Hot Topics in Workplace Privacy: Social Media and Personal Devices June 18, 2013 David E. Dubberly* Nexsen Pruet, LLC *Certified by S.C. Supreme Court.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
S E X UA L O R I E N TAT I O N & G E N D E R I D E N T I T Y An Employer’s Guide to Iowa Law Compliance * Published by the Iowa Civil Rights Commission.
Chapter 13- Rights of Criminal Justice Employees
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
Confidentiality and HIPAA
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
EPLI LITIGATION: ONE DEGREE OF SEPARATION BETWEEN EMPLOYEES’ USE OF SOCIAL NETWORKING AND EMPLOYERS’ EXPOSURES?
1 What You Don’t Know Can Hurt You Selected Employment Law Topics Gerard Solis Associate General Counsel.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Employment Law Chapter 18. Employment At Will Common law doctrine under which either party may terminate employment relationship at any time for any reason.
Hospitals & Social Media. Laws Implicated Federal Trade Commission –Disclosure of employment status –False or misleading statements State & Federal Wiretap.
Equal Opportunity and the Law Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Contents Click the link below to go directly to the slides for that chapter. Chapter 1 ■ Your Personal Strengths Chapter 2 ■ The Roles You Play Chapter.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
INTERNET and CODE OF CONDUCT
Legal and Ethical Aspects of Personnel Management Advanced Marketing.
Social Media in the Employment Context – The Belgian Perspective Lorenz Data Privacy Practice
Chapter 3 The Legal and Ethical Environment Nature of employment laws Key equal employment opportunity laws Employment-at-will Fair Labor Standards Act.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
SUPERVISING STUDENT EMPLOYEES August 13, 2002 Office of Human Resources Office of the General Counsel.
Veterinary Practice Law Quiz J EFFREY L. R OTH FEES & BURGESS, P.C. 213 Green Street Huntsville, Alabama Telephone  Facsimile
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
EMPLOYEE TERMINATIONS Becky S. Knutson Davis Brown Law Firm.
Providing Equal Employment Opportunity and a Safe Workplace
Copyright © 2013 by The National Restaurant Association Educational Foundation. Published by Pearson. All rights reserved. HOSPITALITY HUMAN RESOURCES.
An Educational Computer Based Training Program CBTCBT.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
EMPLOYMENT AND LABOR LAWS  These laws:  Prevent discrimination and harassment in the workplace.  Outline workplace poster requirements.  Set wage.
Three Strikes and You’re Out! Part Two: When Good Employees Turn Bad - Termination Tips Jim Drozdowski V.P. & General Counsel North Coast Container Corp.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Employment Discrimination.  Fifth Amendment – Prohibits the federal government from: ◦ Depriving individuals of “life, liberty, or property” without.
Essentials Of Business Law Chapter 28 Employment Law McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Iowa Civil Rights Commission Disclaimer The information contained in this presentation is a brief overview and should not be construed as legal advice.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
DEALING WITH THE PROBLEM EMPLOYEE John Ashby
Chapter 8 Ethics and Technology
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch The Legal Environment of Business A Critical Thinking.
FACULTY DIRECTOR TRAINING OFFICE OF EDUCATION ABROAD 1 Legal Issues and Education Abroad.
Tom Jones Employers Resource Group Facilitated by: Associated Industries of Massachusetts Employee Handbooks 2015/2016 South Coast Resource Council November.
2 Equal Opportunity and the Law 2 Copyright © 2015 Pearson Education, Inc. 2-1.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.
Copyright © 2014 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin FUNDAMENTALS OF HUMAN RESOURCE MANAGEMENT 5 TH EDITION BY R.A.
Managing Strategic Human Resources Today Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 19.  Equal opportunity in employment: The rights of all employees and job applicants  To be treated without discrimination  To be able to sue.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Social Media Policies: What Employers Can and Cannot Do Thomas D. Rees, Esq. High Swartz LLP February 23,
The Twelve Most Important Public Employment Law Developments Ever Bob Joyce PANC Asheville October 5, 2015.
© BLR ® —Business & Legal Resources 1501 Essential HR For Those Who Have Recently Assumed HR Responsibilities.
“Kids First, New Mexico Wins!” NMPED Data Conference Spring 2016 Dan Hill General Counsel, Public Education Department Randi Johnson General Counsel, State.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
By: John G. Kruchko, Esq. September 12, 2011 Kruchko & Fries © 2011 Privileged and Confidential 1.
Chapter 13 Employment Discrimination Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Northern New Mexico Human Resources Association November 13, 2012 Background Checks Scott D. Gordon.
Chapter 7 Employment Law Halsey/McLaughlin, Legal Environment You will be able to answer the following questions after reading this chapter: What is an.
C H A P T E R 6 Employment Law Chapter ??.
Indiana Access to Public Records Act (APRA) Training
Chapter 20: Employment Relationships
Protection of CONSUMER information
Discrimination.
Employment Discrimination
Introduction to Employment and Employee Relations
Presentation transcript:

Hot Topics in Workplace Privacy: Social Media and Personal Devices June 18, 2013 David E. Dubberly* Nexsen Pruet, LLC *Certified by S.C. Supreme Court as Specialist in Employment and Labor Law

Workplace Privacy In The News Background checks for applicants

Workplace Privacy In The News Using social media postings to screen out applicants

Workplace Privacy In The News Discipline for critical social media posts

Workplace Privacy In The News New issue: accessing personal devices to monitor compliance with policies

Social Media and ECPA Compliance Computer wiretap laws –Electronic Communications Privacy Act as amended by Stored Communications Act Criminal offense to access stored electronic communications “without authorization” Also creates civil cause of action –State computer crimes laws similar

Social Media and FTC Compliance Federal Trade Commission –Disclosure of employment status –False or misleading statements

Social Media and Discrimination/Harassment Title VII, ADEA, ADA –Discriminatory comments –Harassing messages or pictures

Social Media and Trade Secret Protection S.C. Trade Secrets Act –Trade secret information must be “the subject of efforts that are reasonable under the circumstances to maintain its secrecy” Reasonable measures may include: –Confidentiality agreements –Policy prohibiting improper disclosure –Security software for mobile devices –Strong passwords –Immediate report of lost or stolen device –Exit interview procedures

Social Media and Labor Law Compliance National Labor Relations Act –Section 7 rights (apply to non-supervisory employees at almost all companies) –Criticism of supervisor and employer –Prohibition against surveillance

DISH Network Social Media Policy Policy: –“You may not make disparaging or defamatory comments about [Employer], its employees, officers, directors, vendors, customers, partners, affiliates, or our, or their, products/services.”

DISH Network Social Media Policy National Labor Relations Board Acting General Counsel May 2012: –“[T]he prohibition on making ‘disparaging or defamatory’ comments is unlawful. Employees would reasonably construe this prohibition to apply to protected criticism of the Employer’s labor policies or treatment of employees.”

Clearwater Paper Social Media Policy Policy: –“Employees are prohibited from posting information regarding [Employer] that could be deemed material non-public information or any information that is considered confidential or proprietary.”

Clearwater Paper Social Media Policy NLRB Acting GC May 2012: –“The term ‘material non-public information,’ in the absence of clarification, is so vague that employees would reasonably construe it to include subjects that involve their working conditions.” –“[T]he term ‘confidential information,’ without narrowing its scope so as to exclude Section 7 activity, would reasonably be interpreted to include information concerning terms and conditions of employment.”

Wal-Mart Social Media Policy Policy on content of communications: –Prohibits “inappropriate postings that may include discriminatory remarks, harassment and threats of violence or similar inappropriate or unlawful conduct.” –“Examples … might include offensive posts meant to intentionally harm someone’s reputation or posts that could contribute to a hostile work environment on the basis of race, sex, disability, religion or any other [protected] status.”

Wal-Mart Social Media Policy NLRB Acting GC May 2012 : –Policy not ambiguous because “it provides sufficient examples of prohibited conduct so that, in context, employees would not reasonably read the rules to prohibit Section 7 activity.”

Wal-Mart Social Media Policy Policy on protection of confidential information: –“Maintain the confidentiality of [Employer] trade secrets and private or confidential information. Trades secrets may include information regarding the development of systems, processes, products, know-how and technology. Do not post internal reports, policies, procedures or other internal business-related confidential communications.”

Wal-Mart Social Media Policy NLRB Acting GC May 2012 : –“Employees have no protected right to disclose trade secrets. Moreover, the Employer's rule provides sufficient examples of prohibited disclosures (i.e., information regarding the development of systems, processes, products, know-how, technology, internal reports, procedures, or other internal business-related communications) for employees to understand that it does not reach protected communications about working conditions.”

Social Media and Background Checks October 2011 survey by Reppler –91% of hiring managers use social media to screen candidates –69% have rejected candidates based on their social media sites Lied about qualifications Inappropriate photos Inappropriate comments Negative comments about prior employers Demonstrated poor communication skills –68% have hired candidates based on their social media sites

Social Media and Background Checks Main downsides –Too much information –Discrimination claims –Some sites may be considered “consumer reporting agency” for purposes of FCRA Best practices –Not decision makers –Same protocol for all applicants –Only public information/no deception –Only job-related information

What is BYOD? Transition from company-issued BlackBerrys to employee-owned smartphones and tablets –Connect personal devices to employer e- mail and data networks –Create, store, and transmit work-related information on personal devices employer does not control

Work-Related Mobile Device Use March 2012 survey by SANS –60% of employers allow BYOD November 2012 survey by Ovum –But only 30% require employees to sign BYOD agreement March 2013 survey by Ponemon Institute –50% who left or lost jobs in last 12 months admitted taking confidential information –40% plan to use it in another job

BYOD and CFAA Compliance Computer hacking laws –Computer Fraud and Abuse Act Criminal offense to access computer “without authorization” Permits recovery of money damages if such access results in damage of over $5,000 –State computer crimes laws similar

BYOD and FLSA Compliance Fair Labor Standards Act –Exempt vs. non-exempt employees –Unpaid off-the-clock work –Unpaid overtime

BYOD and OSHA Compliance Occupational Safety and Health Act –Repetitive stress injuries –Distracted driving

Sitton v. Print Direction, Inc. (Ga. Ct. App. 2011) Employee used personal laptop connected to employer’s network for work Also used it to send business to competing business started by his wife While employee away from office, CEO entered his office, moved computer’s mouse, clicked on listing in personal account that appeared on screen, and printed s showing disloyal conduct Employee terminated, then sued under GA computer crimes statute and for common law invasion of privacy

Sitton v. Print Direction, Inc. (Ga. Ct. App. 2011) Trial court ruled for employer and awarded $39,000 in damages Appeals court affirmed –CEO’s actions not prohibited by GA statute because they were not “without authority” Employer’s policy on computer use, which allowed inspection of electronic devices in course of investigation, applied to personal equipment –CEO’s actions not unreasonable invasion of privacy under circumstances

BYOD Policy and Consent Form What to do if device lost or stolen What employer data can be downloaded to personal device Employer not liable for lost or damaged personal data Signed consent for employer to monitor, access, and remotely delete data in specified circumstances Signed consent for employer to install security software and applications to protect its data

Questions? Nexsen Pruet website: