Ordering and Receiving Your Report


Enter Name, Email and Address

Start by entering these three pieces of information. This allows us to retrieve preliminary information and send you a secure link to continue the process.

This step enhances the security of your order. Sending a unique link to your email account greatly reduces the chance of someone entering information on your behalf. We also ask you to enter your address at this time, as it allows us to pull up preliminary information about you so that you can answer security questions before submitting further information and your request for a report.

Retrieve Code

Next, you’ll need to answer a series of brief questions to verify your identity. These may ask about previous street addresses, banks or student loans.

If you’ve ever requested your credit score through a credit bureau such as Equifax or Transunion, these questions are similar, as they’re based on information collected by consumer reporting agencies. Typically, the questions are in multiple-choice format, with one answer being correct. All questions are centered around information associated with your identity.

Provide Your Info

Enter your identifying information into our brief submission form. You can pay with a credit card, and our site is encrypted by Verizon Cybertrust Security to ensure total protection of your data.

Your security is our number-one priority. Our advanced servers, designed with mirrored hard drives and failover redundancy technology, are located in a state-of-the-art collocation facility that is always staffed — day and night — to provide an immediate response to any incidents. We utilize a variety of techniques to ensure the highest security possible, including:

  • Secure Sockets Layer (SSL) protocol
  • 128-bit Data Encryption
  • Public-Private Key Pair
  • Multiple Firewalls
  • Intrusion Detection
  • Filtering Routers
  • Tape Database Encryption
  • Nightly Backups
  • Offsite Archive Storage

When it comes to security, we don’t take shortcuts. Passwords are needed to access any portion of our network, and we give clients their own private login information. In addition to a highly monitored password and authentication system, we also employ thorough policies and procedures for physical destruction of sensitive data, including shredding and disk wipes. If you have any questions about the security of your data, feel free to contact us.

Review Report

Within minutes, you'll be able to view your complete background check online. It's important that you review your report thoroughly for any errors. If you find any, let the volunteer organization know and take steps to have the information corrected. (Volunteer Vault can point you in the right direction — just give us a call.)

Once your report is uploaded online, an administrator from your volunteer organization will be able to view it, too.