Privacy Issues at Work Training for Supervisors. ©SHRM 20082 Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

HIPAA Privacy Rule Training
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
The Educational Assistance Plan of [Company Name] An Employee Communication Presentation.
Documenting Disciplinary Issues
Termination Decisions and Meetings Training for Supervisors
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Right to Privacy: The Unwritten Right
Health Savings Accounts How our plan works and its benefits for employees Presentation Subtitle/Description Presenter’s Name Date.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Chapter 14: Ethics, Justice and Fair Treatment at Work
Interviewing – Guidance on Appropriate Questions Reviewed April 2013.
INTERNET and CODE OF CONDUCT
September 2013 UNDERSTANDING COBRA. 2 INTRODUCTION  The Consolidated Omnibus Budge Reconciliation Act (COBRA) is a federal law enacted in The act.
Employment Screening: CORI and Private Background Checks Presented by the Massachusetts Law Reform Institute 99 Chauncy St., Suite 500, Boston, MA
ADA Training for Supervisors. ©SHRM Introduction This presentation provides a review of the fundamental aspects of The American with Disabilities.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Sexual Harassment Training for Employees
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
DATA PRIVACY PERSONNEL FILES “P-FILE”. Wisconsin Public Records Wisconsin Statue – Wisconsin Statue – Wisconsin Statue 230 Wisconsin.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Contingent Workers Training for Supervisors: Part IV.
EMPLOYEE TERMINATIONS Becky S. Knutson Davis Brown Law Firm.
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Chapter 40 Regulation of Employment Twomey, Business Law and the Regulatory Environment (14th Ed.)
Coding Compliance Plan July 12, Benefits of a compliance program  To demonstrate our commitment to honest and responsible conduct, decrease the.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
EMPLOYMENT LAW Privacy. Public Sector Employees vs Private Sector Employees Public Sector  Privacy Act of 1974  Exceptions noted on Pg  NOT.
Understanding COBRA. ©SHRM Introduction The Consolidated Omnibus Budge Reconciliation Act (COBRA) is a federal law that was enacted in The.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Legally Well: Avoiding Legal Issues with Your Wellness Plans Sarah E. Pawlicki, Esq., SPHR Eastman & Smith Ltd.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Northern New Mexico Human Resources Association November 13, 2012 Background Checks Scott D. Gordon.
HIPAA Privacy Rule Training
Privacy and the Law.
Interplay of the ADA, FMLA, and Workers’ Compensation Training for Supervisors •
Indiana Access to Public Records Act (APRA) Training
Chapter 9: Internet Law, Social Media, and Privacy
Employee Testing and Selection
Protection of CONSUMER information
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Privacy & Confidentiality
Data Protection Act and Other Laws
Maintaining the Personnel File
An Introduction to Public Records Office of the General Counsel
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Human Resources Functions
Employee Privacy and Privacy of Employee Information
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Introduction to Employment and Employee Relations
The Health Insurance Portability and Accountability Act
Sexual Harassment Training for Employees
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Colorado “Protections For Consumer Data Privacy” Law
Employee Testing and Selection
The Health Insurance Portability and Accountability Act
Presentation transcript:

Privacy Issues at Work Training for Supervisors

©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In the novel, Orwell describes a society in which everyone is under complete surveillance by authorities. The people are continuously reminded of this by the phrase "Big Brother is watching you.“ The phrase "Big Brother" has entered general usage and is often heard in workplaces to describe company monitoring and surveillance activities. Despite their acknowledgement of these policies, employees often question whether employers have a legal right to invade what they regard as their right to privacy. To address employees’ concerns and their often erroneous beliefs in workplace privacy rights, supervisors need to be knowledgeable about workplace privacy issues. This sample presentation is intended for presentation to supervisors and other individuals who manage employees. It is designed to be presented by an individual who is knowledgeable in workplace privacy issue and the employer’s own policies and practices. This is a sample presentation that must be customized to match state laws and the employer’s own culture, policies and practices.

©SHRM Objectives At the close of this session, you will be able to: Define what is meant by “right of privacy” and privacy in the workplace. Cite sources of privacy protection. List key workplace privacy issues. List types of employer electronic monitoring. Discuss key points of our policy on electronic monitoring.

©SHRM What Is “Right of Privacy” in the Workplace? In the broad context, the “right of privacy” is an individual’s right to be free from intrusion into his or her private and personal matters. In the employment context, privacy refers to employee’s information that he or she regards as personal or private (i.e., medical information, work activities, off-duty behavior) and the right of that individual to not have such information shared with others.

©SHRM Sources of Privacy Protections There are four primary sources of privacy rights: 1.The U.S. Constitution’s Bill of Rights and subsequent amendments as well as state constitutions have been interpreted to provide privacy protections. 2.Federal laws – The following are major federal laws that address specific aspects of privacy pertaining to employment: > Americans with Disabilities Act (ADA) – Regulates use of medical information, maintenance of medical documents and access. > Fair Credit Reporting Act (FCRA) – The FCRA restricts the use and requires disclosure of the contents of investigative consumer reports by employers.

©SHRM Sources of Privacy Protections (cont’d) > Federal Wiretapping Act/Electronic Communications Privacy Act – Prohibits the intentional interception or disclosure of any wire, oral or electronic communication where there is a reasonable expectation of privacy. There are two exceptions, however: 1) if one party consents to the monitoring; and 2) businesses are permitted to use telephone equipment to monitor communications within the ordinary course of business. > Health Insurance Portability and Accountability Act (HIPPA) – Regulates the use and disclosure of protected health information by employers with health plans.

©SHRM Sources of Privacy Protections (cont’d) 3.State Laws – Some state laws restrict employer access to information and regulate conduct under one or more of the following: > Non-discrimination acts regarding employee marital status and sexual orientation, AIDS and genetic testing, lawful products and activities. > Criminal, civil or other court records. > Medical information. > Disclosure to third parties. > Workplace monitoring.

©SHRM Sources of Privacy Protections (cont’d) 4.Common law (Case Law) – The following are types of invasion of privacy recognized by courts: > Unreasonable intrusion into the seclusion of the employee – situations where the employee had a reasonable expectation of privacy, the employer’s intrusion was offensive and not justified by business necessity. Examples: personal history questionnaires, unjustified drug testing. > Unauthorized use of the employee’s name or likeness for the benefit of the employer. Example: using the employee’s photograph on the company web site without obtaining the employee’s authorization. > Public disclosure of private and personal information – Examples: disclosing a same-sex partnership, results of employment tests, reasons for involuntary termination.

©SHRM Questions? Comments?

©SHRM Workplace Privacy Issues Workplace privacy issues occur in the following areas: Hiring, particularly in the background checking process. Disclosure of medical information. Searches. Surveillance. Off-duty, off-premises conduct. Electronic monitoring.

©SHRM Workplace Privacy Issues The federal law that pertains to the background checking process is the Fair Credit Report Act (FCRA). As previously explained, the FCRA restricts the use and requires disclosure of the contents of investigative consumer reports by employers. Disclosure of medical information by employers is governed by the Health Insurance Portability and Accountability Act (HIPPA) Medical Privacy Rules. Limitation on the employer’s use of medical information is regulated by the Americans with Disabilities Act (ADA).

©SHRM Workplace Privacy Issues Workplace searches and surveillance are permitted under federal and state laws. Employers may face litigation, however, in situations where employees had a reasonable expectation of privacy, the intrusion was offensive or the employer’s actions were not justified by business necessity. Off-duty, off-premises conduct pertains to lifestyle discrimination. At the federal level, civil rights laws barring discrimination on the basis of race, gender or disability may apply to lifestyle discrimination. Twenty-one states have passed lifestyle discrimination statutes. The majority of these protect only smokers, but a few are broader. For example, Colorado and North Dakota ban discrimination based on any form of legal off-duty behavior.

©SHRM Workplace Privacy Issues The Federal Wiretapping Act and Electronic Communications Privacy Act, as previously stated, prohibit the intentional interception or disclosure of any wire, oral or electronic communication where there is a reasonable expectation of privacy. There are two exceptions, however: 1) if one party consents to the monitoring; and 2) businesses are permitted to use telephone equipment to monitor communications within the ordinary course of business. Many state laws are modeled after the Federal Wiretapping Act and prohibit electronic eavesdropping allowing the same exceptions as the federal law. Monitoring of stored s and voic s is much less regulated and is generally permitted under federal and state law.

©SHRM Electronic Monitoring Many employers are monitoring the following electronically: Telephones. Computer usage. Electronic mail ( ). The next slides review these types of electronic monitoring and the right of the employer to monitor these.

©SHRM Electronic Monitoring Telephone Monitoring: Employers monitor calls with customers for quality-control purposes. Some states have laws that require one or all parties to a phone conversation to be informed that the call is being monitored or recorded. In those states, employers must have a recorded message when the call begins that the call is being monitored or recorded. Under federal law, an employer may conduct unannounced monitoring of business- related calls but must immediately stop monitoring when it realizes the call is personal. However, when employees are told not to make personal calls using company equipment, the employee loses that protection and the call may be monitored or recorded.

©SHRM Electronic Monitoring Computer Usage: Employers may use computer software programs to allow them to see what is on the screen or stored in each employee’s computer and file folders. They monitor Internet usage, such as the various web sites the employee may access. Employees who perform word processing or data entry may have their keystroke speed and volume monitored. Employers may also keep track of the amount of time an employee spends away from the computer. As the employer owns the computers and provides the Internet access, it may legally conduct this type of monitoring. Good practice dictates that employers have a written policy stating its right to monitor computer equipment and usage and that employees should have no expectation of privacy when using it.

©SHRM Electronic Monitoring Electronic Mail ( ): systems used at a company have no privacy protections as the employer owns the systems and is allowed to review its contents. Messages sent within the company as well as those that are from an employee’s computer externally are subject to monitoring. Web-based systems such as Hotmail and Gmail as well as instant messaging may also be monitored.

©SHRM [Company Name] Policy on Electronic Monitoring (Present and review key points of your company’s policy.) Examples of Levels of Delegation

©SHRM Questions? Comments?

©SHRM Summary In the employment context, privacy refers to information about an employee that he or she regards as personal or private (i.e., medical information, financial data, etc.) and the right of that individual to not have such information shared with others. There are four primary sources of privacy rights – the U.S. Constitution’s Bill of Rights and subsequent amendments, federal laws, state laws and common (case) law.

©SHRM Summary (cont’d) Workplace privacy issues occur in many areas, such as hiring, testing, investigations and monitoring. Many employers are monitoring telephones, computer usage and electronically.

©SHRM Course Evaluation Please be sure to complete and leave the evaluation sheet you received with your handouts Thank you for your attention and interest !