Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Checking for Immigration Status

March 1, 2008
Even huddled masses need to be vetted when considering employment.


Recently a major food processor in the Northwest was the subject of a raid by the Immigration and Customs Enforcement (ICE) Agency and 600 employees were checked for their immigration status and legal right to work in the U.S. Only 48 of those employees turned out to have a legal and valid Social Security number and were eligible to work in the U.S.

Another raid on a mid-size company in the Northeast with 650 employees and government contracts worth millions of dollars resulted in the arrest and deportation of over 300 illegal workers and the arrest of the company president and two executives on criminal charges. These and many other recent examples are proof positive that the government is getting serious about the right to work in the U.S. and is handing out stiff penalties and fines for organizations found to have hired illegal immigrants.

The federal government is taking very seriously the potential national security risks posed by illegal immigration, and in an effort to decrease it, is conducting more expansive raids on employers and enforcing immigration and employment eligibility laws more stringently, according to Darlene Baker, senior product manager, I-9 Solution and DHS E-Verify, HireRight. In addition, the U.S. Citizenship and Immigration Services (USCIS), in partnership with the Department of Homeland Security (DHS) and the Social Security Administration (SSA) has created E-Verify, an online national database of individuals who can legally work in the U.S., as a tool that employers can use to verify the employment eligibility status of employees. In addition, the federal government is working with motor vehicle departments across the country to obtain photos to add to the E-Verify database to create another layer of security and identity verification into the system for the future.

Verifying employment eligibility status has traditionally been handled by the human resources department and simply involved having the employee fill out a federal I-9 form and provide supporting documentation to establish identity and employment eligibility. In today’s world of heightened security concerns, however, that process is no longer sufficient and companies must be more vigilant to protect their personnel, facilities, systems and assets. Security executives at enterprises must be involved in this process to ensure that organizations are only allowing authorized individuals on site. After all, if you don’t know if the worker you are allowing on site is legal, how well could you know them or their past?

DRIVING SECURITY CONCERNS

There are great risks in not confirming an individual’s legal right to work. There have been cases of known and suspected terrorists entering the country illegally and chief security officers must understand and guard against the possibility that a person with malicious intent could obtain access to critical infrastructures or assets, such as power plants or chemical or water treatment systems through employment. Recently, it was discovered that illegal workers had access or attempted to gain access to a shipyard where U.S. Navy vessels were being built.

Industrial espionage is also a risk in the fact that an illegal employee with an unknown background could gain access to sensitive information and technologies. The bottom line is when an individual uses fraudulent documents to get a job, they hide their true identity and history, which means that the employer knows less about the worker, which increases risk. Validating a person’s name, Social Security number and employment eligibility through E-Verify is just one more step to ensure the identity of employees and confirm a person’s background.

HISTORICAL AND LEGAL REQUIREMENTS

Recently there’s been a flurry of high-profile legislation directed at ensuring the legal status of employees. The DHS E-Verify database is a key element of a variety of immigration reform plans that have been hotly debated at both the federal and state levels over the past few years. In August 2007, an Executive Order from the President mandated use of the E-Verify system for all companies with federal government contracts, and an estimated 200,000 government contractors are affected.

In addition, all 50 states have considered some form of immigration legislation and many include sections on employment eligibility. Five states, Georgia, Colorado, North Carolina, Arizona and Oklahoma, have already passed legislation that specifically includes mandates to verify employment eligibility through E-Verify and several more states are currently considering such legislation.

Security executives at enterprises must be involved in checking out potential employees to authorize these individuals on site. Services can provide support.

CHALLENGES AND BEST PRACTICES FOR I-9 PROGRAM MANAGEMENT

Traditionally, the I-9 program has been a paper-intensive, manual process and adding the DHS E-Verify requirement to the mix further complicates the procedure. As a paper-based process, I-9 management is inefficient, lacks good tracking, follow up and reporting systems and offers a high potential for human error and even duplicity or fraud.  A good alternative to a paper-based I-9 process is to adopt an electronic I-9 solution, which will help to reduce data entry errors and ensure the form is completed properly.

It’s also important to establish a compliant I-9 management program that addresses the security requirements for the employer and meets state and federal legislation. Use of the DHS E-Verify system for all new hires should be a part of any compliant I-9 program, advised HireRight's Baker.

There are several steps to be considered. First, it’s important to walk new hires through the completion of an I-9 form and ensure the employee presents the proper documentation to establish identity and employment eligibility. Second, employment eligibility then must be confirmed through DHS E-Verify and reports of the results must be maintained along with the employee’s I-9 form. The organization must also ensure it has processes in place to end employment legally if the employee is ineligible.

Once eligibility has been confirmed, it’s important to set up alerts to manage work authorization expirations so employers can follow up on those procedures, obtain new documents as needed and keep the employment records updated. An electronic I-9 form, complete with an automated and instant E-Verify check, should be part of every employer’s I-9 management program. An additional consideration is that the I-9 program be integrated with the organization’s employment screening program to leverage existing data and systems and to streamline processes.

One key area of vulnerability that can trip up many organizations is in terms of the extended workforce. There should be a security procedure in place to confirm that employees of partners and vendors who have access to an organization’s facilities, staff and systems are also vetted through E-Verify.

Amid today’s critical security concerns, organizations must implement a comprehensive I-9 management program to avoid hiring those with fraudulent documentation who are ineligible to work legally in the U.S. The security department must take a lead in this process to help ensure the organization’s safety, security and compliance with the law.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Secure Flight Hits 100 Percent Mark for Checking Against Databases

    See More
  • coronavirus

    Albertsons, UFCW Want First Responder Status for Grocery Workers

    See More
  • Old Newswire Feature Image

    DHS Adds Public Advocate for Immigration Services

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!