CA Employment Law Blog
California’s legal climate presents unique challenges to businesses operating in the state. A frequent author and speaker on employment law, Jeff is a regular contributor to the firm’s California Employment Law blog, providing insight into the full spectrum of California labor laws concerning class actions, wage and hour issues, overtime matters, discrimination and harassment claims, privacy concerns, accommodations and other issues.
Scroll down to see Jeff's most recent blog posts.
Recent Blog Posts
- New Harassment Checklists from the EEOC A year ago, I wrote about a report from an EEOC Task Force on risk factors for workplace harassment. Well the Select Task Force on the Study of Harassment in the Workplace continues studying away and has issued some new materials. They consist of: A chart on risk factors for workplace harassment – As we noted in our prior post, a diverse workplace where everyone conforms to the same norms, people behave appropriately at all times, you don’t hire those pesky young people, you... More
- 9th Circuit Lets Employee Sue Employer’s Lawyer for Retaliation There’s a saying that “Bad facts make bad law.” At least that’s the way I was taught it. A different version: “Hard cases make bad law” has its own Wikipedia entry. While the wording is different, the meaning is the same. When the facts are extreme, they serve as a poor basis for defining general legal principles. Here are the bad facts: A dairy hired an employee even though it knew he was not authorized to work in the US. When he... More
- Training Employees Can Be Key to Avoiding Cyberattacks A massive cyberattack was in the news again last week. This latest ransomware – dubbed “Petya” – crippled consumer product companies, transportation companies, law firms, and many other types of businesses worldwide. It is the second major ransomware attack in two months. It appears that the Petya malware was delivered in a Microsoft Word document attached to an email. When the recipients opened the document, the malware encrypted their entire hard drive. It then looks for other unprotected computers in the same... More