T&T is lagging behind other countries in the area of detection of cyber crimes as well as crimes committed in other areas, says Catherine Kumar, CEO, T&T Chamber of Industry and Commerce."In T&T we are lagging in this area. It was noticed by the previous Government and one of the ways in combatting crime is by detection. Today, we have not really seen further implementation of this," she said.
She was speaking yesterday at a seminar entitled "Securing your secured data" at the T&T Chamber of Commerce office, Westmoorings.Sheau-Dong Lang, Professor of Digital Forensics at University of Central Florida who gave the feature address by Skype from Florida, said internet security is becoming more complex because most people now have most details of their lives online with banking information online as well as other types of personal information.
"Data needs to be safe and secure and there are many ways criminals can take advantage of the weakest points. Criminals are also becoming smarter," he said.Kumar also said T&T needs to follow the example of more developed societies.
"To give another example of how computer technology can be used to combat crime only recently in the New York Times there was an article on the retail sector to track employee's theft. Former employees who admit to stealing were placed on the data base which retail stores all over the US had access to. The system gave employers the option of leading to better recruitment choices. I am sure you will agree that this is the best practice we would like to see in T&T," she said.
She also said T&T must expand its view of what a crime is."On one hand many of us view crime as murder, violence and theft however hacking is also a form of criminal activity. Although it is not taken as seriously in T&T as in other parts of the world, it is not a light matter," she said.She added that ways must be devised so that companies can protect the confidentiality of their data.
"How do we maintain the confidentiality of our documents We need to be aware of what is happening and the necessary precautions to avoid being a victim. How do we avoid loss of data due to technology?" she asked.