Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

6 Big Mistakes & How to Avoid Them

July 1, 2005
Employment background screening has gone from being a “nice-to-have” to a “have-to-have” function for most American companies. Up to 80 percent of organizations now perform some kind of criminal background check, and the number is growing. In addition, companies that might have only performed criminal checks in the past are now adding checks of past employment, education, credit and driving histories, sex offender registries, restricted parties lists (like OFAC) and much more.

But while background screening becomes ubiquitous, organizations still tend to make many mistakes in their screening procedures and practices.

MISTAKE 1: Not establishing a standard background screening policy

Just because a company conducts some form of background check doesn’t mean that its recruiters or security professionals are performing the checks consistently or using the data appropriately. Having a standard written policy for every job title assures that the same types of checks are always performed on like individuals and that data is used in compliance with all company, industry, state and federal regulations. It also avoids any appearance of discrimination.

MISTAKE 2: Not verifying employment and education

Sometimes the desire to quickly secure a seemingly good candidate can lead a company to accept resume data at face value. This can be a big mistake. Roughly one third of all resumes contain some kind of misrepresentation in terms of employment history, education or experience. In addition, so-called “diploma mills” have grown to a $200 million industry and continue to expand. Even for jobs where education and/or experience are not critical to success, a purposeful misrepresentation can signal problems of character in a potential hire.

MISTAKE 3: Not checking vendors, contractors, temps

One security director of a large multi-national company commented that it was illogical that he had to have a background check and an escort to see his CEO, while the man who serviced the green plants could walk into the CEO’s office any time unchecked and unescorted. One of the greatest vulnerabilities of companies today is among the large number of unchecked suppliers and temporary employees. The sad fact is that people with questionable backgrounds will eventually gravitate to industries where background checks are seldom performed on employees. Making background screening for temporary, contract and vendor-employed workers a standard policy should be part of any company’s policy for internal controls.

MISTAKE 4: Not conducting international checks when required

Today’s talent pool is global. Even candidates who are U.S. citizens may have had some portion of their education or experience outside the country. It is just as important to verify international backgrounds as it would be for local ones. International background checking, however, is more complex and governed by many different local statutes, policies and procedures. Security professionals should seek out a competent international screening partner.

MISTAKE 5: Not protecting against negligent retention

If an employee causes damage or harm in the workplace, and recent criminal activity, driving infringements or drug abuse could have been discovered by the employer prior to the workplace incident, the employer may be found liable for negligent retention. Conducting checks on all new hires, prior to duty, is essential. Keep in mind, also, that a lot can happen in the years after a new hire comes aboard. Organizations can sometimes protect themselves with periodic post-hire criminal checks and drug testing, so long as such investigations remain respectful of employees’ personal lives and laws.

MISTAKE 6: Relying on manual internal processes

The more times a candidate’s background information is hand-entered into different forms or systems, the greater the chance for human error. In addition, unscrupulous candidates may put different information on their resume, employment application and background checking form, relying on the fact that the company won’t notice the discrepancy among the pile of papers. Today’s companies can overcome these problems by seeking out a background screening process that is integrated into their recruitment software. Data from the recruiting solution can automatically populate the background screening request form of a screening provider, and checks can be ordered at the touch of a couple keys with no need for faxing or duplicate data entry.

It is important to note that effective background screening requires human intervention and intuition on the screening provider’s side of the fence – criminal checks, for example, often require manual checks of court records and files – so be weary of fully automated systems that provide instant checks. Finding solutions that combine the best of automation and human investigation gives optimum return on investment.

As employment background screening has grown, it has also changed. A far cry from the mom and pop detective service of old, background screening services today are truly an extension of an organization’s security and recruitment departments. Avoiding these six common oversights will help organizations get the full benefit from their modern background screening program.

Ferreting out employees who steal software at work – Garret the Ferret is the Business Software Alliance’s copyright crusading mascot. Photo courtesy: PRNewsFoto

Sidebar: Employee Harm Through Office Computers

Effective background screening can not only alarm to a candidate with a history of violence or illegal drugs but also one who has harmed previous employers through computer and information incidents.

Such threats are real and cause a liability headache. Software piracy is a growing concern, report readers of Security magazine in a recent Web-based survey. A study by the Business Software Alliance contends that global piracy fell a percentage point last year. But some 35 percent of software on PCs was used illegally. The software industry’s losses from piracy hit a record $33 billion in 2004. That’s up 14 percent from $29 billion in 2003.

Some background screenings now delve into a person’s past history of illegal and unethical activity related to computer and information security issues as well as software piracy.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • physicalsec_enews

    6 Common Building Security Mistakes That You Must Avoid

    See More
  • alarm-security-fp1170x658v4.jpg

    The hidden costs of alarm systems (and how to avoid them)

    See More
  • power-plant-energy-freepik

    Top 5 security threats for power plants and how to proactively avoid them

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing