Employment Background Checks in California: A Focus on Accuracy


Fact Sheet 16aEmployment Background Checks in California:
A Focus on Accuracy

Small Business Owner Background Check Guide


Fact Sheet 16bSmall Business Owner Background Check Guide

Small business owners and large corporations alike know the value of good employees. But unlike large corporations, small business owners are often unable to absorb the risks and liability that may come from bad hiring decisions. This guide is intended to acquaint small business owners with basic information about screening applicants and current employees.

FAQ on Employment Background Checks


Fact Sheet 16cFAQ on Employment Background Checks

Will my old conviction, probation or arrest show up on a background check? Will a criminal record automatically disqualify me from ever getting a job?  I am a long-term employee - can an employer now do a background check on me?

The Privacy Rights Clearinghouse receives many questions from consumers about the employment background checking process. In this publication, we've compiled a list of the questions we hear most frequently from consumers about this issue. Read our guide to find out how backgound checks work, what rights you have when undergoing a background check and what to do when your rights are violated. 

Volunteer Background Checks: Giving Back Without Giving Up on Privacy


Fact Sheet 16dVolunteer Background Checks:
Giving Back Without Giving Up on Privacy

Every day, millions of volunteers donate countless hours to good causes. Volunteers mentor to young people, read to toddlers, coach youth sports, tutor in basic math and language skills, change bedpans, prepare and deliver meals, fight fires, provide disaster assistance, and much more. Volunteers can and do perform many of the same duties as paid workers. But, instead of a regular paycheck volunteers do what they do out of a desire to give back to their community.

In today’s queasy, security-conscious climate, organizations are faced with a growing challenge — how to accomplish their mission while protecting the vulnerable population served. At the same time, organizations that rely on volunteers must perform a delicate balancing act — how to properly screen out bad actors without alienating dedicated, privacy-conscious volunteers.

This guide seeks to explore the expanding world of volunteer screening, identify relevant laws as well as fundamental privacy protections, and offer suggestions for organizations and volunteers. References and additional resources are included at the end of this guide.

Coping with Identity Theft: Reducing the Risk of Fraud


Fact Sheet 17Coping with Identity Theft:
Reducing the Risk of Fraud

Identity Theft: What to Do if It Happens to You


Fact Sheet 17aIdentity Theft:
What to Do if It Happens to You

How to Deal with a Security Breach


Fact Sheet 17bHow to Deal with a Security Breach

Have you received a letter or an e-mail informing you that your personal information may have gotten into the wrong hands?   Or perhaps a media report alerted you to a security breach at a company you do business with.

It is increasingly common for companies, educational institutions, and government agencies -- whether or not their state has a breach notice law -- to notify individuals when computer files containing personal information have been hacked, stolen, or lost. If the file includes Social Security numbers, financial account numbers, driver's license numbers -- in short, data that would be useful to identity thieves -- there are steps you can take to reduce your risk of fraud. So, what should you do  if you suspect that your personal information has been compromised? First, don't panic. A security breach does not necessarily mean that you will become a victim of identity theft.

This guide provides instructions on ways to reduce your risk of identity theft. And if the worst happens and you do become a victim of fraud, this guide points you to other sources of information about identity theft.

Frequently Asked Questions about Identity Theft


Fact Sheet 17dFrequently Asked Questions about Identity Theft

Criminal Identity Theft: What to Do if It Happens to You


Fact Sheet 17gCriminal Identity Theft:
What to Do if It Happens to You

Online Privacy: Using the Internet Safely


Fact Sheet 18Online Privacy:
Using the Internet Safely

This fact sheet explains how your online activities may compromise your privacy and the steps you can take to protect youself. As consumers increasingly go online in so many aspects of their daily lives, the challenge is enjoy the conveniences of online activities while limiting the privacy sacrifices. As the focus of online activity migrates from desktop and laptop computers to smartphones and other mobile devices, the mechanisms for protecting your privacy continue to evolve.

Showing 31-40 of 74 results
Syndicate content


X

Sign In!

Loading