APPENDIX TO POLICY
Background Check Requirements for Non-Employees
Non-employees are required to complete a successful background check if they will be performing security-sensitive work for the University. Units must obtain confirmation of the successful completion of a background check for the non-employee with the vendor. If not available, then the unit must conduct a background check through the University’s designated vendor prior to the first day of work.
Security-sensitive work includes:
- Responsibility for care, safety, and security of people, including children and minors, or property;
- Work in medical or pharmaceutical programs responsible for the care of others or with access to controlled substances;
- Unsupervised contact with minors;
- Work with children under the age of 18 or persons with diminished mental or physical capacity.
- Access to University cash, checks, credit cards, and/or credit card account information;
- Ability to modify business or financial records after transactions have been processed through regular approval queues and/or review processes;
- Receive or deliver merchandise, items with a value exceeding $5,000.
- Access to animal research facilities;
- Access to controlled substances;
- Access to select biological/biochemical agents, as defined by the U.S. Patriot Act of 2001;
- Required by state or federal law to have background checks (e.g. access to nuclear material);
- Access to financial, health care, student, or other confidential data.
- Safety and Security:
- Access to computer infrastructure, systems or applications;
- Access to personally identifiable information about students, faculty, staff or alumni;
- Access to student residences;
- Access to law enforcement or central security facilities;
- Possession of keys for building access;
- Work involving use of drones;
- Access to security-sensitive areas, such as steam tunnels, secured laboratory spaces, or University buildings during hours that the buildings are closed to the public.
The University reserves the right to identify additional areas of work as security-sensitive.