Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementPhysical Security

Education & Training

Conducting Background Checks in the Corporate Security Environment

Security professionals must now operate within a tightening legal framework that limits both the scope and utility of background information.

By Alan Saquella
male and female programmers working on computers
Berezko / iStock / Getty Images Plus via Getty Images

Berezko / iStock / Getty Images Plus via Getty Images

June 6, 2025

In the current threat landscape, the background check has become a critical frontline defense in protecting corporate assets, brand integrity and personnel safety. But as any security leader will tell you, the traditional background check — focused on criminal history, employment verification and references — has limitations, especially in today’s regulatory environment.

Federal and state restrictions continue to erode the depth and scope of what can be legally reviewed, and meanwhile, insider threats and deceptive candidates are becoming more sophisticated. In this context, it's no longer about whether to conduct background checks — it's about how to conduct them effectively, legally and in alignment with operational risk management strategies.

This article outlines modern best practices in corporate background screening, with a focus on layered, risk-adjusted approaches and the growing role of behavioral screening tools in identifying concealed threats early.

The Traditional Model: Still Necessary, but No Longer Sufficient

At the core, background checks still serve key functions:

  • Verification of credentials (education, employment, licenses)
  • Criminal history checks in relevant jurisdictions
  • Reference validation to gauge previous behavior

For entry-level or low-risk roles, this may suffice. But for mid-level and senior hires, or those handling sensitive data, finances or strategic assets, this baseline isn’t enough. Many corporate investigations I led revealed the same sobering trend: employees engaged in internal fraud or misconduct had no criminal history at the time of hire. They cleared the background check — and went on to cause damage inside the organization.

We also saw those same employees’ surface later at other companies, repeating their behaviors. The lesson is simple: past criminality isn’t the only — or best — indicator of future misconduct.

Regulatory Constraints: Blind Spots in the Background Process

Security professionals must now operate within a tightening legal framework that limits both the scope and utility of background information:

  • The Fair Credit Reporting Act (FCRA) requires consent, disclosures and a formal adverse action process.
  • Equal Employment Opportunity Commission (EEOC) guidelines discourage blanket policies that disproportionately affect protected classes.
  • State laws now restrict how far back employers can check into a candidate’s criminal record (often seven years or less), and some limit the use of certain types of offenses in hiring decisions.

In one state, a candidate is presumed rehabilitated five years after a conviction — making it difficult to deny employment based on that history. For security professionals tasked with preventing insider threats, fraud, or reputational harm, this creates significant gaps.

Tiered Screening: Match the Background Check to the Role

The best practice here is risk-tiered background screening. One-size-fits-all approaches not only waste resources but fail to address the varying levels of risk different positions present.

  • Low-risk roles: Identity confirmation, local criminal records check, employment, and education verification.
  • Moderate-risk roles: Add civil litigation history, professional license validation, and reference interviews.
  • High-risk or sensitive roles (executive, financial, security-cleared): Deep-dive investigations including federal records, global watchlists, door-knock interviews, and in some cases, polygraph examinations.

Security teams should align with HR to classify each role by risk category and build a scalable, role-specific screening matrix.

 In the current threat landscape, the background check has become a critical frontline defense in protecting corporate assets, brand integrity, and personnel safety.

Closing the Gaps: Enter Behavioral Risk Screening

The next frontier in background screening is behavioral.

Criminal checks reveal past convictions. Behavioral assessments reveal potential. They answer questions that criminal databases can’t:

  • How does a candidate rationalize dishonesty?
  • Are they prone to manipulating systems or violating policy?
  • How do they respond to ethical dilemmas under pressure?

Behavioral assessment applies structured, automated interviews to identify patterns of behavior associated with misconduct — such as rationalization, entitlement, risk-taking, and lack of remorse. It helps security and human resource professionals detect high-risk candidates before a hire is made, even when their record appears clean.

How Behavior Assessments Work

  • Automated Behavioral Interviewing: Candidates answer questions in a structured digital environment, removing interviewer bias and inconsistency.
  • Psycholinguistic Analysis: Software evaluates how people think, not just what they say — identifying deceptive or evasive tendencies.
  • Risk Scoring: Candidates are assessed against established behavioral risk models tied to workplace misconduct.

This tool doesn’t replace the background check — it complements it, filling in the behavioral gaps and offering predictive insight. In environments with legal restrictions on what historical data can be used, behavioral screening offers a legally compliant, risk-relevant solution.

Implementing Best Practices in Security Operations

Security professionals looking to tighten their hiring process should take the following steps.

  • Integrate with HR and Legal Early: Collaborate to develop role-based screening policies aligned with risk exposure and compliant with legal standards.
  • Layer Screening Tools: Combine traditional checks (criminal, civil, verification) with tools for behavioral profiling.
  • Standardize Documentation: Ensure all background screening activities are documented, consistently applied, and audit ready.
  • Train Stakeholders: Train hiring managers, recruiters, and security staff on interpreting behavioral data and using it as part of a broader threat mitigation approach.
  • Develop Red Flag Protocols: Create response frameworks for addressing high-risk findings — whether behavioral, criminal, or reference-based.
  • Re-Screen as Needed: For high-trust roles, conduct periodic re-screenings or use behavioral assessments during promotions or transfers.

Avoiding Pitfalls: Ethics, Privacy, and Perception

Behavioral assessment tools must be used ethically and transparently:

  • Inform candidates upfront that a behavioral assessment is part of the hiring process.
  • Validate that tools used are non-discriminatory and comply with all relevant employment laws.
  • Avoid using a single data point to disqualify a candidate — behavioral indicators should be part of a larger risk picture.

Security professionals know that perception matters. The goal is to build a culture of integrity, not fear. Clear communication and fair practices ensure that your screening strategy reinforces trust, not suspicion.

Final Thoughts: Building a Future-Ready Screening Strategy

We are in the middle of a shift: from retrospective checks based on static data, to predictive screening based on behavioral analysis. Security professionals who recognize this change — and adapt — will be better equipped to protect their organizations from internal threats and reputational harm.

Traditional background checks still matter. But today, they must be augmented by tools that address the unseen, the unrecorded, and the unresolved risks that can walk in through the front door.

Behavioral screening platforms provide the modern security team with a strategic edge: identifying high-risk individuals before they become internal problems.

KEYWORDS: background check background screening data privacy employee screening security regulation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan

Alan Saquella, CPP, is an influential security and investigations expert with more than 30 years of security and investigations experience in corporate and public organizations at the executive level. He served for many years as the Security Operations and Investigations Director at Cox Communications before assuming his current role as a faculty team member at Embry-Riddle Aeronautical University — College of Business, Security and Intelligence. Saquella is also the Director, Investigations and Research at Verensics and a Member of the Identity Theft Advisory Board. Image courtesy of Saquella

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Man stealinga pair of jeans

    Shoplifting in the US: Problems, Progress, and the Path Forward

    See More
  • Spray painted security camera

    Unleashing the potential of investigative techniques

    See More
  • Retail Security

    Navigating retail security challenges: A comprehensive approach

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing