Are Your Employees Sabotaging You on Social Media?

Slides:



Advertisements
Similar presentations
Managing the Health and Safety of Contractors
Advertisements

© The Association of Independent Schools of NSW ICT Conference Canberra Legal Ramifications Cathy Lovell Senior Advisor Employment Advisor 31 May 2013.
Workplace Bullying and Harassment Training and Legal Duties [Insert Presenter Name] [Company Name] [Date]
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Employment Law Implications Cloud Computing Peter C. Straszynski LEXPERT Cloud Computing Conference 2013 November.
TECHNOLOGY & ETHICS Association of Corporate Counsel ©
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Developing a Records & Information Retention & Disposition Program:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
First Practice - Information Security Management System Implementation and ISO Certification.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Session 3 – Information Security Policies
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
Niri Shan Partner and Head of Trade Marks, Copyright and Media Group Paul Callaghan Partner, Employment 29 June 2010 Social Media A Guide for Employers.
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
WORKPLACE BULLYING & HARASSMENT TRAINING PRESENTATION 1 BENEFITS As workplace bullying, harassment and violence have become more common, the OHS laws have.
ISO Richard Welford CSR Asia © CSR Asia 2011.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Ruth E. Kim General Counsel, SVP & Sr. Partner FLEISHMAN-HILLARD INC.
1 The Top Four Legal Risk Management Issues Facing Nonprofits: What You Can Do to Mitigate Your Exposure December 13, 2010 Presented to the GWSCPA NFPO.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Risk Management Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
DIRECT WORKS FORUM 10 June 2008 Andy Ballard. COMMON LAW MANSLAUGHTER Effectively – Death by gross negligence Test – (a) was a (common law) duty of care.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
5/18/2006 Department of Technology Services Security Architecture.
CHAPTER 17 EMPLOYEE RIGHTS AND DISCIPLINE. Chapter 17 EMPLOYEE RIGHTS AND DISCIPLINE Human Resource Management, 9E Mathis and Jackson © 2000 South-Western.
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
WISHA, 7/23/04 Employee Medical and Exposure Records Chapter WAC Employer Responsibilities.
Data protection—training materials [Name and details of speaker]
Protection of Personal Information Act An Analysis on the impact.
Law Firm Data Security: What In-house Counsel Need to Know
Social Licence to Operate
Services and Capabilities
Accountability & Structured Privacy Management
Social Media August 2014.
DIGITAL FOOT IN PROFESSIONAL MOUTH
Ogletree, Deakins, Nash, Smoak & Stewart PC
What are HR policies and procedures?
Contingent Workforce: Global Privacy Laws Overview
6 October 2016 Social media: do you have the right social media strategy that will impact your business’ growth? - Legal and Regulatory Issues William.
Risk Management Policy & Procedures
Explorative Analysis of the Implications and Compliance of the Protection of Personal Information (POPI) Act in a Open and Distance Learning (ODL) Institution:
Securing the Law Firm Myth vs. Reality vs. Practicality:
General Data Protection Regulations: what you really need to know
Career Ready Mentor Briefing
General Data Protection Regulation
Evolution of the Legal Department
RECORDS AND INFORMATION
Move this to online module slides 11-56
PREPARED BY: KAMELI BATIWETI
Chapter 8 Developing an Effective Ethics Program
Insert Framework / Contract Name
By: Dorian Lockhart Wilston Johnston
What Directors Need to Know
Government Data Practices & Open Meeting Law Overview
Business Compromise and Cyber Threat
Government Data Practices & Open Meeting Law Overview
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Take advantage of sponsorship opportunities
Changes in ISO The following are the changes in ISO In most cases, the 1996 wording is not provided. Not all changes are listed. For example,
HR Legislation Update: AODA Integrated Accessibility Standards and Bill 168 Facilitated by: Melissa Magder – Director of Diversity, HR and Cross-Cultural.
Presentation transcript:

Are Your Employees Sabotaging You on Social Media? Wednesday, 27 September 2017

In the studio today: Joe Murphy Director Australian Business Lawyers & Advisors

Agenda Social Media and Business Forms of Sabotage The Risks Prevention Clean up

Social Media and Business

Social media What is social media and who is using it? How does it impact your business?

Stats: Social media in the workplace The 2016 WorkplaceInfo Social Media Index found: 43% of employers monitor employee usage of social media Only 40% of employers have social media policies

Explosion of devices

The new reality for employers + = Explosion in Social Media Explosion in mobile devices Great Opportunities and Great Risks

Forms of Sabotage – Part 1 Intentionally inappropriate postings (the ‘disgruntled employee’) Well-intentioned but inappropriate postings (including ‘off-brand’ employee advocacy, misleading and deceptive conduct) Employee complaints about the Company Release of confidential or sensitive information

Forms of Sabotage – Part 2 Theft or dissemination of company contacts ‘Identity theft’: ex-employees posing as the Company Conduct which compromises online security.

The Risks Reputational: “It’s gone viral” Release of confidential or sensitive information including theft or dissemination of company contacts Exposure to malware Employee culture

Prevention: What can we do? Social Media Policy Workplace Surveillance Policy Employee Contracts Monitoring Training / awareness activities Security measures

Social Media Policy What is the company’s relationship with social media? What are the objectives? What is social media? Who owns what? Ground rules for what employees can say as individuals?  

Social Media Policy Who speaks on behalf of the Company Ground rules for sensitive topics Company expectations for ‘likes’ and ‘shares’ Departing employees? Training

Workplace Surveillance Requirement for Policy; Creation of system e.g. Alerts etc.

Employee Responsibilities Obligations under Employment contracts: express contractual obligations e.g. compliance with policies; and relevant implied duties.

Confidentiality obligations Implied Contractual duty of Fidelity Equitable Duty of Confidence Express Contractual Confidentiality Obligations Corporations Act

Ownership of IP in an employment context General rule: IP is owned by employer where it is created in the course of employment That presumption can be displaced by agreement to the contrary (e.g. Universities) Rights can be clarified in employment contract

An emerging area: who owns social media contacts? Ownership of social medial accounts on LinkedIn, Twitter, Instagram will depend on who the account is established under Ownership of contact lists derived from sites is more complicated: Why was the account set up? When was it set up – work time or personal time? Are personal or work emails used as the contact details?

Security measures during employment Workplace surveillance practices must comply with relevant State/Territory surveillance legislation Document security protocols (restricting access) Must take all reasonable steps to keep Confidential Info confidential – once in public domain difficult to enforce confidentiality obligations

Cleaning Up after Sabotage Brand rehabilitation Client engagement Legal action against employees

Cases Fitzgerald v Dianne Smith t/as Escape Hair Design [2010] FWA 7358 Starr v Department of Human Services [2016] FWC 1460 McIntyre v Special Broadcasting Services Corporation T/A SBS Corporation [2015] FWC 6768

visit www.hradvance.com.au Need more information? visit www.hradvance.com.au Social Media Policy template: https://hradvance.com.au/vault/global/policies/social-media-policy

Thank you!