SlideShare ist ein Scribd-Unternehmen logo
1 von 12
How to Fight Shoddy
Background Checks
DENIED!
    More and more employers are running background
    checks on potential hires. But many of these reports,
    which include credit and criminal histories, are riddled
    with errors.
    In fact, 70 percent of
    U.S. businesses do
    background checks on
    potential hires. And
    according to the National
    Consumer Law Center,
    that information is often
    wrong.
                      © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                     Reserved - Confidential
                                                                        2
Believe It or Not
    Chances are there’s someone
    in the U.S. with your name and
    a similar birth date. You better
    hope that person isn’t a
    criminal. For some background
    screeners, sadly, ―close
    enough‖ is enough.


                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                Reserved - Confidential
                                                                   3
No Oversight
One troubling fact the National
Consumer Law Center brought to
light: There is virtually no oversight
of the background check industry.
Nearly anyone with an Internet
connection can open up shop as a
background checker.


                © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012               Reserved - Confidential
                                                                  4
Misleading Facts
                  Sometimes even the facts are
                  distorted. A shoddy
                  background check might:
                  • cite an arrest, but not
                  mention that the case was
                  dropped or you were found
                  innocent;
                  • list a single charge multiple
                  times;
                  • report a misdemeanor as a
                  felony or make other category
                  mistakes.
              © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012             Reserved - Confidential
                                                                5
Uncovering Identity Theft
Background checks
often bring identity theft
to light. That sounds
good in theory, but
identity theft discovered
during an employment
process can cost you
that job.



                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                Reserved - Confidential
                                                                   6
Bad Credit
    Criminal background checks
    aren’t the only cause for
    concern. Many employers
    check credit histories.
    Unresolved disputes or poor
    scores–more often than not
    due to unemployment–can lead
    to more unemployment.

               © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012              Reserved - Confidential
                                                                 7
Surprise!
Unlike clowns and kindergartners,
employers don’t like surprises. If
there is something on your record,
explain the circumstances up
front. It’s better to start the
conversation than to have a
prospective employer believe they
―caught‖ you being dishonest or
manipulative.
              © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012             Reserved - Confidential
                                                                8
Credit Check Yourself
Everyone can check their report
once a year for free. Also, if
you’ve been denied credit or
employment because of a credit
check, you are entitled to
that free report as well.



              © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012             Reserved - Confidential
                                                                9
Correct Yourself
By law, all consumer reporting agencies
must allow you to correct outdated or
inaccurate information. But there’s a time
window, usually 30 days after requesting
that report–so act fast.




               © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012              Reserved - Confidential
                                                                 10
Pick Up the Phone
    Your bank, credit union, insurer,
    financial planner or attorney
    may offer identity theft
    protection, which often covers
    shoddy background checks.

    If they don’t, give us a call
    at1.877.432.7463. Don’t be
    afraid to ask lots of questions.
                  © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                 Reserved - Confidential
                                                                    11
Help Is Out There
    Be proactive—don’t wait to
    become a victim of identity theft
    before finding a company you’re
    comfortable with.

    Help is just a phone call away.



                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                Reserved - Confidential
                                                                   12

Weitere ähnliche Inhalte

Was ist angesagt?

Data theft
Data theftData theft
Data theft
Laura
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Blake A. Klinkner
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 

Was ist angesagt? (20)

Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Data theft
Data theftData theft
Data theft
 
Information security
Information securityInformation security
Information security
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security BreachWorld`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Andere mochten auch

Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
 
7. susret 17.11.2011. konkretno lice boga oca
7. susret 17.11.2011.   konkretno lice boga oca7. susret 17.11.2011.   konkretno lice boga oca
7. susret 17.11.2011. konkretno lice boga oca
Meri-Lucijeta
 
Flickr project
Flickr projectFlickr project
Flickr project
franktd
 
Technology in the news(final)
Technology in the news(final)Technology in the news(final)
Technology in the news(final)
adrigee12
 

Andere mochten auch (19)

How to-use-jing
How to-use-jingHow to-use-jing
How to-use-jing
 
Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)
 
Seduction Roses
Seduction RosesSeduction Roses
Seduction Roses
 
Merry Christmas
 Merry Christmas     Merry Christmas
Merry Christmas
 
Full action
Full action Full action
Full action
 
Calendario barrial
Calendario barrialCalendario barrial
Calendario barrial
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Respiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an updateRespiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an update
 
Lte
LteLte
Lte
 
General Datacomm
General DatacommGeneral Datacomm
General Datacomm
 
Server Consolidation with OM Plus Delivery Manager
Server Consolidation with OM Plus Delivery ManagerServer Consolidation with OM Plus Delivery Manager
Server Consolidation with OM Plus Delivery Manager
 
Video Trends for Business Marketers
Video Trends for Business MarketersVideo Trends for Business Marketers
Video Trends for Business Marketers
 
7. susret 17.11.2011. konkretno lice boga oca
7. susret 17.11.2011.   konkretno lice boga oca7. susret 17.11.2011.   konkretno lice boga oca
7. susret 17.11.2011. konkretno lice boga oca
 
Flickr project
Flickr projectFlickr project
Flickr project
 
Antecedentes del Community Managar
Antecedentes del Community ManagarAntecedentes del Community Managar
Antecedentes del Community Managar
 
mkt PP
mkt PPmkt PP
mkt PP
 
Figurative Painter - Vicente Romero Redondo
Figurative Painter - Vicente Romero RedondoFigurative Painter - Vicente Romero Redondo
Figurative Painter - Vicente Romero Redondo
 
Martinez twitter aaep2013
Martinez twitter aaep2013Martinez twitter aaep2013
Martinez twitter aaep2013
 
Technology in the news(final)
Technology in the news(final)Technology in the news(final)
Technology in the news(final)
 

Ähnlich wie How to Fight Shoddy Background Checks

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
upsettinginfo
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 

Ähnlich wie How to Fight Shoddy Background Checks (20)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
Questions Of Integrity
Questions Of IntegrityQuestions Of Integrity
Questions Of Integrity
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 
Eurosurveillance Ci Romania
Eurosurveillance Ci RomaniaEurosurveillance Ci Romania
Eurosurveillance Ci Romania
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity Theft
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
Identity Theft Ebook
Identity Theft EbookIdentity Theft Ebook
Identity Theft Ebook
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
What To Do if You Were Scammed
What To Do if You Were ScammedWhat To Do if You Were Scammed
What To Do if You Were Scammed
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Scams
ScamsScams
Scams
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

How to Fight Shoddy Background Checks

  • 1. How to Fight Shoddy Background Checks
  • 2. DENIED! More and more employers are running background checks on potential hires. But many of these reports, which include credit and criminal histories, are riddled with errors. In fact, 70 percent of U.S. businesses do background checks on potential hires. And according to the National Consumer Law Center, that information is often wrong. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 2
  • 3. Believe It or Not Chances are there’s someone in the U.S. with your name and a similar birth date. You better hope that person isn’t a criminal. For some background screeners, sadly, ―close enough‖ is enough. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 3
  • 4. No Oversight One troubling fact the National Consumer Law Center brought to light: There is virtually no oversight of the background check industry. Nearly anyone with an Internet connection can open up shop as a background checker. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 4
  • 5. Misleading Facts Sometimes even the facts are distorted. A shoddy background check might: • cite an arrest, but not mention that the case was dropped or you were found innocent; • list a single charge multiple times; • report a misdemeanor as a felony or make other category mistakes. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 5
  • 6. Uncovering Identity Theft Background checks often bring identity theft to light. That sounds good in theory, but identity theft discovered during an employment process can cost you that job. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 6
  • 7. Bad Credit Criminal background checks aren’t the only cause for concern. Many employers check credit histories. Unresolved disputes or poor scores–more often than not due to unemployment–can lead to more unemployment. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 7
  • 8. Surprise! Unlike clowns and kindergartners, employers don’t like surprises. If there is something on your record, explain the circumstances up front. It’s better to start the conversation than to have a prospective employer believe they ―caught‖ you being dishonest or manipulative. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 8
  • 9. Credit Check Yourself Everyone can check their report once a year for free. Also, if you’ve been denied credit or employment because of a credit check, you are entitled to that free report as well. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 9
  • 10. Correct Yourself By law, all consumer reporting agencies must allow you to correct outdated or inaccurate information. But there’s a time window, usually 30 days after requesting that report–so act fast. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 10
  • 11. Pick Up the Phone Your bank, credit union, insurer, financial planner or attorney may offer identity theft protection, which often covers shoddy background checks. If they don’t, give us a call at1.877.432.7463. Don’t be afraid to ask lots of questions. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 11
  • 12. Help Is Out There Be proactive—don’t wait to become a victim of identity theft before finding a company you’re comfortable with. Help is just a phone call away. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 12