Stimulus package sets H-1B limits, leaves out E-Verify mandate
Of two IT-related amendments to the economic stimulus bill, only one makes the cut.
Computerworld - A provision requiring banks receiving federal bailout funds to give hiring priority to U.S. workers over foreigners with H-1B visas made it into the final version of the economic stimulus bill that President Barack Obama signed last week.
But House and Senate negotiators dropped a separate proposal that would have forced all employers benefiting from stimulus money to use the government's Web-based E-Verify system to vet the employment status of their workers.
The new H-1B restrictions require financial services firms that get money under the Troubled Assets Relief Program (TARP) to comply with rules set for "H-1B-dependent" companies -- those where more than 15% of the workers are on visas.
The rules set a number of requirements for organizations looking to hire H-1B holders, including the need to attest that the employer actively recruited U.S. workers and wouldn't be displacing or replacing U.S. citizens.
Sens. Bernie Sanders (I-Vt.) and Chuck Grassley (R-Iowa) initially proposed an outright ban on H-1B hiring by TARP-recipient banks, but the scope of their amendment to the stimulus bill was later scaled down.
Even so, Charles Kuck, president of the American Immigration Lawyers Association in Washington, said it's unlikely that the affected financial services firms will try to hire H-1B holders for IT jobs and other positions because of the added cost and work now required.
That could leave the firms unable to tap the skills of "qualified foreign talent" to help them during a time of economic crisis, Kuck added. "Maybe we've got all the homegrown talent we need to pull us out of this mess, because now we have to hope we do," he said.
But some H-1B critics contend that the hiring restrictions may do little to stop IT functions from being shifted to foreign workers, since the stimulus bill doesn't place any limits on offshoring.
Ron Hira, an assistant professor of public policy at Rochester Institute of Technology, claimed that many TARP recipients have "huge shadow workforces" at outsourcing vendors. And outsourcing by Wall Street firms has risen since the federal bailout program began last fall, according to Hira.
Restricting H-1B hiring "will rectify some of the indefensible practices of quasi-nationalized banks," Hira said. "But unfortunately, it doesn't close the loopholes where most of the abuse occurs."
The E-Verify provision that was left out of the stimulus bill would have required companies benefiting from the $787 billion package to vet information in job applications by comparing it to data in work-eligibility databases maintained by the U.S. Social Security Administration and the Department of Homeland Security. Also excised from the bill was a proposed extension of the overall E-Verify program beyond March 6, when it is scheduled to expire.
Mark Krikorian, executive director of the Center for Immigration Studies in Washington, criticized the decision to drop the E-Verify usage requirement. The DHS and the SSA "have the hardware and the software capacity to screen all new hires," he said. "It's happening right now."
But Tim Sparapani, senior legislative counsel at the American Civil Liberties Union, said the databases used as part of E-Verify are outdated and contain inaccurate information. "The reason why we don't have mandatory verification [rules]," Sparapani said, "is because the government hasn't done the hard work of going back and scrubbing those databases clean."
Mike Aitken, director of governmental affairs at the Society for Human Resource Management in Alexandria, Va., doesn't want the E-Verify program to disappear. But, he said, the government needs to make the system more reliable.
Read more about Government IT in Computerworld's Government IT Topic Center.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Bring Networks and Applications Closer--Cisco ONE
- A series of sweeping trends is placing new requirements on the tried-and-true network model--requiring network infrastructure and applications to communicate. Get the open...
- Lippis Research Reviews the Cisco Catalyst 2960-X
- In this Lippis Report Research Note, Lippis Research reviews the latest edition of the "most popular access switch on the planet" -- the...
- Design Guide--Scaling Up to a Campus-Wide LAN
- Is it time to scale your network environment to a campus wired LAN? Here's the framework you need to set up your LAN...
- Comprehensive Security: Cisco Catalyst 2960 Series
- With a rich and comprehensive set of security features, Cisco Catalyst 2960-X and 2960-XR Series Switches can help you address networking megatrends such...
- Be Energy Efficient--The Cisco Catalyst 2960 Series
- How much energy could be saved if all 230 million Layer 2 and 3 fixed managed switch ports sold in 2012 were as... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- Vblock™ Specialized System for SAP HANA® Overview video from DJ Long about the new Vblock Specialized System for SAP HANA®.
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 20, 2013.