Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Education & Training

Pre-Employment Background Screening: More to it than Meets the Eye

By David C. Sawyer
September 6, 2011

In today’s “microwave society” the need for speed often supersedes thoroughness, but in the absence of comprehensive background checks on prospective employees, haste can result in waste…and sometimes worse.

Gone are the days when the hiring process was based on a good “gut” feeling and a firm handshake, yet there remain a fair number of otherwise very savvy business people who take the self-service approach to background screening. Without question, the Internet has made the screening process somewhat simple and inexpensive, but without knowing what to look for and where to find it, information can be confusing and/or misleading.

In addition, you may be treading on illegal ground, for while you have the right to obtain specific information when conducting a pre-employment background check, those rights are not unlimited. Employees are entitled to privacy in certain areas, and if those rights are violated, legal action can be taken against you.

That said, at the top of the allowed list of screening sources for most employers is a search for criminal records. But there are myriad of ways to search for them and it is incumbent on the employer to ask questions about the source for a variety of reasons. If a background screening firm is providing access to a private database – even those that claim to be national in scope – it’s critical that the employer know the limitations of these searches and the added legal responsibility imposed to verify the information at the original source (usually the court). 

If the screening firm is searching a statewide repository for criminal records, it’s important to know its limitations as well. This will vary by state and you need to balance the benefits of searching an entire state for criminal records in one search versus the generally more accurate and up-to-date information found in a county court search.

Consider also that significant differences exist between a national database search, a real-time county level search and a state repository investigation. Each has its advantages and disadvantages, as well as considerable cost differences.

Again, the best place to search for a criminal record is at the original source – the courthouse where the record originated. That could be county or federal court, so it’s wise to work with a professional background screening organization with an established national network of court researchers. In this way, a request can be sent automatically to a local researcher who knows how to navigate the court system in that particular jurisdiction.

A county or federal district court search yields the most accurate and up-to-date criminal record information available and should always be used to verify results from the quicker but often less reliable database searches…especially if a record possibly matching a potential employee shows up.

Having the correct identification information is vital to conducting a criminal search…and people hiding a past they know might prevent them from getting a job can be good at keeping a secret. Reporting a false date of birth may be enough to bring back a “no record found” on the report when a serious criminal conviction actually exists. 

Imagine the potential harm if an employee is involved in a workplace act of violence because you didn’t have knowledge of past similar occurrences – whether due to not conducting a background check or a missed conviction record resulting from ineffective pre-employment screening.

In terms of obtaining a consumer report, under the Fair Credit Reporting Act (FCRA), employers must obtain a potential employee’s written consent before seeking this documentation. Note that background screening agencies are considered Consumer Reporting Agencies (CRA) under the FCRA; all reports provided by a CRA are therefore deemed to be consumer reports. And if your decision not to hire that individual is based on consumer report information, you’re obligated to provide the applicant with a copy of the report and inform him/her of their right to challenge the report. Take note also that some states incorporate more rigid rules limiting the use of consumer reports than does the federal FCRA.

Take the time to learn the fundamentals of a background screening so that it’s commensurate with the level of trust and responsibility that goes with the available position. It will prove to be a worthwhile investment.   

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Sawyer is president of Safer Places, Inc. (www.saferplacesinc.com), a company that specializes in pre-employment screening, tenant screening and security consulting. He is a contributing writer for Security magazine.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Background Checks on College Students: Lessons Learned the Hard Way

    See More
  • social media

    Tips for employer social media screening

    See More
  • Investigating Beyond FBI Fingerprinting

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing