ChubbWorksSM now outlines the Best Practice Minute -- a short, on-demand presentation of a workplace liability issue that offers steps to take to limit the risk.
Log on and go to HR Resources to access:
- A Manager's Role in an Investigation
- Best Practice Minute
- Retaliatory Discharge
- Disability Discrimination
- The ADA and Reasonable Accommodation
- Cyber Crime
- Social Media
- Workplace Bullying
- Sex Based Harassment
- Retaliation
- E-Verify
- GINA
- Holiday Party Risk
- Teen Workers
- The ADAAA & Leave
- ADEA
- USERRA
- The ADA and Mental Impairments
- Background Checks
- National Origin Discrimination
- Family Responsibility Discrimination
- ADA Association Risk
- Older Workers Benefit Protection Act
- Employee Polygraph Protection Act
- Third-Party Sex Harassment
- English-Only Policies
- Employee Personnel Files
- Termination Witnesses
- Retaliation - ACA
- Responding to an EEOC Charge
- Depression, Leave Policies, and the ADA
- Ban the Box
- Medical Marijuana Changing the Workplace
- Common Employment Practice Myths
- Misclassification Matters
- Preparing for a Data Breach
- Ransomware 101: What Is It And What Is The Risk For Employers?
- Ransomware 102: How to Avoid Ransomware
- Reporting Ransomware - The First Step For Curbing the Harm of Ransomware
- Managing Overtime Successfully
- Protecting Whistleblowers To Reduce Retaliation Risk
- Website Accessibility For Your Employees
- Is That A Real Religion?
- Are Victims of Sexual Harassment Limited To The Targets Of The Behavior?
- Preventing Sexual Harassment With Thorough On-Boarding Of New Employees
- Exit Interview Basics
- Be Aware Of State Leave Law Changes
- Best Practice Cybersecurity Tips For HR
- What Defines A Full-Time Employee Varies
- Responding to Sextortion Emails
- Adjusting Pay Based On Location
- Encouraging Bystander Intervention Can Help Prevent Sexual Harassment
- When An Employee Tests Positive For COVID-19
- When Employees Refuse The COVID-19 Vaccine
- Requests To Review A Personnel File
- Overtime Exemption Regulations To Change - Again
- Responding To No Show, No Call Employees
- "Just Asking" Is Protected Under The FMLA
- Retaliation: A Rising Risk For Employers
- Reasons For Underreporting Child Sexual Abuse
- Should You Prohibit The Use Of ChatGPT For Work?
- February 2024 Cyber Minute - Password Security Starts With Changing Your Password Routinely
- Best Practice Tip
- Applicants with Disabilities
- Best Practice Tip Grooming
- Return to Work: Worker's Compensation Pitfall
- Sexting
- Documenting Discipline
- Paying Overtime
- Pregnancy Discrimination
- Final Paychecks
- Proper Documentation for Terminations
- Don't Wait to Terminate
- Get Your Sleep
- Online Employee Posts - The Risks
- The "Manager" Title Comes with Responsibility and Risk
- What Managers Need To Know About Accents And National Origin Discrimination
- Holding Your Employees Accountable
- Signs of Malware
- Managing Productivity Loss From Online Distractions
- The Legal Relationship Between Pregnancy And Disability
- Accurate Overtime Records: What Managers Can Do
- Keeping Employee Health Information Confidential
- Workplace Counseling vs. Personal Counseling
- Authorizing Others To Accept Pay Checks
- Tips For Lowering Risk Exposure From Employee Genetic Information
- The Role Managers Can Play To Avoid Business Email Scams
- When An Employee Cannot Wear A Mask
- Managing Disagreements Between Employees
- Managing Employees Afraid To Return To Work Because Of COVID-19 Fears
- Setting The Example During Online Meetings
- Tips For Managing Transgender Employees
- Telling An Employee The Reason For Termination
- Resignation Or Termination?
- Don't Assume Declining Work Quality Is Because Of Age
- When Can You Fire An Employee On FMLA Leave?
What's New
Pay Or Not To Pay: The Debate Continues
Nearly every respondent in a recent survey has suffered attacks on their organizations, and half report the attack caused a significant impact on their operations.
The Changing Tactics Of Cyber Criminals Create Additional Risks For Employers
A major cybersecurity company issued its annual report on cyber-attack trends. They note a change of tactics by online criminals. We discuss how organizations should counter.
".Gov" Emails And Their Social Engineering Value To Online Criminals
Washington County, Arkansas officials report they successfully thwarted a cyber attack. Why was the county targeted? We comment.