Senate immigration bill would mandate national employment verification system
Feds would have to expand existing technology; critics concerned about privacy issues, potential for errors
The bipartisan immigration reform plan that was announced in the U.S. Senate this week would mandate the development of a national electronic employment verification system affecting every worker in the U.S.
If the Senate proposal becomes law, the federal government would have 18 months to ready a system that could handle as many as 60 million employment verification checks annually.
The intent is to root out people working here illegally. But no system is perfect, and errors on verification checks could have big consequences: Employees who weren't cleared might lose their jobs, a potential Kafkaesque nightmare for native citizens as well as foreign-born workers.
The Congressional Budget Office, in a report last year that looked at earlier legislation seeking electronic verification (download PDF), predicted that the government would have to spend $250 million over the first five years of a verification program compensating employees who lost jobs because of system errors. The CBO forecasted 10 errors per million for native-born workers and an initial error rate of 0.4% -- or 4,000 per million -- for foreign-born workers. It did that the error rate would decline with system improvements.
But errors aren't the only concern. Some policy analysts said they fear that the creation of a verification system like the one envisioned in the Senate proposal could lead to a national ID and enable the government to probe deeply into other databases, such as ones that contain tax records.
"They are going down the road of a national ID, which is already recognized as anathema to the American public," said Jim Harper, director of information policy studies at the Cato Institute, a Washington-based think tank that advocates for limited government and protection of individual liberties.
The government wouldn't be starting from scratch on an employment verification system. It now runs a voluntary verification program, with about 17,000 employers participating out of a potential pool of 6 million or so. People familiar with the technology used to support that program said the government would need to buy additional server capacity to handle the much larger transaction volume that a mandatory national program would generate.
The existing system checks employees against Social Security and immigration data. Verification errors can occur for a variety of reasons, such as data-entry errors, misspellings by individuals or cases in which people who have stopped use their middle names or have changed their last names because of marriage.
In addition, a criticism of the verification system is that a worker can circumvent it by using fraudulent green card or Social Security information, such as the number of a deceased person. Fixing that problem could involve calls for the use of stronger authentication mechanisms, such as biometric identification cards, Harper said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts