Skip to main content

标  题: Re: 好奇如果被要求签PIP该怎么应对

http://gengwg.blogspot.com/发信人: syuan (头), 信区: Working
标  题: Re: 好奇如果被要求签PIP该怎么应对
发信站: BBS 未名空间站 (Wed Oct 16 11:08:24 2013, 美东)


这个具体要看PIP是怎么写的,不能一概而论。有些PIP是"知道"签字,有些是"同意"签
字。

http://www.employmentlawfirms.com/resources/employment/employee

“Refusing to sign a PIP can be interpreted as insubordination or a
voluntary quit. It is a better approach to sign under protest, adding a line
that contains some version of these thoughts: a) I disagree with the
content, b) I protest the PIP, c) my signature indicates only that I have
received this document, not that I agree with it, and d) I intend to prepare
a formal response.”

【 在 waterlily515 (彤儿) 的大作中提到: 】
: 以前同部门有一位同事,60岁左右,为人很好,像个阿姨一样。后来和她那组新来的小
: 老板有些冲突,小老板处处咄咄逼人,这阿姨不像她们组其它小朋友那么唯命是从(平
: 均年龄不到30吧),结果就是怎么做都不对。她身体渐渐不好,有过几次病休,回来不
: 久就被PIP了。她老实巴交的签了。90天后被fire了。
: 她后来有找过很多律师,觉得是age discrimination,律师都告诉她,签了PIP后被
: fire就没有case了。我觉得那阿姨特别可怜,本来过几年就退休了。
: 所以我觉得,如果你觉得不公平,最好现在说,以后你说任何话,都不见得会有人听了
: . 老板让你上PIP的唯一目的就是minimize future liability,要是就是为了你进步,
: 私下指导,weekly one-on-one, 总是可以的。
: 如果你觉得你有case,不如乘早negotiate a package, because after the PIP, no
: ...................

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...