Wearable technology: A Pandora's box of HR evils?

The wearable technology revolution affects a host of seemingly unrelated employment law issues.

After firing, how fast do you block network access?

When employees depart, shut down their access to your servers ASAP.

Backdoor computer access is a federal crime!

Remind employees that attempting to access computer records after they terminate employment may land them in prison—even if they do so with the willing assistance of a current employee.

'We lost our records' is no excuse in pay cases

Do you have a method for making sure pay records are up-to-date, accurate and available? Remember, California law requires retaining pay records for three years.

Are your employees' passwords for sale to hackers?

Some say they would sell ... for the right price.

Prepare now for the data breach that will inevitably hit you

Do you understand the relevant laws and your obligations to protect employee data?

HR data security in the spotlight

Don't let your employees’ information become the target of the next high-profile data breach. Here's what you should know before contracting with a cloud vendor.

Easy hack: Former employees often keep network access

It’s Item No. 1 on the termination checklist: Ensure former employees can’t get into the computer system. But only about half of IT administrators say they completely cut off network access the same day an employee is terminated.

7 steps to protect against electronic sabotage by former employees

Not all terminated employees go quietly. Some rant and rave about unfairness. Others plead for a second chance. So when an employee seemingly accepts his or her termination without protest, employers typically let out a sigh of relief. Not so fast. Just a few taps on the keyboard by a vengeful former employee can cause crippling damage to your workplace.

5 HR apps & software programs that won't break the bank

HR departments with small budgets can turn to a growing variety of free and low-cost mobile and Web-based applications to increase efficiency and cut costs. Here’s a sampling of what’s available.

Court: Take extra steps to verify e-signatures

While nearly all jurisdictions recognize the legality of electronic signatures, it’s vital that you have a system to authenticate that such a “signature” was really executed by a particular employee or applicant.

Make sure you can authenticate e-signatures on applications and arbitration agreements


These days, many employers don’t bother to print employee handbooks, arbitration agreements and other employment documents. Instead, they exist solely in electronic form, acknowledged by so-called electronic signatures instead of written ones. That’s fine, as long as you have a system for authenticating those e-signatures.

5 data-breach issues HR must address

Even if you’re not Sony Pictures—embarrassingly hacked last year, allegedly by North Korea—you’re still vulnerable to a data breach that could cripple your organization. A surprising 44% of small businesses have suffered cyber-assaults, according to the National Small Business Association.

Email/Internet Usage


HR Law 101: Employers have any number of legitimate reasons to monitor employees’ email and Internet usage. Beyond personal productivity issues, you risk significant loss should an employee download a virus or other damaging software or engage in illegal activity conducted on company computers ...

DOL's new Web hub highlights accessibility tools for disabled

U.S. Department of Labor’s Office of Disability Employment Policy (ODEP) has launched, a Web portal designed to help employers adopt technology allowing disabled people to participate fully in the workplace.
1 2 3 4 ..........49 50 Next