Training Course
Syllabus:
In the last several years, issues such as cybersabotage (hacking), espionage, stalking, infringement, cyber harassment, discovery requests for electronically stored data, identity theft and surreptitious photographic equipment (picture phones) have begun to confound businesses. Protecting companies against egregious electronic abuses by outsiders and employees has become one of the human resources professionals job responsibilities. Common threat sources to technology systems include natural threats (e.g. floods, earthquakes, electrical storms), human threats (unintentional acts or deliberate actions) and environmental threats (power failures, chemicals, liquid leaking). In addition, companies' policies and procedures necessarily need to change with times. This presentation is intended to red flag potential problem areas, help you prevent liability and deal with problems after they arise.
Seminar highlights:
- Learn how to better HR database management today can prevent headaches later on
- Learn about the risks and benefits of a statistical audit of your company's HR policies
- Litigation in the digital age
- Computer hacking
- The virtual workplace
Learning objectives:
- The attendee will be able to discuss legal protections for computer hacking.
- The attendee will be able to identify techniques for collecting information about prior employment and positions.
- The attendee will be able to review electronic communication policies.
8:30 a.m. - 9:30 a.m.
I. Litigation In The Digital Age
What document retention policies should an employer adopt in light of a litigant's right to obtain information and data that is maintained in electronic form and the adverse consequences of failing to take appropriate measures to preserve such information?
9:30 a.m. - 10:30 a.m.
II. Recording Employee Information
What are the pros and cons to keeping information about incoming employees, including information about prior employment and positions applied for and how should such information be recorded?
a. There is value in making applicants declare what type of job they want. How should
you record that information for later use?
b. Employees come to your company with different backgrounds and
expectations. How can you efficiently record that information?
c. Employee ratings: how to identify high-and-low performers so statisticians and economists can understand what you mean?
10:30 a.m. - 10:40 a.m.
Break
10:40 a.m. - 11:30 a.m.
III. Protecting Your Confidential Information
What should an employer do to protect its trade secrets and other
confidential information from unauthorized dissemination and use?
11:30 a.m. - 12:00 p.m.
IV. Computer Hacking
What legal protections does an employer have with respect to unauthorized access or damage to its computer systems and what should it do if it has been hacked?
12:00 p.m. - 1:00 p.m.
Lunch (On Your Own)
1:00 p.m. - 2:00 p.m.
V. Meeting Employee Benefit Disclosure Obligations Through Electronic
Means
What are employers' disclosure obligations to employees relating to employee
benefits and can those obligations be met through electronic delivery of
certain notices (including COBRA) and summary plan descriptions?
2:00 p.m. - 3:20 p.m.
VI. The Virtual Workplace
What issues should an employer address in formulating and implementing a telecommuting policy?
3:20 p.m. - 3:30 pm.
Break
3:30 p.m. - 4:30 p.m.
VII. Electronic Communication Policy
|