Employee Privacy Rights: A Delicate Balancing Act Laura K. Sitar Shareholder, Wroten & Associates.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Cellular Telephone Use Guidelines AA Roundup June 27, 2007.
Northside I.S.D. Acceptable Use Policy
ERIC PALTELL, ESQ. KOLLMAN & SAUCIER, P.A CUMBERLAND VALLEY SHRM LEGAL & LEGISLATIVE CONFERENCE Recent Developments in Maryland Employment Law.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
CPS Acceptable Use Policy Day 2 – Technology Session.
(Edited) WORKPLACE PRIVACY.
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
© 2011 Dickie, McCamey & Chilcote, P.C. All rights reserved. Confidential Attorney/Client Work Product. Electronic Communication and Social Networking.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Avoiding Traps in Internal Investigations H. Lee Barfield II Bass, Berry and Sims PLC November 5, 2010.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
ETHICS: CONFIDENTIALITY OF IFTA DATA IFTA ATTORNEYS’ SECTION MEETING October 7, :30-10:00 a.m. Jim Clark Motor Carrier Services Attorney Indiana.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
HIPAA Privacy Rule Training
Nassau Association of School Technologists
Indiana Access to Public Records Act (APRA) Training
Ogletree, Deakins, Nash, Smoak & Stewart PC
Privacy & Confidentiality
Workplace Behavior and Privacy
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

Employee Privacy Rights: A Delicate Balancing Act Laura K. Sitar Shareholder, Wroten & Associates

Article 1, Section 1 of the California Constitution California citizens have an inalienable right of privacy. Their protected interests include: – Interests precluding the dissemination or misuse of sensitive or confidential information (informational privacy). – Interests in making intimate and personal decisions or conducting activities without observation, intrusion or interference (autonomy privacy).

Employers Have The Right To Decide How Best to Operate Their Businesses Employers monitor employee behavior for a number of reasons. – To improve productivity – To avoid litigation – To protect assets – To reduce or prevent injuries – Just because employers are curious

Employer Needs vs. Employee Rights

Reasonable Expectation of Privacy An employee’s reasonable expectations are evaluated objectively based on community standards. Protective measures are taken into consideration when evaluating a violation.

Violation? Consider the nature of the intrusion on an employee’s reasonable expectation of privacy As well as the offensiveness of the intrusion balanced against the justification for the intrusion

Does An Employee Have A Reasonable Expectation of Privacy? Pre-employment drug testing? Pre-promotion drug testing? Random drug testing? Medical examinations? Dating a subordinate? Dating a peer?

Employee Health Information Employers are obligated to protect employees’ health information. Employee’s financial and other personal information also are safeguarded by state laws.

Record Safeguards Keep records in a secured location. Make accessible only to persons with need for access. Never use social security numbers as IDs. Keep records only as long as necessary.

References Have a policy. Provide only objective, verifiable facts. If you give positive, give negative as well. Can you disclose the grounds for termination?

Employee Monitoring Does the employee have a reasonable expectation of privacy?

Do Employers Really Monitor Their Employees? According to the 2007 Electronic Monitoring and Surveillance Survey conducted by the American Management Association and the ePolicy Institute:2007 Electronic Monitoring and Surveillance SurveyAmerican Management Associationthe ePolicy Institute 48% of the 304 companies surveyed used some form of video monitoring in the workplace 66% monitored employee Internet use 30% reported having terminated employees based on findings from Internet monitoring 28% of the respondents had terminated employees for misuse of s

Video Monitoring Employers can monitor their employees by video except in certain locations.

GPS Tracking Does an employee have a reasonable expectation of privacy driving the company van? Does an employee have a reasonable expectation of privacy driving his own car for company business?

Company Devices

Monitoring Phone Usage When parties to a call are all in California, state law requires that they be informed that the conversation is recorded or monitored by either putting a beep tone on the line or playing a recorded message. (California Public Utilities Commission General Order 107-B) Federal law, which regulates phone calls with persons outside the state, allows unannounced monitoring for business-related calls. (See Electronic Communications Privacy Act, 18 USC 2510, et. seq.)Electronic Communications Privacy Act Under federal case law, when an employer realizes the call is personal, he or she must immediately stop monitoring the call. However, when employees are told not to make personal calls from specified business phones, the employee then takes the risk that calls on those phones may be monitored.

How to Spy? A number of companies make keylogger apps. Mobile Spy has an app that works with iOS, Android, BlackBerry and Nokia's Symbian. SpectorSoft has eBlaster, which works with Android and BlackBerry. These apps silently record text messages, , Web use, GPS location, contacts, call logs, photos and videos. A company can set geo fences so the company knows whether an employee leaves work during company hours. All the information is ed to the person who installed the app. Keylogger apps are invisible and designed to prevent tampering. It's very difficult to detect one and almost as hard to eliminate it.

Monitoring Text Messages In a June 2010 decision, City of Ontario v. Quon, the Supreme Court unanimously upheld the search of a police officer's personal messages on a government-owned pager, saying it did not violate his constitutional rights. The warrantless search was not an unreasonable violation of the officer’s 4th Amendment rights because it was motivated by legitimate work-related purposes.City of Ontario v. Quon The city obtained a transcript of Quon’s messages during an investigation to determine whether officers were using their pagers for personal messages. The transcripts showed that Quon had been exchanging sexually explicit messages. The Court’s decision generally allows government employers to look at workers' electronic messages if employers have reasonable, work-related grounds. The 4th Amendment would not apply to a private employer. However, the decision could have an impact on future court decisions involving private employers.

Usage Policies For company-provided devices, explain that the employer retains full ownership and the right of access to all electronic communications, including the ability to access and audit device content on a business necessity basis. Reviewable content should include , text messages, photos and videos sent, received or stored on the device— whether business-related or personal.

Monitoring s In Holmes v. Petrovich Development Company, LLC, a California court ruled that s sent by an employee to her attorney from a computer in her workplace were not protected by attorney-client privilege. Holmes v. Petrovich Development Company, LLC, The court noted that the employee had been: (1) told of the company’s policy that its computers were to be used only for company business, (2) warned that the company would monitor its computers for compliance with this policy, and (3) advised that employees using company computers have no right of privacy.

Monitoring Computer Usage To increase productivity To prevent or remedy harassment To protect employee data

Stored Communications Act Konop v. Hawaiian Airlines, Inc, 302 F.3d 868 (9 th Cir. 2002)-Vice President accessed pilot’s private web site by using authorized employee Pietrylo v. Hillstone Restaurant Group, No , 2008 U.S. Dist. LEXIS (D.N.J. 2008)-Employer accessed chat group on employee’s Myspace account without authorization

Can an employer monitor a computer which is given to an employee to use at home? Can an employer monitor computer use when the company is the employee’s home?

Policy Tips If the employer reimburses employees for some or all business-related use of an employee’s personally purchased electronic device, ensure that the policy establishes the company’s right to similarly access any business-related content. Clearly and consistently communicate that employees should have no expectation of privacy regarding any transmitted content, if the employer reimburses employees for business-related use of an electronic device. Include a “No Abuse of Privilege Clause” clearly identifying and prohibiting harmful activities. This type of clause is intended to shield the employer from liability resulting from employee misuse, especially in situations where an employee uses the device in a manner that harms others.

Policy Tips (cont.) Consider obtaining the employee’s written authorization permitting the employer to seek reimbursement for any charges or liability incurred from the employee’s unauthorized, illegal or excessive use of the device. Outline the consequences of failing to return company-owned devices upon separation of employment. Quickly address violations and consistently enforce policies in place. As technology advances, regularly review and update electronic communications policies to shield the employer from legal liability.

Sample Policy Regarding Use of Company Electronic Devices Computer, Network and Telephone Use The Company's communications equipment such as telephones, computers, networks, and Internet access are important tools for everyday operation and are provided to facilitate Company business. No employee should have any expectation of privacy in his or her use of Company-provided communication resources. The Company reserves the unlimited right to access and review all traffic transmitted through or received by employer-provided equipment and services. The Company intends to engage in such reviews on a regular basis and to take steps necessary to correct inappropriate or unauthorized use Company resources.

Limited personal use of these resources is allowed as long as it does not interfere with job responsibilities. In the event charges are incurred for the use of the Company's resources for personal business, then the employee will reimburse the Company and may be subject to disciplinary action. In addition, the use of the Company's communications equipment for solicitation, religious, or political causes is prohibited. Further, personal use may not violate state or federal laws, including the Health Insurance Portability and Accountability Act. Offensive and or disruptive messages containing sexual, racial, or degrading commentary shall not be tolerated and may be subject to disciplinary action.

Monitoring Social Media

Legislative Landscape California, Illinois, Maryland and Michigan adopted social media privacy laws last year. A similar law in Utah takes effect this month. Social media privacy legislation has been introduced or is underway in 35 states since January of this year.

California, Colorado, Connecticut, North Dakota and New York, have laws that prohibit employers from disciplining an employee based on off-duty activity on social networking sites, unless the activity can be shown to damage the company in some way.

National Labor Relations Act “Concerted activity", is simply activity undertaken by employees acting together, rather than individually, even if no union is involved, as long as the employees are discussing their work conditions or terms of employment.

California Social Media Law THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS: SECTION 1. Chapter 2.5 (commencing with Section 980) is added to Part 3 of Division 2 of the Labor Code, to read: CHAPTER 2.5. Employer Use of Social Media 980. (a) As used in this chapter, “social media” means an electronic service or account, or electronic content, including, but not limited to, videos, still photographs, blogs, video blogs, podcasts, instant and text messages, , online services or accounts, or Internet Web site profiles or locations. (b) An employer shall not require or request an employee or applicant for employment to do any of the following: – (1) Disclose a username or password for the purpose of accessing personal social media. – (2) Access personal social media in the presence of the employer. – (3) Divulge any personal social media, except as provided in subdivision (c). (c) Nothing in this section shall affect an employer’s existing rights and obligations to request an employee to divulge personal social media reasonably believed to be relevant to an investigation of allegations of employee misconduct or employee violation of applicable laws and regulations, provided that the social media is used solely for purposes of that investigation or a related proceeding. (d) Nothing in this section precludes an employer from requiring or requesting an employee to disclose a username, password, or other method for the purpose of accessing an employer-issued electronic device. (e) An employer shall not discharge, discipline, threaten to discharge or discipline, or otherwise retaliate against an employee or applicant for not complying with a request or demand by the employer that violates this section. However, this section does not prohibit an employer from terminating or otherwise taking an adverse action against an employee or applicant if otherwise permitted by law. SECTION 2 Notwithstanding any other provision of law, the Labor Commissioner, who is Chief of the Division of Labor Standards Enforcement, is not required to investigate or determine any violation of this act.

Key Points for Social Media Policy Clearly articulate parameters for use of social media sites during working hours. Communicate mechanisms by which employees can bring forward work- related complaints before posting to social media sites. Reiterate policy that company computers and systems are company property intended for company use and may/will be monitored. Prohibit use of company logos and trademarks on social media sites without executive approval. Prohibit disclosure of confidential, proprietary or trade secret information or intellectual property of the employer.

Key Points (Cont.) Prohibit posting information which could be viewed as harassing, threatening or retaliatory. Prohibit posting false or misleading information regarding company, employees, clients. Reiterate that conduct that would be grounds for discipline or dismissal if performed at work is also grounds for discipline or dismissal if performed online. State that misuse is grounds for discipline, including termination. Require employees to sign a written acknowledgement that they have read and will abide by the policy.