Privacy is the ability of an individual or group to keep their lives and
|
|
- Adele Richard
- 8 years ago
- Views:
Transcription
1 Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees. This article explores that balancing act and attempts to provide guidelines for meeting this challenge, specifically with respect to laws governing the monitoring of employee activities. 1 Privacy is the ability of an individual or group to keep their lives and personal affairs out of public view, or to control the flow of information about themselves. While privacy per se is not specifically addressed as a protected right in the U. S. Constitution it is included in some state constitutions. 2 For example, the California Constitution gives each citizen an inalienable right to pursue and obtain privacy. 3 In fact, California created the Office of Privacy Protection whose mission is protecting and promoting the privacy rights of California consumers. 4 Security is the condition of being protected against danger or loss. In recent years an inherent conflict between security and privacy has evolved, accelerated by digital and communications technology. Never Alan L. Pepper is a partner and a member of the business transactions and intellectual property/technology practice groups at Mitchell Silberberg & Knupp LLP. Mr. Pepper specializes in representing companies in the electronic and physical security industry, and representing governments in the procurement of large computer/software systems. Bethanie F. Thau, a member of the firm s labor and employment practice group, represents management in a variety of labor and employment matters, including administrative, single-plaintiff, and class action proceedings. The authors can be reached at alp@msk.com and bft@msk.com, respectively. 92
2 before have we enjoyed or suffered the ability to so readily gather and use information about individuals or observe their conduct. The increased ability to eavesdrop in video and audio and to track employee movement through satellites and radio frequencies has resulted new legal issues that impact how employers relate to their employees. An employer s efforts to maintain the security of its workplace must be done in a manner that does not violate the privacy rights of its employees. The legal limitations on an employer s right to take action affecting its workers privacy rights come from three different bodies of law: (1) statutory restrictions; (2) constitutional right to privacy (in some states and for public employees); and (3) the common law right to be free from invasion of privacy. Statutory restrictions governing workplace security and employee privacy are found at both the federal and state level. This article primarily addresses federal law and uses various state laws as examples of restrictions at the state level. Generally speaking, an employee can bring a claim against his or her employer for invasion of privacy (based on constitutional or common law privacy rights) only if the employee has a reasonable expectation of privacy. An employee s reasonable expectation of privacy in a workplace communication, location, or other information/circumstances will depend on the particular facts of the case. STATUTORY LIMITATIONS Electronic Communications An employer may wish to monitor its employees electronic communications (such as telephone and communications) in order to, among other reasons, evaluate customer service, or to ensure the security of trade secrets or other confidential information. Such monitoring generally is permitted with the consent (implied or actual) of the relevant parties. Federal Limitations PRIVACY VERSUS SECURITY IN THE WORKPLACE The Electronic Communications Privacy Act of 1986 ( ECPA ) was adopted initially to govern third-party interceptions of electronic commu- 93
3 PRIVACY & DATA SECURITY LAW JOURNAL nications, not to govern employers rights to monitor their workers. The ECPA provides civil and criminal penalties for any person who intentionally intercepts, uses, or discloses any wire, oral, or electronic communication. 5 This can include telephone conversations, s, and instant messages. The two prime exceptions to the ECPA afford employers rights to monitor their employees: An employer may monitor employee conversations if the monitoring occurs in the ordinary course of business or with the employees consent. Failure to comply with ECPA can result in significant fines ($10,000 per incident), compensatory damages, attorney s fees, and punitive damages. Business Use Exemption An employer has the right to monitor the business-related s and telephone traffic of employees. The ECPA contains a business exclusion exemption which exempts interceptions which are made by equipment furnished to the subscriber or user by [a communications carrier] in the ordinary course of its business [and being used by the subscriber or user] in the ordinary course of its business. Under this exemption, an employer may monitor phone calls in an employer-supplied telephone system by attaching a device supplied by the employer. In determining whether a specific use meets the exemption, courts generally look to whether a reasonable business justification exists for the monitoring, whether the employee was informed about the employer s right to monitor, and whether the employer acted consistently in connection therewith. Employers should take care to ensure that any such monitoring is limited to the business use, as some courts have held that monitoring employees personal telephone calls exceeds the business use exemption and can be actionable. Consent Exemption Consent to monitoring of electronic communications can be direct or implied. Courts have differed with respect to the circumstances in which consent to monitor telephone calls or communications may be implied. In some circumstances, consent may be implied based on employer s legal duty to monitor certain activities, such as those in the 94
4 security industry. Additionally, some courts have been willing to find implied consent based merely on employee use of employer equipment to engage in the communications. Other courts seem to require some type of prior notice regarding the employer s policy or practice of monitoring employee communications. State Limitations California Example and Comparison Most states have adopted some legal restrictions regarding electronic monitoring or wiretapping. California law prohibits, with exceptions, electronic eavesdropping on or recording of private communications by telephone, radio telephone, cellular radio telephone, cable, or any other device or in any other manner. 6 Violation can result in penalties of up to $10,000 and imprisonment in county jail or state prison for up to one year. Unlike the federal limitation on monitoring electronic communications, California does not provide for a business use exemption. California does, however, permit monitoring based on consent. Notably, some jurisdictions require consent only of one participant, but many states, such as California, require consent of all parties to the communication. Recently, the California Supreme Court determined that this restriction on electronic eavesdropping applied to a Georgia company that recorded telephone conversations between its Georgia employees and California customers. 7 Federal law requires only the consent of one party to the communication. Video and Audio Surveillance An employer may have many reasons to use audio and/or video surveillance systems to monitor its employees. For example, an employer may be concerned about employee safety, or controlling company assets (including equipment and/or time theft). There are generally fewer statutory restrictions on video (non-audio) surveillance than audio surveillance. Federal Limitations PRIVACY VERSUS SECURITY IN THE WORKPLACE There currently are no specific federal laws governing video-only 95
5 PRIVACY & DATA SECURITY LAW JOURNAL monitoring; however, there have been cases brought by employees under the general right of privacy. 8 One of the key conditions to prosecuting an action for invasion of privacy is whether or not the person has a reasonable expectation of privacy. Courts across the country are finding with more and more frequency that no reasonable expectation of privacy exists with patent video surveillance or with hidden surveillance if the physical space surveyed is a public and open space. However, when the video surveillance is hidden, or records areas generally considered private, such as rest rooms or dressing rooms, the courts have been divided on whether an invasion of privacy has occurred. In January 1998, the Sheraton Boston Hotel and Tower agreed to pay over $200,000 to settle a lawsuit brought by the Hotel Employees and Restaurant Employees Union, Local 26. The local alleged that the hotel violated Massachusetts privacy law when it videotaped workers (without their knowledge) in its employee locker room, seven years earlier. State Limitations Connecticut Example and Comparison Several states have adopted limitations on employee video and/or audio monitoring, particularly in private areas, such as locker rooms.9 Other states, such as Connecticut, have adopted statutes requiring notice of electronic monitoring of employees. 10 The Connecticut statute broadly applies to any electronic monitoring including that by telephone, wire, radio, computer, and camera. 11 The drafters of the Connecticut statute appear to have attempted to balance employers interests in workplace security with employees privacy rights, as this statute does not require notice of electronic monitoring in workplace areas held out for use to the public and provides for an exception to the notice requirement where the employer has reasonable grounds for believing that an employee is engaged in illegal conduct. Tracking Devices New technology, and new uses for existing technology, has provided employers with additional ways to monitor their employees. This includes use of global positioning systems ( GPS ) and radio frequency identification ( RFID ). Most commonly, employers use these devices to 96
6 track employee location or, in the case of some RFIDs, to grant access to restricted workplace areas. Federal Limitations PRIVACY VERSUS SECURITY IN THE WORKPLACE Currently, there is no overarching federal statutory restriction regarding the use of RFID or GPS devices to monitor employees in the workplace. Accordingly, (and in the absence of applicable state law restrictions) use of such devices would be limited only to the extent that they invade an employee s reasonable expectation of privacy. Case law directly on this issue has not yet developed. The U.S. Supreme Court has recognized that, in a Fourth Amendment context, a person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another, suggesting that an employee similarly may have no reasonable expectation of privacy in his or her location on public roads. 12 State Limitations Recently, in a highly publicized news story, an Ohio surveillance company reported that it had implanted RFIDs under the skin of at least two employees (a practice called tagging or chipping ). 13 The company did so as a security measure in order to control access to highly sensitive surveillance footage. According to the company, employees needing access to that storage facility were given the option of having a subcutaneous RFID implanted or carrying the RFID on a badge. Recently, California has adopted law regarding use of subcutaneous RFIDs in the workplace. 14 This law provides that a person shall not require, coerce, or compel another individual to undergo the subcutaneous implanting of an identification device, which includes radio frequency technology that is actively or passively capable of transmitting personal information such as name, address, telephone number, address, date of birth, driver s license number, and other personal or unique information. This law also specifically prohibits conditioning employment upon an agreement to a subcutaneous implant. Additionally, laws restricting the use of electronic monitoring generally, like the Connecticut statute discussed above, may be broad 97
7 PRIVACY & DATA SECURITY LAW JOURNAL enough to cover employer use of these tracking devices to monitor employee locations. REASONABLE EXPECTATION OF PRIVACY Even in the absence of any statute or law prohibiting the specific type of employer monitoring or surveillance system at issue, an employee still may bring a claim for invasion of privacy. An employee proving an unlawful invasion of privacy may recover tort damages, including compensatory and punitive damages. In order to succeed in a claim for invasion of privacy, the employee must prove that he or she had a reasonable expectation of privacy in the workplace communication or circumstances at issue. In evaluating such claims, courts typically take into account whether the employer has a known policy or practice regarding the monitoring, whether the employee was otherwise notified of employer monitoring, and whether the employee consented to the monitoring. Courts also will evaluate whether the monitoring was limited to the use delineated in the policy and/or that consented to. Other factors can include where the monitoring takes place (i.e., did the monitoring take place in a private workplace, a shared workspace, or an area open to the public?), whether the surveillance was in connection with a business purpose, and whether the surveillance was tied to the employee s use of company equipment (such as employee use of employer s telephone or system). Employer policies, and compliance with those policies, can be a key factor in a court s determination of whether or not an employee had a reasonable expectation of privacy. A recent Ohio case, Dukes v. ADS Alliance Data Systems, Inc., is illustrative. 15 In Dukes, the plaintiff employee spent approximately 60 percent of her time engaged in telephone calls on behalf of the company. As an employee, she received a copy of the company handbook that provided that the company periodically monitor[s] and tape[s] phone calls for customer service purposes. The handbook also promised to provide employees with access to alternative telephones for private conversations. On two separate occasions, company telephone monitors listened to the 98
8 employee s private telephone calls with her husband. On the first occasion, a monitor continued to listen to the employee s telephone conversation with her husband for 30 minutes after recognizing that the call was of a purely personal nature. On the second instance, a telephone monitor passed the employee s desk and noticed that she was on a private call. The monitor then returned to her desk and broke in to the call to chastise the employee. The employee filed suit for, among other things, invasion of privacy and violation of the ECPA and its state law equivalent. The employer claimed that the employee consented to the monitoring by virtue of her signed acknowledgment to receipt of the company handbook. The court found that because the handbook policy provided only for periodic monitoring of calls with customers, the signed acknowledgment did not constitute consent to listen to personal calls. Accordingly, the court ruled that the employer did not fall within the consent exemption to the ECPA and state law wiretapping claims and also that the employee s tort law claim for invasion of privacy was viable. CONCLUSION Protecting the security of the workplace is important and recognizing an employer s obligations to protect the privacy of its employees is equally important. Security and privacy policies should be clearly spelled out in an employee manual or similar document. It is incumbent upon employers to stay current on federal and state privacy laws as they react to changes in society and technology. NOTES PRIVACY VERSUS SECURITY IN THE WORKPLACE 1 There are many other areas of the employer/employee relationship that raise issues of employee privacy. Those privacy issues and laws are beyond the scope of this article. 2 Courts have recognized that the Constitution provides privacy rights to public employees under the First, Third, Fourth, Fifth, Ninth and Fourteenth Amendments. 3 California Constitution, Art. 1, 1. 99
9 PRIVACY & DATA SECURITY LAW JOURNAL 4 California is the first state to have an agency dedicated to promoting and protecting the privacy rights of consumers. Now located in the California Office of Information Security and Privacy Protection, the Office of Privacy Protection was created by legislation in 2000 and opened in Its mission is to identify consumer problems in the privacy area and encourage the development of fair information practices. consumer_privacy/ U.S.C et seq. 6 California Penal Code Kearney v. Salomon Smith Barney, Inc., 39 Cal. 4th 95, 128 (2006). 8 In February 2008, a bill proposing the Employee Changing Room Privacy Act was introduced in the House of Representatives. See H.R. 582 [109th]: Employee Changing Room Privacy Act. This law would prohibit all video and audio monitoring in areas where it would be reasonable to expect employees to change clothing. Several similar bills have been proposed in the past, but so far none have been adopted as law. 9 See, e.g., California Labor Code 435 (prohibiting audio and video recording of employees in the rest room, locker room or changing room) and Michigan Comp. Laws (prohibiting any device for observing, photographing or eavesdropping in any private place). 10 See Connecticut General Statutes 31-48d. 11 The Connecticut statute provides that electronic monitoring means the collection of information on an employer s premises concerning employees activities or communications by any means other than direct observation, including the use of a computer, telephone, wire, radio, camera, electromagnetic, photoelectronic or photo-optical system. 12 United States v. Knotts, 460 U.S. 276, 281 (1983). 13 See index.html. Last visited on February 13, California Civil Code Dukes v. ADS Alliance Data Systems, Inc., 2006 U.S. Dist. LEXIS (S.D. Ohio 2006). 100
Video Voyeurism and Surveillance Laws in the Workplace
Video Voyeurism and Surveillance Laws in the Workplace This article is an overview of the laws applicable to audio and video surveillance in the workplace Many employers consider video and other surveillance
More informationThe Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law
The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue
More informationState By State Employee Monitoring Laws
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com State By State Employee Monitoring Laws Law360,
More informationRecording Telephone Calls with Parties in Different Jurisdictions
United States Telephone Recording Laws Legal Aspects of Recording Telephone Conversations: A Practical Guide The federal Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. Sec. 2510 et seq.,
More informationElectronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
More informationTO BE PUBLISHED IN THE OFFICIAL REPORTS. OFFICE OF THE ATTORNEY GENERAL State of California. DANIEL E. LUNGREN Attorney General
1 of 5 TO BE PUBLISHED IN THE OFFICIAL REPORTS OFFICE OF THE ATTORNEY GENERAL State of California DANIEL E. LUNGREN Attorney General OPINION : : No. 97-703 of : : December 5, 1997 DANIEL E. LUNGREN : Attorney
More informationHOUSE BILL REPORT ESHB 1440
HOUSE BILL REPORT As Passed Legislature Title: An act relating to prohibiting the use of a cell site simulator device without a warrant. Brief Description: Prohibiting the use of a cell site simulator
More informationJAN 2 2 2016. (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any
~ (c) S.B. NO. \ JAN 0 A BILL FOR AN ACT THE SENATE TWENTY-EIGHTH LEGISLATURE, 0 STATE OF HAWAII RELATING TO LAW ENFORCEMENT. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: ' SECTION. Section
More informationVideo Voyeurism Laws
Video Voyeurism Laws Federal Law Video Voyeurism Prevention Act of 2004, 18 U.S.C.A. 1801. Jurisdiction limited to maritime and territorial jurisdiction, or federal property including but not limited to
More information~CEIVEcJ FEB 2 4 2014
February 21, 2014 Hon. Kamala D. Harris Attorney General 13 00 I Street, 1 ih Floor Sacramento, California 95814 Attention: Ms. Ashley Johansson Initiative Coordinator ~CEIVEcJ FEB 2 4 2014 INITIATIVE
More informationEMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com
More informationHOUSE ENROLLED ACT No. 1009
Second Regular Session 118th General Assembly (2014) PRINTING CODE. Amendments: Whenever an existing statute (or a section of the Indiana Constitution) is being amended, the text of the existing provision
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationQuestions And Answers. Electron ic Monitoring in the Workplace
Questions And Answers Electron ic Monitoring in the Workplace Kevin J. Smith and Rachel J. Tischler Employers and employment attorneys alike have been concerned about the legal limits of electronic monitoring
More informationWorkplace Monitoring Laws
Workplace Monitoring Laws There are no federal statutes which regulate private employers on broad workplace privacy issues; however, federal laws do regulate specific aspects of privacy that arise during
More informationCCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
More informationCONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationGPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know
GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know The Law, Potential Issues, and Best Practices. By Brian J. Moore and Ashley C. Pack Presenters Bi Brian J. Moore
More informationBOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
More informationUNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT JOHN FAULKNER, on behalf of himself and all others similarly situated, Plaintiff-Appellant, v. ADT SECURITY SERVICES, INC.; ADT SECURITY
More informationMONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian
MONITORING THE ELECTRONIC WORKPLACE Jonathan Topazian A. Introduction Forty years ago, well before the advent of the electronic workplace, the Maryland Court of Appeals first recognized that individuals
More informationCYBERCRIME LAWS OF THE UNITED STATES
CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications
More informationCase 1:14-cv-14355 Document 1 Filed 12/08/14 Page 1 of 7 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS COMPLAINT
Case 1:14-cv-14355 Document 1 Filed 12/08/14 Page 1 of 7 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS GEORGE THOMPSON, Plaintiff, v. C.A. No. 14-14355 THOMAS BARBOZA, Defendant. INTRODUCTION
More informationASSEMBLY COMMITTEE ON EDUCATION Patrick O'Donnell, Chair SB 271 (Gaines) As Amended June 30, 2015
Page 1 Date of Hearing: July 15, 2015 ASSEMBLY COMMITTEE ON EDUCATION Patrick O'Donnell, Chair SB 271 (Gaines) As Amended June 30, 2015 [Note: This bill was double referred to the Assembly Committee on
More informationExhibit A. Federal Statutes Impacting Data Security
Exhibit A Federal Statutes Impacting Data Security Michele A. Whitham Partner, Founding Co-Chair Security & Privacy Practice Group Foley Hoag LLP 155 Seaport Boulevard Boston, MA 02210 Federal Law Citation
More informationAn Employer s Guide to Hidden Cameras in the Workplace 1. Analyzing the Rights of Public and Private Employers
An Employer s Guide to Hidden Cameras in the Workplace 1 By David B. Wilson 2 It s a typical work day for Jane Bond. She hops into her car, leaves her suburban home and battles rush hour traffic on the
More informationLAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT
LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT Law-enforcement agencies in Virginia continue to enjoy one of the broadest exemptions for releasing information in all of the states. The Virginia
More informationFEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE
FEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE FEDERAL CIVIL FALSE CLAIMS ACT The federal civil False Claims Act, 31 U.S.C. 3729, et seq., ( FCA ) was originally enacted in 1863 to combat fraud perpetrated
More informationHOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.
HOT TOPICS IN EMPLOYMENT LAW E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications by Andrew M. Low Employers have plenty of legitimate reasons for wanting to
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationSURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
More informationOklahoma FALSE CLAIMS LAWS
Oklahoma Company-affiliated facilities in Oklahoma must ensure that all employees, including management, and any contractors or agents are educated regarding the federal and state false claims statutes
More information04 LC 25 3484 A BILL TO BE ENTITLED AN ACT
0 LC House Bill 0 By: Representatives Boggs of the th, Bordeaux of the th, Westmoreland of the th, Jenkins of the rd, Smyre of the th, and others A BILL TO BE ENTITLED AN ACT To amend Article of Chapter
More informationLAWS ON RECORDING CONVERSATIONS IN ALL 50 STATES
MATTHIESEN, WICKERT & LEHRER, S.C. 1111 E. Sumner Street, P.O. Box 270670, Hartford, WI 53027 Phone: (262) 673-7850 Fax: (262) 673-3766 gwickert@mwl-law.com www.mwl-law.com LAWS ON RECORDING CONVERSATIONS
More informationPublic Information and Open Meetings
NEWLY ELECTED OFFICIALS WORKSHOP 2012 Public Information and Open Meetings Habib Erkan, Denton Navarro, Rocha & Bernal, P.C. - San Antonio, TX Public Information Act Public Information means information
More informationCredit Reports and the Fair Credit Reporting Act. The Credit Bureaus
Credit Reports and the Consumer Law Eric E. Johnson eejlaw.com Konomark Most rights sharable. The Credit Bureaus 1 State law causes of action against credit bureaus Defamation Invasion of privacy State
More informationSection II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY
Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,
More information7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
More informationPrivacy Information. www.privacy-information.org. Workplace Privacy Guide
Privacy Information www.privacy-information.org A project of Consumer Action Workplace Privacy Guide Workplace monitoring Checks and tests Privacy rights in the workplace Dos and don ts Assistance and
More informationSocial Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
More informationI. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
More informationINDEPENDENT CONTRACTOR AGREEMENT
INDEPENDENT CONTRACTOR AGREEMENT This Independent Contractor Agreement ( Agreement ) is entered between Nordstrom, Inc. ( Nordstrom ), with a business address at 1700 Seventh Avenue, Suite 1000, Seattle,
More informationSOCIAL SECURITY NUMBER PRIVACY ACT (EXCERPT) Act 454 of 2004. This act shall be known and may be cited as the "social security number privacy act".
SOCIAL SECURITY NUMBER PRIVACY ACT (EXCERPT) Act 454 of 2004 445.81 Short title. Sec. 1. This act shall be known and may be cited as the "social security number privacy act". 445.82 Definitions. Sec. 2.
More informationAttorney for Plaintiff SUPERIOR COURT OF THE STATE OF CALIFORNIA SAN BERNARDINO COUNTY CIVIL DIVISION. MARIA GODINEZ, an individual,
VACHON LAW FIRM Michael R. Vachon, Esq. (SBN ) 0 Via Del Campo, Suite San Diego, California Tel.: () -0 Fax: () - Attorney for Plaintiff SUPERIOR COURT OF THE STATE OF CALIFORNIA SAN BERNARDINO COUNTY
More informationAudio Monitoring And The Law: How to Use Audio Legally in Security Systems. Today s Learning Objectives
Audio Monitoring And The Law: How to Use Audio Legally in Security Systems Presented to ISC West / SIA Education April 11, 2013 Donald J Schiffer Attorney at Law General Counsel Louroe Electronics Today
More informationFair Credit Reporting Act Compliance Guide
Fair Credit Reporting Act Compliance Guide FAIR CREDIT REPORTING ACT TABLE OF CONTENTS Page I. INTRODUCTION...1 A. Increased Applicant and Employee Rights...1 B. What is a "Consumer Report?"...1 C. What
More informationGuidelines on video surveillance
Guidelines on video surveillance A manual that explains the rules on the introduction of video surveillance, and calls attention to the most frequest violations of law in its implementation. Contents 3
More information9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.
Miscellaneous Current Topics in Healthcare Professional Liability Josh Zirin, FCAS, MAAA Antitrust Notice The Casualty Actuarial Society is committed to adhering strictly to the letter and spirit of the
More informationALARM PERMITS. Application, Protective Sweep Authorization and LOC 20.08
ALARM PERMITS Application, Protective Sweep Authorization and LOC 20.08 ALARM USE PERMIT APPLICATION For Office Use Only Alarm Permit #: Date Issued: Name of Alarm User 1: Date of Birth: Name of Alarm
More informationNORTHCARE NETWORK. POLICY TITLE: Deficit Reduction Act (DRA) EFFECTIVE DATE: 1/1/15 REVIEW DATE: New Policy
NORTHCARE NETWORK POLICY TITLE: Deficit Reduction Act (DRA) EFFECTIVE DATE: 1/1/15 REVIEW DATE: New Policy RESPONSIBLE PARTY: Chief Executive Officer/Compliance Officer CATEGORY: Compliance BOARD APPROVAL
More informationMASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
More informationSeptember 18, 1998 FIRST QUESTION PRESENTED ANSWER GIVEN SECOND QUESTION PRESENTED ANSWER GIVEN THIRD QUESTION PRESENTED ANSWER GIVEN DISCUSSION
September 18, 1998 No. 8261 This opinion is issued in response to questions from Jan Curry, Manager of the Driver and Motor Vehicle Services Branch of the Oregon Department of Transportation (ODOT), about
More informationTHE FAIR LABOR STANDARDS ACT: AN OVERVIEW
THE FAIR LABOR STANDARDS ACT: AN OVERVIEW MATERIALS BY: ALLISON SCHAFER, LEGAL COUNSEL/DIRECTOR OF POLICY PRESENTED BY: CHRISTINE SCHEEF, STAFF ATTORNEY NORTH CAROLINA SCHOOL BOARDS ASSOCIATION July 2013
More informationSecretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor
Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,
More informationVNSNY CORPORATE. DRA Policy
VNSNY CORPORATE DRA Policy TITLE: FEDERAL DEFICIT REDUCTION ACT OF 2005: POLICY REGARDING THE DETECTION & PREVENTION OF FRAUD, WASTE AND ABUSE AND APPLICABLE FEDERAL AND STATE LAWS APPLIES TO: VNSNY ENTITIES
More informationUPDATED. OIG Guidelines for Evaluating State False Claims Acts
UPDATED OIG Guidelines for Evaluating State False Claims Acts Note: These guidelines are effective March 15, 2013, and replace the guidelines effective on August 21, 2006, found at 71 FR 48552. UPDATED
More informationState Medicaid FCA - A Lawyer's Perspective
May 15, 2012 New Law Extends Georgia False Claims Liability to Non- Medicaid Claims Significant Revisions Also Made to Existing State False Medicaid Claims Act Introduction On April 16, 2012, Georgia Governor
More informationFair Credit Reporting Act (FCRA) Basics. A Primer for U.S. Employers from Littler Mendelson, the Nation s Largest Workforce Law Practice
Fair Credit Reporting Act (FCRA) Basics A Primer for U.S. Employers from Littler Mendelson, the Nation s Largest Workforce Law Practice Fair Credit Reporting Act (FCRA) Basics A Primer for U.S. Employers
More informationFalse Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1
False Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1 When Do False Claims Laws Apply? The federal False Claims Act (FCA) applies to any requests for payment from
More informationDigital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
More informationBEFORE THE CORPORATION COMMISSION OF T~~R-G~.'r`, C STAFF'S RESPONSE TO APPLICATION OF YOURTEL AMERICA, INC. AND BRIEF IN SUPPORT
1 Selma* F :.f MA R 0 > ~ 'U0 BEFORE THE CORPORATION COMMISSION OF T~~R-G~.'r`, C APPLICATION OF YOURTEL AMERICA, INC. ~ Or OKLAHOtII a F/K/A THE PAGER COMPANY D/B/A THE ) CAUSE NO. PUD 200700047 PAGER
More informationLowcountry Injury Law
Lowcountry Injury Law 1917 Lovejoy Street Post Office Drawer 850 Beaufort, South Carolina 29901 Personal Injury Phone (843) 524-9445 Auto Accidents Fax (843) 532-9254 Workers Comp DanDenton@Lawyer.com
More informationTRIAL AGREEMENT FOR QUALIANCE
TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE
More informationSettling a False Claims Act Case: Practicalities and Pitfalls
Settling a False Claims Act Case: Practicalities and Pitfalls Brian A. Hill bhill@milchev.com Jeffrey M. Hahn jhahn@milchev.com Overview Because the vast majority of FCA cases are settled, every FCA practitioner
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationUNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA
1 1 1 1 1 1 1 1 0 1 LAW OFFICES OF RONALD A. MARRON RONALD A. MARRON (SBN 10) ron@consumersadvocates.com ALEXIS WOOD (SBN 000) alexis@consumersadvocates.com KAS GALLUCCI (SBN 0) kas@consumersadvocates.com
More informationVERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA
VERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA This Business Associate Addendum ("Addendum") supplements and is made a part of the service contract(s) ("Contract") by and between St. Joseph Health System
More informationIN THE DISTRICT COURT IN AND FOR TULSA COUNTY STATE OF OKLAHOMA DEFENDANT RICCARDO FERRANTE S MOTION TO QUASH FOR INSUFFICIENT EVIDENCE
IN THE DISTRICT COURT IN AND FOR TULSA COUNTY STATE OF OKLAHOMA STATE OF OKLAHOMA, ) ) Plaintiff, ) ) v. ) Case No. CF-2006-3132 ) Judge Tom C. Gillert ) RICCARDO GINO FERRANTE. ) ) Defendant. ) DEFENDANT
More informationNorth Shore LIJ Health System, Inc.
North Shore LIJ Health System, Inc. POLICY TITLE: Detecting and Preventing Fraud, Waste, Abuse and Misconduct POLICY #: 800.09 System Approval Date: 6/23/14 Site Implementation Date: Prepared by: Office
More informationOSF HEALTHCARE FALSE CLAIMS PREVENTION AND WHISTLEBLOWER PROTECTIONS
OSF HEALTHCARE FALSE CLAIMS PREVENTION AND WHISTLEBLOWER PROTECTIONS POLICY: CC-109 It is the policy of OSF HealthCare (OSF) that false, inaccurate or improper claims will not be submitted to any payer.
More informationTELECOMMUNICATIONS AND CABLE TV
TELECOMMUNICATIONS AND CABLE TV Subscription and Billing Practices The Wisconsin Department of Agriculture, Trade and Consumer Protection (DATCP) regulates unfair and deceptive business practices. DATCP
More informationPIONEER TELEPHONE COOPERATIVE, INC. PIONEER LONG DISTANCE, INC. CELLULAR NETWORK PARTNERSHIP D/B/A PIONEER CELLULAR TERMS AND CONDITIONS OF SERVICE
PIONEER TELEPHONE COOPERATIVE, INC. PIONEER LONG DISTANCE, INC. CELLULAR NETWORK PARTNERSHIP D/B/A PIONEER CELLULAR TERMS AND CONDITIONS OF SERVICE Pioneer Telephone Cooperative, Inc., Pioneer Long Distance,
More informationProtection from Harassment Bill
Protection from Harassment Bill Bill No. 12/2014. Read the first time on 3rd March 2014. PROTECTION FROM HARASSMENT ACT 2014 (No. of 2014) Section ARRANGEMENT OF SECTIONS PART I PRELIMINARY 1. Short title
More informationLast Approval Date: May 2008. Page 1 of 12 I. PURPOSE
Page 1 of 12 I. PURPOSE The purpose of this policy is to comply with the requirements in Section 6032 of the Deficit Reduction Act of 2005 (the DRA ), which amends Section 1902(a) of the Social Security
More information2 Privacy concerns also apply to advertising-based models that have been developed for services, such as
An Overview of the Federal Wiretap Act, Electronic Communications Privacy Act, and State Two-Party Consent Laws of Relevance to the NebuAd System and Other Uses of Internet Traffic Content from ISPs for
More informationNEW YORK STATE UNIFIED COURT SYSTEM. JURY INFORMATION FOR EMpLOYERS
NEW YORK STATE UNIFIED COURT SYSTEM JURY INFORMATION FOR EMpLOYERS FOR COpIES OF THIS BOOKLET CALL: 1-800-NY-JUROR 1-800-695-8767 OR ORDER ON THE WEB: WWW.NYJUROR.gOV MESSAGE FROM THE CHIEF JUDGE This
More informationAlabama: Examples of fraud include the following:
Alabama: Alabama law does not provide for civil false claim actions, as does the federal False Claims Act, but prosecutors may bring criminal actions against any person who knowingly makes or causes to
More informationCompliance Plan False Claims Act & Whistleblower Provisions Purpose/Policy/Procedures
CATHOLIC CHARITIES OF THE ROMAN CATHOLIC DIOCESE OF SYRACUSE, NY and TOOMEY RESIDENTIAL AND COMMUNITY SERVICES Compliance Plan False Claims Act & Whistleblower Provisions Purpose/Policy/Procedures Purpose:
More informationAN ACT IN THE COUNCIL OF THE DISTRICT OF COLUMBIA
AN ACT IN THE COUNCIL OF THE DISTRICT OF COLUMBIA To amend the District of Columbia Procurement Practices Act of 1985 to make the District s false claims act consistent with federal law and thereby qualify
More informationMinnesota False Claims Act
Minnesota False Claims Act (Minn. Stat. 15C.01 to.16) i 15C.01 DEFINITIONS Subdivision 1. Scope. --For purposes of this chapter, the terms in this section have the meanings given them. Subd. 2. Claim.
More informationDEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
More informationPlease see Section IX. for Additional Information:
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: CS/CS/SB 364 Prepared By:
More informationPHP POINT OF SALE TERMS OF USE
PHP POINT OF SALE TERMS OF USE This Terms of Use Agreement (the Agreement ) states the terms and conditions that govern the contractual agreement between PHP Point of Sale, LLC, (the Company ) and you
More informationCHAPTER 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS
18 U.S.C. United States Code, 2010 Edition Title 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 121 - STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS CHAPTER 121
More informationNEW WAVE PRIVACY NOTICE
NEW WAVE PRIVACY NOTICE Companies controlled by NewWave Communications (subsequently referred to as NewWave, we, our, or us ) operate cable television systems through which they provide their customers
More informationMontana Elder and Persons With Developmental Disabilities Abuse Prevention Act
Montana Elder and Persons With Developmental Disabilities Abuse Prevention Act 52-3-801. Short title. This part may be cited as the "Montana Elder and Persons With Developmental Disabilities Abuse Prevention
More informationAct on the Protection of Privacy in Working Life (759/2004)
NB: Unofficial translation Ministry of Labour, Finland Chapter 1 - General provisions Section 1 Purpose of the act Act on the Protection of Privacy in Working Life (759/2004) The purpose of this Act is
More informationC O N F I D E N T I A L A N D P R O P R I E T A R Y. Page 1 of 7 Title: FRAUD, WASTE, AND ABUSE POLICY
Page 1 of 7 1. Purpose As a Company that does business with U.S. state and federal government health care programs (such as Medicare and Medicaid), Hill-Rom is required to maintain a system of policies
More information5037 Employee Education About False Claims Recovery 5037. The purpose of this policy is to educate employees, contractors, and agents on
5037 Employee Education About False Claims Recovery 5037 The purpose of this policy is to educate employees, contractors, and agents on the requirements of the Deficit Reduction Act (DRA) of 2005 which
More informationCrimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationProducts Liability: Putting a Product on the U.S. Market. Natalia R. Medley Crowell & Moring LLP 14 November 2012
Products Liability: Putting a Product on the U.S. Market Natalia R. Medley Crowell & Moring LLP 14 November 2012 Overview Regulation of Products» Federal agencies» State laws Product Liability Lawsuits»
More informationRight to Financial Privacy Act
Background The Right to Financial Privacy Act of 1978 was enacted to provide the financial records of financial institution customers a reasonable amount of privacy from federal government scrutiny. The
More informationNC General Statutes - Chapter 75 Article 4 1
Article 4. Telephone Solicitations. 75-100. Findings. The General Assembly finds all of the following: (1) The use of the telephone to market goods and services to the home is now pervasive due to the
More informationAppendix L: Nebraska s False Medicaid Claims Act Nebraska Statues Chapter 68 November 2013 Section 68-935 Terms, defined.
Appendix L: Nebraska s False Medicaid Claims Act Nebraska Statues Chapter 68 November 2013 Section 68-935 Terms, defined. For purposes of the False Medicaid Claims Act: A. Attorney General means the Attorney
More informationOpinion #177. Advancing Litigation Costs Through Lines of Credit
Opinion #177. Advancing Litigation Costs Through Lines of Credit Issued by the Professional Ethics Commission Date Issued: December 14, 2001 Facts and Question An attorney has requested an opinion on whether
More information1. Protest Allegations, Request for Information and Site Visits Conducted
U.S. SMALL BUSINESS ADMINISTRATION WASHINGTON, D.C. 20416 Sent Via Facsimile February 26, 2014 Arlington, VA 22205 Fax: RE: HUBZone Protest for Solicitation No. Dear Mr. This letter is to notify you that
More informationFair Debt Collection Practices Act 1
Fair Debt Collection Practices Act 1 The Fair Debt Collection Practices Act (FDCPA)(15 U.S.C. 1692 et seq.), which became effective March 20, 1978, was designed to eliminate abusive, deceptive, and unfair
More informationDepartment, Board, Or Commission Author Bill Number
BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain
More information