Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Background Screening on a Global Basis

By Marco Piovesan
June 1, 2007

Businesses are only as good as the people who run them. The right people with the right skills at the helm can help a company flourish. Conversely, poor – or uninformed – hiring decisions can cost a company not only financially, but also have a negative impact on the organization’s reputation with stakeholders. Apply this principle globally and you have a whole new set of issues to consider each one with the potential to have an exponentially greater impact.


WHAT DOES THE COMPANY NEED?

Determine what your company needs and wants from global background screening. Do you want to ensure there is fluid, global mobility of qualified and vetted talent? Are you trying to mitigate financial and reputation risk? Is your goal to comply with industry regulations? Understanding the organizational objectives behind a background screening initiative will enable you to find the ideal partner and program.


WHAT ARE THE CULTURAL DIFFERENCES?

Understand the culture and business environment in each country. Consider the acceptance and perception of background screening programs. Although they are becoming more widely accepted, unique cultural characteristics exist and must be respected.


WHAT ARE THE COUNTRY’S REGULATIONS?

Fully understand the regulatory environment in each country. Each country has its own privacy and data security regulations, and several regions have created regional privacy laws. In addition, some countries have unclear or no regulations at all. Constitutional laws differ across countries as well. It is critical to determine what combination of policies should be followed. The safest move is to always assume a conservative approach to data privacy and security. Legal counsel should be a critical part of this step.


WHO SHOULD BE INVOLVED?

Engage key participants from the beginning. Hire and involve in-country human resources, security, compliance and legal teams before rolling out a background screening program. Also enlist support and advice from local work councils or trade unions, as well as regulators.




WHAT ARE THE BEST PRACTICES?

Consider best practices: Look at other companies in your industry and discuss with background screening vendor companies. Ask questions about your potential employee. What are best practices by industry, by type of associate, by country and by regulations?


WHAT ARE THE POLICIES?

Establish clear company policies and procedures with respect to a global background screening program. Elements should include reasons for the program, all aspects of the program, disclosure, data privacy, data security and comprehensive communications about these policies.


WHAT KIND OF SCREENING SHOULD BE USED?

Companies are able to customize their background screening packages according to level and responsibility. For example, hiring an executive level position should entail three previous employments, two or three references, highest level education verification, professional license, identity verification, criminal record check, reputation media check and a global watch list check.


WHAT TO DO WITH THE DATA COLLECTED?

Gather detailed candidate information and education and use it to determine what type of data is legally permissible to be collected. Identify how the data will be collected, how it will be used and what rules are in place for transferring data across borders. It is also important to know what the rules are for discarding the information. Some countries require data to be used for permissible purpose within 72 hours of collecting it, while other countries do not have set timeline.


HOW DO I GET CANDIDATE CONSENT?

Ensure candidate consent by always getting a signed candidate consent form and provide proper disclosure. Acquiring candidate consent will not always be easy, so it is critical to maintain enough flexibility to accommodate the unique aspects of each culture. In Brazil, for example, requiring a drug or alcohol test from applicants is not always possible. Due to regulations, applicants can refuse to submit to drug tests and the company may be forced to accept the refusal.


WHAT CAN BE DONE WITH THE CANDIDATE’S INFORMATION?

Treat the candidate information with respect to privacy and data security standards and regulations. By using respect for the individual and their information as a guiding principle, you will always serve the candidate and the organization well. Always double check your results and treat candidate’s information with confidentiality and respect. Not doing so may cause the information to fall into the wrong hands.


HOW TO IMPROVE THE PROCEDURE?

Conduct ongoing performance improvements; it is critical when going “live” to ensure strong quality assurance during the first several dozen background screens. Once the program is well established, set up a time-based review of metrics to ensure that aspects of the program are within the accepted parameters of turnaround time, quality, accuracy, cost and any other elements.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Marco Piovesan is vice president of international marketing for the screening and authentication services group of ChoicePoint.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Red yellow and green squares in rows on black background

    39% of consumers admit to using generative AI on a weekly basis

    See More
  • How to Manage Background Checks Requirements for a Global Workforce

    See More
  • Half a Million Background Checks Performed on Olympic Applicants

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • Optimizing Social Media from a B2B Perspective

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing