Reducing Your Exposure to Employment Litigation With Effective Policies and Procedures
09 March 2011
Please join us for a Foley Executive Briefing Series program that will outline how companies can develop, implement, and enforce policies and procedures to reduce exposure to employment litigation. Topics to be addressed include:
- How to effectively communicate with employees
- What information to include in employee handbooks, and why
- Which procedures should be used to evaluate employees, and how they should be implemented
These and other topics will be addressed in an interactive panel session led by Foley Boston Office Litigation Department Chair Thomas I. Elkind and Business Litigation & Dispute Resolution attorney Geoffrey M. Raux.
For questions about registering, please contact Kyle Heath at [email protected].
Reducing Your Exposure to Employment Litigation With Effective Policies and Procedures is part of the Foley Executive Briefing Series. Learn more about programs in the series at Foley.com/FEBS.
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.