Legal Issues

 

 

https://sm.asisonline.org/Pages/SM-Online-August-2018.aspxSM Online August 2018GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-08-01T04:00:00Z<h4>​EUROPEAN TERRORISM</h4><p><a href="https://www.europol.europa.eu/activities-services/main-reports/european-union-terrorism-situation-and-trend-report-2018-tesat-2018" target="_blank">The EU Terrorism Situation and Trend Report 2018 ​</a>provides an overview of the nature and volume of terrorist attacks in the EU in 2017.</p><h4>INFORMATION SECURITY</h4><p>The U.S. Department of Commerce's National Institute of Standards and Technology<a href="https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/draft" target="_blank"> issued a draft update to its Risk Management Framework​</a> to help organizations integrate information security principles and practices into enterprise risk management programs. </p><h4>SCHOOL SECURITY PLANS</h4><p>A <a href="https://www.gao.gov/assets/680/675737.pdf" target="_blank">report from the U.S. Government Accountability Office​</a> evaluates the number of schools requiring hazard-specific plans, such as active shooter, suicide threat or incident, and bomb threats, among others. </p><h4>CYBER STRATEGY</h4><p>The U.S. Department of Homeland Security h<a href="https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf" target="_blank">as released its cybersecurity strategy​</a> for the next five years.</p><h4>GLOBAL FRAUD</h4><p><a href="https://www.acfe.com/report-to-the-nations/2018/" target="_blank">Report to the Nations</a> from the Association of Certified Fraud Examiners looks at 2,690 cases of fraud in 125 countries. It explores the costs, schemes, victims, and perpetrators of fraud. Another report, <a href="https://www.bottomline.com/uk/resources/resource-center/research-reports/uk-business-payments-barometer-2017/" target="_blank">UK Business Payments Barometer 2017</a>, focuses on fraud in the United Kingdom.</p><h4>U.S. IMMIGRATION</h4><p>Two <a href="https://www.oig.dhs.gov/sites/default/files/assets/2018-03/OIG-18-58-Mar18.pdf">federal reports </a>detail<a href="https://www.gao.gov/products/GAO-17-486T" target="_blank"> the challenges </a>faced by U.S. immigration services to issue and manage green cards.</p><h4>DRESS CODES</h4><p><a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/708139/dress-code-guidance-may2018.pdf" target="_blank">New guidelines​</a> from the United Kingdom Government Equalities Office prohibit employees from singling out women in dress codes. </p><h4>RETENTION</h4><p>A former CIA contractor<a href="https://www.justice.gov/opa/pr/former-cia-contractor-pleads-guilty-illegally-retaining-classified-materials" target="_blank"> pleaded guilty</a> to illegally retaining classified materials during the course of his employment.</p>

Legal Issues

 

 

https://sm.asisonline.org/Pages/SM-Online-August-2018.aspx2018-08-01T04:00:00ZSM Online August 2018
https://sm.asisonline.org/Pages/August-2018-Legal-Report-Resources.aspx2018-08-01T04:00:00ZAugust 2018 Legal Report Resources
https://sm.asisonline.org/Pages/August-2018-Legal-Report.aspx2018-08-01T04:00:00ZAugust 2018 Legal Report
https://sm.asisonline.org/Pages/A-Screening-Minefield.aspx2018-08-01T04:00:00ZA Screening Minefield
https://sm.asisonline.org/Pages/July-2018-Legal-Report.aspx2018-07-01T04:00:00ZJuly 2018 Legal Report
https://sm.asisonline.org/Pages/July-2018-Legal-Report-Resources.aspx2018-07-01T04:00:00ZJuly 2018 Legal Report Resources
https://sm.asisonline.org/Pages/June-2018-Legal-Report.aspx2018-06-01T04:00:00ZJune 2018 Legal Report
https://sm.asisonline.org/Pages/June-2018-SM-Online.aspx2018-06-01T04:00:00ZJune 2018 SM Online
https://sm.asisonline.org/Pages/June-2018-Legal-Report-Resources.aspx2018-06-01T04:00:00ZJune 2018 Legal Report Resources
https://sm.asisonline.org/Pages/Taking-Flight.aspx2018-05-01T04:00:00ZTaking Flight
https://sm.asisonline.org/Pages/May-2018-Legal-Report.aspx2018-05-01T04:00:00ZMay 2018 Legal Report
https://sm.asisonline.org/Pages/Banks-Balk-on-Bud.aspx2018-05-01T04:00:00ZBanks Balk on Bud
https://sm.asisonline.org/Pages/May-2018-SM-Digital.aspx2018-05-01T04:00:00ZMay 2018 SM Online
https://sm.asisonline.org/Pages/April-2018-SM-Online.aspx2018-04-01T04:00:00ZApril 2018 SM Online
https://sm.asisonline.org/Pages/April-2018-Legal-Report-Resources.aspx2018-04-01T04:00:00ZApril 2018 Legal Report Resources
https://sm.asisonline.org/Pages/Stopping-Distracted-Driving.aspx2018-04-01T04:00:00ZBehind the Wheel: Stopping Distracted Driving
https://sm.asisonline.org/Pages/April-2018-Legal-Report.aspx2018-04-01T04:00:00ZApril 2018 Legal Report
https://sm.asisonline.org/Pages/Book-Review---Tradecraft-Primer.aspx2018-04-01T04:00:00ZBook Review: Tradecraft Primer
https://sm.asisonline.org/Pages/March-2018-SM-Online.aspx2018-03-01T05:00:00ZMarch 2018 SM Online
https://sm.asisonline.org/Pages/March-2018-Legal-Report-Resources.aspx2018-03-01T05:00:00ZMarch 2018 Legal Report Resources

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/SM-Online-January-2018.aspxSM Online January 2018<h4>​SCHOOL SAFETY</h4><p>Campus security nonprofit <a href="http://safehavensinternational.org/" target="_blank">Safe Havens International </a>offers free school safety resources on its website that can be used in K-12 schools as well as for higher learning institutions. Documents include a <a href="http://safehavensinternational.org/wp-content/uploads/2014/08/K12_School_Crisis_Site_Planning_Evaluation_Tool.pdf" target="_blank">safety plan evaluation tool</a>, a building design checklist, and a sample background investigation booklet for the hiring process. Safe Havens International works with schools on national and international levels in planning, coordinating, and evaluating a wide range of school crisis simulations.</p><h4>​BIODEFENSE</h4><p>Despite a call for a united biodefense approach, U.S. federal agencies continue to face challenges in sharing threat information, according to <a href="https://www.gao.gov/products/GAO-18-155" target="_blank">a GAO report​</a>. A <a href="http://www.biodefensestudy.org/biodefense-indicators" target="_blank">2016 panel on biodefense</a> contends that the U.S. vice president should lead the nation’s biodefense efforts.</p><h4>CYBER STRATEGY</h4><p>Despite awareness of cyber risks, many companies remain unprepared to deal with them, according to PricewaterhouseCoopers’ <a href="https://www.pwc.com/us/en/cybersecurity/information-security-survey.html" target="_blank">The Global State of Information Security Survey 2018.​</a></p><h4>CRISIS COMMUNICATIONS</h4><p>SmartRiskSolutions GmbH <a href="http://www.smartrisksolutions.de/assets/handbook-crisis-management-crisis-communication-terrorist-attack-active-shooter.pdf" target="_blank">published a handbook​</a> with advice for crisis management and crisis communications during a terrorist attack or active shooter incident. </p><h4>ASIS ACCOLADES</h4><p>Attendees at the ASIS 2017 voted the Pelco by Schneider Electric VideoXpert Professional Video Management System an ASIS Accolades People’s Choice Award winner. The Judges Choice awardee was the intelligent security robot from Cobalt Robotics. <a href="https://securityexpo.asisonline.org/expo/Pages/Accolades-.aspx" target="_blank">Read about all the winners.​</a></p><h4>WHISTLEBLOWING REWARDS</h4><p>Financial incentives can discourage whistleblower reporting, <a href="http://aaajournals.org/doi/abs/10.2308/ajpt-51663?code=aaan-site" target="_blank">according to a new study.​​</a></p><h4>FIRE SAFETY</h4><p>The <a href="https://www.csemag.com/fileadmin/content_files/cse/Consulting-Specifying_Engineer_2016_Fire_and_Life_Safety_Report.pdf" target="_blank">2016 Fire and Life Safety Study</a> from Consulting-Specifying Engineer surveyed its subscribers on what matters to them when selecting a fire and life safety system. ​</p><h4>EMAIL</h4><p>The U.S. Department of Homeland Security <a href="https://www.cyberscoop.com/dhs-dmarc-mandate/" target="_blank">issued a binding directive ​</a>that requires all U.S. agencies to adopt email and Web security guards against phishing and spam.</p><h4>BOMBING CONVICTION</h4><p><a href="https://www.justice.gov/usao-sdny/press-release/file/911021/download" target="_blank">A jury convicted</a> Ahmad Khan Rahimi on eight charges related to bombings in New York City on September 17, 2016, which injured more than 30 people and caused millions of dollars in property damage.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/What's-New-in-Access-Control.aspxWhat's New in Access Control?<p>​Innovation in access control is quietly heating up. The industry is ready to implement innovations on a broad scale that have been just out of reach. Demand for virtual credentials is growing, facial recognition technology is both technically and economically feasible, and migration to the cloud is increasing—and increasingly beneficial. Over the next few years, market adoption of these advances will transform the ways security professionals operate and organizations benefit from their access control systems. </p><p><strong>Virtual credentials and mobile access technology</strong></p><p>The demand for virtual credentials and mobile access is intensifying, driven in part by younger members of the workforce who never go anywhere without their smartphones. Suffice to say, most employees wouldn't turn their cars around for a forgotten physical credential, but they'll certainly restart their commutes to collect forgotten smartphones. </p><p>The benefits are simple: convenience, compliance, and satisfaction of workforce demand. Everyone carries their phone, security professionals enhance their management capabilities, and employees can stay on the move. By including the credential in a mobile device, embedded in an app, organizations can also provide novel security capabilities, such as threat reporting and virtual photo ID. </p><p>The good news is that virtual credentials and mobile access technology have progressed to the point that they are easier to implement. Migration is straightforward, and implementation does not need to be all-or-nothing. Instead it can be taken in phases leading to an interim hybrid approach that includes physical and virtual credentials. </p><p><strong>Facial recognition</strong></p><p>Facial recognition offers the advantage of using existing access control rules, while reducing the friction of the user experience. </p><p>Picture a busy New York City high-rise office building with turnstiles that control access to an elevator lobby. There are always a few employees who have to search their pockets or backpacks to fish out a physical credential. Implementing facial recognition eliminates that bottleneck. The software scans people as they approach the turnstile and transmits a virtual credential to the access control system. Where a line might otherwise have formed, authorized employees now pass through turnstiles efficiently. </p><p>Facial recognition access control is no longer out of reach. Today's computing power can be combined with increasingly high-definition cameras and advanced recognition algorithms to bring the costs of implementation way down. </p><p><strong>Access control in the cloud</strong></p><p>The access control server is the nerve center of an access control system, but it no longer needs to physically exist. The increasing prevalence of the cloud eliminates that necessity. </p><p>Rather than dealing with the maintenance of a physical server, the speed and convenience of the cloud can handle everything a hardware box used to. This advance allows for increased scalability. And it provides flexibility in how security professionals purchase and use access control servers. Now the integrator or manufacturer can reduce end user burden and cost by ensuring that systems are backed up and updated remotely.<strong> </strong></p><p><strong>What's next?</strong></p><p><strong></strong>Innovations in access control systems will drive the industry over the coming years. Novel credentials, such as mobile access and face recognition technology, combined with cloud-based servers will deliver an altogether improved experience. </p><p><em>John L. Moss is CEO of S2 Security.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465