HR Technology

Are You Keeping Pace with Developments in Leave Management?

Let’s face it. Managing employee leave isn’t the most glamorous aspect of HR or workforce management. But it’s certainly among the most challenging. The legal and regulatory backdrop to leave management is complex, and it varies based on factors that range from where you do business to the size of your company. You feel as if the rules are ever-changing. It’s like doing business in an amusement park fun house; it’s a challenge to keep your footing, hard to know if what you’re seeing is real, and difficult to get a firm hold on the rail to help lead you through the maze.

Streamlining the Data Conversion Process

This week’s blog post is brought to you by Optis’ Senior Data Analyst, Andy Kersh.

2015 HR Tech Outlook

This week’s post is brought to you by Optis’ Executive Vice President, Rene Gates.


Industry Trends in 2012

2012 will likely be a year of change. As the economy slowly continues to recover, we’ll be evaluating our country’s leaders and making decisions that will surely impact the HR, employee benefits, and risk management professions.

In addition, the technology landscape will continue to evolve and create opportunities that have never existed before. In the year to come, keep an eye on the trends below to help you and your organization adapt to the changes in 2012.

Are Your Leave Specialist KSAOC’s Enhanced by Your HR Technology? Part II

In part one of this series, we talked about how an FMLA software tool can enhance HR’s ability to perform at a high level and remain FMLA compliant. We focused on Leave of Absence Specialist KSAOC’s traits such as leadership and innovation. Today’s post continues the theme but focuses on what KSAOC’s are associated with the maximization of return-to-work (RTW) efforts and how this can be enhanced through the strategic purchase of appropriate HR technology.

On the Mind: Security Protocols

“The mantra of any good security engineer is: Security is not a product, but a process. It’s more than designing strong cryptography into a system; it’s designing the entire system that all security measures, including cryptography, work together.” - Bruce Schneier