Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

6 Big Mistakes & How to Avoid Them

July 1, 2005
Employment background screening has gone from being a “nice-to-have” to a “have-to-have” function for most American companies. Up to 80 percent of organizations now perform some kind of criminal background check, and the number is growing. In addition, companies that might have only performed criminal checks in the past are now adding checks of past employment, education, credit and driving histories, sex offender registries, restricted parties lists (like OFAC) and much more.

But while background screening becomes ubiquitous, organizations still tend to make many mistakes in their screening procedures and practices.

MISTAKE 1: Not establishing a standard background screening policy

Just because a company conducts some form of background check doesn’t mean that its recruiters or security professionals are performing the checks consistently or using the data appropriately. Having a standard written policy for every job title assures that the same types of checks are always performed on like individuals and that data is used in compliance with all company, industry, state and federal regulations. It also avoids any appearance of discrimination.

MISTAKE 2: Not verifying employment and education

Sometimes the desire to quickly secure a seemingly good candidate can lead a company to accept resume data at face value. This can be a big mistake. Roughly one third of all resumes contain some kind of misrepresentation in terms of employment history, education or experience. In addition, so-called “diploma mills” have grown to a $200 million industry and continue to expand. Even for jobs where education and/or experience are not critical to success, a purposeful misrepresentation can signal problems of character in a potential hire.

MISTAKE 3: Not checking vendors, contractors, temps

One security director of a large multi-national company commented that it was illogical that he had to have a background check and an escort to see his CEO, while the man who serviced the green plants could walk into the CEO’s office any time unchecked and unescorted. One of the greatest vulnerabilities of companies today is among the large number of unchecked suppliers and temporary employees. The sad fact is that people with questionable backgrounds will eventually gravitate to industries where background checks are seldom performed on employees. Making background screening for temporary, contract and vendor-employed workers a standard policy should be part of any company’s policy for internal controls.

MISTAKE 4: Not conducting international checks when required

Today’s talent pool is global. Even candidates who are U.S. citizens may have had some portion of their education or experience outside the country. It is just as important to verify international backgrounds as it would be for local ones. International background checking, however, is more complex and governed by many different local statutes, policies and procedures. Security professionals should seek out a competent international screening partner.

MISTAKE 5: Not protecting against negligent retention

If an employee causes damage or harm in the workplace, and recent criminal activity, driving infringements or drug abuse could have been discovered by the employer prior to the workplace incident, the employer may be found liable for negligent retention. Conducting checks on all new hires, prior to duty, is essential. Keep in mind, also, that a lot can happen in the years after a new hire comes aboard. Organizations can sometimes protect themselves with periodic post-hire criminal checks and drug testing, so long as such investigations remain respectful of employees’ personal lives and laws.

MISTAKE 6: Relying on manual internal processes

The more times a candidate’s background information is hand-entered into different forms or systems, the greater the chance for human error. In addition, unscrupulous candidates may put different information on their resume, employment application and background checking form, relying on the fact that the company won’t notice the discrepancy among the pile of papers. Today’s companies can overcome these problems by seeking out a background screening process that is integrated into their recruitment software. Data from the recruiting solution can automatically populate the background screening request form of a screening provider, and checks can be ordered at the touch of a couple keys with no need for faxing or duplicate data entry.

It is important to note that effective background screening requires human intervention and intuition on the screening provider’s side of the fence – criminal checks, for example, often require manual checks of court records and files – so be weary of fully automated systems that provide instant checks. Finding solutions that combine the best of automation and human investigation gives optimum return on investment.

As employment background screening has grown, it has also changed. A far cry from the mom and pop detective service of old, background screening services today are truly an extension of an organization’s security and recruitment departments. Avoiding these six common oversights will help organizations get the full benefit from their modern background screening program.

Ferreting out employees who steal software at work – Garret the Ferret is the Business Software Alliance’s copyright crusading mascot. Photo courtesy: PRNewsFoto

Sidebar: Employee Harm Through Office Computers

Effective background screening can not only alarm to a candidate with a history of violence or illegal drugs but also one who has harmed previous employers through computer and information incidents.

Such threats are real and cause a liability headache. Software piracy is a growing concern, report readers of Security magazine in a recent Web-based survey. A study by the Business Software Alliance contends that global piracy fell a percentage point last year. But some 35 percent of software on PCs was used illegally. The software industry’s losses from piracy hit a record $33 billion in 2004. That’s up 14 percent from $29 billion in 2003.

Some background screenings now delve into a person’s past history of illegal and unethical activity related to computer and information security issues as well as software piracy.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • physicalsec_enews

    6 Common Building Security Mistakes That You Must Avoid

    See More
  • alarm-security-fp1170x658v4.jpg

    The hidden costs of alarm systems (and how to avoid them)

    See More
  • power-plant-energy-freepik

    Top 5 security threats for power plants and how to proactively avoid them

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing