Menu
Career Watch: Be wary of IT employment contracts

Career Watch: Be wary of IT employment contracts

An attorney warns about the gotchas in employment contracts; security jobs go begging; master's degrees in computer science pay off.

Q&A: Attorney Jeffrey Scolaro

Jeffrey Scolaro, an attorney at Daley Mohan Groble PC in Chicago and a member of Legal Services Link, answers questions about employment contracts.

Are employment contracts for IT workers negotiable, or are they one-size-fits-all? The axiom that “everything is negotiable” should be where all IT professionals begin their assessment of proposed employment contracts. However, the IT industry in particular can be especially rigid in its collective enforcement of employment agreements.

Jeffrey Scolaro, attorney at Daley Mohan Groble PC Courtesy of Jeffrey Scolaro, Daley Mohan Groble PC

Jeffrey Scolaro says the IT industry can be “especially rigid” in its enforcement of employment agreements.

IT companies are very protective of their intellectual property and wary of conceding issues in employment agreements that might jeopardize that IP. Therefore, it is always recommended that IT professionals use an experienced attorney to let the employer (or prospective employer) know that the IT professional is just as serious about exercising his or her rights during this process.

What are some terms that might be encountered in an employment contract that many people are unfamiliar with? The first terms that likely will be encountered are “restrictive covenants,” which include “noncompetition,” “nonsolicitation” and confidentiality clauses. Each of the aforementioned are attempts to restrict an employee after (or during) employment. Noncompetition clauses are likely the most important because they affect an employee’s ability to work in the industry for a period of time after the employment term ends. Noncompetition clauses vary in their enforceability throughout the country, and, again, it is highly recommended that any IT professional find an attorney capable of assessing such clauses.

Additionally, the “solicitation” provisions can change an IT professional’s ability to do business with former colleagues or clients of their employer. Additionally, terms that should be approached with caution include “choice of law” provisions, termination “for cause” provisions, “best efforts,” “forfeiture,” “liquidated damages,” “vesting,” “employee representations” or “exclusive employment,” to name a few.

Are there any red flags to look out for in such contracts? Red flags are plentiful in these agreements. Additionally, even independent contractors can be held to certain restrictive covenant obligations, contrary to what most people believe. Therefore, everyone should be cautious when negotiating and reviewing an employment agreement.

Specific red flags include obligations to which no consideration is attached. In other words, IT professionals should look for places in which they are being asked to give up something for nothing in return. Moreover, IT professionals may believe that they have created something and therefore that they assume they own it. That is almost never the case in most IT employment contracts, since most companies retain the rights to anything created by the employee during his or her employment.

Additionally, there are a myriad of compensation structures, benefits structures and employment classifications that each IT professional should have reviewed by an attorney.

Security jobs go begging

Applicants are scarce for information security jobs, according to a new cybersecurity workforce study by ISACA’s Cybersecurity Nexus.

While only 13% of the responding companies said they receive 20 or more applications for each open security position, ISACA noted that other studies show that most corporate job openings result in 60 to 250 applicants. ISACA also found that most of those who do apply for the positions are considered by the employers to be lacking in the necessary qualifications.

Here’s a look at a couple of ISACA’s findings:

On average, how long does it take you to fill a cybersecurity/information security position?

  • Less than 2 weeks: 1%
  • 1 month: 8%
  • 2 months: 15%
  • 3 months: 30%
  • 6 months: 26%
  • Can’t fill open positions: 6%
  • Don’t know: 14%

On average, how many applicants do you get for open security positions?

  • 0 to 4: 22%
  • 5 to 9: 26%
  • 10 to 14: 16%
  • 15 to 19: 4%
  • 20-plus: 13%
  • Don’t know: 19%

Source: ISACA’s State of Cyber Security 2017 survey of 633 cybersecurity professionals.

Computer science, class leader

Among this year’s recipients of master’s degrees, those who majored in computer science can expect to be the best paid, according to the winter 2017 Salary Survey from the National Association of Colleges and Employers. NACE found that the overall average salary projection for class of 2017 computer science graduates is $81,039, an increase of more than 12% from last year, when computer science ranked No. 2.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about ISACAQ

Show Comments
[]