SlideShare ist ein Scribd-Unternehmen logo
1 von 12
How to
Fight Shoddy
Background
   Checks
Denied!
More and more employers are running background
checks on potential hires. But many of these
reports, which include credit and criminal histories, are
riddled with errors.
In fact, 70 percent of
U.S. businesses do
background checks on
potential hires. And
according to the National
Consumer Law Center,
that information is often
wrong.
                    © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012                  Reserved - Confidential
                                                                      2
Believe It or Not
Chances are there’s someone in
the U.S. with your name and a
similar birth date. You better
hope that person isn’t a criminal.
For some background
screeners, sadly, “close enough”
is enough.




                © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012              Reserved - Confidential
                                                                  3
No Oversight
One troubling fact the National
Consumer Law Center brought to
light: There is virtually no oversight of
the background check industry.
Nearly anyone with an Internet
connection can open up shop as a
background checker.




                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012               Reserved - Confidential
                                                                   4
Misleading Facts
                   Sometimes even the facts
                   are distorted. A shoddy
                   background check might:
                          • cite an arrest, but not mention
                            that the case was dropped or
                            you were found innocent;
                          • list a single charge multiple
                            times;
                          • report a misdemeanor as a
                            felony or make other category
                            mistakes.

               © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012             Reserved - Confidential
                                                                 5
Uncovering Identity Theft
Background checks
often bring identity theft
to light. That sounds
good in theory, but
identity theft discovered
during an employment
process can cost you
that job.



                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012               Reserved - Confidential
                                                                   6
Bad Credit
Criminal background checks
 aren’t the only cause for concern.
 Many employers check credit histories.
 Unresolved disputes or poor scores—more
 often than not due to
 unemployment—can lead to
 more unemployment.



                © 2003-2011 Identity Theft 911, LLC. All Rights
 May 29, 2012             Reserved - Confidential
                                                                  7
Surprise!
Unlike clowns and kindergartners,
employers don’t like surprises. If
there is something on your record,
explain the circumstances up front.
It’s better to start the conversation
than to have a prospective employer
believe they “caught” you being
dishonest or manipulative.


                © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012              Reserved - Confidential
                                                                  8
Credit Check Yourself
Find out what’s in your credit file. Everyone
can check their reportonce a yearfor free.
Also,if you’ve been denied credit or
employment because of a credit check, you are
entitled to that free report as well.




               © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012             Reserved - Confidential
                                                                 9
Correct Yourself
By law, all consumer reporting agencies
must allow you to correct outdated or
inaccurate information. But there’s a time
window, usually 30 days after requesting
that report—so act fast.




                © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012              Reserved - Confidential
                                                                  10
Pick Up the Phone
               Your bank, credit
               union, insurer, financial planner or
               attorney may offer identity theft
               protection, which often covers
               shoddy background checks.
               If they don’t, give us a call at
               480.355.8500. Don’t be afraid to ask
               lots of questions.


                  © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012                Reserved - Confidential
                                                                    11
Help Is Out There
Be proactive—don’t wait to become
 a victim of identity theft before
 finding a company you’re
 comfortable with.
Help is just a phone call away.




                  © 2003-2011 Identity Theft 911, LLC. All Rights
 May 29, 2012               Reserved - Confidential
                                                                    12

Weitere ähnliche Inhalte

Andere mochten auch

OM Plus FM Technical Details
OM Plus FM Technical DetailsOM Plus FM Technical Details
OM Plus FM Technical DetailsPlus Technologies
 
I Kiss Your Hand Madame
I Kiss Your Hand MadameI Kiss Your Hand Madame
I Kiss Your Hand MadameMakala (D)
 
Digital Partner for your Brand Communication
Digital Partner for your Brand CommunicationDigital Partner for your Brand Communication
Digital Partner for your Brand CommunicationSaurabh Pokharna
 
Designate Credentials
Designate CredentialsDesignate Credentials
Designate CredentialsDean Harvey
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνYolanda Komianou
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
Pinterest的数据库分片架构
Pinterest的数据库分片架构Pinterest的数据库分片架构
Pinterest的数据库分片架构Tommy Chiu
 
Para hablar de amor - paintings
 Para hablar de amor - paintings Para hablar de amor - paintings
Para hablar de amor - paintingsMakala (D)
 
Family- When you and your kin, can't
Family- When you and your kin, can'tFamily- When you and your kin, can't
Family- When you and your kin, can'tRoger Hernandez
 
Unit fourteen will future
Unit fourteen will futureUnit fourteen will future
Unit fourteen will futurewedaa23
 
Taiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengTaiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengMakala (D)
 
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa SenBản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa SenHoa Sen University
 
Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012safestrat
 

Andere mochten auch (19)

OM Plus FM Technical Details
OM Plus FM Technical DetailsOM Plus FM Technical Details
OM Plus FM Technical Details
 
I Kiss Your Hand Madame
I Kiss Your Hand MadameI Kiss Your Hand Madame
I Kiss Your Hand Madame
 
Digital Partner for your Brand Communication
Digital Partner for your Brand CommunicationDigital Partner for your Brand Communication
Digital Partner for your Brand Communication
 
Designate Credentials
Designate CredentialsDesignate Credentials
Designate Credentials
 
Cloud computing basic
 Cloud computing   basic Cloud computing   basic
Cloud computing basic
 
Cause effect
Cause effectCause effect
Cause effect
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιων
 
W h i t e ...
W h i t e ...W h i t e ...
W h i t e ...
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Pinterest的数据库分片架构
Pinterest的数据库分片架构Pinterest的数据库分片架构
Pinterest的数据库分片架构
 
Para hablar de amor - paintings
 Para hablar de amor - paintings Para hablar de amor - paintings
Para hablar de amor - paintings
 
Cas n° 002 2017-grell-02
Cas n° 002 2017-grell-02Cas n° 002 2017-grell-02
Cas n° 002 2017-grell-02
 
Presentation1
Presentation1Presentation1
Presentation1
 
Digipak presentation
Digipak presentationDigipak presentation
Digipak presentation
 
Family- When you and your kin, can't
Family- When you and your kin, can'tFamily- When you and your kin, can't
Family- When you and your kin, can't
 
Unit fourteen will future
Unit fourteen will futureUnit fourteen will future
Unit fourteen will future
 
Taiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengTaiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron Cheng
 
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa SenBản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
 
Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012
 

Ähnlich wie How to Fight Shoddy Background Checks

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing EmailIDT911
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Eurosurveillance Ci Romania
Eurosurveillance Ci RomaniaEurosurveillance Ci Romania
Eurosurveillance Ci RomaniaJulian Tanase
 
Identity Theft Ebook
Identity Theft EbookIdentity Theft Ebook
Identity Theft EbookMichelle Dunn
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recoveryjonmcdowall
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-MonthsBlue Trumpet Group
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachDaniel Michels
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftShaneSaunders
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigationsalberto0
 

Ähnlich wie How to Fight Shoddy Background Checks (20)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
 
Questions Of Integrity
Questions Of IntegrityQuestions Of Integrity
Questions Of Integrity
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Eurosurveillance Ci Romania
Eurosurveillance Ci RomaniaEurosurveillance Ci Romania
Eurosurveillance Ci Romania
 
Identity Theft Ebook
Identity Theft EbookIdentity Theft Ebook
Identity Theft Ebook
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recovery
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity Theft
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigations
 

Mehr von IDT911

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012IDT911
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneIDT911
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside JobIDT911
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012IDT911
 

Mehr von IDT911 (6)

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
 

Kürzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

How to Fight Shoddy Background Checks

  • 2. Denied! More and more employers are running background checks on potential hires. But many of these reports, which include credit and criminal histories, are riddled with errors. In fact, 70 percent of U.S. businesses do background checks on potential hires. And according to the National Consumer Law Center, that information is often wrong. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 2
  • 3. Believe It or Not Chances are there’s someone in the U.S. with your name and a similar birth date. You better hope that person isn’t a criminal. For some background screeners, sadly, “close enough” is enough. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 3
  • 4. No Oversight One troubling fact the National Consumer Law Center brought to light: There is virtually no oversight of the background check industry. Nearly anyone with an Internet connection can open up shop as a background checker. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 4
  • 5. Misleading Facts Sometimes even the facts are distorted. A shoddy background check might: • cite an arrest, but not mention that the case was dropped or you were found innocent; • list a single charge multiple times; • report a misdemeanor as a felony or make other category mistakes. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 5
  • 6. Uncovering Identity Theft Background checks often bring identity theft to light. That sounds good in theory, but identity theft discovered during an employment process can cost you that job. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 6
  • 7. Bad Credit Criminal background checks aren’t the only cause for concern. Many employers check credit histories. Unresolved disputes or poor scores—more often than not due to unemployment—can lead to more unemployment. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 7
  • 8. Surprise! Unlike clowns and kindergartners, employers don’t like surprises. If there is something on your record, explain the circumstances up front. It’s better to start the conversation than to have a prospective employer believe they “caught” you being dishonest or manipulative. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 8
  • 9. Credit Check Yourself Find out what’s in your credit file. Everyone can check their reportonce a yearfor free. Also,if you’ve been denied credit or employment because of a credit check, you are entitled to that free report as well. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 9
  • 10. Correct Yourself By law, all consumer reporting agencies must allow you to correct outdated or inaccurate information. But there’s a time window, usually 30 days after requesting that report—so act fast. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 10
  • 11. Pick Up the Phone Your bank, credit union, insurer, financial planner or attorney may offer identity theft protection, which often covers shoddy background checks. If they don’t, give us a call at 480.355.8500. Don’t be afraid to ask lots of questions. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 11
  • 12. Help Is Out There Be proactive—don’t wait to become a victim of identity theft before finding a company you’re comfortable with. Help is just a phone call away. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 12