Employment Law for BUSINESS sixth edition

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

BUSINESS B2 Ethics.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
Employment Law for BUSINESS sixth edition
CHAPTER FOURTEEN Testing McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved The Constitution will always protect an.
PA/FOIA INTERFACE OSD/JS Privacy Office (703)
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Chapter Implementing Equal Employment Opportunity 3.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
EMPLOYER/EMPLOYEE PRIVACY RIGHTS
DATA PRIVACY PERSONNEL FILES “P-FILE”. Wisconsin Public Records Wisconsin Statue – Wisconsin Statue – Wisconsin Statue 230 Wisconsin.
Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc.
Irwin/McGraw-Hill Copyright © 2001 by The McGraw-Hill Companies, Inc. All rights reserved.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
HIPAA PRIVACY AND SECURITY AWARENESS.
EMS Law Chapter 16. Copyright © 2007 Thomson Delmar Learning Objectives Identify the tools that a state health agency responsible for emergency medical.
Unit 3 Regulation. 2 Regulation of Nursing Practice l Protection of Public l Licensure l Certification.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
PREVENTIVE LAW WORKSHOP Managing Difficult Personnel Situations Mary Elizabeth Kurz, Vice Chancellor and General Counsel Dianne Sortini, Director, Employee.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
Copyright © Allyn & Bacon 2008 Chapter 7 Liability and Student Records This multimedia product and its contents are protected under copyright law. The.
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
Chapter Five Civil Liberties. Copyright © Houghton Mifflin Company. All rights reserved.5 | 2 The Politics of Civil Liberties Civil liberties: protections.
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
Chapter Two Ethical and Legal Issues Chapter 2-1 Fourth Edition Linda D. Urden Kathleen M. Stacy Mary E. Lough Priorities in C RITICAL C ARE N URSING Copyright.
Civil Liability Issues and Negligence Unit 4. Objectives Define the intentional torts of battery, assault, false imprisonment, intentional infliction.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Guide to Medical Billing CHAPTER Third Edition Legal and Ethical Issues of Billing 2.
Ethical Decision-Making: Technology and Privacy in the Workplace McGraw-Hill/Irwin Business Ethics: Decision-Making for Personal Integrity & Social.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Chapter 11 Religious Discrimination
Privacy and the Law.
Surveillance around the world
Indiana Access to Public Records Act (APRA) Training
Chapter 4 Legal Construction of the Employment Environment
Add video notes to lecture
Section 4.1.
Copyright 2015 McGraw-Hill Education. All rights reserved
Title IX: Discrimination
Chapter 1 The Regulation of Employment
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Chapter 10 Cyberlaw, Social Media, and Privacy
Principles of Administrative Law <Instructor Name>
Fundamentals of Information Systems
By Richard A. Mann & Barry S. Roberts
HCS 430 Education for Service-- tutorialrank.com
Chapter Five Civil Liberties.
Employee Privacy and Privacy of Employee Information
Chapter 13: Ethics and Law
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

Employment Law for BUSINESS sixth edition Chapter 13 The Employee’s Right to Privacy and Management of Personal Information Employment Law for BUSINESS sixth edition Dawn D. BENNETT-ALEXANDER and Laura P. HARTMAN McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved.

Are There Guarantees in Life? The right “to be let alone” Privacy as a fundamental right Employer need for private information Global marketplace Protecting employees’ personal information L01 Pages 661-663 Learning Objective #1: Describe the nature of privacy as a fundamental right. 13 – 2

Myths about Employee Privacy Rights Employees have an absolute right to privacy in their workplace It is a breach of an employee’s right to privacy for an employer to ask with whom the employee lives In the private sector, the Constitution protects employees’ right to be free from unreasonable searches and seizures Without constitutional protection, employees in the private sector are left with no protection against invasions of privacy Once an employee gives information to an employer, the employer may use it for whatever purpose it desires Page 664 13 – 3

Background Privacy may be protected by: Constitution (federal or state), federal and/or state statutes, common law Fundamental rights guaranteed by the Constitution The right to be free from unreasonable searches and seizures Argument: The employee is trying to hide something Access to employee information L02 Page 663-664 Learning Objective #2: Explain the three general ways in which privacy is legally protected in the United States. 13 – 4

Public Sector Employee Privacy The Fourth Amendment Protection against unreasonable search and seizure Violation if the search is: Unreasonable Unjustified at its inception Impermissible in scope Search warrant Drug testing Search of employer-owned property False imprisonment L03 Pages 664-666 Learning Objective #3: Identify and apply the standard for unreasonable searches and seizures under the Fourth Amendment. 13 – 5

Public Sector Employee Privacy (continued) The 5th and 14th amendments Strict scrutiny Compelling state interest Rationally related to a valid state interest Is the right fundamental? Implicit in the concept of ordered liberty Deeply rooted in this Nation’s history and tradition No general right of the individual to be left alone Pages 666-667 13 – 6

The Privacy Act Regulates the release of personal information about federal employees by federal agencies Basic principles: Employee access to their files Mechanism to correct or amend information Employer protection of information Maintenance of information The right to privacy is not absolute Guiding factors Employee relief Pages 667-669 13 – 7

Privacy Protection Study Commission Privacy Act not extended to private sector Commission recommendations Commission policy goals Five basic employee procedural rights: Notice Authorization Access Correction Confidentiality Page 669-670 13 – 8

Federal Wiretapping―Title III Governs the interception of oral, wire, and electronic communications Interception by state and local law enforcement ECPA Covers all forms of digital communication Prohibits unauthorized eavesdropping Prohibits unauthorized access to messages Pages 670-671 13 – 9

Private Sector Employee Privacy Bases for right to privacy in the private sector Common law tort claims Statutory claims Tort law protections/common law Intrusion into seclusion L04 Pages 671-675 Learning Objective #4: Explain the distinctions between the protections for public- and private-sector privacy protections. Learning Objective #5: Identify and differentiate the prima facie cases for common-law claims of privacy invasions (intrusion into seclusion, public disclosure of private facts, publication in a false light, and breach of contract/defamation). L05 Tort A legal wrong, for which the law offers a remedy. 13 – 10

Private Sector Employee Privacy (continued) Public disclosure of private facts Intentional or negligent public disclosure of private matters Such disclosure would be objectionable to a reasonable person of ordinary sensitivities Publication in a false light Public disclosure of facts that place the employee in a false light Breach of contract Defamation Libel vs. slander Compelled self-disclosure Pages 675-678 13 – 11

Regulation of Employee’s Off-Work Activities Employers may regulate off-work or otherwise private activities of their employees where they believe that the off-work conduct affects the employee’s performance at the workplace Smoking Weight Marital status Romantic involvement Political status Lifestyle discrimination Enforcement L06 Pages 678-681 Learning Objective #6: Explain the extent to which an employer can legally dictate the off-work acts of its employees. 13 – 12

Process of information gathering Employer’s Information-Gathering Process/Justified Use/Disclosure of Information Process of information gathering Harassment Improper filing Dissemination of the information Function creep Collection and retrieval of information Limitation of questions to potential employee Proper storage of information References Pages 681-685 13 – 13

Electronic Monitoring or Surveillance of Employee Activities Written policies concerning e-mail and Internet use Bloggers beware New technologies Issues that intersect law and ethics The nature/capabilities Information gathering Technology and traditional workplace challenges Informal intrusions L07 Pages 685-690 Learning Objective #7: Discuss how advances in technology have impacted employee privacy. 13 – 14

Forms of Monitoring Surveillance by glitch Surveillance by default Information uncovered by mistake Surveillance by default All information sent through a system is caught and cataloged Surveillance by design Entire purpose is to collect information and the user is aware of this purpose Surveillance by possession Employee information contained in a database or some other list Pages 690-691 13 – 15

How Does Monitoring Work? Silentrunner Global positioning Websense/Websense reporter MIMEsweeper Reasons to monitor: Avoid legal liability Prevent employee theft Protection from overt intrusions Prior consent Business extension Pages 691-694 13 – 16

Percentage of Large U.S. Companies That Monitor Employee E-mail Page 693 13 – 17

Business Justifications for Monitoring Employees’ Technology Use Reasons to limit workplace Internet use: Wasted time Overclogged networks Inappropriate material seepage into the workplace Areas of employer potential liability: Defamation Copyright infringement Sexual harassment Discrimination Obscenity Impression when an employee visits various sites Formal policies or programs regulating employee Internet use Pages 694-697 Learning Objective #8: State the key business justifications for employee monitoring. 13 – 18

The Case of Employee E-mail Employers’ needs vs. employees’ right to privacy The employer’s interception must not exceed the scope of the employee’s consent Employers must specifically inform employees of the extent and circumstances under which e-mail communications are monitored State imposed notice requirements Pages 697-699 13 – 19

Developing Computer Usage Policies Policies should be both written and communicated to the employee, and then adhered to Suggested guidelines Appropriate areas Employee access to information gathered Ban on continuous monitoring and secret monitoring Only job relevant information collected Only for business interest Pages 699-704 Learning Objective #9: Explain the most effective means by which to design and to implement a technology use policy. 13 – 20

Waivers of Privacy Rights An employer may request that an employee waive her or his privacy rights as a condition of employment Requiring a waiver is a questionable approach Requirements: The waiver should be accompanied by an offer of employment The waiver must be knowingly and intelligently given The waiver must be clear and unmistakable The waiver must be in writing The waiver must be voluntary Pages 704 13 – 21

Privacy Rights Since September 11, 2001 USA PATRIOT Act The government is now allowed to monitor anyone on the Internet simply by contending that the information is “relevant” to an ongoing criminal investigation By September 2002, 58 new regulations responding to terrorism Employer response to governmental request for information Pages 704-705 13 – 22

Summary Conduct an information audit for the purpose of determining those areas of the company’s practices and procedures that have the potential for invasion. In connection with sensitive areas where the company maintains no formal policy, develop a policy to ensure appropriate treatment of data. The information collected should be kept in one of several files maintained on each employee: personnel file, medical file, evaluation file, confidential file. Information should be gathered from reliable sources, rather than sources of questionable repute, such as hearsay, lie detector tests, and subjective indicators. Publicize privacy policies and procedures, and educate employees regarding their rights as well as their responsibilities. Pages 706-707 13 – 23