Legal Issues 2018 SM OnlineGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-04-01T04:00:00Z<h4>​U.S. CORRUPTION</h4><p>Nearly six in 10 Americans (58 percent) say that the level of corruption in the United States has increased in the past 12 months, according to the<a href="" target="_blank"> U.S. Corruption Barometer 2017</a>, a recent study conducted by Transparency International. Another report on U.S. corruption, issued in December by the <a href="" target="_blank">Business Anti-Corruption Portal​</a>, found that 25 percent of Americans believe that their local government officials are corrupt. That report also explores corruption in the judicial system, public services, customs administration, civil society, and more.</p><h4>BOTNETS</h4><p>Botnets are being used for a variety of malicious activities, including distributed denial of service attacks, ransomware attacks, and propaganda campaigns carried out via social media, according to <a href="">a draft report from the U.S. National Institute of Standards and Technology.​​</a></p><h4>EVENT PLANNING</h4><p>Mapping out venue details, guest lists, run-of-show information, and more is critical for planning large special events. ASIS member Eduardo Jany authored <a href="/Pages/Securing-Special-Events.aspx">"Securing Special Events,"</a> an online exclusive article for <em>Security Management</em>. He has put together several<a href="/ASIS%20SM%20Documents/Jany%20Tables.docx"> event planning document templates, </a>​as discussed in his article, and has made them available to readers.</p><h4>SCHOOL SHOOTINGS</h4><p>Engaging children in conversations about active assailants can be sensitive territory. Brad Spicer, CEO of SafePlans, who wrote this month's cover story, <a href="" target="_blank">offers advice in his blog </a>on how to explain potential active shooter events to young children.</p><h4>GUARD FORCE STATS</h4><p>Private security forces outnumber police in more than 40 countries, <a href="" target="_blank">according to research by The Guardian.</a> There are upwards of 20 million private security workers worldwide, and the global market worth is estimated to reach $240 billion by 2020. </p><h4>CYBERCRIME</h4><p>In "<a href="" target="_blank">How A Dorm Room Minecraft Scam Brought Down the Internet,​</a>" WIRED takes a look at how the Mirai botnet was created and what it means for the future of cybercrime. </p><h4>DISCRIMINATION</h4><p>A hospital will pay $400,000 and other relief to<a href="" target="_blank"> settle charges​</a> that it engaged in age discrimination when 29 employees 40 and older were fired or forced to resign.</p><h4>HARASSMENT</h4><p>A U.S. prison operator will pay $550,000 and other relief to <a href="" target="_blank">settle charges​</a> of sexual harassment and retaliation. </p><h4>COMPENSATION</h4><p>Iceland <a href="" target="_blank">enacted a new law</a> that requires some companies to prove that they compensate men and women in the same jobs equally.</p>

Legal Issues 2018 SM Online 2018 Legal Report Resources the Wheel: Stopping Distracted Driving 2018 Legal Report Review: Tradecraft Primer 2018 SM Online 2018 Legal Report Resources & Neutral in the Workplace 2018 Legal Report 2018 SM Online 2018 Legal Report Resources Review: Online Records 2018 Legal Report in China with Good Intentions 2018 Legal Report Review: Humane Policing Online January 2018 2018 Legal Report Resources

 You May Also Like... Online January 2018<h4>​SCHOOL SAFETY</h4><p>Campus security nonprofit <a href="" target="_blank">Safe Havens International </a>offers free school safety resources on its website that can be used in K-12 schools as well as for higher learning institutions. Documents include a <a href="" target="_blank">safety plan evaluation tool</a>, a building design checklist, and a sample background investigation booklet for the hiring process. Safe Havens International works with schools on national and international levels in planning, coordinating, and evaluating a wide range of school crisis simulations.</p><h4>​BIODEFENSE</h4><p>Despite a call for a united biodefense approach, U.S. federal agencies continue to face challenges in sharing threat information, according to <a href="" target="_blank">a GAO report​</a>. A <a href="" target="_blank">2016 panel on biodefense</a> contends that the U.S. vice president should lead the nation’s biodefense efforts.</p><h4>CYBER STRATEGY</h4><p>Despite awareness of cyber risks, many companies remain unprepared to deal with them, according to PricewaterhouseCoopers’ <a href="" target="_blank">The Global State of Information Security Survey 2018.​</a></p><h4>CRISIS COMMUNICATIONS</h4><p>SmartRiskSolutions GmbH <a href="" target="_blank">published a handbook​</a> with advice for crisis management and crisis communications during a terrorist attack or active shooter incident. </p><h4>ASIS ACCOLADES</h4><p>Attendees at the ASIS 2017 voted the Pelco by Schneider Electric VideoXpert Professional Video Management System an ASIS Accolades People’s Choice Award winner. The Judges Choice awardee was the intelligent security robot from Cobalt Robotics. <a href="" target="_blank">Read about all the winners.​</a></p><h4>WHISTLEBLOWING REWARDS</h4><p>Financial incentives can discourage whistleblower reporting, <a href="" target="_blank">according to a new study.​​</a></p><h4>FIRE SAFETY</h4><p>The <a href="" target="_blank">2016 Fire and Life Safety Study</a> from Consulting-Specifying Engineer surveyed its subscribers on what matters to them when selecting a fire and life safety system. ​</p><h4>EMAIL</h4><p>The U.S. Department of Homeland Security <a href="" target="_blank">issued a binding directive ​</a>that requires all U.S. agencies to adopt email and Web security guards against phishing and spam.</p><h4>BOMBING CONVICTION</h4><p><a href="" target="_blank">A jury convicted</a> Ahmad Khan Rahimi on eight charges related to bombings in New York City on September 17, 2016, which injured more than 30 people and caused millions of dollars in property damage.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465's-New-in-Access-Control.aspxWhat's New in Access Control?<p>​Innovation in access control is quietly heating up. The industry is ready to implement innovations on a broad scale that have been just out of reach. Demand for virtual credentials is growing, facial recognition technology is both technically and economically feasible, and migration to the cloud is increasing—and increasingly beneficial. Over the next few years, market adoption of these advances will transform the ways security professionals operate and organizations benefit from their access control systems. </p><p><strong>Virtual credentials and mobile access technology</strong></p><p>The demand for virtual credentials and mobile access is intensifying, driven in part by younger members of the workforce who never go anywhere without their smartphones. Suffice to say, most employees wouldn't turn their cars around for a forgotten physical credential, but they'll certainly restart their commutes to collect forgotten smartphones. </p><p>The benefits are simple: convenience, compliance, and satisfaction of workforce demand. Everyone carries their phone, security professionals enhance their management capabilities, and employees can stay on the move. By including the credential in a mobile device, embedded in an app, organizations can also provide novel security capabilities, such as threat reporting and virtual photo ID. </p><p>The good news is that virtual credentials and mobile access technology have progressed to the point that they are easier to implement. Migration is straightforward, and implementation does not need to be all-or-nothing. Instead it can be taken in phases leading to an interim hybrid approach that includes physical and virtual credentials. </p><p><strong>Facial recognition</strong></p><p>Facial recognition offers the advantage of using existing access control rules, while reducing the friction of the user experience. </p><p>Picture a busy New York City high-rise office building with turnstiles that control access to an elevator lobby. There are always a few employees who have to search their pockets or backpacks to fish out a physical credential. Implementing facial recognition eliminates that bottleneck. The software scans people as they approach the turnstile and transmits a virtual credential to the access control system. Where a line might otherwise have formed, authorized employees now pass through turnstiles efficiently. </p><p>Facial recognition access control is no longer out of reach. Today's computing power can be combined with increasingly high-definition cameras and advanced recognition algorithms to bring the costs of implementation way down. </p><p><strong>Access control in the cloud</strong></p><p>The access control server is the nerve center of an access control system, but it no longer needs to physically exist. The increasing prevalence of the cloud eliminates that necessity. </p><p>Rather than dealing with the maintenance of a physical server, the speed and convenience of the cloud can handle everything a hardware box used to. This advance allows for increased scalability. And it provides flexibility in how security professionals purchase and use access control servers. Now the integrator or manufacturer can reduce end user burden and cost by ensuring that systems are backed up and updated remotely.<strong> </strong></p><p><strong>What's next?</strong></p><p><strong></strong>Innovations in access control systems will drive the industry over the coming years. Novel credentials, such as mobile access and face recognition technology, combined with cloud-based servers will deliver an altogether improved experience. </p><p><em>John L. Moss is CEO of S2 Security.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465