NY Bill Follows ‘Franken Amendment’

Class action plaintiffs’ lawyers and their allies generally do not like arbitration, especially where the arbitration agreements effectuate a waiver of the ability of a worker or a consumer to bring a class action. Advocates for workers and consumers have attacked arbitration agreements through various avenues in the courts and in the court of public opinion.

buy rogaine online metabolicleader.com/p7pmm/img/jpg/rogaine.html no prescription pharmacy

Recently, their efforts also have focused on passage of legislation.

On May 5, 2014, the New York State Assembly passed legislation – known as Bill A4791-2013 – prohibiting state entities from contracting with any business that requires an employee or independent contractor performing work under the contract to arbitrate claims arising under Title VII of the Civil Rights Act of 1964 or any tort related to or arising from discrimination, sexual assault, or harassment. Such torts may include assault, battery, intentional infliction of emotional distress, false imprisonment, or negligent hiring. If this legislation is enacted, all employers who do business with any State government entity in New York would be required to allow their employees to adjudicate employment claims before the courts instead of using arbitration.

Exempt from the bill is any arbitration that is mandated by a collective bargaining agreement between the employer and/or independent contractor. The bill also provides for a waiver to be granted “to respond to an emergency arising from unforeseen causes,” but the waiver is to be no longer than necessary in duration and the state agency granting the waiver is obligated to list the reasons for granting it.

buy symbicort inhaler online metabolicleader.com/p7pmm/img/jpg/symbicort-inhaler.html no prescription pharmacy

The New York legislation follows in the footsteps of a similar federal provision known as the “Franken Amendment,” which was added as part of a defense spending bill and signed into law in 2009. The Franken Amendment, named after Sen. Al Franken of Minnesota, bars federal funds from going to defense contractors that continue to apply mandatory arbitration clauses to claims of sexual assault, assault and battery, intentional infliction of emotional distress, and negligent hiring, retention and supervision. The law requires that subcontractors on federal projects also certify to the same arbitration restriction.

buy stromectol online metabolicleader.com/p7pmm/img/jpg/stromectol.html no prescription pharmacy

These pieces of legislation indicate the beginning of a trend towards limiting the arbitration options for employment claims.

The New York bill now moves to the Republican-controlled New York Senate for consideration. Stay tuned for future developments on this front in New York and in other states.

This column previously appeared on the Seyfarth Shaw blog site.

New Studies Highlight Sources, Patterns of Data Breach—And How to Do Better

Three recent studies provide a great reminder of the threats of data breach—and the role workers and IT departments play in either maintaining a company’s defense or letting malware storm the gates.

In its 2014 Data Breach Investigations Report, Verizon identified nine patterns that were responsible for 92% of the confirmed data breaches in 2013. These include: point of sale intrusions, web application attacks, insider misuse, physical theft/loss, miscellaneous errors, crimeware, card skimmers, denial of service attacks, and cyber-espionage. They have also identified the breakdown of these patterns in various industries, highlighting some of the greatest sources of cyber risk for your business:

Verizon Data Breach Investigations Report

Verizon’s report also offers specific information about the patterns and advice on how to respond to them.

Many sources of vulnerability come from within, and there is less variation than you might expect in terms of who the riskiest workers may be.

buy atarax online www.handrehab.us/images/patterns/jpg/atarax.html no prescription pharmacy

A survey by the Pew Research Center found that 18% of adults have had important personal information stolen online, including Social Security number, credit card, or bank account information—an 8% increase from just six months ago. Further, 21% of adults who use the internet have had an email or social networking account compromised. Two groups that make up a large part of the workforce were hit particularly hard during this period: young adults and baby boomers. The percentage of individuals in these groups who had personal information stolen online doubled between July 2013 and January 2014.

buy symbicort online www.handrehab.us/images/patterns/jpg/symbicort.html no prescription pharmacy

stolen personal data by age

But as this chart shows, all age ranges have experienced a significant amount of data theft as of the beginning of the year.

Indeed, according to meetings-software company TeamViewer, 92% of IT administrators have seen troublesome habits among office workers using company computers. These risky behaviors are frequently known to open the work system to viruses or other malware, including:

  • Browsing social media websites (reported by 82% of IT admins)
  • Opening inappropriate email attachments (57%)
  • Downloading games (52%)
  • Plugging in unauthorized USB devices (51%)
  • Plugging in unauthorized personal devices (50%)
  • Illegal downloads, such as pirated movies, music or software (45%)
  • Looking for other jobs (39%)

Further, nine out of 10 IT administrators reported witnessing problems to company equipment because of these actions, including viruses (77%), slow computers (74%), crashed computers (55%), mass popups (48%) and inability to open email (33%). Not only do these behaviors leave corporate infrastructure at risk, but they may endanger the overall HR program, as a vast proportion of IT workers report feeling frustrated, angry and discouraged.

buy xenical online www.handrehab.us/images/patterns/jpg/xenical.html no prescription pharmacy

Up to 12% even said that they were considering quitting over these bad behaviors and increased strain on the IT department.

So what can you do? Administrators agreed that better security software, using remote access to fix problems, installing disk cleanup software, integrating automatic backup solutions, and offering the ability to telecommute would all help mitigate these issues and make their jobs easier.

Texas Fires Back at EEOC Motion

We normally pass, on blogging about briefs filed by a party before a court ruling, but Texas’ litigation against the EEOC and U.S. Attorney General Eric Holder is not shaping up to be just an everyday lawsuit.

This is a must read for employers. It goes to the heart of what the EEOC is doing these days, and how it is carrying out its duties.

Case Background

In April 2012, the EEOC issued guidance urging businesses to avoid a blanket rule against hiring individuals with criminal convictions, reasoning that such rules could violate Title VII if they create a disparate impact on particular races or national origins. Like various other states, Texas has enacted statutes prohibiting the hiring of felons in certain job categories. In November 2013, Texas sued the EEOC, seeking to enjoin the enforcement of this guidance, which Texas has nicknamed the “Felon Hiring Rule.” In March of this year, Texas amended its complaint to include more specific allegations of injury. For example, Texas alleged that the EEOC issued a right-to-sue letter to an applicant who had been rejected by the Texas Department of Public Safety after disclosing on his application that he had been convicted of a felony (unauthorized use of a motor vehicle). Texas claimed that the job involved “access to sensitive personal information for all 26 million Texans.”

Against this backdrop is a growing firestorm of litigation initiated by the EEOC over hiring checks based on criminal backgrounds. We have blogged about those cases and rulings previously (here, here, here, here, and here).

Earlier this month, the EEOC filed a motion to dismiss Texas’ lawsuit. In its motion, the EEOC offered three primary arguments. First, the EEOC contends that the U.S. District Court lacks jurisdiction to hear the case because the EEOC’s guidance is not legally binding and does not constitute a final agency action. Second, and in part because the EEOC claims its guidance has no binding authority, the EEOC argues that Texas lacks standing to pursue its claims. As the EEOC stated, “[t]he state may disagree with the EEOC’s interpretation of the law, but that does not imbue the interpretation with any legal consequences.” Third, the EEOC said the state’s claims should be dismissed because they are not ripe.

The State Of Texas Replies

In its brief, Texas started by pointing out other cases in which the EEOC pursued administrative investigations and lawsuits against employers and invoked its 2012 guidance. Making the point that the EEOC was attempting to have its cake and eat it too, the state characterized the EEOC as arguing that the guidance is “not worth the paper it’s printed on—even though it urges other courts to defer to it.”

Having set the theme, Texas turned to its legal arguments. The state argued that whether or not the 2012 guidance was a “final agency action” was not a jurisdictional issue, as the EEOC contended it was. Nevertheless, the state explained why the 2012 guidance in fact constituted a “final agency action” under the Administrative Procedure Act. Texas argued that the EEOC’s argument, that only those rules and regulations that were entitled to Chevron deference were reviewable, improperly narrowed the term “action” in a way that “no case from any court in the history of the Nation” had adopted. Texas also pointed out that the EEOC could not prevent review under the APA simply by re-characterizing its process in order to avoid judicial scrutiny under the Act.

Turning to the standing  issue, Texas identified three types of injury it has suffered, each of which independently established Article III standing, including (i) as an employer, the State of Texas is subject to the EEOC’s “Felon Hiring Rule,” and the EEOC issuance of a right-to-sue letter to an applicant denied a job after a criminal background check demonstrates that the state has been subjected to enforcement of the rule; (ii) Texas is seeking to enforce its right to participate in the notice-and-comment provisions of the APA, and the EEOC’s failure to comply with the APA had denied Texas its right to do that; and (iii) Texas has been injured by the EEOC’s purported preemption of the State’s laws. As evidence of this final injury, Texas pointed to the EEOC’s own website, which states that the Felon Hiring Rule “says that state and local laws or regulations are preempted by Title VII” if they cause a disparate impact.

On the ripeness question, Texas argued that, despite the EEOC’s attempts to recast its 2012 guidance as not requiring “individualized assessments” of all job applications, the case remained ripe for adjudication because it presents the “purely legal question” of whether “the State of Texas can continue to follow its facially neutral blanket no-felons policies …or whether the state must abandon those facially neutral policies.”

Implications for Employers

In defending against Texas’ case, the EEOC may have compromised future efforts to enforce its “guidance” against employers in Texas and other jurisdictions. To the extent the EEOC attempts to rely upon its 2012 statements as the basis for prosecuting disparate impact cases focused on criminal background check practices, particularly in cases where the EEOC alleges that an employer willfully violated Title VII, employers need only turn to the EEOC’s representations to the U.S. District Court for fodder in their own defense. Stay tuned for the upcoming ruling in this case.

This column previously appeared on the Seyfarth Shaw blog site.

The Conference Catalyst’s Top Tricks for Networking

Networking Tips

On the opening night of RIMS 2014, the first-timer orientation offered newcomers inside tips and tricks for this year’s conference in Denver. This year’s annual risk management summit offers more educational sessions and booths to visit than ever before, but that is only half the experience. For the other half, Thom Singer, “The Conference Catalyst,” shared some of his expert advice on networking, whether at one of the many parties or on the packed exhibit hall floor.

With the theme “Connecting with People in a Social Media Crazy World,” Singer emphasized the a return to basics when facing the unique challenges of getting off your devices and moving beyond social media relationships to form real connections.

buy arimidex online meadfamilydental.com/wp-content/uploads/2023/10/jpg/arimidex.html no prescription pharmacy

“When you’re with people, remember it choose people,” he said. “There is some assembly required — you have to make decisions and do work to build your network.

buy lariam online meadfamilydental.com/wp-content/uploads/2023/10/jpg/lariam.html no prescription pharmacy

And when you do, you’re not just building connections, but building your brand and taking control of it.”

Here are a few of his top tips for making the most out of your time at the conference:

  • Hallway conversations are learning opportunities, and you never know who you’ll meet just through serendipity
  • Put your phone away during breaks and lunches — don’t let technology become a social crutch
  • Make it easy for people to talk to you by smiling and being approachable
  • Wear your nametag: it says you’re part of the club while you’re here and offers an immediate way to start any conversation — and if you see a nametag, take advantage of the opening
  • Leave your workers behind — sometimes, you have to remember this isn’t a junior high dance, leave your clique behind and surround yourself with new people
  • Be curious about other people and ask questions, don’t just wait around to hear what they can do for you
  • Know your own brand — it’s how people will remember and talk about you down the line, so think about what you want your brand to be and take active ownership
  • Follow up: A Facebook like or a retweet is just a Facebook like or a retweet, not a connection — those require work and engagement over time, so this one meeting is just the start