Guest blogger Mimi Soule specializes in employment law at the Soule Law Firm in Raleigh, North Carolina. This article was originally published on the website of Forrest Firm. Lately, the National Labor Relations Board (NLRB) is taking a particularly active interest in employer polices regarding social media. For those of us living and working in a Right-to-Work state like North …
Massachusetts Drug Lab Scandal
On Saturday, September 29, 2012, the News and Observer covered the story of Annie Dookhan, a chemist at a Massachusetts drug lab. This story underscores some of the devastation that can result when an organization doesn’t follow basic security principles which require both screening and guardianship. The lack of screening and guardianship at the Massachusetts state drug lab has already …
Intruder in the Attic
The original news story can be found here. An ex-boyfriend from twelve years ago came back to haunt a woman – literally. A single mother of five children in Rock Hill, South Carolina, thought an animal had gotten into her attic when she heard a thump and then saw some nails popping out from her bedroom ceiling one night. Her …
Yahoo Chief Executive Scott Thompson Steps Down
Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. The assumption seems to be that since an applicant has worked at “Alpha Company”, there is no need for “Beta Company” to do a thorough background investigation. The faulty logic is …
Government Files First Criminal Charges In BP Oil Spill
As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …
Digital Message Resonance and Its Impact on Economic Advantage
Using Social Media Monitoring and Analytics to Protect Human Capital, Company Property, and Your Brand Social Media is a relatively new term that has become ingrained in our consciousness and language, but do you know what it means or encompasses? If you answered no, then you are in the majority. Everyone talks about Social Media, but few really understand it. …
US Cargo Theft – A Five‐Year Review
Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …
Applicant Address Histories
What’s wrong with this picture? The time the applicant spent in Tennessee. An employment application or resume from an applicant is a good place to start, but it should not be used as the sole source of information about the applicant’s previous locations. Relying solely on the information provided by the applicant can miss vital information about their suitability for …
Online Impersonation
Impersonating someone online can take many forms. In some cases, the impersonation may constitute a criminal offense, such as when one individual pretends to be another for financial gain. In other instances, the impersonation does not reach that level. Regardless of whether the impersonation is or is not a crime, the victim of the impersonation feels violated and vulnerable. Depending …
Fine Tune Your Criminal Background Checks
Background screening is an essential tool in today’s business. Choosing the best candidate for the job requires due diligence on the part of management. An effective screening policy protects the business, its assets, and ultimately increases a positive return on the investment. We recommend a policy that is flexible but non-discriminatory because it aligns the scope with the position. The …