Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Creating a Security-Conscious Environment Through Employment Screening

By Rob Pickell
September 28, 2010

The key to promoting a safe, secure workplace isn’t reactively managing crises through zero tolerance policies, but proactively creating a security-conscious environment and corporate culture. An important first step in creating this culture is the employment screening program. 

The Security-Conscious Culture

According to Barry Nixon, executive director, National Institute for Prevention of Workplace Violence, “Creating a secure workplace environment involves several components integral to the corporate culture. Fostering an engaged, ethical workforce with clear guidelines for identifying and handling potential threats is key to avoiding workplace violence and it’s important that security and HR departments work together. For example, organizations should proactively address any warning signs or co-worker comments or complaints to HR. Security professionals should also be involved in exit interviews to influence questions that identify any potential issues or individuals. The overall goal should shift from zero tolerance of workplace violence incidents to zero incidents entirely.”

An employment screening program is a critical step for reducing the risk of workplace violence incidents and helping organizations develop a security-conscious environment, and it’s a program on which HR and security departments must be closely aligned. Pre-employment screening is practically ubiquitous in large companies, and in fact, the 2010 HireRight Employment Screening Benchmarking Report showed that 94 percent of respondents conduct background screening. There are, however, a few common significant screening security gaps that many companies haven’t identified and plugged. The most widespread issues are in terms of global screening, contingent workforce screening and ongoing employee screening.


Global Screening

Global screening is important both for organizations with offices worldwide and for those with domestic candidates with international backgrounds. Global criminal checks and sanctions lists are especially important to help address terrorism risks and avoid making a bad hire. Global screening can be complicated as each country has its own unique laws and available data. Screening solutions should guide users through the processes and regulations for each country, including identifying specific information required, documents that can be obtained, and regulations governing data usage, so organizations stay in compliance worldwide.

Contingent Workforce Liabilities

The contingent or extended workforce including temporary and contract employees and vendor and partner employees can have extensive access to an organization’s personnel, facilities, property and systems, but they often aren’t as fully vetted as regular employees. This is the case, in fact, for the 65 percent of respondents to the HireRight Benchmarking Report who do not screen non-employee workers. Organizations may request that vendors screen, but companies often don’t know how diligent the vendor’s process is. One way employers can ensure compliance with screening guidelines is by preventing access to the organization until clearing mandated employment screening. The vendor can manage the screening process directly, and some screening solutions can be integrated with badging systems to ensure contingent and vendor workers meet screening standards before being granted access.

Ongoing Employment Screening

Often once an employee is hired, the individual may never be screened again, leaving the company potentially liable for negligent retention and preventing it from identifying changes in criminal history that could raise a red flag. It’s a best practice to screen on a recurring basis, such as when an individual is promoted or changes jobs and on a company-wide recurring schedule every few years. 

Changing Regulatory Environment

New EEOC and other regulatory requirements may affect the screening process. The EEOC is taking a harder look today at employment screening and the possibility that screening disparately impacts protected classes and could be the basis for discrimination charges. Employers must shift their processes to address these concerns and requirements, but still ensure a secure workplace -- a balancing act that requires careful consideration.

According to Nixon, “The best approach is to shift the screening program away from blanket policies against hiring any convicted individuals to a more complex, multi-layered policy that takes into consideration the nature of the conviction, the job responsibilities, the relevance of the crime, and the length of time since the crime was committed. It’s important the policy and procedures demonstrate an appropriate balance.”


Future Role of Screening

The key to preventing workplace violence is the creation of a more security-conscious environment. The screening program is one of the first steps toward developing an overall environment that fosters security and is inherently not conducive to violence. This requires strategic planning around the employment screening program to identify and close common security gaps, such as global, contingent workforce and recurring employee screening, while adapting the program to current laws and regulations. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob Pickell is senior vice president of customer solutions for HireRight, a leading provider of on-demand employment screening solutions. More information can be found at www.hireright.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Hire a Leader: Six Common Screening Mistakes

    See More
  • How is Nova Southeastern University Creating a Safe Campus Environment?

    See More
  • classified

    Creating a Culture of Data Safety Through Classification

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing