Copyright 2015 McGraw-Hill Education. All rights reserved

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Employment Law for BUSINESS sixth edition
Chapter 4 Legal Construction of the Employment Environment
CHAPTER FOURTEEN Testing McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved The Constitution will always protect an.
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
1 COPYRIGHT © 2007 West Legal Studies in Business, a part of The Thomson Corporation. Thomson, the Star logo, and West Legal Studies in Business are trademarks.
Criminal law vs. employment law Garrity - statement compelled as condition of employment cannot be used against employee in criminal prosecution If criminal.
HUMAN RESOURCES ISSUES American University March 9-14, 2003.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
Chapter 14: Ethics, Justice and Fair Treatment at Work
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
EMPLOYER/EMPLOYEE PRIVACY RIGHTS
Security Services Constitutional Issues in Private Security.
Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 39 Regulation of Employment Twomey Jennings Anderson’s Business.
Unit 3 Regulation. 2 Regulation of Nursing Practice l Protection of Public l Licensure l Certification.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Lecture 11: Law and Ethics
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
Chapter Five Civil Liberties. Copyright © Houghton Mifflin Company. All rights reserved.5 | 2 The Politics of Civil Liberties Civil liberties: protections.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
Data protection—training materials [Name and details of speaker]
The Twelve Most Important Public Employment Law Developments Ever Bob Joyce PANC Asheville October 5, 2015.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Legal & Ethical Responsibilities HEALTH SCIENCE. Objectives ■ Understand and know legal actions concerning : malpractice, negligence, assault and battery,
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Ethical Decision-Making: Technology and Privacy in the Workplace McGraw-Hill/Irwin Business Ethics: Decision-Making for Personal Integrity & Social.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Legal Responsibilities Sheila Carlton. Introduction Certain laws and legal responsibilities in every aspect of life Formulated to protect you and society.
Chapter 7 Employment Law Halsey/McLaughlin, Legal Environment You will be able to answer the following questions after reading this chapter: What is an.
Bellwork Think about this…. Historical Event
Privacy and the Law.
Surveillance around the world
Legal and Ethical Dimensions of Sport Public Relations
Chapter 4 Legal Construction of the Employment Environment
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Chapter 1 The Regulation of Employment
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Chapter 10 Cyberlaw, Social Media, and Privacy
Using Social Media in the University Setting
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Privacy and Security in the Employment Relationship
Information Governance and Data Privacy: A World of Risk
Chapter Five Civil Liberties.
Protection of News Sources
Employee Privacy and Privacy of Employee Information
Legal & Ethical Issues in News
LEGAL TERMS IN DIGITAL MEDIA
Essentials of the legal environment today, 5e
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Government Data Practices & Open Meeting Law Overview
Employment Law for BUSINESS sixth edition
Government Data Practices & Open Meeting Law Overview
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

Chapter 14 The Employee’s Right to Privacy, and Management of Personal Information Copyright  2015 McGraw-Hill Education.  All rights reserved.  No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Learning Objectives Describe the nature of privacy as a fundamental right Explain the three general ways in which privacy is legally protected in the United States Understand the legal concept of “reasonable expectation of privacy” and its application to the workplace Apply the standard for unreasonable searches and seizures under the Fourth Amendment Explain the distinctions between public- and private-sector privacy protections Describe the legal framework that applies to private-sector privacy cases Identify and differentiate the prima facie cases for common-law claims of privacy invasions (intrusion into seclusion, public disclosure of private facts, publication in a false light, and breach of contract/defamation) Explain the extent to which an employer can legally dictate the off-work acts of its employees Discuss how advances in technology have impacted employee privacy, and the key business justifications for employee monitoring Explain the most effective means by which to design and to implement a technology use policy Describe the legal environment that surrounds employee use of social media technologies

Are There Guarantees in Life? The right “to be left alone” Privacy as a federal constitutional right Griswold v. Connecticut 1965 “penumbras” of the Bill of Rights Emper legitimate interests v. Empee privacy Global marketplace  different rules elsewhere Even if Employer may collect data, duties to safeguard Employees’ personal information

Realities about Employee Privacy Rights Employees do not have an absolute right to privacy in their workplace Balancing test In the private sector, the federal Constitution does not protect employee right to be free from employer unreasonable searches and seizures Contrast public-sector where government is employer Some states (CA) have right to privacy in state Constitution All employees are safeguarded to some extent by common law protections against invasions of privacy Any time an employee gives information to an employer, the employer is bound to use it only for the purpose for which it was collected, and may not further disseminate it without employee’s permission

Background Privacy may be protected by Constitution (federal or state) federal and/or state statutes common law principles (will vary by state) Fundamental rights: A right guaranteed by the Constitution, whether stated or not Required disclosure of certain types of personal information should be considered an unreasonable search

Workplace Privacy, Generally (2) No broad rights to personal workplace privacy No comprehensive federal workplace privacy legislation exists States will vary widely in their coverage Review: Employees may be fired at-will (provided it is not for illegal reasons)

Zones of Workplace Privacy “Reasonable” areas in which to expect privacy in the workplace One’s body and physical space; one has a reasonable expectation to be free from a pat-down or body search Normally private locations, such as a purse or briefcase Personal information, accessed without permission

Public-Sector Employee Privacy Review: government as employer means federal Constitutional protections apply The Fourth Amendment: protection against unreasonable searches and seizures Violation if the search is ‘Unreasonable’ Unjustified at its inception Impermissible in scope as carried-out Case: O’Connor v. Ortega Search warrant usually required Exception: strong state interest and pervasive regulation of industry Balancing test of legitimate interests: e.g., drug testing of railway workers for safety Search of employer-owned property: written policy can reduce employee’s reasonable expectation of privacy (lockers, computers) False imprisonment concern 5th and 14th amendments tests ‘Strict scrutiny’ of fundamental rights requires ‘compelling state interest’ justification (high hurdle) Other rights: search must be ‘rationally related to a valid state interest’ (low hurdle) Is the right fundamental? Implicit in the concept of ordered liberty Deeply rooted in this Nation’s history and tradition No general right of the individual to be left alone

The Privacy Act of 1974 Regulates the release of personal information about federal employees by federal agencies Basic principles Employee access to their files Mechanism to correct or amend information Prevention of inappropriate revelation of information Maintenance of information Eleven exceptions to the act

Wiretapping Federal Wiretap Act – Title III Governs the interception of oral, wire, and electronic communications related to specified criminal activity Model for statutes in most states Wiretapping on the rise, few applications denied ECPA covers all forms of digital communication Prohibits unauthorized eavesdropping, access to messages ‘in-transit’ limitation, ‘consent’ exception

Private Sector Employee Privacy In private-sector employment environment: No constitutional protection triggered Less privacy protection, unless provided by policy or collective bargaining contract (union workplace) Compliance-related costs for private employers Private-sector employers’ flexibility to craft policies that suit need and company culture

Legal Framework for Employee Rights in the Private Sector At-will employment review: Employers are free to fire an employee—and employees are free to leave the position—at any time and for any reason Protection for private-sector employees State and federal laws prohibiting adverse employment action, e.g., for discriminatory reasons Employment at-will limited by certain statutes and common law

Bases for Right to Privacy in the Private Sector State law-based claims – generally little statutory protection for private employees Contrast: some state constitutions and statutes (CA) Common law torts: ‘tort’ is a private wrong in which one person (e.g. employer, here) causes injury to another person Allows the injured person to sue the alleged wrongdoer and to collect damages The injury can be physical, mental, or financial Privacy Protections at common law (torts) Intrusion into Seclusion Wrongful invasion – objectionable to a reasonable person Scenario 1 Public disclosure of private facts Intentional or negligent public disclosure of private matters Such disclosure would be objectionable to a reasonable person of ordinary sensitivities Case: Yoder v. Ingersoll-Rand Company a.k.a. ARO Publication in a false light Public disclosure of facts that place the employee in a false light Defamation Libel vs. slander Compelled self-disclosure Breach of contract Per policies or specifics of employment agreement or CBA

Regulation of Employee’s Off-Work Activities Generally, private activities may be regulated if off-work conduct affects employee performance E.g., drug, tobacco, alcohol use, weight, various recreational activities, moonlighting, relations with co-workers or competitors, ‘poor reflection’ conduct State statute exceptions limit employer reach NY case: dating not ‘recreation’ (?) within state statute Don’t ignore ‘carrot’ approach, e.g., incentives General note: U.S. companies with operations in EU must comply with its data protection laws

Employer’s Information-Gathering Process/Justified Use/Disclosure of Information Proper documentation is important HR function Risks in process of information gathering Harassment Improper data management Improper dissemination of information Function creep: expands uses beyond purpose Collection and retention should be conscious policies Collection and retrieval of information Limitation of questions to potential employee Proper storage of information ‘BYOD’: employee personal devices in workplace -> further complication of management Transfer of info, e.g., References Admin password abuse

Employee Monitoring: Old Practice, New Face Employer monitoring has rich tradition and raises legal, ethical concerns New technologies dramatically increase data volume, reach, power and range of issues Productivity measurements emphasis (currently) Boundary-less workplace: “always-on” New technologies: GPS, RFID, Biometric ID Ubiquity of Social Media access to data and reliance on it

Evolving Legal Environment Statutes and cases beginning to address surveillance and monitoring issues Case: City of Ontario v. Quon Balance of privacy and business justification interests Business justification receiving weight in early cases, esp. re employer-issued instrumentalities Courts favor ‘notice’ that reduces privacy expectations State statutes limit compelled access (passwords) Exemptions for specific justifications (e.g. investigations) Productivity-related monitoring, blocking Boundary-less workplace also increases personal use of employer assets Burgeoning availability of tools re keystrokes, voice patterns, screen caps, even fidget monitors. Scenario 3 Other business interests: evidence of employee misconduct, IP protection or liability, viruses, hacks, reputation-related issues Policy clarity, employee notice key prevention

Percentage of Large U.S. Companies That Monitor Employee E-mail

The Case of Employee E-mail Employers’ needs vs. employees’ right to privacy Interception (ECPA) vs. hard drive monitoring Cases suggest no reasonable expectation of privacy on employer instrumentalities, accounts Even when policy and statements are otherwise (Harvard leaks case) As always, policies should address corporate interests and practices (which then need to be followed through by employer)

Developing Computer Use Policies Policies – written, communicated to employees, and followed Suggested guidelines Appropriate coverage Employee access to information gathered Ban on continuous monitoring and secret monitoring Only job relevant information collected Only for business interests

Blogging and Other Social Media (“Web 2.0”) (2) Employer Social Media policy recommendations: Defined objectives that do not overreach A reminder that company policies apply Personal comment rules Disclosure, monitoring, and copyright reminders Consider photo, video, audio coverage

Privacy Rights Since September 11, 2001 USA PATRIOT Act Allows government to monitor anyone on the Internet simply by contending that the information is “relevant” to an ongoing criminal investigation (FISA courts) Employer response to governmental request for information: comply voluntarily, ask to seek employee permission or require subpoena Monitor for future anti-terrorism measure and their implications for privacy

Management Tips Prevention is key: sound policy development, communication and follow-through are essential Develop policies to reduce and define employee ‘expectation of privacy’ Monitor technology policies for developments (e.g., email, and IM, and next generations) Gather and protect data pursuant to defined business purposes Give ‘consideration’ for any employee waivers