SlideShare ist ein Scribd-Unternehmen logo
1 von 12
How to
Fight Shoddy
Background
   Checks
Denied!
More and more employers are running background
checks on potential hires. But many of these
reports, which include credit and criminal histories, are
riddled with errors.
In fact, 70 percent of
U.S. businesses do
background checks on
potential hires. And
according to the National
Consumer Law Center,
that information is often
wrong.
                    © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012                  Reserved - Confidential
                                                                      2
Believe It or Not
Chances are there’s someone in
the U.S. with your name and a
similar birth date. You better
hope that person isn’t a criminal.
For some background
screeners, sadly, “close enough”
is enough.




                © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012              Reserved - Confidential
                                                                  3
No Oversight
One troubling fact the National
Consumer Law Center brought to
light: There is virtually no oversight of
the background check industry.
Nearly anyone with an Internet
connection can open up shop as a
background checker.




                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012               Reserved - Confidential
                                                                   4
Misleading Facts
                   Sometimes even the facts
                   are distorted. A shoddy
                   background check might:
                          • cite an arrest, but not mention
                            that the case was dropped or
                            you were found innocent;
                          • list a single charge multiple
                            times;
                          • report a misdemeanor as a
                            felony or make other category
                            mistakes.

               © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012             Reserved - Confidential
                                                                 5
Uncovering Identity Theft
Background checks
often bring identity theft
to light. That sounds
good in theory, but
identity theft discovered
during an employment
process can cost you
that job.



                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012               Reserved - Confidential
                                                                   6
Bad Credit
Criminal background checks
 aren’t the only cause for concern.
 Many employers check credit histories.
 Unresolved disputes or poor scores—more
 often than not due to
 unemployment—can lead to
 more unemployment.



                © 2003-2011 Identity Theft 911, LLC. All Rights
 May 29, 2012             Reserved - Confidential
                                                                  7
Surprise!
Unlike clowns and kindergartners,
employers don’t like surprises. If
there is something on your record,
explain the circumstances up front.
It’s better to start the conversation
than to have a prospective employer
believe they “caught” you being
dishonest or manipulative.


                © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012              Reserved - Confidential
                                                                  8
Credit Check Yourself
Find out what’s in your credit file. Everyone
can check their reportonce a yearfor free.
Also,if you’ve been denied credit or
employment because of a credit check, you are
entitled to that free report as well.




               © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012             Reserved - Confidential
                                                                 9
Correct Yourself
By law, all consumer reporting agencies
must allow you to correct outdated or
inaccurate information. But there’s a time
window, usually 30 days after requesting
that report—so act fast.




                © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012              Reserved - Confidential
                                                                  10
Pick Up the Phone
               Your bank, credit
               union, insurer, financial planner or
               attorney may offer identity theft
               protection, which often covers
               shoddy background checks.
               If they don’t, give us a call at
               480.355.8500. Don’t be afraid to ask
               lots of questions.


                  © 2003-2011 Identity Theft 911, LLC. All Rights
May 29, 2012                Reserved - Confidential
                                                                    11
Help Is Out There
Be proactive—don’t wait to become
 a victim of identity theft before
 finding a company you’re
 comfortable with.
Help is just a phone call away.




                  © 2003-2011 Identity Theft 911, LLC. All Rights
 May 29, 2012               Reserved - Confidential
                                                                    12

Weitere ähnliche Inhalte

Andere mochten auch

Designate Credentials
Designate CredentialsDesignate Credentials
Designate Credentials
Dean Harvey
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιων
Yolanda Komianou
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
Pinterest的数据库分片架构
Pinterest的数据库分片架构Pinterest的数据库分片架构
Pinterest的数据库分片架构
Tommy Chiu
 
Family- When you and your kin, can't
Family- When you and your kin, can'tFamily- When you and your kin, can't
Family- When you and your kin, can't
Roger Hernandez
 
Taiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengTaiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron Cheng
Makala (D)
 
Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012
safestrat
 

Andere mochten auch (19)

OM Plus FM Technical Details
OM Plus FM Technical DetailsOM Plus FM Technical Details
OM Plus FM Technical Details
 
I Kiss Your Hand Madame
I Kiss Your Hand MadameI Kiss Your Hand Madame
I Kiss Your Hand Madame
 
Digital Partner for your Brand Communication
Digital Partner for your Brand CommunicationDigital Partner for your Brand Communication
Digital Partner for your Brand Communication
 
Designate Credentials
Designate CredentialsDesignate Credentials
Designate Credentials
 
Cloud computing basic
 Cloud computing   basic Cloud computing   basic
Cloud computing basic
 
Cause effect
Cause effectCause effect
Cause effect
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιων
 
W h i t e ...
W h i t e ...W h i t e ...
W h i t e ...
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Pinterest的数据库分片架构
Pinterest的数据库分片架构Pinterest的数据库分片架构
Pinterest的数据库分片架构
 
Para hablar de amor - paintings
 Para hablar de amor - paintings Para hablar de amor - paintings
Para hablar de amor - paintings
 
Cas n° 002 2017-grell-02
Cas n° 002 2017-grell-02Cas n° 002 2017-grell-02
Cas n° 002 2017-grell-02
 
Presentation1
Presentation1Presentation1
Presentation1
 
Digipak presentation
Digipak presentationDigipak presentation
Digipak presentation
 
Family- When you and your kin, can't
Family- When you and your kin, can'tFamily- When you and your kin, can't
Family- When you and your kin, can't
 
Unit fourteen will future
Unit fourteen will futureUnit fourteen will future
Unit fourteen will future
 
Taiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengTaiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron Cheng
 
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa SenBản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
Bản tin Hoa Sen số 4: Vòng quanh Đại học Hoa Sen
 
Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012Safety Meeting Starters (SMS) Sept 2012
Safety Meeting Starters (SMS) Sept 2012
 

Ähnlich wie How to Fight Shoddy Background Checks

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
IDT911
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
upsettinginfo
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigations
alberto0
 

Ähnlich wie How to Fight Shoddy Background Checks (20)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
 
Questions Of Integrity
Questions Of IntegrityQuestions Of Integrity
Questions Of Integrity
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Eurosurveillance Ci Romania
Eurosurveillance Ci RomaniaEurosurveillance Ci Romania
Eurosurveillance Ci Romania
 
Identity Theft Ebook
Identity Theft EbookIdentity Theft Ebook
Identity Theft Ebook
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recovery
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity Theft
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigations
 

Mehr von IDT911

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
IDT911
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
IDT911
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
IDT911
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
IDT911
 

Mehr von IDT911 (6)

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

How to Fight Shoddy Background Checks

  • 2. Denied! More and more employers are running background checks on potential hires. But many of these reports, which include credit and criminal histories, are riddled with errors. In fact, 70 percent of U.S. businesses do background checks on potential hires. And according to the National Consumer Law Center, that information is often wrong. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 2
  • 3. Believe It or Not Chances are there’s someone in the U.S. with your name and a similar birth date. You better hope that person isn’t a criminal. For some background screeners, sadly, “close enough” is enough. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 3
  • 4. No Oversight One troubling fact the National Consumer Law Center brought to light: There is virtually no oversight of the background check industry. Nearly anyone with an Internet connection can open up shop as a background checker. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 4
  • 5. Misleading Facts Sometimes even the facts are distorted. A shoddy background check might: • cite an arrest, but not mention that the case was dropped or you were found innocent; • list a single charge multiple times; • report a misdemeanor as a felony or make other category mistakes. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 5
  • 6. Uncovering Identity Theft Background checks often bring identity theft to light. That sounds good in theory, but identity theft discovered during an employment process can cost you that job. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 6
  • 7. Bad Credit Criminal background checks aren’t the only cause for concern. Many employers check credit histories. Unresolved disputes or poor scores—more often than not due to unemployment—can lead to more unemployment. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 7
  • 8. Surprise! Unlike clowns and kindergartners, employers don’t like surprises. If there is something on your record, explain the circumstances up front. It’s better to start the conversation than to have a prospective employer believe they “caught” you being dishonest or manipulative. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 8
  • 9. Credit Check Yourself Find out what’s in your credit file. Everyone can check their reportonce a yearfor free. Also,if you’ve been denied credit or employment because of a credit check, you are entitled to that free report as well. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 9
  • 10. Correct Yourself By law, all consumer reporting agencies must allow you to correct outdated or inaccurate information. But there’s a time window, usually 30 days after requesting that report—so act fast. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 10
  • 11. Pick Up the Phone Your bank, credit union, insurer, financial planner or attorney may offer identity theft protection, which often covers shoddy background checks. If they don’t, give us a call at 480.355.8500. Don’t be afraid to ask lots of questions. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 11
  • 12. Help Is Out There Be proactive—don’t wait to become a victim of identity theft before finding a company you’re comfortable with. Help is just a phone call away. © 2003-2011 Identity Theft 911, LLC. All Rights May 29, 2012 Reserved - Confidential 12