STANDARDISE YOUR BACKGROUND SCREENING ADJUDICATION AND ADVERSE ACTION PROCESS
We speed up and smooth out the process through expert vetting and technology
We conduct one-on-one background screening interviews with your Candidates covering areas such as criminal history, illegal drug use, financial stress, adverse work behaviour, security breaches, false or inflated CVs and more. Our entry level interviews are conducted by our AI-enabled digital worker Stephanie. You simply start the process by nominating your Candidate, providing their first name and their mobile number. We will do the rest.
After the interview is complete, we use machine learning algorithms that match our information with the Australian Government personnel security protocols, adjudicative guidelines and standards. The AI-generated report is then carefully moderated by our qualified human vetting officers. Our turn-a-round is fast, really fast.
A private and confidential Result is delivered to you.
- Favourable (“Green”) for low or very low-risk profiles where no issues have been identified, or there is a high level of confidence that the residual risk is acceptable.
- Caution (“Amber”) for moderate-risk profiles where there is a certain amount of residual risk which means there are doubts that the mitigating factors have fully outweighed the aggravating factors.
- Adverse (“Red”) for high-risk profiles where the mitigating factors have not convincingly outweighed the aggravating factors. If the person was applying for a national security clearance, there is a good chance they would be denied.
When you order one of our higher level suitability assessments, which goes deeper and further back into a Candidates background, you can unlock even more insights into your Candidate’s character. Although you never see the details of issues that we detect, your Result will also include a grading relating to their honesty, trustworthiness, tolerance, maturity, loyalty and resilience.
Discover Your Organisation's
Insider Threat Risk Profile
2 Minutes To Find Out
It’s completely free!
1 in 5 fraudulently lie on their job resumes. 50% contain factual errors.
1 in 4 data breaches are caused by malicious employees (not accidental fat finger or poor training clicking on a bad link). Breaches cause significant damage.
1 in 33 retail employees have stolen from their employer. 5% of annual revenue is lost due to occupational fraud. 1 in 66 financial sector employees are bad apples.
The Hiring Interview
3 in 5 who have criminal convictions failed to admit them, even when asked during the interview.
1 in 4 applicants fails pre-employment integrity tests.
1 in 6 working with children card holders have a criminal record that are intentionally not checked by government screening units.
1 in 50 employees are currently using the illegal drug ICE. 1 in 38 use marijuana illegally.
WORKING WITH THE BEST IN THE INDUSTRY
11 years of vetting experience
On Time Reports
WHY HIRING MANAGERS LOVE CLEARD LIFE
Only trusted and vetted personnel are granted access to systems, applications and data repositories.Information Security Manual ISM Principal 10
Australian Government agencies must act consistently with the policies of the Australian Government, such as the Attorney General’s Protective Security Policy Framework.Office of the Australian Information Commissioner
“Fast results. Laser-like focus. Deep insight - all for a fixed-fee. Thank you!”Michael B CEO
With the increased connectivity and explosion in computing capability, malicious actors of all types – including insiders – we need to have more opportunities and greater incentive to identify and exploit vulnerabilities, and employees have more opportunities to make mistakes.Oracle
“The fact that our recruitment process was not disrupted was perfect for us.”Mellissa D Marketing
We recommend minimum personnel vetting to the same levels across industry and therefore ensuring that sensitive data/information doesn’t find its way to someone that it shouldn’t.Queensland Government Cyber Security Unit
Cyber Crime has evolved into an industry that will not go away and 2020 will be a 'watershed year' where many organisations will have to 'prove' they have adequate Cyber Security and Cyber Resilience to their stakeholders such as Insurers, Regulators, Financiers, Suppliers, and Customers. Enterprise values will be dependent upon the quality of this "proof."Paul Nielsen
"Personnel management is a key part of cyber security: "Only trusted and vetted personnel are granted access to systems, applications and data repositories."Australian Cyber Security Centre Principle 10
Are there any barriers currently preventing the growth of the cyber insurance market in Australia? If so, how can they be addressed? Two barriers; trust and cost. The recent Banking Royal Commission highlighted the lack of trust of insurance companies generally in Australia, unfortunately for good reason.Paul Potter Cyber Strategy 2020
What are the constraints to information sharing between Government and industry on cyber threats and vulnerabilities? A simplified security “clearance” for this particular purpose could be considered on both permanent and temporary/as needed basis.Australian Computer Society
In recent times there has been a continuous evolution of policy, as the Protective Security Policy Framework (PSPF) has shifted focus from whole-of-government to whole-of-economy. The emphasis is for the PSPF to be supported and taken up by small and medium enterprises (SMEs) and the broader industry.Lockheed Martin
To overcome these constraints, the Australian government could consider setting up a trusted vendor program. After vetting and under strict controls, more sensitive information can then be shared by Government to help industry counter cyber-attacks or develop better capabilities.Unisys Cyber Strategy 2020
"Personnel undergo appropriate employment screening, and where necessary hold an appropriate security clearance, before being granted access to a system and its resources."ISM Guidelines for Personnel Security Security Control 0434
If an employee gains authorised access to a network and uses it for malicious purposes, this is a personnel security issue. This is a point that was somewhat overlooked in Australia’s Cyber Security Strategy 2016. All security areas are equally important for organisations to consider.Office of the Victoria Information Commissioner
One of the growing risks of cyber security is insider threat … through a process of vetting, businesses and individuals could become accredited as a trusted capability partner.Accenture
“Super innovative - I am not even sure anything else like this exists in the marketplace. Congratulations. Repeat and referral business is assured.”Paul F Support
“I hate second guessing. I only now feel that we have the ability turn over every stone in a person’s life before hiring them. I feel a great sense of relief.”Anne S Community