Last blog added on Friday, April 12th, 2019

Information About First Reference Blog

Recent Posts

Below is a preview of the five most recent posts from the blog First Reference Blog. To read these posts in their entirely or subscribe to future updates from this blog, please visit their website!

  • Target benefit plans – From New Brunswick to Ontario to the UK

    In the most recent provincial budget, the Ontario government has signaled its willingness to expand its proposed target benefit framework outside the unionized environment. This is good news for the not-for-profit sector, and other non-unionized groups that may wish to establish a target benefit mul … Read more »

  • Good Friday, Easter and Passover in 2019

    Good Friday and Easter Sunday coincide with the Jewish observance of Passover in 2019. Easter and the holidays that are related to it are moveable feasts in that they do not fall on a fixed date in the Gregorian or Julian calendars which follow only the cycle of the sun; rather, their dates are dete … Read more »

  • Three popular articles this week on HRinfodesk

    Articles may require login credentials to HRinfodesk. Federal budget changes affecting employment Federal budget 2019 proposes a number of tax changes and measures of interest to employers and employees. (In PDF) Legislation introduced to eliminate MSP premiums On March 28, 2019, the British Columbi … Read more »

  • Critical work injuries – Ensure its prevention

    Without the proper safe work practices, safety policies are ineffective to protect workers in the workplace. A lumber company in Ontario was fined $75,000 after the critical injury of a worker while they were delivering an order of lumber in 2015. The company pleaded guilty in court as they did not … Read more »

  • Employee caused data breaches: What’s an organization to do?

    Data and privacy breaches caused by hacking and social engineering fraud are here to stay. Once considered an emerging risk, “cyber” is now a reality facing every organization. Cyber is not just techno-wizardry committed by hackers using high-tech code to break into a system. Phishing, spoofing, pre … Read more »

We're having trouble retrieving the latest posts for this blog - please visit the blog directly to see what's new.