Employers need high quality, reliable resources to help navigate today’s ever-changing business and regulatory environment. We have those resources. Content in our Resource Library and our Events are designed to enhance skills in professional development, compliance and risk management — giving your managers and employees the confidence they need to make sound decisions.
If you can’t find what you’re looking for in our Resource Library or scheduled events, we can customize a training solution specifically to your needs. Our customized on-site training allows you to select the topics most important to you. These trainings can assist you with compliance, or ensure your managers are prepared to address employment-related risk, and help develop your most important asset — your human capital. Resources you can access include:
Without a legitimate business reason coupled with sufficient documentation to support a termination, employees’ claims that they were terminated for unlawful reasons can be difficult, time consuming and costly to dispute. While there is no way to eliminate legal exposure to employees’ claims, there are ways for employers to significantly reduce their exposure when terminating employees. This article covers five ways you can reduce your exposure to claims for unlawful termination.
More employees are working
past age 65 instead of retiring, and many employers are wondering: Does the employee’s Medicare
eligibility affect the employer’s benefit programs? This eBook addresses the most
common questions we receive regarding issues such as eligibility, entitlement, health plan design and enrollment, employee education, and more. Register for our Nov. 7 webinar "How to explain the Medicare puzzle to your employees aged 65+ and still working" to learn how Medicare affects your organization, your employees and your benefit plans.
Login to download the PDF. Don’t have an account? Create an account to access all of the content in our Resource Library.
As businesses become
more interconnected, the risk of a third-party data breach
at your organization becomes more imminent. It’s no
longer enough to simply secure your organization’s
network systems and data. Your risk management
program needs to look beyond the perimeter of your
organization to properly vet the third-party vendors who
have access to your networks and data. Fortunately, your
organization can take certain steps to minimize exposure,
reduce the likelihood of a third-party breach and mitigate
Send a Message
Find a Location