Course Description
Don't wait for an audit or lawsuit - create a document retention program to protect your business.
New regulations - the constant threat of audits - the increased use of e-discovery - in today's changing legal environment, you're asking for trouble if you don't have an effective records and information management program in place. And even if you do, standards are changing - have your policies and procedures changed with them? Attend this seminar and learn what records to store and when, why and how to destroy them, and how to comply with pertinent statutory and regulatory standards. You will walk away with a real-world road map and best practices for implementing and updating a records management program that provides a safe harbor.
Who should attend?
This seminar is designed for attorneys, controllers,
accountants, CFOs, tax managers and officers, presidents, vice
presidents, human resource managers, compliance officers and records
managers.
Benefits for You
- Know what documents you need to destroy - avoid violations of privacy law
- Find out what retention standards apply to specific industries
- Position your company favorably by following bulletproof document destruction practices
- Prevent data breaches - and discover how to salvage the situation if worse comes to worst
Learning Objectives
- You will be able to discuss criminal background checks and I-9 compliance/audits.
- You will be able to identify FLSA recordkeeping requirements.
- You will be able to review medical document retention.
- You will be able to explain how to create bulletproof documentation in employee investigations.
Agenda
8:00 AM - 8:30 AM |
Registration |
|
|
8:30 AM - 9:30 AM |
Email Policies – Which Emails to Keep, Destroy and Document Retention Policies |
|
— Courtney Leyes Tomlinson |
|
- Spoliation and Related Problems When Deleting Emails
- Legal Duty to Preserve Emails
- Methods to Employ to Ensure Employees Don't Delete Personal Emails
- Preventing Fee Exposure and Other Risks
|
|
|
9:30 AM - 10:30 AM |
Criminal Background Checks and I-9 Compliance/Audits |
|
— Jaklyn Wrigley |
|
- Making the Decision to Conduct Background Checks
- Laws Implicated When a Company Runs Background Checks
- I-9 and E-Verify Compliance
- How to Avoid an Audit
|
|
|
10:30 AM - 10:40 AM |
Break |
|
|
10:40 AM - 12:00 PM |
FLSA Recordkeeping Requirements |
|
— John E. Thompson |
|
- Basic Requirements: What to Keep, How Long to Keep It
- Timekeeping Records and Related Practices
- Examples of Specialized Recordkeeping Requirements
- Exemption-Related Recordkeeping
|
|
|
12:00 PM - 1:00 PM |
Lunch (On Your Own) |
|
|
1:00 PM - 2:00 PM |
Medical Document Retention |
|
— Craig A. Cowart |
|
- Under the FMLA
- Under the ADAAA
- In Workers' Compensation Matters
- What About the Affordable Care Act?
|
|
|
2:00 PM - 2:50 PM |
Cyber Attacks – Preparing for Data Breach Threats |
|
— Steven Cupp |
|
- Cyber Attack Examples
- Update on Data Breach Response Law
- Costs to a Business
- Overview of Cyber Liability of Insurance
- Basic Tips for Protection
|
|
|
2:50 PM - 3:00 PM |
Break |
|
|
3:00 PM - 4:30 PM |
How to Create Bulletproof Documentation in Employee Investigations |
|
— Jeff Weintraub |
|
- Laws Requiring Investigations
- Preparing an Investigative Work-Plan
- Duties of the Investigator and Privacy Issues
- Conducting the Interviews
- Compiling the Investigative Report and Documenting the Investigation
|