Corporate Knowledge for Government Decisionmakers
Insights on Screening, Vetting, and Monitoring Processes
ResearchPublished Aug 3, 2020
The U.S. government seeks to ensure that those with access to sensitive information, material, people, or property can be trusted, through its security clearance processes. The authors of this report conducted interviews with human resources and security personnel in several corporate sectors to derive insights for the U.S. government regarding potentially effective ways to screen, vet, and monitor personnel over time.
Insights on Screening, Vetting, and Monitoring Processes
ResearchPublished Aug 3, 2020
The U.S. government's screening and vetting process seeks to ensure that those with access to classified or otherwise sensitive information, material, people, or property can be trusted. The authors of this report leverage interviews with human resources and security personnel in several corporate sectors (technology, pharmaceuticals, finance, and gaming) to derive insights for the U.S. government regarding potentially effective ways to screen and vet personnel and monitor personnel over time to decrease risk to U.S. national security and public trust.
Corporations in the sample exhibited considerable diversity in screening, vetting, and monitoring practices, much of which was industry-specific and some of which was related to corporate size and stage of growth. For example, smaller and newer corporations preferred less-structured, more-flexible and informal screening and vetting processes, with any malfeasance handled on a case-by-case basis. Larger organizations in established, highly regulated industries, such as finance and pharmaceuticals, tended to have more-structured processes, owing to the constant need to follow federal and state regulations. Overall, few corporations in the sample used artificial intelligence and machine learning automated-analysis approaches for prehire screening, vetting, or employee monitoring, and those that did indicated that extensive human management of these systems was necessary. Creative solutions to employee monitoring included the development of human intelligence networks and intelligence fusion capabilities.
This research was sponsored by the Security, Suitability, and Credentialing Performance Accountability Council Program Management Office and conducted within the Cyber and Intelligence Policy Center of the RAND National Security Research Division (NSRD), which operates the National Defense Research Institute (NDRI).
This publication is part of the RAND research report series. Research reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND research reports undergo rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.