CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Employment Law for BUSINESS sixth edition
Chapter 4 Legal Construction of the Employment Environment
CHAPTER FOURTEEN Testing McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved The Constitution will always protect an.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Chapter 08 Tort Law McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Chapter 3 The Public/Private Interface and Legal Authority.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Chapter Implementing Equal Employment Opportunity 3.
CHAPTER SEVENTEEN Labor Law McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved  Section 7 of the National Labor Relations.
Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
Security Services Constitutional Issues in Private Security.
+ Protecting Individual Liberties Section 1 Chapter 14.
Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc.
CHAPTER THIRTEEN Disability Discrimination McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Myths About Disability.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
(Edited) WORKPLACE PRIVACY.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Chapter 18 - The Fourth Amendment and National Security.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 11 The Instructional.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 39 Regulation of Employment Twomey Jennings Anderson’s Business.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
CHAPTER NINE Affinity Orientation Discrimination.
Chapter 40 Regulation of Employment Twomey, Business Law and the Regulatory Environment (14th Ed.)
CHAPTER THREE Title VII of the Civil Rights Act of 1964.
AP GOVERNMENT. CIVIL LIBERTIES  Civil Liberties are individual’s legal and constitutional protections against the government.  Although our civil liberties.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Essentials Of Business Law Chapter 28 Employment Law McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 7—Privacy Law and HIPAA
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Regulating Employee Use of Social Media Health Directors Legal Conference April 26, 2012 Diane M. Juffras School of Government UNC- Chapel Hill.
PREVENTIVE LAW WORKSHOP Managing Difficult Personnel Situations Mary Elizabeth Kurz, Vice Chancellor and General Counsel Dianne Sortini, Director, Employee.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Chapter 18 - The Fourth Amendment and National Security.
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch The Legal Environment of Business A Critical Thinking.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
P A R T P A R T Contracts Introduction to Contracts The Agreement: Offer The Agreement: Acceptance Consideration Reality of Consent 3 McGraw-Hill/Irwin.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
The Twelve Most Important Public Employment Law Developments Ever Bob Joyce PANC Asheville October 5, 2015.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Individual Rights The rights of the people protected in the Bill of Rights including: Economic rights related to property Political rights related to.
Ethical Decision-Making: Technology and Privacy in the Workplace McGraw-Hill/Irwin Business Ethics: Decision-Making for Personal Integrity & Social.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Individual Rights The rights of the people protected in the Bill of Rights including: Economic rights related to property Political rights related to freedom.
Privacy and the Law.
Surveillance around the world
Copyright 2015 McGraw-Hill Education. All rights reserved
Chapter 20: Employment Relationships
Essentials of the Legal Environment today, 5E
Employment Law for BUSINESS sixth edition
Chapter 23 Government Regulation and Administrative Law
Presentation transcript:

CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Employees have an absolute right to privacy in the workplace 2.It is a breach of an employee’s right to privacy for an employer to ask with whom the employee lives 3.In the private sector, the Constitution protects employees’ right to be free from unreasonable searches and seizures Myths about Employee Privacy Rights

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Without constitutional protection, employees in the private sector are left with no protection against invasion of privacy 5.Once an employee gives information to an employer, the employer may use it for whatever purpose it desires

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Are There Guarantees in Life?  A fundamental right is one guaranteed by the Constitution, whether stated or not  Required disclosure of some types of personal information has been considered unreasonable search  Employees are concerned about who has access to information gathered by employers

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Public Sector Employee Privacy  Federal, state and local employees are protected from government intrusion  Constitutional protection –The Fourth Amendment protects against unreasonable search and seizure  Collection of personal information has been considered a search  Detaining an employee may lead to charges of false imprisonment

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved –The 5 th and 14 th amendments protect employees’ rights to privacy  Court has not addressed the right to be free from mandatory preemployment medical tests –The Privacy Act of 1974  Restricts governmental intrusion into the lives of federal employees by limiting the disclosure of employee information  Allows for criminal penalties and civil remedies –Privacy Protection Study Commission  Established to study the possibility of extending the Privacy Act to private sector

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved –Federal wiretapping – Title III  Authorizes acquisition of evidence of a crime  Does not authorize interceptions related to social or political views –Electronic Communications Privacy Act  Extended wiretapping prohibition to include all forms of digital communications  Prohibits unauthorized eavesdropping by all persons and businesses, not just the government

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Private Sector Employee Privacy  Constitution protects citizens from government excesses  Private sector employees may seem to be defenseless  Other bases for right to privacy in the private sector –Some state legislatures have enacted privacy statutes protecting private employees in certain situations

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved –Tort law protections  Intrusion into seclusion  Public disclosure of private facts  Defamation  Publication in a false light  Breach of contract –Employers may regulate employees’ off-work activities only when workplace performance is affected  Not all information is protected by the right to privacy –Job applicants are most vulnerable

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Employer’s Information- Gathering Process  An employer may be liable for the process used in gathering, storing or using information  Technology allows electronic surveillance of employee activities –Surveillance by glitch –Surveillance by default –Surveillance by design –Surveillance by possession

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved  Many firms monitor Internet use  While monitoring employee usage is usually legal, employers should notify employees –Employers should develop policies regarding the use of company computers –Such policies should be communicated through policy and procedure manuals, memos, and employee handbooks –Policies should contain the principles of openness, disclosure, secondary usage and correction

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Waivers of Privacy Rights  A waiver would exempt the employer from liability for employee claims about privacy issues  Valid waivers must be voluntarily given  Approved waivers contain some form of consideration  Waivers should not be requested prior to a job offer

McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Management Considerations  Employers may search employees’ property where no expectation of privacy exists  Investigate state statutes in the states in which you do business  Any waiver of privacy should be accompanied by an offer of employment  Regulate access to personal information