Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Illegal Trap When Hiring

By Bill Zalud
March 1, 2009

Give us your tired and poor and E-Verify that I-9.



The big and little firms are getting hit hard.
 
The nation’s largest pallet manufacturing company, IFCO Systems North America, just agreed to a nearly $21 million settlement to avoid criminal prosecution for hiring illegal workers.
     
A former Agriprocessors’ human resource staffer recently pleaded guilty in U.S. District Court to a charge of aiding and abetting a pattern or practice of knowingly hiring undocumented immigrants. She faces up to six months in prison. The enterprise is the largest kosher meat-packing operation in the U.S.
     
David Wortman of Cloudburst Lawn and Sprinkler Systems in Grand Island, Neb., got 30 months in prison on federal charges of hiring illegal immigrant workers.


Most firms who use outside services do pre-employment screening for criminal, credit and education data. But there’s also the need to screen out illegal immigrants, according to Gregory Kirsch.

BRAND NAME ASSAULT

Then there is the Web site, wehirealiens.com, which alleges that certain companies from Pilgrim’s Pride to Swift & Co. are employers of illegal immigrants. The Web site, a media darling, has the ability to blacken many a brand name, whether the allegations are true or false.
     
Security executives, often working with their human resource colleagues, must now be more diligent concerning employment eligibility verification. The I-9 process has gotten tougher but, at the same time, there are new tools and authorized service providers to make the screening quicker and less hazardous.
     
Recently the U.S. Department of Homeland Security (DHS) amended its regulations governing the types of acceptable identity and employment authorization documents and receipts that employees may present to their employers for completion of the Form I-9, Employment Eligibility Verification. Under this interim rule, employers will no longer be able to accept expired documents to verify employment authorization.
     
On the Form I-9, a newly-hired employee must attest to being a U.S. citizen or national, a lawful permanent resident or an alien authorized to work in the United States. The employee then must present to his or her employer a document or combination of documents designated by statute and regulation as acceptable for establishing identity and employment authorization. The employer must examine the documents, record the document information on Form I-9 and attest that the documents reasonably appear both to be genuine and to relate to the individual presenting the documents.
     
An employer who discovers that an employee has been working without authorization should reverify work authorization by allowing the employee another opportunity to present acceptable documentation and complete a new Form I-9. However, security and HR experts advise enterprises that, if they know or should have known that an employee is unauthorized to work in the United States, they may be subject to serious penalties for “knowingly continuing to employ” an unauthorized worker.


DATABASES ARE HELPFUL

There are numerous tools to provide security help.
     
One of the most used is E-Verify, formerly known as the Basic Pilot/Employment Eligibility Verification Program. It is an Internet-based system operated by DHS in partnership with the Social Security Administration and allows participating employers to electronically verify the employment eligibility of their newly hired employees.
     
E-Verify is free and voluntary and continues to get more sophisticated. For example, a photo screening tool feature allows an employer to check the photo on his or her new hire’s Employment Authorization Document (EAD) or Permanent Resident Card (“Green Card”) against the 14.8 million images stored in DHS immigration databases.
     
The states are turning their own screws.
     
For instance, with recently enacted legislation, South Carolina gradually will begin pushing all employers to use the U.S. Department of Homeland Security’s E-Verify program.
     
Employers put pertinent employee information into the system, including name, Social Security number and birth date. The system scans millions of records from the Social Security Administration and the Department of Homeland Security and tells the employer if the new hire is authorized to work or if their paperwork and documents need further review.


CONSIDER DESIGNATED AGENTS

For security leaders and human resource directors seeking outside help with E-Verify, there are designated agents such as U.S. Security Care, Inc., of Blue Bell, Pa., an investigative and protective services firm. According to Gregory Kirsch, background investigations manager, “The E-Verify employment screening process is mandatory for all employers in Arizona and Mississippi and for specific industries in Georgia, Minnesota, Oklahoma, Utah and Rhode Island.” In addition, he noted, “there are a significant number of companies who are voluntarily using the system.”
     
Kirsch said that once the information is submitted for verification, it is either positively confirmed or indicates a Tentative Non-Confirmation through one or both of the federal data banks. “At that point, the employee is given a period of eight working days to challenge the Tentative Non-Confirmation with the appropriate agency,” he noted. “If it moves beyond that time frame without the employee taking appropriate action, the employer has the right to withdraw the offer for employment.”
     
Overall, there seems to be less known instances of hiring illegals. There is a debate, however, about why. Some say the enforcement of existing and enacting of new laws has made an impact. Others say it is more the disappointing U.S. economy.
     
According to activist Jim Gilchrist, a recent study by the Pew Hispanic Center, a research organization, reported that Latino immigrants -- legal and illegal -- have been hit hard by the nation’s struggling economy, and some are returning home.
     
Gordon Hanson, an economist at the University of California San Diego, and who specializes in immigration issues, said the jury is still out as to whether immigrants are leaving the U.S. because of the economy. There are other signs: Fewer immigrants are getting caught crossing the border illegally, according to the U.S. Border Patrol, and immigrants are sending less money home. Border Patrol statistics show that 723,825 people were caught in the fiscal year that ended Sept. 30, down about 18 percent from the previous year. Mexico’s central bank reported that remittances by Mexicans living in the U.S. dropped 12 percent in August, down to $1.9 billion, from $2.2 billion in August 2007.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hire a ransomware negotiator for your enteprise

    Consider these credentials when hiring a ransomware negotiator

    See More
  • Hiring practices must perform due diligency

    Court rules truck companies have duty to perform due diligence when hiring

    See More
  • active shooter policy

    The Better Mouse Trap: Continuous Learning Through Incident Analysis

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!