Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Education: K-12 / Education:University / Security Enterprise Services
Enterprise Services -- Background Checks

University of Illinois Requiring Background Checks to Work with Minors

Following the Penn State child sex-abuse scandal, all University of Illinois employees who have contact with minors will undergo criminal background checks, The News-Gazette reports.

The UI system announced the change on Thursday, along with a system to closely track any events involving children on the UI’s three campuses, such as 4-H programs and music or sports camps.

New polices put in place in July are already being implemented – requiring all employees to undergo training of sexual harassment and on their responsibilities under a new state law to report suspected child neglect or abuse, the article says. The UI says that the changes will better protect young people who visit campus, as well as current students, employees and others.

According to the News-Gazette, the UI policies, developed by a university-wide task force created last winter, include:

Background checks: All current or prospective UI employees who have regular contact with minors will undergo a criminal background and sex-offender registry check. Previously, background checks were only required for security-sensitive positions, such as day care providers, medical personnel and those who work with money or records.

Tracking of minors: Each campus will maintain a record of all scheduled activities involving minors, such as youth camps and performances, with details including location, the number and age range of participants, and contact information for authorities who will make arrangements for the safety of the youths in emergencies. The policy also includes guidelines about who can be overnight with a minor. Before, those events were monitored by departments and units but not campus-wide.

Mandatory reporting: Under a recent amendment to the Illinois Abused and Neglected Child Reporting Act, all UI employees will soon be required to report suspected cases of abuse and neglect to the Illinois Department of Children and Family Services and campus police. They will have to complete an awareness program on their responsibilities under the new law, starting next spring, and will receive an annual reminder of their obligation.

Previously, only certain university employees were so-called mandated reporters, such as police officers, day care and hospital workers.

Sexual harassment training: All employees and incoming students are now required to complete an educational program on preventing sexual harassment and misconduct, and employees will be required to repeat it at least every three years. Previously, sexual harassment training had been required for all incoming students and employees in some campus departments, but not university-wide.

The process for background checks is decentralized, with individual units initiating the checks. It is unclear how many more employees will be covered by background checks under the new policy, the article says. However, a university representative says that new hires will not have to wait too long for a check – UI works with an outside vendor that typically completes the checks within 48 hours, and the hope is that the process can be even faster, the article says.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive


CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.