This training program will describe the patterns that may indicate FMLA abuse, and how to respond to them. It will also define five key steps to an effective FMLA investigation and offer best practices companies can use to eliminate or reduce the likelihood of FMLA abuse.
WHY SHOULD YOU ATTEND?
When FMLA became law in 1993, it was intended to provide protection for employees who really needed it. Unfortunately, through the years, employees have figured out how to work FMLA and exploit the system.
Though the law may seem more lenient towards employees, it still allows employers with the tools and guidelines to effectively combat FMLA abuse.
This webinar will help leaders uncover FMLA abuse, and what needs to be done to address it. Participants will learn to investigate FMLA abuse, and how to respond if and when there is a case of abuse.
AREA COVERED
- Key components of FMLA and what companies and employees it applies to
- Most common forms of FMLA abuse
- What practices and patterns to look for to uncover abuse
- Key FMLA cases and how to protect your company
- Five steps to an effective investigation
- Best practices for preventing FMLA abuse
LEARNING OBJECTIVES
- Describe FMLA and what it means for companies and employees
- Identify the most frequent types of FMLA abuse
- Describe the practices or patterns that may indicate FMLA abuse, and how to respond to them
- Discuss important FMLA cases, and how they have impacted the legal landscape, relative to FMLA abuse
- Define the five key steps to an effective FMLA investigation
- Identify best practices companies can use to eliminate, or at least reduce the likelihood of FMLA abuse
WHO WILL BENEFIT?
- Chief human resource officers
- Employment managers
- Training and development managers
- HR professionals
- Line managers
- Leave managers
- HR generalists
- HR business partners
- Supervisors
When FMLA became law in 1993, it was intended to provide protection for employees who really needed it. Unfortunately, through the years, employees have figured out how to work FMLA and exploit the system.
Though the law may seem more lenient towards employees, it still allows employers with the tools and guidelines to effectively combat FMLA abuse.
This webinar will help leaders uncover FMLA abuse, and what needs to be done to address it. Participants will learn to investigate FMLA abuse, and how to respond if and when there is a case of abuse.
- Key components of FMLA and what companies and employees it applies to
- Most common forms of FMLA abuse
- What practices and patterns to look for to uncover abuse
- Key FMLA cases and how to protect your company
- Five steps to an effective investigation
- Best practices for preventing FMLA abuse
- Describe FMLA and what it means for companies and employees
- Identify the most frequent types of FMLA abuse
- Describe the practices or patterns that may indicate FMLA abuse, and how to respond to them
- Discuss important FMLA cases, and how they have impacted the legal landscape, relative to FMLA abuse
- Define the five key steps to an effective FMLA investigation
- Identify best practices companies can use to eliminate, or at least reduce the likelihood of FMLA abuse
- Chief human resource officers
- Employment managers
- Training and development managers
- HR professionals
- Line managers
- Leave managers
- HR generalists
- HR business partners
- Supervisors
Speaker Profile
Deborah Covin Wilson, CPLP SHRM-SCP, SPHR, is the keynote speaker at ComplianceKey. She is the recently retired director of organizational development and consulting services, a unit in human resources administration at Georgia State University. With more than 25 years in higher education, she was responsible for training, employee engagement programs, strategic planning, HR communications, and organization development services. Deborah was involved in several University System of Georgia Board of Regents initiatives: She served as chair of the Tuition Assistance Program committee, a member of the Executive Leadership Institute Advisory Committee, and a steering committee member of the Accelerated Leadership Academy.Deborah …
Upcoming Webinars
Surviving and Thriving Organizational Change and Loss: The …
Impact Assessment and Risk Management for Change Control
Excel Deep Dive: Advanced Tips & Techniques – A 3-hour Work…
How to Write Effective Audit Observations: The Principles f…
Coming Soon - New Minimum Salary Levels for Exempt Employee…
Marijuana: Compliance and Safety in the Workplace
FDA Regulation of Artificial Intelligence/ Machine Learning
Stressed Out: How to Handle Conflict, Difficult People and …
2025 Top Employment Regulations That Will Impact Employers!
How to Handle Workplace Conversations Around Politics and R…
Data Integrity: Compliance with 21 CFR Part 11, SaaS-Cloud,…
How to Give Corrective Feedback: The CARE Model - Eliminati…
Improving Employee Engagement & Retention Through Stay Inte…
SOPs - How to Write Them to Satisfy those Inspectors
Why EBITDA Doesn't Spell Cash Flow and What Does
With Mandatory Paid Leave Gaining Ground Is It Time To Do A…
Marketing to Medicare or Medicaid Beneficiaries - What You …
Human Error Reduction Techniques for Floor Supervisors
Documenting Misconduct that Will Stand Up in Court
Trial Master File (TMF)/eTMF, & FDAs Draft Guidance for Ele…
Tattoos, hijabs, piercings, and pink hair: The challenges …
Project Management for Non-Project Managers - How to commun…
OSHA Requirements for Supervisors, Project Leaders & HR - W…
Humane Layoffs: How to Let People Go with Compassion and De…
Unlock Employee Loyalty: Stay Interviews Will Keep Them Eng…
Sunshine Act Reporting - Clarification for Clinical Research
FFIEC BSA/AML Examination Manual: What Compliance Officers …
Female to Female Hostility @Workplace: All you Need to Know
Onboarding is NOT Orientation - How to Improve the New Empl…
FDA Technology Modernization Action Plan (TMAP) and Impact …
Excel - Pivot Tables - The Key To Modern Data Analysis and …
Managing Toxic & Other Employees Who Have Attitude Issues
Building GMP Excellence: A Guide to Implementing Compliant …
Excel Power Skills: Master Functions, Formulas, and Macros …