Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Investigating Beyond FBI Fingerprinting

Massachusetts, the state recently started requiring FBI fingerprint-based criminal background searches for teachers and other school employees.

By David C. Sawyer
Background checks

David Sawyer

August 1, 2014

Massachusetts, the state recently started requiring FBI fingerprint-based criminal background searches for teachers and other school employees. Previously, all that was required was a Criminal Offender Record Information (CORI) search. As statewide repositories go, CORI is generally accepted as being one of the good ones. Most other states don’t have a one-search option allowing private employers to skip the county-by-county court searches that are as good as CORI.

Still, CORI provides criminal record information from Massachusetts courts only.  The vilest offender with a criminal conviction record in another state will go undetected if the employer only searches the CORI system. That’s not a knock on CORI; it does what it’s designed to do pretty well. But lawmakers here and elsewhere do not want to take a chance that a school teacher or a school bus driver has a conviction record in another state involving violence, sex offenses or some other crime making the individual unfit to work around children. They can’t leave it to chance that a record in another state goes undetected because they continue to rely on a system that reports in-state convictions only.

So Massachusetts, like so many other states before, has started requiring fingerprints to be taken and submitted to the FBI. The Bureau then searches its database that contains records from across the country. Many private employers are also mandated to follow this process due to the sensitive nature of the jobs for which they hire.

 

So, Problem Solved, Right?

Apparently, lawmakers believe this to be so as they continue to pass laws requiring fingerprint-based background checks. For sure, if the issue is a question of identity, fingerprints are the way to go.  My name is David Sawyer, but if I tell you it’s John Doe because I don’t want you to search for records under my name, you could miss finding that record that I’m trying to hide from you. 

The problem is that lawmakers watch television just like the rest of us do. And TV shows portray the FBI database as the holy grail of all databases. Type a name on the keyboard and within seconds, every parking ticket the subject has received, every job he’s ever held, and what book clubs he belongs to is revealed. Lawmakers, and the rest of us TV watchers too, need to realize that it just isn’t that easy.

Criminal records are created in courts. Whether convicted or not, the record is maintained by the court. So, for that record to get into the FBI database (or CORI or any other database), the court has to share the information. Frankly, some states are better at this than others and not all criminal records make their way into the FBI’s database. Of those that do, not all contain final dispositions. Employers need to know whether or not there was a conviction when making a hiring decision, but the FBI doesn’t always know this. In fact, the Department of Justice has acknowledged that the FBI is still missing final disposition information for approximately 50 percent of its records. 

The extent to which each state reports records to the FBI varies widely. The federal government acknowledges that it’s possible to obtain more accurate information from professional background screeners. We place a lot of trust in fingerprint technology and in the FBI. We want to be sure we get it right when it comes to protecting school children. 

But maybe the answer isn’t a simple one. If one needs to be certain of an identity, no one will argue the validity of fingerprints. But what good does it do to be absolutely certain you’ve got the right person if your search about that person is flawed? 

No database on earth contains all criminal records. Therefore, professional background screeners generally take the following approach:

  1. Identify the subject via driver’s license, passport, etc.
  2. Run a Social Security number trace that provides names and addresses associated with the number.
  3. Compare the information provided with what is known including the death master file of the Social Security Administration (if the subject provided a false SSN, it’s usually apparent).
  4. Search county court records and state repositories in the jurisdiction(s) where the subject is known to have resided.
  5. Search commercial database(s) that aggregate court records on a national basis.

This tried and true method, while not perfect, has been working well for many years and the error rate for professional background screeners (not those instant online searches) is generally considered to be very low. In reputable companies, reports are rarely challenged, and even fewer turn out to have something missing or incorrect.

In addition, professional background screeners are heavily regulated, and consumers are afforded widespread protections under the federal Fair Credit Reporting Act (FCRA) and additional state regulations. The FBI is not considered a Consumer Reporting Agency and therefore not subject to the FCRA. While a background screening company is required to reinvestigate when a complaint is lodged and resolve the matter within 30 days, the FBI has no such compulsion.

Time is also usually of the essence in these situations. Employers who purchase background screening services need and expect answers quickly. The turnaround times for professional background screeners are generally three business days or less. The FBI often takes 45 days or more to provide a report that is frequently incomplete and still needs additional research.

 

The Answer?

It may well be that the answer lies somewhere in between. But, for companies with limited budgets, needing fast and accurate results, the clear choice is a professional background screening company. In addition, the need to comply with the new laws mandating the use fingerprint-based searches may offer many companies and school districts a false sense of security, and so will stop their searches there. They will satisfy the law and do no more, unintentionally putting children and others at risk. Background checks help employers select the right individuals to fill open positions. Especially when the safety of children, the elderly or other vulnerable people is at stake, a thorough background check is a must. But let’s be careful when passing mandates requiring employers to do it one way, when there is clearly a better, more accurate method that is quicker and provides better protections to consumers. 

 

About the Author: David C. Sawyer, CPP, is President of Safer Places, Inc., a full service background screening and drug testing company serving clients nationwide. He can be reached at dsawyer@SaferPlacesInc.com    

KEYWORDS: background check background screening criminal background checks FBI fingerprinting

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0911 edu feature author

David Sawyer is president of Safer Places, Inc. (www.saferplacesinc.com), a company that specializes in pre-employment screening, tenant screening and security consulting. He is a contributing writer for Security magazine.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • FBI Investigating iPad Security Breach

    See More
  • FBI investigating possible letter threats to Herbert, other governors

    See More
  • New Newswire Feature Image 3/8/2012

    FBI Investigating Cyberattack on JPMorgan

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!