Workplace violence is an issue that is beginning to get more attention, but remains underreported and misunderstood. While a handful of shocking and high-profile incidents have the power to capture the public’s attention, the vast majority of incidents stay under the public radar.
The 2014 HireRight Small Business Spotlight, indicates that employment screening is becoming more and more critical for small businesses, as they may fall victim to some common, but potentially significant screening mistakes.
The extent to which each state reports records to the FBI varies widely. The federal government acknowledges that it’s possible to obtain more accurate information from professional background screeners.
The Snowden leaks, the Navy Yard shooting, and recent evidence that the U.S. Office of Personnel Management’s primary background check contractor all have forced the federal government to look at changing the way it does background checks.
The report from June 4, 2014, stated that one USIS employee turned in more than 15,000 investigations in one month, translating to about 21 screens every hour of every day during that month, which has raised red flags.
The U.S. Justice Department has accused United States Investigations Services (USIS) of filing at least 665,000 flawed background checks – about 40 percent of the total submissions – between March 2008 and September 2012.
A California lawmaker proposed legislation Monday to make background checks and gun registrations requirements for anyone who builds plastic firearms, dubbed “ghost guns,” on a 3-D printer at home. The bill, by state Sen. Kevin de Leon (D-Los Angeles), would also apply to anyone who buys parts that can be assembled into a gun, Fox News reports.
Given the changing landscape of the American workforce, global background screening is quickly becoming an essential element of security measures to help ensure a better qualified workforce and a safer and more secure workplace.
The business of hiring is a minefield of potential loopholes and pitfalls that culminate with one simple truth: “Everyone can lie.” It often falls to the security team to verify the backgrounds of potential employees, to ensure that applicants are being honest about where they’ve worked, what they’ve done and who they are.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!