Employers have done some form of background checks or employment screening for decades. In the early days, it was mostly reference checking and resume verification. In the 1980’s and early 1990’s things started to get a lot more formal as vendors and providers began to offer pre employment screening as a service you could outsource. Prior to that, it was the risk manager or human resources department that did the background checks.
In the previous part to this series we began to look at the various types of wastes which could be hidden within your organization. In part 3 we continue that review with a look at the next three types of wastes.
Waste or Muda #4: Waiting
Waiting of any kind means that the process has slowed down.
Your advertisement for cashiers nets 100 applications. You want credit reports on each applicant. You plan to eliminate those with poor credit histories. What are your obligations?
You are considering a number of your long-term employees for major promotions. Can you check their credit reports to ensure that only financially responsible individuals are considered?
Departing employees sometimes access workplace computer systems to obtain information for purposes of using it in competition with their employer. Sometimes they use the internet at work to send emails concerning their post-employment plans. And while employers have many tools and tactics at their disposal to investigate their computers and related systems, these investigations are fraught with pitfalls for the incautious employer.
A Chief Information Officer from a large manufacturing company last month told me they had recently completed an internal record retention review and had declared that their e-mail system contained no records.