Delivering FCRA-Compliant Background Checks and Strong Data Security

Hiring managers already have enough to worry about, like quickly filling open positions with the best possible candidates. When you add background check compliance and data security to the mix, it’s enough to cause even the most level-headed manager to lose sleep at night.

The good news? We can help.

TAKE A CLOSER LOOK

Going Beyond FCRA-Compliant Background Checks: What Regulations Do We Comply With?

We comply with all regulations and laws pertaining to employment and screening, such as the Fair Credit Reporting Act (FCRA) and the Equal Employment Opportunity Commission (EEOC), to name just a couple of the more well-known acronyms.

That said, we don't want to oversimplify this answer because the reality is there are many nuances to federal, state, and local laws. (Adverse information or adverse action, anyone?)

For example, more and more states and municipalities have legalized recreational marijuana and even more allow medical marijuana use. Yet under federal law, marijuana is still considered a Schedule 1 Substance and remains illegal. As you can imagine, this creates challenges for employers, employees, and candidates alike.

But a background check partner like Good Egg can help organizations navigate these murky waters—legally.

Compliance Security Matters, Too. What Makes Our Data Safe?

We've invested in the best systems, servers, and security—and we're constantly monitoring all three. That's the short, high-level answer.

Here's more in-depth, technical information:

  • Your data is transferred with high-grade TLS and multi-layered encryption. Encryption keys are stored separately from the data. Everything is hosted in our off-site, secure cloud infrastructure.
  • Our server hosting locations are staffed all day, every day by trained security guards who have undergone a thorough auditing process.
  • All applicant-sensitive information (such as drug testing results) is encrypted using the Advanced Encryption Standard (AES), specifically AES-256. AES is considered the gold standard for keeping digital communications safe.
iStock-1195208815

How Do We Protect Sensitive Information?

In addition to what we've outlined above, when it comes to sensitive information, like protected class information, the answer is simple: we redact that info before it ever reaches our customers' hands.

Don't forget: We're people, too. We understand and value personal privacy, which is why we always endeavor to protect your applicants' and your employees' privacy.

While we are proud of our innovative background check technology, we still always have human beings overseeing the process. This human oversight ensures that sensitive information is being protected—and that the right information is being reviewed in the first place (for example, making sure the "correct" John Smith is being vetted). This combination of powerful technology and smart human oversight is essential to protecting sensitive information.

When it Comes to FCRA-Compliant Background Checks & Data Security, Don’t Leave it to Chance. Let Us Help!