The NLRB Changing Landscape: Repeal of SuperShuttle and Return to FedEx II Standard for Independent Contractor Classification

For many years, businesses have relied on independent contractors to handle various tasks, often in an effort to cut labor costs. However, as the gig economy continues to grow and more workers are classified as independent contractors, questions arise over their rights and legal protections. The National Labor Relations Board (NLRB) has been at the forefront of this debate, working to distinguish between employees and independent contractors. This article will examine the NLRB’s recent decision to overrule the SuperShuttle decision and return to the FedEx II standard for determining independent contractor status.

The FedEx II Standard

In 2014, the NLRB set forth the FedEx II standard for determining whether workers are employees or independent contractors. Under this standard, the focus is on whether the worker has an entrepreneurial opportunity for gain or loss. In other words, if the worker has significant control over their work and can make decisions about how they perform their job, they are more likely to be considered an independent contractor.

Consideration of Common-Law Factors

Although the NLRB has returned to the FedEx II standard, it does not imply that common-law factors are irrelevant. Instead, the NLRB will assess and balance all of the traditional common-law factors when determining a worker’s status. These factors encompass the degree of control the employer possesses, the worker’s potential for profit or loss, and the payment method, among other factors.

Importance of Actual Entrepreneurial Opportunity

One of the key takeaways from the NLRB’s decision is the emphasis on actual, rather than theoretical, entrepreneurial opportunity. This means that workers must have a real opportunity to profit or lose based on their performance in order to be classified as independent contractors. Workers who are simply given the title of independent contractor, but have no control over their work or opportunity for profit or loss, are more likely to be considered employees.

Positive Reception of Decision

NLRB Chair Lauren McFerran praised the NLRB’s decision, stating that it will “ensure that workers who seek to organize or exercise their rights under the National Labor Relations Act are not improperly excluded from its protections.” This is a significant win for workers, especially those in the on-demand or sharing economy who have long struggled to secure labor rights and protections.

Protection of Workers’ Rights

The NLRB’s decision is a step in the right direction for protecting workers’ rights. By ensuring that workers are properly classified according to their level of control and opportunity for profit or loss, they can better advocate for their own interests and secure legal protections under the National Labor Relations Act. This is especially important for workers in industries such as ridesharing, delivery services, and other on-demand work.

Potential Challenge to Decision

While the NLRB’s new standard is certainly a win for workers, it may face challenges on appeal. Companies that rely on independent contractors may argue that the standard is too narrow and restricts their ability to maintain flexible work arrangements. However, the NLRB maintains that the new standard is necessary to ensure that workers are not unfairly misclassified and denied labor protections.

Implications for Companies

The NLRB’s decision has significant implications for companies that rely on independent contractors. These companies should review their applicable agreements in light of the new standard to ensure that they are properly classifying their workers. Companies that fail to properly classify their workers may face legal action and penalties.

In conclusion, the NLRB’s decision to return to the FedEx II standard for distinguishing employees from independent contractors is a significant win for workers. By prioritizing actual entrepreneurial opportunity and providing a clear standard for evaluation, workers can better advocate for their rights and secure legal protections under the National Labor Relations Act. Companies that rely on independent contractors must take note of these changes and ensure that they are properly classifying their workers to avoid legal troubles.

Explore more

Gmail Security Threats – Review

Setting the Stage for Gmail’s Security Challenges Imagine receiving a call from a number that appears to be Google’s official customer support, only to realize later that your Gmail account has been compromised, highlighting the growing sophistication of cybercriminals. This scenario is becoming alarmingly common as scammers refine their tactics to exploit unsuspecting users of one of the world’s most

Trend Analysis: Cybercrime Exploiting WordPress Platforms

Introduction to a Growing Threat Imagine visiting a trusted website, only to be greeted by a familiar CAPTCHA page asking for a simple click to verify your identity, and unknowingly, that click unleashes ransomware onto your system. This scenario is becoming alarmingly common as cybercriminals, through campaigns like ShadowCaptcha, have compromised over 100 WordPress sites to spread malicious software. With

Trend Analysis: Hybrid Cloud Ransomware Threats

Understanding Hybrid Cloud Ransomware: A New Cyber Threat Landscape Defining the Emerging Danger In an era where digital transformation drives business operations, a staggering statistic reveals the dark side of progress: ransomware attacks targeting cloud environments have surged by over 60% in recent years, according to industry reports. This alarming rise underscores the emergence of hybrid cloud ransomware, a sophisticated

Can the CVE Program Thrive Without Government Control?

In an era where cybersecurity threats loom larger than ever, the Common Vulnerabilities and Exposures (CVE) program stands as a critical linchpin in the global effort to safeguard software systems, having been established in 1999. Managed by the MITRE Corporation under a contract with the U.S. Cybersecurity and Infrastructure Security Agency (CISA), this initiative catalogs software vulnerabilities with unique identifiers,

MadeYouReset Flaw Threatens Internet with Giant DDoS Attacks

I’m thrilled to sit down with Dominic Jainy, a renowned IT professional whose expertise spans artificial intelligence, machine learning, and blockchain. Today, however, we’re diving into his insights on cybersecurity, specifically focusing on a critical vulnerability in the HTTP/2 protocol known as MadeYouReset. With his deep understanding of emerging technologies and their implications, Dominic is the perfect guide to help