DOL and EEOC Urge Workplace Support for Harassment Victims

The U.S. Department of Labor (DOL) and the Equal Employment Opportunity Commission (EEOC) have highlighted a significant and pressing issue in the American workplace: the support and protection of victims of gender-based violence and harassment (GBVH). Spotlighted during Mental Health Awareness Month and National Women’s Health Week, these federal agencies have brought forth guidance and shone a light on actionable steps for employers. Shifting the focus toward safe workplace environments, the agencies emphasize the importance of understanding GBVH and enhancing protective measures for those affected by it.

Combatting GBVH in the Workplace

GBVH leaves a lasting impact on survivors, inflicting harm that can be physical, emotional, sexual, or economic. The Women’s Bureau of the DOL has made it clear that comprehending and confronting the fundamental causes behind these behaviors—rooted in gender stereotypes and power dynamics—is essential for change. Employers are encouraged to assess the ways in which their workplaces may unintentionally perpetuate these harmful norms. Addressing these root causes can transform a company’s culture into one that rejects harassment and asserts its commitment to a safe, equitable workplace for all.

Employer’s Role in Safeguarding Employees

Employers play a crucial role in defending against workplace harassment. In the guidelines set forth, the DOL and EEOC have outlined proactive measures including the provision of leave and flexible working arrangements, as well as safeguards against wrongful dismissal. These accommodations are more than just a line of defense for affected individuals; they also make business sense as they help retain a diverse and skilled workforce, ultimately nurturing an empathetic and supportive community within the company.

Legal Frameworks and Protections

Compliance with federal laws is not just an obligation, but a moral imperative for employers. Title VII of the Civil Rights Act and the Americans with Disabilities Act provide a legal cornerstone, establishing clear rights for survivors of workplace harassment. The EEOC elucidates how these laws are applied through real-world examples, offering a clear message: there are dire consequences for failing to cultivate a safe environment—a mandate that extends beyond legal compliance to reflect a company’s core values.

Embracing a Comprehensive Leave Policy

A forward-thinking approach includes broadening leave policies. Innovations such as paid safe days, miscarriage leave, and thoughtful accommodations for menopausal staff are emerging in the conversation. These expanded policies are a testament to an organization’s commitment to the well-being of its people, considering the unique challenges faced by employees throughout their personal and professional lives.

Addressing GBVH in Changing Workspaces

During Mental Health Awareness Month and National Women’s Health Week, the Department of Labor (DOL) alongside the Equal Employment Opportunity Commission (EEOC) turned the spotlight on a crucial matter in the workplace—supporting and safeguarding those impacted by gender-based violence and harassment (GBVH). These government bodies provided valuable guidance and outlined practical measures that employers can take to foster a safer work environment. This initiative underscores the urgent need for a deepened understanding of GBVH and a stronger commitment to implementing protective strategies for those who endure such adversity in the workplace. By directing attention to this pivotal issue, the DOL and EEOC aim to empower employers to create more secure and supportive spaces for their employees.

Explore more

How Is Sloppy Lemming Reshaping South Asian Cyber Espionage?

A single breach in a nuclear regulatory database can shift the balance of power across an entire subcontinent before a single soldier crosses a physical border. The digital landscape of South Asia has evolved into a high-stakes theater where state-aligned threat actors operate with increasing audacity and reach. Among these entities, the group identified as Sloppy Lemming has emerged as

Three Core Traits of Highly Effective Modern Leaders

Ling-yi Tsai, a seasoned expert in HR technology and organizational psychology, has spent decades helping global firms navigate the intersection of human behavior and digital transformation. With a deep focus on HR analytics and talent management, she specializes in translating complex psychological principles into actionable leadership strategies that drive measurable results. Her work emphasizes that the most successful organizations are

How Did UMMC Recover From a Major Ransomware Attack?

The sudden silence of a digital heartbeat within a major academic medical center represents one of the most harrowing scenarios in modern healthcare, a reality that the University of Mississippi Medical Center confronted during the final week of February 2026. As the state’s primary academic medical hub, the institution found itself at the mercy of a sophisticated ransomware attack that

Is the BadPaw Campaign the Latest Cyber Threat to Ukraine?

The emergence of sophisticated digital incursions increasingly relies on exploiting the inherent trust users place in local infrastructure, as demonstrated by the recent identification of the BadPaw operation. This specific campaign meticulously targets Ukrainian entities by hijacking the perceived credibility of the popular ukr[.]net email service to distribute malicious links. Unlike broad-spectrum phishing attempts, BadPaw employs a nuanced multi-stage delivery

Trend Analysis: Industrialized Phishing Platforms

Modern cybercriminals have successfully transitioned from manual labor to a streamlined, automated supply chain that treats identity theft as a high-volume corporate enterprise. This shift marks the end of the lone-wolf era, replacing it with Phishing-as-a-Service (PhaaS) models that mimic legitimate software companies. As digital identity becomes the final barrier protecting sensitive assets, these platforms offer the tools necessary to