• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security

Six Practical Steps For Validating Volunteer Identification

Budget constraints and other institutional pressures mean many schools increasingly rely on their volunteers to perform essential functions inside and outside the classroom. Incomplete vetting of these volunteers, however, may expose schools to unintended risk.

October 11, 2016 Katie Zwetzig Leave a Comment

While laws and policies regarding criminal background checks for school volunteers differ for every state and school district, screening is fast becoming a prerequisite to volunteering at schools throughout the country. Some schools screen each and every volunteer who walks through their doors. Others still screen just a portion of their volunteers – usually those working directly with students. But even those institutions that screen their entire volunteer pool using the most comprehensive background checks could still be vulnerable.

Why? Because even if you’re running the highest quality criminal background checks available, there still may be a gap in your volunteer screening program. It’s possible that your volunteer could be submitting someone else’s name or social security number in order to run their background check. Going beyond the background check to validate the identification of each volunteer provides you with confidence that you know exactly who you’re working with.

How can you validate a volunteer’s identification? In addition to the recommended comprehensive screens, there are validation products available. These advanced photo technologies can verify that an ID used as part of the screening process is a legitimate government-issued ID.

Here are six simple but important recommendations to consider when incorporating identity validation tools into your current screening program:

1. Employ the right technologies

More and more, volunteers are using mobile technology to order their background checks. Giving them the ability to validate their IDs using their mobile devices or their tablet makes it simpler and faster.

2. Ensure security is safe and compliant

Information security and compliance are vital. Use a secure, third party technology for the identity validation component of your screening program. The storage of photo ID images and other Personally Identifiable Information (PII) should be avoided – unless encrypted in a highly secure environment.

3. Check the PII on the ID

Ideally, PII should be automatically extracted from the volunteer’s ID and used as the basis for the background check. There are instances where volunteers may be given the ability to modify the extracted PII before the start of the background check. Such cases would include a move, marriage, divorce, or if data was incorrectly pulled from the ID. When this occurs, manual verification of changed data should follow.

4. When the ID cannot be validated, present in person

When IDs can’t be validated, it could mean the photo wasn’t clear enough to be validated or it could mean the ID was a fake. Protect your organization and volunteers in that circumstance and have the volunteer present their ID for validation in-person. Taking into consideration their ID and other relevant factors, you can make the call whether to continue the onboarding process.

5. When your volunteer doesn’t have the technology, meet face to face

In cases where your volunteer doesn’t have a government-issued ID or access to a mobile device, have the volunteer submit their background check order using information they manually input. Once you have a completed background check in-hand, have the volunteer come into your organization in-person. Check their ID on-site. Again, taking into consideration their ID and background check results, it is up to your organization to determine if you’d like to proceed with that volunteer.

6. Employ one partner – start to finish

To ensure a more seamless experience, and to leave less room for error, identity validation tools and technologies should ideally be managed by the same screening partner who runs your background check packages. Find a screening partner that can help you validate and screen your volunteers from beginning to end. If you do – and you follow the recommendations above – you’ll run a safer and more secure volunteer program and reduce your risk and liability in the event something should go wrong.
Katie Zwetzig is executive director of Verified Volunteers, the first organization with a background check platform tailored to the specific needs of the service sector. Verified Volunteers helps organizations better fulfill their missions by reducing the time and costs associated with volunteer screening. Katie feels strongly that nonprofits and volunteerism are at the heart of a strong community. She is a dedicated volunteer, sitting on many boards and committees in Northern Colorado.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Access Control, K12

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • AtlasIED North Syracuse Central School Dist 2 North Syracuse Central School District Streamlines Communications with…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • NSA Programming Languages The Cyberattacks and Insider Threats During The Development…

Free downloadable guide you may like:

  • 10 Reasons Why School Administrators Should Consider These Tech Tools for Emergency Preparedness

    Working in an educational facility is more complicated than ever before. There are so many more situations to be aware of, so much more to have to communicate to others. Communication is paramount for the safety of students and staff and to keep daily operations flowing smoothly. Where once a PA system was all that […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.