IT Pros May Face Background Checks
White House backs measures that include the screening of private-sector employees
Computerworld - Washington
The Bush administration plans to convene a panel of government and private-sector labor and legal experts to develop guidelines for subjecting tens of thousands of corporate IT and other employees to background investigations.
The panel, as described in the president's "National Strategy for Homeland Security" report, released July 16, would be convened jointly by the secretary of Homeland Security and the attorney general following the establishment of a cabinet-level Department of Homeland Security. It would examine whether current employer liability statutes and privacy concerns would hinder "necessary background checks for personnel with access to critical infrastructure facilities or systems."
That means employees in industries that include banking, chemicals, energy, transportation, telecommunications, shipping and public health would be subject to background investigations as a condition of employment.
"Personnel with privileged access to critical infrastructure, particularly [IT-based] control systems, may serve as terrorist surrogates by providing information on vulnerabilities, operating characteristics and protective measures," the Bush report states.
Some IT professionals see the plan as both an infringement on civil liberties and a recipe for destroying innovation and economic prosperity.
Jonathan Blitt, president of ITT Industries Inc.'s Network Systems & Services division in New York, said expanding background investigations would do more harm than good.
"I [have] great concern with any effort to expand the size of government intervention in commercial operations. The people you most want on your side are the people that may seem least desirable to a panel of so-called experts," Blitt said, referring to the community of programmers and ethical hackers who often live on what he referred to as the "fringe" of society.
"This pandering to the masses should stop, and professional reason should start. This plan could put shackles on an industry that is critical to the growth of our country."
Others see no problem with the requirement for background investigations. Eric Johansen, a systems analyst at ReliaStar Life Insurance Co. in Minneapolis, is one of those.
"Yes, there is added cost, but companies should be doing this anyway as part of standard hiring procedures," Johansen said. "A position like systems analyst [or] network administrator requires access to extremely sensitive data and control of many business-critical tasks. It would be ridiculous not to screen employees. Companies should not need President Bush's push in order for this to happen."
Indeed, background investigations are already conducted by many companies that have sensitive or critical positions that are vulnerable to terrorist infiltration, such as airport baggage screeners and air marshals, said Ed Badolato, president of Washington-based Contingency Management Services Inc. Investigations are necessary because they "provide a baseline for preventing known criminals and potential terrorists from working in vulnerable areas," said Badolato, who oversaw some of the government's most stringent and expensive background investigations when he served as deputy assistant secretary for energy emergencies at the Department of Energy.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!