Related Items:court, dominicans, fine, poachers Dominican Officials agree to stop sex trafficking, poachers Facebook Twitter Google+LinkedInPinterestWhatsApp Recommended for you Police get wanted man; Magistrate Court back open Laundry detergent thief goes to court, Alleged Ganja dealer arrested Facebook Twitter Google+LinkedInPinterestWhatsAppProvidenciales, 29 Jul 2015 – The TCI Prosecutor hopes the Dominicans captured stealing marine product from our waters will find the money to pay their fines and go home. Public Prosecutor Clement Joseph said it is far more costly to TCIG to keep these men in remand for six months; a bill he estimates at $5,000 per day for the 28 men now convicted of poaching. Over the six months, this is a $900,000 cost to house the poachers in the TCI. Magistrate Clifton Warner heard a whale of a tale yesterday from the 28 poachers who say they thought they were in Puerto Plata in the DR. The men, who had been staying at the detention center since the raid last Thursday said their captain lied to them. That captain eluded capture last week; left the 28 men, 14 boats outfitted with 14 Yamaha engines, spear guns, air compressors, hoses and other equipment outlawed in the TCI to face officers on their own. One by one, in court the 28 repeated their sorry tale. Telling Warner they were “betrayed.” The men, in the end plead guilty to all eight charges and were fined $5,400 each; a total of $151,200 in fines. The Magistrate had given them until 4pm to pay those fines. Minister responsible, Porsha Smith called the arrest, “…a proud moment as …these civil servants have shown courage and bravery and deserve our recognition and gratitude.” Smith in the statement issued Tuesday added that, “It is important that all potential violators understand that we will not stand by, while our waters and natural environment be abused. Anyone that insists on malicious efforts similar in kind to these will be caught and prosecuted to the full extent of the law.” At last check the Dominicans captured in this pilferage were actively trying to raise the money to pay the fine.
WILMINGTON, MA — Here are highlights from the Wilmington Police Log for Thursday, January 10, 2019:Police issued two parking citations in the MBTA parking lot on Main Street. (8:46am)Police noted a MBTA Commuter Rail train (#1639) at North Wilmington station was blocking Middlesex Avenue. (9:36am)A caller stated someone keeps ringing their doorbell, but she doesn’t want to answer. Caller states she is not expecting anyone. Police responded. Minuteman Services was at the door. Police notified the caller. (2:16pm)A Salem Street caller reported an unfamiliar female rang her doorbell several times and is now sitting in her driveway in a silver sedan. Police responded. Female was a CNA who was given the wrong address. (3:13pm)A caller stated he received threats from his former manager while he was picking up his belongings. (4:43pm)A Wilmington 39-year-old was taken into protective custody after causing a disturbance outside a home. Caller said she “had a few drinks.” (9:33pm)(DISCLAIMER: This information is public information. An arrest does not constitute a conviction. Any arrested person is innocent until proven guilty.)Like Wilmington Apple on Facebook. Follow Wilmington Apple on Twitter. Follow Wilmington Apple on Instagram. Subscribe to Wilmington Apple’s daily email newsletter HERE. Got a comment, question, photo, press release, or news tip? Email firstname.lastname@example.org.Share this:TwitterFacebookLike this:Like Loading… RelatedPOLICE LOG for June 27: Stranger Enters Resident’s House; Man Denies Asking Young Girls To Follow HimIn “Police Log”POLICE LOG for August 31: Woburn Man Arrested For OUI; Bad Highway Crash Required MedflightIn “Police Log”POLICE LOG for August 19: Fist Fight At Planet Fitness; Hawk Stuck Inside Building; Gas Line StruckIn “Police Log”
Airports Authority of India (AAI), the mainstay of Civil Aviation in the country, celebrated its 23rd Annual Day on April 1, at Siri Fort Auditorium, New Delhi with a cultural extravaganza – ‘Horizon.’ Jayant Sinha, Union Minister of State for Civil Aviation was the Chief Guest of the event.The colourful evening of music and celebration started with the felicitation of AAI airports that made a mark in ACI-ASQ and CSI awards respectively. While the Airport Directors of Chennai, Kolkata, Ahmedabad, Lucknow, Indore, and Pune were felicitated for their respective airports making it under various categories of the coveted list of ACI-ASQ Awards 2017, APDs of AAI’s Raipur, Udaipur and Dehradun were felicitated for their respective airports achieving first, second and third ranks in the Customer Satisfaction Index (CSI) Survey. Also Read – Add new books to your shelfApart from various airports, Subhash Kumar, General Manager (Fire), the recipient of President’s Medal for Fire Safety was also felicitated. While addressing the audience, Jayant Sinha congratulated AAI family and acknowledged the significant role it plays in the growth of the civil aviation sector in India. He applauded significant strides that AAI made in the last year in terms of financial performance and also commended its CSR initiatives in serving the society. This was followed by an exciting cultural evening.
Opinions expressed by Entrepreneur contributors are their own. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global 5 min read Growing a business sometimes requires thinking outside the box. Take a moment to survey your office and the people sitting behind computers. Or, if you have a remote workforce, picture your employees in their home offices or on the road, all within arm’s reach of a laptop or mobile device. These individuals, whether you realize it or not, play a vital role in protecting your company from a security breach.You can install all of the latest and greatest security innovations, but if your employees aren’t properly using these technologies and adhering to safe computing practices, you may be more at risk than you think. Many small businesses don’t have an onsite IT staff, so it takes time to get employees to understand and then take proper action to maintain data security. But your business and its valuable data are worth it.To ensure that your team is ready to defend your business to the best of its ability, begin by ensuring that your employees do the following:1. Use email responsibly. Hackers and scammers have become very sophisticated in targeting individuals via their email accounts. Malicious intruders often try to persuade email recipients to take actions that can expose business and personal information without employees even knowing they’ve done anything wrong.Related: 5 Easy-to-Use Tools to Make Business Email More SecureTo protect your valuable business information, advise employees to:• Exercise judgment before opening email attachments. If they are suspicious of an email or email attachment, they should not open it. • Be especially wary of any attachment with a “.exe” filename extension, which may begin executing a program as soon as the attachment is opened.• Manually scan attachments with antivirus software before opening or downloading to your computer.• Be sure the option to automatically download attachments is disabled. Some email programs offer automatic download as a convenience, but it can lead to trouble if a harmful attachment comes through.• Use complex email passwords to make it difficult for hackers to access email accounts. Passwords should include upper and lower case letters, numbers and punctuation marks or other symbols.The U.S. Computer Emergency Readiness Team has a number of other helpful tips on how email users can protect their systems by using caution with email attachments.2. Be cautious about wireless internet connections. Wireless internet connections are a remote worker’s best friend. Yet, public wireless hotspots can be notorious access points for cybercriminals because they are open networks that do not encrypt data, emails, passwords or any other information transmitted across them. If employees have the choice between a secure wireless connection, which will require a password, and a public hotspot, they always should choose the secure connection.Related: 3 Scary Online Security Mistakes to AvoidBecause employees may sometimes need to use a public hotspot, they should know how to make sure their firewall is on, how to disable file and printer sharing, and how to make folders private. These tasks can be managed through every computer’s System Preferences or Control Panel, where security, internet and user settings can be reviewed and adjusted. Advice on how to manage these tasks can be found in your computer’s help and support index.You also can safeguard data by protecting it on a corporate network or in the cloud. There are numerous cloud storage options for small businesses. Available through Microsoft’s Office 365 offering, SharePoint Online allows users to create online sites to securely store, manage and share files with colleagues and customers. It’s priced at $8 per user per month with an Office 365 subscription, or $4 per user per month for the standalone service. Another cloud storage solution is CloudBerry Labs’ Cloud Drive offering, which allows businesses to store and backup to their cloud vendor of choice simply and seamlessly, starting at $29.99.3. Use smartphones conscientiously. Smartphone use adds an entirely new layer of complexity to managing your data security. These days, employees commonly conduct work-related tasks from their personal mobile devices, opening new gateways for security breaches.Develop a Bring Your Own Device (BYOD) policy that provides parameters on how and when employees can use their personal mobile devices for work purposes. The policy should include specific guidelines for smartphone security, such as a password policy, a list of supported devices and others that are not allowed to connect to the network, and protocol for installing applications, which can become easy entryways for malware.Smartphones also can be easily misplaced or stolen, so take steps to prevent a data breach if this occurs. You can require employees to use mobile tracking services offered by carriers, such as AT&T’s Mobile Locate or Verizon’s My Mobile Recovery, to find the location of lost devices, remotely lock them or erase data. For more assistance in developing a BYOD policy that’s right for your business, consider getting guidance from a local IT provider or expert.Related: 3 Tips for Beefing Up Password Security Register Now » December 27, 2012