Skip to main content

STEM专业学生17个月OPT延期与E-Verify




按照移民法规定, F1学生可以有12个月的OPT实习期间。而STEMScienceTechnologyEngineering Mathematics)专业的学生还可以在12个月OPT的基础上再延期17个月的OPT实习期间。但是,要想申请这额外的17个月OPT实习期间,雇主必须参加并使用V-Verify 网上系统来核实员工的合法工作身份。
如果没有年度H-1B名额的限制,STEM专业学生附加的17个月OPT实习期间并不显得那么重要。但是,面临今年H-1B工作签证需求暴增,移民局在4月份前5天内收到124,400 H-1B申请的严峻形势,拿不到今年H-1B名额而12个月OPT又即将过期的STEM学生,再有17个月的OPT实习期间就成了及时雨了。
并不是所有的企业都使用E-Verify网上系统。根据移民局的资料,现在全美有超过40万家企业使用E-Verify网上系统查证员工合法工作身份。如果雇主不在E-Verify系统当中,就不能为STEM学生申请17个月的OPT延期。
E-Verify网上系统是在1997年开始实施的,目的是加强员工合法工作身份核查,防止企业雇用非法移民。但是,使用E-Verify网上系统是自愿性质的。到目前为止E-Verify系统的使用还不是十分普遍。一些企业不熟悉,不了解E-Verify系统的功能和便利,也不愿让企业加入到E-Verify系统之中,致使一些STEM专业的学生因为雇主没有加入E-Verify系统而无法申请额外17月的OPT延期。
STEM专业学生应该成为雇主加入E-Verify网上雇员身份核查系统的推动者。使用E-Verify网上系统并不复杂。按照美国法律规定,每个雇主,不论大小,雇用新员工都必须为员工填写I-9表格 Employment Eligibility Verification)。E-Verify网上系统为雇主提供了直接在网上把员工I-9表格上的资料与国土安全部和社会安全局的资料加以比较,快速核实员工工作身份。
雇主加入E-Verify网上系统只需要完成雇主登记程序。在E-Verify系统里输入雇主的名称,地址,联邦税号,雇员工作地址,参加E-Verify员工大概人数,E-Verify使用人的资料,阅读并接受E-Verify使用条款(E-Verify Memorandum of Understanding)。
如果你是STEM专业学生,受H-1B名额困扰,应该敦促雇主加入E-Verify网上系统,以便申请额外17个月OPT延期。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...