Chapter 6

Human Resources Security

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Define the relationship between cybersecurity and personnel practices.

  • Recognize the stages of the employee life cycle.

  • Describe the purpose of confidentiality and acceptable use agreements.

  • Understand appropriate security education, training, and awareness programs.

  • Create personnel-related security policies and procedures.

Is it possible that people are simultaneously an organization’s most valuable asset and their most dangerous threat? Study after study cites people as the weakest link in cybersecurity. Because cybersecurity is primarily a people-driven process, it is imperative that the cybersecurity program be faithfully supported by information owners, custodians, and users.

For an organization to function, employees need access to information and information systems. Because we are exposing valuable assets, we must know our employees’ backgrounds, education, and weaknesses. Employees must also know what is expected of them; from the very first contact, the organization needs to deliver the message that security is taken seriously. Conversely, candidates and employees provide employers with a great deal of personal information. It is the organization’s responsibility to protect employee-related data in accordance with regulatory and contractual obligations.

Before employees are given access to information and information systems, they must understand organizational expectations, policies, handling standards, and consequences of noncompliance. This information is generally codified into two agreements: a confidentiality agreement and an acceptable use agreement. Acceptable use agreements should be reviewed and updated annually and redistributed to employees for signature. An orientation and training program should be designed to explain and expand upon the concepts presented in the agreements. Even long-standing employees continually need to be reeducated about security issues. NIST has invested significant resources in developing a role-based Security Education, Training, and Awareness (SETA) model. Although designed for government, the model is on target for the private sector.

We begin this chapter with examining the security issues associated with employee recruitment, onboarding, user provisioning, career development, and termination. We then discuss the importance of confidentiality and acceptable use agreements. Last, we focus on the SETA training methodology. Throughout the chapter, we codify best practices into human resources security policy.

FYI: NIST Cybersecurity Framework and ISO/IEC 27002:2013

The PR.IP-11 subcategory of the NIST Cybersecurity Framework describes human resources practices (including deprovisioning, personnel screening, and so on).

Section 7 of ISO 27002:2013 is dedicated to Human Resources Security Management with the objective of ensuring that security is integrated into the employee life cycle.

Corresponding NIST guidance is provided in the following documents and other references:

  • SP 800-12: An Introduction to Computer Security—The NIST Handbook

  • SP 800-16: Information Technology Security Training Requirements: A Role- and Performance-Based Model

  • SP 800-50: Building an Information Technology Security Awareness and Training Program

  • SP 800-100: Information Security Handbook: A Guide for Managers

  • SP 800-53 Rev. 4 PS Family

  • COBIT 5 APO07.01, APO07.02, APO07.03, APO07.04, APO07.05

The Employee Life Cycle

The employee life cycle 1 model (shown in Figure 6-1) represents stages in an employee’s career. Specific employee life cycle models vary from company to company, but common stages include the following:

  • Recruitment: This stage includes all the processes leading up to and including the hiring of a new employee.

  • Onboarding: In this stage, the employee is added to the organization’s payroll and benefits systems.

  • User provisioning: In this stage, the employee is assigned equipment as well as physical and technical access permissions. The user provisioning process is also invoked whenever there is a change in the employee’s position, level of access required, or termination.

  • Orientation: In this stage, the employee settles into the job, integrates with the corporate culture, familiarizes himself with co-workers and management, and establishes his role within the organization.

  • Career development: In this stage, the employee matures in his role in the organization. Professional development frequently means a change in roles and responsibilities.

  • Termination: In this stage, the employee leaves the organization. The specific processes are somewhat dependent on whether the departure is the result of resignation, firing, or retirement. Tasks include removing the employee from the payroll and benefits system, recovering information assets such as his smartphone, and deleting or disabling user accounts and access permissions.

  • Off-boarding: The process for transitioning employees out of an organization. This includes documenting the separation or termination details, tasks and responsibilities prior to departure, knowledge transfer, an exit interview (if applicable), the deletion of all user credentials and any other access the user had.

    A figure represents the employee life cycle.

    FIGURE 6-1 The Employee Life Cycle

With the exception of career development, we are going to examine each of these stages in relation to cybersecurity concepts, safeguards, and policies.

What Does Recruitment Have to Do with Security?

The recruitment stage includes developing and publishing job descriptions, actively seeking potential employees, collecting and assessing candidate data, interviewing, conducting background checks, and either making an offer or rejecting a candidate. A significant flow of information occurs during the recruitment stage. In hopes of attracting the most qualified candidate, information about the organization is publicly revealed. In turn, potential candidates respond with a plethora of personal information.

Job Postings

The first direct contact many potential candidates have with their future employer is a help-wanted advertisement. Historically, this advertisement was either published in a newspaper or trade journal or provided to a “headhunter” who specialized in finding potential candidates. In either case, the circulation was limited in scope and time. Today, a majority of recruiting is Internet-based. Companies may post jobs on their website, use online employment search engines such as Monster.com, or use social media such as LinkedIn. The upside to this trend is reaching a wider audience of talent. The downside is that this exposure also reaches a wider audience of potential intruders and may have the unintended consequence of exposing information about an organization. Job postings are one of the sources that intruders often look to use. Why? Because job postings can be a wealth of information about an organization: personnel changes, product development, new services, opening of offices, as well as basic information such as the name and phone number of the hiring manager. All these items can be used in social engineering attacks and provide a path to more in-depth knowledge. An idea to consider is having two versions of a job description. Version A is posted and/or published and has enough information to attract the attention and interest of a potential employee. Version B is more detailed and is posted internally and/or shared with candidates that have made the “first cut.” Version B of a job description needs to be detailed enough to convey the facets of the position and has the following characteristics:

  • It conveys the mission of the organization.

  • It describes the position in general terms.

  • It outlines the responsibilities of the position.

  • It details the necessary skill set.

  • It states the organization’s expectations regarding confidentiality, safety, and security. The goal of this characteristic is to deliver the message that the organization has a commitment to security and that all employees are required to honor that commitment.

What should not be in either version of the job description is information regarding specific systems, software versions, security configurations, or access controls.

Candidate Application Data

The intent of posting a job is to have candidates respond with pertinent information. Collecting candidate data is a double-edged sword. On one hand, companies need personal information to properly select potential employees. On the other hand, once this information is collected, companies are responsible for protecting the data as well as the privacy of the job seeker. Candidate data generally collected during this phase includes demographic, contact, work history, accomplishments, education, compensation, previous employer feedback, references, clearances, and certifications. If possible, legally protected nonpublic personal information (NPPI), such as social security number, date of birth, driver’s license or state identification number, and financial information should not be collected at this stage.

The Interview

Top-tier candidates are often invited to one or more interviews with a cross-section of personnel. Invariably, interviewers share more information than they should with job candidates. They do so for a variety of reasons. Sometimes they are trying to impress a sought-after candidate. They may be proud of (or dismayed with) the organization. Sometimes they simply do not realize the confidentiality of the information they are sharing. For example, an interviewer might reveal that the organization is about to launch a new mobile app and that they know little about how to secure it! Creating and following an interview script (that has been vetted by cybersecurity personnel) can minimize the risk of disclosure. One of the worst mistakes that an interviewer can make is taking an early-stage job candidate on a tour of the facility. A candidate should never be allowed access to secure areas without prior authorization by the information system owner. Even then, caution should be exercised.

In Practice

Job Recruitment Policy

Synopsis: In support of cybersecurity, the purpose of this policy is to ensure that company and candidate resources are protected during the recruitment process.

Policy Statement:

  • Any information that is classified as “protected” or “confidential” must not be included in job postings or job descriptions.

  • Candidates will not be allowed access to any secure area unless authorized in writing by the information owner.

  • All nonpublic information submitted by candidates must be classified as “protected” and handled in accordance with company handling standards.

  • Under no circumstances will the company request that candidates provide a password to social media, blog, web, or personal email accounts.

  • The Office of Information Security and the Office of Human Resources will be jointly responsible for the implementation and enforcement of this policy.

Screening Prospective Employees

You are a business owner. You have spent the past 10 years toiling night and day to build your business. You have invested your personal financial resources. Your reputation in the community is intertwined with the actions of the business. How much do you need to know about your newest salesperson?

You are the Chief Executive Officer (CEO) of a Fortune 1000 financial services company. You are responsible to the stockholders and accountable to the government for the actions of your business. How much do you need to know about your new Chief Financial Officer (CFO)?

You are the Head of Medicine at your local hospital. You are responsible for maintaining the health of your patients and for guaranteeing their right to privacy. How much do you need to know about the new emergency room intake nurse?

In all three cases, the information owner wants assurance that the user will treat the information appropriately in accordance with its classification. One of the standards in determining who should have access is defining the user criteria. These criteria extend to their background: education, experience, certification/license, criminal record, and financial status. In addition, we must consider the amount of power or influence the employee will have in the organization.

For example, we expect that a CFO will have access to confidential financial records and sensitive corporate strategy documents. In addition, the CFO has the power to potentially manipulate the data. In this case, we need to be concerned about both the confidentiality and the integrity of the information. It seems obvious that the CFO needs to be held to a high standard. He should have a spotless criminal record and not be under any financial pressure that may lead to inappropriate activities such as embezzlement. Unfortunately, as corporate scandals such as Enron, Adelphia, HealthSouth, and Tyco have shown us, those in power do not always act in the best interest of the organization. The organization needs to proactively protect itself by conducting background and reference checks on potential employees and directors. The same holds true for positions of less prominence, such as a salesperson or intake nurse. Although these positions may have less power, the potential for misuse still exists.

Not all potential employees need to undergo the same level of scrutiny. It is the responsibility of the information owner to set standards based on level of information access and position.

The various types of background checks are as follows:

  • Educational: Verification that all educational credentials listed on the application, resume, or cover letter are valid and have been awarded.

  • Employment: Verification of all relevant previous employment as listed on the application, resume, or cover letter.

  • License/certification: Verification of all relevant licenses, certifications, or credentials.

  • Credit history: Checking the credit history of the selected applicant or employee. Federal laws prohibit discrimination against an applicant or employee because of bankruptcy. Federal law also requires that applicants be notified if their credit history influences the employment decision.

  • Criminal history: Verification that the selected applicant or employee does not have any undisclosed criminal history.

It is important to have a policy that sets the minimum standards for the organization yet affords information owners the latitude to require additional or more in-depth background checks or investigations. This is an example of a policy that in the development stage may need to involve outsiders, such as legal counsel or employee representatives. Many organizations have union labor. The union contract may forbid the background checks. This policy would need to be incorporated into the next round of negotiations. The following are rules you should be aware of:

  • Employee’s right to privacy: There are legal limits on the information you can gather and use when making employment decisions. Workers have a right to privacy in certain personal matters, a right they can enforce by suing you if you pry too deeply. Make sure your inquiries are related to the job. Stick to information that is relevant to the job for which you are considering the worker. Different regulatory bodies such as Article 88 of the European Union General Data Protection Regulation (GDPR) include strict rules around the processing of data and privacy in the context of employment.

  • Getting consent: Although not universally required by law, conventional wisdom recommends asking candidates to agree to a background check. Most organizations include this request on their application forms and require the applicant to agree in writing. By law, if a candidate refuses to agree to a reasonable request for information, you may decide not to hire the worker on that basis.

  • Using social media: Social media sites are increasingly being used to “learn more” about a candidate. They are also used as recruiting platforms. According to HireRight’s 2017 Benchmark Report, several organizations use social media to conduct pre-hire background checks. However, according to the same report, “in the transportation sector, only nine percent of companies surveyed turn to social media when conducting pre-hire background checks. The decline in the practice is becoming widespread throughout other industries as well.” Social media profiles include information such as gender, race, and religious affiliation. The law prohibits the use of this information for hiring. Access to this info could have the organization subject to discrimination charges. Legal experts recommend that organizations have a non-decision maker conduct the search and provide to the decision maker(s) only relevant job-related information.

  • Educational records: Under the Family Educational Rights and Privacy Act (FERPA), schools must have written permission to release any information from a student’s education record. For more information on obtaining records under FERPA, go to www.ed.gov.

  • Motor vehicle records: Under the federal Drivers Privacy Protection Act (DPPA), the release or use by any state DMV (or any officer, employee, or contractor thereof) of personal information about an individual obtained by the department in connection with a motor vehicle record is prohibited. The latest amendment to the DPPA requires states to get permission from individuals before their personal motor vehicle record may be sold or released to third-party marketers.

  • Financial history: According to the Federal Trade Commission (FTC), you may use credit reports when you hire new employees and when you evaluate employees for promotion, reassignment, and retention, as long as you comply with the Fair Credit Reporting Act (FCRA). Sections 604, 606, and 615 of the FCRA spell out employer responsibilities when using credit reports for employment purposes. These responsibilities include the requirement of notification if the information obtained may result in a negative employment decision. The Fair and Accurate Credit Transaction Act of 2003 (FACTA) added new sections to the federal FCRA, intended primarily to help consumers fight the growing crime of identity theft. Accuracy, privacy, limits on information sharing, and new consumer rights to disclosure are included in FACTA. For more information on using credit reports and the FCRA, go to www.ftc.gov.

  • Bankruptcies: Under Title 11 of the U.S. Bankruptcy Code, employers are prohibited from discriminating against someone who has filed for bankruptcy. Although employers can use a negative credit history as a reason not to hire, employers cannot use bankruptcy as a sole reason.

  • Criminal record: The law on how this information can be used varies extensively from state to state.

  • Workers’ Compensation history: In most states, when an employee’s claim goes through Workers’ Compensation, the case becomes public record. An employer may use this information only if an injury might interfere with one’s ability to perform required duties. Under the federal Americans with Disabilities Act, employers cannot use medical information or the fact an applicant filed a Workers’ Compensation claim to discriminate against applicants.

In Practice

Personnel Screening Policy

Synopsis: Background checks must be conducted on employees, temporaries, and contractors.

Policy Statement:

  • As a condition of employment, all employees, temporaries, and contractors must agree to and are subject to background screening that includes identity verification, confirmation of educational and professional credentials, credit check, and state and federal criminal check.

  • Comprehensive background screening will be conducted pre-hire. Criminal check will be conducted annually thereafter.

  • Background screening will be conducted in accordance with local, state, and federal law and regulations.

  • If the person will have access to “protected” or highly confidential information, additional screening may be required at the discretion of the information owner. This includes new personnel as well as employees who might be moved into such a position.

  • Background screening will be conducted and/or managed by the Human Resources department.

  • If temporary or contractor staff is provided by an agency or third party, the contract must clearly specify the agency or third-party responsibility for conducting background checks in accordance with this policy. Results must be submitted to the Human Resources department for approval.

  • The Office of Information Security (or Cybersecurity Office) and the Office of Human Resources will be jointly responsible for the implementation and enforcement of this policy.

  • All information obtained in the screening process will be classified as “protected” and handled in accordance with company handling standards.

Government Clearance

Many U.S. government jobs require that the prospective employee have the requisite security clearance. Although each government agency has its own standards, in general, a security clearance investigation is an inquiry into an individual’s loyalty, character, trustworthiness, and reliability to ensure that he or she is eligible for access to national security–related information. The process to obtain clearance is both costly and time-consuming.

Obtaining a U.S. government security clearance involves a four-phase process:

  1. Application phase: This phase includes verification of U.S. citizenship, fingerprinting, and completion of the Personnel Security Questionnaire (SF-86).

  2. Investigative phase: This phase includes a comprehensive background check.

  3. Adjudication phase: During this phase, the findings from the investigation are reviewed and evaluated based on 13 factors determined by the Department of Defense. Examples of these factors include criminal and personal conduct, substance abuse, and any mental disorders.

  4. Granting (or denial) of clearance at a specific level: To obtain access to data, clearance and classification must match. For example, to view Top Secret information, the person must hold Top Secret clearance. However, merely having a certain level of security clearance does not mean one is authorized to access the information. To have access to the information, one must possess two elements: a level of security clearance at least equal to the classification of the information and an appropriate “need to know” the information in order to perform one’s duties.

What Happens in the Onboarding Phase?

Once hired, a candidate transitions from a potential hire to an employee. At this stage, he or she is added to the organization’s payroll and benefits systems. To accomplish these tasks, the employee must provide a full spectrum of personal information. It is the responsibility of the organization to properly classify and safeguard employee data.

Payroll and Benefits Employee Data

When an employee is hired in the United States, he or she must provide proof of identity, work authorization, and tax identification. The two forms that must be completed are the Department of Homeland Security/U.S. Citizenship and Immigration Services Form I-9 Employment Eligibility Verification and the Internal Revenue Service Form W-4 Employee’s Withholding Allowance Certificate.

The purpose of Form I-9 is to prove that each new employee (both citizen and noncitizen) is authorized to work in the United States. Employees are required to provide documentation that (a) establishes both identity and employment authorization or (b) documents and establishes identity and (c) documents and establishes employment authorization. Employees provide original documentation to the employer, who then copies the documents, retains a copy, and returns the original to the employee. Employers who hire undocumented workers are subject to civil and criminal penalties per the Immigration Reform and Control Act of 1986. For an example of an I-9 form, visit https://www.uscis.gov/i-9. As shown on page 9 of this document, the required documents may contain NPPI and must be safeguarded by the employer.

Completion of Form W-4 is required in order for employers to withhold the correct amount of income tax from employee pay. Information on this form includes complete address, marital status, social security number, and number of exemptions. Additionally, according to the W-4 Privacy Act Notice, routine uses of this information include giving it to the Department of Justice for civil and criminal litigation; to cities, states, the District of Columbia, and U.S. commonwealths and possessions for use in administering their tax laws; and to the Department of Health and Human Services for use in the National Directory of New Hires. They may also disclose this information to other countries under a tax treaty, to federal and state agencies to enforce federal nontax criminal laws, or to federal law enforcement and intelligence agencies to combat terrorism. The confidentiality of information provided on Form W-4 is legally protected under 26 USC § 6103: Confidentiality and Disclosure of Returns and Return Information.

What Is User Provisioning?

User provisioning is the name given to the process of creating user accounts and group membership, providing company identification, and assigning access rights and permissions as well as access devices, such as a token or smartcard. This process may be manual, automated (commonly referred to as an identity management system), or a combination thereof. Prior to granting access, the user should be provided with and acknowledge the terms and conditions of an acceptable use agreement. We examine this agreement later in the chapter. The permissions and access rights a user is granted should match his or her role and responsibilities. The information owner is responsible for defining who should be granted access and under what circumstances. Supervisors generally request access on behalf of their employees. Depending on the organization, the provisioning process is managed by the Human Resources department, the Cybersecurity department, or the Information Technology (IT) department.

One important step toward securing your infrastructure and effective identity management practices is to ensure that you can manage user accounts from one single location regardless of where these accounts were created. Although the majority of organizations will have their primary account directory on-premise, hybrid cloud deployments are on the rise, and it is important that you understand how to integrate on-premise and cloud directories and provide a seamless experience to the end user, and to also manage onboarding of new employees and deleting accounts for departing employees. To accomplish this hybrid identity scenario, it is recommended that you synchronize and federate your on-premise directory with your cloud directory. A practical example of this is using Active Directory Federation Services (ADFS). We discuss role-based access controls and other identity management topics later in the book.

In Practice

User Provisioning Policy

Synopsis: The company must have an enterprise-wide user provisioning process.

Policy Statement:

  • There will be defined and documented a user provisioning process for granting and revoking access to information resources that includes but is not limited to account creation, account management (including assignment of access rights and permissions), periodic review of access rights and permissions, and account termination.

  • The Office of Human Resources and the Office of Information or Cybersecurity are jointly responsible for the user provisioning process.

What Should an Employee Learn During Orientation?

In this stage, the employee begins to learn about the company, the job, and co-workers. Before having access to information systems, it is important that the employee understand his or her responsibilities, learn the information-handling standards and privacy protocols, and have an opportunity to ask questions. Organizational orientation is usually a Human Resources department responsibility. Departmental orientation is usually conducted by a supervisor or departmental trainer. Employee orientation training is just the beginning. Every employee should participate in SETA programs throughout his or her tenure. We’ll examine the importance of SETA later in this chapter.

Privacy Rights

The standard in most private sector organizations is that employees should have no expectation of privacy in respect to actions taken on company time or with company resources. This extends to electronic monitoring, camera monitoring, and personal searches.

  • Electronic monitoring includes phone, computer, email, mobile, text, Internet access, and location (GPS-enabled devices).

  • Camera monitoring includes on-premise locations, with the exception of cameras in restrooms or locker rooms where employees change clothes, which is prohibited by law.

  • Personal searches extend to searching an employee, an employee’s workspace, or an employee’s property, including a car, if it is on company property. Personal searches must be conducted in accordance with state regulations.

A company should disclose its monitoring activities to employees and get written acknowledgment of the policy. According to the American Bar Association, “an employer that fails to adopt policies or warnings or acts inconsistently with its policies or warnings may find that the employee still has a reasonable expectation of privacy.” The lesson is that companies must have clear policies and be consistent in their application. Privacy expectations should be defined in the cybersecurity policy, acknowledged in the signed acceptable use agreement, and included in login banners and warnings.

In Practice

Electronic Monitoring Policy

Synopsis: It is necessary to have the ability to monitor certain employee activities. Employee expectation of privacy must be clearly defined and communicated.

Policy Statement:

  • The company reserves the right to monitor electronic activity on company-owned information systems, including but not limited to voice, email, text and messaging communications sent, received, or stored, computer and network activity, and Internet activity, including sites visited and actions taken.

  • The policy must be included in the employee acceptable use agreement, and employees must acknowledge the policy by signing the agreement.

  • Whenever technically feasible, login banners and warning messages will remind users of this policy.

  • The Office of Human Resources and the Office of Information or Cybersecurity are jointly responsible for developing and managing electronic monitoring and employee notification.

Why Is Termination Considered the Most Dangerous Phase?

In this stage, the employee leaves the organization. This is an emotionally charged event. Depending on the circumstances, the terminated employee may seek revenge, create havoc, or take information with him. Don’t assume that a termination is friendly even if the employee resigns for personal reasons or is retiring. Many organizations have painfully discovered that employees who left their company voluntarily or because of layoffs have retained access to corporate applications, and some have logged in to corporate resources after leaving the company. In a perfect world, you would like to trust everyone to do the right thing after leaving your organization, but unfortunately, that is not the case.

How termination is handled depends on the specific circumstances and transition arrangements that have been made with the employee. However, in situations where there is any concern that an employee may react negatively to being terminated or laid off, access to the network, internal, and web-based application, email, and company owned social media should be disabled prior to informing the employee. Similarly, if there is any cause for concern associated with a resignation or retirement, all access should be disabled. If the employee is leaving to work for a competitor, the best bet is to escort them off the property immediately. In all cases, make sure not to forget about remote access capabilities.

FYI: The Insider Threat

The insider threat has never been more real. Insiders have a significant advantage over external threat actors. They not only have access to internal resources and information, but they are also aware of the organization’s policies, procedures, and technology (and potential gaps in those policies, procedures, and technologies). The risk of insider threats requires a different strategy from other cybersecurity challenges. This is because of their inherent nature. The Computer Emergency Response Team (CERT) Insider Threat Center at Carnegie Mellon’s Software Engineering Institute (SEI) has many resources that were created to help you identify potential and realized insider threats in your organization, institute ways to prevent and detect them, and establish processes to deal with them if they do happen.

You can obtain more information about CERT’s Insider Threat Center at: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=91513.

In Practice

Employee Termination Policy

Synopsis: Information assets and systems must be protected from terminated employees.

Policy Statement:

  • Upon the termination of the relationship between the company and any employee, all access to facilities and information resources shall cease.

  • In the case of unfriendly termination, all physical and technical access will be disabled pre-notification.

  • In the case of a friendly termination, including retirement, the Office of Human Resources is responsible for determining the schedule for disabling access.

  • Termination procedures are to be included in the user provisioning process.

  • The Office of Human Resources and the Office of Information or Cybersecurity are jointly responsible for the user provisioning process.

The Importance of Employee Agreements

It is common practice to require employees, contractors, and outsourcers to sign two basic agreements: a confidentiality agreement (also known as a nondisclosure agreement) and an acceptable use agreement. Confidentiality agreements are in place to protect from unauthorized disclosure of information and are generally a condition of work, regardless of access to information systems. Acceptable use agreements traditionally focus on the proper use of information systems and cover such topics as password management, Internet access, remote access, and handling standards. A growing trend is to augment the agreement-distribution process with training and explanation; the ultimate goal of the acceptable use agreement is to teach the employee the importance of security, obtain commitment, and install organizational values.

What Are Confidentiality or Nondisclosure Agreements?

Confidentiality or non-disclosure agreements are contracts entered into by the employee and the organization in which the parties agree that certain types of information remain confidential. The type of information that can be included is virtually unlimited. Any information can be considered confidential—data, expertise, prototypes, engineering drawings, computer software, test results, tools, systems, and specifications.

Confidentiality agreements perform several functions. First and most obviously, they protect confidential, technical, or commercial information from disclosure to others. Second, they can prevent the forfeiture of valuable patent rights. Under U.S. law and in other countries as well, the public disclosure of an invention can be deemed as a forfeiture of patent rights in that invention. Third, confidentiality agreements define exactly what information can and cannot be disclosed. This is usually accomplished by specifically classifying the information as such and then labeling it appropriately (and clearly). Fourth, confidentiality agreements define how the information is to be handled and for what length of time. Last, they state what is to happen to the information when employment is terminated or, in the case of a third party, when a contract or project ends.

What Is an Acceptable Use Agreement?

An acceptable use agreement is a policy contract between the company and information systems user. By signing the agreement, the user acknowledges and agrees to the rule regarding how he or she must interact with information systems and handle information. It is also a teaching document that should reinforce the importance of cybersecurity to the organization. Another way to think about an acceptable use agreement is that it is a condensed version of the entire cybersecurity policy document specifically crafted for employees. It contains only the policies and standards that pertain to them and is written in language that can be easily and unequivocally understood. SANS has a sample acceptable use policy in its Information Security Policy Templates website at https://www.sans.org/security-resources/policies.

Components of an Acceptable Use Agreement

An acceptable use agreement should include an introduction, information classifications, categorized policy statements, data-handling standards, sanctions for violations, contacts, and an employee acknowledgment:

  • The introduction sets the tone for the agreement and emphasizes the commitment of the leadership of the organization.

  • Data classifications define (and include examples of) the classification schema adopted by the organization.

  • Applicable policy statements include Authentications & Password Controls, Application Security, Messaging Security (including email, instant message, text, and video conferencing), Internet Access Security, Remote Access Security, Mobile Device Security, Physical Access Security, Social Media, Incident Use of Information Resources, Expectation of Privacy, and Termination.

  • Handling standards dictate by classification level how information must be stored, transmitted, communicated, accessed, retained, and destroyed.

  • Contacts should include to whom to address questions, report suspected security incidents, and report security violations.

  • The Sanctions for Violations section details the internal process for violation as well as applicable civil and criminal penalties for which the employee could be liable.

  • The Acknowledgment states that the user has read the agreement, understands the agreement and the consequences of violation, and agrees to abide by the policies presented. The agreement should be dated, signed, and included in the employee permanent record.

In Practice

Employee Agreements Policy

Synopsis: All employees and third-party personnel not otherwise covered by contractual agreement are required to agree to Confidentiality and Acceptable Use requirements.

Policy Statement:

  • All employees must be provided with and sign a confidentiality agreement as a condition of employment and prior to being provided any company information classified as protected, confidential, or internal use.

  • All employees must be provided with and sign an acceptable use agreement as a condition of employment and prior to being granted access to any company information or systems.

  • The documents provided to the employee will clearly state the employees’ responsibilities during both employment and post-employment.

  • The employee’s legal rights and responsibilities will be included in the document.

  • Legal counsel is responsible for developing, maintaining, and updating the confidentiality agreement.

  • The Office of Information or Cybersecurity is responsible for developing, maintaining, and updating the acceptable use agreement.

  • The Office of Human Resources is responsible for distributing the agreement and managing the acknowledgment process.

The following is a real-life example of a Confidentiality and Acceptable Use Policy of the City of Chicago: https://www.cityofchicago.org/content/dam/city/depts/doit/supp_info/ConfidentialityandAcceptableUsePolicyV50Accessible.pdf.

The Importance of Security Education and Training

NIST Special Publication 800-50: Building an Information Technology Security Awareness and Training Program succinctly defines why security education and training is so important:

“Federal agencies and organizations cannot protect the confidentiality, integrity, and availability of information in today’s highly networked systems environment without ensuring that all people involved in using and managing IT:

  • Understand their roles and responsibilities related to the organizational mission;

  • Understand the organization’s IT security policy, procedures, and practices;

  • Have at least adequate knowledge of the various management, operational, and technical controls required and available to protect the IT resources for which they are responsible.

“The ‘people factor’—not technology—is key to providing an adequate and appropriate level of security. If people are the key, but are also a weak link, more and better attention must be paid to this ‘asset.’

“A strong IT security program cannot be put in place without significant attention given to training agency IT users on security policy, procedures, and techniques, as well as the various management, operational, and technical controls necessary and available to secure IT resources. In addition, those in the agency who manage the IT infrastructure need to have the necessary skills to carry out their assigned duties effectively. Failure to give attention to the area of security training puts an enterprise at great risk because security of agency resources is as much a human issue as it is a technology issue.

“Everyone has a role to play in the success of a security awareness and training program, but agency heads, Chief Information Officers (CIOs), program officials, and IT security program managers have key responsibilities to ensure that an effective program is established agency wide. The scope and content of the program must be tied to existing security program directives and established agency security policy. Within agency IT security program policy, there must exist clear requirements for the awareness and training program.”

In addition, NIST created the National Initiative for Cybersecurity Education (NICE) and defined it NIST Special Publication 800-181. The NICE Cybersecurity Workforce Framework (NICE Framework) is designed to provide guidance on how to identify, recruit, develop, and retain cybersecurity talent. According to NIST, “it is a resource from which organizations or sectors can develop additional publications or tools that meet their needs to define or provide guidance on different aspects of workforce development, planning, training, and education.”

Details about the NICE Cybersecurity Workforce Framework can be obtained at the NIST Special Publication 800-181, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf, and at the NICE Framework website: https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework.

Influencing Behavior with Security Awareness

Security awareness is defined in NIST Special Publication 800-16 as follows: “Awareness is not training. The purpose of awareness presentations is simply to focus attention on security. Awareness presentations are intended to allow individuals to recognize IT security concerns and respond accordingly.” Security awareness programs are designed to remind the user of appropriate behaviors. In our busy world, sometimes it is easy to forget why certain controls are in place. For example, an organization may have access control locks to secure areas. Access is granted by entering a PIN on the lock pad or perhaps using a swipe card. If the door doesn’t click shut or someone enters at the same time, the control is effectively defeated. A poster reminding us to check to make sure the door is shut completely is an example of an awareness program.

Teaching a Skill with Security Training

Security training is defined in NIST Special Publication 800-16 as follows: “Training seeks to teach skills, which allow a person to perform a specific function.” Examples of training include teaching a system administrator how to create user accounts, training a firewall administrator how to close ports, or training an auditor how to read logs. Training is generally attended by those tasked with implementing and monitoring security controls. You may recall from previous chapters that the person charged with implementing and maintaining security controls is referred to as the information custodian.

Security Education Is Knowledge Driven

Security education is defined in NIST Special Publication 800-16 as follows: “The ‘Education’ level integrates all of the security skills and competencies of the various functional specialties into a common body of knowledge, adds a multidisciplinary study of concepts, issues, and principles (technological and social), and strives to produce IT security specialists and professionals capable of vision and pro-active response.”

Education is management-oriented. In the field of cybersecurity, education is generally targeted to those who are involved in the decision-making process: classifying information, choosing controls, and evaluating and reevaluating security strategies. The person charged with these responsibilities is often the information owner.

In Practice

Cybersecurity Training Policy

Synopsis: All employees, contractors, interns, and designated third parties must receive training appropriate to their position throughout their tenure.

Policy Statement:

  • The Human Resources department is responsible for cybersecurity training during the employee orientation phase. The training must include compliance requirements, company policies, and handling standards.

  • Subsequent training will be conducted at the departmental level. Users will be trained on the use of departmental systems appropriate to their specific duties to ensure that the confidentiality, integrity, and availability (CIA) of information is safeguarded.

  • Annual cybersecurity training will be conducted by the Office of Information or Cybersecurity. All staff is required to participate, and attendance will be documented. At a minimum, training will include the following topics: current cybersecurity-related threats and risks, security policy updates, and reporting of security incidents.

  • The company will support the ongoing education of cybersecurity personnel by funding attendance at conferences, tuition at local colleges and universities, subscriptions to professional journals, and membership in professional organizations.

FYI: Small Business Note

Many small businesses treat employees like family. They are uncomfortable with the idea of background checks, confidentiality agreements, or acceptable use agreements. They don’t want to give the impression that their employees are not trusted. Small business owners need to recognize human resources security practices as positive safeguards designed to protect the long-term health of the company and, in turn, their employees.

Background verification, confidentiality agreements, and acceptable use agreements may be even more important in small organizations than in a large one. Small business employees often wear many hats and have access to a wide range of company information and system. Misuse, disclosure, or actions that result in compromise or exposure could easily devastate a small business. Small businesses don’t have to go it alone. A number of reputable and affordable third-party service providers can assist with recruiting, conduct background checks, and craft appropriate agreements on behalf of the organization.

Summary

Personnel security needs to be embedded in each stage of the employee life cycle—recruitment, onboarding, user provisioning, orientation, career development, and termination. It is the responsibility of the organization to deliver the message that security is a priority even before an employee joins the organization. Job postings, job descriptions, and even the interview process need to reflect an organizational culture committed to cybersecurity. Most important, companies need to protect candidate data, including NPPI, demographics, work history, accomplishments, education, compensation, previous employer feedback, references, clearances, and certifications. If the candidate is hired, the obligation extends to employee information.

Prior to hire, candidates should be subject to background checks, which may include criminal record, credit record, and licensure verification. Employers should request consent prior to conducting background checks. There are legal limits on the information that can be used to make employment decisions. Rules to be aware of include worker’s right to privacy, social media restrictions, and regulatory restraints related to credit, bankruptcy, workers compensation, and medical information.

Many U.S. government jobs require that the prospective employee have the requisite security clearance and, in addition to the standard screening, the employer will investigate an individual’s loyalty, character, trustworthiness, and reliability to ensure that he or she is eligible for access to national security–related information.

Confidentiality and acceptable use agreements should be a condition of employment. A confidentiality agreement is a legally binding obligation that defines what information can be disclosed, to whom, and within what time frame.

An acceptable use agreement is an acknowledgment of organization policy and expectations. An acceptable use agreement should include information classifications, categorized policy statements, data-handling standards, sanctions for violations, and contact information for questions. The agreement should disclose and clearly explain the organization’s privacy policy and the extent of monitoring the employee should expect. Training and written acknowledgment of rights and responsibilities should occur prior to being granted access to information and information systems. Organizations will reap significant benefits from training users throughout their tenure. Security awareness programs, security training, and security education all serve to reinforce the message that security is important. Security awareness programs are designed to remind the user of appropriate behaviors. Security training teaches specific skills. Security education is the basis of decision making.

From a security perspective, termination is fraught with danger. How termination is handled depends on the specific circumstances and transition arrangements that have been made with the employee. Regardless of the circumstance, organizations should err on the side of caution and disable or remove network, internal, web-based application, email, and company-owned social media rights as soon as possible.

Human Resources policies include job recruitment, personnel screening, employee agreements, user provisioning, electronic monitoring, cybersecurity training, and employee termination.

Test Your Skills

Multiple Choice Questions

1. Which of the following statements best describes the employee life cycle?

A. The employee life cycle spans recruitment to career development.

B. The employee life cycle spans onboarding to orientation.

C. The employee life cycle spans user provision to termination.

D. The employee life cycle spans recruitment to termination.

2. At which of the following phases of the hiring process should personnel security practices begin?

A. Interview

B. Offer

C. Recruitment

D. Orientation

3. A published job description for a web designer should not include which of the following?

A. Job title

B. Salary range

C. Specifics about the web development tool the company is using

D. Company location

4. Data submitted by potential candidates must be ____________.

A. protected as required by applicable law and organizational policy

B. not protected unless the candidate is hired

C. stored only in paper form

D. publicly accessible

5. During the course of an interview, a job candidate should be given a tour of which of the following locations?

A. The entire facility

B. Public areas only (unless otherwise authorized)

C. The server room

D. The wiring closet

6. Which of the following facts is an interviewer permitted to reveal to a job candidate?

A. A detailed client list

B. The home phone numbers of senior management

C. The organization’s security weaknesses

D. The duties and responsibilities of the position

7. Which of the following statements best describes the reason for conducting background checks?

A. To verify the truthfulness, reliability, and trustworthiness of the applicant

B. To find out if the applicant ever got in trouble in high school

C. To find out if the applicant has a significant other

D. To verify the applicant’s hobbies, number of children, and type of house

8. Which of the following is not a background check type?

A. Credit history

B. Criminal history

C. Education

D. Religious or Political

9. Social media profiles often include gender, race, and religious affiliation. Which of the following statements best describes how this information should be used in the hiring process?

A. Gender, race, and religious affiliation can legally be used in making hiring decisions.

B. Gender, race, and religious affiliation cannot legally be used in making hiring decisions.

C. Gender, race, and religious affiliation are useful in making hiring decisions.

D. Gender, race, and religious affiliation listed in social media profiles should not be relied upon because they may be false.

10. Under the Fair Credit Reporting Act (FCRA), which of the following statements is true?

A. Employers cannot request a copy of an employee’s credit report under any circumstances.

B. Employers must get the candidate’s consent to request a credit report.

C. Employers cannot use credit information to deny a job.

D. Employers are required to conduct credit checks on all applicants.

11. Candidate and employee NPPI must be protected. NPPI does not include which of the following?

A. Social security number

B. Credit card number

C. Published telephone number

D. Driver’s license number

12. Which of the following statements best describes the purpose of completing Department of Homeland Security/U.S. Citizenship and Immigration Services Form I-9 and providing supporting documentation?

A. The purpose is to establish identity and employment authorization.

B. The purpose is to determine tax identification and withholding.

C. The purpose is to document educational achievements.

D. The purpose is to verify criminal records.

13. The permissions and access rights a user is granted should match the user’s role and responsibilities. Who is responsible for defining to whom access should be granted?

A. The data user

B. The data owner

C. The data custodian

D. The data author

14. Network administrators and help desk personnel often have elevated privileges. They are examples of which of the following roles?

A. The data owners

B. The data custodians

C. The data authors

D. The data sellers

15. Which of the following statements is not true of confidentiality agreements?

A. Confidentiality/nondisclosure agreements are legal protection against unauthorized use of information.

B. Confidentiality/nondisclosure agreements are generally considered a condition of work.

C. Confidentiality/nondisclosure agreements are legally binding contracts.

D. Confidentiality agreements should be required only of top-level executives.

16. Which of the following elements would you expect to find in an acceptable use agreement?

A. Handling standards

B. A lunch and break schedule

C. A job description

D. An evacuation plan

17. Which of the following statements best describes when acceptable use agreements should be reviewed, updated, and distributed?

A. Acceptable use agreements should be reviewed, updated, and distributed only when there are organizational changes.

B. Acceptable use agreements should be reviewed, updated, and distributed annually.

C. Acceptable use agreements should be reviewed, updated, and distributed only during the merger and acquisition due diligence phase.

D. Acceptable use agreements should be reviewed, updated, and distributed at the discretion of senior management.

18. Which of the following is true about the NICE Cybersecurity Workforce Framework (NICE Framework)?

A. NICE is designed to provide guidance on how to implement the NIST Cybersecurity Framework.

B. NICE is designed to provide guidance on how to identify, recruit, develop, and retain cybersecurity talent.

C. NICE is designed to provide guidance on how to onboard new employees and delete accounts for departing personnel.

D. NICE is designed to provide guidance on how to create cybersecurity programs to maintain compliance with regulations.

19. Posters are placed throughout the workplace reminding users to log off when leaving their workstations unattended. This is an example of which of the following programs?

A. A security education program

B. A security training program

C. A security awareness program

D. None of the above

20. A network engineer attends a one-week hands-on course on firewall configuration and maintenance. This is an example of which of the following programs?

A. A security education program

B. A security training program

C. A security awareness program

D. None of the above

21. The Board of Directors has a presentation on the latest trends in security management. This is an example of which of the following programs?

A. A security education program

B. A security training program

C. A security awareness program

D. None of the above

22. Companies have the legal right to perform which of the following activities?

A. Monitor user Internet access from the workplace

B. Place cameras in locker rooms where employees change clothes

C. Conduct a search of an employee’s home

D. None of the above

23. Sanctions for policy violations should be included in which of the following documents?

A. The employee handbook

B. A confidentiality/nondisclosure agreement

C. An acceptable use agreement

D. All of the above

24. Studies often cite ____________ as the weakest link in cybersecurity.

A. policies

B. people

C. technology

D. regulations

25. Which of the following is not a component of an Acceptable Use Agreement?

A. Handling standards

B. Sanctions for violations

C. Acknowledgment

D. Social media monitoring

26. Which of the following is a privacy regulation that has a goal to protect citizens’ personal data and simplify the regulatory environment for international business by unifying the regulation within the European Union?

A. European Union General Data Protection Regulation (GDPR)

B. European Union PCI Council

C. European Union Gramm-Leach-Bliley Act (GLBA)

D. Privacy Data Protection of the European Union (PDPEU)

27. Which of the following regulations specifically stipulates that schools must have written permission to release any information from a student’s education record?

A. FERPA

B. HIPAA

C. DPPA

D. FISMA

28. Best practices dictate that employment applications should not ask prospective employees to provide which of the following information?

A. Last grade completed

B. Current address

C. Social security number

D. Email address

29. After a new employee’s retention period has expired, completed paper employment applications should be ___________.

A. cross-cut shredded

B. recycled

C. put in the trash

D. stored indefinitely

30. Threat actors might find job posting information useful for which of the following attacks?

A. A distributed denial of service attack (DDoS) attack

B. A social engineering attack

C. A man-in-the-middle attack

D. An SQL injection attack

Exercises

Exercise 6.1: Analyzing Job Descriptions
  1. Access an online job-posting service such as Monster.com.

  2. Find two IT-related job postings.

  3. Critique the postings. Do they reveal any information that a potential intruder could use in designing an attack, such as the specific technology or software used by the organization, security controls, or organizational weaknesses?

  4. Document your findings.

Exercise 6.2: Assessing Background Checks
  1. Go online and locate one company that provides background checks.

  2. What types of investigative services does it offer?

  3. What information do you have to provide to it?

  4. What is the promised delivery time?

  5. Does the company require permission from the target of the investigation?

Exercise 6.3: Learning What Your Social Media Says About You
  1. What can a potential employer learn about you from your social media activities?

  2. Look at the profile of a friend or acquaintance. What can a potential employer learn about him or her?

  3. Investigate what recent events have led to more privacy regulations and scrutiny.

Exercise 6.4: Evaluating the Actions of Bad Employees
  1. Locate a news article about a terminated or disgruntled employee who stole, exposed, compromised, or destroyed company information.

  2. What could the company have done to prevent the damage?

  3. In your opinion, what should be the consequences of the employee action?

Exercise 6.5: Evaluating Security Awareness Training
  1. Either at your school or your place of work, locate and document at least one instance of a security awareness reminder.

  2. In your opinion, is the reminder effective? Explain why or why not.

  3. If you can’t locate an example of a security awareness reminder, compose a memo to senior management suggesting one.

Exercise 6.6: Protecting Job Candidate Data
  1. Companies have an obligation to protect the information provided by job seekers. The General Electric (GE) Candidate Privacy Notice (found at https://www.ge.com/careers/privacy) is a good example of how multinational companies approach the handling of candidate data. Read the Candidate Privacy Notice.

  2. In your opinion, does the privacy notice cover all items that will make you feel comfortable sharing information with GE? Explain why or why not.

  3. The notice reads “GE may transfer Candidate Data to external third-party providers performing certain services for GE. Such third-party providers have access to Candidate Data solely for the purposes of performing the services specified in the applicable service contract, and GE requires the providers to undertake security measures consistent with the protections specified in this Notice.” As a job applicant, will this make you comfortable? Explain why or why not.

  4. Try to find similar job candidate privacy notices from other companies, and write a report comparing the approach of these companies.

Projects

Project 6.1: Evaluating the Hiring Process
  1. Contact a local business and ask to speak with the Human Resources manager or hiring manager. Explain you are a college student working on a report and explain the information you need (see step 4) to complete the report. Request a 15-minute meeting.

  2. At the meeting, ask the manager to explain the company’s hiring process. Be sure to ask what (if any) background checks the company does and why. Also ask for a copy of a job application form. Don’t forget to thank the person for his or her time.

  3. After the meeting, review the application form. Does it include a statement authorizing the company to conduct background checks? Does it ask for any NPPI?

  4. Write a report that covers the following:

    • Summary of meeting logistics (whom you met with, where, and when)

    • Summary of hiring practices

    • Summary of any information shared with you that you would classify as protected or confidential (do not include specifics in your summary).

Project 6.2: Evaluating an Acceptable Use Agreement
  1. Locate a copy of your school or workplace acceptable use agreement (or equivalent document).

  2. Write a critique of the agreement. Do you think that it includes enough detail? Does it explain why certain activities are prohibited or encouraged? Does it encourage users to be security conscious? Does it include sanction policy? Does it clearly explain the employee expectation of privacy? Can you tell when it was last updated? Are there any statements that are out of date?

  3. Go back to Chapter 2, “Cybersecurity Policy Organization, Format, and Styles,” and review the sections on using plain language. Edit the agreement so that it conforms with plain language guidelines.

Project 6.3: Evaluating Regulatory Training
  1. Go online and locate an example of HIPAA security awareness training and GLBA security awareness training. (Note: You can use the actual training or an outline of topics.)

  2. Document the similarities and differences.

Case Study: The NICE Challenge Project and CyberSeek

NIST has created a project called the NICE Challenge Project (https://nice-challenge.com/) with the goal of developing “virtual challenges and environments to test students and professionals alike on their ability to perform NICE Cybersecurity Workforce Framework tasks and exhibit their knowledge, skills, and abilities.” The NICE Challenge Project has dozens of unique challenges available for students and cybersecurity professionals.

In addition, NIST has created a website called CyberSeek (cyberseek.org). CyberSeek provides “detailed, actionable data about supply and demand in the cybersecurity job market.” One of the main features of the CyberSeek website is the ability to track data on cybersecurity job demand overall and within the public and private sectors. The CyberSeek career pathway helps both students and professionals interested in cybersecurity careers and employers looking to fill job openings.

  1. Assume that you are working in a large corporation and that you have been tasked with the following:

    1. Create a security awareness campaign focused on this topic. Include in this plan specifics on how you intend to deliver the message.

    2. Create at least one piece of supporting collateral.

    3. Design a way to test the effectiveness of your message.

  2. Before launching the campaign, you want to make sure you have the full support of the executive management.

    1. What type of “educational” program would you develop for management?

    2. What would the message be?

  3. Explain how the NICE Framework can be used to develop employees from your organization and how you can also benefit from CyberSeek to recruit new talent. Provide examples.

References

“Employee Life Cycle,” Search Financial Applications, accessed 05/2018, http://searchhrsoftware.techtarget.com/definition/employee-life-cycle.

“Obtaining Security Clearance,” Monster.com, accessed 05/2018, http://govcentral.monster.com/security-clearance-jobs/articles/413-how-to-obtain-a-security-clearance.

Changes to employee data management under the GDPR, accessed 05/2018, https://www.taylorwessing.com/globaldatahub/article-changes-to-employee-data-management-under-the-gdpr.html.

“2017 Trends in Recruiting via Social Media,” HireRight, accessed 05/2018, http://www.hireright.com/blog/2017/05/2017-trends-in-recruiting-via-social-media/.

The CERT Insider Threat Center at Carnegie Mellon’s Software Engineering Institute (SEI), accessed 05/2018, https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=91513.

The NICE Framework, accessed 05/2018, https://www.nist.gov/itl/applied-cybersecurity/nice.

CyberSeek, NIST, accessed 05/2018, http://cyberseek.org.

Regulations Cited

The European Union General Data Protection Regulation (GDPR), accessed 05/2018, https://www.eugdpr.org.

“26 U.S.C. 6103: Confidentiality and Disclosure of Returns and Return Information,” accessed 05/2018, https://www.gpo.gov/fdsys/granule/USCODE-2011-title26/USCODE-2011-title26-subtitleF-chap61-subchapB-sec6103/content-detail.html.

“Americans with Disabilities Act (ADA),” official website of the United States Department of Justice, Civil Rights Division, accessed 05/2018, https://www.ada.gov/2010_regs.htm.

“Fair Credit Reporting Act (FCRA). 15 U.S.C. 1681,” accessed 05/2018, https://www.ecfr.gov/cgi-bin/text-idx?SID=2b1fab8de5438fc52f2a326fc6592874&mc=true&tpl=/ecfrbrowse/Title16/16CIsubchapF.tpl.

“Family Educational Rights and Privacy Act (FERPA),” official website of the U.S. Department of Education, accessed 05/2018, https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html.

“Immigration Reform and Control Act of 1986 (IRCA),” official website of the U.S. Department of Homeland Security, U.S. Citizenship and Immigration Services, accessed 05/2018, https://www.uscis.gov/.

“Public Law 108–159: Dec. 4, 2003 Fair and Accurate Credit Transactions Act of 2003,” accessed 05/2018, www.gpo.gov/fdsys/pkg/PLAW-108publ159/.../PLAW-108publ159.pdf.

“Public Law No. 91-508: The Fair Credit Reporting Act,” accessed 05/2018, https://www.ecfr.gov/cgi-bin/text-idx?SID=2b1fab8de5438fc52f2a326fc6592874&mc=true&tpl=/ecfrbrowse/Title16/16CIsubchapF.tpl.

“Sarbanes-Oxley Act—SoX,” accessed 05/2018, http://uscode.house.gov/download/pls/15C98.txt https://www.sec.gov/about/laws/soa2002.pdf.

“U.S. Department of Homeland Security and U.S. Citizenship and Immigration Services, Instructions for Employment Eligibility Verification,” accessed 05/2018, https://www.uscis.gov/i-9.

“U.S. Department of the Treasury and Internal Revenue Service, 2017 General Instructions for Forms W-2 and W-3,” accessed 05/2018, https://www.irs.gov/pub/irs-pdf/iw2w3.pdf.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.1.158