4, Jun 2020
Importance of Video / Photo Surveillance

In the environment of uncertainty and risks, there is the constant fear of potential threats of the external sources, to destabilize and weaken the work force of an organization or institution. These dangers are invoking the organizations to use certain processes to protect them from these existing threats. In these processes, these organizations work out to closely monitor their premises for the safety and security. They adopt certain latest technology measures to constantly watch the premises, installations, warehouses, retail shops, and office and customer area for any uncommon or abnormal activity or illegal practice. There are activities of video surveillances which are used for the same purpose to closely monitor the desired area. This has been a key area in combating the constricting liabilities and losses of retail world. There are facilities of motions or still video coverage to minimize the risks of threats. These are judged as the best solution for gathering the audio visual evidence of any incident or fraud.

What is video surveillance?

Video surveillances are considered as the cost effective method for the safety and security of man, material and assets. All the reputed installation, offices, warehouses, retail shops are utilizing the technicalities of these surveillances to protect or secure their areas. These devices are able to detect the possible dangers at the early stages to have preventive measures. Quick intervention and right action taken by analyzing the fact brought out by these processes can minimize the damages. These processes are judged as the excellent and economical source for improving the safety and security of employees, asset and installations.

These surveillances have the wide variety of benefits in escalating the effective employees' safety. Main benefit of such processes are to police personnel's which closely monitor the prime location of typical crimes to predict the potential problems and helps them to extend the social security. In addition, fire fighting forces are using techniques to get the early signals of wild fires by monitoring the prone areas of high fire dangers. Similarly, these processes are being utilized medical field especially in ICU, Operation theaters to monitor the medical treatment facilities given to the patients.

Types of equipments

There are latest equipments utilized for the purpose of such processes. There is the list of equipment utilized for the purpose of such surveillances:

Video camera is the latest and cheapest equipment for such activities. This equipment presents excellent capability to capture the close to the target. Software utilized in these processes is adequate enough to collect and measure the footage. These equipments have the limitation of ascertaining specific individuals or objects.

Signals trackers are radio frequency ID tags are used to monitor the objects and individual movements. These tags emit a signal and allow the scanner to recognize the subject. Modern GPS systems also work on the same principle.

Signal Interceptors are able to intercept the radio communications. Electronic bugs physically installed on the switchboxes and telephone lines to monitor and divert the calls.

Audio Equipment is small and easily concealed microphones used for intercepting conversations.

Role in business

These systems are prominent in the most of the commercial, residential, industrial, financial environments. These are conducted to track out the people of suspicious character and abnormal behavior and movement of the doubted persons. These activities have immense uses in providing the office or home securities. These are carried out to monitor the movements and activities in the places like banks, hotels, hospitals, casinos and health care centers. These techniques are more accessible in the business and retail processes. There have been the sincere attempts to develop more sophisticated techniques to acknowledge the dangerous remote event and activities.

Conclusion

This is clear from the facts that the video surveillances have vital role to play in the routine life, to provide the safety and security to man, material and assets, from the danger of external threats.

4, May 2020
Is Computer Forensic Able to Control Cyber Crimes?

Cyber crime is the crime committed by using computer on the internet. Internet is being utilized for committing serious and heinous crime. The scope of cyber crime is very vast because these crimes are committed at the large scale to discourage the military of a country and at the same time, these crimes are able to weaken the strength of a country by mishandling the countries intelligence or illegally selling the intelligence to enemy country. Cyber crime has become the bigger threat to the confidentiality and secrecy of an individual, a group, business or a country.

What is cyber crime?

Cyber crime is the use of corrupt and criminal activities towards any individual, group, business or a country, by using computer and internet. These crimes are committed to retrieve the secret and confidential intelligence and vital information or by sending the fake emails of any terror attack or threat motive. These crimes are used as the weapon to carry out the serious crime and trace of the criminal or crime location is almost impossible. So criminals fearlessly and daringly go for committing huge crimes and there is the least or no possibility of catching the criminals.

How cyber crimes are committed?

Cyber crime is the fastest growing way of committing serious crimes. Top ranked criminals of crook minds explore the best use of speed and anonymity of the modern technology to carry out wide range of criminal activities. It includes theft of data and system information, identity thefts, internet frauds and deep penetration of kind of virus and botnets to do email scams. The Internet is used by the terrorists for the encouragement of radicalization which is the serious threat to international security. More often, hacker tools are available on the internet to do the crimes. The computer is utilized as the tool and target to the carry out of crimes. This is used for perpetrating the criminal activity by injecting a virus or worm which can crash entire network.

Effects of cyber crime in India

Cyber crime is having its terrifying effect on the information systems. Nothing is considered safe and secure on the computer in the present environment. It has become difficult to keep important information or intelligence on to the computer due to high rise of cyber crimes in the India. Information and intelligence security has become a bigger issue as the criminal are able to break the security measures to steal the important data's. All the sensitive and secret divisions in India are observing a great challenge and big threat to keep their vital information safe and secure. In this context, the major role is being played by the computer forensic for getting computer security and law enforcement. The statistics show that Cyber Crimes are high on rise. But the bigger problem is that these Crimes are not reported in India and it is presumed that Crime does not exist and that society is safe from such Crime. There are many reason for not reporting the crimes as people don't wish to face any police harassment and legal proceedings. So these crimes go on and nothing comes to light and no correct statistics of cyber crimes registered.

Is computer forensic controlling cyber crimes?

Computer forensic has become the one of the fastest growing field for information security and law enforcement. Use of computer forensics has become essential for every criminal investigation. The expert private investigators with thorough knowledge of disk structure and commercial software are able to investigate the cybercrimes. Indian police is becoming cyber crime savvy and hiring expert private investigators that are trained in the area. Many police stations have computers which are linked to police Head Quarters. Cyber Police Stations are functioning in major Cities all over India. A series of initiatives are continuing in computer forensics and cyber law procedures are established to give the desired resulted out of it.

Conclusion

This is clear from the fact and the available statistics reveals that computer forensics are contributing to deal with cyber crimes and police professionals active involvement and their expertise present the remarkable result and at the same, strict cyber law with fast track courts for quick prosecution and hard decisions will take the computer forensic investigations in broad way to eradicate the cyber crimes in India.

4, Apr 2020
Debt Recovery Services Offered in Uk-Practical Aspects

Debt recovery agencies offer such services in association with its network of debt recovery professionals including collectors and lawyers across various industry sectors. The services offered by such companies include commercial, corporate and sovereign debt recovery.

Such debt recovery companies combine a variety of pre-legal recovery and negotiation strategies aimed at amicable settlement while looking to avoid litigation for debt recovery. The aim is to avoid litigation unless it is absolutely necessary as clients may want to continue having a commercial relationship with the debtor in future.

Pre-legal debt collection services include a combination of letter and possibly telephone based requests. Pre-legal debt collection strategies and methods include issuing of a letter before contemplated action and in instances where a client has several debts to be collected, prioritizing such client's debtors for payment. In deserving cases, pre-legal negotiation strategies also include working on a new repayment plan for debts which would have otherwise been written off.

Communication with the debtor, face to face negotiations with the debtor (where possible), letter before action, collections is the typical pre-legal debt collection services.

On failure of pre-legal debt collection measures, recourse is made to legal action for debt recovery. Debt recovery companies work with and instruct lawyers for this purpose across different jurisdictions. Such companies also coordinate and manage any kind of litigation against the debtors. They aim at not only securing judgments and awards but also at enforcing them.

To seek successful enforcement of judgments and awards, such companies can at client's instructions also offer other services that help in identifying attachable assets. Such ancillary services include preparing trace reports and making necessary collections, preparing pre-sue reports, asset trace reports, company search report and property related search report.

Morgan Walker Legal Services Pvt Ltd under the trade name Debt Recovery Counsel provides such services on a No Success/No Fee Agreement basis. On successful recovery of a debt however, a small commission is charged. Lower the claim amount higher the commission charged. The commission rates also vary depending on other criteria such as individual one off claims, bulk debt recovery requests, international debt recovery etc.

Claims run on Morgan Walker Legal Services Pvt Ltd's web managed service costs you nothing win or lose. Personal phone calls and personal visits and conversation with representatives and /or solicitors engaged by Morgan Walker Legal Services Pvt Ltd are however additionally charged for.

Whilst best efforts are made to avoid matters progressing to litigation, if matters however do so progress, solicitors who enter into a No Success/No Fee Agreement in relation to their legal costs are appointed. You may in the process be advised to take out a litigation protection insurance policy to protect against any other potential costs. The No Success/No Fee Agreement that you would be required to enter into with us, would further clarify the terms of engagement and percentage of success fee charged on engaging lawyers engaged by Debt Recovery Counsel.

4, Mar 2020
Avoiding Internet Crimes And Their Penalties

Be it for classes or social networks, a job or leisure, many people over the worldmake use of the web on a daily basis. Unfortunately, not everyone makes use of it with good intentions. Last year, the amount of money wasted on cyber offenses surpassed $550,000,000, over twice the loss from merely the year before. The following are a few of the most widespread online crimes, and ways you could steer clear of becoming a victim.

The most typical kind of cyber law-breaking is identity theft. This happens when a person sets up a site (or distributes a message directing recipients to the site) with the intention that the victim provides his or her personal information, including bank card numbers or SSN. The individual or group driving the con then uses your credit card for transactions, or with debit cards, deplete your account. This also can occur if you unconsciously saved a computer virus from a site or e-mail attachment. You'll want to exercise caution prior to getting any kind of file from an unfamiliar website, and get some type of virus protection for the system. Additionally, keep clear of any unwarranted business enterprise proposals from individuals you don't recognize. These are nearly always a sham, and people found in charge of producing and releasing viruses may face prison time.

One more net crime which could have an effect on several thousand people, even sizeable organizations, is hacking. Hackers use several ways to obtainpasswords and various other data with a purpose to replace a webpage's information, send messages from other people's names and gain access to your private data.

Based on the hacker's intended victim, this may end in substantial and wide-spread trouble. In addition to several other consequences, this tends to result in a sentence of as long as 36 months of prison time; any individual endeavoring to get into a government page or network system can be looking at a full ten years in jail. Updating passwords regularly is a good technique to dissuade would-be online criminals, but every now and then this takes place despite the strength and durability of your attempts to preserve your computer.

4, Feb 2020
San Bernardino DUI Lawyers

When arrested for DUI offence, the best person that you need to call is your San Bernardino DUI lawyer. A common mistake made by a majority of persons arrested for driving under the influence is to admit their guilt. Do this at your own peril. DUI charges are grave and the judge or jury you are likely to appear before will not give you two cent thoughts even if this was your first offence. Charges on DUI may vary from state and depending on whether you caused vehicular accident that resulted in injuries or fatalities. Never at one point should you fall for the old trick in the book for a plea bargain. Any legal advice should only come from your San Bernardino DUI lawyer.

There are several advantages that you stand to gain by hiring a DUI lawyer than deciding to go solo on the case. For instance:

If the arresting officer trampled on your rights when making the arrest or carrying out sobriety test, only your lawyer can be able to identify such faults. This if argued well by your DUI lawyer, chances of your case being thrown out are high.

You need to know that the burden of proof in your DUI case lies on the breathalyzer and the sobriety tests carried. Foremost, your DUI lawyer will want to know the effectiveness of the breathalyzer used. If it is poorly maintained, there are the chances it may not work properly. In addition, when carrying the sobriety test, your lawyer will want to know the conditions of the surroundings at that particular time. If there were oncoming traffic lights, it may have interfered with your visibility. If there it was windy or rainy chances you would not have passed even if you were sober. Such holes can only be poked by an experienced San Bernardino DUI lawyer.

4, Jan 2020
Punishing Cyber Bullying

Not too long ago, a child could find refuge at home. Despite being made fun of at school for one reason or another, or not having anyone to play with at recess, a kid could go home at the end of the day to a family who accepted and loved him. Home was a safe place free from the other children who made fun of him. The bullies in the class would have to make an extra effort to bully outside of school. They had to pick up the phone, without their own parents being aware, and dial their target's house for a prank call, or find a way to physically travel to their target's home to ding-dong-ditch, or play some other prank without being seen in the neighborhood.

Social media has slowly crept into younger and younger generations' lives in the past decade. Teens joined MySpace and instant messaged with friends, which allowed them to connect with friends virtually and outside of school. While this gave the opportunity to develop friendships without having to physically be in the same room as a friend, it also opened the door to advanced bullying. When Facebook became available to the general public and not just those in university, it took off. High scholars and middle scholars created accounts and added their classmates to their friend lists. Bullies were given the ticket to anonymity and invisibility.

In the virtual world, it is often difficult to judge a person's reaction and tone. The comment could be intended to be sarcastic, but when just reading it off the screen, could be interpreted as serious. Feelings are easily hurt and arguments take off because of minor misunderstanding. In grade-school children, it is far too easy to post about a classmate and never fully understand how the post made them feel. Reactions are made and things are typed and sent before thinking of what they typed emotionally means. Kids will say things they would never say to someone's face because they don't see the tears, anger, or upset facial expressions of their peers when the interaction is online.

School administrations have to decide how to address this new type of bullying. In Massachusetts, schools have given police the reigns for how bullying should be punished all together. (See: ) Criminalizing bullying makes a huge impact in the lives of children. It is far too easy, especially with kids who are still learning about human relations, to make hurtful comments online. This could go on for a long time before a parent or teacher finds out. By then, it is too late. Someone has gotten hurt or the bullying has gone too far, requiring police involvement. What used to be punishable with a week of detention or suspension from school now has legal consequences.

When we think of children convicted of crimes, we imagine a juvenile detention center full of uncontrollable young adults who are at their last resort of restraint. Do we really want to group a child, who is perhaps the victim of bullying himself, who has bullied a classmate in the same category as a child who killed another? Massachusetts says yes, make them criminals. Don't give them the benefit of the doubt anymore by allowing school authorities to handle the situation, send them straight to the police.

While the victims of bullies are often traumatized by the taunts they face, the bully will be equally traumatized in being accused of a crime. An attorney must be hired putting financial strain on the family, court appearances require missing work and school, gossip in the school about the case will leave the child will be stigmatized. All of these are things anyone accused of a crime will go through. The difference is an adult accused of a crime has developed emotionally and is supposed to know what is acceptable to society and they are able to cope more than a child in the same situation would. So why does Massachusetts suddenly think it is ok to treat a mistake as a crime? One student committed suicide and the legislature responded, dramatically. While these students certainly did take their bulling too far, should they really be the ones responsible for the death of their classmate?

4, Dec 2019
Is Government Taking Stronger Steps to Reduce Cyber Crimes?

In the environment of risks and uncertainty, there are more possibility of crimes and corruptions. This is due to the new inventions and modernization of technology. The effects of these changes are assisting the people of corrupt mind to instill or evolve new ways or methodology to commit the faults. They develop latest techniques and new way to apply on the victims. The modern lawbreaker are so expert and knowledgeable that they carry out the faults in such a way that they don't leave any identity marks after committing the felony. So the investigation and verification of them becomes a tough work for the law enforcement agencies to identify the felony. But, latest trends are making use of computer technology to do unlawful acts by using the internet. This has become an effective and remote way to carry out frauds and faults. In the present scenario, these are taken up as the cyber crimes, a most popular term which is very commonly observed in almost all the latest felonies. Cyber crimes have become an impregnable way immensely followed by expert offenders.

What are the cyber crimes?

This relates to the faults committed by using internet on the computer where computers are targeted to retrieve any vital information or secret data. In this type of offences, usually lawbreaker intends to attack other computers by spreading certain kind of viruses. In the other kinds , computer are utilized as the weapon where computer is used to create the frauds like credit card , banking attacks or online purchase where such frauds are committed in big way. In addition, computers are used as the an accessory to store such information and data's. These are used to store the illegal or stolen information of the victims.

Recent survey depicts that teens are also more involved in such acts, they find computer as the easy and intelligent way to commit illegal acts and becoming expert to do online frauds. This is due to the apprehension that they can't be traced and identified. So, more teens are getting attracted to computer faults There are numerous hacker tools came in the market which are so popular and unique way to expert a fraudster to learn the technique to commit the crimes without much efforts. Usually teens carry out these activities to get the fun on line, but when they get little financial gains by doing these activities at the smaller scale then they get more courage to practice these activities at the large scale and it increases the involvement of teens in the cyber offences. In the modern society, cyber space has become vulnerable to commit felonies. In the latest crimes, cyber techniques are used to do the threatening emails or spam mails which is the new way to do the frauds. So in the real term, this has become a threat full and dangerous environment where cyber offences have put a question on the safety and security of the secret information and valuable data's.

Government actions

This has become a serious issue before the government. Since the safety and security of any information have been a difficult point. The critical effects of them are breaking of computer passwords and hacking of computers to steal the secret information. Government alone is unable to have the solution to such unlawful acts, so government has invited many organizations to work on the schemes brought out by them. Government has formed committee for internet related issue (CIRP) which has brought out standard policies to look for all the internet related problems and disputes.

These acts involve the traditional crimes like thefts, frauds, mischief's, forgery and defamations which are subject to IPC. These are regulated by the cyber laws. These laws are having the prosecution for all kind of cyber commitments which involves the illegal cyber activities like unauthorized access & hacking of computer, Virus and worm attacks, Trojan attack. Email, spoofing, spamming and bombing, defamatory emails, email frauds, IRC attacks and service attacks. Although, government is taking every possible step to curb the rise, but modern acts are out of the reach of the cyber laws, This is clear from the facts that the government steps are not strong enough to reduce the such acts, so government need to evolve a new strategy and strict policies to have the effective law enforcement of the cyber criminals.

Conclusion

It is conclusive that government is not having the strong laws and enforcement actions to reduce or minimize the cyber offences. The existing rules and law are not enough to remove the illegal works from the society.

4, Nov 2019
How to Look Out For Business Fraud And Help Your Business?

Whether you are in your own country or in foreign land, you will often hear about corporate frauds happening every now and then. Business world today is far more complicated than before mainly because of the new technologies and government policies and practices that are involved. No wonder people turn out for ways to make easy money and search for effective business sham which they hide such sham plans with various causes. However, it is important that you have a business fraud investigator in your firm if you feel something is not happening the right way. Business isn't an easy task to handle, an employer has to look and manage several company departments and all this never gives them enough time to scrutinise the business or corporate frauds emerging in your company.

On the other hand, there are many business owners that fear that exposing the business sham in the company can lead to bigger problems in the future as the news might get leaked in the market and get printed in the newspapers and that can ruin the reputation of the firm. However, there are many lawyers and solicitors that handle corporate fraud and business fraud cases privately and the basic structure of the investigation is all about questioning the employees and executives of the company randomly. The questions that these investigators ask are all connected to the company sham and finally their findings help them reach the main culprit involved in the company sham

The investigation also goes on secretly with the help of IT staff that can provide all the data and information that will be used to trace and find where and when the fraud has happened. This way, the culprit is identified and at the same time, the company can formulate better policies so as to plug in the business loopholes thereby helping them prevent such shams from arising in the years to come. No one is spared from the heat of investigation and every person is questioned which causes a stressful atmosphere in the company. A lot of information gathered while the investigation process is kept confidential which is the best thing about corporate fraud investigation and therefore you can be sure that your corporate trade secrets and information are safe and secured .

When you are looking for help on corporate and business fraud you will need to look out for experts that can provide you with better information and expertise. A lawyer who has several years of experience would be your best choice. Though the US corporate frauds are handled by the federal agencies, but when it comes to private companies, they are free to hire private corporate fraud lawyers to solve their case with great attention and care. Corporate and business fraud usually focuses on various issues like money laundering, tax evasion, bribery, bank fraud, commodities fraud and even financial violations. Some of the executives that are involved in corporate and business fraud are also involved in tax violations, inflating revenues and falsification of financial documents and information and misuse of corporate property and conspiracy against the corporate firm.

4, Oct 2019
Cyber Stalking Facts

Cyberstalking is a recent form of criminal behavior involving persistent threats or unwanted attention using the Internet and other means of computer communications.

With more and more people going "online," the opportunity to target someone on the Internet is becoming limitless. Cyberstalkers visit chat rooms, discussion forums or message boards in search of victims. The range of cyberstalking can range from aggressive and hostile email, chat room bullying, leaving abusing messages in guest books to sending e-viruses, tracing a victim's computer and identity theft.

Like regular stalkers, cyberstalkers want to intimidate and control their victims. Cyberstalkers do it with the use of the Internet. The Internet can be used to trace the victim's real name and address. For instance, it is remarkably easy to find out what party a victim is planning to attend and when by checking the information on a site such as Facebook.

The use of technology makes locating a victim easier than ever before. Anyone can type in certain key words into the computer which will bring up a myriad of internet datafurnishing companies that supply private records and information online, either free or for a nominal fee. The internet can do what private detectives of the past only dreamed of doing.

States are attempting to deal with this new form of criminal behavior. Early in 2009, the state of California enacted a set of new stalking laws. These laws make it a misdemeanor to publish information on the Internet which describes a teacher or his or her family or mentions where the teacher lives with the intent of having another person commit a crime against that teacher. The penalty is up to one year in prison and/or a $1,000 fine. This law can also be invoked to protect people other than teachers against cyber-threats. It is now considered a misdemeanor in California to place any person in fear of his or her safety by means of Internet threats and threats using cell phones, PDAs, video recorders or pagers.

Several cases of cyberstalking have been prosecuted under California's new cyberstalking laws. In the state's very first case, the state prosecuted a man who used the internet to impersonate his victim, a young woman who'd spurned his attentions. Pretending to be the victim, the man posted her phone number and address and stated that she had rape fantasies she wanted fulfilled. Strange men started to show up at the victim's apartment ready to rape her and became angry when she refused. The cyberstalker was sentenced to six years in prison.

In another case, a graduate student from the University of San Diego cyberstalked five female students for a year. He sent hundreds of threatening emails. The graduate student was arrested and sentenced to six years in prison. He told police the women were ridiculing him. The victims, in fact, had never met this man.

Prior to California's anti-cyberstalking laws, the crime was difficult to prosecute. Deidre Des Jardins, a student at UC-Santa Cruz, started getting violet emails from her ex-boyfriend. Some threats were directed at her, others dealt with violence in general. Local law enforcement agents were unable to do anything since the act of cyberstalking had not been clearly defined as a crime. The campus police, also, were unable to act, even though the threatening emails continued for several years. Deidre was told that since some of the messages dealt with violence in general and not specifically with her, it didn't fit the definition of cyberstalking. Her ex-boyfriend was never arrested.

Cyberstalking can evolve into real-life stalking where the victim is harassed by excessive telephone calls, vandalism, trespassing and even physical assault.

Some cyberstalkers know their victims. Others have some kind of imaginary connection to the ones they stalk. It is not unusual for a celebrity cyberstalker to become violent when his fantasy is threatened. In a recent news story, a cyberstalker sent cyberthreats to a Knox County state's attorney because the stalker believed that the state's attorney was interfering in his relationship with model Cheryl Tiegs. The cyberstalker was obsessed with Tiegs and had been stalking her for years. She had never met him. The relationship existed in the cyberstalker's mind only.

Cyberstalking is a real threat. Due to limited laws, the only real defense to use caution when revealing personal information on the Internet. The less, the better.

4, Sep 2019
The Overtime For Exempt Employees

According to the Fair Labor Standards Act (FLSA), some employees are exempt from the payment of an enhanced rate of pay for each hour over forty (40) in a work week, also known as 'overtime'. While employers are not required to compensate otherwise exempt employees, some employers choose to pay additional compensation to exempt employees for additional work. In order to keep the exemption, employers need to provide this compensation carefully and in compliance with applicable laws.

Pursuant to Section 541.604 of the FLSA, an employer may provide an exempt employee with additional compensation beyond the employee's regular salary without losing the exemption or violating the salary basis requirement, if the employment arrangement also includes a guaranteed salary of at least $455 per week, without any deductions for additional compensation may be in the form of a bonus, flat sum, additional time off, or time and a half or straight time pay for all hours the employee works beyond a normal work week.

The normal work week can be defined by the employer as it determines is appropriate for the salaried employee and does not have to be in accordance with the requirements of the FLSA. Therefore, an employer can determine how many hours it wants to declare constitute a normal work week for salaried employees. For instance an employer can have a policy that it will only pay straight time to employees for all hours worked over 50 hours per week, not the 40 hours as required for non-exempt employees.

The Federal Acquisitions Regulations (FAR) state that the use of uncompensated overtime, "hours worked without additional compensation in excess of an average of 40 hours per week by direct charge employees who are exempt from the Fair Labor Standards Act, is not encouraged.

Furthermore, if you are not going to pay overtime to overtime exempt FAR Regulation 37.115-2 states that when professional or technical services are acquired on the basis of the number of hours to be provided, rather than on the task to be performed, the solicitation shall require offerors to identify uncompensated overtime hours and the uncompensated overtime rate for direct charge Fair Labor Standards Act-exempt personnel included in their proposals and subcontractor proposals. This includes uncompensated overtime hours that are in indirect cost pools for personnel whose regular hours are normally charged 37.115-2.

This section suggests that under FAR the payment of overtime for exempt employees is encouraged when the contract is based upon time and materials. The FAR regulations also require that contractors abide by federal wage and hours laws regarding the payment of overtime to non-exempt employees.

Compensating exempt employees as non-exempt by paying customary time-and-a-half pay can lead to a termination of the exemption and legal action against the employer.

An exempt employee is "exempt" or excused from the overtime pay requirements. Exempt status little to do with the actual job description or title, but rather focuses more on the duties and responsibilities of the employee. Though the definition may vary by jurisdiction, an employee is usually exempt if they have more responsibilities than the average employee, and if they perform tasks that are more managerial in nature.

Exempt employees are not required to punch a clock. The FLSA does not place limits on the amount of time that an employer is allowed to require an exempt employee to work. Again, state laws may have different requirements from the FLSA.

Therefore, such employees are exempt from being paid overtime because it is assumed that the worker is working rather independently and has more discretion in the execution of their tasks. For example, if the person is involved in hiring and firing duties, they will likely be classified as exempt.

Certain categories of workers are automatically listed as exempt, including administrative personnel, executives, highly skilled workers, and licensed professionals such as doctors and engineers. Also, even if an employee is not specifically listed as exempt, they may fit into an overtime pay exemption category based on what their daily responsibilities involve.