What’s the Price of Outsourcing?

April 1, 2008
/ Print / Reprints /
ShareMore
/ Text Size+
Contract security officers are the most popular outsourcing service. What is happening lately is the effectiveness of employment screening.


Contract security officers, burglar alarm monitoring, investigative services, due diligence all are outsourced security services. There are emerging services such as third party access control and security monitoring services.

All are increasing in interest to chief security officers. But there still are concerns about the effectiveness of such efforts.

A Cato Institute study reports that electronic employment verification is ineffective, intrusive  and expensive.

E-Verify, the program promoted by the Bush administration to reduce illegal immigration, would be ineffective, invasive and costly, finds a study by the Cato Institute.

THERE ARE TECH PROBLEMS

“A full-fledged Electronic Employment Verification (EEV) system has many practical and technical problems -- to say nothing of the question of whether it is appropriate for a free country -- and would still fail to prevent illegal immigration,” says Jim Harper, Cato’s director of Information Policy Studies and author of “Electronic Employment Verification: Franz Kafka’s Solution to Illegal Immigration.”

To be done effectively, EEV would require an expensive national ID system which would greatly impinge upon the privacy of American citizens. “The things necessary to make a system like this really impervious to forgery and fraud would convert it from an identity system into a cradle-to-grave biometric tracking system,” writes the author. This would increase the value of committing identity fraud, and the amount and type of information stored in the databases would expose Americans to grave security risks.

EEV would make applying for jobs a hassle for all American citizens and it would effectively deny some law-abiding individuals the ability to work. A study by the SSA Inspector General revealed an error rate of 4.1 percent in the data used to administer the Basic Pilot program, now renamed E-Verify. At that rate, 1 in every 25 new legitimate hires would receive a “tentative nonconfirmation,” requiring the individual to go through a burdensome process to seek permission to work from the Social Security Administration and Department of Homeland Security.

The cost of such a program, including the preliminary national ID system, is estimated to be $17 billion, $11 billion of which would fall directly on state governments. The remaining $6 billion would be shouldered by American citizens as they struggle to prove their right to work in this country.

“’Mission creep’ all but guarantees that the federal government would use an EEV system to extend federal regulatory control over Americans’ lives even further,” writes Harper. In the immigration area alone, proposals have been made to regulate housing in the same way as employment. Healthcare and gun control, among others, are two areas that are especially vulnerable to such mission creep.

As the history of immigration law has proven, “immigrants and employers dedicate their ingenuity to getting what they want and need,” contended Harper. As a result, internal enforcement of immigration law has been a failure for the past 20 years. There is no reason to believe EEV would be any different. Further, the author concludes: “with nationwide electronic employment verification, the United States would move to a regime where the last word on employment decisions would not be with the worker and employer but with bureaucrats in the federal government.”

SIDEBAR: Background Screening

Research shows that more than 85 percent of large companies and institutions and a rapidly growing number of small and mid-sized companies now perform some kind of background screening. The focus of this movement is principally the assurance of a safe, secure workplace for all employees. The statistics showing the popularity of background screening, however, mask what has been, for most companies, a jumble of disparate, time-consuming programs and practices implemented in different offices and departments in different ways with virtually endless possibilities for human error. Often, connection between the hiring professionals and the security department is not tight, and loose controls provide little assurance that the company’s security policies and procedures are enforced in the hiring process. The result is increased exposure, hiring mistakes and additional costs related to manual, error-prone processes.

Fighting that perception, HireRight Enterprise is an on-demand screening management solution used by hiring professionals in companies and institutions to easily and efficiently oversee a legally compliant background and drug screening program that typically includes the screening of applicants and employees company-wide. The industry’s first Web 2.0 application, HireRight Enterprise brings together all screening activities, tasks and tools into a single application – all viewable from a summary dashboard – replacing the need to use manual processes, paper or multiple disparate programs to successfully operate a screening program.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bill Zalud

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+