Screening Terms Glossary

Start here for the information you need to hire the right individuals for your business. 

A

The ability to automate a judgment based on background screening outcome. This judgment often results in “meets requirements” or “does not meet requirements” outcome. Once adjudication takes place automatic distribution and/or adverse action can occur.

Any system, whether in paper or software form, that manages both an organization’s job posting and data collection (i.e., resume/applications) process to efficiently match prospective candidates to the proper positions.

B

A bankruptcy search is essential for candidates responsible for handling money or
finances. Federal bankruptcy searches return all insolvency information in a candidate background. Checking for a history of bankruptcy helps illustrate a candidate’s financial accountability and track record.

MYB investigators will work to ensure you have the information you need to make knowledgeable business decisions. This search will allow you to discover:

  • CPAs
  • C-level executives
  • Financial and banking staff
  • Employees responsible for handling money and/or financial information

C

MYB investigators conduct civil litigation or lawsuit searches at the county and federal jurisdiction levels to find information of past and present cases. Our team researches litigation in various stages from pre-trial and trial cases to settlements and appeals. A civil litigation search identifies cases involving:

  • Contracts
  • Money
  • Property

Civil litigation encompasses many types of disputes:

  • Medical malpractice
  • Employment / labor
  • Intellectual property
  • Landlord / tenet
  • Personal injury
  • Worker's compensation

A Computer Virus is a self-replicating computer program that alters the way a computer operates, without the knowledge of the user. A true virus replicates and executes itself.  While viruses can be destructive by destroying data, for example, some viruses are benign or merely annoying.

Very sensitive information. Disclosure could adversely impact our company.

A credit bureau that gathers and provides information about individuals – such as if they pay their bills on time or have filed bankruptcy – to creditors, employers, and landlords. Companies that perform pre-employment screening services are also considered CRAs and are governed by the FCRA, as are the employers that use background screening services.

A common measure used in human resources to evaluate the average costs incurred in recruiting and hiring new employees. Generally, the equation is total recruitment costs divided by total number of new hires. Typical components of this measure include relocation costs, advertising/job board fees, interviewing expenses, referral bonuses, recruitment staff compensation, skills assessment and pre-employment screening.

A county criminal history search is essential. It's the baseline of most background checks and provides the most current, complete criminal information from county courthouses.

We insist on this search as it uncovers the following information:

  • Charges
  • Sentencing information
  • County and state
  • Case numbers
  • Number of years searched
  • Disposition and related dates

Most national and some state criminal databases are updated only periodically, which means they may be missing critical records. At MYB, Inc we deliver the most up-to-date information with fast results. Our court researchers examine every U.S. county jurisdiction to find more case information, such as misdemeanor and felony cases that may be prohibited from inclusion in some databases. The standard scope for the county criminal search is seven years, with extended searches available in some jurisdictions. These searches depend on the limited availability of archived records, state laws, and Fair Credit Reporting Act regulations.

A technology designed to help organizations maintain interaction with their customers.

D

Running a motor vehicle record check provides you with the most recent information on license status, moving violations and restrictions. This is especially important for your candidates or employees who operate motor vehicles. We access information directly through state Departments of Motor Vehicles to bring
you the most up-to-date details. This search should be conducted when investigating commercial drivers, machine operators, company vehicle drivers, courier and chauffeuring company employees, and anyone in a position that requires the operation of a vehicle.

E

ERM applications work in conjunction with ERP systems, which hold critical employee data. Through the Internet, ERM applications give employees access to their own training, benefit and payroll information.

The process of obscuring information to make it unreadable without special knowledge.

A system of employment practices regulated by the EEOC under which individuals are not excluded from any participation, advancement, or benefits due to race, color, religion, sex, national origin, or any other action that cannot lawfully be the basis for employment actions.

The federal agency responsible for administration of several statutes that prohibit discrimination; has power to subpoena witnesses, issue guidelines that have the force of law, render decisions, provide technical assistance to employers, and provide legal assistance to complainants.

Recruiting methods that take place via the Internet such as job boards.

F

The FCRA is designed to protect individuals, by promoting accuracy, fairness, and privacy of information in the files of every Consumer Reporting Agency (CRA). Companies that perform pre-employment screening services are governed by the FCRA, as are the employers that use background screening services.

In computer science, a Firewall is a piece of hardware and/or software which functions in a networked environment to prevent unauthorized external access and some communications forbidden by the security policy, analogous to the function of Firewalls in building construction. The goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle.

Federal form required of all appointees to verify their U.S. citizenship, or if they are aliens, their eligibility for employment in accordance with the Immigration and Naturalization Act of 1986.

A form used by employers to pre-screen and to make a written request to a State Employment Security Agency (SESA) to certify an individual as either a member of a targeted group for purposes of qualifying for the work opportunity credit, or a long-term family assistance recipient for purposes of qualifying for the welfare-to-work credit.

Federal criminal record searches uncover information from Federal District Courts
nationwide. Whether a specific federal district search is required or an examination
through all federal districts in a state, our team will find the essential details to keep
you informed. We recommend federal-level searches because it may reveal cases involving:

  • Embezzlement
  • Capital punishments
  • White-collar crimes
  • Fraud
  • Tax evasion
  • Robbery
  • Kidnapping
  • Illegal sale of firearms
  • Pornographic exploitation of children

This search should be conducted for C-level executives, CPAs, financial and banking staff, public sector employees and any employees with access to secure or financial information.

F

Transparency is key. MYB can help you quickly identify candidates that have been
barred from doing business in or entering the United States, according to the Office of Foreign Asset and Control.

This check tracks and detects:

  • Terrorist organizations
  • International narcotics traffickers
  • Individuals and organizations that have been placed on watch status by U.S. and international government agencies

This search should be conducted for the following:

  • Airport security and staff
  • People who will handle sensitive materials or information
  • People in technology and information management fields
  • Public sector employees
  • Security officers and manufacturers
  • Staff in multi-national companies

In computer science, a Firewall is a piece of hardware and/or software which functions in a networked environment to prevent unauthorized external access and some communications forbidden by the security policy, analogous to the function of Firewalls in building construction. The goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle.

Federal form required of all appointees to verify their U.S. citizenship, or if they are aliens, their eligibility for employment in accordance with the Immigration and Naturalization Act of 1986.

A form used by employers to pre-screen and to make a written request to a State Employment Security Agency (SESA) to certify an individual as either a member of a targeted group for purposes of qualifying for the work opportunity credit, or a long-term family assistance recipient for purposes of qualifying for the welfare-to-work credit.

Federal criminal record searches uncover information from Federal District Courts
nationwide. Whether a specific federal district search is required or an examination
through all federal districts in a state, our team will find the essential details to keep
you informed. We recommend federal-level searches because it may reveal cases involving:

  • Embezzlement
  • Capital punishments
  • White-collar crimes
  • Fraud
  • Tax evasion
  • Robbery
  • Kidnapping
  • Illegal sale of firearms
  • Pornographic exploitation of children

This search should be conducted for C-level executives, CPAs, financial and banking staff, public sector employees and any employees with access to secure or financial information.

H

An operating language established by voluntary members of the human resources community who agree to use common definitions to facilitate automated exchange of all HR-related data between organizations.

Software-based systems that manage all or a part of the human resources function of an organization. Typical functionality includes employment demographics, benefits/compensation management, training, payroll and reporting.

I

Information Lifecycle (or Data Lifecycle) is a management program that considers the value of the information being stored over a period, the cost of its storage, its need for availability for use by authorized users, and the period for which it must be retained.

The actual part of a software program or Web-based application that the user sees and uses. This is normally designed to be easy to use and aesthetically pleasing.

A unique number that devices use to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP). Any and all participating network devices:  including routers, computers, time-servers, printers, Internet fax machines, and some telephones - must have its own unique IP address. Just as each street address and phone number uniquely identify a building or telephone, an IP address can uniquely identify a specific computer or another network device on a network. It is important to keep your IP address secure as hackers can gain control of your devices and possibly launch an attack on other devices.

J

Any formal, organized place where jobs can be posted for prospective applicants to view and apply. Examples include bulletin boards, Web sites (i.e., Monster.com) and recruitment agencies.

M

Reports designed to reflect pre-screening report activity. An example is a report that displays turnaround time for reports and types of reports ordered. This is different from the pre-employment screening report, which displays information specific to the individual candidate.

Running an MYB ID check allows you to discover authenticated information about an individual. This is an essential component for background checks as it uncovers
residential history that adds depth for criminal background checks. Our MYB ID solution uses the Social Security Number to find address history and alias
names, which we will report to you quickly and securely. Information within SST searches includes:

  • Name(s) and aliases
  • Date of birth
  • Current and previous addresses with dates of residency
  • Phone numbers

This search will allow you to discover:

  • A complete list of alias names (AKAs), maiden names, nicknames and spelling
    variations
  • Any collection agencies pursuing payments owed by an individual
  • Candidates with a limited credit history, such as minors and undocumented
    workers

Every background check should include a search through the national criminal
database. At MYB we provide a Criminal Offender Profile Summary (MYB Net Check) from this database. This search enhances other searches, like employment history or identity traces, with a nationwide reach to find criminal history for an employee or candidate.

MYB Net check pulls information from millions of records from thousands of jurisdictions, including databases with terrorist and sex offender information. We recommend this search because it may reveal criminal records on your employee or
candidate and it allows you to search beyond state and counties where the subject has worked, lived or attended school. MYB Net check reports examine:

  • Criminal records from state record repositories and some county and township courts
  • Departments of correction and probation
  • Sex offender registries
  • Information from state-level agencies and the FBI
  • Local, state and federal fugitive lists

We recommend this search in conjunction with additional county and state-wide
searches for the most comprehensive information:
County Criminal History Search
State Criminal History Search
Federal Criminal History Search

P

A type of communication found in a system that uses layered protocols. Peer-to-Peer networking is the protocol often used for reproducing and distributing music without permission.

Pre-employment screening services include background verification, drug screening, skills assessment and behavioral assessment tools. A thorough background screen verifies important factual information about a prospective employee (i.e. identity, employment history, education credentials). It also helps gain critical information about an applicant’s character and past history that isn’t always apparent in an interview or application, such as criminal history, credit history, and driving record.

R

A Router is a computer networking device that forwards data packets across a network via routing. A Router acts as a junction between two or more networks transferring data packets.

S

A sex offender search returns information for up to level-three sex offenders. The
information reported varies by state and the details of an offense are typically not
provided. We’ll help ensure individuals measure up to your organization’s safety
standards.

Search options include:

  • National Sex Offender Registry
  • Sex Offender Database
  • State Sex Offender Registries

This type of search is ideal for:

  • Caregivers and medical professionals
  • Childcare workers
  • Volunteers working with children
  • Coaches

Spyware refers to a broad category of malicious software designed to intercept or take partial control of a computer's operation without the consent of that machine's owner or user. In simpler terms, spyware is a type of program that watches what users do with their computer and then sends that information over the internet.

Part of the Wi-Fi Wireless LAN, a service set identifier (SSID) is a code that identifies each packet as part of that network. Wireless devices that communicate with each other share the same SSID.

When a candidate provides a valid Social Security Number (SSN), our team of
investigators can give you instant verification of the number directly through the Social Security Administration (SSA). This essential check will quickly verify a name and SSN combination to ensure they match and are valid.

Your candidate's name and SSN are verified against SSA's Master File of Social Security Numbers to determine whether or not there is a match. Information within SSN verifications includes:

  • Matching name, SSN and date of birth
  • Fast verification from the SSA as a straightforward yes/no match

While this background check method is essential and valuable, it cannot stand alone. MYB will work with you to obtain further identity verification, such as:

  • Employment eligibility
  • ID confirmation
  • I-9 verifications

Statewide criminal background checks reveal an overview of a candidate's potential criminal history within a specific state. This search gives insight toward crimes that could go undetected when focusing on only county-level criminal searches. This search accesses data from individual states' Department of Justice criminal repository. It is an essential check when looking to identify records for those who have lived and worked in a given state and is necessary to meet state requirements for certain industries.

The types of information available may vary by state.

This search is enhanced through county-level criminal searches in order to identify
records near places of residence, employers, and academic institutions. The standard scope for the state criminal record search is seven years, with extended searches available in some jurisdictions. These searches depend on the availability of archived records, state laws, and Fair Credit Reporting Act (FCRA) regulations.

T

A common measure used in human resources to evaluate the average amount of time it takes to fill an open position. This is normally measured from the point the job request is submitted by the hiring manager to the point the new employee walks in the door.

W

(Wired Equivalent Privacy) A part of the wireless networking standard intended to provide secure communication. The longer the key used, the stronger the encryption will be.

A federal income tax credit that encourages private sector employers to hire eight targeted groups of job seekers.

(Wi-Fi Protected Access) A part of the wireless networking standard that provides stronger authentication and more secure communications, replaces WEP. WPA uses dynamic key encryption versus static as in WEP (the key is constantly changing and thus more difficult to break than WEP).

X

Short for Extensible Markup Language. XML is a language designed especially for Web documents. It enables the definition, transmission, validation, and interpretation of data between applications and between organizations

Latest News

What are Continuous Background Checks?

Continuous background checks are a departure from traditional screening practices and are a paradigm shift in how companies vet their employees. Unlike the conventional one-and-done approach, continuous background checks involve regular, ongoing assessments of an individual's ...
Read More

The Top Five Reasons to Run a Background Check

Running a background check is more than just a precaution; it's a crucial step toward ensuring transparency, accountability, and peace of mind. Let's explore why running various types of background checks is essential in various aspects ...
Read More
002-wgradient

Get Your Free Quote

Schedule a call and get Started with MYB precision background screening

Uncompromised Accuracy

Contact our team to get a free, custom quote for your specific screening needs. From small businesses to government agencies, MYB has a custom package of solutions for any organization.