Remove Compliance Remove Data Remove Employee Relations Remove HIPAA
article thumbnail

Ten Essentials for Creating an HR Risk Register

Hppy

Employees are the weakest link in enterprise risk management. Organizations with an HR risk management plan can recruit employees who fit their skill requirements and values easily. Organizations with an HR risk management plan can recruit employees who fit their skill requirements and values easily.

article thumbnail

NLRB judge strikes down termination based on HIPAA violation

Ohio Employer's Law

Five letters that strike fear into the heart of anyone that handles employee medical information. That is, anyone except an NLRB judge passing judgment on whether an employer was justified in firing a union-supporting employee for clear HIPAA violations.

HIPAA 28
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HR Case Management: Benefits and Best Practices

Analytics in HR

As HR has evolved over the years, case management has become critical to providing a positive employee experience. HR case management is the process by which the HR departments resolve submit inquiries and questions that employees submit to them. HR cases are queries or issues employees may encounter that they need HR to resolve.

article thumbnail

Why Should You Archive Historical Employee Documentation?

LaborSoft

Wrapping up 2018: How and Why you should Archive Historical Documentation and Data. HR professionals at organizations know that they must adhere to strict employee recordkeeping requirements that are dictated by the government. The longer an employee is at your company, the larger their personnel file becomes.

article thumbnail

How The Right Employee & Labor Relations Technology Can Prevent Data Breaches

LaborSoft

Given that as consumers we are inundated with data breach debacles and security snafus in the media constantly, it often goes in one ear and out the other. Given that as consumers we are inundated with data breach debacles and security snafus in the media constantly, it often goes in one ear and out the other.