Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Investigating Beyond FBI Fingerprinting

Massachusetts, the state recently started requiring FBI fingerprint-based criminal background searches for teachers and other school employees.

By David C. Sawyer
August 1, 2014

Massachusetts, the state recently started requiring FBI fingerprint-based criminal background searches for teachers and other school employees. Previously, all that was required was a Criminal Offender Record Information (CORI) search. As statewide repositories go, CORI is generally accepted as being one of the good ones. Most other states don’t have a one-search option allowing private employers to skip the county-by-county court searches that are as good as CORI.

Still, CORI provides criminal record information from Massachusetts courts only.  The vilest offender with a criminal conviction record in another state will go undetected if the employer only searches the CORI system. That’s not a knock on CORI; it does what it’s designed to do pretty well. But lawmakers here and elsewhere do not want to take a chance that a school teacher or a school bus driver has a conviction record in another state involving violence, sex offenses or some other crime making the individual unfit to work around children. They can’t leave it to chance that a record in another state goes undetected because they continue to rely on a system that reports in-state convictions only.

So Massachusetts, like so many other states before, has started requiring fingerprints to be taken and submitted to the FBI. The Bureau then searches its database that contains records from across the country. Many private employers are also mandated to follow this process due to the sensitive nature of the jobs for which they hire.

 

So, Problem Solved, Right?

Apparently, lawmakers believe this to be so as they continue to pass laws requiring fingerprint-based background checks. For sure, if the issue is a question of identity, fingerprints are the way to go.  My name is David Sawyer, but if I tell you it’s John Doe because I don’t want you to search for records under my name, you could miss finding that record that I’m trying to hide from you. 

The problem is that lawmakers watch television just like the rest of us do. And TV shows portray the FBI database as the holy grail of all databases. Type a name on the keyboard and within seconds, every parking ticket the subject has received, every job he’s ever held, and what book clubs he belongs to is revealed. Lawmakers, and the rest of us TV watchers too, need to realize that it just isn’t that easy.

Criminal records are created in courts. Whether convicted or not, the record is maintained by the court. So, for that record to get into the FBI database (or CORI or any other database), the court has to share the information. Frankly, some states are better at this than others and not all criminal records make their way into the FBI’s database. Of those that do, not all contain final dispositions. Employers need to know whether or not there was a conviction when making a hiring decision, but the FBI doesn’t always know this. In fact, the Department of Justice has acknowledged that the FBI is still missing final disposition information for approximately 50 percent of its records. 

The extent to which each state reports records to the FBI varies widely. The federal government acknowledges that it’s possible to obtain more accurate information from professional background screeners. We place a lot of trust in fingerprint technology and in the FBI. We want to be sure we get it right when it comes to protecting school children. 

But maybe the answer isn’t a simple one. If one needs to be certain of an identity, no one will argue the validity of fingerprints. But what good does it do to be absolutely certain you’ve got the right person if your search about that person is flawed? 

No database on earth contains all criminal records. Therefore, professional background screeners generally take the following approach:

  1. Identify the subject via driver’s license, passport, etc.
  2. Run a Social Security number trace that provides names and addresses associated with the number.
  3. Compare the information provided with what is known including the death master file of the Social Security Administration (if the subject provided a false SSN, it’s usually apparent).
  4. Search county court records and state repositories in the jurisdiction(s) where the subject is known to have resided.
  5. Search commercial database(s) that aggregate court records on a national basis.

This tried and true method, while not perfect, has been working well for many years and the error rate for professional background screeners (not those instant online searches) is generally considered to be very low. In reputable companies, reports are rarely challenged, and even fewer turn out to have something missing or incorrect.

In addition, professional background screeners are heavily regulated, and consumers are afforded widespread protections under the federal Fair Credit Reporting Act (FCRA) and additional state regulations. The FBI is not considered a Consumer Reporting Agency and therefore not subject to the FCRA. While a background screening company is required to reinvestigate when a complaint is lodged and resolve the matter within 30 days, the FBI has no such compulsion.

Time is also usually of the essence in these situations. Employers who purchase background screening services need and expect answers quickly. The turnaround times for professional background screeners are generally three business days or less. The FBI often takes 45 days or more to provide a report that is frequently incomplete and still needs additional research.

 

The Answer?

It may well be that the answer lies somewhere in between. But, for companies with limited budgets, needing fast and accurate results, the clear choice is a professional background screening company. In addition, the need to comply with the new laws mandating the use fingerprint-based searches may offer many companies and school districts a false sense of security, and so will stop their searches there. They will satisfy the law and do no more, unintentionally putting children and others at risk. Background checks help employers select the right individuals to fill open positions. Especially when the safety of children, the elderly or other vulnerable people is at stake, a thorough background check is a must. But let’s be careful when passing mandates requiring employers to do it one way, when there is clearly a better, more accurate method that is quicker and provides better protections to consumers. 

 

About the Author: David C. Sawyer, CPP, is President of Safer Places, Inc., a full service background screening and drug testing company serving clients nationwide. He can be reached at dsawyer@SaferPlacesInc.com    

KEYWORDS: background check background screening criminal background checks FBI fingerprinting

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Sawyer is president of Safer Places, Inc. (www.saferplacesinc.com), a company that specializes in pre-employment screening, tenant screening and security consulting. He is a contributing writer for Security magazine.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • FBI Investigating iPad Security Breach

    See More
  • FBI investigating possible letter threats to Herbert, other governors

    See More
  • FBI Investigating Cyberattack on JPMorgan

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing