Feeds

The Facebook job test: Now interviewers want your logins

Need work? Better hand over that password

Beginner's guide to SSL certificates

HPC blog When I wrote this blog about how a recent research study correlated social network behavior with employee success, I speculated that we’d soon see employers trying to circumvent Facebook’s privacy policies in order to get a good look at your Facebook pages.

Well, it turns out that some employers aren’t happy with just seeing the public part of applicant profiles; they’re actually asking prospective employees to turn over their Facebook login and password. Wait, did I get that right? (Looks again.) Yeah, I did. They’re outright asking applicants to give them their Facebook login details as part of the interview screening process.

Other companies are requesting that prospective (and presumably current) employees "friend" HR reps or background-checkers on Facebook. Others are requiring applicants to log in to their Facebook accounts from a company-owned computer – I guess they take screen scrapes of the page for later study, or maybe capture the login keystrokes.

If a company requires you to give them an intimate view of your social networking pages during the interview process, might there be something in the employment agreements that gives them the “right” to take a second, third, or fourth look – whenever they want to – after you’re hired?

All of these practices (and more) are outlined in this Associated Press article.

There’s a fine line between vetting candidates and invading their privacy. In my mind, much of what these companies are asking isn’t just stepping over the line – it’s grabbing the line and flailing you with it.

Others are requiring employees to sign non-disparagement agreements to prevent them from pouring slime on the company in social nets during or after employment. It will be highly interesting to see if – and how – any of these agreements are enforced. "Disparagement" is very much in the eye of the beholder, and often hard to objectively define.

If you work in a restaurant and write a post alleging that your co-workers put unspeakable things in the Friday lunch special, that’s pretty clear-cut disparagement. But if you simply post that you wish the restaurant were better supervised, so that employees can’t put unspeakable things in the Friday lunch special – is that disparaging? Yeah, it probably is, even if it’s true.

We all have to assume that anything we put on the web is something that our employer – or mother – will be able to see. (Well, not my mother. I just spent 27 minutes on the phone talking her through playing a DVD on her TV. I’m a nice boy, though – barely yelled at all.)

I think that we’ll see a few trends emerge from this level of social networking scrutiny. First, employees and prospective employees will pay more attention to what they post and what they allow on their pages. Second, I think that more people will have private social network personas, using secondary accounts under nicknames or pseudonyms. (My favorite fake names: "Brody McCracken" and "Dirk Steele", both are guys who make their own rules and don’t care what “The Man” thinks.)

I also predict that corporate HR departments are going to become the new hotbed for fun as they sift through the most embarrassing Facebook pages imaginable, then send around the results tagged with “What the hell were they thinking?” and “Lots of things sound funny when you’re that drunk.” ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.