First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

unauthorized access

Lessons from the Saanich spyware fiasco and new privacy laws to be aware of

In our current information age, security over electronic information and protection against unauthorized access is foundational to employers’ businesses. To guard against endlessly multiplying electronic threats, employers must resort to electronic means and, understandably, often resort to broad and comprehensive software to protect their operations. However, the situation involving the District of Saanich earlier this year is a good reminder to all B.C. employers that cyber-protection cannot be used at the expense of employees’ privacy.


, , , , , , , , , , , , , ,

Is it really possible to control employees’ use of company computers?

Policies can help you manage employees’ and others’ use of company IT resources, and dramatically reduce the potential risk to you and your assets.


, , , , , , , , , , , , , , , , ,