Employers typically engage in pre-employment screening to:
It is important to note that pre-employment screening is not an invasion of a person's privacy or civil rights when done properly and with in the confines of the Fair Credit Reporting (FCRA), the Drivers Privacy Protection Act (DPPA), and Health Information Portability and Privacy Act (HIPPA)
Should your business conduct the pre-employment screening in-house or outsource, and if the decision to outsource is made, how do you find the right source? First let's look at the problems of in-house. Once upon a time, a few phone calls were enough to complete the hiring process, but no more. Hiring has become a specialized field requiring resources and knowledge. Firms risk legal liability if the procedures utilized to gather data on the applicant infringe on legally protected civil rights and privacy. Another draw back is a great deal of time and energy, which equates to money, must be spent to learn the laws and to keep current. On your own, you do not have access to FCRA and DPPA databases to conduct the criminal background check. Let me say, there are dozens of web sites on the Internet that claim to do background checks, and the only requirement is a credit card. The problem is these sites may not be compliant and the information tends to be inaccurate or incomplete. More time and energy must be spent contacting current and past employers, references, and education institutions often being frustrated by the game of phone tag. What is the solution? Outsource to a licensed private investigator who specializes in pre-employment screening thus is a consumer reporting agency (CRA)
Forget the persona of the typical PI as seen of television. In reality we are held to a higher standard set by the laws of the state where we hold our license. We are aware that violation of these laws will result in the loss of our license. The fact that we are a CRA means we have met all legal requirements, and have the necessary release and information forms required by the FCRA. As a licensed professional, we have access to FCRA and DPPA approved database to verify the personal information and conduct a criminal and civil record search. Frequently just the database search is not enough. The private investigator is aware of this and knows how to search court records to verify the information. Just what is that information, what records are searched, what should you look for?
The completed file should contain:
Once the screening is complete, the investigator will put the findings in a report that you can easily understand to make an informed hiring decision. If you decide not to hire this person, your investigator should have a Notice of Adverse Action form explaining the applicants rights.
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more