Search Video Library (378 Assets Found)
Results for Learning Path: Ethics & Compliance
Because appropriate touching varies so much among different people, the best advice is to keep close personal touch to a minimum and always on a professional level. For example, a congratulatory handshake or fist bump. Beyond that, unless you are absolutely sure that your contact is welcomed by the other person, it's best not to touch them at all.
Third-party sexual harassment occurs when someone outside of the employer's organization harasses an employee in or outside the workplace. Such third parties may include customers, vendors, consultants, or anyone that the employer has a business relationship with. This video also highlights the active bystander/ally concept.
Joking can make the workplace fun, but it is also an area that can easily cross the line from being inappropriate to being illegal. People who work together sometimes engage in ‘harmless flirting’. As long as that behavior is welcome for those who are flirting, and those who are around to see it, it isn’t sexual harassment. When someone changes their mind, however, the welcomeness ends, and it’s time to stop.
It’s important to remember that sexual harassment can take many forms. It can be verbal, as with jokes, comments, or propositions. It can be visual, as in written notes, cartoons, or objects. It can be electronic, as in e-mails, social media posts, and texts. And it can be physical, as with touching, gesturing, or leering and staring.
Quid pro quo sexual harassment occurs when an employee's supervisor, manager, or someone else in authority offers or suggests that an employee will be given something, such as a raise or promotion, in exchange for some sort of sexual favor. This also includes refusing someone a promotion.
Sexual jokes, innuendos or graphic stories could easily cross the line from simply inappropriate and unprofessional to unlawful... in a hurry! Understanding the line when it comes to workplace jokes is key to avoiding a sexual harassment lawsuit.
Sexual harassment can take place anywhere. Any gender can unlawfully harass another other gender. Women can harass men, women, and transgender people; men can harass women, men, and transgender people; and transgender people can harass men, women, and transgender people.
What do you do when a co-worker (or employee) takes compromising pictures of fellow worker and decides to post them on social media? Are you prepared for the fallout? Understanding how this behavior could be the basis of disciplinary action and even a hostile environment sexual harassment lawsuit.
Even when subtle in nature, comments, body language, and tone of voice that imply something sexual is not appropriate in the workplace. These kinds of actions can easily lead to charges of hostile environment sexual harassment.
When a co-worker is constantly making sexual jokes and innuendos, then the inappropriate behavior is pervasive. If not addressed, the perpetrator (and the organization) could face charges of hostile work environment sexual harassment.
Could you recognize how an unwelcome pursuit can become harassing behavior? What if it was a manager pursuing an employee? Inappropriate or illegal?
Finding the right people is challenging enough without the added legal burden. Equip your managers with the skills they need to avoid typical legal pitfalls in recruiting and hiring. This program addresses the most common stumbling blocks managers face, including job descriptions, job advertising, interviewing and equal opportunity concerns.
Do your managers know that they are legally responsible for addressing harassment and discrimination situations in their workplaces? This program brings them up to speed fast using straightforward language and real-world examples. Managers gain the knowledge, tools and insights they need to protect themselves and their organizations from lawsuits and regulatory actions.
Social media is a powerful communication tool. Employees can (and do) post things that are best left unseen in the workplace. But what if co-workers begin viewing and discussing another employee's posts in the workplace? Inappropriate, unprofessional or illegal?
No organization wants its name on the front page when the headline involves workplace violence. This program explores preventive measures and examines the legal obligations of managers and their organizations. Topics include hiring policies, appropriate responses to angry outbursts, dealing with employee threats, procedures for investigating rumors and the importance of maintaining confidentiality.
Conflicts between our obligations to friends and the organization can make decisions difficult; in those situations, we must let the law and the organization’s policy be our guide. Confidential information must always remain confidential. So, the bottom line is, we all have a responsibility to know and follow the organization’s policy on handling confidential information.
Fraudsters have a huge toolkit of tricks to pull from. Let's take a case of social engineering – also known as phishing. Hackers can take advantage of the fact that a company is engaged in a merger and/or acquisition, and can target employees who are responsible for personally identifiable information with emails that appeared to be from others within the organization. It happens all the time... especially when policies and procedures are not followed.
Unless we're really careful - and follow our cyber security policies and procedures - emails can get us into real trouble (and lead to serious financial loss). Policies are in place to protect you... and the organization. When it comes to hacks and scams, following those procedures can mean the difference between catching a scam or losing thousands (if not millions) of dollars.
It's important not to skip processes or procedures when dealing with wire transfers, invoice payments and personally identifiable information. It only takes one missed step in the process to cause lots of financial devastation within an organization. And... Never. Ever. Share system passwords with other employees. That's just an big accident waiting to happen!
We all want to help our customers or vendors... but a fake email (or an unconfirmed phone call) can get the organization into some real trouble. It only takes one missed step in the process to cause lots of financial devastation. Cyber attacks are increasing each and every day. If your employees don't know how to spot a bad email - or more importantly - ignore organizational policies and procedures when it comes to security, chances are, you're going to get scammed.