Uber and Lyft must classify drivers as employees, judge rules, in blow to gig economy | The Guardian

Preliminary injunction in California follows state’s lawsuit against companies over new labor lawA California judge has issued a preliminary injunction that will block Uber and Lyft from classifying their drivers as independent contractors rather than employees.The move on Monday came in response to a May lawsuit filed by the state of California against the companies, which alleged they are misclassifying their drivers under the state’s new labor law. The lawsuit, and Monday’s injunction, are the most significant challenges to the ride-hailing companies’ business model thus far. Continue reading…

Preliminary injunction in California follows state’s lawsuit against companies over new labor law

A California judge has issued a preliminary injunction that will block Uber and Lyft from classifying their drivers as independent contractors rather than employees.

The move on Monday came in response to a May lawsuit filed by the state of California against the companies, which alleged they are misclassifying their drivers under the state’s new labor law. The lawsuit, and Monday’s injunction, are the most significant challenges to the ride-hailing companies’ business model thus far.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more