HRIS / TECHNOLOGY

Wearable technology could unleash a Pandora's box of HR evils

09/07/2016
The wearable technology revolution affects a host of seemingly unrelated employment law issues.

After firing, how fast do you block network access?

09/07/2016
When employees depart, shut down their access to your servers ASAP.

Backdoor computer access is a federal crime!

08/22/2016
Remind employees that attempting to access computer records after they terminate employment may land them in prison—even if they do so with the willing assistance of a current employee.

'We lost our records' is no excuse in pay cases

07/22/2016
Do you have a method for making sure pay records are up-to-date, accurate and available? Remember, California law requires retaining pay records for three years.

Are your employees' passwords for sale to hackers?

05/05/2016
Some say they would sell ... for the right price.

Prepare now for the data breach that will inevitably hit you

01/04/2016
Do you understand the relevant laws and your obligations to protect employee data?

HR data security in the spotlight

11/03/2015
Don't let your employees’ information become the target of the next high-profile data breach. Here's what you should know before contracting with a cloud vendor.

Easy hack: Former employees often keep network access

08/03/2015
It’s Item No. 1 on the termination checklist: Ensure former employees can’t get into the computer system. But only about half of IT administrators say they completely cut off network access the same day an employee is terminated.

7 steps to protect against electronic sabotage by former employees

07/08/2015
Not all terminated employees go quietly. Some rant and rave about unfairness. Others plead for a second chance. So when an employee seemingly accepts his or her termination without protest, employers typically let out a sigh of relief. Not so fast. Just a few taps on the keyboard by a vengeful former employee can cause crippling damage to your workplace.

5 HR apps & software programs that won't break the bank

05/01/2015
HR departments with small budgets can turn to a growing variety of free and low-cost mobile and Web-based applications to increase efficiency and cut costs. Here’s a sampling of what’s available.

Court: Take extra steps to verify e-signatures

04/06/2015
While nearly all jurisdictions recognize the legality of electronic signatures, it’s vital that you have a system to authenticate that such a “signature” was really executed by a particular employee or applicant.

Make sure you can authenticate e-signatures on applications and arbitration agreements

02/24/2015

These days, many employers don’t bother to print employee handbooks, arbitration agreements and other employment documents. Instead, they exist solely in electronic form, acknowledged by so-called electronic signatures instead of written ones. That’s fine, as long as you have a system for authenticating those e-signatures.

5 data-breach issues HR must address

01/19/2015
Even if you’re not Sony Pictures—embarrassingly hacked last year, allegedly by North Korea—you’re still vulnerable to a data breach that could cripple your organization. A surprising 44% of small businesses have suffered cyber-assaults, according to the National Small Business Association.

Email/Internet Usage

12/15/2014

HR Law 101: Employers have any number of legitimate reasons to monitor employees’ email and Internet usage. Beyond personal productivity issues, you risk significant loss should an employee download a virus or other damaging software or engage in illegal activity conducted on company computers ...

DOL's new Web hub highlights accessibility tools for disabled

12/03/2014
U.S. Department of Labor’s Office of Disability Employment Policy (ODEP) has launched www.PEATworks.org, a Web portal designed to help employers adopt technology allowing disabled people to participate fully in the workplace.
1 2 3 4 ..........49 50 Next