How To Protect Your Employees From Being Harassed On Social Media (For Women)
|
|
- Vanessa McCoy
- 3 years ago
- Views:
Transcription
1 Surfing, Shopping and Blogging: Regulation of Employee Social Media Use Legal Issues in Higher Education University of Vermont October 17, 2011 Barbara A. Lee Rutgers University and Edwards Angell Palmer & Dodge, LLP Introduction Gilbert Gottfried, the voice of the Aflac duck, was dismissed after making disparaging comments about the earthquake and tsunami in Japan on his Twitter account. A waitress was fired for posting a critical comment about her restaurant employer on her Facebook page. Several public school teachers have been terminated for posting controversial pictures of themselves on their Facebook pages and then allowing their students (and their parents) to view the pictures. Other teachers have been disciplined or fired for complaining about their students on social media sites. And these events happened after work hours. A survey of employees found that 20 percent admitted to using social media for personal purposes during work hours. The reality is probably much higher, unless the employer blocks access to social media, as 25 percent of employers apparently have. 1 The U.S. Supreme Court recently ruled in a case in which police officers used their pagers to exchange sexually explicit messages with their girlfriends (but not their wives), saying that discipline for misuse of such 1 Jon Brodkin, One in four businesses block access to Facebook, social networking sites. Network World, July 8, 2008, available at 1
2 equipment, supported by reading the text messages without the officers permission, did not violate the Fourth Amendment s prohibition of unreasonable searches. 2 Electronic communications and social media have an enormous impact on every aspect of a college s operations, from student recruitment to communication to students, faculty and staff to teaching and research. Legal problems can arise when employees use social media and electronic communications in ways that expose the college to potential litigation; other legal problems may occur when the college uses information gathered from social media or electronic communications to discipline, dismiss, or refuse to hire an employee. Several of these legal issues are discussed below. Social Media and Privacy Although and social media use has burgeoned in recent years, the law has not kept up with changes brought by technology. One major issue that can have legal implications is the employee s privacy rights, particularly if the employee works at a public college or university. The Fourth Amendment of the U.S. Constitution protects individuals from government seizure of property, which could include or other communications, without probable cause. Employees at both public and private colleges have a common law right of privacy in personal information. There are methods for reducing an employee s expectation of privacy, as well as for ensuring that claims of invasion of privacy are appropriately defended. The college should (and probably does) have an acceptable use policy that delineates how employees may use the employer s equipment (computers, handheld devices, etc.) and information systems (access to 2 City of Ontario v. Quon, 130 S. Ct (2010). 2
3 the internet and ). That policy should be reviewed by the college s counsel to make it clear that employees have no expectation of privacy in their communications that use the college s system or the college s computers or other hardware. It should also make it clear that, if employees use the college s internet system and/or computer equipment to access their personal account, the college s monitoring systems will pick up those communications and will store them as well. The acceptable use policy MUST be written in layperson s terms so that it is clear and understandable. A New Jersey company lost a lawsuit when the court ruled that its acceptable use policy did not sufficiently warn employees that the company could monitor their personal e- mail messages if company equipment or systems were used. In Stengart v. Loving Care Agency, 3 an employee used a company-owned laptop to communicate with her attorney on her personal account about her prospective discrimination lawsuit against the company. When she resigned and turned in the laptop, even though she had deleted messages from her personal account, the company s IT specialist was able to retrieve those messages. The court ruled that the language of the company s acceptable use policy, which said that messages using the company s media systems were subject to the company s policy, was insufficiently clear to provide notice to the employee that her messages could be retrieved. With respect to social media, anything that is posted on an individual s Facebook page is public information unless the poster specifies that only friends can access the information, and tweets on Twitter are also public information for anyone with a Twitter account. Even if information on an individual s Facebook page is limited to friends, those friends can share the private information with their own friends. In some cases, colleges ask applicants for 3 employees- social- networking.html (N.J. 2010). 3
4 employment to provide their Facebook password so that they can view the page. This requirement, while not illegal in itself, could lead to legal problems if the applicant is not hired because of information on the Facebook page that is linked to race, gender, political affiliation, or a host of other matters that are not relevant to the applicant s qualifications for the position and are protected by law. On the other hand, employers who know that employees are misusing their computer and information systems may be liable for civil or criminal violations by their employees. In Doe v. XYC Corporation, 4 an employee was using the company s computer to create, upload and download child pornography, which is a felony. The supervisor and information technology director knew that he was visiting pornographic websites, but hesitated to discipline him because they mistakenly thought he had a right to privacy in his use of the company s computer. Company policy explicitly prohibited this type of misuse of the company s equipment and systems, and stated that employee use would be monitored. After police found pictures of child pornography in the company s trash, the employee was arrested and his wife sued the employer because the employee had been uploading pictures of her daughter onto child pornography sites using the company s computer and internet access. The court ruled that the company could be liable to the wife for negligence, saying an employer who is on notice that one of its employees is using a workplace computer to access pornography, possibly child pornography, has a duty to investigate the employee's activities and to take prompt and effective action to stop the unauthorized activity, lest it result in harm to innocent third-parties. No privacy interest of the employee stands in the way of this duty on the part of the employer A.2d 1156 (N.J. App. Div. 2005). 4
5 Acceptable use policies are essential to avoid invasion of privacy claims and to enable the college to respond appropriately to allegations of misuse. An interesting issue involves the use by faculty of college computer systems and programs. Employees of public colleges in states with open public records laws have, in some cases, found that their s have been requested under these laws. Contrary to the belief of many faculty members, academic freedom may not protect faculty from this disclosure, unless there is a specific exemption in the open public records law for faculty work product (such as research results or unpublished manuscripts) or the college determines that it will not release communications deemed to be private. 5 Faculty at private colleges have greater protection, but and other communications could be required to be turned over if they are relevant to litigation against the college (or the faculty member). Finally, employees may inadvertently or deliberately disclose confidential information in s or on social media sites, which could threaten a pending patent, violate the Family Educational Rights and Privacy Act, or disclose trade secrets. They may also post messages that are offensive on the basis of protected characteristics such as race, gender, sexual orientation, etc., leading to discrimination or harassment claims. They may blog about the college in a way that either demeans the college or its competitors a potential violation of the Federal Trade Commission regulations on fairness in business practices. They may demean other employees, students, or outsiders which could lead to defamation lawsuits. But employer use of social media can lead to litigation as well. 5 Sara Hebel, Wisconsin-Madison to Release Professor s s but Withhold Those Said to be Private. Chronicle of Higher Education, April 1, 2011, available at Release/126994/. 5
6 Using Social Media to Investigate Applicants According to the Equal Employment Opportunity Commission, 75 percent of corporate recruiters do online research to screen applicants, and 70 percent of recruiters have rejected candidates on the basis of online information. 6 Over one third had rejected an applicant based upon information found in social media. Applicants were rejected on the basis of provocative or inappropriate photographs, evidence of excessive drinking or drug use, criticism by the applicant of a current or former employer in social media postings, evidence of poor communication skills (grammar, spelling), discriminatory comments, evidence that the applicant lied about his or her qualifications, and the sharing of an employer s confidential information. Because of the potential for discrimination claims if employers use social media to screen applicants, some employers separate the responsibilities for screening from those for hiring. For example, the screener, whether it be a staff member or an external background checking service, can remove all references to race, age, gender, and other protected characteristics from the screening report. It is a best practice to keep a written record of the scrubbed screening information and a written rationale for the college s decision not to hire the individual. And having a written policy, on how screening will be done, and following it carefully, should help defend against litigation. If the college uses an outside vendor to perform part or all of the screening or background checks, it is also important to have the applicant sign a form allowing the check to be done, and given a statement of the applicant s rights, in compliance with the Fair Credit Reporting Act. 6 Jennifer Preston, Social Media History Becomes a New Job Hurdle. New York Times, July 21, 2011, B1, B4. 6
7 Social Media and Employee Discipline Social media can be helpful or harmful to a college s attempt to deal with employee misconduct or performance problems. The prevalence of social media means that employees might engage in prohibited conduct while away from work, but the effect of that conduct may disrupt the working relationships and, perhaps, create legal liability for the college. It is classic sexual harassment law that sexual harassment off work time or away from the workplace by a peer or supervisor that is a result of the work relationship can be a reason to discipline the harasser. The translation of this law to the use of social media to harass a peer or subordinate is not perfect, however. Since the medium of social media is primarily words (and to a lesser extent pictures, including videos), first amendment concerns may arise in public colleges and universities. The recent decision of the U.S. Supreme Court in Snyder v. Phelps, 7 in which the Court ruled that the first amendment protected offensive picketing at military funerals, suggests that some forms of verbal harassment, particularly if conducted away from work and not on work time, might be difficult to punish. On the other hand, the law treats electronicallygenerated speech pretty much the way it treats speech in general. Much would depend upon to whom the speech was directed, the nature of the relationship between the poster and the target (supervisor? peer? member of the public?) and the effect on the efficient operation of the college. Employees who disclose confidential information on social networking sites may be disciplined if the same actions would ordinarily be grounds for discipline. For example, a faculty member who displayed a picture of students without their permission on a Facebook page, or who discussed students by name in a blog, or even who referred to a student in a way S. Ct (2011). 7
8 that made the student personally identifiable (such as complaining about the starting quarterback) in a tweet could potentially be disciplined. Those who discuss confidential research projects, violate confidentiality requirements during searches, or defame their colleagues (or students) could also potentially be disciplined particularly, in public institutions, if the message were not a matter of public concern. But there are exceptions. Recently the National Labor Relations Board (NLRB), which regulates collective bargaining in the private sector, issued a complaint against a company (not a college) that had dismissed an employee who complained about her supervisor on her Facebook page. The NLRB asserted that the employee had been engaging in protected concerted activity under Section 7 of the National Labor Relations Act, particularly because co-workers responded to her posting and she subsequently posted additional criticisms of both him and the company. The NLRB s general counsel commented: This is a fairly straightforward case under the National Labor Relations Act whether it takes place on Facebook or at the water cooler, it was employees talking jointly about working conditions, in this case about their supervisor, and they have a right to do that. 8 The case was later settled. But individual employee grievances are not protected under Section 7, and discipline for that type of comment on social media would not violate the law. Comments that disparage clients (or students) would typically not be protected under Section 7, or under a public employee collective bargaining law with a similar provision. And in Pietrylo v. Hillstone Restaurant Group, 9 employees accused the company of violating the federal Stored Communications Act, which prohibits disclosure of personal 8 Steven Greenhouse, Labor Board Says Rights Apply on Net, New York Times, November 9, U.S. Dist. LEXIS (D.N.J. 2008). 8
9 electronic messages without permission of the sender of the message, as well as invasion of privacy and wrongful discharge. Two wait staff at one of the company s restaurants began a MySpace group for employees to vent about any BS we deal with at work. The chat group included profanity toward company managers and sexual remarks. A member of the chat group informed a manager of the website and showed him the page. Another manager asked that employee for the password to the chat group; she provided it, but claimed in the litigation that she had felt coerced to do so. The managers fired the employees who had created the webpage. The company moved for summary judgment, but the trial court granted the motion only on the wrongful discharge claim, leaving the claims concerning the Stored Communications Act and the invasion for a jury to determine. A jury found that the company had violated the Stored Communications Act because the individual who provided the password did not do it voluntarily. 10 Social media are used by employers to investigate other types of employee misconduct. For example, the Family and Medical Leave Act protects only those employees with a serious health condition (or family leave responsibilities) that prevent the employee from working fulltime. Employers may discipline or dismiss employees whose Facebook postings or tweets indicate that they have gone on vacation, taken a second job, or otherwise behaved in ways inconsistent with their claim that they cannot work because of health problems or their family responsibilities. Employees who cannot work because of a job-related injury may receive worker s compensation benefits. Although stories are legion about video monitoring of employees who, 10 Employees may also be found liable for violations of the Stored Communications Act or the Electronic Communications Privacy Act. See, for example, United States v. Szymuszkiewicz, 622 F.3d 701 (7 th Cir. 2010)(employee forwarded supervisor s to his account without her permission). 9
10 while on worker s compensation, are repairing their roof or shoveling snow, Facebook postings or tweets may be a simpler way to ascertain whether an employee receiving worker s compensation benefits is actually deserving of them. Similarly, an employee who has been accommodated for a disability, and whose postings, blogging, or tweets indicate that the disability is either nonexistent or less serious than reported, may be a candidate for discipline or dismissal. Although not an employment case, one particularly interesting example of an employee caught in a lie via her Facebook page occurred during a products liability case against Steelcase, a manufacturer of office furniture. Kathleen Romano sued Steelcase in a products liability claim after she fell from her office chair. She claimed that she had serious back and neck injuries, pain, and progressive loss of enjoyment of her life. Steelcase located her Facebook and My Space pages online, and asked for access to the private portions of these websites. She refused, and the defendant, Steelcase, subpoenaed that information. The defendant noted that Ms. Romano had posted pictures of herself outside her home, smiling, which contradicted her claim that she spent much of her time in bed. Her daughter s Facebook page indicated that the family had recently travelled to Florida, contradicting the plaintiff s assertion that she could not travel as a result of the injury. The judge granted the motion to disclose the private portions of the plaintiff s social media pages. Strategies for Minimizing Liability and Problems Although social media is seemingly ubiquitous, the law related to social media is still developing. Good policies that are carefully followed are essential to avoid litigation and ensuing liability. Thoughtful use and referral to social media are also critical. When to have a 10
11 thick skin and when to pursue violations of a college s acceptable use and social media policies are judgment calls, not legal principles. But the following suggestions may help: Develop a policy on social networks For college-sponsored pages/websites For employee s use of social media At work On nonwork time (especially for managers and supervisors) Specify whether employees are permitted to use college equipment and internet access for personal purposes (acceptable use policy); if you plan to monitor their use of college equipment and internet access, say so. State clearly that employees have no right of privacy in communications that use the company s equipment or data systems, including internet access. This includes the use of the company s internet access from a personally-owned computer or other device (e.g. BlackBerry or iphone). Have them sign a copy of the policy. Develop an internal policy for recruiters or hiring authorities re: what kind of information will be reviewed on social networks; ensure that only job-related information is used. Monitor the college s social media pages for examples of harassment of fellow employees, misuse of confidential college information, etc. Respond promptly to complaints by employees of harassing or defamatory material on personal social media sites. In such cases, evaluate when the posting was done, at what time, what the relationship is between the parties (Work? Personal?) 11
12 Use caution when considering discipline of an employee for posting content on a personal social network site if done on non-work time. Be careful to draw a strong relationship between the alleged misconduct and the business interests of the college. Train employees, and especially supervisors, on the college s social media policy. Ensure that managers understand that monitoring employee adherence to the policy is part of their job. 12
Internet & Technology Usage in the Networked Workplace: Legal Implications
Internet & Technology Usage in the Networked Workplace: Legal Implications EDDY D. VENTOSE PROFESSOR OF LAW UNIVERSITY OF THE WEST INDIES, CAVE HILL CAMPUS The Employment Process 2 Recruitment Process
More informationSocial Media Dominance
Social Media Survival Guide: Hiring and Firing in the Era of Social Media Denise M. Visconti dvisconti@littler.com Adam Rosenthal arosenthal@littler.com Littler Mendelson, P.C. 501 W. Broadway Suite 900
More informationSocial Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
More informationINVESTIGATIONS GONE WILD: Potential Claims By Employees
INTRODUCTION INVESTIGATIONS GONE WILD: Potential Claims By Employees By: Maureen S. Binetti, Esq. Christopher R. Binetti, Paralegal Wilentz, Goldman & Spitzer, P.A. When can the investigation which may
More informationVirginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
More informationSOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE
New Jersey League of Municipalities SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE Presented by: BRIAN W. KRONICK, ESQ. Genova, Burns & Giantomasi (973) 533-0777 November
More informationEmployment Law Issues in Social Media
Employment Law Issues in Social Media John Nadolenco Partner, Los Angeles Andrew Rosenman Partner, Chicago (213) 229-5173 (312) 701-8744 jnadolenco@mayerbrown.com arosenman@mayerbrown.com Mayer Brown is
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationMedia Traps. Attorney Nilesh P. Patel
Workplace Social Media Traps Attorney Nilesh P. Patel Mahadev Law Group, LLC Human Resources & Employment Law Solutions www.mahalawgroup.com npp@mahalawgroup.com 877-210-2499 Definition: Online forums
More informationFriending and Tweeting in the Workplace: The Impact of Social Media on Corporate America
Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America Presented by Mark A. Pihart (612) 604-6623 mpihart@winthrop.com Potential Legal Exposure Due to Employee Use of
More informationConsult with your Attorney
Social Media Policies and Procedures John Cummings, MBA, PHR, CIC Risk Management Program Manager Montana Municipal Interlocal Authority Consult with your Attorney The Acting General Counsel s Reports
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationManaging Social Media Employment Issues
Managing Social Media Employment Issues October 1, 2013 Katie Carder McCoy 206.447.2880 cardk@foster.com Presentation Outline: What is social media and who cares? Risks of employer-sponsored social media,
More informationHuman Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationI. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
More informationLegal Ramifications of the Social Media Explosion: An Employer s Guide
SUMMIT LAW GROUP a professional limited liability company Legal Ramifications of the Social Media Explosion: An Employer s Guide 30 th Annual Labor Relations Institute April 28-30, 2010 Kristin D. Anger
More informationSocial Media in the Workplace: Avoiding Legal Pitfalls
Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:
More informationLE.201 Employee Privacy Rights in the Electronic/Social Media Age
LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,
More informationThe New World of Social Media: Business and Legal Risks
March 2, 2010 The New World of Social Media: Business and Legal Risks Call-In Details: United States/Canada: 1-800-214-0694 All other countries: 1-719-955-1425 Participant Passcode: 165381 www.marsh.com
More informationNorth Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
More informationSocial Media in the Workplace OMG!
Social Media in the Workplace OMG! June 28, 2012 Jenna Bedsole and Rachel VanNortwick Baker, Donelson, Bearman, Caldwell & Berkowitz Birmingham, Alabama 205-328-0480 jbedsole@bakerdonelson.com rvannortwick@bakerdonelson.com
More informationLEBANON LOCATOR: 4118.4(a) & 4218.4(a) Board of Education SECTION: PERSONNEL POLICY INFORMAL APPROVAL DATE: 11/22/11 FORMAL APPROVAL DATE: 4/10/12
LEBANON LOCATOR: 4118.4(a) & 4218.4(a) Board of Education SECTION: PERSONNEL POLICY INFORMAL APPROVAL DATE: 11/22/11 FORMAL APPROVAL DATE: 4/10/12 REV EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND
More informationSocial Media is Pervasive
HR Liabilities of The Digital Age ABC Webinar September 29, 2010 Social Media is Pervasive Facebook 500+ million users Blogs 200 million bloggers Twitter 75 million users LinkedIn 50 million users Results
More informationJohn McGowan and Tim Pinos Corporate Counsel Seminar Series 2008. Vicarious Liability. June 3, 2008. 2007 2008 Cassels Brock
John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008 Vicarious Liability June 3, 2008 Overview Vicarious Liability Background Office Parties Social Host Liability Employee Internet Use Cell
More informationR U Looking @ My Cookies? Sexual Harassment In The Age Of Technology
R U Looking @ My Cookies? Sexual Harassment In The Age Of Technology R U LOOKING @ MY COOKIES? SEXUAL HARASSMENT IN THE AGE OF TECHNOLOGY MODERATOR: Mercedes Colwin, Esq. - Managing Partner - New York
More informationSocial Media - The New Frontier
The New Frontier: Social Media and Employment Law PowerPoint Presentation by: Frank E. Melton, Rutter Hobbs & Davidoff Incorporated Los Angeles, CA David M. Villadolid, Burch & Cracchiolo, P.A. Phoenix,
More informationSocial Media and the Workplace: Potential Liability to Employees
Social Media and the Workplace: Potential Liability to Employees Rosanna Sattler Nancy Puleo Posternak Blankstein & Lund, LLP Boston, MA E mployees in almost every workplace use social media such as personal
More informationsection 15 Computers, Email, Internet, and Communications
section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationGrand Rapids Public Schools
4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers
More informationPacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More information(1) It was something fairly and naturally incidental to the employer's business assigned to the employee; and
Employer Liability for Employee Conduct by Lisa Mann 05-01-2000 EMPLOYER LIABILITY FOR EMPLOYEE CONDUCT: When Does An Employer Have to Pay? by Lisa Mann Modrall, Sperling, Roehl, Harris & Sisk, P.A. Employers
More information4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS
4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective
More informationSocial networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.
THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Social Networking, Mobile Devices, and the Cloud: The Newest Frontiers of Privacy Law By David J. Goldstone and Daniel B. Reagan
More informationSocial Networking, Privacy, and Employee Speech in the Workplace
Social Networking, Privacy, and Employee Speech in the Workplace PRESENTED BY Pam Salgado (206) 521-6406 Pam.Salgado@Bullivant.com Katherine Somervell (503) 499-4454 Katherine.Somervell@Bullivant.com Brian
More informationFORC QUARTERLY JOURNAL OF INSURANCE LAW AND REGULATION
The plaintiff in Schmidt filed suit against her employer, Personalized Audio Visual, Inc. ("PAV") and PAV s president, Dennis Smith ("Smith"). 684 A.2d at 68. Her Complaint alleged several causes of action
More informationFORM INTERROGATORIES EMPLOYMENT LAW
ATTORNEY OR PARTY WITHOUT ATTORNEY (Name, State Bar number, and address): TELEPHONE NO.: FAX NO. (Optional): E-MAIL ADDRESS (Optional): ATTORNEY FOR (Name): SUPERIOR COURT OF CALIFORNIA, COUNTY OF SHORT
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationBASIC CONCEPTS IN EMPLOYMENT LAW
BASIC CONCEPTS IN EMPLOYMENT LAW Jeffrey A.L. Kriwetz Partner Garfinkle, Biderman LLP Suite 801 1 Adelaide Street East Toronto, Ontario M5C 2V9 416.869.1234 ext. 234 416.869.0547 (fax) jkriwetz(ii2garfinkle.com
More informationThe City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
More informationUSE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE. Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant
USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant Employee Misuse of Social Media Employees Misuse Social Media By: Disclosing
More informationSEXUAL HARASSMENT POLICY STATEMENT
SEXUAL HARASSMENT POLICY STATEMENT The company is committed to providing a workplace that is free from all forms of discrimination, including sexual harassment. Any employee's behavior that fits the definition
More informationPitfalls of Social Media in the Workplace
Pitfalls of Social Media in the Workplace Presented by Michael C. Terrell Taft Stettinius & Hollister LLP 1 Overview of Social Media Popular Sites: Facebook Twitter LinkedIn Pinterest Google Tumblr Instagram
More informationSocial Media in the Workplace. Stacey L. Smiricky Partner, Labor & Employment Group
Social Media in the Workplace Stacey L. Smiricky Partner, Labor & Employment Group Lessons Learned Employee who called in sick later places a status update on his Facebook page announcing sick day at Wrigley
More informationBRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
More informationThe Basics of Sexual Harassment
The Basics of Sexual Harassment Sexual Harassment is a violation both of Federal Law and the laws of most states. For employers, it is fairly easy to take steps to prevent sexual harassment and to defeat
More informationBender s Article on MCAD Sexual Harassment Guidelines. by David B. Wilson 1. Introduction
Bender s Article on MCAD Sexual Harassment Guidelines The Massachusetts Commission Against Discrimination s Sexual Harassment Guidelines: Blueprint for Proper Behavior in the People s Republic of Massachusetts
More informationDEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL
DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL Personnel Directive Subject: PROCEDURE FOR PREVENTING AND/OR RESOLVING PROBLEMS RELATED TO SEXUAL HARASSMENT ADOPTED BY THE BOARD OF PUBLIC WORKS, CITY OF LOS
More informationSocial Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
More informationTOLLAND PUBLIC SCHOOLS Tolland, Connecticut
TOLLAND PUBLIC SCHOOLS Tolland, Connecticut ADMINISTRATIVE REGULATION REGARDING: Employee Use of the District s Computer Systems Number: 4110 Administrative Approved: 2/28/01 Revised: 4/26/06 Revised:
More informationAugust 2007 Education and Membership Development Department
August 2007 Education and Membership Development Department Table of Contents Title VII of the Civil Rights Act of 1964 3 What is Sexual Harassment? 3 4 How Can Sexual Harassment Occur? 4 5 When is an
More informationOVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor astorey@rudman-winchell.com I. USE OF INFORMATION DURING HIRING PROCESS
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More informationEMPLOYER S DUTY TO MONITOR WEBSITE USE
EMPLOYER S DUTY TO MONITOR WEBSITE USE An employer must carefully administer the actions of his or her employees for several reasons. Under New York law, it is well settled that under the doctrine of respondeat
More informationPOLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS
POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important
More informationSocial Media Issues AHLA Physicians & Hospitals Law Institute February 2012
Social Media Issues AHLA Physicians & Hospitals Law Institute February 2012 Kimberly W. Daniel, Esq. Hancock, Daniel, Johnson & Nagle, P.C. Maria Greco Danaher Ogletree, Deakins, Nash, Smoak & Stewart,
More information719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
More informationPolicy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems
Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD Employee use of the District s Computer Systems Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important
More informationSEXUAL HARASSMENT DISCRIMINATION COMPLAINT PROCEDURE
SEXUAL HARASSMENT DISCRIMINATION COMPLAINT PROCEDURE The policy of the City of Los Angeles is to promote and maintain a working environment free of sexual harassment, intimidation, and coercion. Sexual
More informationSocial Media An Employment Nightmare. Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C.
Social Media An Employment Nightmare Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C. Show of hands: Who uses social media to screen job applicants?
More informationSmart Policies for Workplace Technologies Email, Blogs, Cell Phones & More
Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More By Lisa Guerin, J.D. Nolo, 2011, ISBN:1-4133-1326-0 Price $26.95, pp. 225 pages Reviewed by Nina T. Dow Journal of High Technology
More informationOrganizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
More informationDo You Have A Criminal Conviction History? A GUIDE TO YOUR EMPLOYMENT RIGHTS IN NEW YORK
Do You Have A Criminal Conviction History? A GUIDE TO YOUR EMPLOYMENT RIGHTS IN NEW YORK Introduction Searching for the right job can be difficult. It can be harder if you have a criminal conviction history,
More informationTerms of Use The Human Face of Big Data Website
Terms of Use The Human Face of Big Data Website Effective Date: September 12 th, 2012 Welcome to The Human Face of Big Data, a project of Against All Odds Productions ( AAOP ). The Human Face of Big Data
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More informationCITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE
CITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE The policy of the City of Los Angeles has been, and will continue to be, to promote and
More information(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationRisks and Rewards of Social Media Use by Local Government
Social Media Risk Scenarios Social media are Internet tools for sharing information with an audience that wants to connect about issues of common interest. Examples are the ubiquitous Facebook, Twitter
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationMoreover, sexual harassment is a violation of federal, state and county fair employment laws.
Sexual harassment interferes with a productive working environment, interjects irrelevant considerations into personnel decisions and generally demeans employees who are victims of harassment. Moreover,
More informationGREENWICH PUBLIC SCHOOLS Greenwich, Connecticut
Policy E-040 Effective Learning Environment GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Procedure E-040.4 - Acceptable Use and Internet Safety Agreement Acceptable Technology Use Regulations/Internet
More informationHuman Resources People and Organisational Development. Disciplinary Procedure for Senior Staff
Human Resources People and Organisational Development Disciplinary Procedure for Senior Staff AUGUST 2015 1. Introduction 1.1 This procedure applies to Senior Staff. Senior Staff includes: 1.1.1 the Vice-Chancellor
More informationSEXUAL HARASSMENT. Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016
SEXUAL HARASSMENT Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016 1 Agenda Overview-Why talk about sexual harassment? Why get training? Statistics What is sexual harassment?
More informationComputer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
More informationHow To Use The Blog Safely And Responsibly
BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed
More informationSocial Media and the Employer-Employee Relationship. Tracy Richelle High, Partner and Christina Andersen, Associate, Sullivan & Cromwell LLP
Social Media and the Employer-Employee Relationship Tracy Richelle High, Partner and Christina Andersen, Associate, Sullivan & Cromwell LLP The widespread popularity of social media presents novel challenges
More informationThe Top Ten Of Public Computers And Their Perpetuation
2.10 PUBLIC COMPUTER USE POLICY The Library offers public computers that patrons may use to access the Internet or perform computer-assisted tasks using basic applications software for word processing,
More informationFair Employment Practices
In the GE Community Fair Employment Practices (Policy 20.2) Issued: October 2000 Supersedes: April 1993 GE is committed to fair employment practices, including the prohibition against all forms of illegal
More informationSocial Media in the Workplace
Social Media in the Workplace Employer Best Practices Presented by: Michelle Perris, HR Consultant Robin Niel, Senior HR Consultant hrconsulting@jwterrill.com www.jwterrill.com Social Media in the Workplace
More informationIn a dispute between an employee and an employer, the average juror tends to believe the: Employee 59% Employer 41%
Perspectives Insights From Colleagues of UE Juror Attitudes in Harassment and Discrimination Suits By Dan Gallipeau and Steven Gerber Before deciding whether to take a case to trial, employers including
More informationEMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS. Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out.
EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out. Last year, 15,222 charges of sexual harassment were filed
More informationTAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
More informationON THE JOB. Employment
ON THE JOB Employment In order to work in the United States, you must have a social security number, as required by the federal Social Security Act. If you do not have a social security number, you have
More informationMentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
More informationPasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
More informationA Nurse s Guide to the Use of Social Media
A Nurse s Guide to the Use of Social Media A Nurse s Guide to the Use of Social Media A nurse must understand and apply these guidelines for the use of social media. The use of social media and other electronic
More informationPlaintiff s Attorney Perspective: Practical Advice for Preventing Workplace Discrimination Claims
Plaintiff s Attorney Perspective: Practical Advice for Preventing Workplace Discrimination Claims Today s Speaker: William L. Brown, Esq. SPEAKER William L. Brown is an attorney with the Kasieta Legal
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationElectronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationPolicy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationThe Boundaries Of Monitoring Employee E-Mail
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com The Boundaries Of Monitoring Employee E-Mail
More informationDauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
More informationBefore you fire or otherwise discipline an employee on the basis of a social media post, consult your organization s lawyer
October 15, 2013 Emily Sneddon Mitchell, Blackstock, Ivers & Sneddon, PLLC 1010 W. Third St. Little Rock, AR 72201 (501) 378-7870 esneddon@mitchellblackstock.com These materials are for instructional purposes
More information