Understanding Crime and Upholding Safety - Interactive
Interactive

Understanding Crime and Upholding Safety - Interactive

Seven Dimensions
Updated May 11, 2020

In this interactive course, learn how workplaces can minimize crimes such as theft, dishonesty and cyberattacks with essential prevention tools. Learn to implement policies, ramp up security, invest in the right applications and consultants, and clamp down on abuse of privilege.

Retired detective Colin McLaren discusses with Eve Ash the importance of having strong policies and rules about use of company cars and credit cards to minimize abuse. Standard operating procedures (SOPs) and random checks for pornography, drugs and alcohol are critical. With social media, less personal information sharing is best. Checking people’s backgrounds when recruiting, ensuring strong audit trails, double-checking for those with discretion over company money are all important precautions.

Key Learning Points

  • Crimes can occur anywhere, anytime by anyone
  • Most are theft or dishonesty
  • Security needs ramping up
  • For cybercrime, invest in consultants
  • Clear policies to prevent abuse of privileges
  • Strong rules about pornography, drugs and alcohol
  • Social media – less is best
  • Research people’s backgrounds
  • Ensure double-checking and auditing


This interactive course brings powerful expertise, knowledge and strategies from an elite and highly skilled former homicide investigator and taskforce leader to help managers, teams and especially those with a responsibility for safety at work to proactively manage crime, accidents and security.

This interactive course is one of the Insights and Strategies Series, featuring psychologist Eve Ash interviewing a range of experts and business leaders who share their experiences and practical strategies for achieving best practice.

Learning Outcomes

By the end of this course, learners should be able to:

  • Identify that crimes can occur anywhere, anytime by anyone and most business crimes are theft or dishonesty
  • Organize ramped up security and specialist consultants (e.g. for cybercrime)
  • Implement clear policies to help prevent abuse of privileges, possession of pornography and use of drugs and alcohol
  • Minimize personal information on social media
  • Utilize screening, auditing and double checking strategies, especially for those involved with financial and stock transactions.
;