Check, mate

February 2010 Security Services & Risk Management

Background screening is an effective tool for preventing fraudulent candidates from securing sensitive positions.

Background screening is by far the most efficient and cost effective way to ensure that an employee has the qualifications that he or she lays claim to and also to verify that the CV they present at the time of their interview is accurate and presents a clear picture of who the aspirant worker really is.

The consequences of not subjecting prospective employees to background screening can be both far reaching and expensive to the company in terms of lost man-hours because of the employee’s lack of ability to produce the goods and costly to get rid of the worker in terms of legal fees and severance pay.

Qualifications

In 2008 Managed Integrity Evaluation (MIE, formerly Kroll) received a request to do a post employment verification check. The candidate was the legal advisor for a state owned organisation, having been employed three years previously. The employer had started picking up some irregularities, and was becoming concerned about the employee’s qualification claims.

MIE did the background check and found that the candidate only had a matric, and not the law qualification that was claimed. Further investigation found that the candidate’s father was a judge, and the candidate had learnt the law jargon from him.

The candidate was immediately dismissed, and a fraud case was opened. As it stands, the candidate was employed as part of a team of legal advisors, which is why the candidate managed to fly under the radar for so long, and not have anyone notice that there was a serious problem. Luckily no irreparable damage was done.

Criminal record

When a full background screening is done, checks for criminal records form part of the process. Just how important a criminal record check can be is illustrated by the following instance.

An international placement agency for teachers contacted MIE in 2007 with a background check request for a teacher that they had recently placed in a teaching position in Australia. The teacher was portraying very peculiar behaviour when in the classroom. On conclusion of the background checks, MIE found that the teacher had a criminal record for paedophilia.

The teacher had been arrested and sentenced to time in jail, and had only recently been released. The clearance certificate that the teacher presented to authorities turned out to be a forgery, which is why he managed to gain entrance into Australia, and secure a job placement.

The agency very quickly alerted authorities, and after investigation the teacher was deported. It would seem that in this case the background check was done just in time.

A high probability existed that he may have returned to his old ways and molested children at the school where he was placed in Australia.

Background screening

If inadequate background screening is performed by a fly-by-night operation, there is a very real danger that companies can be defrauded. The following case study deals with an employee who worked for a major financial institution handling vast sums of money. She claimed that she had a bachelors degree when, in fact, she only had a matric certificate.

During 2009, a verification consultant at MIE received a phone call from the candidate whose credentials were being verified. The institution had started a project to verify the credentials of its current employees. The candidate told the MIE consultant that she would pay her R5000 to positively verify her claimed qualification. She had lied to her employer and claimed she had a bachelor’s degree.

The MIE consultant refused to be bribed, and stated that she could not produce a fake MIE certificate; she then put the call through to her manager. The candidate, clearly very desperate, then offered the manager R10 000 to fake the result of the check. MIE immediately brought the matter to the attention of the financial institution, and the candidate was dealt with accordingly. The candidate’s name was submitted by MIE to the South African Fraud Prevention Society (SAFPS) for listing on their fraud database.

For more information contact Managed Integrity Evaluation, +27 (0)12 644 4000, ninadw@mie.co.za, www.mie.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.