The Resource Newsletter for Home and Hospice Care March Home Care The Law

Size: px
Start display at page:

Download "The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law"

Transcription

1 The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue s legal hot topic focuses on monitoring employees and communications monitoring policies and procedures. Know the pitfalls before you begin monitoring employees to avoid this becoming an even larger source of liability. Employers who have failed to do so have found themselves being sued for violating not only federal laws, but also employee privacy. pgs Published by Indiana Association for Home and Hospice Care, Inc G Rucker Road Indianapolis, IN n (317)

2 LEGAL HOT TOPIC/Robert W. Markette, Jr., CHC Employee Monitoring: Know the Risks or Risk Major Liability Employers who have failed to do so have found themselves being sued for violating not only federal laws, but also employee privacy. Home health and hospice employers face a rising trend of lost productivity due to the misuse of the Internet in the workplace. Employees spend time engaged in numerous non-productive activities such as surfing the web, reviewing non-work related websites, instant messaging, updating their status on Facebook. According to one recent Gallup poll, the average employee spends over 75 minutes a day using office computers for non-business activity. All of this unproductive activity occurs while the employee is being paid by you to discharge their job duties. For home health and hospice providers, this trend impacts your office and administrative staff. It may also impact your field staff, when they use company issued lap tops and PDAs to surf the Internet, send and receive personal , send personal texts from company cell phones, etc. Employees can also waste time with personal phone calls at the office or on company issued cell phones. For field staff, the risk may even be greater, as there is no one around to monitor their usage. Because of this trend, employers are considering, and implementing, policies, procedures, and technology to monitor employees. Employers are choosing to monitor, because eliminating the Internet at work is no longer feasible. Companies rely upon for communications, web-based portals for billing, networked calendars for scheduling, and many other legitimate business purposes. This leads employers to pursue a strategy of monitoring and discipline to reduce time lost to the Internet. When employers implement these policies, procedures, and technologies, they do not always consider a very important countervailing interest their employees right to privacy. Employees are suing employers who have intercepted personal communications as part of an employee monitoring program. Employees are bringing claims under the federal Wiretap Act and Stored Communications Act, as well as state law invasion of privacy claims. It is important to understand how these laws apply and to implement your policies and procedures accordingly. If you do not, you risk being sued by your employees as a result of your efforts to protect your bottom line from employee waste. Page 2

3 Laws Impacting Employer Monitoring There are two federal statutes that are implicated by employer s efforts to monitor their employees. The first statute is Title III of the Omnibus Crime Control and Safe Streets Act of 1968, more commonly known as the Wiretap Act. The second is the Stored Wire and Electronic Communications Act, more commonly known as the Stored Communications Act, which was part of the Electronic Communication Privacy Act of Federal Wiretap Act The federal Wiretap Act was passed to restrict the interception of phone calls and similar wire communications. It contains both criminal and civil penalties. The Act prohibits individuals or entities from intentionally intercepting or attempting to intercept any wire, oral, or electronic communication. It also prohibits individuals or entities from using a third party to do the same things. The three types of communication wire communication, oral communication, and electronic communication are each specifically defined. The term wire communication is defined as any aural transfer made in whole or in part through the use of facilities for the transmission of communications by the aid of wire, cable, or like connection This term includes telephone calls, voice mail and other aural transfers. An electronic communication is any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic, or photooptical system. This definition has several exceptions, including any wire or oral communication. According to one recent Gallup poll, the average employee spends over 75 minutes a day using office computers for non-business activity. Although the application of this statute to telephone calls and voice mail has been straightforward, the way an message travels across cyberspace has led to some confusion over when the Wiretap Act applies to intercepting messages. During transmission across the Internet, messages are broken down into packets and moved from server to server across the Internet. They are then transferred from server to server until they reach the server where the recipient s account resides. Except for very brief periods of actual transmission, the messages spend most of their time in storage on one intermediate server after another until arriving at their destination. At that point, the packets are reassembled into a message and placed in the recipient s box. Along the way, the message may be stored and retrieved several times. The message does not simply go from the sender s computer to the receiver s computer, in the way a telephone call goes from phone to phone. This means that when an message is diverted by an individual, it is copied out of this intermediate storage. It is not diverted as it crosses the wires connecting two computers. This has led some courts to conclude that e- mail cannot be intercepted as defined by the wiretap act. They conclude that the allegedly intercepted s where not intercepted, because they were simply copied from a hard drive while in storage during transmission. Page 3

4 The SCA was intended to protect the privacy of individuals who used Internet service providers, because the act prohibited unauthorized access to information stored on computers. These courts hold that copying s out of intermediate storage is subject to the Stored Communications Act. Other federal courts, including those with jurisdiction over Indiana, have found the Wiretap Act applies to , even though storage of the is part of the transmission. Courts that have applied the Wiretap Act to have found that the key issue is whether the interception was contemporaneous with the transmission. For example, in one case, an IRS agent was able to access an server owned by his employer and alter the mail delivery system so that copies of every addressed to his boss were also sent to him. When the mail server received the , it would make an additional copy it and forward it to the Defendant. The court held that even though the interception occurred while the was on the server s hard-drive, it was contemporaneous with the transmission and therefore a violation of the Wiretap Act. Stored Communications Act The Stored Communications Act ( SCA ) was passed by Congress as part of the Electronic Communications Privacy Act of The ECPA was passed to extend the protections of the wiretap act to other forms of electronic communications. The SCA was intended to protect the privacy of individuals who used Internet service providers, because the act prohibited unauthorized access to information stored on computers. The SCA specifically prohibits: intentionally access[ing] without authorization a facility through which an electronic communication service is provided; or intentionally exceed[ing] an authorization to access that facility and thereby obtaining, altering, or preventing authorized access to a wire or electronic communication while it is in electronic storage in such system... The terms wire and electronic communication have the same definitions as in the Wiretap Act. The term electronic storage is defined as any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and any storage of such communication by an electronic communication service for purposes of backup protection of such communication. In other words, the act protects electronic communications in storage on your service provider s server and in storage on any other servers during the process of transmitting the electronic communication across the Internet. In addition to applying this statute to interceptions of s, courts have applied this statute to situations where employers accessed an employee s personal account. In one case, an employee stopped working for a company, but left his company computer configured to automatically log into his personal account. When the employer turned on the computer and started the web browser, the employer was automatically logged into the employee s personal account. The employer used this access to gain information on the employee s efforts to unfairly compete with the employer. The employer was found to have violated the SCA, because the employer did not have authority to access the employee s personal account. Page 4

5 Invasion of Privacy Another potential source of liability in employee monitoring is being sued by a current or former employee for breach of privacy. Indiana, like many states, recognizes the tort of invasion of privacy. Invasion of privacy comes in four distinct forms, but only one form is of any concern for employers who monitor their employees. This is known as invasion of privacy by intrusion into seclusion. To prevail on an invasion of privacy by intrusion claim, the plaintiff must show that the defendant intruded upon the plaintiff s physical solitude or seclusion, as by invading his home or other quarters and the intrusion would be considered offensive or objectionable to a reasonable person. One example of an offensive or unreasonable search is an illegal search. Indiana Courts have applied the intrusion by seclusion rationale in a number of contexts, but they have not yet addressed how this tort applies to cyberspace. In fact, one court noted that thus far, every intrusion by seclusion case in Indiana has involved a physical invasion of the plaintiff s space or property. This does not mean an Indiana court will not apply this tort in cyberspace, but it leaves open the question of what the courts might do. Even though Indiana Courts have not specifically addressed this cause of action, providers need to be aware that it is a possible response. Invasion of privacy comes in four distinct forms, but only one form is of any concern for employers who monitor their employees. This is known as invasion of privacy by intrusion into seclusion. Exception: Consent Although these laws would appear to make it illegal to implement an employee monitoring program, both the Wiretap Act and the SCA contain exceptions for consent. If at least one party to the communication consents to the interception, there is no liability. The first thing to consider here is that the employer is not a party to the communication unless the employer is communicating with the employee. In most instances the employer is the provider of the communications equipment, computers and/or Internet access. The employee is using these items to engage in improper communications. The employee and whomever they are communicating with are the parties to the communication. This means the employee or the other party must consent to the interception or access for it to pass muster under the Wiretap Act or the SCA. If either the employee or the other party has consented, either expressly or by implication, the monitoring is not a violation. The tort of invasion of privacy does not rely upon consent, instead an employee s right to privacy can be eliminated by removing their reasonable expectation of privacy. An employee can only raise an invasion of privacy claim if he or she can argue that they had a reasonable expectation of privacy in the communication. If the employee is put on notice that they have no expectation of privacy in your computers, phones, etc., they cannot claim that their privacy was invaded. The most efficient and effective way to address the consent/expectation of privacy issue is through properly drafted and implemented policies and procedures. When done properly, policies and procedures put the employee on Page 5

6 notice of the monitoring, provide proof of the employee s consent to the monitoring, and undermine claims that an employee expected privacy. Drafting effective policies If you have the means to monitor employee phone calls, you must determine the scope of the monitoring. Your personnel policies should put your employees on notice that you can and will monitor their communications. Your policies should address monitoring telephone calls, cellular phones, , etc. Your policies should be in place before you start any monitoring program. Telephone Monitoring In order to monitor your employees telephone calls, you must have a method in place to do so. Some companies have a system that allows them to listen in on every telephone call that comes into or goes out the office. One example of such a system is the quality assurance monitoring system some companies put into service for customer service purposes. If you have the means to monitor employee phone calls, you must determine the scope of the monitoring. For example, will you monitor all employee phone calls, including personal calls or will you only monitor business calls. This decision will depend upon a number of factors, including your specific concerns with employee conduct and the types of telephone calls that have been a problem. You must also decide how much monitoring you will perform. For example, if you have decided to monitor only business calls, will you monitor every business call or will you only monitor some business calls. This is important, because if you are going to monitor all phone calls, you should say you are going to monitor all phone calls. If you have the facilities to monitor all calls, you must consider whether to provide a means for employees to make private nonmonitored calls. You might provide the employees with phones that are not subject to monitoring or you might suggest they use personal cellular phones. If you are going to allow some means to make personal calls, you may want to consider whether you will define parameters of employee personal calls during working hours. Once you make these determinations you can then draft a policy and procedure to implement them. The policy should clearly state what calls will be monitored and the frequency of the monitoring. If you intend to monitor all calls, the policy should state that you monitor all telephone calls at all times. If you state you will monitor only business calls, you should only monitor business calls. You only have consent from the employee to engage in the monitoring you tell them about. Telling the employees about some monitoring will most likely not create implied consent to broader monitoring. In one Wiretap Act case, the employer s policy stated that they would monitor calls between the employee and the company s customers. The policy also made it clear that not all of the employee s calls to company customers would be monitored. The employee sued her employer after her supervisor intercepted two personal phone calls between the employee and the employee s spouse. The employer attempted to defend the claim by arguing that the employee had impliedly consented to the monitoring, because she placed a personal call on Page 6

7 phones that she knew the employer could monitor. The court relied heavily on the fact that the employer s policy clearly stated that some, but not all calls between the employee and customers would be monitored. Because the policy explicitly stated only business calls would be monitored, the court reasoned the employee could not have known her personal call would be monitored. The Court concluded that where the employee would not have expected her personal calls to be monitored, she could not be found to have consented to the monitoring simply be placing a personal call on the employer s phones. It is worth noting that the court implied the employer was free to monitor all of the calls it wanted. But by drafting its policies to encompass a narrower range of calls, the employer limited itself to only monitoring this lesser range of calls. The mere fact that the employee used the employer s telephone did not amount to consent to monitoring beyond the scope of the stated policy. This reinforces a key point, once you have drafted your policies and procedures, you should follow them. If you do not, you likely do not have consent to intercept the communications. Once you have drafted the policy, your employees should be given a copy of the policy and procedure as well as a chance to ask any questions they might have. You should also have the employee sign an acknowledgement that they have received and reviewed the policy. Employees should also be clearly told that they have no expectation of privacy in the contents of any communication sent or received using the company s system. You must then make sure that your staff is following the policy. This may include random audits to determine what monitoring is occurring. If an employee complains that the policy is not being followed, you should investigate. You do not want to discover an otherwise lawful policy has become a source of liability when you are served with a lawsuit. Monitoring monitoring should be addressed in the same manner as telephone monitoring. You should first consider what is allowed with the company system, until you decide what employees can and cannot do you do not know what you are looking for with monitoring. In most cases, the company policy will be that company is only for company business. Any use of company for personal business will then become the basis for discipline. Once you have decided on your corporate use policy, you then need to decide how you will monitor use. Your monitoring policy will be influenced by a number of factors including: capabilities of your software and/or ISP, volume of , resources to dedicate to monitoring, etc. Once you have decided to monitor employee , you need to determine what monitoring tools your system can provide. You may be able to forward copies of all s that are sent and received to an additional in box. This would allow you obtain copies of every sent by your employees, but may require a substantial amount of time to audit. Your system most likely will allow for more refined monitoring, such as forwarding of s with certain words, phrases, or addresses. Page 7

8 You may choose to only monitor employees when you suspect they are misusing your system, planning to steal confidential information, etc. You could then review only that employee s . Of course, this has the disadvantage of allowing other employees to get away with abuses until such time as you identify the problem and begin to monitor their activities. There are a wide range of ways to implement monitoring. You must carefully consider this issue and affirmatively decide upon a policy. Once you have determined what you can do and how you will implement monitoring, you should draft a policy and procedure that notified the employees that you will monitor usage. The employees should be aware that you can and will intercept and read their s, regardless of whether they are business or personal. Employees should also be clearly told that they have no expectation of privacy in the contents of any communication sent or received using the company s system. They should also be told that they do not have any reasonable expectation of privacy in , personal or corporate, stored on the company s computers, regardless of whether the was sent or received using the company s system. The former may be implied in any policy that states the employer monitors use, but the latter is not. It is important to be very broad in this language, because employees may use your computer s to send and receive s from other systems. If you search an employee s computer and find s that were not sent using your system and you did not make it clear that they do not have a reasonable expectation of privacy in stored on your computers, you may have created liability for yourself. Text Messaging Another area to consider is text messaging from company cell phones. The use of text messaging by employees has led to employers receiving bills for overages. These overages may be due to employees using company cell phones to send personal text messages. Your current computer and Internet usage policies may not help you in a text message case if they do not specifically address text messaging. In one recent case, an employer was sued after it obtained copies of every text message sent by an employee from his company issued cellular phone. The employer requested the copies from the cellular phone company, because the employee had a significant overage. Upon auditing the employees text message, the employer discovered that a significant number of the message were of a personal nature. Your current computer and Internet usage policies may not help you in a text message case if they do not specifically address text messaging. In one recent case, an employer was sued after it obtained copies of every text message sent by an employee from his company issued cellular phone. The employee objected that this was an invasion of his privacy. The court agreed, because the company had an informal policy of not auditing text messages, but simply asking employees to pay any overage fee. The employee had had prior instances of overages and, in each case, had been asked to pay the overage, but had not had his text messages reviewed. The court found the employer had violated the employee s right to privacy. The court s ruling focused on the lack of a policy stating the employer would review text messages along with the employer s informal policy of only requir- Page 8

9 ing the employee to pay the overage. This case makes it clear that providers should consider cell phone/pager text messaging in their electronic communications policies and procedures. Text messaging is becoming a more and more popular way to contact individuals and to share quick messages. Employees can abuse these in a way that costs employers money. Your policy should not only address appropriate use of text messages, but expectations of privacy and monitoring of text messages. If your employees are clearly told that the cell phone/pager is only for company use and you will review the messages as part of a regular audit or an overage audit, they will not be able to make the privacy claim the employees did in the previous case. This case focused on the employee s expectation of privacy in text message retrieved from the service provider. A related issue is whether employees have a reasonable expectation of privacy in text message stored on a company issued cell phone. This is another area that should be expressly addressed in your policies and procedures. It might be part of a company equipment policy and procedure or it might also be part of your text messaging policies and procedures. Company Equipment Your policies and procedures should make it clear that the employee has no reasonable expectation of privacy regarding any message, , communication, document, or other information stored on a company computer, PDA, cell phone, pager, or other company issued device. This is important, because there are a number of cases where employees have stored personal s, text messages, documents, and other information on a company issued device and then objected when the employer obtained copies. Plainly stating to employees that they cannot expect these things to remain private eliminates potential issues later. Monitoring Internet Usage Employers have a number of technology options for monitoring Internet usage. This can include monitoring instant messaging, Internet chat sessions, and web browsing. Many firewall products can provide employers with a record of the websites visited by employees. There are a number of software products that can expand upon this monitoring. There are other software products that can block, manage and monitor Internet messaging and chat sessions on your company s network. In addition, the browser on your employees computers will keep track of the web sites they have visited in the browser s history. If blocking websites, messaging and chats are not an option, monitoring is your alternative. You will first need to formulate a policy on appropriate Internet usage. Then, when you have evidence of employee s violating the policy, due to your monitoring, you can take disciplinary action against them. As with other forms of monitoring, your employees should know you can and will monitor their Internet usage. Your policy should make it clear that your Page 9 Your policy should make it clear that your employees have not reasonable expectation of privacy in their usage of the Internet.

10 employees have not reasonable expectation of privacy in their usage of the Internet. You should also tell them that you will access their computer in order to check their browser history, cookies, etc. If your employees have been told they have no reasonable expectation of privacy on company issued devices, including computers, they have no basis to object to a search of the browser history, cookies, etc. These searches are less likely to turn up employee communications and more likely to produce evidence of employees wasting company time. Video Surveillance Another area that employer s are considering is workplace video surveillance. This can be an area that employees object to very strenuously, because they feel that you are watching them. This is, of course, exactly what you are doing. As with other forms of monitoring, this type of monitoring can be done legally. If video surveillance is done using video cameras without microphones, the employer can avoid a potential wiretap act violation, because there is no interception of an oral communication. There is still a privacy issue. As with other forms of monitoring, informing employees that you will be implementing video surveillance and that they will be monitored at all times eliminates the employees expectation of privacy. This policy should be implemented and provided to the employees before you start recording the workplace. You should avoid placing hidden cameras in your offices. You should also avoid placing cameras in bathrooms. Implementing Policies as Drafted You should avoid placing hidden cameras in your offices. You should also avoid placing cameras in bathrooms. Once you have drafted these policies and procedures, they need to be implemented as drafted and followed as drafted. In the text messaging case discussed above, one of the employer s problems was that the individual in charge of the pager program was allowed to create an informal policy by what he told employees. The individual responsible for the pagers stated he did not want to monitor text messages and that if the employee paid the overage he would not look at the messages. This became the employer s de facto policy and reinforced the employees claim that he had a reasonable expectation of privacy in the texts. Making sure your policies are implemented as drafted requires you to train management on these policies. They should know what they can and cannot do. For example, if your policy states you will not monitor personal calls, you should not monitor personal calls. A manager or other employee who exceeds the scope of your policies and procedures can lead to a violation of the Wiretap Act, the Stored Communications Act or an invasion of privacy claim. The employees responsible for implementing the program should know that if they violate the policies and procedures they will be disciplined. Page 10

11 Annual Review Your employees should be given a copy of your communications and monitoring policies and procedures every year. They should sign a new acknowledgement each year as well. This avoids an employee later claiming they did not understand or were not aware, because it had been several years since the came to work for you. As the employer, you should consider your policies each year. As technology changes and new forms of communication develop, your policies may not cover the technologies you have implemented in your agency. You may need to consider additional monitoring policies and procedures. You may need to revise older policies and procedures. If you change your policies and procedures, you will need to provide copies of the new policies and procedures to employees and have them execute a new acknowledgement form. Performing an annual review will help you to slip into non-compliance from expanding your monitoring without formally adopting policies or from relying upon old policies that do not apply to new means of communication. Conclusion As communications technologies change and grow, employer communications policies and procedures need to change as well. Monitoring employee communications has become more and more common as employers seek to limit time lost to employee s who use company time to send personal s, surf the Internet and/or text message. Employers who have decided to monitor employee communications need to take precautions to avoid potential liability later. Employers must carefully consider and implement communications monitoring policies and procedures before they begin monitoring their employees or risk monitoring becoming an even larger source of liability. Employers who have failed to do so have found themselves being sued for violating not only federal laws, but also employee privacy. Employers who have previously implemented monitoring policies and procedures need to review them regularly, because communications technologies are constantly changing. Robert W. Markette, Jr., CHC is a partner at Gilliland & Markette LLP. He can be reached at (317) or rmarkette@gillilandmarkette.com. This column, which represents the author s view and not necessarily those of IAHHC, is for educational and informational purporses only, is not intended to be legal advice, and should not be used for legal guidance or to resolve specific legal problems. In all cases, agencies should seek legal advice applicable to their own specific circumstances. Home Care & The Law Published by the Indiana Association for Home & Hospice Care, Inc. Members are encourage to submit legal topics for future issues to the Indiana Association for Home and Hospice Care, Inc.; 6320-G Rucker Road, Indianapolis, IN Page 11

12 Home Care & The Law Published by Indiana Association for Home and Hospice Care, Inc G Rucker Road Indianapolis, IN n (317) Employee Monitoring: Know the Risks or Risk Major Liability Your policies and procedures should make it clear that the employee has no reasonable expectation of privacy regarding any message, , communication, document, or other information stored on a company computer, PDA, cell phone, pager, or other company issued device. Learn how to protect your agency. Page 12

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut TOLLAND PUBLIC SCHOOLS Tolland, Connecticut ADMINISTRATIVE REGULATION REGARDING: Employee Use of the District s Computer Systems Number: 4110 Administrative Approved: 2/28/01 Revised: 4/26/06 Revised:

More information

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important

More information

HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.

HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M. HOT TOPICS IN EMPLOYMENT LAW E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications by Andrew M. Low Employers have plenty of legitimate reasons for wanting to

More information

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised:

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: CROMWELL PUBLIC SCHOOLS 4118.5 BOARD OF EDUCATION POLICY Personnel Certified and Non-Certified Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: POLICY REGARDING

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

Privacy is the ability of an individual or group to keep their lives and

Privacy is the ability of an individual or group to keep their lives and Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.

More information

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS 4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and E-mail are effective and important technological resources in today's

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

3. Electronic Mail (E-mail)

3. Electronic Mail (E-mail) - Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes

More information

Organizational Policy

Organizational Policy Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy

More information

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act. Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for

More information

Workplace Policies. Computer Software (Unauthorized Copying)

Workplace Policies. Computer Software (Unauthorized Copying) Workplace Policies Computer Software (Unauthorized Copying) Cornerstone Systems does not condone the illegal duplication of software. The copyright law is clear. The copyright holder is given certain exclusive

More information

Mindful. Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT

Mindful. Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT Mindful Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT ON JANUARY 30, 2001, Anthony Cochenour called the FBI with a tip. Cochenour s company, an Internet service provider, sold e-mail services to

More information

State By State Employee Monitoring Laws

State By State Employee Monitoring Laws Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com State By State Employee Monitoring Laws Law360,

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

Website & Email Hosting Terms & Conditions

Website & Email Hosting Terms & Conditions Website & Email Hosting Terms & Conditions 1-PARTIES Web Hosting Services are provided by TimeForCake Creative Media, Inc. ("TimeForCake") to Client conditional on the terms and conditions set forth below

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

13.19 ETHICS REPORTING POLICY AND PROCEDURE

13.19 ETHICS REPORTING POLICY AND PROCEDURE 13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Video Voyeurism and Surveillance Laws in the Workplace

Video Voyeurism and Surveillance Laws in the Workplace Video Voyeurism and Surveillance Laws in the Workplace This article is an overview of the laws applicable to audio and video surveillance in the workplace Many employers consider video and other surveillance

More information

Troy Cablevision, Inc. Subscriber Privacy Policy

Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015 ETHICAL ELECTRIC PRIVACY POLICY Last Revised: December 15, 2015 This policy ("Policy") covers the privacy practices that Ethical Electric, Inc. ("Ethical Electric", "we" or "us") employs with respect to

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

LE.201 Employee Privacy Rights in the Electronic/Social Media Age

LE.201 Employee Privacy Rights in the Electronic/Social Media Age LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,

More information

NEW WAVE PRIVACY NOTICE

NEW WAVE PRIVACY NOTICE NEW WAVE PRIVACY NOTICE Companies controlled by NewWave Communications (subsequently referred to as NewWave, we, our, or us ) operate cable television systems through which they provide their customers

More information

SUBSCRIBER PRIVACY NOTICE

SUBSCRIBER PRIVACY NOTICE PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current

More information

Appropriate Use Policy for Information Technology

Appropriate Use Policy for Information Technology Appropriate Use Policy for Information Technology Amarillo College Faculty, Staff, Students, Friends and Guests Amarillo College reserves the right to amend or otherwise revise this document as may be

More information

4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS 4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

New York State Office Of Children And Family Services VPN

New York State Office Of Children And Family Services VPN CLIENT VPN New York State Office Of Children & Family Services New York State Office of Children & Family Services (OCFS) Client Virtual Private Network (VPN) Access to the Human Services Enterprise Network

More information

Anchor Bay Schools Software Policy

Anchor Bay Schools Software Policy Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Electronic Monitoring to Promote National Security Impacts Workplace Privacy

Electronic Monitoring to Promote National Security Impacts Workplace Privacy Employee Responsibilities and Rights Journal, Vol. 15, No. 3, September 2003 ( C 2003) Electronic Monitoring to Promote National Security Impacts Workplace Privacy Nancy J. King 1 This paper explores electronic

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Tele-Media Cable Internet Acceptable Use Policy

Tele-Media Cable Internet Acceptable Use Policy Tele-Media Cable Internet Acceptable Use Policy Important Note: Tele-Media may revise this Acceptable Use Policy (the "Policy") from time to time without notice by posting a new version of this document

More information

MYACCLAIM PRIVACY POLICY

MYACCLAIM PRIVACY POLICY MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the

More information

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication. THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Social Networking, Mobile Devices, and the Cloud: The Newest Frontiers of Privacy Law By David J. Goldstone and Daniel B. Reagan

More information

How to Monitor Employee Web Browsing and Email Legally

How to Monitor Employee Web Browsing and Email Legally WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating

More information

PeopleMatrix Application Hosting Services Agreement

PeopleMatrix Application Hosting Services Agreement PeopleMatrix Application Hosting Services Agreement WolfeReiter, LLC CONTENTS 1. Services Agreement... 2 1.1. Description of Services... 2 1.2. Term... 2 1.3. Customer Responsibilities... 2 1.4. Payment

More information

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC

More information

PEER-TO-PEER FILE SHARING POLICY

PEER-TO-PEER FILE SHARING POLICY 1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

MONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian

MONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian MONITORING THE ELECTRONIC WORKPLACE Jonathan Topazian A. Introduction Forty years ago, well before the advent of the electronic workplace, the Maryland Court of Appeals first recognized that individuals

More information

Niagara County Community College

Niagara County Community College Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:

More information

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office Voice over Internet Protocol Kristie Prinz The Prinz Law Office I. What is Voice over Internet Protocol ( VoIP )? Voice over Internet Protocol ( VoIP ) is a technology, which facilitates the transmission

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

System and Network Security Policy Internet User Guidelines and Policy. North Coast Council. 5700 West Canal Road Valley View, Ohio 44125

System and Network Security Policy Internet User Guidelines and Policy. North Coast Council. 5700 West Canal Road Valley View, Ohio 44125 North Coast Council 5700 West Canal Road Valley View, Ohio 44125 Telephone: 216-520-6900 Fax: 216-520-6969 1885 Lake Avenue Elyria, Ohio 44035 Telephone: 440-324-3185 Fax: 440-324-7355 URL: www.nccohio.org

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

PHIPA Potpourri. Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario. IPC Mediators April 21, 2015

PHIPA Potpourri. Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario. IPC Mediators April 21, 2015 PHIPA Potpourri Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario IPC Mediators April 21, 2015 Powers of the Commissioner The Powers the Commissioner has to conduct a review

More information

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Prepared for: The Essential Privacy, Access to Information, CASL Forum November 24, 2014 Dr. Andrea Slane University

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Retaliatory Hacking: Risky Business or Legitimate Corporate Security?

Retaliatory Hacking: Risky Business or Legitimate Corporate Security? Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Privacy Statement. Policy Overview. This Notice tells you our policies regarding:

Privacy Statement. Policy Overview. This Notice tells you our policies regarding: Privacy Statement At Glacier Club Cable TV we take your privacy seriously and we want you to know our policies. This Notice will give you an overview of those policies and how we will apply them in specific

More information

Introduction. General Use

Introduction. General Use Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use

More information

Bogalusa City School Board 1 of 6

Bogalusa City School Board 1 of 6 ELECTRONIC COMMUNICATIONS BETWEEN EMPLOYEES AND STUDENTS The Bogalusa City School Board shall require that all communications between employees and students be appropriate and in accordance with state

More information

www.yourchoicecounselling.co.uk (the "Website") is provided by Your Choice Counselling.

www.yourchoicecounselling.co.uk (the Website) is provided by Your Choice Counselling. Your Choice Counselling. Website Legal Notice Important - this is a legal agreement between you and Your Choice Counselling. Registered office: 2 Seaford Close, Burseldon, Southampton, Hampshire SO31 8GL

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers. CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res. 255-10 Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software

More information

HART TELEPHONE COMPANY SERVICE TERMS AND CONDITIONS OF SERVICE

HART TELEPHONE COMPANY SERVICE TERMS AND CONDITIONS OF SERVICE HART TELEPHONE COMPANY SERVICE TERMS AND CONDITIONS OF SERVICE I. GENERAL TERMS These Terms and Conditions of Services govern all services provided by Hart Telephone Company ( Hart ). When you, the Customer,

More information

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research

More information

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites 1 as well as through the Moxi User

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

By the end of this course you will demonstrate:

By the end of this course you will demonstrate: 1 By the end of this course you will demonstrate: 1. that HIPAA privacy rules protect privacy and security of confidential information. 2. your responsibility for use and protection of protected health

More information

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website.

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website. Terms and Conditions of Use Your online payroll is run via for MyPAYE Online Payroll Service Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online

More information

Code - A Date Approved: July 24/01

Code - A Date Approved: July 24/01 Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network

More information

Pulaski Technical College

Pulaski Technical College Pulaski Technical College Internet and E-Mail Acceptable Use Policy 1. Introduction Pulaski Technical College provides faculty and staff with technology resources and a local area network with access to

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems

Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD Employee use of the District s Computer Systems Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important

More information