New child labour norms leave many dissatisfied

69.5% of child labour in India are employed in the agriculture sector Read more »

Tax residency of companies

New rule leaves room for discretion in determining whether a foreign company can be said to be resident in India Read more »

Pardon delay, but not at high cost

The chronic defaulters in this aspect are revenue departments and arms of government Read more »

October Fraud Surprise for Retailers?

Why Failure to Implement EMV Could Prove Very CostlyU.S. merchants that aren't able to accept EMV chip cards by October should be bracing for significant upticks in card fraud expenses. Unfortunately, many... Read more »

‘Failure-Proof’ Mobile Security

Gartner's John Girard boils down the mobile security challenge to three topics: the number of devices, diversity of capabilities and the complexity of management. How does he advise CISOs to tackle these... Read more »

School’s out! Injuries to teen workers swell

As the summer job season approaches and more teens begin looking for work, employers should focus on training and giving them age-appropriate tasks. Read more »

Lumbermen’s ordered into financial rehabilitation

Lumbermen’s Underwriting Alliance, a Boca Raton, Florida-based workers compensation insurer, has been placed into rehabilitation by a Missouri court, according to the Missouri Department of Insurance. Read more »

Opioid addiction suit puts workers comp payers on alert

Experts urge workers compensation payers to take steps to avoid overprescribing or doctor shopping following a state Supreme Court's decision allowing patients to sue physicians and pharmacies for contributing to their addiction... Read more »

Why Visa’s Paying Banks More after Breaches

New Tiered System Designed to Help Smaller InstitutionsVisa has agreed to increase the reimbursement paid to banking institutions that must reissue cards in the wake of a merchant breach. Now the smaller... Read more »

The Evolution of Security Technology

As security threats have evolved, organizations have deployed layers of security controls. How can leaders address the vulnerabilities within these incremental controls? Juniper's Paul shares insight. Read more »