Does your organization have an active program that conducts reference checking on employees before they are hired? Ownership of the pre-employment vetting process does not often reside with the security function within the organization. Some companies outsource background checks to third party organizations to share the task. Many of these policies are impacted by legislation, and limitations can be imposed on the use of various vetting methods.
Authorities said Thursday that they suspect at least 14 baggage handlers at Los Angeles International Airport of stealing thousands of dollars in electronics, jewelry and other high-priced items from bags and other property at the airport.
An additional 55 to 63 people have been murdered each year in Missouri following the state’s 2007 repeal of its permit-to-purchase (PTP) handgun law, which required all handgun purchasers to obtain a license verifying that they have passed a background check.
The U.S. Justice Department has accused United States Investigations Services (USIS) of filing at least 665,000 flawed background checks – about 40 percent of the total submissions – between March 2008 and September 2012.
A California lawmaker proposed legislation Monday to make background checks and gun registrations requirements for anyone who builds plastic firearms, dubbed “ghost guns,” on a 3-D printer at home. The bill, by state Sen. Kevin de Leon (D-Los Angeles), would also apply to anyone who buys parts that can be assembled into a gun, Fox News reports.
California continues to rank best in the nation for strong gun reform measures, according to a new state analysis by the Brady Campaign to Prevent Gun Violence and the Law Center to Prevent Gun Violence.
Consolidation and technological advances are changing the face of the guarding industry. How will this affect enterprise security leaders? Learn more about changes to the security officer services industry as well as the Top Guarding Firms Listing in the December 2016 edition. Also in this issue: a new financial focus on cybersecurity, what to do in your first three months as a new CSO, the ostrich style of security management, and more.