EMPLOYEE PRIVACY: Important Information Regarding Monitoring Employee Communications and Computer Usage

Size: px
Start display at page:

Download "EMPLOYEE PRIVACY: Important Information Regarding Monitoring Employee Communications and Computer Usage"

Transcription

1 EMPLOYEE PRIVACY: Important Information Regarding Monitoring Employee Communications and Computer Usage Francine Breckenridge Strasburger & Price, LLP

2 Overview Why Employers Monitor Employees The Fourth Amendment & City of Ontario v. Quon Federal Statutes Texas Common Law Privacy & the Attorney-Client Privilege Case Scenarios Social Media Emerging Technology & Privacy Law Takeaways & Recommendations

3 Why Do Employers Monitor Employees?

4 Reasons for Monitoring Employees Supervise and manage employee performance, quality of work, training, and customer service Protection and control of business property and confidential information Reduce misuse of internet and surfing the internet/social networking sites, playing internet games, accessing pornography, sending sexually related messages, gambling, shopping, etc. Limiting exposure to sexual harassment and hostile work environment claims

5 Reasons NOT to Monitor Employees Can lower employee morale May learn personal information you wish you did not know Has potential to create retaliation claims and/or unfair labor practice claims

6 Potential Legal Exposure for Not Monitoring Employees Most Common Sexual Harassment and Hostile Work Environment Vicarious Liability for Supervisor s Conduct Extreme Case of Potential Employer Liability: Doe v. XYC Corp. (N.J. Sup. Ct. App. Div. 2005) Negligence for failing to properly monitor employee after notice of improper behavior Other Cases where customers received threatening s from employees have not resulted in employer liability because such activities were outside the scope of employment or not part of the employee s job duties

7 Potential Legal Exposure for Monitoring Employees Retaliation and/or unfair labor practice claims based on employer knowledge of complaints about: Discrimination Wages Safety issues Accounting irregularities Terms and conditions of employment generally Invasion of privacy

8 Legitimate Business Interest Even if employees have a reasonable expectation of privacy in their work (which they generally do not), an employer s legitimate business interest in protecting its employees from harassment in the workplace would likely trump any privacy interests.

9 The Right to Privacy The Constitution, Statutes, and the Common Law

10 The Right to Privacy in the United States The legal right to privacy derives from three areas: Constitutional Law Statutes Common Law Common Theme: All require an underlying expectation of privacy which can be invaded by an unreasonable intrusion.

11 The Fourth Amendment The right of the people to be secure against unreasonable searches and seizures.

12 The Fourth Amendment Protection from Government Intrusion into Privacy Katz v. United States (1967) The Fourth Amendment protects people, not places. What a person seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected. A person must have an actual, subjective expectation of privacy and that expectation must be one that society is prepared to accept as reasonable.

13 The Fourth Amendment In Leventhal v. Knapek (2d Cir. 2001), an employee alleged that his employer violated the Fourth Amendment after it searched the hard drive on his office computer. The Court concluded the employee had a reasonable expectation of privacy in the contents of his computer because it was (1) in the employee s private office, (2) the computer was not shared with others, (3) and the agency never placed the employee on notice that he should have no expectation of privacy. Nevertheless, the Court found the employers search regarding the employee s misconduct to be justified and of appropriate scope.

14 The Fourth Amendment The Fourth Amendment applies directly only to public-sector employees, but because the Fourth Amendment and common law rights both require an underlying expectation of privacy, the analysis is generally the same in this regard. There is no definitive test to determine what is and is not private. The first question will always be whether the employee, public or private, has a reasonable expectation of privacy. If not, the employer cannot be liable.

15

16 Federal Statutes Electronic Communications Privacy Act of 1986 ( ECPA ) Title I restricts the use of wiretaps but has little impact on an employer s ability to monitor employee telephone calls because of the business use exception. Title II The Stored Communications Act ( SCA ) makes it illegal to access stored electronic communications without authorization but exempts seizures by providers of electronic communications services.

17 Title I of the ECPA Title I prohibits a person from intentionally Intercepting any wire, oral, or electronic communication Using an electronic, mechanical, or other device to intercept an oral communication Disclosing to any other person or using the contents of a wire, oral, or electronic communication that has been obtained in violation of the law Covered Practices: Listening to telephone calls, recording office conversations, intercepting or voic Not Covered: Video surveillance

18 Title I of the ECPA Exceptions Consent (unless the interception is for the purpose of committing any criminal or tortious act) Examples Person intercepting the communication is a party to the communication One of the parties has given prior consent to the interception Types Express Employees sign an agreement Implied Surrounding circumstances indicate that the party knowingly agreed to the surveillance (knowledge alone of the capability of monitoring is not sufficient) Business Use Ordinary Course of Business

19 Title I of the ECPA The employer must be able to justify a legitimate business purpose for continually monitoring employee telephone calls on a constant basis. Monitoring personal calls ordinary course of business? If company policy allows for personal calls, must stop after call determined to be personal.

20 City of Ontario v. Quon Case Background Police department officials obtained transcripts of text messages between 2 police officers and another government employee while investigating billing and whether department-issued pagers were being used for non-work purposes. The information was obtained without the employees specific consent and revealed personal text messages, many of which were sexually explicit. The City s policy did not directly address text messaging but covered computers and all associated equipment. A police official had informally told employees that no one would review their text messages so long as the employees personally paid for charges above a monthly allowance.

21 City of Ontario v. Quon Employees Claims & The Ninth Circuit s Opinion The employees sued the City, the wireless communications company, the police department, and others for alleged violations of the Fourth Amendment as well as the Stored Communications Act. The Ninth Circuit held that the City s review of the messages without the employees consent was excessively intrusive, given the department s informal policy that it would not audit the employees texts.

22 City of Ontario v. Quon U.S. Supreme Court Reverses On June 17, 2010, the U.S. Supreme Court held that the City s review was reasonable and did not violate the Fourth Amendment. The Court noted that the search was justified at its inception because it was necessary to determine whether the City s communications contract was sufficient to meet the City s needs. The reason for the search was legitimate and work-related as the City had an interest in ensuring that employees were not being forced to pay for work-related expenses out of their own pockets or that the City was not paying for extensive personal communications.

23 City of Ontario v. Quon U.S. Supreme Court Reverses The search was also not excessively intrusive because the department only reviewed transcripts for two months and all messages sent while the officers were off duty were redacted. The Court concluded that simply because the search revealed intimate details of the employees lives, the search was not unreasonable because under the circumstances, a reasonable employer would not expect that such a review would intrude on such highly private details.

24 City of Ontario v. Quon Impact on Employers and the Future that the employer had a legitimate reason for the search, and that the search was not excessively intrusive in light of the justification the Court also concludes that the search would be regarded as reasonable and normal in the private-employer context. The case was decided on narrow grounds to avoid the risk of error by elaborating too fully on the Fourth Amendment implications of emerging technology before its role in society has become clear.

25 Video Surveillance Open Work Areas There is no expectation of privacy. Nelson v. Salem State College (Mass. 2006) College employee is videotaped by a hidden camera while changing clothes and applying medication in a locked office. A number of employees retained a key to the office. Although the door was locked and the camera was hidden (to monitor after-hours thefts), there was no guarantee of privacy in her work space during office hours.

26 Video Surveillance Areas set aside for personal activities or items are given greater protection. When a locker and break room s purpose was designated for certain employees to safeguard their personal belongings, a court found that the employees had a reasonable expectation of privacy. Rosario v. United States (D. Puerto Rico 2008). Monitoring employees while in the bathroom or dressing room will probably constitute a highly offensive intrusion on an employee s right to privacy. See Cramer v. Consol. Freightways, Inc. (2001); Doe v. B.P.S. Guard Servs., Inc. (8th Cir. 1991).

27

28 Texas Common Law Texas recognizes a tort for invasion of privacy when there is an intrusion upon the plaintiff s seclusion or solitude or into his private affairs. The claim consists of Two Elements: (1) an intentional intrusion, physically or otherwise, upon another s solitude, seclusion, or private affairs or concerns, which (2) would be highly offensive to a reasonable person. When considering the offensive nature of the invasion, courts require the intrusion to be unreasonable, unjustified, or unwarranted.

29 Texas Common Law Two opinions in Texas are often relied on by other Courts. Employee Locker Case K-Mart Corp. v. Trotti (Tex. App. Houston [1st Dist.] 1984, writ ref d) Personal Folders McLaren v. Microsoft Corp. (Tex. App. Dallas, 1999, no pet.) (unpublished opinion)

30 K-Mart Corp. v. Trotti The Court concluded that an employee could reasonably believe personal items stored in a company provided locker would be free from intrusion and interference because the employee was allowed to use his own lock on the locker. The Court left it to the jury to decide if the employer s search of the employee s personal belongings was a highly offensive invasion of privacy. The Court noted that privacy would not be an issue if the employer conducted a legitimate, reasonable search of the company locker where the locker was left unlocked or when the lock was provided by the employer and a master key was retained.

31 McLaren v. Microsoft Corp. Employee saved on Employer s network in a folder that was password protected with the employee s personal password that he created. Employer accessed the folder and the employee sued for invasion of privacy. The Court distinguished the locker in Trotti from the personal folders because the locker was provided to the employee for the specific purpose of storing personal belongings, whereas the plaintiff s computer and the application were provided to him for the purposes of his employment. The storage system involved messages that were transmitted to the server-based inbox and stored there until the plaintiff moved them to his personal folders. The employee had no reasonable expectation of privacy in the contents of the messages such that the employer was precluded from reviewing the messages.

32 Privacy and the Attorney-Client Privilege

33 Privacy and the Attorney-Client Privilege Work Attorney-Client privilege likely waived Four Factor Test Is there a company policy banning personal use of s? Does the company monitor the use of its ? Does the company have access to all s? Did the company notify the employee about these policies? Alamar Ranch, LLC v. County of Boise (D. Idaho 2009) Employee did not attempt to protect the confidentiality of the messages by using a web-based password-protected account. The employer put all employees on notice that their s would (1) become the company s property, (2) be monitored, stored, accessed, and disclosed, and (3) s should not be assumed to be confidential.

34 Privacy and the Attorney-Client Privilege The Court noted that [i]t is unreasonable for any employee in this technological age and particularly an employee receiving the notice [the employee] received to believe that her s, sent directly from her company s address over its computers, would not be stored by the company and made available for retrieval. The Court found that the privilege was waived for both s from the employee to her attorney and the s from her attorney to the employee.

35 Privacy and the Attorney-Client Privilege Personal, Web-Based Attorney-Client privilege may survive Curto v. Medical World (E.D.N.Y. 2006) Company had similar policy as Alamar Ranch (above). Employer accessed s that an employee had sent via her work computer using a personal web-based account, and the employee worked at home where the employer could not carry out the regular monitoring policy it applied to on-site use. The Court found the attorney-client privilege had not been waived. Stengart v. Loving Care Agency (N.J. 2010) Employee used a company-issued laptop computer to access a web-based personal account and exchanged communications with her attorney. The employee anticipated filing a claim against her employer prior to her resignation from the company. Shortly after her departure, she filed an employment discrimination claim and her employer hired a forensics expert to record all files contained on the laptop she had been using. The company found numerous between the employee and her attorney and used it in preparation of its defense.

36 Privacy and the Attorney-Client Privilege In Stengart, the Court focused on the fact that the employee and her attorney clearly did not intend to waive the privilege (attorney-client privilege notices were posted on each ), and the employer s policy did not directly address use of third party accounts in any way. Thus, the Court found the privilege had not been waived. But the Court seemed to suggest that but for the attorney-client privilege issue, an employee might not have a reasonable expectation of privacy in a non-work-related personal account since the employer s computer was used to access the account over the internet.

37 Case Examples

38 Personal Computer at Work Employee uses his personal computer in a public work area and connects to his employer s computer network. The employee did not have any of his files on his computer password protected. In attempting to resolve a problem on the network, the employer searched his computer and found child pornography. Holding: While the employee may have had a subjective expectation of privacy, his failure to take affirmative measures to limit other employees access makes that expectation unreasonable. U.S. v. Barrows, 481 F.3d 1246, 1249 (10th Cir. 2007).

39 Secretly Recorded Oral Communications Between Employees in an Open Work Area Four employees were secretly recorded criticizing their supervisor in the corner of an open work area. Holding: The Court concluded that the employees had a subjective expectation of privacy because the employees intended to have a private conversation. Second, the Court found that the employees expectation of privacy was objectively reasonable because, although the work space was open, the employees took great care to keep the conversation private. Dorris v. Absher, 179 F.3d 420, (6th Cir. 1999).

40 Employee Uses Company Computer at Home Employee was fired after using a computer furnished by his employer for home business use to visit pornographic websites. Company had a written policy that the computer was company s property, was for business use only, and the employer retained the right to inspect the computer. Employee claimed there was an unofficial company policy that permitted home computers to be used for personal use. Holding: The Court rejected the employee s argument on the grounds that the employee could have no reasonable expectation of privacy given the company s written policies. TBG Insurance Services Corp. v. Superior Court (Cal. 2002)

41 Employer Has No Company Policy Employer used its supervisory password to read employee mail sent and received using an office system. Employees were not told that Employer had access using supervisory password and that the was saved in back-up files. Holding: The Court denied summary judgment against an invasion of privacy claim and found that there was a fact issue as to whether the plaintiffs had a reasonable expectation of privacy in their messages and whether the employer s reading of the messages constituted a substantial interference. Restuccia v. Burk Tech. (Mass Super Ct. 1996).

42 Employer Accesses Employee s Personal Web-Based Account Employer accessed employee s personal hotmail account as part of an investigation into whether employee used the employer s internet access for sexual conversations. The employer accessed the account by guessing the employee s password. The employer did not have an internet usage policy. Holding: The Court denied the employer s motion for summary judgment on the invasion of privacy claim. A fact issue existed as to whether accessing plaintiff s e- mail account is highly offensive to a reasonable person and whether plaintiff s account is a place that a reasonable person would consider private. Fischer v. Mt. Olive Lutheran Church (W.D. Wis. 2002).

43 Saving on Company Network and Internet Use Employee was terminated due to excessive internet use and because sexually inappropriate s were found in his folder on the network drive. Company had a policy restricting personal use of office computers and provided notice that activity could be monitored. Holding: The employee s invasion of privacy claim failed because he had no reasonable expectation of privacy in s saved on the network or in the websites he visited at work. Thygeson v. U.S. Bancorp (D. Oregon 2004).

44

45 Facebook s founder Mark Zuckerberg has claimed that the default is social. That means Facebook starts from the assumption that your personal information will be distributed far and wide without your consent.

46 Generation Standby Clearswift s Web 2.0 in the Workplace Report Most employees value trust, and the permission to use the Internet at work whenever they please, over compensation 79% of respondents said over and above job role and pay, the most important thing to them in a job included being trusted to manage their own time, and being trusted to use the Internet as they wish 62% of employees feel they should be able to access Web/social networking content from their work computer for personal reasons (compared to 51% of managers) in order to complete personal tasks "Generation Standby are so attuned to this way of working that even in these economically challenging times, one fifth (21%) would turn down a job that did not allow them to access social networking sites or personal during work time,

47 Issues now grow on Vines Product of Twitter and a new social networking site where people can share looping six second videos Like Facebook, people are using Vine to take videos of their workplace, tagging their videos with the hashtags such as #work, #hatework, #worksucks, or #f**kwork

48 Social Media 54% of CIOs ban the use of social networking sites such as Facebook, YouTube and Twitter at the workplace, but... 77% of workers are on Facebook 61% access Facebook during work hours They average 15 min./day on Facebook 87% don t have a business reason for using it 6% never access Facebook anywhere else 63% of the CIOs have a Facebook account Average company loses 1.5% of productivity per day to Facebook Twitter = 42 I hate my job tweets per hour on a Monday Social media has overtaken pornography as the #1 web activity

49 Houston s in New Jersey Two servers at Houston s sued after they were fired for violating company rules that demand professionalism, teamwork and a positive mental attitude. Servers had created a private MySpace page for their co-workers to air grievances against Houston s. The MySpace page was password protected and access was by invitation only. A co-worker showed the page to a manager. Another manager demanded her login information, and used that to access the postings, showing the website to company executives. Jury found that Houston's managers had violated the Stored Communications Act and the New Jersey Wire Tapping & Electronic Surveillance Act by intentionally accessing the MySpace page without authorization. The jury found in favor of the Defendants on the invasion of privacy claims finding that there was no reasonable expectation of privacy in the MySpace group.

50 Emerging Technology

51 Emerging Technology Global Positioning System (GPS) technology allows employers to track an employee s movements Watches, cars, PDAs, laptops and phones In 2005, 5% of employers used GPS to track employees with cell phones and 8% used it in vehicles. Employees have lost a number of the initial privacy cases related to GPS technology. Radio-frequency identification (RFID) would provide the ability for employers to constantly monitor the whereabouts of their employees. A few states have already banned mandatory implants. Arguments: Loss of privacy, dehumanization, demoralization, employee activism, overstepping Benefits: Employee safety, property protection, and efficiency

52 Emerging Trend? No personal access at work? King & Spalding, LLP took extreme step to combat hackers and banned employee access to all personal s (e.g. Yahoo, Gmail) Approach came as a result of advice from its internal security experts and outside consultants who say continued access to external systems creates a significant security risk. Beginning May 1, the firm will enable software on its internal network that blocks employees' access to popular -hosting sites and prohibit workers from logging into other personal accounts that are not included in the filter or can be accessed from other networks.

53 Takeaways & Recommendations

54 Takeaways While some courts hold that the employer must institute a policy of active monitoring and auditing to eliminate any expectation of privacy, employers legitimate business interests will generally outweigh an employee s expectation of privacy, if any. Even when an employee has a subjective reasonable expectation of privacy, it is protected against only an offensive invasion (or unreasonable search). Employee expectations of privacy will likely diminish even further as monitoring technologies become more generally available. The Supreme Court in Kyllo v. United States ruled that the use of thermal imaging technology to measure the heat emanating from a suspect s home required a search warrant because the technology used was not in general public use. In dissent, Justice Stevens noted that according to the majority, privacy protection dissipates as technology develops and enters general public use. Thus, the threat to privacy grows as more advanced monitoring equipment becomes more readily available.

55 Recommendations An employer should reexamine its policies to make sure they are sufficiently broad enough to include all types of communications used by employees and that they are actually followed by the company Adopt a social media policy Permissible/Prohibited Uses Consent broad as possible, blanket consent for hidden surveillance, limitations or exceptions for personal use Personal use/responsibility for content Identify if authorized or opinion of individual/company, position on anonymous posts Employer Access Emphasize respect and professionalism, the code of conduct applies Privacy and confidentiality Strengthen your confidentiality, non-disclosure, and non-solicitation policies Be vigilant

56

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue

More information

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

Electronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees. M. Amy Carlin

Electronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees. M. Amy Carlin Electronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees M. Amy Carlin Computers are ubiquitous in the workplace, and in recent years some employees have attempted

More information

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while

More information

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication. THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Social Networking, Mobile Devices, and the Cloud: The Newest Frontiers of Privacy Law By David J. Goldstone and Daniel B. Reagan

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

An Employer s Guide to Hidden Cameras in the Workplace 1. Analyzing the Rights of Public and Private Employers

An Employer s Guide to Hidden Cameras in the Workplace 1. Analyzing the Rights of Public and Private Employers An Employer s Guide to Hidden Cameras in the Workplace 1 By David B. Wilson 2 It s a typical work day for Jane Bond. She hops into her car, leaves her suburban home and battles rush hour traffic on the

More information

How To Protect Your Employees From Being Harassed On Social Media (For Women)

How To Protect Your Employees From Being Harassed On Social Media (For Women) Surfing, Shopping and Blogging: Regulation of Employee Social Media Use Legal Issues in Higher Education University of Vermont October 17, 2011 Barbara A. Lee Rutgers University and Edwards Angell Palmer

More information

Mindful. Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT

Mindful. Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT Mindful Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT ON JANUARY 30, 2001, Anthony Cochenour called the FBI with a tip. Cochenour s company, an Internet service provider, sold e-mail services to

More information

LE.201 Employee Privacy Rights in the Electronic/Social Media Age

LE.201 Employee Privacy Rights in the Electronic/Social Media Age LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,

More information

Privacy is the ability of an individual or group to keep their lives and

Privacy is the ability of an individual or group to keep their lives and Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.

More information

MONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian

MONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian MONITORING THE ELECTRONIC WORKPLACE Jonathan Topazian A. Introduction Forty years ago, well before the advent of the electronic workplace, the Maryland Court of Appeals first recognized that individuals

More information

Questions And Answers. Electron ic Monitoring in the Workplace

Questions And Answers. Electron ic Monitoring in the Workplace Questions And Answers Electron ic Monitoring in the Workplace Kevin J. Smith and Rachel J. Tischler Employers and employment attorneys alike have been concerned about the legal limits of electronic monitoring

More information

HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.

HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M. HOT TOPICS IN EMPLOYMENT LAW E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications by Andrew M. Low Employers have plenty of legitimate reasons for wanting to

More information

PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE E-MAIL, VOICEMAIL, AND INTERNET USE. June 2001. www.morganlewis.com

PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE E-MAIL, VOICEMAIL, AND INTERNET USE. June 2001. www.morganlewis.com PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE E-MAIL, VOICEMAIL, AND INTERNET USE June 2001 www.morganlewis.com Brussels Frankfurt Harrisburg London Los Angeles Miami New York Philadelphia Northern

More information

Appropriate Boundaries in the World of Social Networking

Appropriate Boundaries in the World of Social Networking Appropriate Boundaries in the World of Social Networking SAIS annual conference 2011 caryn pass and heather broadwater 1 Social networking evolving area protection of all constituencies students, faculty,

More information

Government Searches of Workplace Computers: Civil Issues for Employers and Employees. Federal Bar Association

Government Searches of Workplace Computers: Civil Issues for Employers and Employees. Federal Bar Association Government Searches of Workplace Computers: Civil Issues for Employers and Employees Federal Bar Association Paula A. Barran Barran Liebman LLP www. barran. com INTRODUCTION In a typical workplace, the

More information

Corporate Reputation Management Vs. Employee Privacy

Corporate Reputation Management Vs. Employee Privacy Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Reputation Management Vs. Employee Privacy

More information

EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING

EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com

More information

Organizational Policy

Organizational Policy Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy

More information

Social Media Dominance

Social Media Dominance Social Media Survival Guide: Hiring and Firing in the Era of Social Media Denise M. Visconti dvisconti@littler.com Adam Rosenthal arosenthal@littler.com Littler Mendelson, P.C. 501 W. Broadway Suite 900

More information

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut TOLLAND PUBLIC SCHOOLS Tolland, Connecticut ADMINISTRATIVE REGULATION REGARDING: Employee Use of the District s Computer Systems Number: 4110 Administrative Approved: 2/28/01 Revised: 4/26/06 Revised:

More information

ETHICAL ISSUES IN THE EMPLOYMENT CONTEXT

ETHICAL ISSUES IN THE EMPLOYMENT CONTEXT ETHICAL ISSUES IN THE EMPLOYMENT CONTEXT Mark J. Oberti Oberti Sullivan LLP 723 Main Street, Suite 340 Houston, Texas 77002 (713) 401-3556 mark@osattorneys.com Edwin Sullivan Oberti Sullivan LLP 723 Main

More information

The Boundaries Of Monitoring Employee E-Mail

The Boundaries Of Monitoring Employee E-Mail Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com The Boundaries Of Monitoring Employee E-Mail

More information

Social Media and the Employer-Employee Relationship. Tracy Richelle High, Partner and Christina Andersen, Associate, Sullivan & Cromwell LLP

Social Media and the Employer-Employee Relationship. Tracy Richelle High, Partner and Christina Andersen, Associate, Sullivan & Cromwell LLP Social Media and the Employer-Employee Relationship Tracy Richelle High, Partner and Christina Andersen, Associate, Sullivan & Cromwell LLP The widespread popularity of social media presents novel challenges

More information

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important

More information

INVESTIGATIONS GONE WILD: Potential Claims By Employees

INVESTIGATIONS GONE WILD: Potential Claims By Employees INTRODUCTION INVESTIGATIONS GONE WILD: Potential Claims By Employees By: Maureen S. Binetti, Esq. Christopher R. Binetti, Paralegal Wilentz, Goldman & Spitzer, P.A. When can the investigation which may

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

13.19 ETHICS REPORTING POLICY AND PROCEDURE

13.19 ETHICS REPORTING POLICY AND PROCEDURE 13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment

More information

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY POLICY TITLE: Technology Use Policy The technology resources at Northeast Wisconsin Technical College support the instructional, research and administrative

More information

Increasingly, personnel in institutions worldwide PRIVACY, LEGISLATION, AND SURVEILLANCE SOFTWARE. E-Monitoring in the Workplace:

Increasingly, personnel in institutions worldwide PRIVACY, LEGISLATION, AND SURVEILLANCE SOFTWARE. E-Monitoring in the Workplace: by G. Daryl Nord, Tipton F. McCubbins, and Jeretta Horn Nord E-Monitoring in the Workplace: PRIVACY, LEGISLATION, AND SURVEILLANCE SOFTWARE Protecting the corporation while respecting employee privacy

More information

Internet & Technology Usage in the Networked Workplace: Legal Implications

Internet & Technology Usage in the Networked Workplace: Legal Implications Internet & Technology Usage in the Networked Workplace: Legal Implications EDDY D. VENTOSE PROFESSOR OF LAW UNIVERSITY OF THE WEST INDIES, CAVE HILL CAMPUS The Employment Process 2 Recruitment Process

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Moreover, sexual harassment is a violation of federal, state and county fair employment laws.

Moreover, sexual harassment is a violation of federal, state and county fair employment laws. Sexual harassment interferes with a productive working environment, interjects irrelevant considerations into personnel decisions and generally demeans employees who are victims of harassment. Moreover,

More information

Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More

Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More By Lisa Guerin, J.D. Nolo, 2011, ISBN:1-4133-1326-0 Price $26.95, pp. 225 pages Reviewed by Nina T. Dow Journal of High Technology

More information

Privacy Information. www.privacy-information.org. Workplace Privacy Guide

Privacy Information. www.privacy-information.org. Workplace Privacy Guide Privacy Information www.privacy-information.org A project of Consumer Action Workplace Privacy Guide Workplace monitoring Checks and tests Privacy rights in the workplace Dos and don ts Assistance and

More information

Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel?

Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel? Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel? By Kathleen M. Porter Computers have dotted office desks for decades, and the Internet and e-mail have been common workplace

More information

Smartphones and the Law: Avoiding Legal Liabilities in the Workplace

Smartphones and the Law: Avoiding Legal Liabilities in the Workplace Smartphones and the Law: Avoiding Legal Liabilities in the Workplace FEATURED FACULTY: Anthony J Oncidi, Partner, Proskauer 310.284.5690 aoncidi@proskauer.com Speaker Info: Anthony J. Oncidi heads the

More information

GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know

GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know The Law, Potential Issues, and Best Practices. By Brian J. Moore and Ashley C. Pack Presenters Bi Brian J. Moore

More information

Privacy of Email and Text Messages Case Law Sprinting to Catch Up to Modern Technology

Privacy of Email and Text Messages Case Law Sprinting to Catch Up to Modern Technology Privacy of Email and Text Messages Case Law Sprinting to Catch Up to Modern Technology Robert D. Brownstone, Sheeva J. Ghassemi Vanni, and Soo Cho, Fenwick & West LLP Perhaps in an effort to sync up with

More information

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS 4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and E-mail are effective and important technological resources in today's

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Ohio Court Interprets Continuing Contract Requirements

Ohio Court Interprets Continuing Contract Requirements January 2010 Ohio Court Interprets Continuing Contract Requirements Inside This Issue: Ohio Court Interprets Continuing Contract Requirements 1 United States Supreme Court to Rule on Public Employee Privacy

More information

R U Looking @ My Cookies? Sexual Harassment In The Age Of Technology

R U Looking @ My Cookies? Sexual Harassment In The Age Of Technology R U Looking @ My Cookies? Sexual Harassment In The Age Of Technology R U LOOKING @ MY COOKIES? SEXUAL HARASSMENT IN THE AGE OF TECHNOLOGY MODERATOR: Mercedes Colwin, Esq. - Managing Partner - New York

More information

Workplace Mysteries: Employment Law Under the Magnifying Glass. Employment Law Half-Day Seminar

Workplace Mysteries: Employment Law Under the Magnifying Glass. Employment Law Half-Day Seminar Employment Law Half-Day Seminar October 30, 2012 Seattle, Washington November 1, 2012 Portland, Oregon This notebook is a publication of Miller Nash llp. It is provided for informational purposes only

More information

ADMINISTRATIVE POLICY

ADMINISTRATIVE POLICY POLICY 14-UMBER &/tay2-6t/v ISSUED Edward Mar _ City _Manager March 13, 1997 REVISIONS REVISED SECTION III. Legal Ramifications IV. Policy Implementation V. Non-Retaliation VI. Notification SUBJECT: POLICY

More information

PeopleMatrix Application Hosting Services Agreement

PeopleMatrix Application Hosting Services Agreement PeopleMatrix Application Hosting Services Agreement WolfeReiter, LLC CONTENTS 1. Services Agreement... 2 1.1. Description of Services... 2 1.2. Term... 2 1.3. Customer Responsibilities... 2 1.4. Payment

More information

Video Voyeurism and Surveillance Laws in the Workplace

Video Voyeurism and Surveillance Laws in the Workplace Video Voyeurism and Surveillance Laws in the Workplace This article is an overview of the laws applicable to audio and video surveillance in the workplace Many employers consider video and other surveillance

More information

I Spy Something Read! Employer Monitoring of Personal Employee Webmail Accounts. Kevin W. Chapman 1

I Spy Something Read! Employer Monitoring of Personal Employee Webmail Accounts. Kevin W. Chapman 1 NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY VOLUME 5, ISSUE 1: FALL 2003 I Spy Something Read! Employer Monitoring of Personal Employee Webmail Accounts Kevin W. Chapman 1 An employee arrives at work, logs

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America

Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America Presented by Mark A. Pihart (612) 604-6623 mpihart@winthrop.com Potential Legal Exposure Due to Employee Use of

More information

Case: 4:05-cv-00970-DJS Doc. #: 22 Filed: 11/14/05 Page: 1 of 8 PageID #: <pageid>

Case: 4:05-cv-00970-DJS Doc. #: 22 Filed: 11/14/05 Page: 1 of 8 PageID #: <pageid> Case: 4:05-cv-00970-DJS Doc. #: 22 Filed: 11/14/05 Page: 1 of 8 PageID #: UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MISSOURI EASTERN DIVISION LEON ELGIN, ) ) Plaintiff, ) ) vs. ) Case No.

More information

(1) It was something fairly and naturally incidental to the employer's business assigned to the employee; and

(1) It was something fairly and naturally incidental to the employer's business assigned to the employee; and Employer Liability for Employee Conduct by Lisa Mann 05-01-2000 EMPLOYER LIABILITY FOR EMPLOYEE CONDUCT: When Does An Employer Have to Pay? by Lisa Mann Modrall, Sperling, Roehl, Harris & Sisk, P.A. Employers

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS. Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out.

EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS. Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out. EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out. Last year, 15,222 charges of sexual harassment were filed

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

U.S. Chemical Safety and Hazard Investigation Board

U.S. Chemical Safety and Hazard Investigation Board BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1

More information

USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE. Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant

USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE. Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant Employee Misuse of Social Media Employees Misuse Social Media By: Disclosing

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008. Vicarious Liability. June 3, 2008. 2007 2008 Cassels Brock

John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008. Vicarious Liability. June 3, 2008. 2007 2008 Cassels Brock John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008 Vicarious Liability June 3, 2008 Overview Vicarious Liability Background Office Parties Social Host Liability Employee Internet Use Cell

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

EMPLOYEE PRIVACY IN THE DIGITAL WORKPLACE

EMPLOYEE PRIVACY IN THE DIGITAL WORKPLACE EMPLOYEE PRIVACY IN THE DIGITAL WORKPLACE Presented by Risa B. Boerner, Scott M. Waldman and Brent A. Cossrow http://delvacca.acc.com Today s Discussion Best Practices When Investigating Employees Electronic

More information

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2010).

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2010). This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2010). STATE OF MINNESOTA IN COURT OF APPEALS A11-13 State of Minnesota, Respondent, vs. Sin Santo

More information

Standing To Challenge Corporate Searches?

Standing To Challenge Corporate Searches? Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com Standing To Challenge Corporate Searches?

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

Employee Internet Usage February 15, 2007

Employee Internet Usage February 15, 2007 Employee Internet Usage February 15, 2007 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing Office

More information

Park Avenue motor cars

Park Avenue motor cars Park Avenue motor cars DEALERSHIP COMPUTING POLICIES Mercedes-Benz of West Chester and Fort Washington maintain a variety of policies governing the use of Dealership computing and communication resources.

More information

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised:

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: CROMWELL PUBLIC SCHOOLS 4118.5 BOARD OF EDUCATION POLICY Personnel Certified and Non-Certified Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: POLICY REGARDING

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

FORC QUARTERLY JOURNAL OF INSURANCE LAW AND REGULATION

FORC QUARTERLY JOURNAL OF INSURANCE LAW AND REGULATION The plaintiff in Schmidt filed suit against her employer, Personalized Audio Visual, Inc. ("PAV") and PAV s president, Dennis Smith ("Smith"). 684 A.2d at 68. Her Complaint alleged several causes of action

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

You ve Got to Keep Them Separate Katie Tefft Program Attorney TMCEC

You ve Got to Keep Them Separate Katie Tefft Program Attorney TMCEC Public Inspection of Criminal Case Files You ve Got to Keep Them Separate Katie Tefft Program Attorney TMCEC Public Information Act (PIA) Rule 12 Common-Law Right To Judge Judy, Please send me copies of

More information

LABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE. Timothy L. Davis. Burke, Williams & Sorensen, LLP www.bwslaw.

LABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE. Timothy L. Davis. Burke, Williams & Sorensen, LLP www.bwslaw. LABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE Timothy L. Davis Burke, Williams & Sorensen, LLP www.bwslaw.com OVERVIEW FOR 2016 UPDATE Labor Law Court Decisions Employment

More information

Social Media is Pervasive

Social Media is Pervasive HR Liabilities of The Digital Age ABC Webinar September 29, 2010 Social Media is Pervasive Facebook 500+ million users Blogs 200 million bloggers Twitter 75 million users LinkedIn 50 million users Results

More information

Privacy Update Recent Updates in Privacy Law

Privacy Update Recent Updates in Privacy Law Privacy Update Recent Updates in Privacy Law Kathryn Frelick DISCLAIMER This Coffee Talk presentation is provided as an information service and is not meant to be taken as legal opinion or advice. Please

More information

Workplace Privacy Lesson Plan and Class Activity

Workplace Privacy Lesson Plan and Class Activity Workplace Privacy Lesson Plan and Class Activity 2009 Consumer Action Seminar Purpose: Workplace Privacy Seminar To provide workshop participants with an awareness of when and how employers can monitor

More information

When Worlds Collide: How the Intersection of Social Networking and the Workplace Creates Peril for Employers

When Worlds Collide: How the Intersection of Social Networking and the Workplace Creates Peril for Employers ABA Section of Litigation Corporate Counsel CLE Seminar, February 11-14, 2010 When Worlds Collide: How The Intersection of Social Networking and the Workplace Creates Peril for Employers When Worlds Collide:

More information

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE POLICY AND PAGE 1 of 7 OCTOBER 25, 2007 Tab Authority Subject Related Policies Corporate Services Information Technology Services Responsible Computing Corporate IT Guiding Principles Policy, Harassment

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

EMPLOYER S DUTY TO MONITOR WEBSITE USE

EMPLOYER S DUTY TO MONITOR WEBSITE USE EMPLOYER S DUTY TO MONITOR WEBSITE USE An employer must carefully administer the actions of his or her employees for several reasons. Under New York law, it is well settled that under the doctrine of respondeat

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

ACC OF WESTERN PENNSYLVANIA. What In-house Lawyers Need To Know About Internal Workplace Investigations

ACC OF WESTERN PENNSYLVANIA. What In-house Lawyers Need To Know About Internal Workplace Investigations ACC OF WESTERN PENNSYLVANIA What In-house Lawyers Need To Know About Internal Workplace Investigations February 2, 2009 Presented By: Lynn C. Outwater, Esq. Vincent J. Tersigni, Esq. Can be sued if you

More information

Obtaining information from a non-party for use at trial can lead to frustration and headaches for

Obtaining information from a non-party for use at trial can lead to frustration and headaches for THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Getting Uncle Sam To Talk: Obtaining Potentially Important Evidence from the FBI For Use in Civil Proceedings By Joseph L. Sulman

More information

SEXUAL HARASSMENT IN THE WORKPLACE: EMPLOYER LIABILITY FOR THE SINS OF THE WICKED

SEXUAL HARASSMENT IN THE WORKPLACE: EMPLOYER LIABILITY FOR THE SINS OF THE WICKED SEXUAL HARASSMENT IN THE WORKPLACE: EMPLOYER LIABILITY FOR THE SINS OF THE WICKED by Peter M. Panken, Esq. Lauri F. Rasnick, Esq. Parker Chapin Flattau & Klimpl, LLP New York, New York Johnna G. Torsone,

More information

University of Maryland Baltimore Information Technology Acceptable Use Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password

More information

MASLA ANNUAL CONFERENCE LAKE PLACID, NY JULY 21, 2014. Investigations in the Academic Environment

MASLA ANNUAL CONFERENCE LAKE PLACID, NY JULY 21, 2014. Investigations in the Academic Environment MASLA ANNUAL CONFERENCE LAKE PLACID, NY JULY 21, 2014 Investigations in the Academic Environment Presentation by Ronald A. Longo Keane & Beane, P.C. I. Workplace Surveillance of Public Employees A. Conducting

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

Tracking Employees Via Mobile Devices: Legal or Not?

Tracking Employees Via Mobile Devices: Legal or Not? Tracking Employees Via Mobile Devices: Legal or Not? Aaron Turner President, IntegriCell Randy Sabett Counsel, ZwillGen PLLC Session ID: LAW W23 Session Classification: Intermediate This presentation is

More information

Electronic Funds Transfer, Internet and Mobile Banking Agreement and Disclosure For Personal Accounts

Electronic Funds Transfer, Internet and Mobile Banking Agreement and Disclosure For Personal Accounts Electronic Funds Transfer, Internet and Mobile Banking Agreement and Disclosure For Personal Accounts First State Bank Central Texas offers the highest quality banking products and services available.

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010

OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010 OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor astorey@rudman-winchell.com I. USE OF INFORMATION DURING HIRING PROCESS

More information

SEXUAL HARASSMENT. Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016

SEXUAL HARASSMENT. Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016 SEXUAL HARASSMENT Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016 1 Agenda Overview-Why talk about sexual harassment? Why get training? Statistics What is sexual harassment?

More information

Laptops for Students Program

Laptops for Students Program Laptops for Students Program Technology Use Agreement Handbook Expanding Learning to the 21st Century and Beyond PAGE 1 OF 13 Table of Contents Laptop Policy & Procedures Handbook 3 Objectives 3 Laptop

More information

Social Media in the Workplace. Stacey L. Smiricky Partner, Labor & Employment Group

Social Media in the Workplace. Stacey L. Smiricky Partner, Labor & Employment Group Social Media in the Workplace Stacey L. Smiricky Partner, Labor & Employment Group Lessons Learned Employee who called in sick later places a status update on his Facebook page announcing sick day at Wrigley

More information

J.V. Industrial Companies, Ltd. Dispute Resolution Process. Introduction

J.V. Industrial Companies, Ltd. Dispute Resolution Process. Introduction J.V. Industrial Companies, Ltd. Dispute Resolution Process Companies proudly bearing the Zachry name have had the Dispute Resolution Process ( DR Process ) in place since April 15, 2002. It has proven

More information