The pace at which the needs of business and Contingent Workforce Management shift are sometimes staggering. By the time we catch up to one, another rears its head. It can sometimes feel as though it’s a constant game of reacting to problems that are occurring rather than being proactive and seeking and solving those problems before they become an issue. It’s the industry’s equivalent to the Whack a Mole game at a carnival. With that in mind it’s imperative enterprises’ of all sizes take the time to investigate the potential holes in their Contingent Workforce Management processes as often as they can. In the past, there has been heavy focus on issues such as Direct Sourcing, understanding the legal issues surrounding changing legislation such as the Affordable Care Act, or even the heightened focus of government agencies surrounding the issue of worker misclassification and compliance. As we accelerate through what is sure to be another banner year of growth for the Contingent Workforce there is an issue looming on the horizon that will be on the tip of everyone’s tongue by the time we roll into June of this year. That of the process of Identity Management, or IDM. Identity Management refers to “the management of individual principals, their authentication, authorization and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.” In simpler terms, it means
- Who has access to the system?
- What do they have access to?
- Can those who access the system do so efficiently?
- Is sensitive data properly protected?
- Does the system allow the best balance of access, usability, and security in terms of cost savings?
Whether fully integrated already or slowly adopting it, businesses are becoming increasingly mobile. Work is completed in the cloud, collaboration is done over smart phones and tablets, and even “hangouts” have become the lexicon of an increasingly mobile and data based workforce. So the challenge to be faced by those in the business of managing growing percentages of contractors and contingent workers is to balance the need for security regarding sensitive and intellectual data, with the need for efficiency for those who require increased sharing and flexibility in order to complete the tasks and projects businesses require of them. Refer to the graphic below for an illustrated view of the process and workflow of an IDM process.
*Courtesy Identity Automation
The timing of the concern regarding Identity Management is not a complete shock to those who have been following the numbers around the growth in the Contingent Labour Market. According to SIA (Staffing Industry Analysts) 2014 is poised to be a big year for IT, with almost all of the top 10 salary increases for Contingent workers being in the IT field. So, coupled with the boom of demand surrounding expert- skilled workers in IT, and the well documented struggles to find this kind of top talent, there is sure to be more contractors working for multiple companies and having access to multiple systems. What remains to be seen is how prepared enterprises are for this.
A Recent study by Ardent Partners suggest some early warning signs of some potential blind spots in regards to IDM within the current CWM processes of some enterprises.
- While nearly 64% of organizations institute regular reviews of contract labour compliance against requirements only 43% include detailed written assumption of risk of work completion ownership in their SOW’s (Statements of Work)
- Although 70% of enterprises have visibility into system access by contract talent, only 44% have implemented proper compliance measurements during the offboarding phase.
2014 is poised to be the year of the big data enterprise, and do you know who has access to yours?