DOES YOUR EMPLOYEE SCREENING POLICY COVER ALL PEOPLE ACCESSING YOUR BUSINESS? Jenny Reid August 2012.

Slides:



Advertisements
Similar presentations
© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010.
Advertisements

1 1 State of Oregon Identity and Access Management John Radford, State Controller Department of Administrative Services State Controllers Division.
Professional Hiring Automation and Workflow
Joint Commission Management of Human Resources Leadership Meeting September 22, 2010.
How JCPenney is Managing Corporate Risk
Introducing a Contact Centre Learnership for UNEMPLOYED young people.
Transportation/Fleet Safety and Environmental Safety Travel - Hazardous Materials Transportation Security- Sandra J. Perry Consulting Services & Treatment.
Supplier Ethics: Program Checklist
Anatomy of Total Hospital Security Presented by: H. Edward Creamer Security Assessments International, Inc. June 16, 2005.
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
Chapter 2 Modern Private Security
SMS Implications for Education Jim Dow Chief, Flight Training & Examinations Transport Canada Presentation to National Training Aircraft Symposium
Fraud Prevention and Investigation Branch. Fraud Prevention- Everyone’s Responsibility.
PEOPLE RISK MANAGEMENT Jenny Reid Director The problem with human resources Is that they are human, with all that entails. Truthfully, the human condition.
Peer Reviews. 2  Strengths and/or Best Practices across multiple Sites ◦ Internal customers involved in Acq. Planning (3) ◦ Leveraging buying power.
Performance Audit Fraud management in local government Report 19: David Toma Manager 24 July 2015.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Verification Analyst Qualifications Verification Agencies Workshop 5-8 September 2006 Facilitator: Theo Lombard.
Lesson 7.3 PROTECT YOUR BUSINESS
Destruction Standards & Compliance Presented by: Chris Parker, V.P. Operations Stevens & Stevens Business Records Management, Inc.
Corporate Fraud Discovery & Prevention. What is Corporate Fraud? May 9, 2013 – AT&T Pays FCC $18.25 Million to Settle IP Relay Fraud Claims November 7,
Accessible, Practical Learning for Staff Induction and General Health & Safety Awareness Welcome to ‘Getting Started in Health and Safety’
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Help Desk Introduction to Computer User Support. 2 Certificate III Software Applications Introduction to Computer User Support Increased Need for User.
SECURITY – A CORE BUSINESS ACTIVITY Supply Chain Awareness Pass Application and Vetting Process.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Application Forms. 2 HR Planning Job analysis Job specification Job Description Job Advertisement How to apply? Application or Resume/CV.
Humanitarian Assistance Authorities: When Disasters and Crises Strike: Tackling Fraud ASMC Conference Orlando,Florida June 3, 2010 KPMG FORENSIC SM.
Head Start of Greater Dallas Accident Prevention Training Objective Loss Trends Accident Prevention Processes Accident Reporting Accident Investigations.
Getting Started in Health & Safety. The package is aimed at people who are looking for an introduction to good practice Health & Safety based on UK/EU.
 Is the process of conducting an exhaustive physical examination and thorough inspection of all operational systems and procedures of a facility.
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter #16 Orientation for Security Officers Security Supervision and Management.
Public Procurement Uinsinn Finn Galway County Council Roads, Transportation, Marine.
Fraud and corruption prevention on-line tools and techniques Dr Robert Lang Chief Executive Officer.
Retail Certificate III 2010  Introductions  Name Name  What do you want to do in the future?  Course overview  Unit overview  Assessments  Review.
Practical Approaches for Engaging Youth Serving Organizations and Schools in Child Sexual Abuse Prevention.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
August 21 th, 2007 Board of Directors Meeting Semi-Annual Audit, Compliance, and Enterprise Risk Management Update Steve Byone Chief Financial Officer.
fraud and corruption module
Purpose of Volunteer Selection The primary purpose of volunteer screening is the protection of the youth enrolled in our programs, our volunteers and our.
Human resources Power from your People. Human resources The people who staff and operate an organization.
Risk Management for Small & Medium Sized Enterprises
BSBPMG408A Apply Contract and Procurement Procedures Apply Contract and Procurement Procedures Unit Guide C ertificate IV in Project Management Qualification.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Customs & Trade Solutions, Inc © Developing A Training Program WESCCON October 16, 2004.
Ken Bramlett, Georgia State Registrar PHYSICAL SECURITY Presentation to NAPHSIS Distance Learning Webinar February 17, 2011.
MINE SAFETY MANAGEMENT PLAN. DIRECTORATE GENERAL OF MINES SAFETY DGMS n It is recommended that mines be required to put in place Mine Safety Management.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
CCTV SECURITY & MONITORING SERVICES DAY SEVEN TECHNOLOGY CONSULT DSTC Monitoring Services Ltd DSTC.
CO – CART Project Status Protocol Revision Subcommittee Update 08/17/2006.
Candidate Verification Quality of Hire Presented by Marita Mutemi HR’s Networking Forum 5 st May 2016.
NCSLI 2007 Training Records from an Auditors Viewpoint Shawn Mason Boston Scientific.
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
JPPF MEETING 27 OCTOBER 2015 TSOGO SUN Contracts Manager Ndweleni Mukhawa JPPF 27 October S.GOVENDER.
Presented by: David Reid, DBA International
Judy Graham, Program Officer
HOW FRAUDSTERS FOOL THE AUDITOR
Personal Security Chapter :7
CHURCH SAFETY WORKSHOP
ISE Website Encourage International Service Employees to regularly check the website to view financial reports (e.g. payroll information), download.
Safety plan.
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Personnel Training for Privacy
Example Exercise 1 Elements of Internal Control
The British Retail Consortium (BRC)
HR AUDIT (An Early Evaluation System) (An Early Evaluation System) S.Jayaprakash., M.Sc (IT), PGD.HRM, DLL & AL.
Outputs Estimated Tendering Process Timeline (16 – 31 weeks)
Presentation transcript:

DOES YOUR EMPLOYEE SCREENING POLICY COVER ALL PEOPLE ACCESSING YOUR BUSINESS? Jenny Reid August 2012

Employees Outsourced labour Suppliers Temporary employees Company Screening Policy

Employees 6% = criminal record 20% = bad credit report 13% = invalid drivers license 14% = fraudulent matric certificate 22% = fraudulent tertiary qualifications

OutsourcedLabour Security Cleaning Labour brokers

Temporary Employees Seasonal Relief work

Suppliers Tender documents Links to employees Databases.

Vulnerability Testing Examine existing procedures. Assess staff knowledge in procurement environment. Have ongoing checks

Existing employees Past employees Outsourced / temporary employees Key personnel in suppliers Potentials employees Fraud Prevention Database

Fraud Prevention Buy in Executives HR Procurement

Jenny Reid