Risk Management & Insurance Industry - Knowledge & Resource Center

GCat: Risk Mgt, Claims, Ins
MCat: Security

Crime prevention. Arson. Corporate security. Counter-terrorism. Burglary protection. Employee theft. Computer crime. Scams and fraud. Bomb threats. Background checks. Privacy of medical information. Vehicle and cargo theft. Violence in the workplace. Identity theft. Bomb threat & physical security planning . School security. Travel safety. Computer crime. Forensics. Fraud. Indentity theft and personal protection. School security.

Also refer to Categories: Disasters (all) Legal - Internet Law. Organizations - Security. Property Emergency Plans, Disasters. Publications - Security. Risk Mgt - Property, Political Risk. State Government (all) Statistics - Crime. Technology - Security. USA Government - Justice.

Access Control

Tactics, techniques, procedures for creating a security access-control system.


Essential indicators of arson. Manual for arson investigation training. Key facts and control measures for arson. Expert testimony. Arson statistics.

Aviation Security

Airport and airline security measures

Background Checks

Guidance on conducting criminal history checks. Reference checking and its legal pitfalls. Fingerprint-based background checks. Online verification of social security numbers in the USA . Sex offender registries.


Biometric identification refers to a technology that uses scanned graphical information from many sources for personal identification purposes. This would include: facial imaging, retinal scans, fingerprint scans, voice recognition, hand geometry identification, etc.

Business Security

Corporate security. Laptop computer theft. Eavesdropping devices in the workplace. How to protect your business from burglary. Workplace security issues. Armed hold-up prevention.

Cargo Theft

Advice on cargo theft prevention

Computer Crime

Links to Cyber Incident Response Teams and Security-Related Organizations. Resources involved in detecting and resolving computer security incidents. Hacker news. Research documents and news related to cyberspace computer crime. Key legal factors regarding searching and seizing electronic storage devices and media.


Crime prevention and security-related articles. Emerging trends, legislation, key court decisions, etc. related to victims of crime. Information on federal and state legislation.

Drug Crime

Law enforcement efforts for substance abuse. U.S. drug laws, policies, court cases & related matters. USA Drug Enforcement Administration briefing, factsheets, issues, press releases, guidelines, etc.


Conferences & seminars. Certification requirements for human resources. Certified Protection Professional details.

Employee Theft

Guidelines, audits on preventing employee theft and creating internal controls to reduce the risk of fraud. Resources outling the steps toward fraud detection and prevention. Description of fidelity insurance & discussion of bonds coverage issues.

Equipment Theft

Guidance on reducing equipment theft at job sites

Executive Protection

Guidance related to security of business executives, security drivers, etc

Financial Crime

How to detect and control credit fraud, check fraud, counterfeit money, money laundering, etc. Information on advance fee fraud schemes. Alerts regarding scams involving what are claimed to be securities issued or backed by US government. How to protect your money and your credit record if your wallet is lost or stolen.


Information about forensic science. Basic information on the structure and function of DNA as it relates to DNA fingerprinting. Validity and reliability of polygraphs. Forensic firearms identification. Concepts of forensic entomology.


Consumer fraud topics and warnings. US mail fraud. Association of Certified Fraud Examiners. Fight telemarketing and internet fraud. Social security fraud.

Hate Crime

Active hate groups, street gang criminals, hate crimes

Identity Theft

Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.


Field manuals on how to conduct law enforcement investigations, creation of law enforcement policies and procedures, terrorism counteraction, bomb threat procedures, how to handle civilian disturbances, correctional facilities operations, physical security and more.

Maritime Security

Seaport and maritime security measures

Personal Protection

Guidelines on how to prevent becoming a victim of crime at home, office, shopping, travel, etc. Self-assessment tests estimate your risk of being a crime victim. Protective devices, pepper spray, etc.

School Security

Articles, program assistance & research about school violence. Prevention case studies, legal notes and guidance on harassment and bullying in schools. Guides for schools to prevent violence - checklists, sample policies. Background information, warning signs, approaches to prevention of youth violence.

Site Security

alarms, site security, church security, locks, security systems, security guards, shrinkage

Travel Safety

US State Dept Travel Warnings, Consular Information Sheets & Public Announcements. Guide for American business traveling and working overseas. Incidents that have taken place against civil aviation worldwide.

Vehicle Theft

Theft data on hundreds of passenger vehicles by make and model. Fact sheets and tips on how to prevent vehicle theft.


Guidelines for prevention of workplace violence, risk factors and strategies to manage violence in the workplace. Workplace homicides. Violence in convenience store robberies. Healthcare industry violence. How domestic violence affects the workplace.

My Bookmarks | Last 25

Words of Wisdom

"Positive things happen to positive people!

Risk Management & Insurance - Core Values and Available Information