Skip to main content

持H-1B身份被解雇后怎么办?

持H-1B身份被解雇后怎么办?

Wiritten by:  Beth Robertie, Esq.
Tranlated by: Mandman (Man Law)


     基于目前的经济和就业状况,我们常常收到客户有关持H1B
身份被解雇后该怎么办的问题。显然,每个个案不同。当你遇到
这一情况时,应该向有经验的专业移民律师咨询。以下几点供你参考:

1. H-1B签证持有人在雇佣中止之日起,就丧失了合法的身份,
即使他(她)收到了相当于几个星期或者几个月工资的遣散费;

2. 如果H-1B签证持有人想转移自己的H-1B至另外一家雇主处,
必须提供最近三个月的工资单给移民局,以示你和前一家雇主的
连续雇佣关系。这就意味着,如果你想转移你的H-1B,则前后两个
雇佣关系之间不能相差数周乃至数月。

3. 不过,光明的一面就是:由于你已经拥有受限制H-1B的身份,
所以在六年有效期(见注)之内,你再次申请H-1B将不受配额限制。

4. 如果你无法立即找到其它雇主,你需要考虑其它的非移民签证,
如果你已婚,可转换至非移民配偶签证(F-2/H-4);
或者旅游签证(B-2)、学生签证(F-1)。

5. 不要放任自流。正如前面所述,你的H-1B身份自雇佣关系解除
之日就中止了,你必须采取措施防止你的身份变成非法居留状态,
从而防碍到你今后获得其它非移民签证或者绿卡的能力。

注解:

这里H-1B的“六年有效期”计算方法如下:

1, 如果H-1B持有人,曾经持H-4或者L-1, 那么H-1B身份
6年有效期是指,其H4,L1和H1B身份的有效期总共加起来,
不超过6年.

2, 如果H-1B持有人曾经从H-1B转换到F-1或者F-2, 然后
又转换回H-1B, 那么H-1B身份6年有效期是指, 前后所有
H-1B身份的有效期总共加起来, 不超过6年.

3, 如果H-1B持有人曾经离开美国超过1年, 回到美国后
再重新申请了新的H-1B, 那么H-1B身份6年有效期是指,
从其回到美国后, 新的H1B生效期开始, 不超过6年.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...