Electronic Communications & Social Media. So what are our goals today? Discuss liability exposures generated by e-communications and social media Give.

Slides:



Advertisements
Similar presentations
United States District Court for the Southern District of New York, 2004 District Justice Scheindlin Zubulake v. UBS Warburg LLC Zubulake V.
Advertisements

John D. Gregory Ministry of the Attorney General (Ontario) October 29, 2012.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Mindari Session Helping teenagers deal with Bullying By ARC Brian See
Internet Safety. Internet use and Social networking There may be a knowledge gap between you and your children in this area. It may be an area that you.
Objectives Describe behaviors indicative of bullying at work Explain the two types of harassment Establish a barometer for humor at work Identify the.
Preventing and Overcoming Abuse (4:03) Click here to launch video Click here to download print activity.
INTERVIEW DO’S AND DON’T’S ANN HOLDEN KENDELL BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:
Social Media Strategies: Best Business and Litigation Practices.
Copyright© 2010 WeComply, Inc. All rights reserved. 5/7/2015 Careful Communication.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
1 Avoiding the Top 20 Employment Litigation Landmines ♦ by John F. Dickinson, Esquire Constangy, Brooks & Smith, LLP
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
EMPLOYEE HANDBOOK POLICIES Suggestions and Observations 5/24/2012©J. Edward Enoch, P.C
1 Twitter This: Social Media & Hospitals Jenna Mooney, Partner Ingrid Brydolf, Partner.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
INTERNET and CODE OF CONDUCT
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
Lecture and Resource Slides BCOM 3e, Lehman & DuFrene © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted.
DUSDStudent Bullying Presentation Grades What is Bullying? No student or group of students shall, through physical, written, verbal, or other means,
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Chapter 2 Diversity and Ethics
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
(c) CGI Employee Benefits Group 2008 Conducting Harassment Prevention Training and Harassment Investigations Presented by Ron Page Human Resources Consultant.
MASI Mississippi Association of Self-Insurers September 28, 2012 Rogena Barnes, Regional VP of Human Resources, MGM Resorts Intl. Steve Cupp, Esq., Jones.
Social Media: Marketing and the Legal Risks Training Session One: The Social Media Playbook Matthew Spanovich & Eric Wiechman December 2, 2011 Spanovich.
EMPLOYEE TERMINATIONS Becky S. Knutson Davis Brown Law Firm.
Page 1 Recording of this session via any media type is strictly prohibited. Using Technology to Investigate Insurance Fraud Using Technology to Investigate.
Medical Center Hospital and Midland Memorial Hospital respects the right of employees to use internet-based communications such as social networking sites.
Electronic Use Policies.   Social Media  Internet.
Western Foothills RSU #10 Digital Citizenshipand the Acceptable Use Policy.
Hosted By Mrs. D ABC D
National Association of Colleges and Employers Legal Issues of Social Networking Jeffrey S. Stewart, Esq.
© 2011 Dickie, McCamey & Chilcote, P.C. All rights reserved. Confidential Attorney/Client Work Product. Electronic Communication and Social Networking.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Michael S. Williams 1. “Gentlemen don’t read each other’s mail.” - Henry L. Stimson 2.
Lecture Slides Business Communication, 16e, Lehman & DuFrene © 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or.
Professionalism & Social Media College of Registered Psychiatric Nurses of BC Annual Education Day June 7 th, 2013 Kelowna, BC Copyright ©
Presented by Beang Tong ENGL393, Spring’03
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Preparing s Using Etiquette Lesson A4-3.
Use: Policies to Enhance Employee Productivity Elizabeth A. Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.  Educate Us  Entertains Us  Connects Us  False Information  Opens Your Home to the Outside World  Bad.
Communicating with Parents and Students Through Social Media and Technology Beth Gasser, Vivid Image, Hutchinson.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Supervisor Success Series “3S” Session 2: Executing and Completing the Search.
Dignity for All Students Act & Sexual Harassment Avoidance Annual Training.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Name: Lukas Kokelaar Felipe Montanares Subject: English Miss: Ángela Chaparro Date: 27/09/15.
U.S. District Court Southern District of New York 229 F.R.D. 422 (S.D.N.Y. 2004)
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Social Media Audit: Labor, Advertising and Corporate Law.
Safe Online Communication. To start off, watch this short video on YouTube by using the link below.  v=ZCKW4H3Ap44
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
Managing Employment Practices Liability: Strategies to reduce your risk Presented by: Telamon Insurance & Financial Network.
Dysfunction: Causes, Effects, and Solutions.
Legal & Ethical Responsibilities HEALTH SCIENCE. Objectives ■ Understand and know legal actions concerning : malpractice, negligence, assault and battery,
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Bullying Cyber - bullying Harassment.
Dysfunction: Causes, Effects, and Solutions.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Privacy and Social Media
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
Privacy and Security in the Employment Relationship
Chapter 3: IRS and FTC Data Security Rules
Corporate Compliance.
Sexual Harassment Quiz True or False
Presentation transcript:

Electronic Communications & Social Media

So what are our goals today? Discuss liability exposures generated by e-communications and social media Give you some strategies to manage these exposures Discuss some examples

The Privacy Illusion

“Private” posts and s are often not Anonymity is history Your private, personal life is on the internet already Return of the “small town” effect? If you want to keep it private, don’t post it

The Internet Never Forgets Your Facebook posts exist forever! –Often, even if you delete them Situations change, friends change, but your hotheaded from 2000 doesn’t What will you think about your tweet in 20 years?

& ESI

Electronically Stored Information (ESI) More & more is the centerpiece of litigation: It is saved (often forever!) and traceable Often used informally, and gives a false sense of privacy & ESI

Legal Discovery and Data Preservation Legal duty upon notification or reasonable suspicion of litigation –Preserve all related documents and records Including voice mail – electronic copies to Legal / Risk –Check with IT if unsure how to save –Don’t try to hide / delete / alter anything!

Lehman Brothers c.1850 – 2008 –Lawyers appointed to investigate Lehman successfully data mined over 34 million pages of documents to uncover wrongdoing –Here is a sample of the search terms used: – A Case Study

Write every with the understanding that others may read it Don't write anything that you wouldn't state verbally to the recipient in a business conversation Don't write s when you are angry or upset! & ESI – What to do?!?

Avoid using abbreviations and slang Don’t label behaviors –e.g. Harassment, Discrimination, Retaliation Skip attempts at humor…especially if serious subject Be clear and concise Avoid sending long s & ESI – What to do?!?

Employees writing improper s, esp. harassing or threatening? –Stop the problem quickly - inform mgmt / HR Never state anything you are not willing to defend on a witness stand! Beware of emotional context –Talk directly when problems arise & ESI – What to do?!?

Sensitive issue? Discuss over the phone, or even better…in person Stick to the facts: Avoid opinions or conclusions ESI is NOT erased when you hit “Delete”. It will likely stick around forever & ESI – What to do?!?

Using Social Media for Employee Recruitment Responsible for what you learn –Visual Observations: Age, Race, Disability –Hobbies and Interests: Indicate health, genetic info, religion, sexual orientation, etc. Can you prove it didn’t influence you? Is it worth the liability?

Friend your employees? “Friend your friends, not your employees”, good idea, but not in your SM policy There are things you don’t want to know Be aware of what you post if your employees or others at work will read it – remember your influence!

Monitoring Policies

May not protect you: –e.g. Client – Attorney, Facebook etc. –Stored Communications Act & Electronic Communications Privacy Act, Computer Fraud and Abuse Act, wiretapping laws, common law invasion of privacy theories, other

Monitoring Policies What you learn may trigger liability: –Failure to act on criminal activity –e.g. Doe vs. XYC Corporation - NJ Same issues with wrongful termination /discrimination claims Must define what is monitored and do so uniformly

Social Media Policies Social Media is a powerful tool that can be successfully leveraged Two stances: –Opportunity Based (do do) –Threat Based (don’t do)

Social Media Policy Examples Opportunity-based Threat-based:

Social Media Policies Beware of Labor Law issues: –Problem Areas: Overbroad (must provide examples) –Saving Clauses (not useful unless specific) –“Disparaging and defaming language” – not lawful – e.g. working conditions

Things move fast! JetBlue Flight 191 3/27/12 –Q: How long did Jet Blue have to react? –A: Not very long! –Multiple videos posted before landing –Passengers were watching their own drama unfold on CNN live

And they hit hard… “Innocence of Muslims” Video –Protests in 20 Countries –Death of US Ambassador - toll still mounting… YouTube - United Breaks Guitars –12 MILLION+ views, Millions of $ –One dissatisfied customer

Bonus Points! “ Sucks”