Home
 > search for

Featured Documents related to »  criminal investigations


Not Just Words: Enforce Your E-mail and Web Acceptable Usage Policies
Unmanaged employee use of e-mail and the Web can subject your organization to costly risks including litigation, regulatory investigations, and public

criminal investigations  related to civil and criminal investigations into the marketing of the antipsychotic drug Zyprexa. With negotiations over Lilly's alleged marketing improprieties reaching more than $1 billion (in addition to the $1.2 billion Lilly had already paid to settle 30,000 individual lawsuits), the pharmaceutical giant was eager to keep the settlement talks under wraps. Given the secrecy surrounding the negotiations, company officials were understandably shocked when contacted by a reporter preparing to publish Read More...
Business Process Outsourcing (BPO)
Business process outsourcing (BPO) services manage critical front- and back-office processes that can include human resources and accounting as well as customer-related services such as contact cen...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » criminal investigations


How to Defend Against New Botnet Attacks
In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against@and

criminal investigations  down when evidence of criminal activities originating from its network were uncovered by law enforcement officials. Investigations by security researchers found that McColo Corporation had become the preferred home of many botnet command and control servers. McColo Corporation was believed to have provided services to some of the world’s largest cyber criminal operations by hosting a variety of servers that enable billions of dollars worth of illegal activities. It is estimated that as much as 75 Read More...
Los Alamos Loses Top-Secret Information, Again!
Another security compromise occurred at Los Alamos National Laboratories last month when two hard drives containing top-secret nuclear information disappeared

criminal investigations  of employment, and possible criminal investigations. Figure 3. The mission of enhancing Global Nuclear Security at Los Alamos has backfired. Read More...
Study Shows: FBI Alienates Industry Security Experts
A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best

criminal investigations  of non-qualified information of criminal activity does the FBI purchase? Case 5 : A security expert spent an enormous amount of time doing forensic work and analysis in tracking down a well-publicized hacking incident. The information was reported to the FBI, only to have the FBI take credit for doing the expert analysis, while never paying a cent for consulting services. Case 6 : A security contractor who was working for a federal agency had the website that he was administering defaced by a cyber Read More...
Recruiting Trends: 4 Methods for Finding the Right Talent
When it comes to finding the right talent, today’s organizations have plenty of options. With the increasing popularity of social networking, however, companies

criminal investigations  on all job applicants’ criminal history and work records, including current and past employment, performance, attendance, and reasons for leaving a job. In high-security positions or positions of trust (e.g., in schools, hospitals, airports, or government), employee screening is a must. Depending on the type of position, employee screening and background checks can also include drug or alcohol testing, fingerprint investigation, and credit score. Background checks are also used to investigate potential Read More...
At Least Your Boss Can't Read Your Home E-mail, Right? Wrong!
A lower-court judge in St. Paul granted a subpoena to Northwest Airlines allowing them the search the home computers of employees for evidence of allegedly

criminal investigations  and searched in various criminal matters, and former CIA Director John Deutch lost his security clearance for keeping classified material on an unsecured home computer. The precise permissibility of this kind of search depends on detailed rules of evidence and procedure, and will probably find its way at least to an Appellate Court level. With the advocacy group Public Citizen assisting in the defense, it is possible that the case may eventually be brought to the Supreme Court; Public Citizen had already Read More...
Are Your Company Laptops Truly Secure?
The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and

criminal investigations  of these statutes include criminal penalties for those found to be negligent. COMPLIANCE AND THE LAW To ensure regulatory compliance, organizations must be able to protect data, track hardware (and users), provide auditing capabilities and maintain historical records. While many of the statutes apply to an entire enterprise, it is often mobile assets such as laptop computers that are the most difficult to track. In fact, a 2003 study by the Gartner Group suggests that most organizations are only able to Read More...
Best Practices for Secure Desktop-based Information Search in the Enterprise
Knowledge workers by the millions are leveraging desktop search (DTS) tools. However, with change comes risk, and failing to proactively establish policies and

criminal investigations  in significant civil and criminal liabilities. But by following a few basic principles, companies can realize the full benefits of this new technology, while enhancing their information security. Read More...
Service Productization
Productization of services is accomplished by associating tangible features with intangible service offerings. Tangible features may take the form of personnel,

criminal investigations  advice could lead to criminal charges. As a result of these high stakes, prospective buyers of professional services want evidence - or at least some assurance - of probable success. At the root of this need for assurance is credibility - credibility of the firm, of the people in the firm, and of the service offering itself. By productizing a service offering, the professional services firm is, in effect, improving the credibility of the offering by making it more tangible, thus providing a glimpse into Read More...
Global Trade Hits Home at MegaResistCap-Part II: A Little Knowledge Goes a Long Way
When we left Jim, it was 7 pm, Sunday night. Jim, director of IT at MegaResistCap, had received a message from his CIO. The company’s legal counsel wanted to

criminal investigations  amount of the transaction. Criminal violations carry a penalty of up to $1 million (USD) per violation and imprisonment for up to 20 years! The clock was ticking. It well past 9 pm and Jim hadn’t started looking at software solutions, but he realized it was critical to do the background research before proceeding with any solution recommendations. He also reviewed the ERP implementation contract and realized that MegaResistCap’s ERP implementation didn’t include global trade management (GTM) Read More...
Antivirus Software: Market Review
Computer viruses are spreading through the Internet at an unprecedented rate and the antivirus market is now a $3 billion (USD) a year industry. This report

criminal investigations  Software: Market Review Executive Summary Computer viruses are spreading through the Internet at an unprecedented rate and the antivirus market is now a $3 billion (USD) a year industry. This report measures the financial health and product quality of four key industry players: Symantec, McAfee, Computer Associates, and Trend Micro. Market Overview and Background In the global antivirus market, the four market leaders currently seem to be Symantec , McAfee , Computer Associates , and Trend Micro Read More...
SoftBrands' Recovery Softens the AremisSoft Bankruptcy Blow
SoftBrands believes it has finally repositioned itself for growth going forward by capitalizing on the reputation of Fourth Shift, coming to an arrangement with

criminal investigations  action against AremisSoft and criminal complaints against certain of its former officers. AremisSoft's new management, which is Softbrands' current management, was tapped to help investigate these issues and to operate the businesses AremisSoft had acquired. After substantial forensic accounting work, the new management was (not surprisingly) unable to fully substantiate AremisSoft's operations as reported in 2000. Consequently, the class action lawsuits and enforcement proceedings led AremisSoft to file Read More...
BI Principles for Another Kind of Intelligence
Traditional business intelligence (BI) and analytics applications aim to support the decision-making process of a company. By analyzing large amounts of data

criminal investigations  such as fraud analysis, criminal investigations, and brand protection. Xanalys products can perform analysis of an extensive amount of unstructured data sources, and provide specific functionality for managing an investigation. Xanalys offers three main products: PowerCase —the complete suite for conducting investigations Link Explorer —a desktop-based application for data consolidation, exploration, and modeling XIM —an incident management product Industries such as banking and finance, Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others