If your kids go back to school and you don't post photographic evidence, does it count?
Here's what I read this week:
Here's what I read this week:
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Democratic administrations are about enforcement.Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
In Encino Motorcars, LLC v. Navarro, the Supreme Court ruled that overtime exemptions under the Fair Labor Standards Act "are to be given a 'fair reading,' meaning they are not to be construed too narrowly" (as had historically been the case).Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Organ donors are living saints. If you are in need of an organ to save your life, and someone is willing to sacrifice a kidney, or a liver segment, or bone marrow, and selflessly accept the pain and inconvenience, you are very, very fortunate.Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
On August 29, 2003, I married my wife. Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Temporary employees do not leave their legal rights at your door. In fact, they enjoy the same rights as your permanent employees.Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
"Recruitment of insiders is increasing, and the use of the dark web is the current methodology that malicious actors are using to find insiders," explains researcher Tim Condello, technical account manager and security researcher at RedOwl.
Cybercriminals recruit with the goal of finding insiders to steal data, make illegal trades, or otherwise generate profit. Advanced threat actors look for insiders to place malware within a business' perimeter security. …
There are three types of people who fall into the "insider" category, says Condello: negligent employees who don't practice good cyber hygiene, disgruntled employees with ill will, and malicious employees who join organizations with the intent to defraud them.
Companies are increasingly building out cyber programs to protect themselves from their own employees.… Businesses … are taking advantage of systems … to find internal users who are accidentally exposing their company to hackers or malicious insiders attacking the company. These "systems," however, can prove costly, especially for the small-business owner. While investment in a technological solution is one way to tackle this serious problem, it's not the only way. Indeed, there is lots any company, of any size, with any amount of resources, can do to develop an insider threat program.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
The cockroach, the cockroach,
can't walk anymore
because it doesn't have,
because it's lacking
marijuana to smoke.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
I was recently the target of a highly sophisticated legal-services fraud. Thankfully, this scam set off my Spidey sense from the beginning, and I did not fall for it. I'm sharing so that others can learn the lengths that some will go to steal from professionals. (My apologies in advance. This post is long, but I think it's worth your time.)Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Religion a funny thing. Throughout the history of mankind it's fueled so much hate, war, and death. And yet, it brings so much peace, comfort, and love to so many people.Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.

Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
There is no doubt that addiction is a protected disability under the ADA (and Ohio's parallel law).Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Do you know that the average total cost of a data breach to a business is $3.86 million?Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.

Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.
Do you like what you read? Receive updates two different ways:
Subscribe to the feed or register for free email updates.