Common Questions About Background Screening

Is there a one-stop national criminal record search?

Understanding the basics of criminal records is important when requesting these types of background searches. Criminal records are divided into three areas: local, state and federal. Local and state records are not cross-indexed with federal records. The systems are separate and distinct. For example, bank embezzlement is a violation of federal law and is prosecuted in U. S. District Courts. The embezzlement conviction and sentencing is recorded in the federal system, not in local or state records. Searching state and local records will not disclose federal convictions, and the reverse is also true.

The capabilities of private companies who conduct national criminal record checks is widely misunderstood. The proprietary databases most often used to conduct criminal searches have been built with data collected from private entities across a variety of sources including previous criminal record searches conducted for other clients. The results of these types of searches often contain inaccurate and out-of-date information.

Only law enforcement can conduct a national criminal records search – no private company can for employment purposes. Law enforcement agencies search the FBI’s National Crime Information Center or NCIC, which is the national repository for criminal records. There are specific criminal statutes that make accessing or attempting to access these records by anyone other than law enforcement agencies a criminal offense.

The local or county criminal records contain felony and misdemeanor charges and convictions. This data often goes back at least 7 years per FCRA regulations; however, REXUS has negotiated a minimum 10-year search for county, state and federal criminal records. REXUS uses researchers to access criminal records directly from the courts on both a county and state level which is the most accurate way to conduct a background check for criminal records. REXUS also searches criminal records in the 93 U.S. District Courts for misdemeanor and felony federal arrests and convictions. In addition, when legally reportable, Rexus also includes charges that were dismissed, not prosecuted, entered into pre-trial diversion programs, or had suspended sentences. By searching records located at the local, state and federal levels in the logical jurisdictional areas, a more accurate criminal record can be produced.

How long does it take to get a report on a job applicant?

Initial reports are provided within 24 to 72 hours via our secure online client portal. If there is a delay in receiving information needed to complete a report, notification will be provided along with the anticipated delivery time through both the online portal and by email or phone.

How do you protect our sensitive, proprietary information?

REXUS is committed to protecting personal information received about consumers. A combination of online and offline security technologies, procedures and organizational measures help safeguard consumer information against loss, misuse, and unauthorized access, disclosure, alteration and destruction. The following measures are used for electronic data submission: (SSL) data encryption when data is transmitted over the Internet to our web site; layered firewalls and other security technologies to prevent unauthorized access to our systems; strong password protocols are used on computers; employees are kept up-to-date on security and privacy policies; and a secure environment with appropriate security measures is used for servers which store consumer information.

Network infrastructure is protected by a “firewalled” perimeter with layered security technologies. Enforced password standards and policies are utilized on all confidential information. REXUS utilizes data encryption, access controls, and SSL protection of data in transit and at rest. Unique identification numbers are assigned to all users accessing resources in the REXUS infrastructure. Users are attested at scheduled intervals to validate access to data and resources. REXUS maintains a vulnerability management program focusing on using and updating antivirus software technology and developing and maintaining secure systems and applications. Data access is restricted on a need-to-know basis separating and segmenting confidential data. All access to confidential data located on network resources is tracked and monitored. Security systems are regularly assessed and processes reviewed for changes and updates. REXUS maintains an information security policy that addresses corporate and user best practice that can be followed by all employees.