Implementing a Background Checking Program