1 Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL (217)
2 Overview: Social Media What is it? Risks Presented Properly Regulating Employee Usage Employee Privacy Rights Regarding Personal Information What Can You Do?
3 Social Media Social media has been defined as the use of web-based and mobile technologies to turn communication into interactive dialogue. Examples include Facebook, Twitter, LinkedIn, MySpace, Skype, YouTube, Blogs, and Instant Messaging. Facebook: There are more than 500 million active users. 50% of active users log into Facebook on any day. The average user creates 90 pieces of content each month. Market value around $50 billion. 1
4 Benefits of Social Media to Employers Branding; Client development and service; Research; Recruiting; Improve employee engagement; Facilitate multi-office workplaces. Facebook has noted this trend and now provides a number of business-related applications such as document sharing, networking tools, and blog promotion.
5 Employer Issues/Hazards Created by Social Media Decreased productivity is an issue with any employee internet usage, but specific to social media, there are additional harms that may pose greater risks, such as: Sharing confidential information and trade secrets; Criticizing, disparaging, or harassing employers, co-workers, or clients; Posting embarrassing videos recorded in the workplace; Endorsing products or services without proper disclosure; Engaging in criminal conduct;
6 Employer Legal Liability Resulting from Misuse of Social Media Hostile Work Environment and Discrimination Claims Defamation Claims Improper Disclosure of Confidential or Other Protected Information Reporting Requirements for Child Pornography Federal Trade Commission (FTC) Guides
7 Hostile Work Environment and Discrimination Claims Social media provides employees additional ways to engage in inappropriate conduct. Employees may post discriminatory statements, racial slurs, or sexual innuendos directed at coworkers, management, customers, or vendors. A supervisor who post discriminatory statements regarding employees who are later terminated may subject the employer to an adverse employment action, and such a post could be used as evidence.
8 Defamation Claims Employee postings of rumors, gossip, and false statements about co-workers and supervisors may create unrest in the workplace. In addition, negative comments by management may create liability. For example, a supervisor at one company posts false and damaging comments about an employee leaving the company. If as a result of these comments the employee is not hired by a second company, the former employee may have a defamation cause against her former employer.
9 Improper Disclosure of Confidential or Other Protected Information Employees may inadvertently reveal proprietary or confidential information. Employees may also act deliberately, such as a disgruntled employee who reveals trade secrets or other proprietary information.
10 Reporting Requirements for Child Pornography Illinois and other states require mandatory reporting by information technology workers of child pornography found on computers they are servicing. Employers must take care to preserve evidence for legal authorities and not to destroy any equipment or files containing such evidence.
11 Federal Trade Commission (FTC) Guides Newly revised FTC Guides address the use of endorsements and testimonials in advertising, and employers may be liable when employees comment on employer services or products on social media if the employment relationship is not disclosed.
12 Ensuring that Employees Use Social Media Only as Desired Consider possible legal restraints on employer actions Consider privacy concerns; Need for a social media policy; Tips for developing an effective social media policy.
13 Difficulties in Disciplining Employees for Using Social Media There are legal restraints on preventing or limiting employees: Be cautious that social media policy is not overly broad and clearly defines the prohibited activity in order to avoid interfering with protected activity. Labor Law The National Labor Relations Act applies to all employers. Employers have rights to concerted activity and therefore they can get together to discuss workplace activity related to their interests as employees. This includes the right to discuss with co-workers and outsiders the terms and conditions of their employment and to even criticize employers.
14 Difficulties in Disciplining Employees for Using Social Media Employees may be protected by federal and state whistleblower laws when complaining about company conditions that affect public health and safety and when reporting potential securities fraud violation; Many states do not allow employers to influence an employee s political activities or regulate employee political activities and affiliations; Some states protect an employee or applicant s legal off-duty activities with lawful conduct laws; In hiring, disciplining, and firing, an employer is prohibited from unlawfully discriminating against employees based on protected characteristics, such as race, age, sexual orientation, marital status, disability, and genetic information.
15 Privacy Concerns Tort Law Federal Wiretap and the ECPA State Law Illinois Eavesdropping Act Illinois Law on Monitoring Stored Communications Act
16 Tort Law Tort claims and invasion of privacy theories provide private sector employees with common law privacy rights. With regards to monitoring of electronic communications by employers, an applicable theory is intrusion upon the plaintiff s seclusion or solitude, which requires proof of: 1. An intentional intrusion, physical or otherwise, 2. Upon the plaintiff s solitude or seclusion or private affairs or concerns, 3. Which would be highly offensive to a reasonable person.
17 Tort Law Defense against such claims: Establishing that the employee did not have a reasonable expectation of privacy in the electronic communications. Courts are generally more inclined to rule in the employer s favor where the employee voluntarily uses an employer s network and/or computer and consented to be monitored or was advised of the employer s written electronic communications policy.
18 Federal Wiretap and the ECPA ECPA amended the Federal Wiretap Act The ECPA imposes criminal and civil penalties against any person who intentionally intercepts an electronic communication with certain specific exceptions, including an ordinary course of business exception. The Stored Communications Act, which is part of the ECPA, covers stored electronic communications. Federal Court in New Jersey upheld a verdict against managers at a restaurant who intentionally and without authorization accessed a private, invitation-only chat group on MySpace in violation of the federal SCA.
19 Illinois State Law Eavesdropping Act A person commits eavesdropping when he: (1) Knowingly and intentionally uses an eavesdropping devise for the purpose of hearing or recording all or any part of any conversation or intercepts, retains, or transcribes electronic communication unless he does so (A) with the consent of all of the parties to such conversation or electronic communication. 720 ILCS 5/14-2(a).
20 Stored Communications Act [A] person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service. 18 U.S.C.A Courts have made clear that this Act applies to social media service providers. If an employee does not consent or can argue that the employer was coercive in gaining access to one s social media information, an employer may not be authorized to access such information.
21 The Need for a Social Media Policy To prevent the loss of productivity; To permit effective monitoring (compliance with laws); To protect the reputation and image of your company; To protect against the loss of confidential information and trade secrets; To protect against discrimination, harassment, and cyber-bullying; To guard against suits for invasion of privacy, defamation, improper recruiting and improper discipline and termination;
22 Supreme Court Guidance Provided in Quon v. City of Ontario To guard against suits for invasion of privacy employers should: Have clear and understandable technology use policies that explicitly define the types of technology they are intended to cover and explain that employees have limited expectations of privacy in the workplace. Employers must have a legitimate business interest for searching and employee s personal communications or transactions.
23 Tips for Developing an Effective Social Media Policy Should be clear and organization specific depending on the organization s culture and approach to social technologies, and the nature of the work performed by its employees. Should be consistent with the organization s polices and procedures, such as: Anti-discrimination Anti-harassment Computer, Internet, Systems Employee Privacy Confidentiality and Trade Secrets References
24 Tips for Developing an Effective Social Media Policy Inform employees of potential risk and make them aware of the employer s expectations. Warn employees that the employer will not tolerate will and will subject the individual to discipline for postings regarding: Proprietary and confidential company information; Discriminatory statements or sexual innuendos regarding co-workers, management, customers or venders; And defamatory statements regarding the company, its employees, customers, competitors, or vendors.
25 Tips for Developing an Effective Social Media Policy Make clear that mentions of the company must include a disclaimer noting that any opinions expressed are the employee s own and do not represent those of the company. It should be made clear that these restrictions apply to social media usage at any time, on any computer.
26 Make Expectations Clear The First Amendment does not protect an employee from being monitored, disciplined or terminated for violating a clear and reasonable social medial policy. Courts have often considered whether an employer has an electronic communications policy to determine whether an employee had a reasonable expectation of privacy. By making clear what is considered acceptable use and reducing the level of privacy that employees expect in their work computer systems, , and internet usage, this will insulate employers from liability, reduce the employees expectation of privacy, and give the employer more discretion to act when employees engage in misconduct. In addition to what an employee may not do as listed above, make clear what the employer considers acceptable use (i.e., business use only, limited personal use, or unlimited personal use).
27 Make Expectations Clear Should make clear that employees may not: Post proprietary and confidential company information; Post discriminatory statements or sexual innuendos regarding coworkers, management, customers, or vendors; Post defamatory statements regarding the company, its employees, customers, competitors, or vendors; Claim or imply authorization to speak as an organization representative; Make use of the organization s name in their online identity; Make use of the organization s intellectual property, logos, trademarks, and copyrights in any manner; Make use of restricted language such as profanity, inappropriate speech; Use social media unless, use is acceptable.
28 Additional Considerations Address whether an employee can access social media at work. If it is allowed, address restrictions on access and usage at work. Reserve the right to remove content without notice. Remind employees about privacy settings. Make clear that the company s policies apply to computers, systems, blackberry, telephone/voic systems and any of the data on these systems. Provide mandatory training.
29 Additional Considerations Reserve the right to take disciplinary action against an employee if they violate company policy. Designate a compliance officer and develop a compliance framework. Develop a reporting procedure. Let employees know they are expected to act professionally both on and off duty. Include a statement that the policy does not intend to interfere with rights granted under the NLRA Provide notice that monitoring will occur, which will further reduce an employee s expectation of privacy. Require that anything posted on a company social media page be approved by a compliance officer.
30 Hiring Decisions As long as employer does not violate state or federal discrimination laws, there are currently no prohibitions against employment decisions based on information placed in the public domain. However Employers should: Screen candidates in a uniform manner Receive written consent from job applicants Be cautious not to coerce access Use a neutral third party to filter protected information Have a legitimate, non-discriminatory reason for employment decisions based on information found on social media
31 Employee Privacy Rights Regarding Personal Information Background Checks Medical Information Genetic Information Employer s Obligation to Prevent Disclosure and Notification Monitoring
32 Background Checks Credit histories, criminal records, and similar records: Cannot screen applicants protected by state and federal discrimination laws. Conduct reasonable job inquiries without discriminating. Use of credit histories is conditional on consent of applicant and must only be used for hiring or promotion decisions. In Illinois, an employer may not refuse to hire an applicant with a criminal record unless the underlying facts are corroborated and they speak directly to performance criteria for the job applied for by the applicant.
33 Medical Information Illinois does not have a specific law addressing employer use of medical information. The ADA however is both an antidiscrimination statute and a medical privacy law. The ADA places very strict limitations on the use of information obtained from medical examination and inquiries. All information obtained must be collected and maintained on separate forms, in separate medical files separate from personnel files, and must be treated as a confidential medical record.
34 Medical Information Exceptions: Supervisors and managers may be informed about necessary restrictions on the work or duties of an employee and necessary accommodations; first aid and safety personnel may be informed, when appropriate, if the disability might require emergency treatment or if any specific procedures are needed in the case of fire or other evacuations; government officials investigating compliance with the ADA and other federal and state laws prohibiting discrimination on the basis of disability or handicap should be provided relevant information on request; relevant information may be provided to state workers compensation offices or second injury funds, in accordance with state workers compensation laws; and relevant information may be provided to insurance companies where the company requires a medical examination to provide health or life insurance for employees.
35 Genetic Information - Illinois Illinois law protects genetic testing information. Genetic testing and information derived from genetic testing is confidential and privileged and may be released only to the individual tested and to persons specifically authorized. 410 ILCS 513/15 No person to whom the results of a test have been disclosed may disclose test results to another person except as authorized by Section ILCS 513/35 Section 25 details the use of genetic testing information by employers. It states that [a]n employer... shall treat genetic information in such a manner that is consistent with the requirements of federal law.
36 Genetic Information - Federal The Federal Genetic Information Nondiscrimination Act protects genetic testing information. Employers may not request, require, or purchase genetic information of an individual or family member of the individual. 29 C.F.R (a). Where a request includes conducting an Internet search on an individual in a way that is likely to result in... obtaining genetic information. 29 C.F.R (a).
37 Employer s Obligation to Prevent Disclosure and Notification Personal Information Protection Act Any data collector that owns or licenses personal information concerning an Illinois resident shall notify the resident at no charge that there has been a breach of the security of the system data following discovery or notification of the breach. 815 ILCS 530/10(a). An employer may be considered a data collector. However, Cooney v. Chicago Public Schools held that the PIPA does not create a duty to protect information of former employees. Unlike other states, Illinois does not have a data protection statute. Federal laws do exist that establish a duty to protect specific types of information as well.
38 Monitoring Issues The Electronic Communications Privacy Act of 1986 governs the privacy of oral, wire, and electronic communications for private and public entities. A violation of the act occurs when there is intentional or willful interception, accession, disclosure, or use of another s wire, oral, or electronic communication that affects interstate or foreign commerce. One exception to the act is to obtain its employee s consent to the interception, access, or disclosure of the electronic communication. Illinois requires the mutual consent of employees and employers in order to monitor communications.
39 Summary It is critical for your business to have a detailed electronic communications policy to enable your company to take advantage of the power of social media while protecting its goodwill and not infringing on privacy rights granted to employees.
Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
March 2, 2010 The New World of Social Media: Business and Legal Risks Call-In Details: United States/Canada: 1-800-214-0694 All other countries: 1-719-955-1425 Participant Passcode: 165381 www.marsh.com
Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor firstname.lastname@example.org I. USE OF INFORMATION DURING HIRING PROCESS
Managing Social Media Employment Issues October 1, 2013 Katie Carder McCoy 206.447.2880 email@example.com Presentation Outline: What is social media and who cares? Risks of employer-sponsored social media,
Social Media: Risks and Rewards Nilesh (Neal) Patel Member Frost Brown Todd LLC 3300 Great American Tower Cincinnati, OH 45202 513.369.4805 firstname.lastname@example.org Linkedin.com/in/nealpatel1/ 2013 Frost Brown
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 email@example.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Legal Aspects of Social Networking and Online Media Platforms Lisa M. Hix September 21, 2010 2008 Venable LLP 1 2 Tools of the Trade (i.e. Facebook, LinkedIn, Twitter, MySpace, Friendster, Skype, YouTube,
USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant Employee Misuse of Social Media Employees Misuse Social Media By: Disclosing
New Jersey League of Municipalities SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE Presented by: BRIAN W. KRONICK, ESQ. Genova, Burns & Giantomasi (973) 533-0777 November
Do You Want to Be My Friend? Pros, Cons and Traps of Facebook and Other Social Media in the Life Cycle of the Employment Relationship By Ron Schneider Lori Dwyer Kai McGintee Bernstein Shur Labor & Employment
section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Social Media Survival Guide: Hiring and Firing in the Era of Social Media Denise M. Visconti firstname.lastname@example.org Adam Rosenthal email@example.com Littler Mendelson, P.C. 501 W. Broadway Suite 900
Social Media in the Workplace Stacey L. Smiricky Partner, Labor & Employment Group Lessons Learned Employee who called in sick later places a status update on his Facebook page announcing sick day at Wrigley
APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors
Hagan Barrett & Langley PLLC OUR FIRM Whether they are already at the top of their industry, company, or organization, or have strong aspirations to achieve a higher level of success, our clients are all
Social Networking Issues in the Workplace Presented By: David Flotten, JD, SPHR HR Consultant/Benefits Technical Advisor Disclaimers Technology is moving faster than the legal system can keep pace. Accordingly,
6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones
Pitfalls of Social Media in the Workplace Presented by Michael C. Terrell Taft Stettinius & Hollister LLP 1 Overview of Social Media Popular Sites: Facebook Twitter LinkedIn Pinterest Google Tumblr Instagram
SUMMIT LAW GROUP a professional limited liability company Legal Ramifications of the Social Media Explosion: An Employer s Guide 30 th Annual Labor Relations Institute April 28-30, 2010 Kristin D. Anger
CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013 I. PURPOSE The department endorses the secure use of social media to enhance communication, collaboration, and information
HR Liabilities of The Digital Age ABC Webinar September 29, 2010 Social Media is Pervasive Facebook 500+ million users Blogs 200 million bloggers Twitter 75 million users LinkedIn 50 million users Results
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
EMPLOYMENT LAW The Internet affects the relationships between employers and employees. E-mail communication has become commonplace as a fast and easy method of communication between employees, clients,
Social Networking, Privacy, and Employee Speech in the Workplace PRESENTED BY Pam Salgado (206) 521-6406 Pam.Salgado@Bullivant.com Katherine Somervell (503) 499-4454 Katherine.Somervell@Bullivant.com Brian
Employment Law Issues in Social Media John Nadolenco Partner, Los Angeles Andrew Rosenman Partner, Chicago (213) 229-5173 (312) 701-8744 firstname.lastname@example.org email@example.com Mayer Brown is
COMPUTER, INTERNET USE AND SOCIAL MEDIA POLICY Rationale Employees have access to e-mail and internet accounts in order to meet the First Nation Land Management Resource Centre s ( Resource Centre ) business
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Social Media Policy Version 1.0 Date Approved by Board 27 March 2014 Date of previous approval - Social Media Policy Page 1 of 7 Contents Page 1. Introduction 3 2. Purpose of the Policy 3 3. Scope of Policy
Social Networking Risks and Rewards Presented By: Amber Richard, Director of Interactive Marketing, YMCA of the Greater Twin Cities Natalie Lenz, Human Resources Generalist, YMCA, of the Greater Twin Cities
Study Guide Personnel Business Grammar & Ethics IV: Harassment & Composition May 2014 June 2014 National Association of Elevator Contractors Contents About this Study Guide... 1 Statements from EEOC Related
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com
Social Media in the Workplace Employer Best Practices Presented by: Michelle Perris, HR Consultant Robin Niel, Senior HR Consultant firstname.lastname@example.org www.jwterrill.com Social Media in the Workplace
Social Media An Employment Nightmare Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C. Show of hands: Who uses social media to screen job applicants?
Email Policy 1 Introduction 1.1 This Email Policy has been developed in response to the acknowledged need for guidelines describing the acceptable use of the University s email and related services and
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
In the GE Community Fair Employment Practices (Policy 20.2) Issued: October 2000 Supersedes: April 1993 GE is committed to fair employment practices, including the prohibition against all forms of illegal
POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims
CODE OF BUSINESS CONDUCT AND ETHICS -- A Statement of Company Policy for All Employees -- CONDUCTING BUSINESS WITH INTEGRITY, HONESTY AND ACCOUNTABILITY SKYWORKS WILL NOT RETALIATE AGAINST, NOR WILL IT
Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Horrible Bosses and the Workplace Bully Hostile Work Environment? There is a difference between a hostile work environment and a work environment that s hostile A hostile environment at work does not generally
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
How Employees Online Activities Can Hurt Employers Allison Brecher Senior Litigation Counsel and Director of Information Management & Strategy Marsh & McLennan Companies New Risks - The Technology Iceberg
SEXUAL HARASSMENT POLICY STATEMENT The company is committed to providing a workplace that is free from all forms of discrimination, including sexual harassment. Any employee's behavior that fits the definition
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
EMPLOYEE MONITORING AND SURVEILLANCE (WASHINGTON) Employers are increasingly monitoring and conducting surveillance activities on their employees in order to protect the organization s business interests
SOCIAL MEDIA POLICY TITLE: ADOPTED BY: RESPONSIBILITY: SOCIAL MEDIA POLICY COUNCIL CHIEF EXECUTIVE OFFICER NEXT REVIEW DATE: 29/07/2015 Version Decision Number Adoption Date History 1 DRAFT 2 3 4 2 P a
Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Communications & Marketing Policy 12-745 Approved by: System Management Team Origination Date: 08/2009 Revised Date:
Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Dublin City School District Network and Internet Access Agreement for Students Property Page 1 of 7 Any student age 18 and older is to read this form (). Page 5 of this form should then be completed and
WHISTLEBLOWING AND CONDUCTING INVESTIGATIONS Eileen P. Kennedy Berliner Cohen 1 Topics I. New Laws Protecting Whistleblowers. II. III. IV. Other Anti-Retaliation and Whistleblower Protections. Discipline
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
MINNETONKA PUBLIC SCHOOLS Policy #470: Employee Use of Social Media I. PURPOSE As a national leader in using technology as an accelerator of learning, the Minnetonka School District recognizes the value
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
Title: Policy Type: Department: Policy Number: Public Display With Social Media Corporate Human Resources FH-HR.004 Origin Date: 01/01/2010 Date Revised: 4/01/13 Supercedes: Entities Impacted: Purpose:
Human Resources Page 1 of 10 TOPIC: TITLE: APPLICATION: OBJECTIVE: Employment General Social Media Policy All employees of Holland America Line and Seabourn are covered by this policy. In general, Holland
Our Vendor Code of Conduct Jones Lang LaSalle and LaSalle Investment Management Vendor Code of Conduct Copyright Jones Lang LaSalle IP, Inc. Ethics Everywhere Where we stand Jones Lang LaSalle stands for
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
Social Networking: Unique Legal Challenges for Independent Schools Caryn Pass and Grace Lee, Presenters 1 social networking overview new evolving area protection of all constituencies students, faculty,
SOCIAL MEDIA In the Public Workplace POLICIES AND PERILS Thomas G. Schroeter Associate General Counsel Port of Houston Authority Disclaimers My presentation and the opinions expressed in this PowerPoint
Sexual harassment interferes with a productive working environment, interjects irrelevant considerations into personnel decisions and generally demeans employees who are victims of harassment. Moreover,
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
NEW EMPLOYEE ORIENTATION EQUAL EMPLOYMENT OPPORTUNITY & WORKPLACE HARASSMENT PRESENTED BY THE OFFICE OF FAIR PRACTICES FAIRPRACTICES@MDCOURTS.GOV Objectives By the end of this training, you will be able
Appropriate Boundaries in the World of Social Networking SAIS annual conference 2011 caryn pass and heather broadwater 1 Social networking evolving area protection of all constituencies students, faculty,
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Supplier Code of Conduct November 15, 2015 1 Table of Contents Introduction Pg. 3 Standards of Conduct Pg. 3 Employment Practices and Workplace Conduct Pg. 4 Conflicts of Interest Pg. 5 Business Continuity
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
MUTUAL INSURANCE EMPLOYEE HANDBOOK A. Introduction to Handbook We would like to welcome you as an employee to Mutual Insurance Company. The purpose of this Handbook is to explain the current policies and
EMPLOYEE MONITORING AND SURVEILLANCE (IDAHO) Employers are increasingly monitoring and conducting surveillance activities on their employees in order to protect the organization s business interests and