Social Media Policy Dos and Don ts: Employees, Networking Sites and the Law
|
|
- Marshall Atkinson
- 8 years ago
- Views:
Transcription
1 Social Media Policy Dos and Don ts: Employees, Networking Sites and the Law FEATURED FACULTY: Amy Melican, Labor & Employment Law Department, Proskauer Nausheen Rokerya, Labor & Employment Law Department, Proskauer
2 Speaker Info Amy Melican, Labor & Employment Law Department, Proskauer Amy F. Melican is an Associate in the Labor & Employment Law Department and a member of the Employment Litigation & Arbitration and Employment Law Counseling & Training Groups. Amy s practice concentrates on employment litigation in state and federal courts and before administrative agencies and arbitration panels. In addition to litigation, she conducts internal investigations and trainings for clients. Amy regularly counsels clients, providing advice to employers on issues involving personnel policies, hiring, terminations, discipline, disability accommodations, leaves of absences and wage and hour laws. Before joining Proskauer, Amy was an Assistant Corporation Counsel for the City of New York. She has served as an adjunct professor at Cardozo Law School. Nausheen Rokerya, Labor & Employment Law Department, Proskauer Nausheen Rokerya is an Associate in the Labor & Employment Law Department and a member of the Class/Collective Action Group, as well as the Employment Law Counseling & Training Group. Her litigation experience includes singleplaintiff discrimination and retaliation lawsuits, as well as complex collective actions. Nausheen represents employers in a wide variety of employment-related disputes, including discrimination, harassment, and retaliation lawsuits brought in state and federal courts and administrative charges filed with the U.S. Equal Employment Opportunity Commission and analogous state agencies. In addition, she counsels employers in classification audits under federal and state wagehour laws, and represents employers in the defense of actions alleging misclassification and overtime, regular rate, and record-keeping violations. In 2008, Nausheen won the award for Best Brief at the Wechsler School of Law's First Amendment Moot Court Competition, and advanced to the semi-finals as one of the competition's top oralists. In 2009, her student note on U.S. caffeine regulation was selected for publication in The Brooklyn Law Review. In 2010, she was invited to join The Order of Barristers, a national honorary organization that encourages oral advocacy and brief writing skills through effective law school oral advocacy programs. Nausheen is a member of the Proskauer Newark Diversity Committee.
3 **Certificates of attendance and CEUs, when available, must be requested through the online evaluation.** Evaluation for Live Event: We d like to hear what you thought about the audio conference. Please take a moment to fill in the survey located here: Requests for continuing education credits and certificates of attendance must be submitted within 10 days of the live event. Evaluation for CD Recording: Please use the following link to submit your evaluation of the recorded event: Please note: All links are case sensitive HRCI - Receive 1.25 recertification credit hours toward PHR and SPHR recertification through the Human Resource Certification Institute (HRCI). For more information about certification or recertification, please visit the HRCI homepage at "The use of this seal is not an endorsement by the HR Certification Institute of the quality of the program. It means that this program has met the HR Certification Institute s criteria to be pre-approved for recertification credit."
4 Social Media Policy Dos and Don ts: Employees, Networking Sites and the Law Amy Melican Proskauer Rose LLP Nausheen Rokerya Proskauer Rose LLP 1 Overview Social Media Issues at Work Policies - /Internet Monitoring - Social Media/Internet Activity - Company-Owned Property - Social Media as a Recruiting Tool Best Practices for Implementing Social Media Policies 2 1
5 Social Media Benefits vs. Risks Benefits - Cost Effective Marketing - Efficient Recruiting Tool Risks - On-Line Identity Management - Decreased Productivity - Dissemination of Confidential Information (trade secret, proprietary information, securities law violations) - Damage to Company Property (viruses, clogging system) 3 Proliferation of Social Media Technologies Social Networking Sites - Facebook, MySpace Business Networking Sites - LinkedIn, Plaxo Online media - YouTube Blogs - PerezHilton, Gizmodo Social News Sites - Digg, Mixx Twitter 4 2
6 Did You Know? 22% of employees visit social networking sites 5 or more times per week; 23% visit social networking sites 1-4 times per week - Source: Deloitte Survey, available at, (July 2009) 85.6% of employees use office for personal reasons - Source: Survey by NFO Worldwide (May 2007) 27% of employees surveyed said they don t consider the ethical consequences of posting comments, photos, or videos online - Source: Deloitte Survey, available at, (July 2009) 64% of employees have received politically incorrect or offensive s at work - Source: Business Week 5 Did You Know? (cont d.) 38% of companies said they employ staff to read or otherwise analyze the content of outgoing - Source: Ponemon Institute (2009) One out of 4 HR professionals said their organization uses networking sites to look up candidates before inviting them for an interview - Source: SHRM Poll, available at, (2009). Over 85% of employers said they would be at least somewhat less likely to hire a candidate if the candidate s social networking profile or tweets showed evidence of unprofessional behavior - Source: SHRM: Interviewing Dos and Don ts for Job Seekers (November 2009) 34% of respondents said their businesses had been affected by the exposure of sensitive or embarrassing information via the internet - Source: Ponemon Institute (2009) 6 3
7 Considerations When Deciding Which Social Media Policies to Implement Gather and Review the Company s Current Policies Consider Company s Needs - Nature of Business/Industry - Employee Access to Social Media During and After Work - Breadth of Limitations Desired - Reality of Usage Ensure Consistent Process for Monitoring and Enforcement 7 /Internet Monitoring Policies: Overview Reasons for /Internet Monitoring Policies - Prevent loss of intellectual property - Maintain productivity and dissuade personal use - Reduce clogging of company networks - Prevent and discourage sexual or other workplace harassment - Maintain the company s professional reputation and image Overcoming an Employee s Reasonable Expectation of Privacy - Password protection by employee - Placing items in personal folder 8 4
8 /Internet Monitoring Policies: Overview (cont d) Employers can implement policies that prohibit or limit personal use of company computers, monitor employees' computer use and to discipline i employees whose use violate company policy. Courts have found limits - Employee found to have a reasonable expectation of privacy in communications with her attorney conducted through a personal, passwordprotected, web-based account accessed on her company-owned laptop. See Stengart v. Loving Care Agency, Inc., 201 N.J. 300 (2010) - Employer installed monitoring software without notifying the employee. - Employer s policy found to be ambiguous on the subject of personal use. 9 /Internet Monitoring Policies: Policy Elements Clearly inform employees: - That they have no privacy rights when using company computers, and internet networks. - Employer has right to monitor, intercept, record and review all communications sent over company s /internet system. - and internet systems are the company s property. - and internet searches may not actually be deleted. - Violations of policy may result in disciplinary action up to and including termination. 10 5
9 Monitoring Policies: Policy Elements (cont d) The [or Communication] system is the property of Company. All communications and information transmitted by, received from, or stored in this system are company records and property of Company. Employees have no right of personal privacy in any matter stored in, created, received, or sent over the Company [or Communication] system. Company, in its discretion as owner of the [or Communication] system, reserves and may exercise the right to monitor, access, retrieve, and delete any matter stored in, created, received, or sent over the [or Communication] system, for any reason and without the permission of any employee, and without notice. Use of passwords or other security measures does not in any way diminish Company s right to access materials on its system, or create any privacy right by an employee in the messages and files on the system. Employees should be aware that deletion of any [and/or Voice mail] messages or files may not truly eliminate the messages from the system. 11 Monitoring Policies: Additional Considerations Be sure to review all applicable laws and rules that may be implicated by your company s operations/policy. - If your company operates internationally, verify that you are in compliance with privacy requirements overseas, as they may be more stringent. - Federal courts are split on the protections provided by the Electronic Communications Privacy Act prohibits an employer s search for s already on their internal systems. An employer that monitors and/or internet use may have an affirmative obligation to monitor for and curtail illegal online conduct. 12 6
10 Social Media/Internet Activity: Developing Area of the Law While social media and internet law continues to develop, recent decisions have illustrated tension between competing concerns. - Legal prohibitions against discrimination and harassment/hostile work environment - Potential for vicarious liability for defamation and copyright infringement by employees - Legitimate business interest in preserving company s reputation vs. - Employee privacy rights - Protection of employees Section 7 rights under the National Labor Relations Act - Off duty conduct statutes 13 Social Media/Internet Activity: Potential Liability for Employee Comments Employers may face liability for discrimination and/or harassment occurring as a result of employee postings on social media sites - Complaint alleged that employer created a racially hostile work environment by allowing white police officers to operate a racist web site while on- and off-duty. Guardian Civic League v. Philadelphia Police Dept., No. 09 Civ (E.D. Pa. filed July 15, 2009) - Pilot filed a hostile-work-environment claim against her employer based upon comments posted by her co-workers on a pilots' electronic bulletin board operated by a third-party service provider. Court found the bulletin board amounted to a workplace related setting. Blakely v. Continental Airlines, Civ. No (WGB), 1997 U.S. Dist. LEXIS (D.N.J. March 24, 1997) 14 7
11 Social Media/Internet Activity Policies: Potential Liability for Employee Comments Employers may face liability for defamation as a result of employee postings on social media sites - Employer may be liable if the employee had apparent authority from the company to speak on its behalf (e.g., under theories of ratification, respondeat superior, negligent supervision/retention) 15 Social Media/Internet Activity Policies: Limiting Potential Liability for Harassment & Discrimination Ensure that company s non-discrimination and anti-harassment policies are broad enough to cover social media postings that may be found to be work-related -... Employer s equal employment opportunity policy and its policies against sexual or other harassment apply fully to the use of the Internet, including blogging or posting of comments. Promptly and thoroughly investigate alleged violations of the company s non-discrimination and anti-harassment policies and take disciplinary action where appropriate. 16 8
12 Social Networking as Protected Activity Anti-Retaliation provision of federal and state statutes may protect employees who complain on blogs - Title VII s opposition clause protects informal protests of discriminatory employment practices - The Sarbanes-Oxley Act of 2002 protects an employee of a publicly traded company who reports employer conduct that the employee believes violates federal securities law 17 Social Networking as Protected Activity Under the NLRA The National Labor Relations Act ( NLRA ) - Protects concerted activities for the purpose of collective bargaining or other mutual aid or protection.... (Section 7); - Employers cannot interfere with, restrain or coerce employees in the exercise of the rights guaranteed in [S]ection 7 (Section 8(a)(1)) Note: Union or union-related activity is not required. These protections apply whether or not the employee is represented by a union. 18 9
13 Social Networking as Protected Activity Under the NLRA (cont d) For an employee s activity (including negative comments) to be protected, it must be concerted. Conduct that may appear to be individual action can, in fact, be concerted activity if the goal is to enlist the support of other employees and encourage them to engage in group action. It is generally unlawful to discipline employees for making negative comments about working conditions, including comments about supervisors. It is a violation of the NLRA to issue and maintain general policies that broadly restrict such discussions. 19 Social Networking as Protected Activity Under the NLRA (cont d) General policies that prohibit employees from engaging in negative conversations about management have been found to discourage or chill employees from engaging in protected activity. BUT, an individual s statements can lose protection if they go too far. - The NLRB has found that insulting, obscene personal attacks against supervisor are not protected concerted activity. Caterpillar Tractor Co., 276 NLRB 1323, 1326 (1985). - There is a very thin line between statements that will be considered protected and language age that is so profane and uncalled for that the speaker loses the protection of the Act. Tampa Tribune, 2007 NLRB LEXIS 527, **
14 Social Networking as Protected Activity Under the NLRA Current Legal Landscape Recently, the Board has filed several Unfair Labor Practice charges alleging social media policies impinge on employee rights. - In re American Medical Response of Connecticut, Inc.: NLRB required employer to revise its overly-broad rules to ensure employees are not improperly restricted in discussions regarding wages, hours, and other terms and conditions of employment. - Thomson Reuters: In April 2011, the NLRB s Manhattan Regional Director confirmed that it intends to file against the company for allegedly reprimanding an employee who had criticized management on Twitter. - Hispanics i United of Buffalo, Inc.: Complaint filed in May 2011 concerning termination of 5 non-union employees who used Facebook to complain about working conditions. Employer discharged the participants, claiming that their comments constituted harassment of an employee mentioned in the posting. 21 Social Networking as Protected Activity Under the NLRA Current Legal Landscape Board has applied the same test it has used when looking at the legality of other work rules. - Does the rule directly interfere with or restrain protected activity? - If not: - Was the rule enforced to interfere with or restrain protected activity? - Was the rule issued in response to protected activity? - Can the rule be reasonably read to interfere with or restrain protected activity? In connection with its analysis, the Board has considered: - Text of the rule/policy - Context - Past enforcement - Reasons rule/policy was adopted - Examples included in handbook or policy 22 11
15 Social Media Policies: Off-Duty Conduct Statutes May Provide Additional Protections State Specific: - California: Protects employees who engage in lawful conduct during non-working hours, away from employer s premises. (Cal. Lab Code 96(k), 98.6). - New York: Protects employees who, under certain circumstances, engage in political activities, legally use consumable products, and/or participate in recreational activities, outside of work hours. (N.Y. Lab. Law 201(d)(2)). But - New York: Employer may discharge an employee whose conduct creates a material conflict of interest related to trade secrets, proprietary information, or business interests. (N.Y. Lab. Law 201(d)(3)). 23 Social Media Policies: Best Practices When Drafting Policy Ensure that your policy s tone focuses on using good judgment and common sense. Consider prohibiting the use of social media during the workday and/or through company equipment. - Blogging not permitted on work time. All blogging and other Internet activity during work hours and/or using Employer equipment or connections is subject to the Employer s Internet and Computer Use Policies. Unless specifically authorized by a Employer official, blogging and other public Internet communications are not permitted during an employee s working time. Define social media broadly to include websites, like Facebook and Twitter, as well as blogging activity, texting, posting comments/videos, etc
16 Social Media/Internet Use Policy: Best Practices When Drafting Policy (cont d.) Include prefatory language indicating the policy s purpose. - [t]he intent t of this policy is not to restrict t the flow of useful and appropriate information, but to minimize the risk to the Company and its associates. NLRB Advice Memoranda: Sears Holdings (Roebucks), 12/10, No. 18-CA Establish requirements with respect to non-working time postings that do not interfere with employee protected activity. Inform employees they may be disciplined for social media commentary indicating an intent to engage in conduct that may compromise workplace safety or violate law. Instruct employees to always identify themselves and be honest in their posts about who they are and what they do. Prohibit the use of the company s logo or slogans. 25 Social Media/Internet Use Policy: Best Practices When Drafting Policy (cont d.) Clearly identify the information that the company considers confidential company information and inform employees that such information should not be disseminated. - Posting of certain protected information prohibited. Employees may not disclose trade secrets, confidential business or member information (e.g., business plans, strategies, customer information, etc.) or other proprietary information belonging to Employer to individuals outside Employer, including through blogs and other Internet postings. In addition, employees must not disclose certain Employer financial information in violation of securities laws or regulations
17 Social Media/Internet Use Policy: Best Practices When Drafting Policy (cont d.) Do NOT include a blanket prohibition on critical comments. - NLRB has found the following policy provisions to be too broad: - making disparaging, discriminatory or defamatory comments when discussing the Company or the employer s superiors, co-workers and/or competitors - depicting the company in any way over the internet without company permission Remember - Protected activity may include comments disparaging, criticizing, or critiquing an employer and/or supervisors if there is a nexus between the remarks and employee interests or working conditions, and the comments are not egregious in nature 27 Social Media/Internet Use Policy: Best Practices When Drafting Policy (cont d.) Let employees know they may be disciplined for social media commentary indicating an intention to engage in conduct that may compromise workplace safety or violate law. - See NLRB Advice Memoranda: U.S. NLRB, 5/5/2010, No. 22-CA et al. Employees should be aware that they may be disciplined for online conduct amounting to copyright infringement Posting of certain protected information prohibited Employees wishing to post blogs or other public Internet communications should be aware that copyright and trademark law may restrict the use and copying of material belonging to Employer and others. Employees may not violate the intellectual property or privacy rights of others Employees should be advised to use a disclaimer clearly stating that any comments posted are attributable to the employee Disclaimer required. Any reference to Employer or an employee of Employer publicly posted on the Internet must contain a disclaimer indicating that the thoughts and opinions expressed belong to the author and do not necessarily reflect those of Employer. Notify employees that prohibited conduct may trigger disciplinary consequences up to and including termination. Consistently enforce all policies, being sure to document any disciplinary action
18 Internet Use Policy: Sample Policy Language If you abuse your right to use the Internet you may be subject to disciplinary action, including possible termination, and civil and criminal liability. - Use Limited to Business Purposes- Use of the Internet has been provided for, and should be limited to, Company purposes. Use of the Internet through the Company s or personal computer systems for personal purposes is prohibited. Employees may not engage in random Internet use ( surfing the net, playing games, shopping, blogging or accessing or downloading entertainment software) during work time. - No Expectation of Privacy- Employees have no reasonable expectation of personal privacy with respect to Internet use through the Company s computer systems. The Company may monitor or review any and all aspects of its computer systems and all files, documents or other information contained or accessible through the computer systems for any reason and without the permission of any employee. - Other guidelines- Employees are reminded that they are personally responsible for material they post on a blog or website. In addition, employees wishing to maintain blogs or websites should be aware that they could be held responsible for content t posted by third parties, such as comments. Employees are encouraged to monitor and/or restrict such third party content on any websites or blogs they maintain. 29 Policy Coverage: Company-Owned Property Why have a policy that covers company-owned property? - The lines between home and work are blurred. - Company may be liable for unlawful activities conducted via property it owns, even if conducted outside of business hours. - Sexual harassment via text messages - Reserving the right of inspection of such property will enable a search
19 Ensuring Coverage of Company-Owned Property Policy Elements Clearly indicate that the equipment and electronic systems are the property of the company and there is no right of privacy with respect to any electronic communication sent using company systems. When dealing with company-owned laptops, consider conditioning access on acknowledgment of policy at start up screen. When conducting a review of data on company-owned property make sure: - There is a legitimate work-related purpose behind the search - The search is not excessive in scope 31 Social Media as a Hiring Tool Searching social media in connection with hiring is not prohibited However, there are several reasons employers should limit searches and/or adopt internal guidelines before using social media in connection with hiring 32 16
20 Social Media as a Hiring Tool: Potential Pitfalls Inconsistency in checking sites for applicants (i.e., checking for some applicants but not others) may leave employers vulnerable to claims of disparate treatment. Search may reveal information that employer would never request: - Race, sex, ethnicity or national origin - Religion, spiritual beliefs or lack thereof - Birth date or years of graduation, allowing estimation of age - Marital/parental status - Sexual orientation or gender identity - Medical information - Recreational activities, political leanings, etc 33 Social Media as a Hiring Tool: Potential Pitfalls (cont d) Questions about accuracy (outdated, intentionally inaccurate) Difficulty confirming that information relates to applicant Inability to legally consider the information - Discrimination claims (race, gender, national origin, disability, age) - Risk of retaliation claims - Genetic Information & Non-Disclosure Act ( GINA ) claims - Criminal conviction issues (vary by state) - Additional Protections under state law Increased potential for claims and extended litigation 34 17
21 Social Medical as a Hiring Tool: Best Practices Develop internal guidelines for information gathering. Disseminate guidelines to managers, supervisors, interviewers and hiring personnel. Ensure consistency if searches are to be conducted. Ensure decision-maker does not conduct the search. 35 Social Medical as a Hiring Tool: Best Practices (cont d) Ensure the individual conducting the search is knowledgeable about pertinent t laws and information that t may be protected. t Keep documentation (i.e., sites searched and information learned and considered). Cross-reference any information gleaned online with the candidate s submitted application materials. Do not attempt to gain access to non-public information. Consider seeking candidate s written consent, and ensure compliance with the FCRA if third party will search
22 Risk: Other Potential Forms of Social Media Misuse Employers may be liable for other not-so-obvious violations of the law related to social media usage, such as: - texting/ ing while driving - Publicly endorsing an employer s goods/services without disclosing the existence of the employment relationship 37 Potential Wage and Hour Violations More and more employees are checking work by Blackberry or have at-home access to log onto the company computer system to continue work - sometimes without authorization. In the case of non-exempt employees, this may lead to overtime obligations
23 Implementing Social Media Policies Best Practices EEO policies should apply to all electronic communications policies. When distributing policies, be sure to include employees, temps, contract employees, independent contractors, and others who regularly interact with the company. Obtain and retain signed acknowledgments for all policies. Issue periodic reminders. Consistently apply and enforce policies. Document violations and disciplinary actions. 39 Questions 40 20
24 Social Media Policy Dos and Don ts: Employees, Networking Sites and the Law Amy Melican Proskauer Rose LLP Nausheen Rokerya Proskauer Rose LLP 41 C4CM Upcoming Events For more Human Resources, visit: For more Human Resources CD Recording, visit:
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationCreating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work
Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Amy F. Melican, Associate, Proskauer 212.969.3641 AMelican@proskauer.com Traci Clements, Attorney,
More informationSocial Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
More informationSocial Media in the Workplace: Avoiding Legal Pitfalls
Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:
More informationConsult with your Attorney
Social Media Policies and Procedures John Cummings, MBA, PHR, CIC Risk Management Program Manager Montana Municipal Interlocal Authority Consult with your Attorney The Acting General Counsel s Reports
More informationHuman Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
More informationOVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor astorey@rudman-winchell.com I. USE OF INFORMATION DURING HIRING PROCESS
More informationSocial Media in the Workplace. Stacey L. Smiricky Partner, Labor & Employment Group
Social Media in the Workplace Stacey L. Smiricky Partner, Labor & Employment Group Lessons Learned Employee who called in sick later places a status update on his Facebook page announcing sick day at Wrigley
More informationSocial Media and the Workplace: Potential Liability to Employees
Social Media and the Workplace: Potential Liability to Employees Rosanna Sattler Nancy Puleo Posternak Blankstein & Lund, LLP Boston, MA E mployees in almost every workplace use social media such as personal
More informationSocial Media Dominance
Social Media Survival Guide: Hiring and Firing in the Era of Social Media Denise M. Visconti dvisconti@littler.com Adam Rosenthal arosenthal@littler.com Littler Mendelson, P.C. 501 W. Broadway Suite 900
More informationSocial Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationSocial Networking Risks and Rewards
Social Networking Risks and Rewards Presented By: Amber Richard, Director of Interactive Marketing, YMCA of the Greater Twin Cities Natalie Lenz, Human Resources Generalist, YMCA, of the Greater Twin Cities
More informationThe New World of Social Media: Business and Legal Risks
March 2, 2010 The New World of Social Media: Business and Legal Risks Call-In Details: United States/Canada: 1-800-214-0694 All other countries: 1-719-955-1425 Participant Passcode: 165381 www.marsh.com
More informationLE.201 Employee Privacy Rights in the Electronic/Social Media Age
LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,
More informationVirginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
More informationFriending and Tweeting in the Workplace: The Impact of Social Media on Corporate America
Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America Presented by Mark A. Pihart (612) 604-6623 mpihart@winthrop.com Potential Legal Exposure Due to Employee Use of
More informationSocial Networking, Privacy, and Employee Speech in the Workplace
Social Networking, Privacy, and Employee Speech in the Workplace PRESENTED BY Pam Salgado (206) 521-6406 Pam.Salgado@Bullivant.com Katherine Somervell (503) 499-4454 Katherine.Somervell@Bullivant.com Brian
More informationCommunications 01: Social Media
Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional
More informationSOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE
New Jersey League of Municipalities SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE Presented by: BRIAN W. KRONICK, ESQ. Genova, Burns & Giantomasi (973) 533-0777 November
More informationDo You Want to Be My Friend? Pros, Cons and Traps of Facebook and Other Social Media in the Life Cycle of the Employment Relationship
Do You Want to Be My Friend? Pros, Cons and Traps of Facebook and Other Social Media in the Life Cycle of the Employment Relationship By Ron Schneider Lori Dwyer Kai McGintee Bernstein Shur Labor & Employment
More informationModel Policy for a Law Enforcement Agency s use of Social Networking
Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model
More informationPitfalls of Social Media in the Workplace
Pitfalls of Social Media in the Workplace Presented by Michael C. Terrell Taft Stettinius & Hollister LLP 1 Overview of Social Media Popular Sites: Facebook Twitter LinkedIn Pinterest Google Tumblr Instagram
More informationBRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
More informationI. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
More informationEmployment Law Issues in Social Media
Employment Law Issues in Social Media John Nadolenco Partner, Los Angeles Andrew Rosenman Partner, Chicago (213) 229-5173 (312) 701-8744 jnadolenco@mayerbrown.com arosenman@mayerbrown.com Mayer Brown is
More informationHagan Barrett & Langley PLLC Lawyers for Leaders
Hagan Barrett & Langley PLLC OUR FIRM Whether they are already at the top of their industry, company, or organization, or have strong aspirations to achieve a higher level of success, our clients are all
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationSocial Media in the Workplace
Social Media in the Workplace Employer Best Practices Presented by: Michelle Perris, HR Consultant Robin Niel, Senior HR Consultant hrconsulting@jwterrill.com www.jwterrill.com Social Media in the Workplace
More information719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
More informationMedia Traps. Attorney Nilesh P. Patel
Workplace Social Media Traps Attorney Nilesh P. Patel Mahadev Law Group, LLC Human Resources & Employment Law Solutions www.mahalawgroup.com npp@mahalawgroup.com 877-210-2499 Definition: Online forums
More informationREVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationSOCIAL MEDIA POLICIES AND PROCEDURES AND OTHER GROWING CONCERNS OF PROVIDERS IN THE ELECTRONIC AGE: HOW WE LOVE OUR FACEBOOK
SOCIAL MEDIA POLICIES AND PROCEDURES AND OTHER GROWING CONCERNS OF PROVIDERS IN THE ELECTRONIC AGE: HOW WE LOVE OUR FACEBOOK NYSARC, Inc. and Cerebral Palsy Associations of NYS May 12, 2015 Melissa M.
More informationWHAT POLICIES SHOULD AN EMPLOYER HAVE IN PLACE TO PREVENT LAWSUITS?
WHAT POLICIES SHOULD AN EMPLOYER HAVE IN PLACE TO PREVENT LAWSUITS? Many Employers Are Unaware of the Types of Policies Necessary to Limit Lawsuit Risk or of How to Effectively Draft Employment Policies
More informationThis agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
More informationEMPLOYEE PRIVACY IN THE DIGITAL WORKPLACE
EMPLOYEE PRIVACY IN THE DIGITAL WORKPLACE Presented by Risa B. Boerner, Scott M. Waldman and Brent A. Cossrow http://delvacca.acc.com Today s Discussion Best Practices When Investigating Employees Electronic
More informationSutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY
Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Communications & Marketing Policy 12-745 Approved by: System Management Team Origination Date: 08/2009 Revised Date:
More informationsection 15 Computers, Email, Internet, and Communications
section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property
More informationSocial Networking Issues in the Workplace
Social Networking Issues in the Workplace Presented By: David Flotten, JD, SPHR HR Consultant/Benefits Technical Advisor Disclaimers Technology is moving faster than the legal system can keep pace. Accordingly,
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationManaging Social Media Employment Issues
Managing Social Media Employment Issues October 1, 2013 Katie Carder McCoy 206.447.2880 cardk@foster.com Presentation Outline: What is social media and who cares? Risks of employer-sponsored social media,
More informationPolicy and Guidelines for Personal Use of Social Media*
I. Scope: This policy applies to all employees, students, contractors and volunteers as it relates to their employment, academic, or business relationship with the University of Mississippi Medical Center
More informationCorporate Reputation Management Vs. Employee Privacy
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Reputation Management Vs. Employee Privacy
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationProtecting Your Non-Profit From Employment Law Traps. Attorney ilesh P. Patel Mahadev Law Group, LLC Human Resources & Employment Law Solutions
Protecting Your Non-Profit From Employment Law Traps Attorney ilesh P. Patel Mahadev Law Group, LLC Human Resources & Employment Law Solutions www.mahalawgroup.com npp@mahalawgroup.com 877-210-2499 Speaker
More informationSocial Media in the Workplace Potential Traps for Employers and Employees. by Phil J. Antis, Jr. and David V. Bryce
Social Media in the Workplace Potential Traps for Employers and Employees by Phil J. Antis, Jr. and David V. Bryce Gordon Arata Duck Lunch Seminar, 2012 TABLE OF CONTENTS I. Introduction... 1 II. Social
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More information[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
More informationWhat Managers Need to Know About Social Media: Top 10 Tips for Mitigating the Risks of Social Media in the Workplace FEATURED FACULTY:
What Managers Need to Know About Social Media: Top 10 Tips for Mitigating the Risks of Social Media in the Workplace FEATURED FACULTY: Spencer Hamer, Partner, Michelman & Robinson 714.557.7990 shamer@mrllp.com
More informationTHE LAW. Equal Employment Opportunity is
Equal Employment Opportunity is THE LAW Private Employers, State and Local Governments, Educational Institutions, Employment Agencies and Labor Organizations Applicants to and employees of most private
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationBates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationFair Employment Practices
In the GE Community Fair Employment Practices (Policy 20.2) Issued: October 2000 Supersedes: April 1993 GE is committed to fair employment practices, including the prohibition against all forms of illegal
More informationCreating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work
Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Michael P. Elkon, Attorney at Law, Fisher & Phillips LLP (404) 240-5849 melkon@laborlawyers.com
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationEqual Employment Opportunity (EEO) Complaint & Investigation Guideline Number 200-002b-AOG Responsible Office Human Resources Date Revised 01/30/2014
Title Equal Employment Opportunity (EEO) Complaint & Investigation Guideline Number 200-002b-AOG Responsible Office Human Resources Date Revised 01/30/2014 1. Purpose The SCA is committed to providing
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationSocial Media An Employment Nightmare. Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C.
Social Media An Employment Nightmare Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C. Show of hands: Who uses social media to screen job applicants?
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationUniversity Schools Social Media Guidelines for Employees
University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available
More informationPrivate Employers, State and Local Governments, Educational Institutions, Employment Agencies and Labor Organizations
Equal Employment Opportunity is THE LAW Private Employers, State and Local Governments, Educational Institutions, Employment Agencies and Labor Organizations Applicants to and employees of most private
More informationUSE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE. Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant
USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant Employee Misuse of Social Media Employees Misuse Social Media By: Disclosing
More informationU.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
More informationBefore you fire or otherwise discipline an employee on the basis of a social media post, consult your organization s lawyer
October 15, 2013 Emily Sneddon Mitchell, Blackstock, Ivers & Sneddon, PLLC 1010 W. Third St. Little Rock, AR 72201 (501) 378-7870 esneddon@mitchellblackstock.com These materials are for instructional purposes
More informationEmployee Handbooks/ Document Retention Investigations
Employee Handbooks/ Document Retention Investigations Kate L. Birenbaum Seyfarth Shaw LLP 700 Louisiana, Suite 3700 Houston, Texas 77002-2797 (713) 225-2300 Employee handbooks are important Evidence of
More informationTop 10 Workplace Issues: How to Avoid New Traps & Old Pitfalls by Mark A. Pihart Co-chair of the Employment Law Group at Winthrop & Weinstine, P.A.
Top 10 Workplace Issues: How to Avoid New Traps & Old Pitfalls by Mark A. Pihart Co-chair of the Employment Law Group at Winthrop & Weinstine, P.A. 1. EEOC Statistics and Trends. Over the past year we
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationLegal Aspects of Social Networking and Online Media Platforms
Legal Aspects of Social Networking and Online Media Platforms Lisa M. Hix September 21, 2010 2008 Venable LLP 1 2 Tools of the Trade (i.e. Facebook, LinkedIn, Twitter, MySpace, Friendster, Skype, YouTube,
More informationNLRB SOCIAL MEDIA UPDATE: INFORMATION EVERY BUSINESS NEEDS TO KNOW, EVEN IF IT S NOT A UNION SHOP
NLRB SOCIAL MEDIA UPDATE: INFORMATION EVERY BUSINESS NEEDS TO KNOW, EVEN IF IT S NOT A UNION SHOP Mari L. Myer The Myer Law Firm 118 East Maple Street Decatur, Georgia 30030 404-601-4125 mmyer@myerlawatlanta.com
More informationWHISTLEBLOWING AND CONDUCTING INVESTIGATIONS. Eileen P. Kennedy Berliner Cohen
WHISTLEBLOWING AND CONDUCTING INVESTIGATIONS Eileen P. Kennedy Berliner Cohen 1 Topics I. New Laws Protecting Whistleblowers. II. III. IV. Other Anti-Retaliation and Whistleblower Protections. Discipline
More informationTerms of Use The Human Face of Big Data Website
Terms of Use The Human Face of Big Data Website Effective Date: September 12 th, 2012 Welcome to The Human Face of Big Data, a project of Against All Odds Productions ( AAOP ). The Human Face of Big Data
More informationEADS-NA Code of Ethics
Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and
More informationThe Evolution of Social Networking in the Workplace: How to Keep Your Social Media Policy Relevant in the Face of Constant Change
The Evolution of Social Networking in the Workplace: How to Keep Your Social Media Policy Relevant in the Face of Constant Change Rebecca Brazzano 212.908.3941 Rebecca.Brazzano@ThompsonHine.com Joëlle
More informationGlenmeadow, Inc. Terms and Conditions of Use Legal Notices/ Privacy Policy
Glenmeadow, Inc. Terms and Conditions of Use Legal Notices/ Privacy Policy Medical Disclaimer Glenmeadow is a senior living retirement community providing assisted and independent senior living options
More informationSocial Media and the Employer-Employee Relationship. Tracy Richelle High, Partner and Christina Andersen, Associate, Sullivan & Cromwell LLP
Social Media and the Employer-Employee Relationship Tracy Richelle High, Partner and Christina Andersen, Associate, Sullivan & Cromwell LLP The widespread popularity of social media presents novel challenges
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationHow To Use The Blog Safely And Responsibly
BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More informationReview Responsibility Human Resources
Subject Regions Hospital Social Media Use and Behavior Attachments Yes No Key words Social Networking, Facebook, YouTube, Internet e-mail, blog, online manners, netiquette, Twitter, web mail Number RH-HR-HR
More informationSocial Media Resources
Social Media Resources Policy Option 1 This policy applies to the social networking activity of all employees, contractors, business partners or other parties with a material interest in [COMPANY], and
More informationCITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE
CITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE The policy of the City of Los Angeles has been, and will continue to be, to promote and
More informationThe Coca-Cola Company
The Coca-Cola Company EQUAL OPPORTUNITY AND AFFIRMATIVE ACTION POLICY STATEMENT 1.0 Policy Statement and Purpose The Coca-Cola Company is an Equal Opportunity Employer and maintains a work environment
More informationWith the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
More informationPLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.
PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. TOYOTA ASSOCIATE DISPUTE RESOLUTION ( T-ADR ): Summary Description
More informationChecklist: Can My Company Ban That?
Checklist: Can My Company Ban That? Topics: PERSONAL APPEARANCE OFF-DUTY CONDUCT SOCIAL MEDIA CELL PHONE USE SMOKING & E-CIGARETTES WEAPONS WORKPLACE DATING FOREIGN LANGUAGES 1. Personal Appearance Typically,
More informationTelecommuting: Developing Effective Policies and Practices that Minimize Risk and Employer Liability
Telecommuting: Developing Effective Policies and Practices that Minimize Risk and Employer Liability FEATURED FACULTY: David C. Whitlock, 404-626-7011 davidcwhitlock@gmail.com David C. Whitlock, Dave Whitlock
More informationDocumenting Employee Discipline: The Dos and Don ts of Documentation
Documenting Employee Discipline: The Dos and Don ts of Documentation FEATURED FACULTY: Amber M. Spataro, Counsel, Littler 973.848.4745 aspataro@littler.com Amber M. Spataro, Counsel, Littler Amber has
More informationCity of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
More informationCity of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
More informationRisk Management and Litigation Avoidance An ounce of prevention is worth a pound of cure.
Risk Management and Litigation Avoidance Risk Management and Litigation Avoidance An ounce of prevention is worth a pound of cure. 2012 COSE Small Business Conference October 25-26, 2012 Presented by Robert
More informationGrand Rapids Public Schools
4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers
More information205.06 Social Media Policy
205.06 Social Media Policy A. POLICY/PURPOSE City of Arlington departments may utilize social media and social network sites to further enhance communications with various stakeholder organizations in
More informationSocial Media: Risks and Rewards
Social Media: Risks and Rewards Nilesh (Neal) Patel Member Frost Brown Todd LLC 3300 Great American Tower Cincinnati, OH 45202 513.369.4805 npatel@fbtlaw.com Linkedin.com/in/nealpatel1/ 2013 Frost Brown
More information