{"id":29,"date":"2016-11-18T11:46:55","date_gmt":"2016-11-18T11:46:55","guid":{"rendered":"http:\/\/inkthemes.com\/wptheme\/background-check-company-wordpress-theme\/?p=29"},"modified":"2016-11-18T11:46:55","modified_gmt":"2016-11-18T11:46:55","slug":"using-popular-social-media-for-hiring-can-be-hazardous","status":"publish","type":"post","link":"https:\/\/accuscreening.com\/index.php\/2016\/11\/18\/using-popular-social-media-for-hiring-can-be-hazardous\/","title":{"rendered":"Using Popular Social Media For Hiring Can Be Hazardous"},"content":{"rendered":"<body><p><\/p>\n<p style=\"text-align: justify\">Using popular Social Media web sites such as Facebook and search engines like Google for hiring decisions may be hazardous to your business warns Attorney Lester Rosen of Employment Screening Resources.<\/p>\n<p style=\"text-align: justify\">Employers and recruiters have uncovered what appears to be a treasure trove of applicant information on the Internet. By searching the Internet and social networking sites such as Facebook or MySpace, recruiters feel they are effectively able \u201cto look under the hood\u201d and try \u201cto get into an applicant\u2019s head.\u201d<img decoding=\"async\" class=\"alignright size-full wp-image-134\" src=\"https:\/\/accuscreening.com\/wp-content\/uploads\/2016\/11\/Blog-06-1.png\" alt=\"Blog 06\" width=\"750\" height=\"450\" loading=\"lazy\" srcset=\"https:\/\/accuscreening.com\/wp-content\/uploads\/2016\/11\/Blog-06-1.png 750w, https:\/\/accuscreening.com\/wp-content\/uploads\/2016\/11\/Blog-06-1-600x360.png 600w, https:\/\/accuscreening.com\/wp-content\/uploads\/2016\/11\/Blog-06-1-300x180.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p style=\"text-align: justify\">Unlike the traditional hiring tools such as team interviews, psychological testing, calling past employers, and background checks, social networking sites hold out the promise of revealing the \u201creal applicant.\u201d Statistics from various surveys, news articles, and anecdotal evidence confirm that there is an increased use of social networking sites to screen candidates.<\/p>\n<p style=\"text-align: justify\">Stories from recruiters show why these sites are so enticing.<\/p>\n<p style=\"text-align: justify\">One recruiter recounts how she had found \u201cThe Ideal Candidate\u201d for a prestigious consulting firm. Then, just out of curiosity, she ran the applicant\u2019s phone number on a search engine, and \u2013 wow! Up popped some rather explicit ads for discreet adult services that the applicant was apparently providing at night. Another recruiter tells the story of finding an applicant\u2019s MySpace page, where the intern had demonized his firm, his boss and his coworkers in considerable detail and by name.<\/p>\n<p style=\"text-align: justify\">Here is the usual approach for a recruiter utilizing the Internet to screen candidates. Search by name for the candidate. Refine the search by taking the applicant\u2019s name and then adding the terms \u201cFacebook\u201d or \u201cMySpace.\u201d Next, a recruiter can go to MySpace and Facebook directly and see whether they find a site belonging to the applicant. Depending upon how a user chooses to set his or her own privacy settings, finding information on a social network site can be very hit or miss. Business sites such as ZoomInfo or LinkedIn can be run.<\/p>\n<p style=\"text-align: justify\">This article, however, examines why such an apparently easy to use and readily available tool has its dangers and drawbacks.<\/p>\n<p style=\"text-align: justify\"><strong>No Court Cases of Record Yet<\/strong><\/p>\n<p style=\"text-align: justify\">At this point in the evolution of social networking, there are no published cases yet on point. Lawsuits take time to work their way through the courts until an appellate court is finally called upon to issue an opinion. However, it is all but certain that some day an employer will land in court being sued on allegations of discrimination or a violation of privacy for making use of a social networking site in the hiring process.<\/p>\n<p style=\"text-align: justify\">One reason that the use of social networking sites presents a risk stems from their original purpose. In the beginning, users intended to limit access to friends or members of their own network, arguably creating a reasonable expectation of privacy. It\u2019s like a \u201ccyber high school,\u201d but instead of seeing your friends near your locker, you can see friends and make contacts all over the world. Younger workers in particular may well regard invading their social network sites in the same way older worker may regard someone that crashes a private dinner party uninvited \u2013 a tasteless act that violates privacy.<\/p>\n<p style=\"text-align: justify\">The conventional wisdom, however, is that anything online is fair game because any reasonable person must understand that the whole world has access to the Internet.<\/p>\n<p style=\"text-align: justify\">When analyzing the privacy issues, an employer may want to take the \u201cLas Vegas test.\u201d Assume you are at a business meeting in Las Vegas, and at the end of the day you adjourn with professional colleagues to a cocktail lounge in the hotel lobby. Several drinks later, you engage in a very frank exchange about your employer or co-workers. You may be indiscrete or even act a little silly. How would you feel if a colleague took photos with a cell phone and sent them to everyone you knew, along with some of your more interesting comments? Technically, you were \u201cin public\u201d \u2013 in a public cocktail lounge. True, but most people would still call it an invasion of privacy. This is based on an objective belief founded on broadly based and widely accepted community norms that what goes on in a private conversation should not be seen by the entire world, even if it occurred in a public venue where anyone could have seen or heard.<\/p>\n<p style=\"text-align: justify\">For many young workers today, social networking sites are the equivalent of that Las Vegas cocktail lounge!<\/p>\n<p style=\"text-align: justify\">Even though they communicate and share photos in a forum that can be public, there is sense that what goes on in MySpace or Facebook stays there and should stay there. This argument is buttressed by the fact that in order to enter some social networking sites, a user must agree to \u201cterms of use\u201d and to get details of another site member, the new user must set up their own account. Additionally, these types of websites have \u201cterms of use\u201d typically do not allow \u201ccommercial\u201d uses, which can include screening candidates. Since a user must jump through some hoops, it can be argued that there is an expectation that the whole world won\u2019t be privy to confidential information.<\/p>\n<p style=\"text-align: justify\">On the other hand, a recruiter can argue that the routine \u201cterms of use language\u201d where someone simply hits the \u201cI agree\u201d button is not much of a privacy barrier. In addition, if an applicant fails to utilize the privacy controls provided by the website, that undercuts any reasonable belief that what was on the website would remain confidential.<\/p>\n<p style=\"text-align: justify\"><strong>This Issue Far From Being Settled<\/strong><\/p>\n<p style=\"text-align: justify\">The bottom line is that the question of whether an applicant has a reasonable expectation of privacy can depend upon the specific facts of the case being litigated, and the issue is far from settled. Frankly, it could be decided either way.<\/p>\n<p style=\"text-align: justify\">That is why recruiters should not simply assume that anything on the web is fair game.<\/p>\n<p style=\"text-align: justify\">One area where an employer or recruiter would be flirting with particular trouble is if information from Facebook or MySpace is obtained by manipulating the sites. This could be done by creating multiple identities or by using \u201cpretexting,\u201d which can include pretending to be someone else or something you are not. For example, Facebook allows greater access into sites within your own network. If a recruiter were to violate Facebook rules and create fake identities just to join a network belonging to an applicant, that would likely cross over into the realm of employer behavior that is overly intrusive and invades too deeply into private matters.<\/p>\n<p style=\"text-align: justify\">Off-duty conduct is another tricky area. Some states have prohibitions limiting use of private behavior for employment decisions. However, employers do have broader discretion if such behavior would damage a company, hurt business interests, or be inconsistent with business needs<\/p>\n<p style=\"text-align: justify\"><strong>Is It Discrimination?<\/strong><\/p>\n<p style=\"text-align: justify\">Discrimination can also become a substantial issue. A candidate may say or depict all sorts of things that reflect race, color, religion, national origin, ancestry, medical condition, disability (including AIDS), marital status, sex (including pregnancy), sexual preference, age (40+), or other facts an employer may not consider under federal law or state law.<\/p>\n<p style=\"text-align: justify\">This can give rise to the problem of \u201cToo Much Information,\u201d also popularly referred to as \u201cTMI.\u201d The employer\u2019s own search of these sites can make an employer knowledgeable of factors that should NOT be considered for employment purposes. The issue then becomes: \u201cHow do you <strong>unring the bell?<\/strong>\u201d How do you prove that you didn\u2019t use the information you found improperly as part of your hiring decision?\u00a0 Of course, all hiring decisions need to based upon information that is non-discriminatory and is a valid predictor foe job performance.<\/p>\n<p style=\"text-align: justify\">A related issue is whether a firm is treating all applicants in a similar fashion. If recruiters or human resource staffers are performing Internet searches on a hit or miss basis, with no written policy or standard approach, an applicant that is subject to adverse action as a result of such a search can potentially claim to be a victim of discrimination.<\/p>\n<p>Also problematic is that on social network sites, a recruiter may view photos, personal data, discussion of personal issues and political beliefs, behavior at parties, and other information that an applicant may not have intended for the world to see. Employers may have to consider whether what a person says on their site is true, and if true, whether it would be a valid predictor of job performance \u2013 if fact, whether it would be employment related at all. After all, people <em>have<\/em> been known to exaggerate or make things up. They may believe they are just having fun or spoofing their friends.<\/p>\n<p style=\"text-align: justify\">Or if a site shows, for example, that an applicant has a tattoo or a piercing, what then? Employers may need to ask themselves whether having a tattoo is really a good reason not to hire someone.<\/p>\n<p style=\"text-align: justify\">Employers that hire younger workers may need to come to grips with new generational differences.<\/p>\n<p style=\"text-align: justify\">One rule to remember: If a website is searched by a background screening firm on behalf of an employer, then consent and certain disclosures is mandated under the federal Fair Credit Reporting Act (FCRA).<\/p>\n<p><strong>What\u2019s REAL on the Internet?<\/strong><\/p>\n<p>In addition, how do you know what is \u201creal\u201d on the Internet? How do you know that the \u201cname\u201d you found is your applicant? You don\u2019t. With more than 300 million Americans today, most of us have \u201ccomputer twins\u201d (i.e. people with our names and even a similar date of birth). There is also the question of how does a recruiter even know for sure the applicant actually wrote the item or authorized its posting? How doe the recruiter know if its even true, or just a matter of someone being silly with their friend?<\/p>\n<p style=\"text-align: justify\">There are anecdotes on the Internet of false postings under another person\u2019s name \u2013 a sort of \u201ccyber identity theft.\u201d If anonymous information is posted, such as in a chat room, there is the new phenomena of Cyperslamming, where a person can commit defamation without anyone knowing who they are.<\/p>\n<p style=\"text-align: justify\"><strong>What Are the Lessons for Employers and Recruiters?<\/strong><\/p>\n<ol style=\"text-align: justify\">\n<li>Using the Internet to screen candidates is not risk-free, especially when it comes to social networking sites.<\/li>\n<li>There are no legal cases yet, but news travels fast on the web, and employers who rely overly much upon social networking sites may find that job applicants are not as eager to look at their firm.<\/li>\n<li>If an employer or recruiter uses the Internet, they should first consult their attorney in order to develop a written policy and a fair and non-discriminatory procedures designed to locate information that is a valid predictor of job performance. Employers should focus on objective criteria.<\/li>\n<li>As a general rule, the later in the hiring process the Internet is used, the less open an employer may be to suggestions that matters viewed on the Internet were used in a discriminatory fashion.\u00a0The most conservative approach\u00a0is to not use the Internet until AFTER there has been a conditional job offer.<\/li>\n<li>For legal protection, <strong>employers should considering obtaining consent so that applicants are <u>on notice<\/u> that their web persona is fair game. Employers should not use any fake identities or engage in \u201cpretexting\u201d to gain access to information.<\/strong><\/li>\n<li>The most conservative approach is to perform an Internet search AFTER there is consent and a job offer is made contingent upon completion of a background check that is <u>satisfactory<\/u> to the employer.<\/li>\n<li>Whatever your policy is, it should be written.\u00a0 For employers that recruit at college, there is a trend to require employers to notify students ahead of time as to their policy for searching online for an applicant\u2019s cyber identity.<\/li>\n<\/ol>\n<p style=\"text-align: justify\">For job applicants, the advice is simple: Don\u2019t be the last to know what a web search about you would reveal.<\/p>\n<p style=\"text-align: justify\">If you do not want employers looking at your social networking site, then set the privacy parameter to \u201crestricted use only.\u201d As a savvy applicant, you can even go on the offense and create an online presence that helps you get a job!<\/p>\n<p><\/p>\n<\/body>","protected":false},"excerpt":{"rendered":"<p>Using popular Social Media web sites such as Facebook and search engines like Google for hiring decisions may be hazardous to your business warns Attorney Lester Rosen of Employment Screening Resources. Employers and recruiters have uncovered what appears to be a treasure trove of applicant information on the Internet. By searching the Internet and social&#8230;<a href=\"https:\/\/accuscreening.com\/index.php\/2016\/11\/18\/using-popular-social-media-for-hiring-can-be-hazardous\/\" class=\"epl-more-link\">Read More&rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":28,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-29","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-background-check-from-social-media","pmpro-has-access","post-single"],"_links":{"self":[{"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/posts\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":0,"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/posts\/29\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/media\/28"}],"wp:attachment":[{"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/media?parent=29"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/categories?post=29"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/accuscreening.com\/index.php\/wp-json\/wp\/v2\/tags?post=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}