Presented By: Chris M. Wright, CPP IIA Spring Conference 2016 IRVINE, CA March 17, 2016.

Slides:



Advertisements
Similar presentations
Family Educational Rights and Privacy Act What you should know about FERPA.
Advertisements

FERPA: Family Educational Rights and Privacy Act
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
WHY ARE WE CHANGING THE POLICY? Rationale: –To maximize students learning potential via technology –To utilize the natural affinity most students possess.
Family Education Rights & Privacy Act of 1974 FERPA, You, & UC.
Confirming Eligibility for McKinney-Vento Services Christina Endres, IN State Coordinator Patricia Julianelle, NAEHCY Kathi Sheffel, Fairfax County VA.
DATING VIOLENCE, SEXUAL ASSAULT, & STALKING POLICY AND ULM Robert Hanser & Pamela Saulsberry VIOLENCE PREVENTION AND INTERVENTION PROGRAM (VPIP)
Purdue University Calumet Counseling Center Gyte
Spring 2011 Meeting April 7, 2011 Doherty Faculty Lounge, Ives Hall
Supervisor Orientation for Student Employment 2010 – 2011 Academic Year Office of Student Employment Utica College Fall 2010.
HARASSMENT, INTIMIDATION AND BULLYING POLICY AND PR0CEDURES Irvington Public Schools Staff Training School Year.
1 Office of the General Counsel FERPA  Family Educational Rights and Privacy Act (20 U.S.C § 1232g)
Student Code of Conduct Revision Process Student Code of Conduct Committee Assistant principals, parents, interventionists, AEA representatives.
1 Public Safety Advisory Committee April 24, 2013.
Cyber and Internet Safety El Rodeo School September 11, 2013.
FERPA: Family Educational Rights and Privacy Act.
FERPA Skidmore College Family Education Rights & Privacy Act What is FERPA? It is the Family Educational Rights and Privacy Act of Is also referred.
Form I-9 Process An Online Training for Supervisors and Designees Presented by Human Resources Revised November 2009.
Occupational Health and Safety Part 2 - Committees, Worker’s Rights, Worker’s Compensation.
BACKGROUND CHECKS Cooperative Extension Volunteer Program Background Reviews.
FERPA: Protect our Students by Protecting their Records Prepared by Rebekah D. Mathis-Stump, JD.
iWATCH Army Training for Contractors “See Something -- Say Something”
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
Application for Employment
Reporting Requirements for School Staff Presented by Nancy Hungerford November 30, 2011 Presented by Nancy Hungerford November 30, 2011.
Charter School Policies September 28, Adopted charter school policies should be… Guided by the school’s mission and vision Regarding finances Enrollment.
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
Student Code of Conduct 5 th Period Presentation
Harassment and Violence POLICY. POLICY This school seeks to maintain an environment that is free from: Religious Harassment Racial Harassment Sexual Harassment.
HR Legislation Update: AODA Integrated Accessibility Standards and Bill Facilitated by: Melissa Magder – Director.
Copyright © Education Compliance Group, Inc. All rights reserved. By Peggy A. Burns, Esq. and Mark Hinson, SPHR Internal Investigations & Decision-Making:
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
Session Title: FERPA: What You Need To Know Presented By: Jeffery Loggins Institution: Mississippi Valley State University September 15, 2015.
FERPA Family Educational Rights and Privacy Act A Tutorial.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Trainer: Introduces self.
MODULE 3 Composition & Roles. TAT TEAM APPROACH UPON COMPLETION OF THIS MODULE, PARTICIPANTS SHOULD UNDERSTAND: 3 – 2  Composition of the Threat Assessment.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
“REAL WORLD CRUSADES AGAINST CYBER BULLING” “This Ain’t No Bull”
Dignity for All Students Act & Sexual Harassment Avoidance Annual Training.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Act 861 of Summary Act 861 of the 2012 Regular Legislative Session required the LDOE, in collaboration with BESE, to develop procedures and regulations.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Crisis Management and Communication Dr. Joy Smith and Ms. Robin Denny.
Going live at ______________Schools on [DATE]. At ______ Schools we are committed to providing a safe and secure environment for all of our students,
Going live at [INSTITUTION] on [DATE]. At [INSTITUTION] we are committed to providing a safe and secure environment for all of our students, faculty.
Sgt. Melissa Holbrook Houston Police Department  Read report  Run criminal history check  Run location history for prior calls for service  Run check.
Employment Service Complaint System Part I: The Basics.
Retha E. Karnes, J.D., General Counsel Tel:
Hourly Student Employees Getting Them Hired & Records Management Best Practices.
Safe and Clean Campaign Hampton City Council March 12, 2014.
Teresa Brown Open Records Supervisor Plano Police Department
Dropout/ Leaver Updates and Procedures
Dating Violence and Abuse SRCSB Policy 5.325
2017.
Bulkeley Middle School
Waterbury public schools professional development
Myka Held Staff Attorney, LAF Children and Families Practice Group
Safety Town Hall P.S. 11 September 21, 2018.
2016.
Act 861 of 2012.
Getting Kids Connected with
The Issues with Technology in education
2015.
Health Insurance Portability and Accountability Act
Act 861 of 2012.
Developing a Firearm Surrender Protocol
Presentation transcript:

Presented By: Chris M. Wright, CPP IIA Spring Conference 2016 IRVINE, CA March 17, 2016

 Security and safety issues  Alarms, lighting, access control, cameras  Guard Services  Hew Hires  Privacy in the academic setting  Where do I found out about _______?  Vandalism, Graffiti  Workplace violence, bullying, cyber threats

 Middle manager of a federally funded grant program embezzled in excess of $100,000 by way of:  Enrolling “Ghost Students”  Enrolling family members  Not distributing entitlements to qualified students  Attending 63 conferences in 2 yrs  Creating a hostile work environment  Stealing equipment

 The manager was placed on administrative leave and paid her full salary while the investigation was on-going.

 Senior Manager was having her personal mail stolen.  HR person followed  Drive-bys occurring with regularity at the residence of HR Manager  Four students assaulted on campus of which two of them where “whistle blowers”  Students were receiving threatening phone calls and text messages at odd hours. Calls originated from the office on campus for the program.

 Initial interviews conducted by HR with the students of the program  All personal file information  Full cooperation in the form of a Letter of Authority from highest ranking college official

 Two prong approach  Security for victims (students and staff)  Investigation into the embezzlement

 Identify victims and perpetrators  Obtain all personal information on both (full names, addresses, social security numbers, dates of birth, all phone numbers, addresses, next of kin, vehicles owned)  Review their personnel file or student record  Full and complete backgrounds on all the principals and suspects to determine:  Capability  Revenue  Previous history of violence  Behaviors, attitudes, mindsets  Surveillance to determine day to day activities and observe behavior  Interview all available personnel in the offices of the program and any students willing to come forward

 Google Earth all home and work locations  Sit down with the victims and their family/home members and explain the situation and what is going to happen, why and give them phone and contact info for their needs  Set up protection based on need for the individual and family members  Identify the needs for each of the victims and start training them on protecting themselves in order to establish their ‘NEW NORMAL’.

 Provided real time GPS tracking devices so we knew where people were at all times  Used a military approach to getting to victims when we needed to and before the perpetrators  Purchased cell phones, bus passes, laptops in order to facilitate the ability to contact the victims whenever we needed to  Used security technology (cameras, drones, snakes) to help us with our work  Monitoring of social media sites for info and review of if still available to perpetrators if they are still on campus.  Kept local law enforcement in the loop of our activities for the time when the perpetrators would call the police on us to assist them in terminating our investigation and surveillance.  Maintained a presence for a year on the perps.

 Once law enforcement is brought in we are OUT OF THE LOOP. We now have to do our work with some restrictions but use the political clout of your district if local law enforcement is not cooperative in giving you a heads up on things that may impact the work.  Hand hold the victims through this transition of depositions, court hearings and the trial.

Chris M. Wright, CPP The Wright Group, Inc