IT Pros May Face Background Checks
White House backs measures that include the screening of private-sector employees
Computerworld - Washington
The Bush administration plans to convene a panel of government and private-sector labor and legal experts to develop guidelines for subjecting tens of thousands of corporate IT and other employees to background investigations.
The panel, as described in the president's "National Strategy for Homeland Security" report, released July 16, would be convened jointly by the secretary of Homeland Security and the attorney general following the establishment of a cabinet-level Department of Homeland Security. It would examine whether current employer liability statutes and privacy concerns would hinder "necessary background checks for personnel with access to critical infrastructure facilities or systems."
That means employees in industries that include banking, chemicals, energy, transportation, telecommunications, shipping and public health would be subject to background investigations as a condition of employment.
"Personnel with privileged access to critical infrastructure, particularly [IT-based] control systems, may serve as terrorist surrogates by providing information on vulnerabilities, operating characteristics and protective measures," the Bush report states.
Some IT professionals see the plan as both an infringement on civil liberties and a recipe for destroying innovation and economic prosperity.
Jonathan Blitt, president of ITT Industries Inc.'s Network Systems & Services division in New York, said expanding background investigations would do more harm than good.
"I [have] great concern with any effort to expand the size of government intervention in commercial operations. The people you most want on your side are the people that may seem least desirable to a panel of so-called experts," Blitt said, referring to the community of programmers and ethical hackers who often live on what he referred to as the "fringe" of society.
"This pandering to the masses should stop, and professional reason should start. This plan could put shackles on an industry that is critical to the growth of our country."
Others see no problem with the requirement for background investigations. Eric Johansen, a systems analyst at ReliaStar Life Insurance Co. in Minneapolis, is one of those.
"Yes, there is added cost, but companies should be doing this anyway as part of standard hiring procedures," Johansen said. "A position like systems analyst [or] network administrator requires access to extremely sensitive data and control of many business-critical tasks. It would be ridiculous not to screen employees. Companies should not need President Bush's push in order for this to happen."
Indeed, background investigations are already conducted by many companies that have sensitive or critical positions that are vulnerable to terrorist infiltration, such as airport baggage screeners and air marshals, said Ed Badolato, president of Washington-based Contingency Management Services Inc. Investigations are necessary because they "provide a baseline for preventing known criminals and potential terrorists from working in vulnerable areas," said Badolato, who oversaw some of the government's most stringent and expensive background investigations when he served as deputy assistant secretary for energy emergencies at the Department of Energy.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- Live Webcast
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts