• 0 Posts
  • 12 Comments
Joined 1 year ago
cake
Cake day: February 14th, 2024

help-circle





  • The team of more than 40 went on strike in February last year, demanding changes to Google’s return-to-work policy.

    If Google’s return to work policy affects them, then they were probably employees misclassified as a contractor.

    Facts that provide evidence of the degree of control and independence fall into three categories:

    -Behavioral: Does the company control or have the right to control what the worker does and how the worker does his or her job?

    -Financial: Are the business aspects of the worker’s job controlled by the payer? (these include things like how worker is paid, whether expenses are reimbursed, who provides tools/supplies, etc.)

    -Type of relationship: Are there written contracts or employee type benefits (that is, pension plan, insurance, vacation pay, etc.)? Will the relationship continue and is the work performed a key aspect of the business?

    https://www.irs.gov/businesses/small-businesses-self-employed/independent-contractor-self-employed-or-employee






  • Remember the US did not seek extradition for the 2013 leaks he coursed Chelsey manning into getting him, it wasn’t until he conspired with Russia to interfere in the 2016 election that the US decided to seek extradition.

    Page 44 of the Muller Report In order to expand its interference in the 2016 U.S. presidential election, the GRU units transferred many of the documents they stole from the DNC and the chairman of the Clinton Campaign to WikiLeaks. GRU officers used both the DCLeaks and Guccifer 2.0 personas to communicate with WikiLeaks through Twitter private messaging and through encrypted channels, including possibly through WikiLeaks’s private communication system.

    https://www.cnn.com/2019/07/15/politics/assange-embassy-exclusive-documents/index.html Despite being confined to the embassy while seeking safe passage to Ecuador, Assange met with Russians and world-class hackers at critical moments, frequently for hours at a time. He also acquired powerful new computing and network hardware to facilitate data transfers just weeks before WikiLeaks received hacked materials from Russian operatives.