© 2013 CoreLogic, Inc. Proprietary & Confidential County Crim Checks: Remaining Compliant with EEOC – 1.

Slides:



Advertisements
Similar presentations
New Approaches to Enterprise Application Roll-Outs for Workforce Adoption and Compliance Effraim Herskovic Vice President, Panviva E-Financial World, October.
Advertisements

“The Honeywell Web-based Corrective Action Solution”
ATA Safety & HR Conference 2014 Trucking Safety: Best Practices, Compliance & Training Seminar Driver Qualifications/Qualifying Drivers – Background Screening.
15 The Health Record.
Red Flags Compliance How It Has Changed Customer Policies & Procedures Teresa Corlew, Vice President Customer Care Nashville Electric Service September.
“Why Technology is Critical to the Regulatory Process” Lori Long Royal College of Dental Surgeons of Ontario 2006 Annual ConferenceAlexandria, Virginia.
BACKGROUND CHECKS Cooperative Extension Volunteer Program Background Reviews.
PPA 502 – Program Evaluation Lecture 5b – Collecting Data from Agency Records.
What is a Fiscal Note? A fiscal note is an objective estimate of a bill’s fiscal impact. Provides a 6-year projection of impact Describes least expensive.
STEPHEN P. POSTALAKIS BLAUGRUND, HERBERT, KESSLER, MILLER, MYERS & POSTALAKIS, INCORPORATED OHIO ASSOCIATION OF COUNTY BOARDS.
Chapter 11.  The board is ultimately responsible for risk management  Oversee strategic risks, operational risks, and financial risks  Many federal.
© Experian CheetahMail All rights reserved. Confidential and proprietary. 1 © Experian Information Solutions, Inc All rights reserved. Confidential.
Nextgen Bank Reconciliation Resource Bank Reconciliation Menu Financial Management Bank Reconciliation –Import Bank Statements –Reconcile Bank Accounts.
1 25 October EPFL Conference Data Protection in Intergovernmental Organizations Workshop 7 February 2013 K. Ernst S. Lüders C. Viala.
This PowerPoint Presentation was designed to provide you with important information regarding our unique Business Opportunity and proprietary software.
TalentValue Veriproved Screening, LLC - Confidential Veriproved Screening, LLC offers a "wholesale" information retrieval network that enables distributors.
Job Descriptions How to Write Them Effectively. © Business & Legal Reports, Inc Session Objectives You will be able to: Define the purpose of job.
BSC Designer Implementation Why use the Balanced Scorecard? The Balanced Scorecard is a well known business performance management concept: o 80% of organizations.
Ex3Ex3 © 2003 Ex3 Confidential and Proprietary Nathan Giles President and CEO Efficient Enterprise Engineering, Inc. (Ex3) Information Systems— Why Data.
Update: Web Data Collection System (WDCS) Title I Administrative Meeting—September 30, 2010 Kristi Peters, Research and Evaluation Coordinator 1.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
INTEQ Answers While Drilling SM John Shields Director of Software Baker Atlas/INTEQ Houston, TX.
Equifax Confidential and Proprietary The Work Number ® Service Overview and Pilot Project – State of Wisconsin.
Good Governance in Sports’ Organisations Governance Matters Kate Costello.
Data Protection, Freedom of Information and Information/Records Management.
Member Mail Order Helpful Hints, Reminders and Tools.
How to create a Resume And other stuff you should care about even though you may not yet.
Jane Harris, LCSW Provider Relations Director, PSD Welcome to the 2007 NC Medicaid and Provider Education Seminar For Developmental Disabilities.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
Close x Step 1: Validate Coding Step 2: Verify cash Step 3: Confirm authority Incorrect for acct type Check SAS to see if the agency made a simple coding.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
ELITE PROCESS REVIEW A TOOL FOR OUR TIMES PRESENTED BY SHELLEY ALVORD CPA.
Chapter 17 Documenting, Reporting, and Conferring.
QAAP Workshop (Basic). Conduct of the peer review * Commitment * Contribution to a smooth and effective process * The Developmental Engagement Report.
Systems Development Life Cycle
Background Checks & Risk Management Presented to: Charity First 10/21/2015.
© 2014 CoreLogic, Inc. Proprietary & Confidential How to Choose a Data Provider Five Points to Consider Before Choosing a Background Screening Partner.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
“Working With A Technical Editor” by Jean Hollis Weber Presented by: Paul Rattray July 2, 2007.
Feasibility Report Feedback Executive Summary What is the objective of an Executive Summary?
Audit and Compliance Rosemary Carter Associate Director of Regulatory Compliance.
INTRODUCTION TO DATA PROTECTION An overview of the Irish Data Protection legislation.
OFFICE MANAGER’S MEETING APRIL 12, 2011 BOARDROOM.
CHAPTER 6 Selecting Employees and Placing Them in Jobs
QAR Question Answer Relationships. What is QAR? QAR stands for: Q- Question A- Answer R- Relationships –Using QAR we can determine question types to help.
Choice Background Checks. PRODUCTSPRODUCTS FEDERAL FAIR CREDIT REPORTING ACT Users Must Have a Permissible Purpose Users Must Provide Certifications.
NC PSD Provider Relations Welcome to the 2008 NC Medicaid and Provider Education Seminar For Developmental Disabilities.
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
What is policy surveillance? What are the methods? Why is it important? November 2015.
Purchasing with the BSC. DRAFT Confidential – Proprietary and Predecisional | Purchasing – Standalone Purchase Order Team Purchase Orders 1 BSC Responsibilities.
Reducing a Set Covering Matrix. S I T E S Cost Areas
Telecom Lifecycle Management 201: Why IT and AP need to work together ILTA Webinar Series Presented by Liz Carroll Director, Business Development - Legal.
FDIC Perspective on Environmental Risk Presented by: Gordon Stoner Legal Division Federal Deposit Insurance Corporation May 6, 2008.
Collaboration Process 1. IC Objectives and Risk Tolerances Define, document, and implement top-down internal control objectives and risk tolerances: 
C.A.N. REPORTS Models for Improved Fire Ground Communication Presented By: OCWFCD 1.
Guide to Medical Billing CHAPTER Third Edition Clinical Records and Medical Documentation 3.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Their Past is Your Future. With easyBackgrounds You See Both. Background Checks Navigating the Legal Minefield Seacoast Human Resources Association Meeting.
New Hire Packet Automation Factors for Decision Making.
ECO 372 Week 3 DQ 2 What new measures and tools has the Federal Reserve employed in the past several years that have not been employed in the past 2 decades?
Section 508 Survived Year One, on to Year Two
Payments Report Verification and Request March 2017
New Technologies in Servicing and Collections
Success of Test Automation Implementation. For businesses seeking to deliver quality at speed, strolling automated tests is a critical part of the software.
Jane Harris, LCSW Provider Relations Director, PSD
Legally-Compliant Practices Regarding Background Screening
Budget Transfer Form Budget Planning and Development FAR Meeting
The Law of Planning 1 Define your goal Define what data you need
Instructor Materials Chapter 5: Ensuring Integrity
Why focus on procurement?
Presentation transcript:

© 2013 CoreLogic, Inc. Proprietary & Confidential County Crim Checks: Remaining Compliant with EEOC – 1

© 2013 CoreLogic, Inc. Proprietary & Confidential A fair and consistent decision making tool that helps background screeners remain compliant with EEOC Guidelines.  Quick turnaround times  FCRA-reportable data  Complete and accurate information The Need – 2

© 2013 CoreLogic, Inc. Proprietary & Confidential Completing a County Crim used to be slow and error-prone process.  Send a researcher to the courthouse  Stand in line  Search by microfiche  Search by Intranet system (kiosk)  Have the researcher request the information, then type it up and fax it to the CRA In the Past – 3

© 2013 CoreLogic, Inc. Proprietary & Confidential Today – 4 Technology has helped speed up the process in many states.  Automated complete searches  Automated “hit/no hit” reports Manual searches are still necessary in some instances.

© 2013 CoreLogic, Inc. Proprietary & Confidential In order to comply with EEOC guidelines:  A consistent decision-making tool should be put in place  Everyone must be treated fairly  No blanket decisions  Only relevant information should be included  Matrix tools are helpful  Use a normalized format  Ex: Virginia traffic EEOC Guidelines – 5

© 2013 CoreLogic, Inc. Proprietary & Confidential  Knowing what you can legally report is critical.  It’s important to know the difference between the Federal laws and your state laws.  Where does the applicant live?  Where will the applicant work?  Have the state laws changed? FCRA Filters – 6

© 2013 CoreLogic, Inc. Proprietary & Confidential When evaluating the quality of a County Crim, look for:  Completeness of data  All data available is delivered  Easy to read format  Minimum indicators used - 2  Accuracy of data  No typos  Correct information reported (spot check to verify)  FCRA compliant Quality – 7

© 2013 CoreLogic, Inc. Proprietary & Confidential County Crims from National Background Data by CoreLogic covers all your bases. Quick turnaround time Accurate and complete information Standard format Returns only what is allowed for the FCRA CrimSafe matrix available Complies with EEOC guidelines Summary – 8

© 2013 CoreLogic, Inc. Proprietary & Confidential National Background Data by CoreLogic Bethany Fortune Director, Strategic Accounts For More Information – 9