This training course will help you recognize situations that raise ADA issues and assist you in dealing with these issues effectively. (Licensed for use in classroom settings only and not for distribution in any form.)
This Top 10 is intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests, and ensure proper contractual protections.
This Top 10 is intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests, and ensure proper contractual protections.
This article with its sample delegation of authority (DOA) form will assist in-house counsel who are struggling with issues related to signing authority, staff approval limits, and information passing.
This policy outlines the guidelines for delegating authority within a business entity to ensure efficient operations while maintaining fiscal and policy integrity.
Usually, the biggest obstacle in enforcing the right to equal pay is that the employee does not know whether colleagues of the other sex – the Transparency Act focuses on sex, not gender – receive more pay.
The following flowchart is designed as an internal guide to assist managers in making a preliminary assessment of whether a job position may qualify for exempt status under the FLSA. This document is only designed to be a tool to assist in the implementation of new job positions. This flowchart does not take applicable state law into account which may impact the exemption analysis.
This is sample acknowledgment of biometric policy and consent form, regarding how a company uses biometric information in connection with the employees' use of biometric equipment, devices, systems or software that utilize a scan of their finger, hand, face, retina, or iris, or their voiceprint.
Check out this sample policy developed by Exterro to learn how to implement a data retention framework workflow.
Check out this sample policy developed by Exterro. In this resource we take a look at a basic incident and breach management process.
This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.
By using the site, you consent to the placement of these cookies. For more information, read our cookies policy and our privacy policy.