To set industry benchmarks in accuracy, turn-around time and transparency of reporting without compromising on integrity and company social responsibility.
To build strategic partnership with our clients to establish safe hiring practices. To liaison with institutions and employers to ensure smooth turn-around of verification. To build internal subject matter expertise for challenging verification scenarios. To invest time and effort in technology that enables the life-cycle of background verification. To protect the privacy and confidentiality of information belonging to our clients and their employees.
A good leader no longer trusts in power, but places faith in the power of trust. A leader is the trustee in any relationship and in order to be effective, must be trustworthy
Humility keeps a leader grounded and connected with the Employees. Being honest, having integrity and listening to employees will only help gain their respect.
A good leader weighs a decision carefully, but once they make up their mind, they are not easily put off course. This shows commitment and breeds consistency.
DEFAULT TO TRANSPARENCY
Transparency for us is a lifestyle of authenticity and honesty. We strive to make our communication direct and avoid short cuts and assumptions.
We are ready to go the extra mile, striving to put your best interests first, so that we can become a trusted partner.
We responsibly embrace change on behalf of our clients and employees.
Self-reflection is where true training and life-altering adjustments originate leading to growth.
We honour our words and take ownership of our actions because both compliance and our relationship with our client is important to us.
2. The GSS online system is utilized as a means for GSS to receive orders from authorized employers and to transmit information to and from authorized users However, all such usage is strictly between GSS and business entities whose legitimate need for the information and permissible purpose has been verified.
3. All data on the GSS system is protected by Secure access, ensuring “for-your-eyes-only” data exchange; viewing of information is restricted to the users and customers that should have it with state of the art security, encryption and password protection. The Privacy and Integrity of all information is fully protected.