|Privacy is more than a core value that we as Americans embrace; it’s the law. E-Verify is committed to protecting your privacy and civil liberties with the same rigor that DHS places on protecting our homeland. Privacy principles and security measures are incorporated into all E-Verify processes and procedures and any changes to E-Verify incorporate the highest level of privacy protections possible. .As guardians of your personal information, we want to earn your T.R.U.S.T. We strive to accomplish this by being Transparent with public notices about the information we have and its uses; Responsible in handling information; limiting the Use of information; maintaining its administrative, technical, and physical Security; and properly Training those who handle your information|
E-Verify is making a concerted effort to be transparent to the public about what information is collected and how it is used and protected. E-Verify has published in the Federal Register detailed System of Records Notices (SORN) that spell out all aspects of the program. E-Verify employers display English and Spanish notices of their participation in public locations at their worksites.
All staff, including federal and contractors, are held responsible for handling personal information appropriately according to their official duties. Mishandling of information can be a crime resulting in personal fines to the individual. Employer users are required to abide by all security and privacy requirements as agreed to when they enroll in E-Verify. Attempts to evade the security controls or misuse of the system can result in loss of access to E-Verify.
E-Verify uses the minimum amount of data required to confirm an individual’s identity and work authorization status. Similarly, the minimum of information is returned in response to queries. Information is used solely for determining employment eligibility. Information is only duplicated or shared when necessary to verify status or for law enforcement purposes.
Because of the sensitivity of the information collected and used by E-Verify an extensive set of technical, operational, and physical security controls have been implemented to ensure the integrity, confidentiality, and availability of an individual’s information used by E-Verify. Examples include:
User specific accounts and complex passwords that must be changed often to access the system;
User accounts that are locked after several failed attempts to logon;
Active session timeouts within the E-Verify interface;
Data encryption both at rest and during all data transmissions between the employer’s workstation and the system;
Procedures for reporting and responding to breaches of information.
Users must take an online tutorial and pass the mastery test at the end of the tutorial before they can use E-Verify to verify employment eligibility. This training and mastery test ensure that users understand the proper use and handling of E-Verify information. Additionally, all DHS employees are also required to take and pass annual computer and privacy awareness training that addresses the handling of shared personal information.