Workplace Behavior and Privacy

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
Confidentiality and HIPAA
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
WEEK 9: DISMISSAL AS A RESULT OF MISCONDUCT 1. LEARNING OUTCOME The students will be able to; 2 1 Discuss the issue of dismissal as a result of misconduct(C4,P2,
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
A Baker’s Dozen: 13 Issues Regarding the Open Meetings Law 2004 IARC Staff Retreat May 14, 2004 Ames, IA David Vestal General Counsel Iowa State Association.
BRET STRONG, MANAGING SHAREHOLDER THE STRONG FIRM, P.C. NOVEMBER, 2013 Social Media: A Double-Edged Sword (the ever evolving world….LOL)
Hospitals & Social Media. Laws Implicated Federal Trade Commission –Disclosure of employment status –False or misleading statements State & Federal Wiretap.
Navigating the Promises and Perils of Social Media By: Heather L. Wilson Copyright © 2011 by FROST BROWN TODD LLC. The contents of this document are intended.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
New HR Challenges in the Dynamic Environment of Legal Compliance By Teri J. Elkins.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Veterinary Practice Law Quiz J EFFREY L. R OTH FEES & BURGESS, P.C. 213 Green Street Huntsville, Alabama Telephone  Facsimile
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Electronic Use Policies.   Social Media  Internet.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 39 Regulation of Employment Twomey Jennings Anderson’s Business.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 37 Regulation.
Chapter 40 Regulation of Employment Twomey, Business Law and the Regulatory Environment (14th Ed.)
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Employer Alert: New Duty to Police Illegal Activities in the Workplace Presented by M. Karen Thompson.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Regulating Employee Use of Social Media Health Directors Legal Conference April 26, 2012 Diane M. Juffras School of Government UNC- Chapel Hill.
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
©2012, Mika Meyers Beckett & Jones PLC All Rights Reserved Michigan Association of Educational Data Systems Presented by: Jennifer A. Puplava Mika Meyers.
Chapter 39 THIRD PERSONS IN AGENCY. 2 The relationship of employer and employee is created by the agreement of the parties and is subject to contract.
© 2011 Delmar, Cengage Learning Part IV Control Processes in Police Management Chapter 14 Accountability.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Comprehensive Volume, 18 th Edition Chapter 41: Regulation of Employment.
1. On a blank sheet of paper… Write down one reason why you may be disciplined (written up) at work.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Catherine E. Ybarra, Esq Simone & Associates th Avenue
Surveillance around the world
Indiana Access to Public Records Act (APRA) Training
Chapter 10 Cyberlaw, Social Media, and Privacy
Privacy principles Individual written policies
OPEN GOVERNMENTAL PROCEEDINGS ACT April 18, 2017
Privacy and Security in the Employment Relationship
WHY CAN’T WE BE FRIENDS? Dealing With Social Media in the Workplace
Presented by: Chris Cobey
Public Recording of Police
Confidentiality October 14, 2005.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Understand ethics and ethical decision-making.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Missouri Association of Rural Education
What Would You Do? Ethics in Travel and Tourism Management.
Introduction to Employment and Employee Relations
Objective 5.02 Understand ethics and ethical decision-making.
OPEN GOVERNMENTAL PROCEEDINGS ACT April 18, 2017
Government Data Practices & Open Meeting Law Overview
Government Data Practices & Open Meeting Law Overview
AUP, EDP, & Centralized Printing
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Understand ethics and ethical decision-making.
WEEK 9: DISMISSAL AS A RESULT OF MISCONDUCT
Presentation transcript:

Workplace Behavior and Privacy PRESENTED BY Jean Ohman Back October 26, 2017

AGENDA Employee Searches & Monitoring Off-Duty Behavior & Activities Recommended Policies

Employee Monitoring

Employee Monitoring Employers monitor for several reasons, including: To protect the company’s trade secrets; To protect the security of the company’s computer systems and data; To guard against and reduce the risk of liability for sexual harassment; To prevent a loss of productivity by monitoring whether employees are using the systems for personal non-work activities; and

Employee Searches Can an employer search? Depends on the particular circumstances, and Whether the employee has an expectation of privacy in the item being searched. The more invasive the search (body, clothing, personal items), the greater the privacy interest. Less invasive searches include desks, lockers, computers, company provided cell phones as long as the employer dispelled any privacy expectation.

Employee Searches Public Employers The 4th Amendment provides public employees with privacy protections. Employers can reduce this privacy expectation by providing notice that employer owned property and spaces are subject to search Searches must be reasonable – i.e., credible evidence of misconduct.

Employee Monitoring Employers with an electronic communications policy can monitor telephone calls and emails on their own phone and computer systems

Recording telephone calls 6/25/2018 Employee Monitoring Recording telephone calls before you record a phone call, you must determine whether you are in a one consent state or a two consent state. One-party consent State – you can record the conversation if you are a party. If you are not a party, then you can record the call provided one party consents to it with full knowledge and notice that the conversation is being recorded Two Party Consent State – Must have consent of BOTH parties to record a phone call.

Employee Monitoring One Party Consent Two Party Consent 6/25/2018 Employee Monitoring One Party Consent Federal law (18 USC § 2511(2)(d)) requires one party consent. 38 states and the district of Columbia have one party consent rules. Several of these states have “mixed” statutes, meaning that you can record a phone conversation with one party consent, but you cannot record an in person conversation. Two Party Consent 12 states require consent of all parties to a phone conversation. (CA, CN, FL, IL, MD, MA, MI, MN, NV, NH, PA, & WA).

Employee Monitoring Electronic Communication Policy Historically employers have been allowed to monitor employee communications sent and received on employer-owned systems as long as the employer dispelled the right of privacy in the system

Employee Monitoring Monitoring Emails Employers may generally monitor emails sent and received on company-owned systems

Monitoring Text Messages Employee Monitoring Monitoring Text Messages City of Ontario v. Quon U.S. Supreme Court held that police officers had no right of privacy with respect to text messages on employer-owned devices.

Employee Monitoring Keystroke Monitoring Nearly half of employers use technology to track keystrokes and to monitor the time that an employee spends on a computer. Employers may not obtain employee passwords using keystroke monitoring.

Employee Monitoring Monitoring Internet Use Employers are allowed to monitor Internet use on employer-owned systems as long as the employer has a policy that dispels the employee’s expectation of privacy on those systems.

Employer Monitoring Purple Communications, Inc., 361 NLRB 126 (2014) – In December 2014, the NLRB held that an employee’s use of an employer’s communications systems during non-work time for “concerted rights” activities (to communicate with coworkers about the terms or conditions of employment) is allowed under Section 7 of the NLRA.

Employee Monitoring Purple Communications, Inc. – An employer who allows an employee to use its computer systems may not prevent the employee from communicating about union activities, including organizing to form a union, as long as such discussions occur during non-working hours.

Purple Communications, Inc. – Exception Employee surveillance Purple Communications, Inc. – Exception There may be “special circumstances” that would allow an employer to completely ban the non-work use of email in order to maintain production and discipline. The Board did not articulate what the “special circumstances” might entail and has indicated that they will rarely exist.

Sources of Privacy Rights Electronic Communications Privacy Act (“ECPA”) Pertains to interception of the content of a communication contemporaneous with the communication. Less likely to occur in employment setting.

Sources of Privacy Rights Stored Communications Act (“SCA”) Prohibits third parties from intentionally accessing electronically stored communications. Includes emails or entries on private websites, without proper authorization

Sources of Privacy Rights Stored Communications Act (“SCA”) Allows authorized permission to access stored communications if: (i) the person is the provider of the service; or (ii) the person is a user of the service and the communication is from or intended for that user.

Sources of Privacy Rights Stored Communications Act (“SCA”) An employer may not intentionally access stored communications that are maintained by a third-party service provider without the user’s authorization

Sources of Privacy Rights Stored Communications Act (“SCA”) “User Authorization” Exception is extremely narrow: Employee must actually be a user in order to give authorization – he or she must have actually logged on. Court may not apply the exception where an employee is compelled to give access under threat of termination.

Sources of Privacy Rights Stored Communications Act (“SCA”) Consequences of violation are serious Criminal liability for intentional unauthorized access. Punitive damages and attorneys’ fees even without showing of actual damages.

SCA – Employment Decisions with Attendant Risk Pietrylo v. Hillstone Restaurant Group, 2009 US Dist LEXIS 88702 (D.M.J. Sept. 29, 2009). Restaurant employee created Myspace page for fellow employees to “vent” about the restaurant; invitation-only user group with a personal and password protected web page. Posts complained about the restaurant, customers and supervisors. A supervisor obtained a user name and password from a hostess who felt coerced into providing the information. Plaintiff was discharged for violating policy requiring professionalism and positive attitude. Jury awarded $3,403 plus punitive damages of $13,612

SCA – Employment Decisions with Attendant Risk Konop v. Hawaiian Airlines Inc., 302 F.3d 868 (9th Cir. 2002). Company accessed an employee’s secure website using other employee’s login information (with his permission) even though the site’s terms prohibited access by management and prohibited authorized users from allowing others to access the site. The website contained vigorous criticisms of the airline’s management and labor concessions. The company disciplined the pilot. Court found the airline violated the SCA and that the exception to the act (where permission to view is granted by a “user”) did not apply because the authorized employees had not actually “used” the site themselves.

SCA – Employment Decisions with Attendant Risk Pure Power Boot Camp v. Warrior Fitness Boot Camp., 587 F. Supp. 2d 548 (S.D.M.I. 2008). Employee planned to leave his job to start his own company. When he resigned, his employer was able to access his personal email accounts which he had logged into while at work, using a password that automatically popped up. Company found damaging evidence related to the employee’s pre-resignation activities. Court found that the company’s email policy was not specific enough to put employee on notice that personal email viewed over the company’s computers would be accessed by the company. The Court also determined that employee’s leaving of his password on the computer did not create an implied consent to view his personal email accounts. Court ruled the employer’s conduct violated the SCA and ruled that the damaging emails obtained in violation could not be used against the employee even though they would have been discoverable in the course of litigation.

Off The Job Behavior Moonlighting; Criminal Activity Drug & Alcohol Use Internet Activity Union Activity Political Activity Immoral or Unethical Behavior

Off The Job Behavior Three Questions Guide Employer Action: Is it lawful for me to take action based on the conduct at issue? – Can I regulate the conduct? Is it wise for me to take action based on the conduct at issue? – Should I regulate the conduct? Can I be sued if I take adverse action? – Have I followed best practices?

Can I regulate the conduct? Off The Job Behavior Can I regulate the conduct? A proper response to this question involves an inventory of state laws affecting such things as marital status, religion, sexual orientation, concerted activity, off duty tobacco or marijuana use, wage garnishment for child support, pregnancy, military service, association with members of a protected class, or other conduct protected by a substantial public policy – i.e., jury duty.

Privacy Considerations Off The Job Behavior Privacy Considerations Employers should be particularly cognizant of privacy considerations when investigating off-duty conduct. General rule – No invasion of privacy occurs when an employer merely observes conduct that is “out in the open.” But employer surveillance using GPS, RFID or other devices may violate an employee’s privacy rights.

Is there a legitimate business reason for regulating the conduct? Off The Job Behavior Is there a legitimate business reason for regulating the conduct? Conduct damages ER reputation; Conduct causes workplace disruption; Conduct harms EE morale; Conduct prevents EE from performing his or her job functions adequately; Legal liability to other EEs and third parties related to off duty conduct.

Off The Job Behavior Should I regulate the conduct? This goes back to the legitimate business reason – Can the off duty conduct cause the employer harm?

Off The Job Behavior – Best Practices Create policies that govern risky conduct Moonlighting policy; Drug and alcohol policy; Criminal activity policy; Internet policy; Confidentiality policy Consistently enforce policies

Privacy Guidelines Inform employees in writing of the ways that you plan to monitor them; Have a comprehensive electronic communication policy Consistently apply any monitoring policies across all employees; Justify monitoring in your policies by including the legitimate business interests that support monitoring activities

Questions

John Smith Jean’s practice focuses on Jean Back “Not every engagement requires the same solution. Creativity, collaboration, resourcefulness, and excellent listening skills can often lead to unique and successful business solutions.” “I’m focused on understanding my clients’ businesses and teir industries so we can hit the ground running with solid legal counsel around their business challenges..” John Smith Managing Partner 503-796-2933 Direct jsmith@schwabe.com Of Counsel 503-796-2960 Direct Jback@schwabe.com INDUSTRY FOCUS Jean’s practice focuses on Employment advice and litigation, Trade secret litigation; Privacy, Data breach, Cybersecurity, and Employment transactional work. Manufacturing & Technology