There are four main reasons why enterprises need authorization before transferring the personal information of candidates for employees' induction:
1. Requirements for legal compliance:
In many countries and regions, the access and use of personal information is restricted by law and requires personal authorization or a legitimate legal basis. Therefore, obtaining employee authorization is an important step in ensuring that background checks are conducted legally and in compliance. Without the authorization of the candidate, the backtracking of personal information is not in accordance with the relevant regulations and requirements.
2. Respect for personal privacy:
Personal privacy is a fundamental right of everyone, including in the workplace. Background checks involve obtaining the candidate's personal information, such as educational background, bad record, credit history, lawsuit record, etc., which is within the scope of personal privacy. By obtaining the employee's authorization, employers can clearly obtain the candidate's consent, respect their right to privacy, and protect the security and confidentiality of their personal information in accordance with the law during the investigation process.
3. Build trust and communication:
Background checks can involve sensitive and private information, and by obtaining the employee's authorization, employers can build trust and communication with candidates. When candidates understand the purpose and scope of the background check, they can answer any concerns and questions they may have, thereby reducing misunderstandings and unnecessary speculation and maintaining a good employer brand image.
4. Define the scope of the investigation:
The authorization of the candidate is the premise of the background investigation, and it is also the general direction and content of the background investigation. The scope of the background check will not exceed the scope of the investigation authorized by the candidate. Candidates authorize third-party background check agencies through face recognition, electronic signatures, etc., which allows them to collect and verify certain information about themselves within a certain time limit.
The hotline