Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Supporting Temporary Workers with Full-Time Security

As enterprise security leaders know, many of their employees are badged and enter and leave facilities through an electronic access control system

temp slide 1

Hiring depends on location and type of business in addition to the economy. About 18,000 employers told ManpowerGroup where the jobs are and what industries are hiring in 2013.

Chart courtesy of PRNewsFoto/ManpowerGroup

temp slide 2

“There are basic standards” including background checks and drug screening, says David Cullen of ISI - Intelligence Security International.

temp slide 3

In the old days, there were mainframe computers with limited access. Today, Bring Your Own Device opens up vulnerabilities with employers, temp workers and independent contractors. Pictured: Dennis Ritchie and Ken Thompson using a teletypewriter to run a program on a UNIX-based computer system they co-founded at Bell Labs in New Jersey. Their development work more than 40 years ago facilitated the realization of the Internet.

Photo courtesy of PRNewsFoto/Alcatel-Lucent

temp slide 4

Figure 1

temp slide 1
temp slide 2
temp slide 3
temp slide 4
May 9, 2013

As enterprise security leaders know, many of their employees are badged and enter and leave facilities through an electronic access control system.

But there is a huge and growing workforce that may be neglected. And, ironically, as the economy continues to improve, and full-time employment doesn’t, there’s a need to do an even better job screening temporary workers and independent contractors (ICs) as well as controlling their physical and computer access.

It’s not simple task, made the more difficult because hiring of temps and ICs may be outside the territory of security and traditional human resources.

The number of these workers is massive.

After hitting a peak of nearly 2.7 million workers in 2006, the temporary help industry lost more than one-third of its members during the downturn. Since then, it has regained a significant majority of the workers lost, 87 percent, as compared to all private employers, which have only brought back just over half of their jobs.

Those who track labor statistics say that temporary help agency employment tends to grow as the economy heads into a recession and as it heads out of a recession.

Then there are the more than 10 million self-employed workers, many of them independent contractors. And many of these work for high-tech firms where there is greater concern relative to high dollar, high-visibility losses.

In addition, it is expected that some employers will increase use of temps and ICs based on the perceived impact of the federal Affordable Care Act. There are temp and IC hiring variables based on location and type of business. See the overall hiring chart in this article.

Also impacting security sensitivities relative to temps and ICs is the BYOD movement. There is a greater chance that these workers will “Bring Your Own Device” to work or to access an enterprise network remotely, and that is a real vulnerability.

So what’s security to do generally when it comes to temps and ICs?

According to an expert panel interviewed by Securitymagazine:

  • Set and enforce clear policies and procedures.
  • Communicate those policies consistently and constantly to hiring departments.
  • Embed expectations into temp agency contracts and IC agreements.
  • Insist on background screening and drug testing matching full-time employee requirements.
  • Extend BYOD rules to temps and ICs.
  • Extend physical access controls (badges/cards) to temps and ICs on site.         

“There are basic standards,” says David Cullen of ISI – Intelligence Security International, the consultant firm working with large firms, schools and law enforcement. “When dealing with a background check process, you need to check everyone and include language in the contract (for it).” Cullen advises to issue badges or cards to temp workers and program them for a given length of time of the contract or agreement.

And if enterprise security leaders think liability leverages to an outside agency, think again. “Not a slam dunk,” says Cullen. “You (or your organization) made the decision to have these people on site or work for you remotely. You just cannot shield yourself from everything.”

Oded Barlev agrees.

The vice president of national operations for ABM Security Services adds that the beginning of the best way to handle temps and ICs from a security standpoint starts at the C-suite level. Consistency also helps: “For background checks and drug screenings, if you are doing it with full-time employees, do it with temps, too.” And, when it comes to physical access control, Barlev suggests layers of restrictions depending on sensitivity of areas and hours of the day.

Daniel Budinoff of Security Specialists, the integration firm, likes tightened access, too. “Access control is essential,” he says. His advice: There are plenty of ways, based on visitor management, in which to handle temps and ICs. “Scanning a person’s driver’s license against databases can uncover potential problems.”

It’s a matter of assuming, concludes William Tate of HR Plus, a division of AlliedBarton Security Services. “Don’t make the assumption that a company you are hiring temps from is conducting background checks. Make it part of the contract.” Tate also spotlights a potential vulnerability beyond temporary workers and ICs. “Volunteers. A great many organizations today have volunteers on site or working for them. Without necessary screening, there could be trouble. You want the safest environment possible” even when it comes to unpaid volunteers.

  


Temps, ICs and BYOD

 

The Bring Your Own Device movement is already roiling security and IT executives. But BYOD can also as easily impact enterprises through temporary works and independent contractors.

According to a white paper from MaaS360 by Fibertek, the rapid proliferation of mobile devices entering the workplace feels like divine intervention to many enterprises. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. BYOD was born, and employees followed with fervor.

There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into the network with or without permission. A Forrester Research study of U.S. information workers, for example, revealed that 37 percent are doing something with technology before formal permissions or policies are instituted. Further, a Gartner CIO survey determined that 80 percent of employees will be eligible to use their own equipment with employee data on board by 2016.

This raises the inevitable question: How to support a workforce – including temps and ICs – that wants to use personal apps and devices while allowing it to be productive in a secure environment that protects corporate data?

The Ten Commandments of BYOD show how to create a peaceful, secure, and productive mobile environment.

The Ten Commandments of BYOD

  1. Create Thy Policy Before Procuring Technology
  2. Seek The Flock’s Devices
  3. Enrollment Shall Be Simple
  4. Thou Shalt Configure Devices Over the Air
  5. Thy Users Demand Self-Service
  6. Hold Sacred Personal Information
  7. Part the Seas of Corporate and Personal Data
  8. Monitor Thy Flock – Herd Automatically
  9. Manage Thy Data Usage
  10. Drink from the Fountain of ROI

 

 

KEYWORDS: background check Bring Your Own Device (BYOD) contractor security pre-employment screening Temporary employee

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Best Practices to Manage Access for Temporary and Contract Workers

    See More
  • Manchester Terminal has automated the authentication process with high tech readers.

    Minimizing Risks from Contractors and Temporary Employees

    See More
  • Generic Image for Enterprise Services

    Study Finds New, More Mobile Workers Pose Security Risks

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×
Hiring depends on location and type of business in addition to the economy. About 18,000 employers told ManpowerGroup where the jobs are and what industries are hiring in 2013. Chart courtesy of PRNewsFoto/ManpowerGroup
“There are basic standards” including background checks and drug screening, says David Cullen of ISI - Intelligence Security International.
In the old days, there were mainframe computers with limited access. Today, Bring Your Own Device opens up vulnerabilities with employers, temp workers and independent contractors. Pictured: Dennis Ritchie and Ken Thompson using a teletypewriter to run a program on a UNIX-based computer system they co-founded at Bell Labs in New Jersey. Their development work more than 40 years ago facilitated the realization of the Internet. Photo courtesy of PRNewsFoto/Alcatel-Lucent
Figure 1

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!