Book contents
- Frontmatter
- Dedication
- Contents
- Acknowledgments
- Introduction
- 1 Me and My Identity
- 2 You and My Identity (Delegated Relationships)
- 3 Government Registration
- 4 Government Transactions
- 5 Civil Society Registration
- 6 Civil Society Transactions
- 7 Commercial Registration
- 8 Commercial Transactions
- 9 Government Surveillance
- 10 Civil Society Surveillance
- 11 Commercial Surveillance
- 12 Employment Registration
- 13 Employment Transactions
- 14 Employment Surveillance
- 15 Data Broker Industry
- 16 Illicit Market
- Conclusion
- Bibliography
- Index
13 - Employment Transactions
Published online by Cambridge University Press: 04 February 2022
- Frontmatter
- Dedication
- Contents
- Acknowledgments
- Introduction
- 1 Me and My Identity
- 2 You and My Identity (Delegated Relationships)
- 3 Government Registration
- 4 Government Transactions
- 5 Civil Society Registration
- 6 Civil Society Transactions
- 7 Commercial Registration
- 8 Commercial Transactions
- 9 Government Surveillance
- 10 Civil Society Surveillance
- 11 Commercial Surveillance
- 12 Employment Registration
- 13 Employment Transactions
- 14 Employment Surveillance
- 15 Data Broker Industry
- 16 Illicit Market
- Conclusion
- Bibliography
- Index
Summary
Employment transactions are all the logins and authorizations that happen when employees do their job while physically present on site, for example, entering a building for work. It also may happen when they log on to digital systems (Figure 13.1). Individuals present the credentials issued to them by the enterprise, do their work within the context of their employment and in turn are paid.
Relationship to Other Domains
Individuals who become employees and do employment transactions have to go through the process of employment registration first. Once they do employment transactions, they are surveilled by their employers. The next domain is employment surveillance. Data from employment transactions are vulnerable to data breaches and theft, and could end up on the illicit market. It isn't likely that employers are selling employment transaction data to data brokers, but they might be selling data inferred from transaction data to them. Data generated while employed and doing employment transactions might be part of me and my identity data too, in the form of work portfolios and credentials earned as part of employment. One of three types of delegation outlined in the you and my identity domain happens when employers delegate capabilities to individual employees to act on their behalf.
Description
Employment transactions are all employee activities in the context of their work that create digital records. This includes simple things like punching in to a time clock when they arrive at work and clocking out when they leave. If an employer has a door with logical access control, the employee would need to swipe their employer-issued ID card on the door to gain access.
In the process of becoming an employee, individuals are issued an identifier— an employee number. This number is what they use when logging on to the digital systems of the employer. However, this is not enough to get into the systems. They must also present an authentication factor that the employer checks, matching it against the factors of authentication that the employee included in the employee registration.
An identity management system's purpose is to regulate access to resources. Administering employees’ access to sensitive applications and data is a central challenge for today's organizations.
- Type
- Chapter
- Information
- The Domains of IdentityA Framework for Understanding Identity Systems in Contemporary Society, pp. 87 - 90Publisher: Anthem PressPrint publication year: 2020