MSU Human Resources >> Ua >> I9 >> Training and security access to electronic I-9 system


Training & security access to electronic I-9 system

User security access for the electronic I-9 system is managed by departmental IT Services Access Approvers using the D6501 Security System to add or remove access. The information in the electronic I-9 system is highly confidential and should only be granted to those I-9 verifiers directly responsible for completing the Form I-9. If you have questions about granting this access, please contact IT Services – Access Management.

Access will be effective the day after the departmental IT Services Security Contact adds the user to the HR I-9 security role in D6501.

There are several prerequisites for gaining access to the electronic I-9 system. It is the responsibility of the IT Services Security contacts to make sure all users meet the requirements below:

  1. Has the user completed the I-9 compliance video and training and provided a certificate of completion?

  2. Has the I-9 verifier read the Michigan State University Institutional Data Policy and printed and signed the Institutional Data Policy Acknowledgement Form (PDF)?

  3. Has the security administrator received signed verification that both of the above conditions have been met? 

    The employee's supervisor can complete an electronic I-9 System access request form. Once logged into the Access Management system, you can scroll to the access form labeled I-9 System. Up to ten users can be entered on the access request form as long as the role and location codes requested for the users is the same. The I-9 Compliance certificate and signed Institutional Data Policy Acknowledgement Form must be provided to the security administrator for your unit. The security administrator must keep these signed documents on file for all I-9 verifiers. Units are responsible for completing the Form I-9 in accordance with federal law(s). Failure to comply with proper procedures may result in penalties and/or fines.

    The IT Services Security Contact may complete the paper ARM (or print the completed I-9 System access form) and keep that document and the signed prerequisite documents on file for any user for whom they grant access.

Procedures and documents


 

©