Baldev Kumar Puri 508, Ansal Majestic Tower, PVR Cinema Complex, Vikaspuri New Delhi, Delhi 110018
Show Phone NumberPhone: +919891758759 Alt. Phone: +911165679392
|
|
AMX Detectives (P) Ltd.
CORPORATE SERVICES
|
|
- Pre-Employment Verifications
- Post-Employment Verifications
- Due Diligence & Credit Worthiness
- Infringement of Trademark and Copyright
- Frauds, Cheating and Embezzlements
- Under-Cover Operations
- Industrial Espionage & Counter Espionage
- Risk Analysis
|
|
» Pre-Employment Screening |
|
Employment screening for business has been our area of specialization for over a decade. Statistics show that 60% of C.V.'s (resumes) have been falsified in one way or another. These falsifications are sometimes harmless; i.e. the individual fabricates some recreational hobbies such as football or cricket so that they can demonstrate their ability to be a "team player", but there can also be serious breaches of legal or ethical boundaries. Typical examples of these are :
» Omit a previous employment record due to the loss of a job over a certain matter.
» Adding qualifications that have never been obtained.
» Fabricating the entire C.V. to attain a specific position.
When a situation arises where there is doubt as to the legitimacy of a C.V, we are able to confirm the details contained and, where necessary, check to see if any previous employment details have been omitted. We offer a full package of employment screening services including verification of credentials and references, and character evaluation. Each check will provide the most accurate and current information available, summarized and provided to you in an easy to read investigative report. These services can be provided quickly and efficiently since we understand that it is not practical to wait for a number of weeks to obtain the required information and risk losing a potentially valuable member of staff. We work with you to determine the information you need to make informed, responsible hiring decisions.
|
|
|
|
» Post-Employment Verifications |
|
» Internal fraud
» Theft by employees
» Misappropriation of information and industrial espionage
» Copyright, patent and trademark infringement
Ignoring the integrity of employees at management level could prove costly for any large company. Any employee in a significant position within the company has the potential to cause severe damage if access can be gained to databases and confidential information. Your company security is only as strong as the weakest link.
How well do you really know your employees?
What do they do after office hours?
Are they involved in a parallel business?
Are they meeting your competitors?
We can give you all the answers. Our goal is to provide fast, accurate and cost effective information as and when you require. We carry out evaluations of these employees considered to be at these "risk positions". A comprehensive report is submitted on their background, criminal record, previous employment history and education qualifications submitted to you. A detailed report on their social behavior, and known associates is also submitted giving you total peace of mind.
|
|
|
|
» Due Diligence & Credit Worthiness |
|
» Comprehensive research of public records
» In-depth personal profiles
» Reputation assessment
» Third-party interviewing
» Asset/wealth determination
Financial institutions and corporations find it is invaluable to have thorough, detailed knowledge of new business associations. AMX Detectives(P) Ltd. provides the necessary financial/operational analysis and background information which assists in taking the right decision regarding new client relationships. We can also check the competence of these subjects and compile an in-depth report into their trading practices, and other aspects of their businesses.
|
|
|
|
» Infringement of Trademark & Copyright |
|
AMX Detectives (P) Ltd. will protect your organization from counterfeit merchandise and gray market trading. We have been actively locating and purchasing counterfeit goods including but not limited to videos, software, clothing and electronics. We have established undercover trading companies that obtain data and merchandise from suspicious sources. Our network of investigators all over the country enables us to monitor the movement of these counterfeit, gray market merchandise in the country. Once discovered, we can determine the legal status, size, markets and ownership of subjects selling illegal products. Additionally, we are experienced in coordinating with law enforcement authorities to conduct raids leading to the seizure of these counterfeit goods. |
|
|
|
» Under Cover Operations |
|
Alternatively, we can monitor their movements within your organization, place investigators under-cover to work along side them and subsequently, if required, befriend them and maintain surveillance upon them outside of your organization, to establish whom their employers are.
Electronic surveillance equipment is placed on the company's premises and is monitored either on site or remotely. This involves either an employee placing the equipment in the relevant manner or a third party entering your premises and placing the equipment themselves. We have a range of electronic countermeasures to prevent meetings and telephone conversations being eavesdropped and computers being interrogated without the authority of the user. We can also provide a security survey of your premises and suggest measures that will make electronic eavesdropping virtually impossible. |
|
|
|
» Espionage & Counter Espionage |
|
It is now essential that companies guard their information more vehemently then ever. The methods involved by third parties to obtain confidential information are varied, but we have found that there are three main ways in which they employ these methods:
"Under Cover Agents" or "moles" are placed within organizations, their sole purpose being to pass information to competitors, or even worse, sell the information to the markets highest bidder. These "moles" usually take the form of either an existing employee who requires the information for his/her own purposes or has been approached by a third party with the promise of financial gain, or someone applying for a job with the sole purpose of obtaining the relevant information. We have found that there are a number of ways to locate the individuals concerned together with the methods that they employ. Following their location we can then locate their true employers and legal action can be instigated.
|
|
|
|
» Risk Analysis |
|
Risk analysis is a term that broadly defines the implementation of investigative methods to gauge potential risks. This encapsulates a variety of situations from physical protection through to information security.
All companies or organizations have physical or electronic systems in place that are designed to increase productivity and allow the smooth running of day-to-day business. Typical examples of these are standard staff procedures, bespoke communications equipment and software packages that enable the input and logging of information. We have found that most areas can be exploited and subsequently increase the risk of a serious problem.
We can perform a security audit of your organization to evaluate the potential hazards of your procedures and systems. We do this by investigating each specific area of your business and examining the way in which it works, what it's goals are and how it interacts with other areas. We concentrate on the passage of information and the physical interaction of staff with that information. Once this is complete we then compile a thorough report outlining, where necessary, areas which need improvement and the suggested methods to implement these improvements. If required, we can then assist in the implementation of these methods and any staff training that is needed.
|
CORPORATE SERVICES
Home Corporate Services Legal and Insurance services
Personal Services
|
|
| More information... | What are signs of a cheating spouse? Generally these signs are displayed unknowingly by the cheater, therefore, it is easy to spot these sudden changes in behavior. These signs should only be used as a tool to gauge your suspicions.... | Why do you need a private investigator? Private investigations are deemed legal or at least not disallowed in most of the world today. It's a known fact that the legal proceedings sometimes go inconclusive due to a lack of strong evidence. ... | How to Become a Private Investigator Though there are no formal qualifications required to become a private investigator, it is advantageous to have good general education. ... | Skip Tracing A skip tracer’s services may be required to – repossess something like a mobile home, collect outstanding debts, find life insurance beneficiaries, locate a long lost friend... | Identity Theft In 2004, over 9.9 million Americans were victims of identity theft scams and close to $5 billion were lost. ... | Process Serving The legal procedures in the United States of America require that each party involved in a case needs to be duly notified of any action that can be taken against them in a court of law... | Background Screening Companies hire services of investigating agencies or background screening agencies for a fee. Many commercial websites offer specific searches for employers based on their requirements. ... | Data Profiling Data profiling is used in security, law enforcement and intelligence operations for a variety of applications — for example, to assess "trust" for security clearances or to grant authorization etc.... | Private Detectives: Nature of Work Private detectives and investigators offer many services, including executive, corporate, and celebrity protection; pre-employment verification; and individual background profiles. ... | Miranda Warning A police warning that is given to criminal suspects... | Fictional Detectives The first two Bond film adaptations featured more investigative work than their successors... | Who is a Detective? Detective is an investigator, either a member of a police agency or a private person. Private detectives usually operate commercially and are licensed.... | |
| | | | | |
| |
|
|
|