Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementPhysical Security

Continuous Monitoring of Employees Gaining Traction

Background checks are out; continuous monitoring is in.

By Michael Gips
SEC0620-Continous-Feat-slide1_900px
SEC0620-Continous-slide2_900px
SEC0620-Continous-Feat-slide1_900px
SEC0620-Continous-slide2_900px
June 5, 2020

On the morning of Monday, August 19, 2019, 76-year-old Evelyn Udell Smith opened her door to let in a deliveryman who was hauling the appliances she had purchased at Best Buy. That man, Jorge Luis Dupre Lachazo, entered the Boca Raton, Fla. home and beat Udell Smith to death with a mallet and doused her with a chemical, causing Smith to burst into flames. A month earlier, Dupre Lachazo’s driver’s license had been suspended for failure to show up to a court hearing after running a stop sign. But it is unlikely that the delivery contractor that had hired Dupre Lachazo knew about the suspension.

Years earlier, just weeks before his rampage, Navy Yard shooter Aaron Alexis had had his federal security clearance renewed, despite having been arrested three times in the previous decade. His superiors didn’t know about those arrests.

Cases like these, as well as the prospect of liability for negligent hiring or retention, have sparked heightened interest in continuous monitoring (CM). That’s having a firm send an employer alerts if staff members get arrested or incarcerated, or in some cases, if they have liens filed against them, have become liable for civil judgements, appear on no-fly lists, lose their medical license, get disbarred, or otherwise appear in a database that calls into question the safety or security implications of keeping them on board.

Pre-employment screening is the cornerstone of a responsible personnel security program. Ninety-six percent of organizations conduct preemployment checks, according to the National Association of Professional Background Screeners and HR.com. In many regulated industries and positions, the practice is mandated.

But both the Boca Raton and Navy Yard cases exposed the limitations of preemployment checks. They represent a fixed point in time that looks backwards, blind to any nefarious activity that occurs post-check. “The day the background check is done, it’s dated,” declares Raj Ananthanpillai, the CEO of Endera, a subscription-based SaaS provider of continuous monitoring services.

 

Limited Adoption so Far

Hence the appeal of CM. But few employers use the service. Why the limited uptake so far? First, it’s relatively new, in part because the technology for immediate alerts hadn’t been widely available. Then there are budget and oversight issues. “Background screening is baked into corporate costs,” says Vince Brodt, VP of Customer Experience at SJV Data Solutions. “CM isn’t.”

While background screening typically falls under human resources, CM doesn’t. It requires collaboration among HR, risk, security and compliance, according to Brian Matthews, president of Appriss Insights, which provides data solutions related to background screening and CM.

Also, “continuous” sometimes means “continual.” Experts point out that a true CM program is literally continuous, with little or no latency between when an incident is recorded and when it becomes available to the employer. With some programs there’s a lag before the employer receives an alert.

Scott Vanek, CEO of SJV Data Solutions, points out that there are 2,000 or so firms that collect data on individuals and supply it to client employers in the U.S., “But it’s single digits in terms of who is using a true real-time CM product today,” he says. Some firms don’t forward data for 30 or 60 days, Vanek adds.

 

Doing CM Right

Compliance issues figure heavily in creating a sound program.

“Monitoring is a great thing when done correctly,” according to Pamela Devata, a partner at Seyfarth Shaw LLP who heads the law firm’s Background Screening Compliance and Litigation Defense team. A user must navigate several issues. First, a monitoring company might be considered a credit reporting agency under the U.S. Fair Credit Reporting Act (FCRA); many factors weigh into that determination, says Devata. If the FCRA applies, companies must have a “permissible purpose” for obtaining an employee’s background information, including hiring, promotion, reassignment and retention. Since CM is undertaken for all these purposes except hiring, “permissible purpose” is usually not an obstacle, says Devata. Similarly, the FCRA requires that staff members authorize employers to obtain and act upon consumer reports. It’s unusual for an employee to refuse, says Devata because an organization can make CM a condition of employment.

State laws also apply. For example, under California law an employer must obtain separate consent from the employee every time it seeks a new investigative report, but with some exceptions, which creates ambiguity.

Other issues may be more troublesome. Devata and Nick Fishman, an expert in screening and CM, caution about taking action against employees who have been arrested but not convicted. Guidance from the U.S. Equal Employment Opportunity Commission issued in April 2012 establishes that arrest records per se create an adverse impact on minority populations under Title VII of the Civil Rights Act of 1964.

Furthermore, employers should be scrupulous about making sure that the data they receive about employees is accurate. “If someone gets pulled over,” says Devata, “they can give any name they want, and that goes into the database.” That’s why experts say that better matching occurs with more data about the employee: not only name and date of birth, but also Social Security number, post-nominals, driver’s license number and so on.

Accuracy involves timeliness, as well as correct information. Employers have to ask whether the status of an alert will change quickly. “Is the status of an incarceration subject to change with such rapidity that what is reported today is likely to change before an employer acts?” asks Jason Morris, founder of EmployeeScreenIQ. “For instance, what if I rely on an incarceration alert I receive today and use that report to make an employment decision, but the charges are dropped or amended to lesser charges tomorrow?”

Alerts should be relevant to the duties of the employee, experts stress, and they must be relevant for the company to take action based on that information. For example, a manufacturing company might receive alerts if one of its drivers gets arrested for a DUI, but not if one of its accountants does.

Most companies providing CM services offer arrest and incarceration notices. Endera is among those CM companies that provide many other alerts. It boasts 25,000 data sources, covering criminal and civil records, licenses, no-fly lists, watch lists, do-not-do-business lists and so on.

While more data sources cover more territory, those sources need to be pertinent. As Morris puts it, “Make sure your vendor has the most data points that apply to your business — the deepest data from the most sources — tries to normalize that data the best way and can guide employers how to legally use the information properly.”

 

Setting Policies

Matthews advises that companies implementing CM for criminal activity establish a “clear and consistent self-reporting policy for all criminal behavior, including arrest.” Fishman adds that counsel may advise the employer to “list the types of criminal activities being monitored, or document the spectrum of disciplinary options employees will be subject to in the event of an arrest or any other concerning record.” Matthews emphasizes that the employer investigate, using well-articulated, preexisting policies and procedures,” any activity that a CM program reports about an employee. Employers court major trouble if they fail to investigate an alert before taking an adverse action.

“You’re going to want to update your employee manual,” adds Fishman. “Communicate and explain to staff what you are doing and why you are doing it. Define a process of how you are going to do this, what the different administrative practices are and how you will react to things,” he adds. This will lead to staff understanding and buy-in as opposed to feeling surveilled.

But policies in employee manuals only go so far. “Our customers have employee manuals with do’s and don’ts,” says Ananthanpillai. “For example, in financial services and airlines there are self-reporting requirements. But there is no way to monitor those don’ts.”

 

Establishing a Beachhead

Despite compliance hurdles, the market for CM is burgeoning. Fishman says that regulated industries, such as financial services, as well as those that serve vulnerable populations, such as child care and nursing homes, have been the first adopters. “You will see larger market adoption,” Fishman says. “But those are ground zero.”

Matthews has been tracking the market growth in CM. According to him, “2019 and 2020 are beachhead years for key industries — education, retail, transportation, healthcare, finance and the gig economy. In each you have one or two top tier companies either doing it or starting it.”

COVID-19, by causing mass layoffs, may accelerate the trend toward the gig economy, which could increase the uptake of CM. “Ultimately, this is going to go into the “Know Your Customer” realm,” Ananthanpillai says. “Workers will move from gig to gig. How do you keep track?”

Morris points out another reason for the likely growth of the industry: the emergence of ban-the-box laws in U.S. states and cities, which prohibit companies from refusing to hire an applicant with a rap sheet. “It’s going to be less socially acceptable not to hire someone because they have a criminal record,” he says. But employers have to protect themselves against risk. “They’re going to say, ‘We will give you a chance, but we will be watching you like a hawk,’” Morris notes.

Companies that have traditionally provided background checks have rapidly added CM services. “We are at the first inning of a tectonic shift in the market from a one-and-done background screen to CM,” says Matthews. “Employers want to make sure they are keeping their workplaces safe. And it’s also just good business.”

KEYWORDS: background check compliance continuous monitoring security criminal activity risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • supply chain 1 feat

    Indiana Gaining Traction Against Highway Copper Thefts

    See More
  • banking responsive default

    Study Shows Mobile Pay Gaining Traction, but Shoppers Still Pick Cash, Check

    See More
  • Cyber Tactics Chabinsky Default

    How Continuous Is Continuous Monitoring?

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!