The Employment Screening Process: A Bird’s Eye View [Infographic]

Now more than ever, employers are urged to define and use an employment background screening process that is fair to candidates, passes muster with the EEOC, and also mitigates employment risks. We realize this is far easier said than done, especially given the loosely-defined guidelines of the EEOC.

Our latest infographic helps to pull the pieces of a model background screening process together in one place. This model can be adapted to your HR hiring practices and will help your organization comply with the essential requirements contained in the EEOC’s guidance. As a bonus, it is also designed to help an organization comply with the growing number of “ban the box” laws that cities and states across the country are adopting.

One of the highlights of this process is individualized assessments as a way to avoid blanket policies that may discriminate. The aim is to identify the risky applicants, and then to use established criteria to evaluate each person in the “risky” pool on an individual basis. By limiting the number of applicants who receive the individualized assessments, you can manage your costs at the same time you comply (and are seen to be complying) with EEOC requirements.

Keep this infographic as a handy reference and feel free to use the social share buttons or embed code to share this graphic with others.


Employment Screening Process

Embed This Image On Your Site (copy code below):

About MichaelGaul

Michael is a results-oriented marketing executive with over two decades of experience in employment screening, physical security, and business process management. Michael has deep experience in human capital risk management and a passion for educating business leaders and HR professionals on strategies that tangibly protect their interests. Michael serves on the Board of the Secure Cash and Transport Association (SCTA) and is a member of the Professional Background Screening Association (PBSA), and the American Society of Industrial Security (ASIS).
View all posts by MichaelGaul →