Easy hack: Former employees often keep network access

It’s Item No. 1 on the termination checklist: Ensure former employees can’t get into the computer system. But only about half of IT administrators say they completely cut off network access the same day an employee is terminated.

7 steps to protect against electronic sabotage by former employees

Not all terminated employees go quietly. Some rant and rave about unfairness. Others plead for a second chance. So when an employee seemingly accepts his or her termination without protest, employers typically let out a sigh of relief. Not so fast. Just a few taps on the keyboard by a vengeful former employee can cause crippling damage to your workplace.

5 HR apps & software programs that won't break the bank

HR departments with small budgets can turn to a growing variety of free and low-cost mobile and Web-based applications to increase efficiency and cut costs. Here’s a sampling of what’s available.

Court: Take extra steps to verify e-signatures

While nearly all jurisdictions recognize the legality of electronic signatures, it’s vital that you have a system to authenticate that such a “signature” was really executed by a particular employee or applicant.

Make sure you can authenticate e-signatures on applications and arbitration agreements


These days, many employers don’t bother to print employee handbooks, arbitration agreements and other employment documents. Instead, they exist solely in electronic form, acknowledged by so-called electronic signatures instead of written ones. That’s fine, as long as you have a system for authenticating those e-signatures.

5 data-breach issues HR must address

Even if you’re not Sony Pictures—embarrassingly hacked last year, allegedly by North Korea—you’re still vulnerable to a data breach that could cripple your organization. A surprising 44% of small businesses have suffered cyber-assaults, according to the National Small Business Association.

Email/Internet Usage


HR Law 101: Employers have any number of legitimate reasons to monitor employees’ email and Internet usage. Beyond personal productivity issues, you risk significant loss should an employee download a virus or other damaging software or engage in illegal activity conducted on company computers ...

DOL's new Web hub highlights accessibility tools for disabled

U.S. Department of Labor’s Office of Disability Employment Policy (ODEP) has launched, a Web portal designed to help employers adopt technology allowing disabled people to participate fully in the workplace.

Bring Your Own Device policies: Risks and rewards

Employees are increasingly using their personal electronic devices—laptops, smartphones and tablets—for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to be “at work.” Employers jumping on the BYOD bandwagon face several challenges.

80,000 nonemployees download MGM staff's healthy eating app

MGM Resorts International em­­ployees who want to eat healthy while at work can check their progress on their smartphones. So can lots of others, it turns out.

Encourage wellness with help of free apps

Your organization doesn’t need a big wellness budget to offer employees tools that encourage healthy living. A wide range of free or inexpensive mobile apps can help employees track physical activities, monitor health and encourage good eating. Here is a sampling.

Going mobile: The risks and rewards of BYOD

"Bring Your Own Device" policies are a growing trend, but can they bite back against employers?

Suffering from tech overload? 4 tips to delete the stress


While technology can make you more efficient, it can also detract from your work if you don’t manage it properly. Here are four tips to help you use technology in a time-efficient manner and avoid the overload.

How to regulate employee use of personal tech

It's hard for even the most sophisticated of companies to deal with all the risks of instant communications and increased access via personal and company-owned tech devices.

Electronic signatures: What employers need to know


For centuries, a signature at the bottom of a piece of paper has meant someone agrees with what the document says. Can keystrokes carry the same legal weight as pen strokes? Yes. Two federal laws establish the legality of e-signatures in this country: the UETA and E-SIGN.

1 2 3 4 ..........48 49 Next