Browse more 5,000 tipsheets from our national conferences and Watchdog Workshops on how to cover specific beats, conduct a great interview and learn countless tips on where to find the information you need.

Logged-in members can download any tipsheet, for free. Contact the Resource Center 573-882-3364 or [email protected] for questions.

Search results for "SEC" ...

  • Red Flags and Hidden Gems in Financial Documents

    Learn what SEC forms you should know about and what's inside them from Globe and Mail columnist David Milstead.

    Tags: SEC; 10-K; taxes; proxy

    By David Milstead


  • Decoding business & financial documents

    Learn how to use SEC records, track opaque companies and dig into state and local business records from veteran Wall Street Journal reporter Jo Craven McGinty.

    Tags: SEC; opencorporates; Trump

    By Jo Craven McGinty


  • Finding your target in the money laundering capital of the world

    David Cameron pledged to break the wall of corporate secrecy when he was British prime minister, and two key datasets were released in late 2017: - The PSC register unmasks the true owners of companies registered in the UK. It has thousands of Americans and overseas nationals - Land ownership property data in the U.K. has been made available — owning property here is favored method to launder money by corrupt individuals the world over. As a result, the assets and cash of corrupt individuals may be hiding in plain sight. In this class, we will follow three prominent individuals, including a U.S. president, through the newly available datasets to show how and why you should turn to the U.K. and her territories to investigate your target.

    Tags: money laundering; uk; united kingdom

    By Leila Haddou


  • Beyond The “Nerd Box”: How to explain methodology better

    You’ve done all the data crunching and reporting, now it’s time to sit down and explain how you did it. Feeling overwhelmed by too many information and worried nobody would read it? We’ve all been there. Some of us call it the “nerd box”, but we certainly hope the methodology section could reach beyond nerds. In this panel, a few experienced data journalists will talk about their approach to explaining the methodology and how we can improve to make it better. Topics we’ll touch on include: How to assure the visibility of important caveats and avoid confusion? How to set realistic expectation on readers’ data literacy? How to accommodate readers with different levels of interest? Is there any other way to describe methodology other than lengthy text? How to include the methodology for non-digital mediums like broadcast, radio, print or even social media? Join us for a rewarding discussion.

    Tags: methodology; data; explanation

    By Evie Liu; Jeff South; Stephen Stirling


  • After FactFinder: Navigating

    Just when you had finally learned American FactFinder’s many foibles, the Census Bureau is shutting the site down. We’ll introduce you to its successor,, take you on a test drive and dish some tricks and secrets we’ve discovered. The new site will become the main source for census information in June.

    Tags: factfinder; census; data

    By Ronald Campbell


  • Securing Workstations and Personal Data

    Doing research for in-depth investigations can be dicey, digitally-speaking. Learn how to compartmentalize your internet-based research while keeping your identity private, your computer clean and your data safe.

    Tags: workstation; personal; research; security

    By Neena Kapur


  • Safe Searching

    Doing research for in-depth investigations can be dicey, digitally-speaking. Learn how to compartmentalize your internet-based research while keeping your identity private, your computer clean and your data safe.

    Tags: privacy; internet; identity; security

    By Margot Williams


  • How journalists can detect (physical and electronic) surveillance

    Journalists who work in authoritarian environments tend to be under electronic surveillance. Surveillance is being frequently conducted at a mass scale and is intended to track what journalists in general are doing and what stories they are investigating. In some cases, surveillance has a specific target — electronic espionage intended to track the actions of a specific reporter and sources. The key question is as follows: if a journalist wants to combat electronic surveillance, how are you supposed to recognize when it’s happening? Here is how Jorge Luis Sierra would advise journalists who think that surveillance is a potential or actual threat to their privacy, personal safety, data security, and the identities of their sources:

    Tags: surveillance; security; espionage

    By Jorge Luis Sierra


  • Digital Security Tip Sheet for Journalists​

    Are your sources’ identities at risk? Are you handling sensitive information? Do you need to protect your data from digital espionage? Do you need to encrypt your communication with editors and sources? Are you under technical attack? This tipsheet will introduce you to a digital security toolbox that can help you store, send and receive sensitive information.

    Tags: identity; sources; protection; espionage

    By Camille Fassett; Martin Shelton; Jorge Luis Sierra


  • How to find stories in data through visualization - notebook

    This notebook contains 6 sections, one with instructions for setting up your notebook, one explaining the basicis of ggplot (the graphing library we'll be using) and four which contains code and descriptions of visualizations useful for exploring different types of data. In each section (except the first) there will be exercises for you to complete. If you get stuck you can check out this notebook. It has hints that you can expand to show you what your output visualization should look like and, if you’re completely lost, the code to generate those figures. You can also use the notebook to check your work once you're finished.

    Tags: visualization; code; ggplot

    By Rachael Tatman