Feeds

Employers to take fingerprints for CRB checks

In place of plod

Mobile application security vulnerability report

Private companies will take fingerprints from job applicants as part of a trial to improve the accuracy of Criminal Records Bureau (CRB) background checks.

The trial, disclosed to The Register in response to a Freedom of Information Act request, will see employment agencies gather biometric data from some applicants to establish their identity.

The role has until now been performed by the police. When a CRB check is matched to a record on the police national computer, fingerprints are sometimes used to verify whether the person applying for a job is the same person who committed the crime.

"The CRB recognises the need to improve this process to reduce costs, time and inconvenience to its customers and is working to make this method faster and easier for applicants," a letter from the CRB said.

"The CRB therefore made amendments in Police Act Regulations in March 2009 to insert a further option for the taking of applicants' fingerprints by allowing this to be done by a Registered Body (RB) following standard police processes and guidelines."

In CRB jargon, a "Registered Body" is any organisation that is allowed to receive criminal records disclosures. Many large employers and agencies are themselves Registered Bodies. Smaller firms often use a third party CRB check firm to avoid the administration costs of becoming a Registered Body.

"In terms of process both for the pilot and any subsequent solution once the fingerprints have been taken by the Registered Body they will be forwarded to either a police force or one central police force who will then undertake a 'speculative search' on police systems as per the provisions established in the Police Act 1997 (Criminal Records) Regulations 2002," the CRB said.

It said employers will not be forced to take fingerprints and job applicants will not be forced to give them to the employer. The option of visiting a police station will remain open, it added.

The disclosure of the "small" fingerprint pilot follows news in August that the CRB is also continuing work on incorporating ID Cards into the disclosure process, again hoping to improve accuracy. Its identity error rate last year was three times that of the previous year.

The CRB is under increased performance pressure. The introduction of the Vetting and Barring scheme last month, which the government estimates will check the background of more than 11 million adults who work or volunteer around children and vulnerable people, is expected to significantly increase its workload. ®

Mobile application security vulnerability report

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Australia floats website blocks and ISP liability to stop copyright thieves
Big Content could get the right to order ISPs to stop traffic
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.