Wednesday, June 4, 2014

Quickly Maximizing Value from Cloud-base Systems

There's a lot buzz right now surrounding the cloud and companies are trying to sort out all the hype from the real benefits that can be realized by adopting cloud-based solutions.  One of the biggest benefits being touted by advocates is the significant cost savings that can be realized by moving to a cloud solution.  Intuitively, it makes sense since Gartner estimates that the cost to maintain traditional "on-premise" software is four times its initial purchase price.  The main driver for this cost is the necessity to maintain a large IT organization to operate the required environment for the solution.  In many cases, 80% of the IT budget is dedicated to maintaining these systems leaving very little available to pursue other strategic initiatives.  As a result, companies are investigating adopting cloud technology as a means to cut costs, increase value, and refocus IT teams back to projects that support the core initiatives of the organization.

When we talk about the "Cloud", there are several types of service models you will see - infrastructure, platform, and software.  Each model offers a different type of solution that meets specific business needs and creates varying levels of value. What model you use is based on several different factors including type of system, level of control, security, and regulatory compliance.  Control tends to encompass all these areas since the controls a business places on its systems tend to correlate to both internal and external pressures to meet these specific requirements.  Systems critical to business operations are generally kept on-premise either because they contain sensitive, proprietary business data and processes or the operating environment can't be effectively replicated outside the organization.  As such, different cloud services may not satisfy all the requirements dictated by the organization, thus limiting a business from realizing the full benefit offered by certain solutions.

At a minimum, a business might seek to move existing software off of in-house maintained hardware into a dedicated, private cloud solution.  This is where IaaS (Infrastructure as a Service) provides the environment and staff to maintain the hardware used to run your software.  Providers of these solutions include Amazon EC2 and Rackspace.  An IaaS solution provides the maximum control over security, availability, and governance while still realizing the benefits of the cloud. The immediate value is less operations staff managing equipment and facilities.  The downside is your IT organization is still responsible for most of the software, monitoring, and maintenance related to the deployed solutions.

A PaaS (Platform as a Service) goes a little further by offering an operating environment to deploy software solutions.  These include Microsoft Azure and Google App Engine where you are provided a predefined stack to act as a container for your application.  These solutions generally make it very easy to build software and run it in the cloud without spending any time or money configuring a hosting environment.  From a value perspective, they allow you to retain an IT staff that focuses on creating solutions for your business and not how to deploy, scale, and monitor those applications.  A PaaS will take care of many of these details automatically thus freeing you to invest in solving strategic business problems.

In the context of SaaS (Software as a Service), a business should require no IT staff to deploy, train, support, or maintain the solution.  The provider takes care of all these details.  As a business, you can recognize almost immediate value because the solution is available as soon as you sign up.  There may be a learning curve to some systems, but compared to other implementations, you can jump ahead to training and usage on day one.  There's two major drawbacks to a pure SaaS solution. One, they offer little control or visibility into the operations and management of security, availability, and reliability of the solution.  Second, the system may provide little to no option to extend or integrate with other business systems.  This silo effect greatly reduces the maximum value that can be obtained from a SaaS offering.  While a business may enjoy the immediate benefit of the system, as time goes on, the system is unable to grow beyond the confines of the solution itself preventing a business from realizing additional improvements in efficiency available through customization.

Providers are recognizing this short-coming and building APIs to their solutions which offer organizations an opportunity to integrate other business systems with a SaaS solution.  This ability to extend a solution enables an organization to continue to optimize business processes and increase the value of all their business systems.  While this value is not immediately obtained, a clear path exists to realize the potential available in the system.

A new trend solution providers are exploring is going beyond the API and offering specific PaaS-like solutions tailored specifically to the system they provide.  Typically, the environment enables deploying custom solutions built around their API to enable a faster path to realizing value within the solution.  These hybrid approaches are blurring the lines between service model providers and may squeeze out generic offerings in favor of solutions tuned to the needs of the different business systems being used.  The overall value a organization can achieve through these solutions is higher than that of any one stand-alone offering since ecosystems typically begin to evolve around these platforms that a business can turn to for finding best-in-class solutions that can be dropped in and immediately add benefit to the business.


The graph shows several variations of a SaaS solution verses buying, installing, and running a solution in-house.  The greatest difference in value is visible in the upfront cost of a on-premise solution.  At the point of purchase, no value is created by the solution - just the potential for value.  In comparison, most SaaS solutions are pay-for-use which immediately returns value to the organization by not creating a significant drain on capital.  Additionally, since the on-premise solution must be deployed within the organization, there's a time lag before any value can start to be realized.  Again, a SaaS solution avoids this problem and in most cases, an instance is provisioned and available for use in less than a day, if not a few minutes or hours.  The remaining series on the graph show that SaaS solutions with API and platform options provide greater opportunities for deriving continued value from the solution.  Devoid of these options, the value line levels off as a business fully adopts the solution into its operations.

Choosing a solution for your organization requires an understanding of your business's requirements and tolerance to loss of control.  Clearly, when those factors align with a cloud-based solution, a company can realize significant value in a short period of time.  Additionally, as the focus shifts from running everything internally, business can utilize their IT organization more efficiently to solve specific business needs.


Thursday, May 8, 2014

Integrating Consistent I-9 Practices into Business Operations

The Department of Homeland Security’s investigative department, Immigration and Customs Enforcement (ICE) has announced this month that it would conduct more audits of I-9 forms that all businesses are required to maintain which demonstrate that their employees are authorized to work in the United States. Their goal is to ramp up pressure on businesses to accurately complete the I9 process for each of their employees and hire legal workers.

According to the Homeland Security Department’s inspector general, U.S. Immigration and Customs Enforcement have levied one I9 fine of up to $4.9 million. The inspector general’s report said ICE submitted notices totaling fines of more than $52.7 million from 2009 through 2012. The audits and fines will only continue to increase based on the Department of Homeland Security’s own statistics of having more than 20,000 employees at over 400 offices to pursue audits.

The impact to the enterprise is significant and should be strategized for similarly to any other regulatory risk that businesses face today. All businesses are required to store correctly completed I-9 forms submitted by employees that show their legal work status. Analysts say that an I-9 paper-based process is fraught with errors and all sides agree that an electronic system would provide the best completion and tracking process.
The Department of Homeland Security’s ICE division recently commented that they choose certain employers to investigate based on leads received from the public as well as from state and federal agencies. Due to the randomness of this audit process, enterprises need to assure their I-9s are compliant for all future as well as archived I9’s of employees that have worked at their employ from one to up to three years in the past.

The potential liability to your organization of fines and worse yet of public scrutiny can’t be measured in dollars. Government contractors failing an audit may also be debarred from federal or state contract work. According to ICE, Seventy Six percent of paper I-9s have at least one fine-able error. This error rate is the aggregate result of the million plus paper I-9s that have been processed through their I-9 remediation product. The seventy six percent represents a typical paper I-9 error rate for high-volume hiring employers with many locations. If your organization does a high volume of hiring, has multiple locations, and has paper I-9s, your error rate for those I-9s is likely about seventy six percent according to ICE. With penalties of up to $935 per employee per error you can quickly see that fines add up rapidly.

A consistent method to Electronically Audit and Secure the Archival of existing I9 Forms and identifying a certified process for securely and accurately preparing New Employee I-9 Forms is critical for all enterprise businesses considering these regulatory statutes.

Through I9 eVerification Services, the gold standard I9 - E-Verify software providers serve as the “eVerification Agent” for major corporate enterprises. Extensive knowledge of the I9 process and the associated eVerification procedure along with integrating the latest cloud based technology is crucial. Enterprise customers need protection against increasing fines imposed for noncompliance related to employing undocumented workers or making errors on legally documented workers. With a consistent process businesses will realize risk removal, and satisfactory regulatory audit results. Special circumstances encountered while performing each I9 and eVerification do arise and human resource specialists can be useful. Assuring compliance with all Data Privacy and Data Security issues while facilitating the process of this sensitive data is paramount to identifying the correct tool or service.

Wednesday, April 30, 2014

Strategic Planning - The only approach to Achieving I-9 Audit Compliance

According to the Department of Homeland Security’s (DHS) webpage, over 500,000 companies participated in the E-Verify program during 2013.  These 500,000 companies performed more than 25 million E-Verifications on new employees.  Furthermore, the U.S. Immigration and Customs Enforcement (ICE) reported that their ranks have grown to 20,000 auditors housed in 400 offices around the United States and in territories of the U.S.

Audits and fines associated with audits continue to rise:



Federal and State regulations continue to change causing I-9 compliance to increase in complexity. As an example, some of the recent state regulatory changes are included in the table below:

Examples of regulatory change
Alabama April 2012 All Alabama employers are required to use E-Verify.
Arizona December 31, 2007 All Arizona employers are required to use E-Verify. In addition, government contracts can only be issued to businesses using E-Verify.
Colorado 2008 Requires contractors who enter into or renew public contracts for services with a state agency or political subdivision to participate in either E-Verify or the Colorado Department of Labor and Employment Program.
Florida Jan. 2011 Requirement for state contractors to use E-Verify applies to “all contracts for the provision of goods and services to the state in excess of nominal value.
Georgia 2011 Private employers in Georgia with 11 or more employees must E-Verify newly hired full-time employees.
North Carolina July 1, 2013 Employers with 25 or more employees are required to use E-Verify to check each new employees work authorization.
Tennessee Jan. 1, 2013 Employers with 6 or more employees must either use E-Verify or retain documents defined in Tennessee Lawful Employment Act.
Pennsylvania Jan. 1, 2013 Public works contractors & subcontractors must enroll in E-Verify program and perform E-Verifications.

Employers are responsible for monitoring change to Federal and State regulations and assuring that their company is compliant with all new and modified mandates.   It is not always clear regarding the reason behind the initiation of a I-9 audit.  The drivers for the audits seem to fall in the following categories:

•    A former employee files a complaint with ICE.
•    A current, disgruntled employee files a complaint with ICE.
•    An anonymous party files a complaint with ICE.

The fact is that the number of I-9 Audits are increasing annually.  As such, business enterprises need to be mindful of this increase and work diligently to be prepared.


Audit Initiation Process:


To Avoid Being Caught “ Off Guard”
Best practices include:

Be Prepared: Do not wait until the Notice of Inspection (NOI) arrives.  Rather, immediately prepare your organization assuming that a NOI will arrive shortly.  Select a single point of contact within your company such that one person is responsible for insuring that the entire company is in "a state of readiness" when a NOI is delivered to your company.

Centralized Storage of Documents: Lack of centralized storage of documents will cause increased amounts of time to gather the requested information and to prepare a consolidated list of materials provided for the ICE Auditors.  Typically the employer is allowed only 3 business days to provide the requested records.  Decentralized approaches make compliance difficult.

Electronic Storage of I-9 Documents: Centralized, electronic storage of I-9 documents supports the company’s requirement to respond to the NOI or subpoena quickly and demonstrates a sense of preparedness to the ICE Auditor.   Furthermore, electronic storage allows a company the opportunity to store the I-9 data in an encrypted format assuring that data privacy and data security issues are addressed while also limiting access to a worker’s most personal data.

Written Procedures that Clearly Define “Roles and Responsibilities”:
Well documented, written procedures related to gathering, storing, monitoring, maintaining, and ultimately disposing of I-9 documents in a safe and secure manner assure the company and the ICE Auditors that necessary and sufficient steps have been established to assure compliance and to effectively govern “change management” when regulatory (state or federal) mandates cause change to the I-9 and E-Verification process.

Perform Internal Audits: Schedule and conduct regular internal audits to test readiness for an actual audit by ICE. Note inconsistencies, remedy data collection and data recording problems, re-evaluate training materials, and retrain workers involved in the I-9 and E-Verify process.

Assure that Documents for Former Employees are Retained , but also assure that Documents are Properly Destroyed when the Retention Date is Reached:
  Employers are required to retain the I-9 form on each worker for a minimum of 3 years from the worker’s start date, but also must assure retention for 1 year after the worker’s end date.  Employers are increasingly aware of their obligation to coordinate their I-9 retention policy with changes to state regulations on retaining a former employee’s personal private information in accordance with state and federal regulations.

Potentially Select an E-Verify Agent: If it suits your company's culture, select an E-Verify agent that possesses subject matter expertise in the I-9 and E-Verify arena.  A qualified E-Verify agent will bring written procedures, software tools and audit experience to your company such that you can achieve audit preparedness very quickly and have the assurance that your company is in a "state of readiness" for an audit of any nature.

Monday, April 21, 2014

Burden of Proof with Relevancy to I-9 Violations

In law, there is something called the burden of proof, or the onus probandi, if one speaks Latin.  Simply put, it is an obligation on the person making the claim to provide sufficient evidence to overcome or shift the default position to the position of the claim.   The most familiar example of the burden of proof comes from the criminal trial.  There, the prosecutor is claiming that the defendant is guilty and must present enough evidence to overcome the default presumption of innocence, or in other words, provide enough proof beyond reasonable doubt.  The opposite of the burden of proof is the benefit of assumption – it is assumed that the claim needs no supporting evidence.   Using the criminal trial example again, the defendant is free to sit back and do nothing because they have the default assumption of innocence.

In the realm of immigration and employment law, each completed Employment and Eligibility Verification Form I-9 (Form I-9) becomes a claim by the employer that they have performed their legal duty and ascertained that all hires are legal workers.  Therefore, when U.S. Immigration and Customs Enforcement (ICE) sends out Notices of Inspections (NOIs), it is demanding that those employers assemble enough evidence to prove that they are not in violation of immigration hiring policies.  With an estimated 20,000 employees in 400 offices in the U.S. and around the world, ICE’s audits are part of a $138 million worksite enforcement effort that seeks to level the playing field for companies by punishing infractions with hefty fines and possible prison sentences for key managers.   The fines are listed on ICE’s website:

  • $375 to $16,000 per violation for knowingly hire and continuing to employee violations
  • $110 to $1,100 per violation for substantive violations, which includes failing to produce a Form I-9

The fines add up – Infosys recently agreed to pay $34 million in a civil settlement for visa fraud and systemic I-9 violations.

The problem with complying with the Immigration and Nationality Act (INA) is that employers are essentially asked to make a subjective judgment on whether they believe that the documents presented and the information listed are legitimate.  When the audit occurs, the government makes yet another subjective judgment on whether it believes that the employers knowingly erred on form or if the error occurred from negligence.  That’s a lot of subjective judgment that the employer has to overcome or face ponying up fees.

There’s good news.   If a party fulfills the burden of proof effectively, they now have the benefit of assumption, and pass the burden of proof off to the other party.  For example, in the criminal trial, the prosecution presents their case first and when they rest, it is with the belief that they have proved their case beyond a reasonable doubt.  They have now shifted the burden of proof to the defendant to introduce that doubt.  For I-9s, the government has provided a tool to help employers overcome their burden of proof from the beginning, before the NOI and the audit: E-Verify is an internet-based program to help employers verify work authorizations.  Currently, a total of twenty-one states require the use of E-Verify for at least some public and/or private employers, with eight states requiring E-Verify for all employers.

Source: National Immigration Law Center


It is important to note, however, that E-Verify only provides a presumption of good faith for employers who use it – E-Verify does not eliminate the timely and costly aspect of catching and correcting mistakes that can occur during the I-9 process.  Here’s a list composed by the United States Citizenship and Immigration Services (USCIS) of common mistakes: there are eight for employees and an alarming eleven for employers.  These common mistakes are chances for fines that are present for each I-9 filled and the complications that carry over to each piece of data entered into E-Verify, which often result in delays and uncertainty.   Employers need to eliminate these common mistakes with a system that minimizes repeat data entry, streamlines the I-9 and E-Verify process, and stores all information in a convenient location that is readily accessible in the event of an ICE audit.

Remember that the goal for the employer is to shift the heavy burden of proof to the government.  By utilizing E-Verify with a streamlined data entry and storage system, the employer can, like the defendant in a criminal trial, force the government to work hard while they sit back and rest easy knowing that they have already completed their legal duty long before receiving the NOI. 





Tuesday, April 15, 2014

Keeping Data Safe: All the Different Ways to Lose Personal Information

Many people tend to associate personal information protection and security with electronic data stored somewhere on the Internet.  The common belief is that hackers are responsible for a majority of the breaches associated with data loss and that by avoiding use of these systems it is somehow possible to avoid losing personal data. In truth, while these events tend to get the most media attention, they certainly are not the only scenarios leading to the loss of sensitive personal information.

The Privacy Rights Clearinghouse, who is a nationally recognized consumer education and advocacy nonprofit dedicated to protecting the privacy of American consumerscollects reported personal data breach incidents and categorizes the breach into several different categories:

  • Physical loss (PHYS) - Lost, discarded or stolen non-electronic records, such as paper documents
  • Unintended disclosure (DISC) - Sensitive information posted publicly on a website, mishandled or sent to the wrong party via email, fax or mail.
  • Portable device (PORT) - Lost, discarded or stolen laptop, PDA, smartphone, portable memory device, CD, hard drive, data tape, etc
  • Stationary device (STAT) - Lost, discarded or stolen stationary electronic device such as a computer or server not designed for mobility. 
  • Insider (INSD) - Someone with legitimate access intentionally breaches information - such as an employee or contractor.
  • Hacking or malware (HACK) - Electronic entry by an outside party, malware and spyware.

Aggregating this data year-over-year, you can examine the relative impact of these events and an upward trend in the number of reported incidents.  The chart below graphs this data according to the above categories:



Its difficult to conclude that more data breaches are occurring today than in 2005 because there was less emphasis on reporting an incident 10 years ago.  Additionally, one should not immediately conclude that the disproportionate increase in electronic hacking breaches indicates that personal data stored electronically is somehow less safe than maintaining it on paper.  More importantly, this data illustrates that personal data can be lost or stolen in many ways and a company's data protection policy must address all possible scenarios to ensure data remains secure.

There are generally two ways to record personal data: paper or electronic.  However, I tend to break electronic into two categories: local and remote.  Local data is anything stored on a laptop, flash drive, smartphones, etc which generally has limited controls on access and physical location.  Remote data is stored on a server specifically engineered to be located in a physically secure location, monitor access, and contains counter-measures for protecting against unauthorized access.

Using specific breaches from the Privacy Rights Clearinghouse, here are three examples to illustrate these main categories:


Paper Records

A packet of invoices was sent via the United States Postal Service.  The package was damaged when it arrived at the USPS facility and some of the invoice pages were missing.  The information in these missing pages included names, dates of birth, the last 4 digits of individuals Social Security number and the type of lab tests conducted.


Local Data

A flash drives containing patient names, dates of birth, information regarding individual diagnosis, individual treatment and insurance information were stolen from an employee's vehicle. The computer was encrypted but the flash drives were not. 


Server Data

The company discovered that a server was infected by a malicious software that caused a breakdown in the server's security barriers allowing the hackers to obtain personal information. The information included names, dates of birth, ages, genders, addresses, race/ethnicities, medical record numbers, lab results all associated with research provided by individuals as part of research studies.
Looking at these incidents, one should hopefully see that any means of recording, storing, and transmitting personal data is capable of being breached.  Each mechanism has its own vectors of attack that thieves can use to acquire the data.  What companies must do is employ measures to reduce the number of potential attack points to mitigate their risk of data breaches.  

One of the reasons the number of reported hacking incidents is higher is because IT security professionals are deploying better monitoring technology to detect and report possible breaches.  While prevention is clearly a goal, there will always be vulnerabilities.  The point is to limit your susceptibility to data breaches and have mechanisms in place to detect and report a breach when one does occur.  

Data policies that limit the use of paper and local storage mechanisms for sensitive data can significantly reduce a company's exposure to the potential of undetected data loss.  Those two means of maintaining data have limited capabilities for monitoring a breach event.  They also tend to require less talent and knowledge to actually acquire the data.  On the other hand, well designed server-based data storage is specifically configured to employ safeguards against unauthorized access.  Additionally, by keeping all this data in one known, secure location, one can reduce the effort required to monitor and protect the data.  

A computer can be programmed to be infinitely vigilant.  It will perform the same task over and over again without wavering forever.  On the other hand, a human being becomes easily complacent and distracted.  Its in those moments a mistake is made and security is potentially compromised.   Constructing data protection policies that reduce the dependency on humans and increase the automation available in computer technology  to ensure security will ultimately result in better control and protection of our sensitive personal information.