EMPLOYEE PRIVACY RIGHTS

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Overview of the Privacy Act
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Confidentiality and HIPAA
News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
Employment Law for BUSINESS sixth edition
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Right to Privacy: The Unwritten Right
PA/FOIA INTERFACE OSD/JS Privacy Office (703)
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
2/16/2010 The Family Educational Records and Privacy Act.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Chapter 14: Ethics, Justice and Fair Treatment at Work
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
EMPLOYER/EMPLOYEE PRIVACY RIGHTS
The Bill Of Rights The First Ten Amendments to the Constitution
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
(Edited) WORKPLACE PRIVACY.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Other Laws (Primarily for E-Government) COEN 351.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 39 Regulation of Employment Twomey Jennings Anderson’s Business.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Legal Case Studies November 8,  1 st Amendment to US Constitution  4 th Amendment to US Constitution  Tinker vs. Des Moines.
Chapter 40 Regulation of Employment Twomey, Business Law and the Regulatory Environment (14th Ed.)
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Current Best Practices and Precedents Existing UAV Guidelines/Best Practices.
AP GOVERNMENT. CIVIL LIBERTIES  Civil Liberties are individual’s legal and constitutional protections against the government.  Although our civil liberties.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Unit 3 Regulation. 2 Regulation of Nursing Practice l Protection of Public l Licensure l Certification.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter 5 – The Constitution and the Regulation of Business Copyright © 2011 by Jeffrey Pittman.
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
Invasion of Privacy in Digital Media Basic Concepts.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
Chapter 39 THIRD PERSONS IN AGENCY. 2 The relationship of employer and employee is created by the agreement of the parties and is subject to contract.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
WHAT IS TRUTH? & FREEDOM OF THE PRESS September 20, 2013.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Protection of Personal Information Act An Analysis on the impact.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Privacy and the Law.
Surveillance around the world
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Employee Privacy and Privacy of Employee Information
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

EMPLOYEE PRIVACY RIGHTS

PRIVACY ACT Privacy- is the right to be let alone and to control the conditions under which information pertaining to you is collected, used and disseminated. Purpose of the Privacy Act: is to balance the Government's need to maintain information about individuals with the rights of the individual to be protected against unwarranted invasions of their privacy.

Core Requirements: Privacy Act Limitations on the collection, use and dissemination of personally identifiable information about an individual.     Disclosure restrictions to third parties.    Access and amendments rights of the individuals who are subjects of the files.    Notification to the public of collections of information on them (forms and web sites), and record systems (Federal Register Privacy System Notice.  Secret records on individuals cannot be maintained.   Maintenance requirements: Is the information relevant and necessary? Is the information accurate, timely, and complete? Is the information from the subject? Is there a notice addressing the purpose and use of the information? Are safeguards in place to protect the integrity of the information?

The Impact? The Privacy Impact Assessment (PIA): is a checklist now required by the E-Government Act of 2002 that should be used when designing and developing a new or amended information system that contains information on individuals. The purpose of the PIA is to ensure that privacy protections and Privacy Act requirements are considered in information systems. PIAs should be considered with new electronic information collections from the public, collections of information from websites, creation of new databases or amendments of others, and use of new technology that may impact individuals.

Freedom Of Information Act of 1966: Freedom of Information Act (FOIA):, as amended, represents the implementation of freedom of information legislation in the United States. It was signed into law by President Lyndon B. Johnson on September 6, 1966, and went into effect the following year. (Public Law 89-554, 80 Stat. 383; Amended 1996, 2002, 2007) Functions: This act allows for the full or partial disclosure of previously unreleased information and documents controlled by the United States Government. The Act defines agency records subject to disclosure, outlines mandatory disclosure procedures and grants nine exemptions to the statute.

The Right of Privacy Is a common-law cause of action that is a recent legal development. The U.S. Constitution contains no direct references to the right of privacy, although the Fourth Ammendment states: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated..." An action for invasion of privacy is actually comprised of four distinct torts (legal wrongs). These are: intrusion upon seclusion; appropriation of name or likeness; publicity given to private life; and publicity placing the person in a false light. To sue successfully for invasion of privacy, a plaintiff only has to prove one of the four torts, not all of the four torts. The right of privacy competes with the freedom of the press as well as the interest of the public in the free dissemination of news and information, and these permanent public interests must be considered when placing the necessary limitations upon the right of privacy. The First Amendment states: "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press..."

Intrusion Upon Seclusion Definition: One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability for invasion of privacy, if the intrusion would be highly offensive to a reasonable person. To be liable for intrusion upon seclusion, the plaintiff must prove the following elements: 1. Invasion of a secluded place or privacy: the Defendant must invade the Plaintiff's personal or private space. The definition of this invasion is very broad. Invasion may be: by physical intrusion into a place where the plaintiff has secluded himself. by use of the defendant's senses to oversee or overhear the plaintiff's private affairs (such as eavesdropping or spying with a telescope), or some other form of investigation or examination into plaintiff's private concerns (such as illegally obtaining someone's credit report). 2. Objectionable intrusion: the intrusion must be of a type that would be highly offensive to the ordinary reasonable person. 3. Invasion of private affairs or matters: the interference with the plaintiff's privacy must be substantial (however, if the event reported occurs in public, there is no expectation of privacy). Examples of intrusion upon privacy include placing microphones or cameras in someone's bedroom or hacking into their computer.

Employee monitoring: Privacy in the Workplace Employee privacy has become a controversial issue in the field of Human Resource management as employers have more technologies available to monitor telephones, computer terminals, and voice mail. This privacy issue has been fueled by the increased use of a variety of electronic monitoring systems.

Employee Monitoring: Electronic monitoring Electronic monitoring: is defined as "the computerized collection, storage, analysis, and reporting of information about employees' productive activities" "Currently, as many as 26 million workers in the United States are monitored in their jobs, and this number will increase as computers are used more and more within companies and as the cost of these monitoring systems goes down" Of those monitored, 10 million have their work evaluated and pay based on the data collected. "By the end of the decade, as many as 30 million people may be constantly monitored in their jobs"

Managers Types of: Monitoring Systems Some of the most commonly used are: Computer Monitoring, which measures employee keystroke speed and accuracy; Video Surveillance, which detects employee theft, horseplay, and safety. Spying, which uses detective techniques, when there is suspicious activity within the workplace. Eavesdropping and Phone Tapping, which track incoming, outgoing, and the frequency of employee phone calls. The Active Badge System, which tracks an employee's location within the workplace.

Monitoring Systems: Other Various Types Various types of employee monitoring systems are used today in American workplaces. For example, mandatory drug testing, criminal background checks, and a battery of psychological assessments are almost commonplace. In addition to these pre-employment screenings, computer monitoring, video surveillance, spying, eavesdropping, investigators posing as employees, undercover operatives, personal information shared with co-workers, telephone taps, and active badges are among the most common monitoring techniques.

Employee Monitoring System: Advantages Advantages for Employees: It is objective. Providing feedback to employees on their work performance. Provide more flexibility in work locations and work hours by allowing employees to telecommute or use "flextime" system.

Employee Monitoring System: Disadvantages Disadvantages for Employees: The issue of privacy. The question of fairness in how the monitoring is implemented. Pressures and stressors have also been considered a major contributor to employee psychological and physical health complaints. Erodes their sense of dignity and frustrates their efforts to do high-quality work by a single-minded emphasis on speed and other purely quantitative measurements.

Advantages for Employers Monitoring gives managers a clear picture of who are hard workers and who are unproductive. Many business owners feel they have no other choice in order to keep up with their competitors. employers feel that they have a right and a responsibility to protect their legitimate business interests through the use of electronic monitoring. Electronic monitoring can also be used to enhance safety and protect employer and employee property. Believe they should be able to monitor employees for signs of wrongdoing since the employer is ultimately responsible for many actions of its employees.

Disadvantages for Employers Stress levels and Job dissatisfaction increase when workers feel they have no control over their jobs and when there is a lack of trust in the work environment. Monitoring can discourage workers from working towards team and organizational goals or from helping co-workers achieve organizational goals. Question remains as to whether the statistics that employers gather are an accurate representation of an employee's ability and performance.

Electronic Communications Privacy Act of 1986 (ECPA) The Electronic Communications Privacy Act of 1986 (ECPA), which is an amendment to the Omnibus Crime Control and Safe Streets Act of 1968 (commonly known as the "wiretap law"). The primary law that applies to this subject. This law governs third-party interceptions of electronic communications, which means that the ECPA makes it illegal for any person to intentionally intercept, access, or disclose any wire, oral or electronic communication. The ECPA prohibits third parties, the government, police or individuals from accessing or disclosing e-mail without proper authorization, such as obtaining a search warrant or prior consent from the user or recipient.

Two major exceptions to the ECPA Provide employers with broad rights to monitor employees. An employer may monitor employee conversations if (1) they occur during the ordinary course of business, or (2) with the employee's implied consent. Under the "business exclusion exemption," an employer may monitor phone calls in an employer-supplied telephone system by attaching a device supplied by the employer. Under this provision, the courts examine whether a reasonable business justification exists for the monitoring, whether the employee was informed about the employer's right to monitor, and whether the employer acted consistently.

Workplace Conduct Rules & Regulations Certain workplace conduct rules and regulations that should be followed no matter the political climate or the area in which the work site is located. Most companies have a policy manual that spells out the rules and regulations expected of employees. The Golden Rule: of "do unto others as you would have them do unto you," can be used as a guide to acceptable behavior in the workplace.

Workplace Conduct Rules and Regulations: Other Basic Ones Stay Straight Employee Theft Follow the Chain Individual Rights No Smoking Rules Governing Romantic Relationships Misconduct Outside the Workplace