Social Media in the Workplace April 30, 2015 Jade Buchanan & Kristél Kriel

Size: px
Start display at page:

Download "Social Media in the Workplace April 30, 2015 Jade Buchanan & Kristél Kriel"

Transcription

1 Social Media in the Workplace April 30, 2015 Jade Buchanan & Kristél Kriel

2 Click Agenda to edit Master title style 1. Introduction: Social Media Risks and Policies in Workplace 2. Specific Issues a) Privacy and Cyber Bullying Laws b) Monitoring Social Media c) Misuse Harassment d) Misuse Harming Employer Reputation e) Misuse Breaching Third Party Rights Disclosure, Defamation, and Intellectual Property 3. Conclusions + Recommendations 2

3 1. Introduction to Social Media Risks and Policies in the Workplace

4 Click Social to Media edit in Master the Workplace title style What is Social Media? 4

5 Click Social to Media edit in Master Workplace title style Statistics on Social Media in the Workplace* Nearly 90% of businesses use social media for business purposes >70% of businesses reported having to take disciplinary action against employees for misuses (up from 35% the previous year) 36% of employers block access to social media sites 80% of businesses have social media policies (up from 60% the previous year); 52.43% of employers social media policies cover both use at work and outside of work 52.94% of businesses updated their social media policies in the past year to help manage the risk of misuse 37.5% of employers provide employees with training on appropriate use of social media *Proskauer Rose LLP / Social Media in the Workplace Around the World 3.0 (2013/14) 5

6 Click Social to Media edit Use Master title style Interesting Statistics: December 2008: Facebook had 100 million users. March 2015: Facebook indicated that 1.44 billion monthly active users. Canada: Country with the most active Facebook users (per capita) at 19 million. 6

7 Click Overview to edit Master title style Risks Social Media Presents to Workplace 1. Employee/employee interaction (harassment / discrimination) 2. Employee misuse harms reputation of employer (attack employer, offensive content, etc.) 3. Employee misuse of social media causes employer to breach third party right (intellectual property, defamation, criminal, breach of confidentiality) 4. Viruses/data breach 5. Lost productivity 7

8 Click Overview to edit Master title style How a Social Media Policy Mitigates Risk / Protect Employers and Employees 1. Preventative tools Prevent incidents through education and by controlling content 2. Investigative tools Increase ability for employer to monitor and investigate social media activity 3. Remedial tools Provide tools for employers to discipline / terminate employee for breach Note: Tools are inter-related (e.g. education increases severity of breach, increasing likelihood discipline will be upheld) 8

9 2A. Specific Issues: Privacy and Cyber Bullying Laws

10 How do Privacy Laws Apply to Social Click to edit Master title style Media in the Workplace? Collection, use and disclosure of personal information is regulated by different statutes There are different legislative considerations for public and private sector employers Federally and provincially regulated employers also have different but similar privacy legislation 10

11 What laws apply to Social Media in the Click to edit Master title style Workplace? Federal: Personal Information Protection and Electronic Documents Act ( PIPEDA ) Protecting Canadians from Online Crime Act (the Cyber Bullying Act ) Provincial: The Local Authority Freedom of Information and Protection of Privacy Act ( LA FOIP ) The Health Information Protection Act ( HIPA ) for personal health information. The Privacy Act Common law 11

12 Click What does to edit Privacy Master Legislation title style require? Privacy legislation contains similar requirements regarding collection, use and disclosure of personal information (PI): Limits on the collection, use and disclosure of PI Subject individual s consent is required to collect PI Exceptions to the general consent rule (these vary from statute to statute) Collection of PI must be reasonable for the purpose for which it is collected Reasonable steps must be taken to ensure that PI collected is accurate, complete, up-to-date, and appropriately protected and retained Individuals have ability to access information in possession and control of public bodies 12

13 Click What is to personal edit Master information? title style Personal Information = Information about an identifiable Individual Examples: education; criminal history; employment history; financial activities; health history, home address and phone number; personal views or opinions of the individual; private or confidential correspondence; views or opinions of another person about the individual; tax information; and the name of the individual if disclosure would reveal personal information. 13

14 Click Common to edit Law Master Interpretation title style Common Law: Reasonable Expectation of Privacy In workplace, employers must achieve a balance between: 1) the employer s business objectives, and 2) the employee s right to privacy. R v Cole, 2012 SCC 53 High school teacher s laptop contained nude photographs of minor student. The evidence collected from the laptop violated Cole s Charter right to be free from unreasonable search and seizure. Canadians have a reasonable expectation of privacy in their work computers where personal use is permitted or reasonably expected. 14

15 Click Common to edit Law Master Interpretation title style Reasonable Expectation of Privacy in the Workplace depends on: 1) Whether the employee owns the hardware and/or software; 2) Whether the technology is being used during business hours; 3) The employer s policies surrounding internet and use; 4) Whether the employee has been made aware of the employer s policies; and 5) The extent to which the employer s policies are regularly and consistently enforced. 15

16 The Protecting Canadians from Online Click to edit Master title style Crime Act Addresses matters relating to cyber bullying Lawful access provisions address search and seizure of Internet data Amends Criminal Code, Canada Evidence Act, Competition Act, Mutual Legal Assistance in Criminal Matters Act Came into force on March 9,

17 The Protecting Canadians from Online Click to edit Master title style Crime Act Cyber Bullying: New criminal offence relating to intimate images Wide powers for judges in relation to new offence Existing offences expanded to include electronic communications Lawful Access: Demands for preservation of electronic evidence Wide powers for judges relating to electronic evidence Streamlined process for warrants and orders to intercept private communications 17

18 The Protecting Canadians from Online Click to edit Master title style Crime Act Interpretation of request for subscriber information from ISP in R v Spencer, 2014 SCC 43 Police request for IP address relating to child pornography Internet users have reasonable expectation of privacy in their Internet activities and online ISP subscriber information Lawful authority within PIPEDA means more than a simple request from a government institution Police should have obtained warrant or order to compel production of information Impact on The Protecting Canadians from Online Crime Act 18

19 2A. Specific Issues: Monitoring Social Media in the Workplace

20 Monitoring Social Media Use in the Click to edit Master title style Workplace Employers may sometimes be justified in monitoring an employee s online conduct: Lougheed Imports Ltd. (cob West Coast Mazda) (Re), [2010] BCLRBD No 190 Two Mazda employees were terminated after making a number of posts on Facebook insulting the employer and their supervisors. A supervisor noticed the comments and monitored their posts, even after he was unfriended by the employees. Held: The employees did not have a reasonable expectation of privacy - the Facebook posts were visible to everyone on the employees friend lists. 20

21 Monitoring Technology Use in the Click to edit Master title style Workplace Unlike social media monitoring, monitoring technology use is strict. R v Cole: employees have a reasonable expectation of privacy in their workplace computers. 21

22 Monitoring Technology Use in the Click to edit Master title style Workplace Canadian Railway Company v Teamsters Canada Rail Conference, CROA&DR 2900: Employer requested copies of an employee s cell phone records as part of an investigation into a train accident. Held: Personal communications are, by definition, generally entirely unrelated to an employee s duties and responsibilities; however, an exception was found in this case, for several reasons: Information received only indicated that the employee had been making a call at a certain time the phone number and content of any text was blacked out; Employer chose the least intrusive method of obtaining information; and The employer had a carefully drafted policy which respected the privacy rights of the employee. 22

23 2C. Specific Issues: Misuse for Harassment

24 Click Harassment to edit Via Master Social title Media style USWA, Local 9548 and Tenaris Algoma Inc., 2014 CanLII (ON LA) Following end of a shift, grievor posted complaint about coworker on Facebook, without naming her. Comments between grievor and other employees escalated over two hours. Comments included: Her work ethic; Distinctive physical characteristics; Suggestions of performing physically aggressive and violent and humiliating acts; and A cruel nickname. 24

25 Click Harassment to edit Via Master Social title Media style USWA, Local 9548 and Tenaris Algoma Inc., 2014 CanLII (ON LA) Grievor apologized and deleted posts when confronted by management. Grievor sent home pending investigation. Terminated. Arbitrator noted several factors in determining termination justified: Vicious, humiliating and public nature of comments Grievor only employed 3 years prior to termination; no trust Employee received training on relevant social media policies 25

26 Click Harassment to edit Via Master Social title Media style Canada Post Corp v CUPW, [2012] AWLD 2981 (Alta Arb) The grievor, a postal clerk with 31 years of service made derogatory Facebook postings over a 1 month period about her supervisors. Postings were made during work and off of work. The postings were sent to more than 50 of the grievor s Facebook friends, including a number of co-workers. The supervisors required significant time off work for emotional distress after reading the postings. The grievor was terminated. 26

27 Click Harassment to edit Via Master Social title Media style Examples of postings: Oct 10; 1:03 AM Grievor Off Work: Up and drinking again. 3 nights of freedom from Postal Hell. DIE BITCH DIE. I'm playing with the Voo Doo doll. If I wasn't drunk I would take it to the driveway and run the bitch over. Nov 4; 3:43 AM Grievor At Work: Hello from stall 2. No sign of the evil [D] so everything going smooth so far. It's only 3 40 am so u never know. Her yes man [M] is here probably to make sure we don't take extra an extra minute on the lunch break gotta go sort. Nov 4; 8:53 AM Grievor Off Work: It was a long night, 10 hrs in the mail mines. The Hag showed at 6 and the swoop through, I've never seen her without the UGLY coat. C'mon voo doo doll work your magic. 27

28 Click Harassment to edit Via Master Social title Media style Canada Post Corp v CUPW, [2012] AWLD 2981 (Alta Arb) There is ample case law that supports the principle that what employees write in their Facebook postings, blogs, and s, if publicly disseminated and destructive of work relationships, can result in discipline. The fact that the grievor was under a misapprehension about who could access her Facebook site, did not relieve her from the responsibility of what she wrote. Termination upheld. 28

29 2D. Specific Issues: Misuse Harming Employer Reputation 29

30 Violation of Internet Use Policy Click to edit Master title style Blogging Photos Thomas v. IBEW Union 424 (Alberta 2011) Electrical apprentice working on the oil sands. Posted blogs about conditions in work camp. Complained about cleanliness of washrooms and limited menu selections resulting in deficient diet. Supported his complaints by posting pictures and videos of the facilities online. Terminated. 30

31 Violation of Internet Use Policy Click to edit Master title style Blogging Photos Thomas v. IBEW Union 424 (Alberta 2011) Site operator s policy expressly prohibited taking of photographs and videos. Employee brought grievance contesting his termination. Grievance dropped when union determined it had little chance of success. Duty of fair representation complaint against union similarly dismissed. 31

32 Violation of Internet Use Policy Click to edit Master title style Blogging Photos Thomas v. IBEW Union 424 (Alberta 2011) Takeaway: Clear employer policy saved the day Policy specifically identified zero tolerance 32

33 Click Embarrassing to edit Master Statements title style by Operator Account operator fails to switch between personal and business account: Account operator uses poor judgement: Autopilot scheduled releases causes bad timing: 33

34 2F. Specific Issue: Misuse Breaching Third Party Rights Disclosure, Defamation, and Intellectual Property

35 Click Disclosure to edit of Master Confidential title style Information Employers may be liable for confidentiality breaches caused by employees Social media invites deliberate and accidental disclosure: Posting photos from recognizable locations or disclosing confidential information (e.g. prototype of device that is to be patented) Unintentional disclosure of location (GPS-enabled device used to post on social media) 35

36 Click Defamation to edit and Master Social title Media style Defamation (libel/slander) lawsuits on the rise because of defamation on social media Employers can be liable for employee conduct where done so in course of employment Can be from employer account or employee account Example: NBA referee sued Associated Press for reporter s tweet: "Ref Bill Spooner told Rambis he'd 'get it back' after a bad call. Then he made an even worse call on Rockets. That's NBA officiating folks. AP settled for $20,000 36

37 Click Intellectual to edit Property Master and title Social style Media Mejia v. LaSalle College International Vancouver Inc., 2014 BCSC 1559 (Copyright) Sessional professor at LaSalle College terminated for professional unacceptable behavior. Claimed for wrongful dismissal, defamation and copyright infringement LaSalle had used photograph taken by Mejia on it s Facebook page Copyright-protected work was photo taken by Mejia at LaSalle classroom and of a LaSalle student participating in a LaSalle event Photograph not taken in course of duties because Mejia was a professor, not photographer Granted minimum statutory damages of $500 Statutory damages are per work damages for a photo album could have easily been in 10s of thousands 37

38 3. Conclusions + Recommendations 38

39 Prevention: Policies, Education and Click to edit Master title style Monitoring Develop a social media policy / technology use policy Risk identification Assign responsibility for policy reviews, refreshes and enforces Include in the policy: Who owns the systems (the employer/organization) Candor with employees - no expectation of privacy in & Internet use on company system Acceptable & unacceptable uses Consequences of inappropriate use On-going reminders and training Specialized training / education for account operators Ex-employees Acknowledgment by employees 39

40 Click Investigations to edit Master & Discipline title style Conduct Investigations with Care Approach from perspective avoiding future dispute Ensure that requests for information are reasonable and sufficiently related to business purposes Ensure that privacy is intruded as minimally as possible Obtain consent from employees whenever possible Pay attention to collective bargaining agreement Discipline Properly justify and obtain counsel 40

41 Click Thank to you! edit Master title style Thanks for attending! Please note that the information contained in this presentation is general in nature and does not constitute legal advice, nor is it exhaustive on the subjects noted. Questions? 41

42 Click More Resources to edit Master title style Relevant MLT Blogs: MLT Privacy Blog MLT Technology Blog MLT Employment Blog MLT Intellectual Property Blog 42

43 Click to edit Master title style REGINA 1500 Hill Centre Scarth Street Regina SK S4P 4E9 Phone: SASKATOON 1500 Saskatoon Square nd Street East Saskatoon SK S7K 5T6 Phone: CALGARY 1600 Centennial Place rd Avenue SW Calgary AB T2P 0R3 Phone: EDMONTON Suite 2200 st Street Edmonton AB T5J 3G1 Phone: VANCOUVER Suite Burrard Street Vancouver BC V6C 2G8 Phone:

Privacy in the Workplace Update What You Don t Know May Hurt You

Privacy in the Workplace Update What You Don t Know May Hurt You McCarthy Tétrault Advance Building Capabilities for Growth Privacy in the Workplace Update What You Don t Know May Hurt You Rosalie Cress Will Cascadden Employees Rights to Privacy in the Workplace 2 Federal

More information

Is There Such a Thing as Internet Privacy?

Is There Such a Thing as Internet Privacy? Is There Such a Thing as Internet Privacy? April 13, 2015 Danielle Graff & Kristél Kriel Western Canada s Law Firm Click Agenda to edit Master title style What is Internet Privacy? Why does it matter?

More information

Workplace Anti-Harassment Policy (Alberta)

Workplace Anti-Harassment Policy (Alberta) Workplace Anti-Harassment Policy (Alberta) Intent It is public policy in Canada to recognize the dignity and worth of every person and to provide for equal rights and opportunities free of discrimination.

More information

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment

More information

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Prepared for: The Essential Privacy, Access to Information, CASL Forum November 24, 2014 Dr. Andrea Slane University

More information

Supreme Court of Canada Creates New Test for Police to Search Cell Phones Without a Warrant

Supreme Court of Canada Creates New Test for Police to Search Cell Phones Without a Warrant Supreme Court of Canada Creates New Test for Police to Search Cell Phones Without a Warrant On December 11, 2014, the Supreme Court of Canada released R. v. Fearon, a decision that addresses when police

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

How To Use Social Media At St James Anglican School

How To Use Social Media At St James Anglican School P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

6.9 Social Media Policy

6.9 Social Media Policy Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

Social Network Protocol & Policy

Social Network Protocol & Policy Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

LE.201 Employee Privacy Rights in the Electronic/Social Media Age

LE.201 Employee Privacy Rights in the Electronic/Social Media Age LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING

POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING Know your rights A wide range of organizations are requiring employees and volunteers to provide police record checks. Privacy, human rights and employment

More information

JOINT AGREEMENT ON GUIDANCE ON DISCIPLINARY PROCEDURES IN FURTHER EDUCATION COLLEGES

JOINT AGREEMENT ON GUIDANCE ON DISCIPLINARY PROCEDURES IN FURTHER EDUCATION COLLEGES JOINT AGREEMENT ON GUIDANCE ON DISCIPLINARY PROCEDURES IN FURTHER EDUCATION COLLEGES BETWEEN THE ASSOCIATION OF COLLEGES (AoC) AND ASSOCIATION FOR COLLEGE MANAGEMENT (ACM) ASSOCIATION OF TEACHERS & LECTURERS

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

HUMAN RESOURCES POLICIES AND PROCEDURES DISCIPLINARY. Date of Policy 1993 Date policy to be reviewed 09/2014

HUMAN RESOURCES POLICIES AND PROCEDURES DISCIPLINARY. Date of Policy 1993 Date policy to be reviewed 09/2014 HUMAN RESOURCES POLICIES AND PROCEDURES DISCIPLINARY Date of Policy 1993 Date policy to be reviewed 09/2014 Policy written by SFC/HR Risk Register Ref (s) HR7 Impact Assessed EDG Date Impact assessed 10/2012

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures

State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures State University of New York at Potsdam Workplace Violence Prevention Policy and Procedures Revision Date: September 15, 2015 Page 1 of 7 TABLE OF CONTENTS Policy... 3 Statement... 3 Definitions... 3 Application

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

The Duty to Accommodate: Making Sense of the Law on Managing Disabilities in the Workplace

The Duty to Accommodate: Making Sense of the Law on Managing Disabilities in the Workplace The Duty to Accommodate: Making Sense of the Law on Managing Disabilities in the Workplace Shannon G. Whyley March 23, 2015 Western Canada s Law Firm Agenda 1. Introduction 2. Bona Fide Occupational Requirements

More information

Social Networking Protocol for Schools Managed Staff

Social Networking Protocol for Schools Managed Staff Social Networking Protocol for Schools Managed Staff Created by HR Consultancy June 2010 1 Social Networking Protocol 2010 Contents 1. Purpose 2. Scope 3. School s Expectations 4. Safeguarding 5. Monitoring

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS 4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and E-mail are effective and important technological resources in today's

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

Raising concerns (Whistleblowing) Policy and Procedure

Raising concerns (Whistleblowing) Policy and Procedure Raising concerns (Whistleblowing) Policy and Procedure The Public Interest Disclosure Act provides strong protection for workers who blow the whistle on or raise a genuine concern about malpractice. The

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE

SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE 1. INTRODUCTION 1.1 The Procedure has been established to help and encourage members of staff to achieve

More information

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while

More information

Appropriate Boundaries in the World of Social Networking

Appropriate Boundaries in the World of Social Networking Appropriate Boundaries in the World of Social Networking SAIS annual conference 2011 caryn pass and heather broadwater 1 Social networking evolving area protection of all constituencies students, faculty,

More information

Social Media in the Workplace

Social Media in the Workplace Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION

More information

Edmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest

Edmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest Edmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest Rules & Regulations EDMONTON PUBLIC LIBRARY S ( EPL ) Make With Mark School CONTEST ( THE CONTEST ) SHALL BE CONSTRUED AND EVALUATED

More information

DISCIPLINARY POLICY AND PROCEDURE

DISCIPLINARY POLICY AND PROCEDURE DISCIPLINARY POLICY AND PROCEDURE Date of Publication: April 2013 Agreed by: Vice Chancellor s Executive March 2013 Page 1 of 13 Policy 1.0 Introduction The purpose of the disciplinary policy and procedure

More information

Social Networking Policy

Social Networking Policy Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff Human Resources People and Organisational Development Disciplinary Procedure for Senior Staff AUGUST 2015 1. Introduction 1.1 This procedure applies to Senior Staff. Senior Staff includes: 1.1.1 the Vice-Chancellor

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008. Vicarious Liability. June 3, 2008. 2007 2008 Cassels Brock

John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008. Vicarious Liability. June 3, 2008. 2007 2008 Cassels Brock John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008 Vicarious Liability June 3, 2008 Overview Vicarious Liability Background Office Parties Social Host Liability Employee Internet Use Cell

More information

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy The Coventry Public Schools encourages the use of digital technology for teaching and learning, for professional responsibilities,

More information

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks Volume 22, No. 1 September 2012 Criminal Justice Section Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks A case comment on R. v. Spencer and R. v. Trapp Brock Jones 1 A. Peer-to-Peer

More information

WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY

WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY MAY 2013 DOCUMENT SUMMARY Document Number Responsible Officer P0 DO0008.2 Assistant Directors Effective Date May 2013 Superseded Docs Workplace Internet,

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

SUNY Delhi Domestic Violence and the Workplace Policy

SUNY Delhi Domestic Violence and the Workplace Policy SUNY Delhi Domestic Violence and the Workplace Policy Policy Statement Domestic violence permeates the lives and compromises the safety of thousands of New York State employees each day, with tragic, destructive,

More information

This policy has been created using the WBC Model Policy Version December 2013.

This policy has been created using the WBC Model Policy Version December 2013. POLICY TITLE: REVISED: January 2013 NEXT REVIEW DATE: Autumn / 2015 APPROVED BY COMMITTEE: Full Governing Body This policy has been created using the WBC Model Policy Version December 2013. Principles

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

Sexual Harassment. Managers and supervisors can be named in that complaint if they failed to prevent or respond to the situation.

Sexual Harassment. Managers and supervisors can be named in that complaint if they failed to prevent or respond to the situation. The Internet at Work: An Employment Law Danger Zone By: Lauren M. Bernardi Internet and e-mail access at work have unquestionably created new and difficult challenges for managers and employers. Consider

More information

An Employer's Guide to Conducting Internal Investigations

An Employer's Guide to Conducting Internal Investigations An Employer's Guide to Conducting Internal Investigations Source: Corporate Compliance & Regulatory Newsletter. Brooke Iley and Mark Blondman www.investigationsystem.com Tel: (613) 244-5111/ 1-800-465-6089

More information

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division.

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. PAGE: 1 of 7 1. GENERAL 1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. 1.2 The Winnipeg School Division

More information

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

NETHERAVON ALL SAINTS CE PRIMARY SCHOOL

NETHERAVON ALL SAINTS CE PRIMARY SCHOOL NETHERAVON ALL SAINTS CE PRIMARY SCHOOL DISCIPLINARY PROCEDURE FOR ACADEMY TEACHING AND SUPPORT STAFF Adopted by Netheravon All Saints Academy Trust on 23/9/15 Signed (Chair of Governors): 1 Index Section

More information

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

(Internet) for students, staff and, if requested, members of the Board of Education. All computer 4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

SOCIAL NETWORKING: EMPLOYER S FRIEND OR FOE?

SOCIAL NETWORKING: EMPLOYER S FRIEND OR FOE? SOCIAL NETWORKING: EMPLOYER S FRIEND OR FOE? MERCER 2012: ASIA PACIFIC HR ROUND TABLE 24 OCTOBER 2012 Lucy Twomey, Senior Associate, Herbert Smith Freehills LLP Christopher Cheung, Legal Associate (New

More information

ACCEPTABLE COMPUTER SYSTEM USE

ACCEPTABLE COMPUTER SYSTEM USE File: IIBEA/GAB ACCEPTABLE COMPUTER SYSTEM USE The Waynesboro School Board provides a computer system, including the internet, to promote educational excellence by facilitating resource sharing, innovation

More information

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic

More information

Government: Hypothetical Case Studies Unreasonable complainant conduct in a virtual world SOCAP Amora Jamison Hotel, Sydney 30 August 2011

Government: Hypothetical Case Studies Unreasonable complainant conduct in a virtual world SOCAP Amora Jamison Hotel, Sydney 30 August 2011 Government: Hypothetical Case Studies Unreasonable complainant conduct in a virtual world SOCAP Amora Jamison Hotel, Sydney 30 August 2011 Chris Wheeler Deputy NSW Ombudsman Public servants and social

More information

Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems

Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD Employee use of the District s Computer Systems Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important

More information

Legal Project Management: A Tool for Corporate Counsel Topic #1

Legal Project Management: A Tool for Corporate Counsel Topic #1 Legal Project Management: A Tool for Corporate Counsel Topic #1 Ann Marie McDonald, PMP CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012 Definitions Project : A temporary endeavour undertaken

More information

Mobile Phones Acceptable Use Policy

Mobile Phones Acceptable Use Policy Mobile Phones Acceptable Use Policy Date Approved by Governors: 22 5 14 Due for future review: Signed: Date: 22 5 14 Mobile Phones: Acceptable Use Policy 1. Purpose 1.1. The widespread ownership of mobile

More information

Date Amendments/Actions Next Compulsory Review Date

Date Amendments/Actions Next Compulsory Review Date CTC KINGSHURST ACADEMY STAFF DISCIPLINARY POLICY AND PROCEDURE POLICY REFERENCE: POL017S Policy History Policy Ref & Version Date Amendments/Actions Next Compulsory Review Date POL017S V1.0 1 st September

More information

Helpful Tips. Privacy Breach Guidelines. September 2010

Helpful Tips. Privacy Breach Guidelines. September 2010 Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information

More information

State University of New York College at Old Westbury. Domestic Violence and the Workplace Policy

State University of New York College at Old Westbury. Domestic Violence and the Workplace Policy State University of New York College at Old Westbury Domestic Violence and the Workplace Policy Policy Statement The persons covered by this policy are: employees of SUNY College at Old Westbury (the College

More information

Social media and employment law do s and don ts

Social media and employment law do s and don ts Social media and employment law do s and don ts August 2014 @heenanrachael @capsticksllp Social Media Today s Session Social Media HR Hotspots Recruitment and social media What the Tribunals think Managing

More information

SEN15-P69b 24 June 2015. University Ordinances

SEN15-P69b 24 June 2015. University Ordinances SEN15-P69b 24 June 2015 University Ordinances Ordinance XXXV Staff Disciplinary Policy and Procedure (Version effective from 27 November 2014) This ordinance shall apply to all staff to whom paragraph

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

Glasgow Kelvin College. Disciplinary Policy and Procedure

Glasgow Kelvin College. Disciplinary Policy and Procedure Appendix 1 Glasgow Kelvin College Disciplinary Policy and Procedure Document Control Information Status: Responsibility for Document and its implementation Responsibility for document review: Current version

More information

Aiyaz A. Alibhai Sarah G. Fitzpatrick. Social Media in the Workplace Employer Liability Issues

Aiyaz A. Alibhai Sarah G. Fitzpatrick. Social Media in the Workplace Employer Liability Issues Aiyaz A. Alibhai Sarah G. Fitzpatrick Social Media in the Workplace Employer Liability Issues Social Media in the Workplace 1. Risk Management & Sources of Liability 2. Claims involving Potential Employees

More information

Electronic Communications System

Electronic Communications System Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as

More information

STAFF DISCIPLINE, CONDUCT AND GRIEVANCE PROCEDURE

STAFF DISCIPLINE, CONDUCT AND GRIEVANCE PROCEDURE STAFF DISCIPLINE, CONDUCT AND GRIEVANCE PROCEDURE 1. Introduction Disciplinary issues arise when problems of conduct or capability are identified by the employer and management seeks to address them through

More information

Canadian Pacific Railway

Canadian Pacific Railway Canadian Pacific Railway Policy 1300 Discrimination and Harassment Policy All Employees and Applicants (Canada) Issuing Department: Human Resources Policy Statement CPR is committed to our corporate values

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Disciplinary Policy and Procedure

Disciplinary Policy and Procedure Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

DISCIPLINARY PROCEDURE

DISCIPLINARY PROCEDURE DISCIPLINARY PROCEDURE Author: Julie Newnham Revised : August 2013 Review Date: August 2014 Students First DISCIPLINARY PROCEDURES 1 Scope and purpose 1.1 This procedure applies to all employees other

More information

For purposes of this policy, the following terms will be defined as follows.

For purposes of this policy, the following terms will be defined as follows. DOMESTIC VIOLENCE AND THE WORKPLACE POLICY STATEMENT The City University of New York ( CUNY ) disapproves of violence against women, men, or children in any form, whether as an act of workplace violence

More information

GUIDELINES FOR DEALING WITH DISRUPTIVE BEHAVIOR IN THE CLASSROOM

GUIDELINES FOR DEALING WITH DISRUPTIVE BEHAVIOR IN THE CLASSROOM GUIDELINES FOR DEALING WITH DISRUPTIVE BEHAVIOR IN THE CLASSROOM Tallahassee Community College Division of Student Affairs Department of Campus Life Student Judicial Affairs Office Student Union, Room

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Social Media Policy For Staff

Social Media Policy For Staff Social Media Policy For Staff 1 Owlswick School and Home Social Media Policy Introduction The Internet provides a range of social media tools that allow users to interact with one another, for example

More information

J.V. Industrial Companies, Ltd. Dispute Resolution Process. Introduction

J.V. Industrial Companies, Ltd. Dispute Resolution Process. Introduction J.V. Industrial Companies, Ltd. Dispute Resolution Process Companies proudly bearing the Zachry name have had the Dispute Resolution Process ( DR Process ) in place since April 15, 2002. It has proven

More information

STUDENTS 5118.5. Children s Internet Protection Act, Pub. Law 106-554, codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250

STUDENTS 5118.5. Children s Internet Protection Act, Pub. Law 106-554, codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250 STUDENTS 5118.5 Student Use of Computer Systems and Internet Safety Computers, computer networks, Internet Access, and e-mail are effective and important technological resources in today s educational

More information

Non-Discrimination and Anti-Harassment Policy OP 03.03

Non-Discrimination and Anti-Harassment Policy OP 03.03 Non-Discrimination and Anti-Harassment Policy OP 03.03 Policy Mississippi State University is committed to assuring that the University and its programs are free from discrimination and harassment based

More information

Definitions For purposes of this policy, the following terms will be defined as follows.

Definitions For purposes of this policy, the following terms will be defined as follows. The College at Brockport State University of New York Policy Title: Domestic Violence in the Workplace Policy Category: Human Resources Responsible Office: Human Resources Date: Revised December 2013 Domestic

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information