Rainer Melucci 313 Avenue J. Brooklyn, NY 11230
Show Phone NumberPhone: 718 338-2640 Alt. Phone: 212 354-0510
|
|
Rainer A. Melucci P.I.
Company SafeguardsGetting Down to Basics
-
Obtain support for information security from senior management.
-
Do not waste resources protecting that which does not require protection.
-
Identify which information should be protected and for how long.
-
If extremely sensitive, material should be hand-carried or transmitted using encryption techniques.
-
To dispose of sensitive material, shred or make it unreadable.
-
Valuable company information must not be left unattended in hotel rooms. This includes hardcopy and computer disks
-
E-mail and voicemail passwords must be protected and changed frequently.
-
All sensitive materials must be removed from conference rooms and chalkboards and whiteboards erased after meetings.
-
Where possible, conduct background investigations on all individuals with access to sensitive information.
-
Obtain nondisclosure agreements from employees, vendors, and others with access to proprietary information.
Taking the Next Step
-
Determine the monetary/competitive value of your information.
-
Develop information safeguarding guidelines that are practical and user friendly
-
Get user input and buy-in when developing an information security program.
-
Ask knowledgeable employees what should be protected; they know the market and the competition.
-
Form a partnership with the organization's legal and information systems departments to better address information security issues.
-
identify and get the cooperation of senior stakeholders in key areas, such as technology, finance, personnel, and marketing.
-
Train and periodically remind-from the first day of work through the exiting process--the appropriate people why certain information needs protection and of the guidelines used to protect it.
-
Work with management to decide what access will be given consultants, subcontractors, and joint-venture partners.
-
Partner with the legal department and others to develop a process to review employee publications, such as papers and speeches including those to be placed on the Internet.
-
Ask new employees if they are obligated under any confidentiality or nondisclosure agreements.
-
Use annual performance reviews to remind employees of their obligations.
Always Remember
-
The disgruntled employee is the greatest threat to your organization.
-
Telephone conversations, both fixed and mobile, are vulnerable to intercept.
-
Information regarding the movement of your company aircraft, including routes and destinations, is available for sale on the Internet.
-
Be knowledgeable of your organization's physical assets, information assets, and vulnerabilities.
Company Safeguards
Home Security What We Do
|
|
| More information... | What are signs of a cheating spouse? Generally these signs are displayed unknowingly by the cheater, therefore, it is easy to spot these sudden changes in behavior. These signs should only be used as a tool to gauge your suspicions.... | Why do you need a private investigator? Private investigations are deemed legal or at least not disallowed in most of the world today. It's a known fact that the legal proceedings sometimes go inconclusive due to a lack of strong evidence. ... | How to Become a Private Investigator Though there are no formal qualifications required to become a private investigator, it is advantageous to have good general education. ... | Skip Tracing A skip tracer’s services may be required to – repossess something like a mobile home, collect outstanding debts, find life insurance beneficiaries, locate a long lost friend... | Identity Theft In 2004, over 9.9 million Americans were victims of identity theft scams and close to $5 billion were lost. ... | Process Serving The legal procedures in the United States of America require that each party involved in a case needs to be duly notified of any action that can be taken against them in a court of law... | Background Screening Companies hire services of investigating agencies or background screening agencies for a fee. Many commercial websites offer specific searches for employers based on their requirements. ... | Data Profiling Data profiling is used in security, law enforcement and intelligence operations for a variety of applications — for example, to assess "trust" for security clearances or to grant authorization etc.... | Private Detectives: Nature of Work Private detectives and investigators offer many services, including executive, corporate, and celebrity protection; pre-employment verification; and individual background profiles. ... | Miranda Warning A police warning that is given to criminal suspects... | Fictional Detectives The first two Bond film adaptations featured more investigative work than their successors... | Who is a Detective? Detective is an investigator, either a member of a police agency or a private person. Private detectives usually operate commercially and are licensed.... | |
| | | | | |
| |
|
|
|