SECURITY SCREENINGLast Nameexpected either one morning or afternoon (Lennerz, 2020). It is illegal to use any specialintelligence methods like tapping the communication devices during a security screening.Criteria- positions involving confidentiality vary from one another. Thus, each screeningis custom made’. Any future /present job and personal vulnerabilities security risk is assessed bythe AIVD. The suitability of any position is not subject to the issuing of a statement of noobjection. Any of these indicators in the security screening could constitute into a nationalsecurity risk. The assessments are based on identifiable and based on fact manner.The procedure- selection procedures have to be completed in case one wants to apply forany position involving confidentiality. These are made to the employer or future employer andone is required to apply for AIVD security screening. There are more procedures which arecarried out and they are as follows: one is informed on how to complete the application andabout the security screening by the present or the future employer.In some cases, it is possible to use eOPG which can ask one to provide the personalinformation about one self, family and friends. One must answer all the questions in full.Onemay not be able to print it out incase he/she does not answer the form well. One can use a paperform in case there is absence of internet and this likely to be provided by the present or futureemployer.The completed forms and enclosed enclosures that is the passport and identification copyare placed in a sealed envelope and handed over to the present or future employer so theemployer has no access to it.The security screening is carried out by the AIVD. Eight weeksafter the form has been received, the AIVD informs the involved of the outcome.One isinformed accordingly incase the screening is likely to take longer than eight weeks. A statement