Background Screening and Investigations :Managing Hiring Risk from the HR and Security Perspectives

Publication subTitle :Managing Hiring Risk from the HR and Security Perspectives

Author: Nixon   W. Barry;Kerr   Kim  

Publisher: Elsevier Science‎

Publication year: 2011

E-ISBN: 9780080569178

P-ISBN(Paperback): 9780750682565

P-ISBN(Hardback):  9780750682565

Subject: C931 management techniques and methods

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be employment background screening, pre- and post-hire, which gives hiring personnel a glimpse into a person's past behavior patterns, propensities, and likely future behavior.

Background Screening and Investigations describes all aspects of the employment background screening processes - its history and evolution, the imperative for implementing a screening process, and the creation of a comprehensive policy. Nixon and Kerr show how security and human resources professionals can work together to negotiate legal hurdles and make their background screening process successful.

* Where do HR and security perspectives differ on hot topics like hiring convicted felons, data protection, and sexual predators?
* What does state law allow when screening job candidates?
* How should companies deal with emerging issues like international background investigations and continuous (Infinity) screening of current employees?

Chapter

Foreword

Identity Security and Required Background Screening in the Workplaces of the 21st Century

Looking at Background Screening and Identity Security From the Future

The Convergence of Three Great Forces: Technology, Privacy, and Security

The Employer's Challenge

Acknowledgments

Introduction

Myth No. 1

Background screening purely relates to criminality!

Myth No. 2

Getting a driverŁs license or the equivalent is enough for identification verification.

Myth No. 3

Consents and waivers are not needed for some types of background checks.

Myth No. 4

The FCRA does not apply in certain hiring circumstances.

Myth No. 5

Background checking companies do not have to be licensed.

Myth No. 6

A multistate or nationwide database is comprehensive and is an efficient and economical background screening resource.

Myth No. 7

You cannot ask for a date of birth without offering the candidate a job.

Myth No. 8

Hiring someone with a criminal past is just bad business.

Myth No. 9

Resumes are normally fairly accurate and should be good enough to make the initial hiring decision.

Chapter 1: Managing Risk in the Hiring Process

What Are We Risking by Not Having an Appropriate Screening Process?

The Avoidance of Risk-is This Possible?

Mitigating Risk Through Insurance and Indemnities

Mitigating Risk Through Contracting and Outsourcing

Risk Acceptance

Mitigating Risk Through Proper Security Planning and Activity

In-house vs. Outsourcing

Keeping It In-house

Outsourcing

Establishment of a Sound and Effective Background Screening Policy

Workplace Violence

Background Checks: Quality Results vs. Speedy Turnaround Times

In Summary

Chapter 2: Legal Issues in Background Checks

What Laws Govern Background Checks?

Federal Law-The Fair Credit Reporting Act

Scope of the FCRA

Legal Procedures for Entities Obtaining Consumer Reports

State Laws-Background Checks

State and Federal Laws-Other Statutes

The Legal Implications of Conducting Background Checks

Liability for Violation of the FCRA

Liability for Common Law Torts

The Legal Implications of Not Conducting Background Checks

Conclusion-Moving Forward

Chapter 3: The Role of Security in the Hiring Process

Roles and Responsibilities of Security and Human Resources in the Screening Process

Drug Screening

The Appeal Process

Summary

Chapter 4: Insights From Background Screening Surveys

Who Conducted the Survey?

Participants

Responses

Who do Businesses Conduct Background Checks on?

At What Point in the Hiring Process are Background Checks Conducted

Sensitive Jobs

Use of External Background Screening Firms

Which Function is Responsible for Background Screening?

Training for In-house Background Screening Staff

Background Screening Policy

Employment Application Questions

Summary

Chapter 5: Background Checking Policy

Laws Impacting Background Screening

Other Legal Concerns

The Benefits of Having a Background Screening Policy

Reduce Cost and Improve Profitability

Creating Your Background Screening Policy

Purpose of the Policy

Sample Policy Language

Intent

Considerations

Scope of the Policy

Sample Policy Language

Intent

Considerations

Responsible Organization

Sample Policy Language

Intent

Considerations

Sensitive Positions

Sensitive Positions Policy Statement

Sample Policy Language

Definition

Intent

Considerations

Targeted Positions

Sample Policy Language

Intent

Considerations

Process for Conducting Background Checks

Sample Policy Language

Intent

Considerations

Personnel Actions That May Trigger the Need for a Post Employment Background Check

Sample Policy Language

Definition

Intent

Consideration

Provisional Hires

Sample Policy Language

Intent

Considerations

Hiring Manager's Responsibility

Sample Policy Language

Intent

Consideration

Training and Communications

Sample Policy Language

Intent

Consideration

Adverse Action/Appeal Process

Sample Policy Language

Intent

Consideration

Nondiscrimination Clause

Sample Policy Language

Intent

Consideration

Record Keeping, Data Protection, and Destruction

Sample Policy Language

Intent

Considerations

Data

Data Protection

Data Input

Access Issues

Storing Data

In-transit Data

Data Destruction

Retention of Records

Legal Compliance

Sample Policy Language

Intent

Considerations

Third Party Suppliers of Employees: Contractors, Temporary Agency, Employment Leasing, or Professional Employment Organization

Sample Policy Language

Intent

Considerations

Policy Auditing Process

Sample Policy Language

Intent

Considerations

Continuous Post-Hire Background Checks

Summary

Suggested Reading

Chapter 6: Make or Buy

The "Buy" Decision: Outsourcing the Background Screening Function

Verification of Identity

State, County, and Multijurisdiction (National) Checks

Criminal and Civil Background Checks

Reference Checks and Previous Work History

Verification of Education and Professional License Records

Motor Vehicle Records

Sexual Offender Search

Terrorist Search

Credit History

Courthouse Searches

Turnaround Times

Methods to Meeting Your Order and Reporting Needs

Educational Verification

Private Investigator License

Limitations of National Databases

Compliance with Legal Requirements

Errors and Omissions Insurance

Negative Hit Policy and Procedure

"No Contact" Policy and Procedure

Certification of Staff Acceptability

Bona Fide Business Verification

Release of Information

Disclosure of Litigation

"No Resell" of Information Clause

Systems Integration

Predetermined Hiring Criteria

Training

Development or Review of Background Screening Policy

Demonstrated Financial Stability

System Security and Data Protection

Quality Assurance Policy

Service Level Agreements

The "Make" Decision: Establishing an In-house Background Screening Operation

Conclusion

Summary

Chapter 7: The New Focus on Protecting Personal Identifiable Information

Signs That the Current Approach is Not Working

Identity Theft

Employee Fraud

Property Theft

Accidental Leaks and Sabotage

The Impact of These Calamities on Organizations

What Should be Done to Fix the Problem?

Organizational Security

Data Protection

Data Input

Storing Data

Data Destruction

Employee Fraud

Data Retention

Federal Rules of Civil Procedure on Electronic Discovery

Hard Drives

The Peril of Purging

Summary

Chapter 8: Infinity Screening: Never-Ending Background Screening

Continuous Screening-An Idea Whose Time has Come

Managing Risk

Fiduciary Responsibility

Negligent Retention

Legal Requirements

Important Considerations in Implementing an Infinity Screening Program

Development of a Background Screening Policy

Notification and Appeal Issues

Access to Records

Determining Appropriate Action to Take

Making an Effective Business Decision

Policy Implementation

Communications and Training

Employee Relations Issues

Summary

Chapter 9: Screening Strategies for Temporaries, Casual Labor, Consultants, Contractors, and Vendors

Temporary Employees

Casual Labor

Contractors

Visitors

Consultants

Vendors

Summary

Chapter 10: The Special Case of Sexual Offenders

Can we Just "Spot" These Predators?

Not the Usual Suspects

Client Reputation is an Asset Worth Guarding

Get Assigned if Possible; Volunteer if Necessary

The Emperor's New Clothes

Sexual Predator Inquiries Versus Preemployment Background Checks

Duty of Care Versus Duty to Warn

Loss Risk or Harm Risk?

Incidence and Prevalence. Dispelling the Myths

Affliction or Addiction?

The Sexual Predator's Decision: to Groom or to Grab

The Grabbers

The Groomers

Groomer's Contingency Planning

Groomer's Method of Operation

Disrupting the Grooming: The Predator's Achille's Heel

Natural Selection Creates Groomers

Misperception of Sexual Abuse as an "Event"

Official Government Statistics

Criminal History is Rare, But it is Essential to Check it Thoroughly

Unusual Sentencing for Some Sex Offenders

"Risk Management Advice" for Youth-Serving Groups

The "Adverse Childhood Experience" Studies

Appearance of Conflict of Interest

What Does the Security Professional do With Adverse Observations?

Deflection, Not Detection

Supplemental Inquiry

Scrutiny, Not Suspicion

Civil Scrutiny

Post-Hire Background Checking and the Equal Employment Opportunity Commission

Federal Trade Commission and FCRA/FACTA

Forensic Review Board

Conclusion

Chapter 11: The Other Side of Background Screening

Individual Impact

What is the Potential Magnitude of the Impact?

State Laws and Their Impact on Use of Criminal Records for Employment Purposes

Alabama

Alaska

Arizona

Arkansas

California

Colorado

Connecticut

District of Columbia

Florida

Georgia

Hawaii

Idaho

Illinois

Indiana

Kansas

Kentucky

Louisiana

Maine

Maryland

Massachusetts

Michigan

Minnesota

Mississippi

Missouri

Montana

Nebraska

Nevada

New Hampshire

New Jersey

New Mexico

New York

North Carolina

North Dakota

Ohio

Oklahoma

Oregon

Pennsylvania

Rhode Island

South Carolina

South Dakota

Texas

Utah

Vermont

Virginia

Washington

West Virginia

Wisconsin

Wyoming

Social Impact

What are Some Possible Alternatives for Addressing this Problem?

Expungement

Four Key Common Elements of Expungement Among State Statutes

Extent to Which an Individual Can Deny Expunged Record

Rehabilitation-Worthiness of Having Records Expunged

Expunged Records and Access to Criminal Records

Government Support for Previously Incarcerated Persons

Employability Support for Previously Incarcerated Persons

Success Stories

Restrictions on Background Checks

Tips for Reducing Risk to Employers That Hire Previously Incarcerated Persons

Bonding Program

Employee Intermediaries

Summary

Chapter 12: International Background Checks: The New Frontier in Employment Screening

Quick Tips for What Employers Should Check on Foreign Nationals

Criminal Record Search

Names and name variations

Date of birth

International Identity number

Other information

Education and Employment Verifications

Homeland Security Search or Terrorist Watch List

National

International

Electronic Right to Work Eligibility Status

Buyers' Guide for Hiring a CRA to Conduct International Background Checks

Useful Websites to Get You Started

Criminal Records

Legal Requirement to Work

Summary

Chapter 13: Future Trends in Background Screening

Data Protection

Systems Integration

The Quest for the Perfect Identifier

Reference Checking Makes a Comeback

Continuous Background Checks

The Background Screening Business Model

Outsourcing

Marketing

International Talent Search

Legal Challenges

Credit Checks

Previously Incarcerated Individuals

Ethics and Honesty

Demand for Return on Investment

Cultural Change

Appendix A: Sample Forms

50-State Compliant Background Check Disclosure and Authorization Forms

Disclosure Form

Authorization Form

Pre-Adverse Action Letter for Applicants

Adverse Action Letter for Applicants

Summary of Your Rights Under the Fair Credit Reporting Act

Notice to Users of Consumer Reports: Obligations of Users Under the FCRA

Obligations of All Users of Consumer Reports

Users Must Have a Permissible Purpose

Users Must Provide Certifications

Users Must Notify Consumers When Adverse Actions are Taken

Adverse Actions Based on Information Obtained From a CRA

Adverse Actions Based on Information Obtained From Third Parties Who are Not Consumer Reporting Agencies

Adverse Actions Based on Information Obtained From Affiliates

Users Have Obligations When Fraud and Active Duty Military Alerts are in Files

Users Have Obligations When Notified of an Address Discrepancy

Users Have Obligations When Disposing of Records

Creditors Must Make Additional Disclosures

Obligations of Users When Consumer Reports are Obtained for Employment Purposes

Employment Other Than in the Trucking Industry

Employment in the Trucking Industry

Obligations When Investigative Consumer Reports are Used

Special Procedures for Employee Investigations

Obligations of Users of Medical Information

Obligations of Users of "Prescreened" Lists

Obligations of Resellers

Disclosure and Certification Requirements

Reinvestigations by Resellers

Fraud Alerts and Resellers

Liability for Violations of the FCRA

Appendix B: Survey Results 2005 Background Checking Survey Report Results

PreemploymentDirectory com

Background Screening Research-March 2006

Publisher Information

About This Report

About PreemploymentDirectory com

Introduction

Methodology

Key Findings

Preliminary Survey Results

Appendix C: Background Screening Certification Program

Core Curriculum

Electives (choose 3)

Appendix D: Sensitive Jobs Identification Worksheet

Appendix E: Terrorist Search

Preemploymentdirectory com

International Resource Center

Terrorist Searches

Appendix F: GE Candidate Data Protection Standards

Objective

Scope

Application of Local Laws

Principles for Processing Candidate Data

Data Collection

Purposes and Access for Candidate Data Processing

Types of Candidate Data

Special Categories of Data

Security and Confidentiality

Equipment and Information Security

Access Security

Training

Rights of Data Subjects

Transferring Data

Transfers to Other GE Entities

Transfers to Non-GE Entities

Direct Marketing

Automated Decisions

Enforcement Rights and Mechanisms

Audit Procedures

Communication About the Standards

Modifications to the Standards

Obligations Toward Data Protection Authorities

Addendum

Rights and Obligations With Respect to Candidate Data Collected Within the EU/EEA and Processed Elsewhere

Appendix G: Betrayal

Appendix H: Continuous Screening Get Support in Implementing a Continuous Post Hire Screening Program

Executive Summary

Background

Where to Turn

Value

Service Description

Summary

Appendix I: How to Create a Culture of Security Consciousness

The Importance of Security Consciousness

Scenario

What Do We Mean by Organization Culture?

Five Important Steps to Creating a Security Conscious Organizational Culture

Step 1: Create a Positive Attitude Toward Change

Step 2: Support Employees Developing Openness to New Ways of Doing Things

Step 3: Ensure the Organizational Leadership Believes the Change is the Right Thing to Do

Step 4: Assist Employees in Believing the Change is the Right Thing to Do

Step 5: Engage in Careful Planning and Monitoring of Outcomes That Recognize Both the Human and Business Side of Organizational Change

Summary

Index

The users who browse this book also browse


No browse record.