Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

SECURITY Services: Backgrounds Upfront

By Bill Zalud
February 1, 2004
Pre-employment screening, limited in previous years to cash-handling, government and top management employee hiring, is now pervasive.

Employers more often focus on proactive ways to cut employee theft and workplace violence incidents. And thanks to a proliferation of drug testing and background investigation firms, the ease of conducting checks through the Internet and dropping prices, more employers and their security operations conduct some level of background check or testing as part of the hiring decision.

Some security and human resources departments conduct their own pre-employment background investigations. However, there is a downside to such a do-it-yourself approach: higher expense, more time spent on the investigation as well as limited access to key records.

Use of Third Parties

So it is not surprising that many employers and their security executives turn to private investigators and, more recently, to specialty Web—based background checking services.

Generally, background checks drill into three types of data: criminal records, consumer—specific financial/credit reports and personal information ranging from employment and housing to educational history. In each case, there are candidate and employee rights as well as employer obligations under state and federal consumer reporting laws, local laws and regulations as well as privacy rules.

Executives interviewed by SECURITY magazine cite two major factors influencing the complexity and growth of pre—employment screenings. The Internet has made it easy for some to specialize in instant checks. These firms either conduct a check for a client or provide the client a secure, Web—based connection for self searches.

The other major factor is the federal Fair Credit Reporting Act, revised late last year, and its companion federal Fair and Accurate Credit Transaction Act of 2003. In both cases, the legislation governs the acquisition and use of most consumer background information about candidates for employment and employees. While numerous states regulate the use of background checks – California for one has tougher regulations – the federal legislation sets the tone.

Diversity of Services

Background investigation services, especially on the Web, offer a variety of services and database access.

For example, Rapsheets, which checks criminal records and sex offender registries, does not acquire records from credit reporting agencies such as Trans Union L.C.C. or Experian. Rather, it maintains computer connections to the bureaus to enable its client base to perform identity verification. Rapsheets maintains relationships with database owners at the local, metropolitan and state court levels; in corrections – jails and prisons; at law enforcement agencies; and through sex offender registries.

The Web also allows candidates to complete employment application forms and authorize background checks online and from anywhere. The Homeland Security effort also has created interest, if not a lot of business, in background checking. A number of services now connect to U.S. Department of Commerce and other federal databases related to terror threats.

SIDEBAR: Fair Credit Compliance Awareness

Security and human resource executives agree there are important steps when a third party or employer conducts a background check that includes consumer information gathered under the federal Fair Credit Reporting Act.

Before:

  • Disclosure — In writing, tell the job candidate that a background check will be requested.
  • Authorization — Obtain a consent signature.
  • Check Box — If the candidate wants a copy of the report, provide a check box so the candidate can initiate the request.
During:
  • Certification — The employer must certify compliance with applicable federal and state laws and regulations. The background check or investigation company can provide such forms.
After:
  • Provide a copy of the report — There are two primary reasons to provide a copy of the report. The first reason is if the candidate checked the box requesting a copy. The second reason is when adverse action is taken and is based on information in the consumer report. In California, a copy of the report must be provided if some or all of the information is “a matter of public record.”
  • Be detailed — If there is adverse action anticipated, provide the job candidate a summary of federal rights, a description of the action to be taken and an indication of the length of time before the action is taken. The candidate or employee must be provided time to correct any inaccurate information.

Source: Society for Human Resource Management, advice on www.shrm.org.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • leadership 2

    Bringing Different Backgrounds to Your Intelligence Team

    See More
  • AlliedBarton Security Services and Universal Services of America to Merge

    See More
  • SECURITY SERVICES EXCLUSIVE: Commitment, Knowledge Mark First-ever Security Officer of the Year

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing