Is Social Media Putting Employees’ Health, Safety at Risk?
Do your employees know about all of the risks that can come from their social media? Find out how social media can affect your employee's safety and health in this article from Employee Benefit News by Jill Hazan.
The issue of personal online safety has finally crossed over into the healthcare arena — and employers need to step up and learn to best educate employees about keeping them safe.
A recent article in the Journal of the American Medical Association Pediatrics, “Parental Sharing on the Internet: Child Privacy in the Age of Social Media and the Pediatrician’s Role,” highlights how parents who post information about their children on social media put them at greater risk for identity theft. In addition, this trend toward oversharing compromises a child’s protected health information. What might happen when that child applies for a job in the future and a simple internet search reveals health information she would not want an employer to know?
While HIPAA protects the confidentiality of an individual’s medical records, it doesn’t provide comprehensive protections outside the healthcare environment. The laws around the privacy rights of children relative to their parents’ online disclosures are still evolving. The article recommends that pediatricians ask parents about their social media habits to help keep children safe and their data private. It is a natural extension that all primary care providers should be asking patients about social media behaviors, as the issues of identity theft and data privacy are relevant to children and adults alike.
This recommendation is increasingly significant from an employee benefit perspective.
So what should employers do?
Employers routinely provide healthcare benefits to employees. If health plans and physicians are acknowledging and addressing the risks of social media from a privacy and security perspective, shouldn’t employers extend that focus into the workplace? With the continued employer emphasis on wellness, it is incumbent on health plans and employers alike to educate employees on online security and the risks of identity theft.
There are a variety of resources and benefits that employers can access to assist employees in navigating the online world safely. A series of well-structured, engaging seminars on identity theft and online security that combine real-life stories with actionable advice are effective in educating employees and changing behaviors. Online tutorials, like those provided by the Center for Identity at the University of Texas, Austin, can guide employees on setting proper privacy settings on social media sites, such as Facebook, Twitter, LinkedIn and Pinterest.
Identity theft protection plans provide monitoring and restoration services, as well as education to help keep employees and their families secure. EAPs may provide guidance on identity theft and counseling for victims. Comprehensive legal benefit plans provide legal advice and representation for victims of identity theft. Employers may also provide employees access to online data protection tools for use at work and home with features that encrypt communication and block malware and phishing attempts.
Employees need to understand how to navigate the social media and online environment to keep their families safe. Identity theft of a family member affects more than just one person. It can register an emotional, physical and financial toll on the entire family. Employers need to structure a comprehensive approach to managing the health and wellness of employees as it relates to their online behaviors. A program with a combination of employee benefits, from healthcare to identity theft protection benefits, supplemented by onsite employee education, will support the goals of the health plan and, ultimately, the organization’s overall business objectives.
See the original article Here.
Source:
Hazan J. (2017 May 1). Is social media putting employees' health, safety at risk? [Web blog post]. Retrieved from address https://www.benefitnews.com/opinion/is-social-media-putting-employees-health-safety-at-risk?feed=00000152-18a4-d58e-ad5a-99fc032b0000
Photo Credit: HowToStartABlogOnline.net
Cyberbullies: Worse than Swirlys in the Bathroom Stall?
Insightful post from the Society for Human Resource Management (SHRM) by Jillian Caswell
Technology and an unending stream of social media messages, notifications, and alerts have invaded our personal lives more than ever before – leaving the door wide open for the bullies of yesterday to get off the playground and into the Twittersphere. It’s almost comical to hear of exes who continue to stalk one another on Instagram and we all compare our traditional 9-to-5 careers to the jet setting elite on Snapchat, but have you ever stopped to think how this can impact our work lives? Unfortunately, the reality is the more connected we become, the more insidious bullying, and its close relative harassment, can become. As HR professionals, we have a duty and responsibility to understand not only how technology and social media can hinder business operations such as lost productivity, but also how it creates an environment of opportunity for employees to fall victim to bullying and harassment.
Become Aware and Observant
This goes beyond monitoring your own company’s social media channels! Before you can hope to identify and rectify potential cyberbullying incidents in your workplace, you must first prepare yourself with an understanding of what kinds of harassment and bullying can transpire in the digital realm. If you’re new to social media, there are numerous resources online to get you the crash course you need to become familiar with popular resources such as Facebook, Instagram, Snapchat, and Twitter. Live streaming functionality with outlets such as Periscope and Facebook Live create additional areas of opportunity for workplace bullies to exploit. Knowing how to monitor, identify, and respond swiftly and appropriately to harassment in these mediums is key to building a solid company policy relating expectations for employee interaction with company social media channels as well as harassment policies that are inclusive of online activities, privately or on public channels. There are dozens of masks that the face of cyberbullying can wear, whether it’s an Instagram post poking fun at a specific employee shared with other staff members, a ceaseless spewing of threats on Twitter, or an employee texting explicit content to coworkers. By becoming familiar both with the platforms themselves and the different forms of harassment and bullying that can occur in these environments, you will add another resource to your HR toolkit in navigating potentially sticky employee relations issues.
It may at first feel overwhelming to think of all the different variations of harassment that can play out on the stage of our smart phones and personal devices; however, employers are responsible to ensure they can provide a workplace free of harassment – a bridge that bullying can often rapidly cross over. Cyberbullying is often also more difficult to detect as it can transpire well out of the watchful eyes of the company HR department. In addition to familiarizing yourself with the different social media channels, consider the following suggestions to build a robust defense to cyberbullying:
- Training – For both your HR department and the other staff, it can become quite enlightening to provide trainings on what does and does not constitute harassment. This is also a great opportunity to provide a refresher on company policy relating to bullying and harassment.
- Demonstrate Appropriate Behavior – Take inventory of your own social media use. Are there potentially offensive postings or messages on your personal channels (which we’re sure you’ve already have on a private setting – right?!) or are you yourself aware of (even if not participating in) derogatory commentary circulating online about other staff members?
- Respond Adequately to Violations – Multiple court cases have provided substantial monetary awards to bullied employees who proved their arguments that their employer was aware harassment was occurring. Ensuring appropriate discipline occurs for those violating bullying policies demonstrates company efforts to provide workplaces free of harassment.
What’s Next?
So you’ve brought yourself up to speed with the most popular forms of social media and established a solid company policy with no tolerance for bullying and harassment. Think you’re set? Not always. Social media and technology is evolving and morphing into new formats at the speed of light – meaning that as HR professionals, our organizations rely on us to stay just as current with the latest trends and changes in the digital realm as much as in the office space. Stay current with the changing world of social media and digital communications and you’ll continue to be as effective as you are in all your other HR competencies!
See the original article Here.
Source:
Caswell, J. (2016 September 15). Cyberbullies: worse than swirlys in the bathroom stall? [Web blog post]. Retrieved from address https://blog.shrm.org/blog/cyberbullies-worse-than-swirlys-in-the-bathroom-stall
Non-drug approaches to pain management prove effective
Helpful insights on pain coping techniques from Industrial Safety & Hygiene News (ISHN)
Data from a review of U.S.-based clinical trials published in Mayo Clinic Proceedings suggest that some of the most popular complementary health approaches — such as yoga, tai chi, and acupuncture — appear to be effective tools for helping to manage common pain conditions. The review was conducted by a group of scientists from the National Center for Complementary and Integrative Health (NCCIH) at the National Institutes of Health.
Millions of Americans suffer from persistent pain that may not be fully relieved by medications. They often turn to complementary health approaches to help, yet primary care providers have lacked a robust evidence base to guide recommendations on complementary approaches as practiced and available in the United States. The new review gives primary care providers — who frequently see patients with chronic pain — tools to inform decision-making on how to help manage that pain.
“For many Americans who suffer from chronic pain, medications may not completely relieve pain and can produce unwanted side effects. As a result, many people may turn to nondrug approaches to help manage their pain,” said Richard L. Nahin, Ph.D., NCCIH’s lead epidemiologist and lead author of the analysis. “Our goal for this study was to provide relevant, high-quality information for primary care providers and for patients who suffer from chronic pain.”
The researchers reviewed 105 U.S.-based randomized controlled trials, from the past 50 years, that were relevant to pain patients in the United States and met inclusion criteria. Although the reporting of safety information was low overall, none of the clinical trials reported significant side effects due to the interventions.
The review focused on U.S.-based trial results on seven approaches used for one or more of five painful conditions — back pain, osteoarthritis, neck pain, fibromyalgia, and severe headaches and migraine — and found promise in the following for safety and effectiveness in treating pain:
- Acupuncture and yoga for back pain
- Acupuncture and tai chi for osteoarthritis of the knee
- Massage therapy for neck pain with adequate doses and for short-term benefit
- Relaxation techniques for severe headaches and migraine.
Though the evidence was weaker, the researchers also found that massage therapy, spinal manipulation, and osteopathic manipulation may provide some help for back pain, and relaxation approaches and tai chi might help people with fibromyalgia.
“These data can equip providers and patients with the information they need to have informed conversations regarding non-drug approaches for treatment of specific pain conditions,” said David Shurtleff, Ph.D., deputy director of NCCIH. “It’s important that continued research explore how these approaches actually work and whether these findings apply broadly in diverse clinical settings and patient populations.”
Read more about this report at nccih.nih.gov/pain_review.
About the National Center for Complementary and Integrative Health (NCCIH): NCCIH’s mission is to define, through rigorous scientific investigation, the usefulness and safety of complementary and integrative health approaches and their roles in improving health and health care. For additional information, call NCCIH’s Clearinghouse toll free at 1-888-644-6226, or visit the NCCIH Web site at nccih.nih.gov. Follow us on Twitter (link is external),Facebook (link is external), and YouTube.
About the National Institutes of Health (NIH): NIH, the nation's medical research agency, includes 27 Institutes and Centers and is a component of the U.S. Department of Health and Human Services. NIH is the primary federal agency conducting and supporting basic, clinical, and translational medical research, and is investigating the causes, treatments, and cures for both common and rare diseases. For more information about NIH and its programs, visit www.nih.gov.
See the original article Here.
Reference
Nahin RL, Boineau R, Khalsa PS, Stussman BJ, Weber WJ. (2016 September 7). Evidence-based evaluation of complementary health approaches for pain management in the United States. Mayo Clinic Proceedings. 2016;91(9):1292-1306. Retrieved from address https://www.ishn.com/articles/104834-non-drug-approaches-to-pain-management-prove-effective
Is There Really A Five-Second Rule About Food On The Floor?
Are your employees being break-room conscious about food safety? The article below gives more insight on the "five-second" rule and how it may effect your employees safety.
Original Post from CNN.com on June 15, 2016
When you drop a piece of food on the floor, is it really OK to eat if you pick up within five seconds? This urban food myth contends that if food spends just a few seconds on the floor, dirt and germs won't have much of a chance to contaminate it. Research in my lab has focused on how food and food contact surfaces become contaminated, and we've done some work on this particular piece of wisdom.
Where did the five-second rule come from?
Five seconds is all it takes
Should you eat food that's fallen on the floor?
Paul Dawson is professor of food science at Clemson University. This article was originally published onThe Conversation, a nonprofit news site publishing research from academia for the public.
See the original article here.
Source:
Dawson, P. (2016, June 15). Is there really a five-second rule about food on the floor? [Web log post]. Retrieved from https://www.cnn.com/2016/06/10/health/five-second-rule-food-on-floor/index.html
New Workers Are at Highest Risk for Heat-Related Death
Did you know new employees or workers coming back from an extended break are at more risk of heat stroke? It is important to make sure these workers review safety procedures and gradually build up their tolerance to the heat. See the article by Dana Wilkie below and make sure your new workers are safe.
Original Post from SHRM.org
Who would you guess is most at risk for heat-related death while on the job?
It’s not necessarily older workers, first responders or those who toil outside all day.
Instead, the majority of recent heat-related deaths investigated by federal authorities involved workers who’d been on the job for three days or less.
That finding by the Occupational Safety and Health Administration (OSHA) highlights how important it is for employers to ensure that new workers—and returning employees who have been back to the job for a week or less—are prepared to protect themselves, OSHA authorities said.
With weather forecasters calling for above-average temperatures across much of the country this summer, the standard precautions—drink lots of water, take frequent breaks and spend time in the shade—may seem obvious. Yet those precautions may not be enough for new workers or employees returning to the job after extended time away. OSHA recommends allowing new or returning workers to gradually increase their workload and take more frequent breaks as they build up a tolerance for working in the heat.
Prevention
Construction workers make up about one-third of heat-related worker deaths, but employees who work outdoors across many industries—agriculture, landscaping, transportation, utilities, grounds maintenance, emergency response, and oil and gas operations—are at risk when temperatures go up. Additionally, indoor employees who do strenuous work or wear bulky, protective clothing and use heavy equipment are also at risk. High humidity increases the chances of heat-related maladies such as heat exhaustion or heat stroke.
In 2014, 2,630 workers suffered from heat illness, and 18 died from heat stroke and related causes on the job, according to OSHA.
Under the general duty clause of the Occupational Safety and Health Act, employers are responsible for protecting workers from hazards on the job, including extreme heat. To prevent heat-related illness and fatalities, OSHA offers these suggestions:
- Prepare a heat acclimatization plan and medical monitoring program. Closely supervise new employees, including those who are temporary workers or returning seasonal workers, for the first 14 days on the job—or until they acclimate to the heat. Though most heat-related worker deaths occur in the first three days on the job, more than one-third occur on the first day. If someone has not worked in hot weather for at least a week, his or her body needs time to adjust.
- Encourage workers to drink about one cup of water every 15-20 minutes, even if they say they’re not thirsty. During prolonged sweating lasting several hours, they should drink sports beverages containing electrolytes.
- Provide shaded or air-conditioned rest areas for cooling down, and encourage workers to use them.
- Provide workers with protective equipment and clothing, such as hats, light-colored clothing, water-cooled garments, air-cooled garments, ice-packet vests, wetted overgarments, and heat-reflective aprons or suits.
- Be familiar with heat illness signs and symptoms, and make sure employees are, too. Some heat exhaustion signs are dizziness, headache, cramps, sweaty skin, nausea and vomiting, weakness, and a fast heartbeat. Heat stroke symptoms include: red, hot, dry skin; convulsions; fainting; and confusion. In general, any time a worker has fainted or demonstrates confusion, this represents an emergency situation.
- Tell workers to notify a supervisor or to call 911 if they or their co-workers show signs of heat illness. Implement a buddy system where workers observe each other for early signs and symptoms of heat intolerance. Have someone stay with a worker who is suffering from the heat until help arrives.
- Encourage supervisors and workers to download OSHA’s Heat Safety Tool on their iPhone or Android device. [https://www.osha.gov/SLTC/heatillness/heat_index/heat_app.html] This app calculates the heat index, a measurement of how hot it is when taking humidity into account. The app also has recommendations for preventing heat illness based on the estimated risk level where one is working.
Dana Wilkie is an online editor/manager for SHRM.
Read original article here.
Wilkie, D. (2016, June 6). New workers are at highest risk for heat-related death [Web log post]. Retrived from https://www.shrm.org/ResourcesAndTools/hr-topics/employee-relations/Pages/New-Workers-Are-at-Highest-Risk-for-Heat-Related-Death.aspx
Rethinking the Modern Accumulation of Technology
In an article from SHRM.org, Natalie Kroc addresses how technology is impacting security measures.
Original post from SHRM.org on June 16, 2016.
It wasn’t the latest gadget or platform or program that the speakers discussed at a recent conference session on how to keep teleworkers and remote workers connected. Instead, it was the most basic of modern technologies that kept being stressed:
E-mail. An Internet connection. Maybe a webcam (though this proved controversial).
“I am a Millennial, and I … primarily communicate through e-mail,” said Greg Caplan, founder and CEO of Remote Year, a year-old startup that has brought together a group of 75 people to travel the world while holding down various remote jobs. Caplan believes that, for work purposes, e-mail is still king.
The other panelists at the Telecommuting, Remote and Distributed (TRaD) Works Forum, held June 9-10 in Washington, D.C., agreed that the simplest of technologies can successfully keep offsite employees connected. TRaD refers to the different kinds of offsite employees: Telecommuters are those who work from home sometimes, remote workers do their entire jobs from home and a distributed workforce is when an organization doesn’t have a physical location so its employees all work remotely.
Employees who work offsite only need “an Internet connection. Anything else we can work around,” said Carol Cochran, director of people and culture for Boulder, Colo.-based FlexJobs, a job search site that focuses on telecommuting, part-time and other flexible work opportunities. FlexJobs was a co-host of the forum.
Organizations may want to consider providing their remote workers a cellphone with Internet capabilities as a backup. This all but guarantees that employees will be able to work—even if they are having difficulties with their home Internet connection.
A chat function can be useful as well, if the work that employees are doing would benefit from the ability to reach out and have real-time conversations.
Many organizations that employ remote workers have the routine of a “daily huddle” or something similar, wherein employees are expected to check in at the start of the day, whether in a brief meeting or by writing their day’s plans in a shared document.
When an organization’s workforce is made up of remote or teleworking employees, or a mix of offsite and onsite workers, it’s especially important to use the time when everyone gets together effectively. Meetings should be “30 minutes, if not 15 minutes, instead of an hour,” Cochran said. If certain employees are inclined to speak for long periods of time, establish a time limit—and then stick to it.
Video: Love It or Hate It
“I hate video,” Cochran said. “I’m really reluctant to put it on, it’s so awkward.” FlexJobs uses it only rarely, and even then it’s often for social occasions. Cochran said she has found that workers become preoccupied knowing they are being viewed on screen, and worry about their hair and clothes and background surroundings.
This was a point of fierce contention among the panelists and forum attendees alike, though. Some organizations believe that video is essential, and that any initial awkwardness that employees may feel will disappear with habitual use.
Alex Konanykhin, CEO of Transparent Business, a platform that aims to help companies that employ teleworkers and freelancers, offered a solution: Get the organization’s leaders to work from home—and to exercise right before the meeting. When they dial in, they should be in full post-workout gear, including messy hair or a baseball cap. “All it takes is one time” of seeing that, he said, to have a workforce that can be comfortable with being on screen.
Video is a way of giving voice to remote workers and “making them feel part of the organization,” he added.
For those organizations that decide to incorporate webcams into the remote-worker experience, the panelists had some advice:
- Don’t keep the webcams on all day—turn them on at specific times, such as for meetings or training sessions.
- Suggest to employees who express reluctance that they may want to purchase a simple screen or backdrop to place behind them so that their home surroundings will not be visible on screen. This also may help to convey a more-businesslike feel.
- Consider making video an option, not a requirement, for meetings.
- Finally, if the organization’s video capabilities prove to be less than ideal—and repeatedly involve technical snafus such as the video shutting off or freezing, then stop trying to make video happen.
Adopt New Tools Cautiously
The speakers had their individual favorites among newer technologies, such as messaging app Slack, electronic signature platform DocuSign, Google Drawings for collaborating on charts and diagrams, and Zoom for streamlining remote communications. However, the panelists also derided many new offerings as being unnecessarily confusing and others for seeming to be more about entertainment than practical application.
Tools that are adopted by an organization need to be fully embraced by both remote and onsite workers, the speakers agreed. “When you take on a tool, you have to have a very clear expectation of how it is to be used,” Caplan said. “And that’s just culture.”
That said, it’s important for organizations to pick their tools wisely. Each new tool should represent an improvement from whatever employees were using before to accomplish a particular task. And while entertainment shouldn’t be a priority, each new tool should make employees’ jobs easier, the panelists said.
“Why do people love Facebook?” asked Konanykhin. “It’s instant gratification.” Employees expect the same ease of use and sense of satisfaction with the tools they use for work.
Natalie Kroc is a staff writer for SHRM.
See the original article here.
Source:
Kroc, N. (2016, June 16). Rethinking the modern accumulation of techonology [Web log post]. Retrieved from https://www.shrm.org/ResourcesAndTools/hr-topics/technology/Pages/Rethinking-the-Modern-Accumulation-of-Technology.aspx
Keep Employee Data Safe
Original post benefitspro.com
When a cyber breach occurs, lawsuits are usually not far behind. It’s a chain of events that has become de rigueur in the consumer realm when retailers experience a breach and it is bleeding over into the workplace, too.
Employees whose data is exposed are increasingly pointing the finger at failings in the technology employers use to secure their information and lapses in protocols that allow vulnerabilities to be exploited.
Who is responsible if your employees’ personal information is stolen on company time? Where does the company’s obligations begin and end under the duty of care laws? How might state and federal breach regulations impact an organization’s proactive and reactive data security efforts?
How a breach happens and how the company responds both play a major role in determining the potential legal ramifications. To mitigate the risks, it is critical for HR professionals to understand their responsibilities before a cyber criminal strikes.
Many employers aren’t even aware of either the enormous security risks their organizations face or the best strategies to protect the employee data they hold.
Ensuring that employers have access to the right tools and expertise to address data breach concerns is an important role for benefits managers and the brokers and agents who support them.
Know the risks, have a plan
Financial information is what comes to mind most frequently when businesses consider where breach risks exist, but that thinking is too narrow. It overlooks the incredible value inherent in employee data. Not only does financial information lurk within HR’s employment records in the form of salary histories and bank routing numbers used for automatic deposits, but standard consumer data is also present.
Full names, birth dates, addresses and social security numbers exist in every employee’s file. Health and benefit data may be present, too, such as carrier names, subscriber numbers, or details on beneficiaries and dependents. And where there’s smoke, there’s fire. The same servers and systems that host employee and customer data, likely hold data pertaining to trade secrets, M&As, business plans, and more. All the more reason to get your company’s cyber strategy in gear.
Adding complexity to the situation is the fact that employers must be concerned with two types of data breaches — those that are the result of a purposeful act, such as a hacker or a malicious insider, and those that occur by accident. Lost laptops and cell phones are just one common example where an inadvertent exposure could easily happen.
Each flavor of breach represents a different risk profile and each requires its own mitigation measures. A two-pronged approach to breach prevention that marries technology and best practices enables employers to address any existing security gaps while also providing improved protection for employee data.
Deploying technology tools to safeguard sensitive information assets is one part of a comprehensive data security strategy that keeps employers in line with duty of care laws and other breach regulations.
Firms have a range of solutions to choose from and they should tailor their approach based on their network and infrastructure architecture, the information types that are vulnerable to exposure, the volume of data that must be protected, resource availability — from funding to staffing — and any regulatory guidelines or compliance mandates that must be considered.
Encryption is a perfect example of a technology that is relatively simple, but still enormously effective when it comes to securing employee data. Free and low-cost encryption platforms are available which can help to protect confidential information from unauthorized access even if a hardware item (thumb drive, laptop, etc.) falls into the wrong hands.
Other technology tools may also be appropriate depending on the employer’s needs, including firewalls, mobile device management software, and multi-factor authentication to protect access to more sensitive systems.
Security best practices are the second half of a successful data protection strategy. These protocols largely deal with the ways humans interact with the organization’s information and they also cover what to do in the event of a breach. Employers will want to manage network and data access in a way to limits who is able to view and change employee information.
Methodologies for storing, processing, analyzing, archiving, and destroying employee data should be documented in detail and anyone responsible for those tasks must be trained on the organization’s security practices.
An incident response plan is another best practice employers should include under the data security umbrella. This doesn’t need to an exhaustive plan, but it should outline the steps employees are to take if they suspect a breach has occurred — everything from blocking access to compromised servers to contacting the company’s privacy or information security employee or consultant. (Don’t have one? Here’s why you should.)
A strong plan can significantly limit the potential harm that is likely to fall upon any employee whose data was exposed. And as risks evolve, so should the incident response plan – it should be a living, breathing part of a comprehensive cyber strategy with routine reviews.
Retain the right expertise
Another concern often faced by employers, particularly those smaller organizations where internal resources are lean, is that they don’t have good insight into the evolving cyber threat environment and the latest data protection strategies.
Efforts to craft, deploy, and maintain an effective privacy and security program are made more difficult when industry expertise is lacking. Without a strong understanding of where security vulnerabilities exist, or which new threat vectors are likely to be of concern, employers could find themselves directing their limited resources in too many directions and without much effect.
Because many breach scenarios involve little or no technology — hard copies of completed enrollment forms accidentally left in a shared conference room, for example — simply turning responsibility for data privacy over to the IT function isn’t going to work. It’s important that employers are able to seek guidance from someone experienced in data protection in all its forms.
Continuously educate the front line
Employees themselves may pose potential security challenges, so continuous training is essential to protect a company’s own data and that of its customers. Companies should consider implementing educational sessions about new scams and privacy and security refreshers as part of their annual compliance training.
By partnering with employees to help protect their data, the organization can maximize its technology investment and ensure that everyone is committed to the company’s culture of security.
Social engineering schemes are increasingly popular among hackers, effectively turning the workforce into either an employer’s first line of defense or its greatest weakness.
The most recent spoof comes courtesy of a company’s top executive — or so the scammer wants you to think. An employee will receive a request from the CEO — either by way of a hacked email account or an email address that closely resembles the real thing — to cough up documents, usually W-2s. With a few clicks, countless data about a company’s employees has been exposed.
Rather than quickly react, employees should be trained that if they see something, say something.
Identity management
Along with taking appropriate security measures internally, employers may also consider offering identity-related benefits to their employees. These packages bring a powerful suite of tools to the table that provide workers with proactive education and reactive support. Informational resources teach individuals how to spot corrupt websites and suspicious e-mail links.
They give details on what to look for when conducting annual credit report reviews. And workers concerned their personal data may have been exposed — whether at work or through a health care provider, retailer or other avenue — have access to identity theft experts able to help them navigate the resolution process.
The fraud team can assist them in replacing important documents that may have been lost due to theft, fire or flood. They can even monitor known black market websites to see if an employee’s stolen data is being used fraudulently.
Together, these strategies give employers a way to keep employees’ information safe while providing workers with assurances that they’ll have the support they need if the worst should happen.
In Case of: Effective Responses to Workplace Emergencies
Within sixty seconds of its launch on November 14, 1969, the Apollo 12 spacecraft was struck twice by lightning, which caused critical navigation systems and fuel cells to shut down.
A N.A.S.A. engineer who remembered his training for a similar scenario immediately recommended a fix, which saved the entire mission and quite possibly the lives of the Apollo 12 astronauts.
Four months later, those same engineers faced and successfully responded to challenges that they never anticipated with the ill-fated Apollo 13 mission.
Emergencies can and do happen in every workplace, but it does not take a rocket scientist to plan for them or to fashion an intelligent response when they do happen.
Emergencies and Violence: The Stats
Workplace emergencies are not limited to high-tech or high-risk operations light rocket launches. Statistics compiled by the Occupational Safety and Health Administration (OSHA) and the Bureau of Labor Statistics (BLS) reveal more than 23,000 employee were injured in 2013 solely from workplace assaults.
The latest data available from the BLS show that the annual rate of workplace violence has held steady for more than twenty years, and violence continues to be the second leading cause of employee fatalities after transportation accidents.
This does not even account for injuries or fatalities that result from other workplace emergencies, including fires, natural disasters, chemical spills and contamination, or civil disturbances or terrorism. In 2010, more than three million workers suffered injuries following workplace emergencies. How a business responds to emergencies is typically a function of the nature of the emergency itself.
What Is Categorized as an Emergency?
OSHA defines a workplace emergency as an “unforeseen situation that threatens your employees, customers, or the public; disrupts or shuts down your operations; or causes physical or environmental damage”.
Most individuals might limit their concept of a workplace emergency to newsworthy, large-scale evacuations caused by natural or man-made causes, but lesser-scale emergencies are far more common. One employee might suffer an injury or a sudden medical event.
A small fire might be easily contained by sprinkler systems, but that fire will be no less disruptive of business operations than a larger conflagration. A single disgruntled individual can start an emergency situation that shuts a business down for days. If that individual is armed, the emergency becomes a national tragedy.
OSHA has issued Emergency Action Plan standards for workplace emergencies that are codified in the Federal Regulations. Those standards define, for example, when and where businesses need to have fire extinguishers, building evacuation plans, and medical emergency response protocols.
The New Focus: Armed Shooter Scenarios
Because of high-profile publicity and responses, businesses are also becoming more attuned to armed shooter scenarios. Although not without objection or controversy, some workplaces are training employees in a run/hide/fight protocol that was popularized by a video produced by the City of Houston.
The gist of that protocol is to train employees first to run from an armed assailant. If running is not possible, the employees should hide, and if hiding is impossible, only then should employees attempt to fight the assailant.
Technology can be a boon during a workplace emergency if it is used as a tool and not a solution. The Federal Emergency Management Agency (FEMA) places a high priority in communication technology in emergencies. Excessive reliance on technology can be a downfall, however, if an emergency removes the option to use technology. Businesses should consider deeper contingency plans in the event that the emergency takes down their communication networks.
A Wireless Emergency Alert (WEA) is a notification that is sent to mobile devices in cases of tornadoes, hurricanes, tsunamis and other serious emergencies. These emergency alerts are complimentary public safety service provided by participating wireless service providers. But, if employees have trouble with cellphone reception inside their workplace, they may or may not receive these alerts.
If workplaces were able to plan for all possible workplace emergencies, then to the extent that they were anticipated those events would not be emergencies. The responses by the NASA engineers in the Apollo program are more instructive in developing an effective workplace emergency response plan.
The Apollo 12 lightning strike shows the efficacy of contingency planning for potential emergencies and trusting an employee to implement his or her training when the emergency happens.
The engineer who recommended the solution after the lightning strike was in his early twenties, but his co-workers and the ship’s crew had developed enough of a cohesive relationship and a sense of trust among themselves that they did not hesitate to implement his solution.
During the Apollo 13 mission, the entire workforce again worked cohesively toward a common purpose to develop an effective response that, almost fifty years later, remains one of NASA’s finest efforts.
A workplace will not always have the luxury of implementing thorough contingency training to prepare for an emergency. A business’s ability to survive a workplace emergency is on a par with the conduct of its regular business operations. As with other aspects of those operations, the most effective emergency response requires mutual employee trust and cohesiveness.
Cybersecurity Should Be on Plan Sponsors’ Radar
Original post benefitspro.com
Cyber threats and attacks are so widespread that retirement plan sponsors are being warned to develop a cyber risk management strategy rather than a cyber risk elimination strategy.
That’s according to law firm Pillsbury Winthrop Shaw Pittman LLP, which said in an advisory that among other concerns, sponsors should be prepared to evaluate their third-party service providers’ cybersecurity programs and ensuring that the plans themselves have mitigated risks from losses in case of a cyberattack.
It shouldn’t come as a big surprise to anyone, considering that there’s a $5 trillion 401(k) market just sitting there waiting to be ravaged by hackers.
Considering that account holders often don’t check their accounts often enough to catch hacking attempts, and that the advisors and plan providers hold another wealth of information (pun intended) on those account holders, the retirement plan market is ripe for the plucking.
The trillions of dollars in 401(k) accounts are becoming particularly appealing to cyber criminals.
In its first of a series of advisories on cybersecurity issues regarding retirement plans, the law firm said that an effective cyber risk management strategy would include thorough due diligence by sponsors of TPAs and vendors; periodic implementation and review of contractual protections and insurance requirements in arrangements with TPAs; periodic monitoring of TPAs’ cybersecurity compliance and related risks; and consideration of whether to utilize the SAFETY Act, a liability management statute managed by the Department of Homeland Security, and purchase cyber and privacy insurance.
According to the brief, “Retirement plan sponsors and administrators could utilize the SAFETY Act in one of two ways: (1) by having their internal cybersecurity plans and policies SAFETY Act approved, thereby significantly limiting the possible scope of litigation claims they would face after a cyberattack; or (2) by requiring TPAs to hold SAFETY Act protections, as that would allow retirement plan sponsors and administrators to be dismissed from a broad array of claims alleging negligence or poor performance attributed to the third-party security products and services.”
Here are the top 10 most costly U.S. workplace injuries
Original post lifehealthpro.com
Workplace injuries and accidents are the near the top of every employer’s list of concerns.Here is the countdown of the top 10 causes and direct costs of the most disabling U.S. workplace injuries. The definitions and examples can be found at the BLS website.
- Repetitive motions involving micro-tasks
Some of these tasks may include a word processor who looks from the computer monitor to a document and back several times a day or the cashier at the local grocery store who is scanning and bagging groceries for several hours at a time.
- Struck against object or equipment
This category of workplace injury applies to workers who are hurt by forcible contact or impact, for example, an office worker who bumps into a filing cabinet or an assembly line worker who stubs a toe on stacked parts.
- Caught in or compressed by equipment or objects
These workplace injuries result from workers being caught in equipment or machinery that’s still running as well as in rolling, shifting or sliding objects.
Picture the scene in a movie in which wine barrels topple over, catching the bad guy beneath them, only in this case, it’s the employee whose job it may be to stack the barrels. Perhaps it’s the experienced worker who removes a machine guard to dislodge material that’s stuck and gets a finger caught when the machine starts moving again.
- Slip or trip without fall
Occasionally, workers do slip or trip without hitting the ground. Think of the employee entering the workplace who slips on icy stairs but is able to grab the handrail to prevent hitting the ground. But the action of grabbing the handrail may cause the employee to injure his shoulder or wrench her knee.
- Roadway incidents involving motorized land vehicle
The worker may be the driver, a passenger or a pedestrian, but the cause of the injury is an automobile, truck or motorcycle.
- Other exertions or bodily reactions
These motions include bending, crawling, reaching, twisting, climbing or stepping, according to the BLS. Consider, for example, a roofing contractor’s employees who are continually climbing up and down ladders.
- Struck by object or equipment
This category covers a range of possible injuries, from being struck by an object dropped by a fellow worker to being caught in a swinging door or gate. Picture the construction worker on a scaffold dropping a hammer on the worker below.
- Falls to lower level
The roofer could fall to the ground from the roof or ladder, or an office worker standing on a stepstool, reaching for a heavy file box, could fall to the floor.
- Falls on same level
The second most costly workplace injury, surprisingly, is a fall on the same level. Picture the employee who is walking through the office and falls over an uneven floor surface or someone leaning too far back in an office chair and toppling over.
- Overexertion involving an outside source
The BLS explains that overexertion occurs when the physical effort of a worker who lifts, pulls, pushes, holds, carries, wields or throws an object results in an injury.
The object being handled is often heavier than the weight that a worker should be handling or the object is handled improperly. For example, lifting from a shelf that’s too high, or in a space that’s cramped. Within the broad category of sprains, strains, and tears caused by overexertion, most incidents resulted specifically from overexertion in lifting.
Risk managers should work with their carriers and workplace safety specialists to minimize injuries, lost work days and workers’ compensation costs.With a little effort, employers can understand more about the causes of accidents and injuries in their organizations, identify the appropriate actions to reduce the number of injuries and minimize employee disabilities from workplace accidents.