Education: K-12 / Education:University / Security Enterprise Services
Enterprise Services -- Background Checks

University of Illinois Requiring Background Checks to Work with Minors

Following the Penn State child sex-abuse scandal, all University of Illinois employees who have contact with minors will undergo criminal background checks, The News-Gazette reports.

The UI system announced the change on Thursday, along with a system to closely track any events involving children on the UI’s three campuses, such as 4-H programs and music or sports camps.

New polices put in place in July are already being implemented – requiring all employees to undergo training of sexual harassment and on their responsibilities under a new state law to report suspected child neglect or abuse, the article says. The UI says that the changes will better protect young people who visit campus, as well as current students, employees and others.

According to the News-Gazette, the UI policies, developed by a university-wide task force created last winter, include:

Background checks: All current or prospective UI employees who have regular contact with minors will undergo a criminal background and sex-offender registry check. Previously, background checks were only required for security-sensitive positions, such as day care providers, medical personnel and those who work with money or records.

Tracking of minors: Each campus will maintain a record of all scheduled activities involving minors, such as youth camps and performances, with details including location, the number and age range of participants, and contact information for authorities who will make arrangements for the safety of the youths in emergencies. The policy also includes guidelines about who can be overnight with a minor. Before, those events were monitored by departments and units but not campus-wide.

Mandatory reporting: Under a recent amendment to the Illinois Abused and Neglected Child Reporting Act, all UI employees will soon be required to report suspected cases of abuse and neglect to the Illinois Department of Children and Family Services and campus police. They will have to complete an awareness program on their responsibilities under the new law, starting next spring, and will receive an annual reminder of their obligation.

Previously, only certain university employees were so-called mandated reporters, such as police officers, day care and hospital workers.

Sexual harassment training: All employees and incoming students are now required to complete an educational program on preventing sexual harassment and misconduct, and employees will be required to repeat it at least every three years. Previously, sexual harassment training had been required for all incoming students and employees in some campus departments, but not university-wide.

The process for background checks is decentralized, with individual units initiating the checks. It is unclear how many more employees will be covered by background checks under the new policy, the article says. However, a university representative says that new hires will not have to wait too long for a check – UI works with an outside vendor that typically completes the checks within 48 hours, and the hope is that the process can be even faster, the article says.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine February 2015 issue cover

2015 February

In the February 2015 issue of Security Magazine, see what other companies have learned from the massive data breach and what they are doing in the now and in the future. Also, what could adding thermal cameras to your operation do for you? and Mohegan Sun at Pocono Downs prepares for the future with security decisions.
Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.