Thousands of users have entrusted I9everywhere with their employee data, and we make it a
priority to take our users’ security and privacy concerns seriously.

We strive to ensure that user data is handled securely. I9everywhere uses some of the most advanced technology for Internet security that is commercially available today. This Security Statement is aimed at being transparent about our security infrastructure and practices, to help reassure you that your data is appropriately protected.

User Security
Authentication: User data on our database is logically segregated by account-based access rules. User accounts have unique usernames and passwords that must be entered each time a user logs on. I9everywhere issues a session cookie only to record encrypted authentication information for the duration of a specific session. The session cookie does not include the password of the user.
Passwords: User application passwords have minimum complexity requirements. Passwords are individually salted and hashed.
Data Encryption: Sensitive user data, such as credit card details, account passwords, social security numbers, and other employee information are stored in encrypted format. Data Residency: All I9everywhere user data is stored on servers located in the United States.

Physical Security
All I9Everywhere information systems and infrastructure are hosted in world-class data centers. These data centers include all the necessary physical security controls you would expect in a data center (e.g., 24×7 monitoring, cameras, visitor logs, entry requirements). These data centers are SOC 2 accredited.

Availability
Connectivity: Fully redundant IP network connections with multiple independent connections to a range of Tier 1 Internet access providers.
Power: Servers have redundant internal and external power supplies. Data centers have backup power supplies, and are able to draw power from the multiple substations on the grid, several diesel generators, and backup batteries.
Uptime: Continuous uptime monitoring, with immediate escalation to i9Everywhere staff for any downtime.
Failover: Our database is replicated in real-time and can failover in less than an hour.
Backup Frequency: Backups occur daily at multiple geographically disparate sites.
Network Security Testing: System functionality and design changes are verified in an isolated test “sandbox” environment and subject to functional and security testing prior to deployment to active production systems.
Firewalls: Firewalls restrict access to all ports except 80 (http) and 443 (https).
Access Control: Secure VPN, 2FA (two-factor authentication), and role-based access is enforced for systems management by authorized engineering staff.
Logging and Auditing: Central logging systems capture and archive all internal systems access including any failed authentication attempts.
Encryption in Transit: By default, our websites have Transport Layer Security (TLS) enabled to encrypt respondent traffic. All other communications with the i9everywhere.com website are sent over TLS connections, which protects communications by using both server authentication and data encryption. This ensures that user data in transit is safe, secure, and available only to intended recipients. Our application endpoints maintain an “A” rating on SSL Labs’ tests.
We also employ Forward Secrecy and only support strong ciphers for added privacy and security.

Vulnerability Management
Patching: The latest security patches are applied to all operating systems, applications, and network infrastructure to mitigate exposure to vulnerabilities.
Third Party Scans: Our environments are continuously scanned using best-of-breed security tools. These tools are configured to perform application and network vulnerability assessments, which test for patch status and basic misconfigurations of systems and sites.
Penetration Testing: External organizations perform penetration tests annually.
Organizational & Administrative Security Information Security Policies: We maintain internal information security policies, including incident response plans, and regularly review and update them.
Employee Screening: We perform background screening on all employees.
Training: We provide security and technology use training for employees.
Service Providers: We screen our service providers and bind them under contract to appropriate confidentiality and security obligations if they deal with any user data.
Access: Access controls to sensitive data in our databases, systems, and environments are set on a need-to-know / least privilege necessary basis.
Audit Logging: We maintain and monitor audit logs on our services and systems.

Software Development Practices
Stack: We code in MVC .NET and run on MS SQL Server, and Windows.
Coding Practices: Our engineers use best practices and industry-standard secure coding guidelines which align with the OWASP Top 10.
Deployment: We deploy code dozens of times during the week, giving us the ability to react quickly in the event a bug or vulnerability is discovered within our code.

Handling of Security Breaches
Despite best efforts, no method of transmission over the Internet and no method of electronic storage is perfectly secure. We cannot guarantee absolute security. However, if i9Everywhere learns of a security breach, we will notify affected users so that they can take appropriate protective steps. Our breach notification procedures are consistent with our obligations under various state and federal laws and regulations, as well as any industry rules or standards that we adhere to. Notification procedures include providing email notices or posting a notice on our website if a breach occurs.

Department of Homeland Security (DHS)

Learn more about about data privacy and integrity standards at DHS

 

U.S. Citizenship and Immigration Services (USCIS)

Learn more about USCIS’s I-9 Central, I-9 process and federal guidelines.