Workplace Privacy and Technology: Legal and Ethical Issues presented CS 340.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
CREATING A FLOW CHART FOR SEARCH AND SEIZURE. Concepts Related to Searches  Not a search unless conducted by state actor  Justified at inception  Individualized.
"... The warrant requirement, in particular, is unsuited to the school environment... [T]he legality of a search of a student should depend simply on the.
Historical Background Dollree Mapp was under suspicion for possibly hiding a person suspected in a bombing. Mapp refused to let the police in her home.
California v. Greenwood
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Teaching American History: Moot Courts and Constitutional Concepts.
Data Protection.
Social Media – Why Should You Care? Carlos S. Arévalo Zukowski, Rogers, Flood & McArdle 50 Virginia St. Crystal Lake, IL /
Librarians and the Unauthorized Practice of Law.
Business Plug-In B7 Ethics.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
Chapter 14: Ethics, Justice and Fair Treatment at Work
POLICE LAW & SOCIETY What are the distinct characteristics of police in U.S. society? Police play multiple roles Law prescribes parameters of police practice.
Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson
Data Protection Overview
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
Ferguson v. Charleston Aaron Leavitt Law, Values, and Public Policy Spring Semester 2002.
E-monitoring in the Workplace Trent and Jamila Robert and Jamie Trent and Jamila Robert and Jamie.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
U.S. SUPREME COURT 2009 Term – Case Update. International Association of Chiefs of Police Legal Officers’ Section Presented by Karen J. Kruger Funk &
© 2004 by Prentice Hall Terrie Nolinske, Ph.D Respecting Employee Rights and Managing Discipline 14.
(Edited) WORKPLACE PRIVACY.
HIPAA PRIVACY AND SECURITY AWARENESS.
Student Search and Seizure
What is Ethics? Ethics Ethical behavior
1 VIDEO SURVEILLANCE (public/private areas) TOMÁŠ MIČO The Office for Personal Data Protection of the Slovak Republic.
1 Community Legislation on Equal Treatment DG ‘Employment, Social Affairs & Equal Opportunities’ Equality, Action against Discrimination: Legal Questions.
The Federal Court System …and Justice For All. The Adversarial System Courts settle civil disputes between private parties, a private party and the government,
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Practice Management Quality Control
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Grady L. Hunt Locklear, Jacobs, Hunt & Brooks (910) The information contained in this presentation is intended for general.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Judicial Branch Federal District Courts (94 Courts in 12 Districts) Federal Appeals Court (12 Appeals Courts +1 Special Appeals Court) Supreme Court (Highest.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
8.2 How Federal Courts Are Organized. US District Courts District Courts= federal courts where trials are held and lawsuits begin; 94 district courts.
Emerging Case Law and Recent eDiscovery Decisions.
Data Protection: Workplace, Health and Safety. Employers’ responsibilities Employer obliged to provide safe place of work. Health and Safety Act 2004.
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
Ann Marie Perez Professor CRIMINAL PROCEDURE WEEK 1 - UNIT 1.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Chapter 10- The Judicial Branch. JUDICIAL BRANCH  The Judicial Branch was created to help balance the powers of the other two branches.  It played a.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Reasonable Expectation of Privacy When Using Employer 28 th Annual Carl A. Warns, Jr. Labor & Employment Law Institute, Louis D. Brandeis School.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
8.2 How Federal Courts Are Organized Ms. Nesbit Civics and Economics.
The Judiciary How the national and state court systems work along with a brief look at due process…..
SEMINAR TWO Employment Law 1. Holiday Schedule:  Holiday Break begins 12/21 – ½  Only one day for week 3 material and assignments  Cover week 2 and.
Workplace Behavior and Privacy
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Bell Work (Think of your response and be prepared to share)
Study Guide!.
City of Ontario v. Quon.
Search & Seizure The act of taking possession of this property.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Chapter 43 Administrative Law and Regulatory Agencies
Presentation transcript:

Workplace Privacy and Technology: Legal and Ethical Issues presented CS 340

Employee Monitoring Not a new concept, changing methods – Now impacts both blue & white collar workers Computer monitoring More precise, more detailed, unseen The workplace as a “panopticon”panopticon Stats: 76% E’er monitor Internet use – 65% block some sites Why monitor? p. 176 – Guard trade secrets – Prevent abuses of computer resources – Performance evaluations – Liability for harassment epapers/Internet_Monito ring.pdf epapers/Internet_Monito ring.pdf

Monitoring Methods Keystroke quotas – “electronic sweatshop” Phone call monitoring – #, length, duration, idle Location monitoring – Even on break, who with Argument that this brings up privacy issues – E’ers say not an issue this is their job Employee Internet Management software com/ com/ r360.com r360.com

Case Study: Newport Electronics Pp Fired for an unsent letter Questions: – Was Julie treated fairly? Why or why not?

Does the 4 th Amendment not apply? A right to be secure against …. unreasonable searches and seizures

Comparing US and European polices US focus is on ownership of resources Issues relate to finding the balance between an organization's legitimate business interests and an accommodating an individual's privacy interests. Continental Europe Focus is on human dignity and the idea that worker’s dignity must not be different because the worker is at his/her place of work. – Italian prohibition of most remote surveillance – French Labor Code, Article 120-2, bars measures that are not justified by the nature of task or proportional to the objective of the business

Cases asserting employer rights to read Bourke v. Nissan, Smyth v. Pillsbury, Much emphasis is placed on the E’er ownership of the equipment the E’ee is using. Cts may rule differently if there is evidence E’er was trying to “snoop on personal, union or whistle-blowing activities.”

City of Ontario, CA v. Quon US S. Ct. June 2010 Please read opinion at: – P.ZO P.ZO City provided txt msg pager to police officer Previously, City had announced a Computer Usage, Internet & policy, specifing E’ees to have no expectation of privacy or confidentiality.

Quon cont’d Pager provided thru Arch Wireless; unlike computers. City told Quon & others they’d treat txt msgs like . Policy was when E’ee went over could write a check instead of having msgs audited. Continued. Eventually so many officers went over the monthly limit, the chief looked into this to see if the limit was too low (work-related) or if these overages were due to personal messages, and transcripts of msgs were obtained.

Quon cont’d (2) With the audit found that many were not work-related and some sexually explicit. IA received transcript & compared it to Quon’s work schedule times & dates. – Aug: 456 msgs, 57 work related Avg 28/day, 3 work related – Disciplined Joint lawsuit alleging 4 th Amendment violation & SCA by obtaining and reviewing transcript of messages. – Important point: 4 th amendment challenge may be appropriate here b/c government entity acting as Quon’s employer.

Quon cont’d (3) Lower Cts: – District: if audit was to determine if wasting time, unconstitutional; if to ensure officers not paying hidden fees, constitutional. Jury decided what purpose was; said it was to gauge efficacy or char limits, & therefore constitutional. – COA: search had legitimate purpose but was not reasonable in scope; could have been performed in a way that did not violate 4 th Amendment rights. Court found violation.

Quon cont’d (4) At S Ct: determining whether Quon had a reasonable expectation of privacy – Impact on reasonableness of Quon’s expectation of privacy Did the overage policy of check writing change the Computer Use policy? – Warrantless searches can be ok under 4 th amendment for exigent circumstances or special needs that are non-investigative in nature. What evaluating the char. limit a special need?

Quon cont’d (5) Holding: – “Under the circumstances, a reasonable employee would be aware that sound management principles might require the audit of messages to determine whether the pager was being appropriately used. Given that the City issued the pagers to Quon and other SWAT Team members in order to help them more quickly respond to crises—and given that Quon had received no assurances of privacy— Quon could have anticipated that it might be necessary for the City to audit pager messages to assess the SWAT Team’s performance in particular emergency situations.” – “This Court has ‘repeatedly refused to declare that only the ‘least intrusive’ search practicable can be reasonable under the Fourth Amendment.’”

Quon cont’d (6) Statement of Law: – “Because the search was motivated by a legitimate work related purpose, and because it was not excessive in scope, the search was reasonable under the approach of the O’Connor plurality. 480 U. S., at 726. For these same reasons—that the employer had a legitimate reason for the search, and that the search was not excessively intrusive in light of that justification—the Court also concludes that the search would be “regarded as reasonable and normal in the private-employer context” and would satisfy the approach of JUSTICE SCALIA’s concurrence. Id., at 732. The search was reasonable, and the Court of Appeals erred by holding to the contrary. Petitioners did not violate Quon’s Fourth Amendment rights.”

Workplace Privacy & Employee Monitoring Please read and study Fact Sheet 7: –