What To Include in a Company Social Media Policy
If you want to prevent social media abuse, says attorney Jody Katz Pritikin, you must develop a social media policy, and your policy must include several key elements.
If you want to prevent social media abuse, says attorney Jody Katz Pritikin, you must develop a social media policy, and your policy must include several key elements.
People are now spending more time on social media sites than on e-mail, says attorney Jody Katz Pritikin, and a lot of that time is being spent at work. In today’s CED, Pritikin explains how to manage the new social media time-suck.
Having a policy in place that forbids workplace romance is a great idea. In theory, anyway.
Telecommuting allows employees to work part or all of their standard workweek from a remote location, “seamlessly commuting” by e-mail, cell phones, and virtual private networks. (Editor’s note: It’s not always “seamless.”)
WAHOO — Work At Home Office Opportunity – is just one example of employee-centered thinking that has helped Mitchell International achieve success. Today’s CED looks at how they do it.
California and federal law generally require that employees working over 40 hours in a workweek be paid an overtime premium rate for those additional hours. California law also requires that employees who work more than 8 hours in a day be paid overtime, and double-time if they work more than 12 hours in a day. […]
Yesterday, we looked at the DOL’s recent clarification of the parental relationship under the family leave laws. Today, some examples of “in loco parentis” relationships, and tips for handling child-related leave requests.
Nontraditional family units have created confusion for some employers when it comes to determining eligibility for family leave, particularly if there is no legal or biological parent-child relationship.
The requirements of fair employment laws prohibit you from asking certain questions during an interview.
Your new copying machine may be keeping copies of records that have been scanned into the copier’s hard drive. You can’t access those records directly, but someone could remove the drive and copy your confidential records.