Latest News States: Understanding 3rd Party Background Screening Security Policies Remains Critical in Light of Recent Breach

A recent security breach at USIS suggests that companies large and small understand the level of security third-party background screening companies maintain regarding the security of critical data. Adam Almeida, President and CEO of states: “While not all third-party background screening companies will be targeted by state-sponsored cyber-attacks, data security remains critical and breaches do occur.”

Waltham, MA (PRWEB) October 27, 2014

Recent data breaches at Home Depot and Target have focused the country on potential loss with identity theft, as well as the cost involved with such a data breach.

From (Sep. 08, 14):

In a research note released Monday evening, S&P Capital IQ analyst Efraim Levy said that “if the breach to Home Depot is on the scale of Target’s 2013 data breach, the cost to Home Depot could run into the hundreds of millions of dollars.” (1)

What is not often on the minds of average Americans is the potential of similar data loss through breaches at third-party background screening companies.

One such incident of data breach did recently occur at USIS, one of the largest background screeners and security clearance contractors in the country. The cost was not only to the clients and individuals involved with the data loss but to the provider, USIS, itself.

From the New Haven Register (; Sep. 09, 14):

The federal Office of Personnel Management plans to terminate its massive contracts with USIS, the major security clearance contractor that was targeted last month by a cyber-attack, agency, congressional and company officials said Tuesday. The computer network intrusion compromised the personal files of as many as 25,000 government workers. (1)

A breach in the magnitude of the USIS breach highlights the need for all companies, organizations, and agencies to maintain the highest level of security possible.

Adam Almeida, President and CEO of states: “The loss of data at any level can be concerning but it is important to note that the loss of background screening data is especially troubling.”

Typical information pulled on a criminal background check or an employment background check is:

1.    Full birth name; first, middle, last (maiden)

2.    Social Security Number

3.    Date of birth

All three data points are critical in creation of false identities and, subsequently, false credit identities.

But background check information can also include:

1.     Previous addresses

2.    Criminal history

3.    Employment and Education information

The cost of data breach is significant, both in real terms and human terms.

In a recent study by the Poneman Institute, sponsored by IBM, the various costs of a data breach were revealed. Two key points came to light:


  •     The cost of a data breach is on the rise. Most countries saw an uptick in both the cost per stolen or lost record and in the average total cost of a breach.
  •     Fewer customers remain loyal after a breach, particularly in the financial services industry. (3)

In the end it is critical for companies of all sizes work with third-party background screening companies with compliant and secure data retrieval and storage systems. Almeida states: “The information a candidate can provide is very intimate and could prove disastrous if lost or misused.” is a third-party background screening company that takes data and information security as the highest priority. Fully compliant with rules and regulations governing the pre-employment background screening industry, can provide secure and safe data retrieval programs for companies large and small. While utilizing the most advanced encryption methods, ensures personally identifiable information and private data are collected safely and transmitted securely giving client’s confidence in the confidentiality of their sensitive information.





For the original version on PRWeb visit:

Leave a comment

seks shop - izolasyon
basic theory test book basic theory test