests, photos, videos, contacts and much more. Subscribers email, chat, and digitally interact in a variety of ways with friends or other contacts established through existing and developing networks. Social networking communities give millions of individuals a medium for both self-expression and connection within an online environment. They provide an audience for individuals and a context for the exploration and performance of (social) identity. The majority of the most popular social networking sites are socially focused without clearly established instrumental purposes. Positives and Negatives about Social Networking Communities Apart from the social benefits, social networking sites can be used to document school research, promote artistic talents and experiment with other forms of content creation. They provide a way to interact with others who share the same interests and to get constructive feedback on ongoing projects. Along with these benefits come some risks. Most social networking sites are open to all, which means that anyone could be exposed to harassment, bullying or sexual advances. Cyber-bullying and harassment may take several forms: publicizing private instant messages, text messages or e-mails posting threatening messages posting photos that will cause embarrassment It's rare for harassment to spill over into real-world conflicts, but it can still be a cause of emotional distress. In my professional experience I know that an individual s online profile/personality is different from their real-life personality, sometimes the complete opposite. An example of this is the use of the social networking website, Second Life. The vast majority of individual s take on personalities of who they would aspire to be. Some of these individuals behave in a fashion that is not only socially unacceptable in the real world but on occasions would be considered illegal. Therein is the problem and the realisation that there is a very real need to ascertain what a person is like online, as well as in person Cybervetting. 2011
How can assist? Cybervetting policy It is important that you have a very clear and well thought out, Cybervetting policy. Failure to have such a policy may result in problems such as invasion of privacy, or inaccuracies with information obtained. can provide the expertise and experience to assist you in compiling a Cybervetting policy or reviewing any existing policy. Cybervetting service provides a comprehensive Cybervetting service. We will liaise with you and obtain the appropriate information about potential employees, provide advice on what information can be discovered and advise on any potential problems. KJB Computer Forensics Consultancy guarantees client confidentiality at all times. Cyber Vetting Report We will produce a user-friendly report together with an electronic copy of all information gathered during the Cybervetting process. The report will give you a detailed explanation of all facts gleaned during the investigation and recommendations we consider relevant. Our Expertise The Managing Director (MD) served in HM Forces for 24 years, serving with the Royal Military Police and the 1Bn Queens Own Highlanders. Following a successful military career the MD moved on to serve within law enforcement in Scotland. The MD has a Masters Degree in Computer Forensics and a wealth of experience with criminal investigations within the Scottish and English judicial system. KJB Computer Forensics examiners are experts at securing digital evidence and the investigation of all manners of digital crime. We are educated to degree level, have worked within law enforcement and are security vetted to SC level. Our evidence is produced to a standard acceptable within Scottish and English Courts. We have given oral evidence in the High Court on numerous occasions. 2011
Summary In today s modern culture we are all used to being afforded a far greater freedom of use of the internet at home and during the working day. The average person regularly uses the internet to socialise and interact with friends and family. It could be said that our use of social networking websites has increased to the point where we as a society are slowly drifting to an increasingly virtual social life. Evidence exists that shows a person s online persona can be completely different from that of their real life persona. These differences vary in extremes but have the potential to be a real threat to your business e.g. revelation of confidential company data online, damage to your company reputation etc. With these threats and the change in social trends it is important that you consider changing your vetting procedures to include Cybervetting. Cybervetting could protect your business assets and more importantly your reputation. Please do not hesitate to contact me if you require further information regarding this service. I am only to willing to meet up to discuss Cybervetting in more detail. Jim Borwick MSc Email: jim@kjbcomputerforensics.com Website: www.kjbcomputerforensics.com 2011