1 R U My Cookies? Sexual Harassment In The Age Of Technology
2 R U MY COOKIES? SEXUAL HARASSMENT IN THE AGE OF TECHNOLOGY MODERATOR: Mercedes Colwin, Esq. - Managing Partner - New York Office, Gordon & Rees LLP PANELISTS: Adeola Adele - Senior Vice President, EPL Product Leader, Marsh, Inc. Sarah K. Goldstein, Esq. - Director of Employment Practices, Los Angeles Office, Kaufman Dolowich & Voluck LLP Edward R. Quinn, Jr. - Chief Executive Officer, Rockville Quinn Management Martin Schnabel - Associate Vice President, Freedom Specialty Insurance Company
3 Workplace Surveillance
4 Litigation Today: The Cyber World and Employment Claims Collide Road Map: The What and How of Information Available to Employers in Today s Cyber World Employers Potential Liability: What is Legal and What is Not Litigation: Ethics and E-Discovery Insurance Coverage for Social Media Claims How Today s Employer Can Avoid Litigation
5 Information Employers Can Discover Employers Themselves Can Obtain Social Intelligence On Employees and Prospective Employees Facebook A Look Into Prospective Employee s Social Life; Facebook Groups, i.e., racist remarks; LinkedIn Employment History Google Information From Past 7 Years Craigslist Sordid Listings, i.e, oxycontin case. Instagram Naked photo sharing Tumblr, user groups, e-commerce sites, bulletin boards Blogs; comments on postings. Twitter Online comments and locations Vine Posts 6 second videos
6 How Employers Can Discover Cyber Information Employers Can Use an Investigator to Obtain Information Investigator s Use of Spyware Software based Domestic vs. Commercial Spyware» i.e., investigation of internet footprint; tracing Hardware based Actual devices placed on computer» i.e., Flash drives pull deleted data, search chat logs, obtain s, texts and internet browsing history
7 How Employers Can Discover Cyber Information Types of Spyware Used by Investigators Internet URL loggers track websites Screen recorders Take snapshot images of screen and store or transmit them Chat loggers and recorders make text copy of all incoming and outgoing chat and sessions Key loggers record key strokes Password recorders track typed passwords
8 Obtaining Cyber Information: What is Legal and What is Illegal Can you spy on your employees?? Employer Phones Generally, yes Personal Phones Generally, no Employer Computers Generally, yes Personal Accounts Depends on whether use is at work and on employer s equipment Wifi-Warnings to employees
9 Social Media: What is Legal and What is Illegal Types of Social Media Claims: Invasion of Privacy Harassment Discrimination Libel Retaliation
10 Social Media Legislation
11 Social Media: What is Legal and What is Illegal Invasion of Privacy California Law made it illegal for employers to request that employees or applicants disclose social media log in information, access or content Reasonable Belief exception to investigations Maryland Law made it illegal to ask current and prospective employees for their user names and passwords to social media websites States introduced legislation 2013 Thus far, 7 States enacted legislation
12 Social Media: What is Legal and What is Illegal Invasion of Privacy Continued: New York currently has pending legislation that would: Prohibit an employer from requesting that an employee or applicant disclose any means for accessing an electronic personal account or service Protect the privacy of social media accounts Prohibit an employer from requesting or requiring that an employee or applicant disclose any user name, password, or other means for accessing a personal account or service through specified electronic communications devices
13 Social Media: What is Legal and What is Illegal Invasion of Privacy Continued: New Jersey currently has legislation that : Prohibits requirement to disclose user name, password, or other means for accessing account or service through electronic communications device by employers. Prohibits requirement to provide information for access to account on social networking website by employer. Prohibits requirement to disclose user name, password, or other means for accessing account or service through electronic communications device by employers.
14 Social Media: What is Legal and What is Illegal Harassment A message posted on an employee s Facebook page or tweeted by an employee has the potential to create a harassment claim Employers should treat all conduct similarly, whether it be person to person or through some digital medium
15 Social Media: What is Legal and What is Illegal Libel Employees can vent about their co-workers, supervisors, and employers. Employers must protect their companies and their managers reputations from being damaged by inappropriate postings. Employers must ensure that their corporate officers and managers do not post material that could create a claim against them.
16 Social Media: What is Legal and What is Illegal Retaliation Employer Social Media Postings Can Result in Retaliation Claims by Employees i.e., president of a chain of bar and restaurants blogged and posted on Facebook calling an employee a "b**ch" and asking for the strength to not kill another employee after a wage and employment lawsuit was filed. Court allowed employee to amend her FLSA claim to add a claim for retaliation. i.e., employee tweeted her displeasure at off color jokes and was subsequently terminated.
17 Social Media: What is Legal and What is Illegal Why is social media dangerous for employers?? Encourages social interaction in casual sphere between supervisors and subordinates.
18 Facebook and Your Supervisor
19 Social Media: What is Legal and What is Illegal Recent Court Decisions Vance v. Ball State University The Supreme Court held that an individual or employee is deemed a supervisor only when the employer has empowered that employee to take tangible employment actions against the victim, i.e., to effect a significant change in employment status, such as hiring, firing, failing to promote, reassignment with significantly different responsibilities, or a decision causing a significant change in benefits Cherry v. Shaw Coastal, Inc. Employer vicariously liable for harassment by supervisor consisting of sexually explicit text messages sent to plaintiff s personal cell phone
20 Social Media: What is Legal and What is Illegal Recent Court Decisions continued Hollis v. Town of Mt. Vernon Employer s motion for summary judgment denied with regard to sexual harassment claim arising out of sexually charged texts and s Court noted that coworker sent plaintiff text messages and s to her personal cell phone and account, while she was on duty, thereby finding sufficient grounds to warrant the conclusion that the texts and s affected the terms and conditions of plaintiff s employment Garvin v. Sioxland Mental Health Services Court was unfazed by the fact that some of the alleged sexually harassing communications at issue occurred over media that were not used for work purposes (i.e., Facebook), or the fact that some of the communications did not occur during business hours
21 Litigating in Today s Cyber World Ethical Considerations Hostile use of friend request puts New Jersey lawyers in ethics trouble San Diego County Bar prohibits misleading a party into online friendships Private Facebook pages are generally off limits
22 Litigating in Today s Cyber World Electronic Discovery Parameters: NYSBA allows a lawyer who represents a client and who has access to social media used by another party to access and review that party s social media for potential impeachment material Lawyers can not communicate with represented parties through social media without consent of the other lawyer or by court order
23 Litigating in Today s Cyber World Electronic Discovery Tips: Instruct client to enhance privacy settings Conduct internet searches on principal target, key witnesses, expert witnesses, your client Refrain from negative blogs about Judges that may preside over your case Circumvent court-imposed restrictions on voir dire through social media and internet databases
24 Employment Practices Liability Insurance and Social Media Most EPLI Policies require that an alleged wrongful employment act to occur within the insured s capacity as such Questions may arise as to whether the employee was acting is his or her capacity as an insured employee Was the conduct within the course and scope of employment The answer is often very fact specific Coverage Some insurers have attempted to exclude coverage Some have attempted to impose a sublimit EPL Claims arising from the use of social media should be evaluated for coverage in the same manner as other EPL claims
25 Cyber Liability: Insurance Coverage How Employers Can Protect Themselves: General Liability Policy Typically Does not Cover Social Media Claims Professional, Communications, Data Privacy & Media Liability policies, in many forms, are available as endorsements or stand alone products and will compliment your enterprise wide risk management program
26 Risk Management: How to Avoid Social Media Claims Employers Options: Monitor employees computer and internet usage to extent permitted by law Electronic Communications Privacy Act of 1986 Consent Forms Key logging programs Recording Conversations Audio and Video Unilateral Consent in New York Employer Policies Internet usage and access Social Media Training
Current Trends in Litigation Involving the Use of Social Media John B. Kearney Partner and Head, New Jersey Litigation Group Ballard Spahr LLP 1 Introduction Social media now affect all phases of litigation
FORMAL OPINION 2014-300 ETHICAL OBLIGATIONS FOR ATTORNEYS USING SOCIAL MEDIA I. Introduction and Summary Social media or social networking websites permit users to join online communities where they can
REED COLLEGE ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS TABLE OF CONTENTS A. INTRODUCTION... 1 B. THE LANDSCAPE OF ELECTRONIC RECORDS SYSTEMS... 1 1. Email Infrastructure...
Bringing Your Acceptable Use Policy Up to 2013 Standards Bringing Your Acceptable Use Policy Up to 2013 Standards Organizations of all sizes rely on their employees to be good stewards of company time,
Workplace Internet and E-mail Workplace Internet and E-mail Workplace e-mail and Internet use: employees and employers beware An employee s personal use of an employer s e-mail system and of Internet access
8 Pro Te: Solutio Social Media and Discovery Considerations: A NEW FRONTIER or the Same Issues in New Packaging? Facebook, smart phones, computer searches, twitter, texting sometimes it feels like social
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
INFORMATION TECHNOLOGY User Standards and Guidelines Manual May 2010 Division of Information Technology http://www.palmbeachschools.org/it/security.asp Table of Contents 1. Introduction... 4 2. Definitions...
Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract
responsibility CODE OF CONDUCT Our reputation and integrity depend upon each of us assuming a personal responsibility for our business conduct. 02 Letter from Our CEO Dear ConocoPhillips Employees, Our
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
Five Rules for Discovery of Electronically Stored Information Eastern North Carolina Inn of Court Spring Meeting New Bern, NC May 17, 2012 M ARK SCRUGGS C LAIMS COUNSEL L AWYERS MUTUAL 5020 Weston Parkway,
THE USE OF TECHNOLOGY IN WALDORF SCHOOLS 2013 SURVEY RESULTS COLLECTED AND COMPILED BY SAM GLAZE AWSNA SURVEY ON TECHNOLOGY IN WALDORF SCHOOLS FINAL REPORT JUNE 2013 The Office of Outreach and Development
SOCIAL MEDIA What Every Litigator Needs to Know Social media content can make or break a case and should be carefully considered at every stage of litigation. As with other emerging technologies, jurisprudence
PREAMBLE NATIONAL BOARD FOR CERTIFIED COUNSELORS (NBCC) CODE OF ETHICS The National Board for Certified Counselors (NBCC) provides national certifications that recognize individuals who have voluntarily
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
HIPAA Security Risk Analysis Toolkit In January of 2013, the Department of Health and Human Services Office for Civil Rights (OCR) released a final rule implementing a wide range of HIPAA privacy and security
Best Practices for Online Service Providers June 2008 eff.org Table of Contents Introduction...1 1. Are you an OSP?... 1 2. How OSPs Can Develop Sane Network Policies to Protect Themselves From Legal Liability
Preventing Violence and Harassment at the Workplace VAH001 Violence and Harassment 1 Table of Contents Introduction... 4 Personal versus sexual harassment... 5 Recognizing the problem of workplace violence
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
Acquiring, Preserving and Authenticating Social Media Evidence Old Dominion Bar Assn., May 30, 2015 Presenters: Sharon D. Nelson, Esq. and John W. Simek President and Vice President, Sensei Enterprises,
EDISCOVERY: A COMPREHENSIVE VIEW AND SOCIAL MEDIA IMPACT JOSEPH J. BAMBARA IN HOUSE COUNSEL UCNY,INC. NEW YORK, NEW YORK EMAIL: JBAMBARA@UCNY.COM WEB: HTTP://WWW.UCNY.COM TWITTER: HTTP://WWW.TWITTER.COM/JBESQUIRE7
Digital Discovery & e-evidence Reproduced with permission from Digital Discovery & e-evidence, 15 DDEE 134, 04/02/2015. Copyright 2015 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com