In this article, we address how employers can respond in the immediate aftermath of discovering a fraudulent employee and their considerations moving forward.

Quick Hits

  • Employers may want to take immediate action to terminate an individual’s access and privileges as soon as they determine the individual is a fraudulent employee.
  • Employers may also want to promptly involve trusted IT and legal personnel to conduct a forensic evaluation of the employee’s activity on the company’s systems.
  • If the evaluation identifies unauthorized access to company files, or exfiltration of files from the company’s environment, consider treating the issue as a potential data security incident and proceed accordingly.

1. Taking Immediate Action

Employers discover fraudulent employees in various ways. Frequently, an employer will identify an employee as fraudulent after seeing the individual in an on-camera meeting and realizing the employee on camera is not the individual who interviewed for and was hired for the job. Or sometimes employers learn they have hired a fraudulent employee after they are contacted by law enforcement, a government agency, or even the individual whose identity is being fraudulently used to alert them of the issue.

In all instances, however, once an employer has investigated and determined that an employee is fraudulent, employers can mitigate the situation by taking quick action, such as:

  • suspending the fraudulent employee’s system access, email, and other application credentials, network logins, and physical access to the workplace (if relevant);
  • preserving evidence, including logs, system snapshots, audit trails, and HR files, and, where possible, creating a forensic image of the employee’s company-owned devices to preserve their state;
  • launching a forensic investigation with internal risk-owners, such as IT and legal, including to review endpoint activity or similar logs, locate any evidence that malicious software was installed, and identify any unusual behavior associated with the employee’s account, including unexpected files accessed or removed by the fraudulent employee; and
  • retrieving any company-issued devices, badges, keys, and credentials. Note, employers may even want to ask remote employees to return company-owned devices. Often, fraudulent employees will return company devices.

Employers may wish to document all immediate responsive activity, including steps taken, with timestamps and a record of the decision-making chain.

2. Assessing Data Security Implications

A fraudulent employee on an employer’s payroll isn’t just a human-resources embarrassment: depending on the actions the individual took on the employer’s system, the business may need to consider whether additional data security considerations are implicated. If the forensic review uncovers evidence that the employee accessed repositories containing sensitive or regulated data, exfiltrated files, or otherwise engaged in unusual or malicious behavior, it would be appropriate to evaluate the incident from a data breach perspective.

To do this, the business may wish to (and, depending upon the jurisdiction, may have a legal obligation to):

  • inventory the folders and files accessed by the individual and, for each system, determine whether any sensitive or regulated data (including, but not limited to, Social Security numbers, government ID numbers, financial information) was accessed or removed;
  • evaluate whether the business has a legal obligation to notify individuals, state or federal regulators, or even credit reporting agencies of the incident, if the business’s review indicates that the fraudulent employee accessed sensitive or regulated data; and
  • document the decision-making process and retain supporting evidence regardless of notification obligation.

3. Auditing Hiring Processes and Data Security Practices

Hiring processes are a critical control point. A fraudulent hire is often a symptom of breakdowns in screening, verification, or oversight. Responding to the symptoms is only half the battle—employers need to plug the holes.

Employers can treat the discovery of a fraudulent employee as an opportunity to audit and refine their hiring processes and IT oversight practices. For a list of practical steps businesses can take in their hiring activities to avoid mistakenly hiring fraudulent employees, please review our earlier article.

From an IT perspective, businesses can revisit their data-access governance approaches. For example, in addition to requiring “least-privilege” access by default, businesses may choose to stagger the level of access they provide to new hires to prevent access to sensitive personal information during those critical early days. Businesses can also mandate regular audits of privileged users to identify and remove unnecessary accounts, and implement monitoring, logging, and active alerting to detect anomalous data access or export activities.

In addition, the tools that employers use to vet job applicants—such as background-screening services, identity-verification platforms, video-interviewing technology, and AI- or automated decisionmaking tool (ADMT)-based assessment tools—may themselves trigger a range of legal obligations. Depending on the technology and the jurisdiction, employers may be subject to requirements under the Fair Credit Reporting Act (FCRA), state and local background check laws, biometric privacy statutes, comprehensive privacy laws, and emerging AI/automated decision-making regulations. Employers evaluating or implementing these tools may want to review the various compliance requirements regarding employment-based AI and ADMT.

Ogletree Deakins’ Cybersecurity and Privacy Practice Group will continue to monitor developments and will provide updates on the Background Checks, Cybersecurity and Privacy, Employee Engagement, and Technology blogs as new information becomes available.

Follow and Subscribe
LinkedIn | Instagram | Webinars | Podcasts


Browse More Insights

Fingerprint Biometric Authentication Button. Digital Security Concept
Practice Group

Technology

Ogletree Deakins is uniquely situated to provide tech employers and users (the “TECHPLACE™”) with labor and employment advice, compliance counseling, and litigation services that embrace innovation and mitigate legal risk. Through our Technology Practice Group, we support clients in the exploration, invention, and/or implementation of new and evolving technologies to navigate the unique and emerging labor and employment issues present in the workplace.

Learn more
person filling out a request for a criminal background check
Practice Group

Background Checks

Background checks are a trending topic for employers because of the tidal wave of class action lawsuits alleging technical violations of the federal Fair Credit Reporting Act as well as the proliferation of state and local background check laws (including those arising from the Ban the Box movement).

Learn more
Modern dark data center, all objects in the scene are 3D
Practice Group

Cybersecurity and Privacy

The attorneys in the Cybersecurity and Privacy Practice Group at Ogletree Deakins understand that data now accumulates quickly and transmits easily. As the law adapts to technical advancements, we effectively advise our clients as they work to comply with new developments and best practices for protecting the privacy of the data that their businesses collect and retain.

Learn more

Sign up to receive emails about new developments and upcoming programs.

Sign Up Now