INFORMATION

Site Map - SM Online

A Plan to Stem Extremism

- Since 9-11, there have been more than 200 U.S.-based al Qaeda violent extremists arrested over a combination of 60-plus attempted and successful plots. In response, the Muslim Public Affairs Council has released the Safe Spaces Initiative: Tools for Developing Healthy Communities to help community leaders prevent extremist ideas from turning into dangerous actions.

Parody

- The National Security Agency (NSA) and the Department of Homeland Security (DHS) settled a lawsuit with an activist who was selling merchandise using their logos. The NSA and DHS acknowledged that merchants who use images and names of government agencies on parody merchandise are not in violation of any federal laws.

Gun Rights

- The U.S. Supreme Court refused to re-enter Second Amendment gun controversies and denied to hear three cases seeking clarification on the scope of an individual’s right to have a gun for personal self-defense.

Employment

- A New York court has ruled that employees’ immigration status does not affect the employer’s rights under Workers’ Compensation Law section 11. Instead, employers have economic protections under the law regardless of employees’ immigration statuses.

Drones

- A federal judge dismissed a case challenging the Obama administration’s use of unmanned drones to kill terrorism suspects overseas. In her opinion, Justice Rosemary M. Collyer wrote that the courts cannot create a remedy for targeted killings without intruding on the powers of the president and Congress to wage war.

Nuclear Safety

- Since the Fukushima Daiichi nuclear disaster in 2011, nuclear regulators around the globe have introduced new requirements to improve nuclear safety and security. The Government Accountability Office details the new changes and elaborates on measures still needed to improve nuclear security in the United States.

Trade Secret Theft

- Trade secret theft costs industry billions of dollars each year and no company is immune to trade secret misappropriation. In a recent white paper, the Center for Responsible Enterprise and Trade details how widespread trade secret theft has become and how companies can mitigate the risk of trade secret misappropriation.

Espionage

- The NATO report Pandemonium: Nation States, National Security, and the Internet looks at nation-state hacking and the power of espionage in modern culture.

Global Cyber Risk

- Under Cyber Attack: EY’s Global Information Security Survey 2013, a report from Ernst and Young, describes the cyber risks facing today’s business world and offers some strategies for addressing them.

NSA Surveillance

- President Barack Obama asked a group of experts to provide recommendations on modifying the National Security Agency’s bulk data collection program. Read the report here.

Business Case

- This guide to developing a business case, written by the ASIS International Leadership and Management Practices Council, is designed to help managers effectively present a program or project to senior management and gain additional resources to advance the program.

Healthcare Privacy

- Patient privacy remains at risk despite federal laws to protect it. Learn more in the Fourth Annual Benchmark Study on Patient Privacy and Data Security, a study by the Ponemon Institute that was sponsored by ID Experts.

EU Corruption

- Corruption is costly. In fact, it is costing the European Union about €120 billion ($165 billion) per year, according to a recent report from the European Commission. It assesses corruption in all of the EU’s 28 member countries, analyzing industry sectors, the nature and level of corruption, and the effectiveness of measures taken to fight it, which vary from country to country.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.