Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Improving the Dependability of an ID Program

By Bernard J. Scaglione
March 1, 2009

From the Fortune 10 conglomerate securing company trade secrets to the local retailer verifying the authenticity of customer’s credit cards, inaccurate identification can lead to lost revenue and increased liability. Identification is the collecting of data to determine who an individual is and what level of security they should possess. This process is conducted through the checking of an individual’s background and credentials. When designing an identification program, processes should be considered, to increase the program’s effectiveness and reliability. In assessing the implementation of an identification program, consideration should be given to authenticating baseline data and providing continuous data updates.

The authentication of identity has become a complex and sometimes unreliable process. The ability to obtain first hand information on an individual’s background is becoming expensive and available information is increasingly more unreliable. In order to maintain a high quality authentication program, multiple types of verification should consider in the identification process. The authentication verification process requires the establishment of standard criteria for the collection and confirmation of the data chosen to establish identification. These standards should be specific and written, outlining the hiring and retention of employees and their access privileges into security sensitive areas.


Authenticating an Identity

Traditionally, corporate entities utilize six potential avenues to authenticate an identity: job application, employment reference check, personal reference check, criminal background check, education check and check of permits, licenses and other governmental records. The key to the successful utilization of these identity checks is personal verification, the personal review of data with the candidate to ensure the completion of all required information and most importantly its accuracy. Specifically, the personal review of name, Social Security number, address, date of birth and all other employment demographics necessary to meet the employment criteria.

Additionally, collected background information should be corroborated through primary source and multiple source verification. Primary Source Verification is the utilization of original source documents to gather background information. For example, when conducting a primary source criminal background check, a court document check would be preferable over the use of a third party clearinghouse. Multiple Source Verification is the comparison of original source documents with the goal of obtaining consistent demographic information: name, Social Security number, current home address, date of birth, educational degree, etc.

The same holds true when conducting a personal or employment reference check. Primary and multiple source verification should be utilized. Reliance on third party contact should be avoided. Employment reference checks should be directed to the person within the organization that is responsible for providing those checks and all employers listed on the application should be contacted and asked to provide data. When it comes to personal references, the person listed as the reference should be contacted – not a roommate, parent or spouse. And again, all of the listed personal references should be contacted. When a reference is contacted, verification should be made on the name spelling and the current address of the applicant. Once all of the reference data is gathered, multiple verification should be completed comparing all of the reference data.

Using primary and multiple source verification will make the authentication process more reliable. Primary source documentation ensures that the data requested is trustworthy. Using multiple source verification authenticates the identity of an individual. Both practices together provide for a more dependable foundation in which to build an identification and access control program.


Establish ID Standards

In addition to data verification, standards should be established that allow for continuous updates of the original data gathered. A reliable identification program should have the ability to detect and collect changes to the original background and reference data. It is necessary to be advised of changes to criminal convictions, loss or suspension of licenses, major change in credit rating, change of address or name changes.

Processes should be developed that establish regular updates to data and provide alerts when changes occur to an employee. Continuous monitoring of an individual’s activities is essential in the evaluation of access rights, especially when these rights are based on financial and other confidential criteria. Along with employment data, this data should be primary source verified to ensure it is correct. Updated data (like baseline data) requires personal confirmation with the employee and the agency that is reporting the change.

Working in a major metropolitan hospital, I sometimes encounter medical analogies which reinforce good security practice. In the case of authentication, the healthcare industry offers a good model to consider in the establishment of an identification program. Authentication relies on the collection of substantiated information. Hospitals today exemplify the practice of authentication through compliance with what are called the “National Patient Safety Goals.” These goals were developed to increase the safety of patients by instituting practices to reduce the possibilities of errors when providing care. Three Patient Safety Goals, in particular, demonstrate practices which should be considered in the implementation of identity programs: Accuracy of Patient Identification, Universal Protocol or Time Out, and Effective Communication.

According to the Accuracy of Patient Identification goal, all interaction with the patient from registration through discharge requires the use of at least two patient identifiers. The goals specifically states that every interaction, even if the same healthcare provider interacts with a patient several times during the course of treatment. In each and every encounter at least two methods must be used to verify identity. That means the provider must ask the patient his or her name and date of birth, look at the patient’s bracelet or their identification like driver’s license or credit card to confirm they are treating the correct patient. Multiple confirmations and the use of two or more verifiers is an excellent standard to consider when collecting data for any identification program.

The Effectiveness of Communication goal requires the reading back of verbal or telephone orders in the exchange of critical test values to ensure the information stated is correct. In addition, this standard requires a “hand-off” communication protocol. This protocol requires the development of a standard way to exchange necessary information from one care giver to another. This goal sets the standard for conducting personal or work references; continuous verification of data along with constant communication with the applicant sets the standard for reliable data collection.

The third goal is called Universal Protocol. This is used during surgical procedures to verify the correct person, the correct procedural site and the correct procedure. The key to this goal is the process called Time Out. A Time Out is conducted prior to starting a surgical procedure. During a time-out all activities are suspended so that all relevant members of the team are focused on the active confirmation of the correct patient, procedure, site and other critical elements. When reviewing data related to the verification and assignment of access rights a time-out will help to ensure the data is being reviewed and that it is correct.

Creating and implementing a successful identification program requires standards that need to be followed each and every time an identification needs to be verified. In assessing the implementation of an identification program, consideration should be given to authenticating baseline data and providing continuous data updates, which will ensure a smooth system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP, is a principal partner at The Security Design Group in New York City. He has 30 years experience in the security field. Ben is Chairman of the ASIS International Healthcare Council and president of the New York City Metropolitan Healthcare Safety and Security Directors Association. He is a member of the training council for the International Association for Healthcare Security and Safety and is an accomplished author writing for ASIS, the International Association for Healthcare Security and Safety and Lawyers and Judges Publishing. He currently teaches re-certification classes for licensed architects and professional engineers at the Platt Institute in New York City.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using Access and ID Control to Prevent Workplace Violence

    See More
  • Credible Security Services Wow CEOs

    See More
  • Bernard J. Scaglione

    Workplace Violence Prevention Revisited

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!