This training program will describe the patterns that may indicate FMLA abuse, and how to respond to them. It will also define five key steps to an effective FMLA investigation and offer best practices companies can use to eliminate or reduce the likelihood of FMLA abuse.
WHY SHOULD YOU ATTEND?
When FMLA became law in 1993, it was intended to provide protection for employees who really needed it. Unfortunately, through the years, employees have figured out how to work FMLA and exploit the system.
Though the law may seem more lenient towards employees, it still allows employers with the tools and guidelines to effectively combat FMLA abuse.
This webinar will help leaders uncover FMLA abuse, and what needs to be done to address it. Participants will learn to investigate FMLA abuse, and how to respond if and when there is a case of abuse.
AREA COVERED
- Key components of FMLA and what companies and employees it applies to
- Most common forms of FMLA abuse
- What practices and patterns to look for to uncover abuse
- Key FMLA cases and how to protect your company
- Five steps to an effective investigation
- Best practices for preventing FMLA abuse
LEARNING OBJECTIVES
- Describe FMLA and what it means for companies and employees
- Identify the most frequent types of FMLA abuse
- Describe the practices or patterns that may indicate FMLA abuse, and how to respond to them
- Discuss important FMLA cases, and how they have impacted the legal landscape, relative to FMLA abuse
- Define the five key steps to an effective FMLA investigation
- Identify best practices companies can use to eliminate, or at least reduce the likelihood of FMLA abuse
WHO WILL BENEFIT?
- Chief human resource officers
- Employment managers
- Training and development managers
- HR professionals
- Line managers
- Leave managers
- HR generalists
- HR business partners
- Supervisors
When FMLA became law in 1993, it was intended to provide protection for employees who really needed it. Unfortunately, through the years, employees have figured out how to work FMLA and exploit the system.
Though the law may seem more lenient towards employees, it still allows employers with the tools and guidelines to effectively combat FMLA abuse.
This webinar will help leaders uncover FMLA abuse, and what needs to be done to address it. Participants will learn to investigate FMLA abuse, and how to respond if and when there is a case of abuse.
- Key components of FMLA and what companies and employees it applies to
- Most common forms of FMLA abuse
- What practices and patterns to look for to uncover abuse
- Key FMLA cases and how to protect your company
- Five steps to an effective investigation
- Best practices for preventing FMLA abuse
- Describe FMLA and what it means for companies and employees
- Identify the most frequent types of FMLA abuse
- Describe the practices or patterns that may indicate FMLA abuse, and how to respond to them
- Discuss important FMLA cases, and how they have impacted the legal landscape, relative to FMLA abuse
- Define the five key steps to an effective FMLA investigation
- Identify best practices companies can use to eliminate, or at least reduce the likelihood of FMLA abuse
- Chief human resource officers
- Employment managers
- Training and development managers
- HR professionals
- Line managers
- Leave managers
- HR generalists
- HR business partners
- Supervisors
Speaker Profile
Deborah Covin Wilson, CPLP SHRM-SCP, SPHR, is the keynote speaker at ComplianceKey. She is the recently retired director of organizational development and consulting services, a unit in human resources administration at Georgia State University. With more than 25 years in higher education, she was responsible for training, employee engagement programs, strategic planning, HR communications, and organization development services. Deborah was involved in several University System of Georgia Board of Regents initiatives: She served as chair of the Tuition Assistance Program committee, a member of the Executive Leadership Institute Advisory Committee, and a steering committee member of the Accelerated Leadership Academy.Deborah …
Upcoming Webinars
Conflict Resolution - Prevent, De-escalate, Resolve
When Employees Travel: Wage and Expense Rules Employers Mus…
Female to Female Hostility @Workplace: All you Need to Know
With Mandatory Paid Leave Gaining Ground Is It Time To Do A…
Implementing an Effective Human Error Reduction Program
Validation Statistics for Non-Statisticians
Form 1099-MISC and 1099-NEC Compliance Update 2024
GAMP5, Second Edition and Alignment with Computer Software …
Why EBITDA Doesn't Spell Cash Flow and What Does
Project Management for Non-Project Managers - Scheduling yo…
The Totally Organized Professional Is All About Outcomes
Understanding the Math of HR… So You Can Show How HR Impact…
Sunshine Act Reporting - Clarification for Clinical Research
Re-imagine Finance & Accounting Made Simple. Three Webinars…
FFIEC BSA/AML Examination Manual: What Compliance Officers …
How to Address ISO's New Climate Change Requirements
I-9 Audits: Strengthening Your Immigration Compliance Strat…
Stay Interviews: A Powerful and Low-Cost Employee Engagemen…
How To Conduct An Internal Harassment And Bullying Investig…
Effective Onboarding: How to Welcome, Engage, and Retain Ne…
Managing Toxic & Other Employees Who Have Attitude Issues
Analytical Method Validation Under Good Laboratory Practic…
Do's and Don'ts of Documenting Employee Behaviour, Performa…
Do's and Don'ts of Giving Effective Feedback for Performanc…
Onboarding New Hires: Leverage the Potential of Artificial …
Project Management for HR, Administrative Professionals, an…
Tattoos, hijabs, piercings, and pink hair: The challenges …
How to Document Employee Discussions and Why it is Important
Using Behavior Based Interviewing for Finding the Best Matc…
Stressed Out: How to Handle Conflict, Difficult People and …
Harassment, Bullying, Gossip, Confrontational and Disruptiv…
Understanding the Artificial Intelligence Landscape
Marketing to Medicare or Medicaid Beneficiaries - What You …
Best Practices for Working With Vendors and Suppliers
Accounting For Non Accountants : Debit, Credits And Financi…
Principles & Practices for the Cybersecurity of Legacy Medi…
Independent Contractor vs. Employee New Rule Issued by The …
Ultimate Persuasion Strategies! - Secret Influence Tools & …
Kicking your Employee Retention Efforts into Overdrive: Sta…