Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What’s the Price of Outsourcing?

By Bill Zalud
April 1, 2008
Contract security officers are the most popular outsourcing service. What is happening lately is the effectiveness of employment screening.


Contract security officers, burglar alarm monitoring, investigative services, due diligence all are outsourced security services. There are emerging services such as third party access control and security monitoring services.

All are increasing in interest to chief security officers. But there still are concerns about the effectiveness of such efforts.

A Cato Institute study reports that electronic employment verification is ineffective, intrusive  and expensive.

E-Verify, the program promoted by the Bush administration to reduce illegal immigration, would be ineffective, invasive and costly, finds a study by the Cato Institute.

THERE ARE TECH PROBLEMS

“A full-fledged Electronic Employment Verification (EEV) system has many practical and technical problems -- to say nothing of the question of whether it is appropriate for a free country -- and would still fail to prevent illegal immigration,” says Jim Harper, Cato’s director of Information Policy Studies and author of “Electronic Employment Verification: Franz Kafka’s Solution to Illegal Immigration.”

To be done effectively, EEV would require an expensive national ID system which would greatly impinge upon the privacy of American citizens. “The things necessary to make a system like this really impervious to forgery and fraud would convert it from an identity system into a cradle-to-grave biometric tracking system,” writes the author. This would increase the value of committing identity fraud, and the amount and type of information stored in the databases would expose Americans to grave security risks.

EEV would make applying for jobs a hassle for all American citizens and it would effectively deny some law-abiding individuals the ability to work. A study by the SSA Inspector General revealed an error rate of 4.1 percent in the data used to administer the Basic Pilot program, now renamed E-Verify. At that rate, 1 in every 25 new legitimate hires would receive a “tentative nonconfirmation,” requiring the individual to go through a burdensome process to seek permission to work from the Social Security Administration and Department of Homeland Security.

The cost of such a program, including the preliminary national ID system, is estimated to be $17 billion, $11 billion of which would fall directly on state governments. The remaining $6 billion would be shouldered by American citizens as they struggle to prove their right to work in this country.

“’Mission creep’ all but guarantees that the federal government would use an EEV system to extend federal regulatory control over Americans’ lives even further,” writes Harper. In the immigration area alone, proposals have been made to regulate housing in the same way as employment. Healthcare and gun control, among others, are two areas that are especially vulnerable to such mission creep.

As the history of immigration law has proven, “immigrants and employers dedicate their ingenuity to getting what they want and need,” contended Harper. As a result, internal enforcement of immigration law has been a failure for the past 20 years. There is no reason to believe EEV would be any different. Further, the author concludes: “with nationwide electronic employment verification, the United States would move to a regime where the last word on employment decisions would not be with the worker and employer but with bureaucrats in the federal government.”

SIDEBAR: Background Screening

Research shows that more than 85 percent of large companies and institutions and a rapidly growing number of small and mid-sized companies now perform some kind of background screening. The focus of this movement is principally the assurance of a safe, secure workplace for all employees. The statistics showing the popularity of background screening, however, mask what has been, for most companies, a jumble of disparate, time-consuming programs and practices implemented in different offices and departments in different ways with virtually endless possibilities for human error. Often, connection between the hiring professionals and the security department is not tight, and loose controls provide little assurance that the company’s security policies and procedures are enforced in the hiring process. The result is increased exposure, hiring mistakes and additional costs related to manual, error-prone processes.

Fighting that perception, HireRight Enterprise is an on-demand screening management solution used by hiring professionals in companies and institutions to easily and efficiently oversee a legally compliant background and drug screening program that typically includes the screening of applicants and employees company-wide. The industry’s first Web 2.0 application, HireRight Enterprise brings together all screening activities, tasks and tools into a single application – all viewable from a summary dashboard – replacing the need to use manual processes, paper or multiple disparate programs to successfully operate a screening program.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • outsourcing-freepik1170.jpg

    What businesses look for when outsourcing IT

    See More
  • The true cost of the security operations center

    The economics of the security operations center: What's the true cost?

    See More
  • As the Price of Copper Goes, So Does Its Theft

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing