SlideShare a Scribd company logo
How to Fight Shoddy
Background Checks
DENIED!
    More and more employers are running background
    checks on potential hires. But many of these reports,
    which include credit and criminal histories, are riddled
    with errors.
    In fact, 70 percent of
    U.S. businesses do
    background checks on
    potential hires. And
    according to the National
    Consumer Law Center,
    that information is often
    wrong.
                      © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                     Reserved - Confidential
                                                                        2
Believe It or Not
    Chances are there’s someone
    in the U.S. with your name and
    a similar birth date. You better
    hope that person isn’t a
    criminal. For some background
    screeners, sadly, ―close
    enough‖ is enough.


                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                Reserved - Confidential
                                                                   3
No Oversight
One troubling fact the National
Consumer Law Center brought to
light: There is virtually no oversight
of the background check industry.
Nearly anyone with an Internet
connection can open up shop as a
background checker.


                © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012               Reserved - Confidential
                                                                  4
Misleading Facts
                  Sometimes even the facts are
                  distorted. A shoddy
                  background check might:
                  • cite an arrest, but not
                  mention that the case was
                  dropped or you were found
                  innocent;
                  • list a single charge multiple
                  times;
                  • report a misdemeanor as a
                  felony or make other category
                  mistakes.
              © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012             Reserved - Confidential
                                                                5
Uncovering Identity Theft
Background checks
often bring identity theft
to light. That sounds
good in theory, but
identity theft discovered
during an employment
process can cost you
that job.



                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                Reserved - Confidential
                                                                   6
Bad Credit
    Criminal background checks
    aren’t the only cause for
    concern. Many employers
    check credit histories.
    Unresolved disputes or poor
    scores–more often than not
    due to unemployment–can lead
    to more unemployment.

               © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012              Reserved - Confidential
                                                                 7
Surprise!
Unlike clowns and kindergartners,
employers don’t like surprises. If
there is something on your record,
explain the circumstances up
front. It’s better to start the
conversation than to have a
prospective employer believe they
―caught‖ you being dishonest or
manipulative.
              © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012             Reserved - Confidential
                                                                8
Credit Check Yourself
Everyone can check their report
once a year for free. Also, if
you’ve been denied credit or
employment because of a credit
check, you are entitled to
that free report as well.



              © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012             Reserved - Confidential
                                                                9
Correct Yourself
By law, all consumer reporting agencies
must allow you to correct outdated or
inaccurate information. But there’s a time
window, usually 30 days after requesting
that report–so act fast.




               © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012              Reserved - Confidential
                                                                 10
Pick Up the Phone
    Your bank, credit union, insurer,
    financial planner or attorney
    may offer identity theft
    protection, which often covers
    shoddy background checks.

    If they don’t, give us a call
    at1.877.432.7463. Don’t be
    afraid to ask lots of questions.
                  © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                 Reserved - Confidential
                                                                    11
Help Is Out There
    Be proactive—don’t wait to
    become a victim of identity theft
    before finding a company you’re
    comfortable with.

    Help is just a phone call away.



                 © 2003-2011 Identity Theft 911, LLC. All Rights
May 2, 2012                Reserved - Confidential
                                                                   12

More Related Content

What's hot

Identity Theft
Identity Theft Identity Theft
Identity Theft
Fairfax County
 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
LexisNexis
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Phishing
PhishingPhishing
Phishing
guicelacatalina
 
10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
Stu Sjouwerman
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Write My Essay
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 
Data theft
Data theftData theft
Data theftLaura
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
Quick Heal Technologies Ltd.
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
RobbiePaterson2
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security BreachWorld`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
ClickSSL
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
AariyaRathi
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
Adler Law Group
 
Identity theft
Identity theftIdentity theft
Identity theft
Nick Chandi
 

What's hot (20)

Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Data theft
Data theftData theft
Data theft
 
Information security
Information securityInformation security
Information security
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security BreachWorld`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Viewers also liked

How to-use-jing
How to-use-jingHow to-use-jing
How to-use-jing
gacrisologo
 
Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)
Makala (D)
 
Seduction Roses
Seduction RosesSeduction Roses
Seduction Roses
Makala (D)
 
Merry Christmas
 Merry Christmas     Merry Christmas
Merry Christmas
Makala (D)
 
Full action
Full action Full action
Full action
Makala (D)
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012IDT911
 
Respiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an updateRespiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an update
Greg Peters
 
Lte
LteLte
General Datacomm
General DatacommGeneral Datacomm
General Datacomm
Anurag Sukhija
 
Server Consolidation with OM Plus Delivery Manager
Server Consolidation with OM Plus Delivery ManagerServer Consolidation with OM Plus Delivery Manager
Server Consolidation with OM Plus Delivery Manager
Plus Technologies
 
Video Trends for Business Marketers
Video Trends for Business MarketersVideo Trends for Business Marketers
Video Trends for Business Marketers
Leslie Drate
 
7. susret 17.11.2011. konkretno lice boga oca
7. susret 17.11.2011.   konkretno lice boga oca7. susret 17.11.2011.   konkretno lice boga oca
7. susret 17.11.2011. konkretno lice boga ocaMeri-Lucijeta
 
Flickr project
Flickr projectFlickr project
Flickr projectfranktd
 
Antecedentes del Community Managar
Antecedentes del Community ManagarAntecedentes del Community Managar
Antecedentes del Community Managar
Daniel Castagno
 
mkt PP
mkt PPmkt PP
mkt PP
skelly065
 
Figurative Painter - Vicente Romero Redondo
Figurative Painter - Vicente Romero RedondoFigurative Painter - Vicente Romero Redondo
Figurative Painter - Vicente Romero Redondo
Makala (D)
 
Martinez twitter aaep2013
Martinez twitter aaep2013Martinez twitter aaep2013
Martinez twitter aaep2013
Ernie Martinez
 
Technology in the news(final)
Technology in the news(final)Technology in the news(final)
Technology in the news(final)adrigee12
 

Viewers also liked (19)

How to-use-jing
How to-use-jingHow to-use-jing
How to-use-jing
 
Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)
 
Seduction Roses
Seduction RosesSeduction Roses
Seduction Roses
 
Merry Christmas
 Merry Christmas     Merry Christmas
Merry Christmas
 
Full action
Full action Full action
Full action
 
Calendario barrial
Calendario barrialCalendario barrial
Calendario barrial
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Respiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an updateRespiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an update
 
Lte
LteLte
Lte
 
General Datacomm
General DatacommGeneral Datacomm
General Datacomm
 
Server Consolidation with OM Plus Delivery Manager
Server Consolidation with OM Plus Delivery ManagerServer Consolidation with OM Plus Delivery Manager
Server Consolidation with OM Plus Delivery Manager
 
Video Trends for Business Marketers
Video Trends for Business MarketersVideo Trends for Business Marketers
Video Trends for Business Marketers
 
7. susret 17.11.2011. konkretno lice boga oca
7. susret 17.11.2011.   konkretno lice boga oca7. susret 17.11.2011.   konkretno lice boga oca
7. susret 17.11.2011. konkretno lice boga oca
 
Flickr project
Flickr projectFlickr project
Flickr project
 
Antecedentes del Community Managar
Antecedentes del Community ManagarAntecedentes del Community Managar
Antecedentes del Community Managar
 
mkt PP
mkt PPmkt PP
mkt PP
 
Figurative Painter - Vicente Romero Redondo
Figurative Painter - Vicente Romero RedondoFigurative Painter - Vicente Romero Redondo
Figurative Painter - Vicente Romero Redondo
 
Martinez twitter aaep2013
Martinez twitter aaep2013Martinez twitter aaep2013
Martinez twitter aaep2013
 
Technology in the news(final)
Technology in the news(final)Technology in the news(final)
Technology in the news(final)
 

Similar to How to Fight Shoddy Background Checks

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
The Texas Network, LLC
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
pixvilx
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
CakraWicaksono3
 
Identity Theft
Identity TheftIdentity Theft
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
EXIT Hawaii Dream Realty
 
Questions Of Integrity
Questions Of IntegrityQuestions Of Integrity
Questions Of Integrity
Dierckx & Associates Ltd
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
Management Insights LLC
 
Eurosurveillance Ci Romania
Eurosurveillance Ci RomaniaEurosurveillance Ci Romania
Eurosurveillance Ci Romania
Julian Tanase
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity Theft
ShaneSaunders
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
Daniel Michels
 
Identity Theft Ebook
Identity Theft EbookIdentity Theft Ebook
Identity Theft Ebook
Michelle Dunn
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
Praetorian
 
What To Do if You Were Scammed
What To Do if You Were ScammedWhat To Do if You Were Scammed
What To Do if You Were Scammed
Mary Gathege
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Scams
ScamsScams
Scams
dentonjo
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 

Similar to How to Fight Shoddy Background Checks (20)

How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
Questions Of Integrity
Questions Of IntegrityQuestions Of Integrity
Questions Of Integrity
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 
Eurosurveillance Ci Romania
Eurosurveillance Ci RomaniaEurosurveillance Ci Romania
Eurosurveillance Ci Romania
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity Theft
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
Identity Theft Ebook
Identity Theft EbookIdentity Theft Ebook
Identity Theft Ebook
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
What To Do if You Were Scammed
What To Do if You Were ScammedWhat To Do if You Were Scammed
What To Do if You Were Scammed
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Scams
ScamsScams
Scams
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

How to Fight Shoddy Background Checks

  • 1. How to Fight Shoddy Background Checks
  • 2. DENIED! More and more employers are running background checks on potential hires. But many of these reports, which include credit and criminal histories, are riddled with errors. In fact, 70 percent of U.S. businesses do background checks on potential hires. And according to the National Consumer Law Center, that information is often wrong. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 2
  • 3. Believe It or Not Chances are there’s someone in the U.S. with your name and a similar birth date. You better hope that person isn’t a criminal. For some background screeners, sadly, ―close enough‖ is enough. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 3
  • 4. No Oversight One troubling fact the National Consumer Law Center brought to light: There is virtually no oversight of the background check industry. Nearly anyone with an Internet connection can open up shop as a background checker. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 4
  • 5. Misleading Facts Sometimes even the facts are distorted. A shoddy background check might: • cite an arrest, but not mention that the case was dropped or you were found innocent; • list a single charge multiple times; • report a misdemeanor as a felony or make other category mistakes. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 5
  • 6. Uncovering Identity Theft Background checks often bring identity theft to light. That sounds good in theory, but identity theft discovered during an employment process can cost you that job. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 6
  • 7. Bad Credit Criminal background checks aren’t the only cause for concern. Many employers check credit histories. Unresolved disputes or poor scores–more often than not due to unemployment–can lead to more unemployment. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 7
  • 8. Surprise! Unlike clowns and kindergartners, employers don’t like surprises. If there is something on your record, explain the circumstances up front. It’s better to start the conversation than to have a prospective employer believe they ―caught‖ you being dishonest or manipulative. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 8
  • 9. Credit Check Yourself Everyone can check their report once a year for free. Also, if you’ve been denied credit or employment because of a credit check, you are entitled to that free report as well. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 9
  • 10. Correct Yourself By law, all consumer reporting agencies must allow you to correct outdated or inaccurate information. But there’s a time window, usually 30 days after requesting that report–so act fast. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 10
  • 11. Pick Up the Phone Your bank, credit union, insurer, financial planner or attorney may offer identity theft protection, which often covers shoddy background checks. If they don’t, give us a call at1.877.432.7463. Don’t be afraid to ask lots of questions. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 11
  • 12. Help Is Out There Be proactive—don’t wait to become a victim of identity theft before finding a company you’re comfortable with. Help is just a phone call away. © 2003-2011 Identity Theft 911, LLC. All Rights May 2, 2012 Reserved - Confidential 12