Book contents
- Frontmatter
- Dedication
- Contents
- Acknowledgments
- Introduction
- 1 Me and My Identity
- 2 You and My Identity (Delegated Relationships)
- 3 Government Registration
- 4 Government Transactions
- 5 Civil Society Registration
- 6 Civil Society Transactions
- 7 Commercial Registration
- 8 Commercial Transactions
- 9 Government Surveillance
- 10 Civil Society Surveillance
- 11 Commercial Surveillance
- 12 Employment Registration
- 13 Employment Transactions
- 14 Employment Surveillance
- 15 Data Broker Industry
- 16 Illicit Market
- Conclusion
- Bibliography
- Index
12 - Employment Registration
Published online by Cambridge University Press: 04 February 2022
- Frontmatter
- Dedication
- Contents
- Acknowledgments
- Introduction
- 1 Me and My Identity
- 2 You and My Identity (Delegated Relationships)
- 3 Government Registration
- 4 Government Transactions
- 5 Civil Society Registration
- 6 Civil Society Transactions
- 7 Commercial Registration
- 8 Commercial Transactions
- 9 Government Surveillance
- 10 Civil Society Surveillance
- 11 Commercial Surveillance
- 12 Employment Registration
- 13 Employment Transactions
- 14 Employment Surveillance
- 15 Data Broker Industry
- 16 Illicit Market
- Conclusion
- Bibliography
- Index
Summary
Employment registration the process that a new hire goes through to begin work with an employer. It starts with the application process where PII is shared from a prospective employee with an employer, there is an evaluation process where more PII might be shared and finally after a job offer is made to an employee they are enrolled in to the enterprise identity and access management system and then issued credentials (Figure 12.1).
Relationship to Other Domains
When individuals seek employment, they go through an employment registration process. They must do this before they start work and do employment transactions. In the process of going through employment registration, they present themselves and their identity, bringing the me and my identity domain into play. Individuals also need to present documents and identifiers from government registration processes. The database of employees and prospective employees from the application process is vulnerable to theft and appearance on the illicit market. Some employment data end up being circulated to data brokers.
Description
This domain is one of three focused on the employment context. In much of the industry, “enterprise identity and access management” is a term of art that combines functions from all three employment domains in this book. This context has been separated into three separate domains to clarify thinking regarding different aspects of identity management in each of them. The purpose of gathering data about employees that are stored in employer databases varies.
What Are Pre-Enrollment Processes?
During the process of seeking employment, individuals share their résumés with employers and fill out application forms. Both contain PII. Employers who regularly hire have systems to track these people and information about them. This is also called applicant surveillance. Many employers will use various types of background checks to vet people before hiring them. These type of checks require PII and the approval of the individuals. The potential employers have a database of this information about people.
Identity Proofing and Credential Verification
Once an employer has decided to hire a person, the employee goes through a process to become registered in the different enterprise systems.
- Type
- Chapter
- Information
- The Domains of IdentityA Framework for Understanding Identity Systems in Contemporary Society, pp. 83 - 86Publisher: Anthem PressPrint publication year: 2020