Premium Essay

Felony Check Box Research Paper

Submitted By
Words 633
Pages 3
Should the Felony Checkbox be Ban?

For several years, many employers have acquired a practice of asking if any persons have been convicted of a felony. The employer has theorized this method as a qualifying way to filter unqualified candidates, yet it has become an impasse system for ex-felons. The felony "check-off box" informs employers of the past criminal history of the applicate in addition to asking if they are a convicted, please state the reasoning as to why. In an interview with The New York Times, Jeffrey Ian Ross, a criminology professor at the University of Baltimore stated, "In most cases, once they turn up a convict, that's the end of the road for applications." To ask their criminal past is an unfair practice that is unduly and affects many ex-felons who are seeking prominent careers, and moving towards a rehabilitated future, yet re which maximizes their chances of falling back into crime. …show more content…
criminal justice system. Throughout his teachings, he was approached by a man recently released from prison and seeking employment. The man filled out more than 200 applications, all of which possessed the "checkbox. Aware of the risk of having a background check conducted he would checked yes every time. He received zero responses to his applications. "That single checkbox keeps millions of Americans from gainful employment, "Warr said. When felons are continually turned down because of their past, they generally have only one direction to go –back to crime. Recidivism, or relapse into previous criminal behavior, is an immense problem in the United States. According to the National Institute of Justice, 76.6 percent of prisoners were rearrested within five years of their release. Recidivism requires meaningful job opportunities to be combated, not joblessness and professional

Similar Documents

Free Essay

Ban the Box: Employment Discrimination and the Ex - Offender

...EFFECTS OF CRIMINAL BACKGROUND CHECKS TABLE OF CONTENTS I. INTRODUCTION………………………………………………………………………… 3 II. OFFENDER AND EX OFFENDER HISTORY IN THE UNITED STATES………….. 5 A. LEGAL HISTORY OF EMPLOYMENT DISCRIMINATION AGAINST EX OFFENDERS ……… 5 B. THE NUMBER OF EX OFFENDERS IS RAPIDLY INCREASING .............................................................................8 C. IMPACT OF CONVICTION ON EMPLOYABILITY OF EX OFFENDERS ................................................................. 10 III. CRIMINAL BACKGROUND CHECKS AID IN THE DISPROPORTIONATE EXCLUSION OF
 MINORITIES ………………………………………………………………………………… 13 A. EMPLOYERS ARE PREJUDICED UPON FINDING CRIMINAL CONVICTIONS .................................................. 13 B. BLACKS AND LATINOS ARE EXCLUDED FROM THE WORK FORCE DUE TO STIGMAS OF MINORITY STATUS AND CRIMINAL RECORD ....................................................................................................................... 15 IV. HEIGHTENED SCRUTINY TURNS ON EMPLOYER HIRING PRACTICES INFLUENCED BY CRIMINAL BACKGROUND CHECKS………………………………………………………………………………………… 18 A. THE EQUAL EMPLOYMENT OPPORTUNITY COMMISSION ATTEMPTS TO PROVIDE MUCH NEEDED GUIDANCE ON CONDUCTING CRIMINAL BACKGROUND CHECKS AND SUBSEQUENT HIRING PRACTICES ..................................................................................................................... 18 B. NOTABLE LEGAL ACTION STEMMING FROM BACKGROUND CHECKS OR UNFAIR EMPLOYMENT HIRING PRACTICES……………………………………………………………………………………...

Words: 14524 - Pages: 59

Premium Essay

Criminal Record Management

...Criminal Records in the Digital Age: A Review of Current Practices and Recommendations for Reform in Texas Helen Gaebler, Senior Research Attorney William Wayne Justice Center for Public Interest Law The University of Texas School of law March 2013 TABLE OF CONTENTS I. INTRODUCTION .............................................................................................................................4 II. THE PROBLEM: CRIMINAL RECORDS AND COLLATERAL CONSEQUENCES .........................................5 Collateral Consequences Overview ......................................................................................................... 5 Who’s Affected? A Look at the Numbers in Texas .................................................................................. 8 Disproportionality and the Criminal Justice System .............................................................................. 10 Reaching Across Generations and Communities ................................................................................... 11 III. AN OUTDATED SYSTEM: OPEN ACCESS TO CRIMINAL RECORDS .................................................... 12 The Background Checking Industry........................................................................................................ 12 Common Practices and Pitfalls............................................................................................................... 13 Past Calls for Reform .....................

Words: 25987 - Pages: 104

Premium Essay

Identity Theft and Fraud

...their mail until that person came back, to prevent identity theft and frauds. People should invest in a shredder to shred unwanted information. Use a secure website to access information, never enclose personal information by the phone. Check bank statement and credit card statement very careful each month to see any unwanted purchase. If that person sees any unwanted purchase notices their credit card immediately. Thesis: One day you receive a call from your bank, stating you had just made a purchase for a random estimate of 5,000 dollars. But you did not go on a shopping spree. Your identity just has stolen. How secure is your identity? Do you ever wonder about your identity? Ways to prevent/protect yourself from identity theft and frauds. I. One thing you should be aware about is your bank account. A. Once your ATM has been compromises change your pin right away. B. Get new ATM cards if it has been compromised. C. Contact the bank if you see any suspense in your bank account. I. Another way is keeping your social security secure in a safe. A. Do not write your Social Security card piece of paper. B. Do not give out your personal information to strangers. II. Monitoring your Credit Card Statements A. Check your credit card statements regularly. B. Contact the authorities about any suspension regard to your credit card transaction. III. Another way from protecting yourselves from identity is limiting to...

Words: 2515 - Pages: 11

Free Essay

Corporate Governance in Malaysia: the Effect of Corporate Reforms and State Business Relation in Malaysia

...23–34, January 2007 CORPORATE GOVERNANCE IN MALAYSIA: THE EFFECT OF CORPORATE REFORMS AND STATE BUSINESS RELATION IN MALAYSIA Nor Azizah Zainal Abidin 1 and Halimah @ Nasibah Ahmad2 1 Faculty of Public Management and Law, 2 Faculty of Accountancy Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia ABSTRACT The Asian Financial Crisis in 1997 not only introduced the term of corporate governance but also drew attention of the public about the weaknesses of Malaysian corporate governance practice. After 1998, Malaysian government decided to adopt corporate reform that could enhance the quality of good corporate management practice. This reform is clearly stated in the code and rules of corporate governance. The purpose of this research is to study the significance of implementing the code and rules of corporate governance since the public already realize the close relationship between business and politics. Three companies were chosen as indicators for this study. As a result, it was found that companies which are involved in corporate malpractice but have good relationship with states will always be excluded from the legal corporate action. Keywords: corporate governance, corporate reforms, political economy, state business relation INTRODUCTION Asian Financial Crisis in 1997 not only introduced the term of corporate governance but also drew attention of the public about the weaknesses of Malaysian corporate governance practice. After 1998, Malaysian government decided...

Words: 4860 - Pages: 20

Premium Essay

Fraud Triangle

...minimum-wage job at the nursery. I had no furniture or a bed. I was barely making it. I was feeling very distraught over the loss of my grandmother and problems my parents and brother were having. I felt all alone. The first part of August arrived and my rent was due. I did not have the full amount to pay it. This same week, I opened a checking account at Bank B. I intended to close my Bank A account because of a lack of ATMs, branches, and misunderstanding. As I said, my rent was due and I did not know how to meet it. On an impulse, I wrote the apartment manager a check for the amount due. I did not have the funds to cover it. I thought I could borrow it, but I could not. During the time I was trying to come up with the money, I wrote a check from my Bank B account to cover the rent check and put it into Bank A. I did not know it was illegal. I knew it was unethical, but I thought since the checks were made out to me that it wasn’t illegal. This went on for about a week—back and forth...

Words: 15238 - Pages: 61

Free Essay

Cyber Crime

...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...

Words: 23991 - Pages: 96

Premium Essay

The Case of Mike and Marty Scanlon

... Essentials of Psychology By Robert G. Turner Jr., Ph.D. About the Author Robert G. Turner Jr., Ph.D. has more than 20 years of teaching and education-related experience. He has taught seventh-grade science, worked as a curriculum developer for the Upward Bound Program, and taught sociology, social psychology, anthropology, and honors seminars at the university level. As a professional writer, he has written nonfiction books, journal and magazine articles, novels, and stage plays. Contents Contents INSTRUCTIONS TO STUDENTS LESSON ASSIGNMENTS LESSON 1: PSYCHOLOGY: THE SCIENCE OF THE MIND LESSON 2: THE MIND AT WORK LESSON 3: MOTIVATION, EMOTION, DEVELOPMENT, AND PERSONALITY RESEARCH PROJECT LESSON 4: PSYCHOLOGICAL DISORDERS LESSON 5: PSYCHOLOGY FOR TWO OR MORE CASE STUDIES SELF-CHECK ANSWERS 1 7 9 43 75 117 127 147 167 171 iii YOUR COURSE Instructions Instructions Welcome to your course, Essentials of Psychology. You’re entering a course of study designed to help you better understand yourself and others. For that reason, you can think of this course as practical. It should be of use to you in living your life and reaching the goals you set for yourself. You’ll use two main resources for your course work: this study guide and your textbook, Psychology and Your Life, by Robert S. Feldman. OBJECTIVES When you complete this course, you’ll be able to ■ Describe the science and methodologies of psychology in the context of its historical origins...

Words: 49230 - Pages: 197

Premium Essay

Michigan Dl

...State of Michigan What Every Driver Must Know Ruth Johnson, Secretary of State July 2012 WEDMK November 2012.indd 1 11/1/2012 9:02:59 AM Dear Michigan Motorist: There are nearly 7 million licensed drivers and 10 million registered vehicles in Michigan, which means our highways and roads are busy places. Ensuring motorists have the skills and knowledge to drive safely and responsibly is one of the best ways to remain safe on the road. I am pleased to offer this latest edition of What Every Driver Must Know. In it, you will find information about driver’s licenses, teens and driving, common traffic rules, signs and signals, what to do in emergencies, and much more. Whether you are a novice driver or have years of experience behind the wheel, this booklet can be a helpful guide. Driving requires your full attention. Distractions such cell phones, texting, tuning the radio, and eating should be avoided when you are behind the wheel. Please make sure that you and your passengers remain safe. Obey all traffic laws, make sure everyone is buckled up or in an appropriate child safety seat, and never drink and drive. Michigan is a great state with many different opportunities for travel, recreation, and fun. Please drive safely. Sincerely, Ruth Johnson Secretary of State WEDMK November 2012.indd 2 11/1/2012 9:03:00 AM Table of Contents Introduction 6 1. Michigan Driver’s License Information 7 Michigan Residents New Michigan...

Words: 42107 - Pages: 169

Premium Essay

Social Justice Versus Criminal Justice

...Running head: SOCIAL JUSTICE This is a sample paper for Dr. Matthew Robinson’s class … CJ 5150, “American Justice System and Social Justice” at Appalachian State University The paper is not be used for any purpose other than illustration for students in the class!!! Social Justice versus Criminal Justice Appalachian State University Social Justice versus Criminal Justice In this paper I will discuss how different aspects, policies, and procedures of the United States criminal justice system are inconsistent with the principles of social justice posited by John Rawls and David Miller. The criminal justice system does not promote socially just outcomes or practices. First of all, the criminal justice system is not really a system at all; it is a network. Second, criminal justice places greater emphasis on crime control, rather than due process rights. Our system encourages punishment rather than rehabilitation. Finally, criminal justice policies such as the death penalty and the war on drugs reflect prejudices within the system, resulting in unequal treatment. Before beginning to explain these flaws within criminal justice, I will first define social justice and explain the essential social justice principles suggested in Rawls and Miller’s theories. Social Justice Justice is based on two supposedly equal conceptions. First, guilty offenders are held accountable for their actions and second, that criminal justice...

Words: 5791 - Pages: 24

Free Essay

Intro to Computers

...Internet 2 Lesson 1 What Is a Computer? n Personal Computer Hardware n Peripherals n Bits and Bytes n Computer Speed and MHz and GHz n Computer Types Lesson 2 Software n Obtaining Application Software Lesson 3 The Internet n Finding Information on the Web n Evaluating Information on the Web Lesson 4 Understanding E-mail n Sending and Receiving E-mail and Other Forms of Digital Communication n Dangerous E-mail Lesson 5 Types of Computer Crimes n Copyright Laws n Acceptable Use Policies Lesson 6 Computer Workers 3 Introduction to Computers and the Internet 4 WORDS TO KNOW BIOS The basic input-output system is the component that checks your computer’s components and causes the operating system to start. CMOS Complementary Metal Oxide Semiconductor is a chip whose configuration is controlled by a setup program. CPU The Central Processing Unit is a chip, located on the motherboard, which performs mathematical calculations and logic functions. Hardware Refers to all the pieces of physical equipment that make up a computer system. Input Data entered into a computer. Lesson 1 What Is a Computer? n n n n n Computers are a vital part of today’s world. They make controlling and using devices faster, easier, and more accurate. They are in everything from automobiles to washing machines. A computer is a machine that receives input...

Words: 9593 - Pages: 39

Premium Essay

Drivers Manual Massachusetts

...A Message to Massachusetts Motorists from Erin C. Deveney, Registrar of Motor Vehicles Dear Motorist, The MassDOT Registry of Motor Vehicles recognizes that the work we perform impacts you and nearly every person in the Commonwealth of Massachusetts. We give our customers the joy of getting their first license. We register vehicles that take people all over the state for work, school, to access medical care and for exciting and important events in their lives. We also have the very serious responsibility of making sure all drivers, as well as the vehicles on our roadways, are safe and fit to operate. The RMV is committed to providing you with efficient, reliable and professional customer service. The Driver’s Manual prepares you for your driving career and also for doing business with the Registry. It includes requirements for transactions we provide, as well as service options and branch location information. To serve you better, we offer 27 transactions and services via our website, www.massrmv.com. Online services bring the RMV to you. Today, you are also able to schedule a return phone call via 857-DOT-8000 for a time that works for you. We have expanded the number of AAA locations offering Registry renewal services through an innovative public-private partnership. We are introducing self-service FasTrack kiosks for license and identification card renewals and duplicates so you spend less time in line. As we improve our service delivery, www.massrmv.com will...

Words: 67296 - Pages: 270

Free Essay

Any Given Sunday - a Sociological Analysis

...Abstract This paper explores the movie “Any Given Sunday” and attempts to discuss the movie in detail by focusing on character examples of the personal functions of sport such as feelings of belongingness and social identification, the socially acceptable outlet for hostile and aggressive feelings, and the role sport plays as a cultural element to bring meaning to life. Additional attention will be given to aspects of extra-sport character behavior and a determination of whether or not such behaviors support sport stereotypes and/or deviant characteristics. Through internet research, library study, and the use of periodical articles found in the ProQuest databases, I intend to apply the functionalist model of society to show that the fictional football team “The Miami Sharks” highlighted in the movie supports stability and equilibrium in the community of Miami based on common interests and convictions. The world of professional sports, especially professional football, is a world that most will only see on the television or through movies. “Any Given Sunday,” by Oliver Stone, is one such movie. It highlights a portion of a season for the fictional team The Miami Sharks with the interpersonal struggles on and off the field experienced by the characters related to the team. This paper explores the movie “Any Given Sunday” and attempts to discuss the movie in detail by focusing on the socially acceptable outlet for hostile and aggressive feelings, masculinity and gender...

Words: 5135 - Pages: 21

Free Essay

Alcohol Driving Course

...2.3 Effects of Different Types of Drugs Review There are several types of drugs. Never drive a motor vehicle after taking a substance which alters the central nervous system. This includes over-the-counter, prescription, and of course, illegal drugs. The following categories of drugs have known side effects that include impaired attention, reaction time, and vision: * Antihistamines * Pain Relievers * Tranquilizers * Hallucinogens * Stimulants * Narcotics It is very dangerous to combine alcohol and other drugs. Synergism occurs when the effect of one drug is enhanced by the presence of another drug. A multiplying rather than additive effect may occur. It takes more ounces of beer than whiskey to become impaired, but people tend to drink more beer (total ounces) than whiskey. Regarding the servings of assorted alcohol beverages, they all have differing amounts of alcohol. Beer actually has more alcohol than whiskey and coolers are even stronger. There are also an infinite number of ways to mix alcoholic beverages so a drink by drink comparison can only be made when size and alcohol content of the drinks involved are known. Alcohol is a toxic substance. The use of alcohol has no benefit to the body or society. Abuse or excessive consumption of alcohol or other drugs affects the physiology of the body in many ways. If a body becomes accustomed to the presence of alcohol continuously, a physical dependence develops and changes in...

Words: 39078 - Pages: 157

Premium Essay

Once Upon a Time

...Commonwealth of Massachusetts Driver’s Manual Revised 05/2013 $5.00 Commonwealth of Massachusetts DRIVER’S MANUAL Revised 05/2013 A Message to Massachusetts Motorists from Rachel Kaprielian, Registrar of Motor Vehicles Dear Motorist, This Driver’s Manual provides important information about the many services offered by the Registry of Motor Vehicles at our branch locations and through our website at www.massrmv.com. Whether you have questions about the documents you need to apply for a driver’s license, how to renew a registration, or when you need to have your vehicle inspected, the answers are all in here. I encourage you to read it thoroughly and keep it handy as a future resource. The RMV Driver’s Manual can help you prepare for a visit to one of our branches, our website, or a phone call to our customer service center. We know from experience that informed customers help us provide quicker, more efficient service and reduce the possibility of a return visit. I encourage you to utilize our virtual branch before you stand in line, as most routine RMV services can be completed through the Internet. The RMV has also included all the rules of the road that apply to motoring on the roads of the Commonwealth in an effort to help reduce crashes and injuries. In today’s world, although some people choose to travel using healthy transportation modes of walking, bicycling, or mass transit, many residents need to rely on motor vehicles. Yet owning a vehicle and holding...

Words: 65404 - Pages: 262

Free Essay

Core Concepts of Ais

...Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and...

Words: 241803 - Pages: 968