Social Media In the Workplace
|
|
|
- Eric Pierce
- 10 years ago
- Views:
Transcription
1 Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL (217)
2 Overview: Social Media What is it? Risks Presented Properly Regulating Employee Usage Employee Privacy Rights Regarding Personal Information What Can You Do?
3 Social Media Social media has been defined as the use of web-based and mobile technologies to turn communication into interactive dialogue. Examples include Facebook, Twitter, LinkedIn, MySpace, Skype, YouTube, Blogs, and Instant Messaging. Facebook: There are more than 500 million active users. 50% of active users log into Facebook on any day. The average user creates 90 pieces of content each month. Market value around $50 billion. 1
4 Benefits of Social Media to Employers Branding; Client development and service; Research; Recruiting; Improve employee engagement; Facilitate multi-office workplaces. Facebook has noted this trend and now provides a number of business-related applications such as document sharing, networking tools, and blog promotion.
5 Employer Issues/Hazards Created by Social Media Decreased productivity is an issue with any employee internet usage, but specific to social media, there are additional harms that may pose greater risks, such as: Sharing confidential information and trade secrets; Criticizing, disparaging, or harassing employers, co-workers, or clients; Posting embarrassing videos recorded in the workplace; Endorsing products or services without proper disclosure; Engaging in criminal conduct;
6 Employer Legal Liability Resulting from Misuse of Social Media Hostile Work Environment and Discrimination Claims Defamation Claims Improper Disclosure of Confidential or Other Protected Information Reporting Requirements for Child Pornography Federal Trade Commission (FTC) Guides
7 Hostile Work Environment and Discrimination Claims Social media provides employees additional ways to engage in inappropriate conduct. Employees may post discriminatory statements, racial slurs, or sexual innuendos directed at coworkers, management, customers, or vendors. A supervisor who post discriminatory statements regarding employees who are later terminated may subject the employer to an adverse employment action, and such a post could be used as evidence.
8 Defamation Claims Employee postings of rumors, gossip, and false statements about co-workers and supervisors may create unrest in the workplace. In addition, negative comments by management may create liability. For example, a supervisor at one company posts false and damaging comments about an employee leaving the company. If as a result of these comments the employee is not hired by a second company, the former employee may have a defamation cause against her former employer.
9 Improper Disclosure of Confidential or Other Protected Information Employees may inadvertently reveal proprietary or confidential information. Employees may also act deliberately, such as a disgruntled employee who reveals trade secrets or other proprietary information.
10 Reporting Requirements for Child Pornography Illinois and other states require mandatory reporting by information technology workers of child pornography found on computers they are servicing. Employers must take care to preserve evidence for legal authorities and not to destroy any equipment or files containing such evidence.
11 Federal Trade Commission (FTC) Guides Newly revised FTC Guides address the use of endorsements and testimonials in advertising, and employers may be liable when employees comment on employer services or products on social media if the employment relationship is not disclosed.
12 Ensuring that Employees Use Social Media Only as Desired Consider possible legal restraints on employer actions Consider privacy concerns; Need for a social media policy; Tips for developing an effective social media policy.
13 Difficulties in Disciplining Employees for Using Social Media There are legal restraints on preventing or limiting employees: Be cautious that social media policy is not overly broad and clearly defines the prohibited activity in order to avoid interfering with protected activity. Labor Law The National Labor Relations Act applies to all employers. Employers have rights to concerted activity and therefore they can get together to discuss workplace activity related to their interests as employees. This includes the right to discuss with co-workers and outsiders the terms and conditions of their employment and to even criticize employers.
14 Difficulties in Disciplining Employees for Using Social Media Employees may be protected by federal and state whistleblower laws when complaining about company conditions that affect public health and safety and when reporting potential securities fraud violation; Many states do not allow employers to influence an employee s political activities or regulate employee political activities and affiliations; Some states protect an employee or applicant s legal off-duty activities with lawful conduct laws; In hiring, disciplining, and firing, an employer is prohibited from unlawfully discriminating against employees based on protected characteristics, such as race, age, sexual orientation, marital status, disability, and genetic information.
15 Privacy Concerns Tort Law Federal Wiretap and the ECPA State Law Illinois Eavesdropping Act Illinois Law on Monitoring Stored Communications Act
16 Tort Law Tort claims and invasion of privacy theories provide private sector employees with common law privacy rights. With regards to monitoring of electronic communications by employers, an applicable theory is intrusion upon the plaintiff s seclusion or solitude, which requires proof of: 1. An intentional intrusion, physical or otherwise, 2. Upon the plaintiff s solitude or seclusion or private affairs or concerns, 3. Which would be highly offensive to a reasonable person.
17 Tort Law Defense against such claims: Establishing that the employee did not have a reasonable expectation of privacy in the electronic communications. Courts are generally more inclined to rule in the employer s favor where the employee voluntarily uses an employer s network and/or computer and consented to be monitored or was advised of the employer s written electronic communications policy.
18 Federal Wiretap and the ECPA ECPA amended the Federal Wiretap Act The ECPA imposes criminal and civil penalties against any person who intentionally intercepts an electronic communication with certain specific exceptions, including an ordinary course of business exception. The Stored Communications Act, which is part of the ECPA, covers stored electronic communications. Federal Court in New Jersey upheld a verdict against managers at a restaurant who intentionally and without authorization accessed a private, invitation-only chat group on MySpace in violation of the federal SCA.
19 Illinois State Law Eavesdropping Act A person commits eavesdropping when he: (1) Knowingly and intentionally uses an eavesdropping devise for the purpose of hearing or recording all or any part of any conversation or intercepts, retains, or transcribes electronic communication unless he does so (A) with the consent of all of the parties to such conversation or electronic communication. 720 ILCS 5/14-2(a).
20 Stored Communications Act [A] person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service. 18 U.S.C.A Courts have made clear that this Act applies to social media service providers. If an employee does not consent or can argue that the employer was coercive in gaining access to one s social media information, an employer may not be authorized to access such information.
21 The Need for a Social Media Policy To prevent the loss of productivity; To permit effective monitoring (compliance with laws); To protect the reputation and image of your company; To protect against the loss of confidential information and trade secrets; To protect against discrimination, harassment, and cyber-bullying; To guard against suits for invasion of privacy, defamation, improper recruiting and improper discipline and termination;
22 Supreme Court Guidance Provided in Quon v. City of Ontario To guard against suits for invasion of privacy employers should: Have clear and understandable technology use policies that explicitly define the types of technology they are intended to cover and explain that employees have limited expectations of privacy in the workplace. Employers must have a legitimate business interest for searching and employee s personal communications or transactions.
23 Tips for Developing an Effective Social Media Policy Should be clear and organization specific depending on the organization s culture and approach to social technologies, and the nature of the work performed by its employees. Should be consistent with the organization s polices and procedures, such as: Anti-discrimination Anti-harassment Computer, Internet, Systems Employee Privacy Confidentiality and Trade Secrets References
24 Tips for Developing an Effective Social Media Policy Inform employees of potential risk and make them aware of the employer s expectations. Warn employees that the employer will not tolerate will and will subject the individual to discipline for postings regarding: Proprietary and confidential company information; Discriminatory statements or sexual innuendos regarding co-workers, management, customers or venders; And defamatory statements regarding the company, its employees, customers, competitors, or vendors.
25 Tips for Developing an Effective Social Media Policy Make clear that mentions of the company must include a disclaimer noting that any opinions expressed are the employee s own and do not represent those of the company. It should be made clear that these restrictions apply to social media usage at any time, on any computer.
26 Make Expectations Clear The First Amendment does not protect an employee from being monitored, disciplined or terminated for violating a clear and reasonable social medial policy. Courts have often considered whether an employer has an electronic communications policy to determine whether an employee had a reasonable expectation of privacy. By making clear what is considered acceptable use and reducing the level of privacy that employees expect in their work computer systems, , and internet usage, this will insulate employers from liability, reduce the employees expectation of privacy, and give the employer more discretion to act when employees engage in misconduct. In addition to what an employee may not do as listed above, make clear what the employer considers acceptable use (i.e., business use only, limited personal use, or unlimited personal use).
27 Make Expectations Clear Should make clear that employees may not: Post proprietary and confidential company information; Post discriminatory statements or sexual innuendos regarding coworkers, management, customers, or vendors; Post defamatory statements regarding the company, its employees, customers, competitors, or vendors; Claim or imply authorization to speak as an organization representative; Make use of the organization s name in their online identity; Make use of the organization s intellectual property, logos, trademarks, and copyrights in any manner; Make use of restricted language such as profanity, inappropriate speech; Use social media unless, use is acceptable.
28 Additional Considerations Address whether an employee can access social media at work. If it is allowed, address restrictions on access and usage at work. Reserve the right to remove content without notice. Remind employees about privacy settings. Make clear that the company s policies apply to computers, systems, blackberry, telephone/voic systems and any of the data on these systems. Provide mandatory training.
29 Additional Considerations Reserve the right to take disciplinary action against an employee if they violate company policy. Designate a compliance officer and develop a compliance framework. Develop a reporting procedure. Let employees know they are expected to act professionally both on and off duty. Include a statement that the policy does not intend to interfere with rights granted under the NLRA Provide notice that monitoring will occur, which will further reduce an employee s expectation of privacy. Require that anything posted on a company social media page be approved by a compliance officer.
30 Hiring Decisions As long as employer does not violate state or federal discrimination laws, there are currently no prohibitions against employment decisions based on information placed in the public domain. However Employers should: Screen candidates in a uniform manner Receive written consent from job applicants Be cautious not to coerce access Use a neutral third party to filter protected information Have a legitimate, non-discriminatory reason for employment decisions based on information found on social media
31 Employee Privacy Rights Regarding Personal Information Background Checks Medical Information Genetic Information Employer s Obligation to Prevent Disclosure and Notification Monitoring
32 Background Checks Credit histories, criminal records, and similar records: Cannot screen applicants protected by state and federal discrimination laws. Conduct reasonable job inquiries without discriminating. Use of credit histories is conditional on consent of applicant and must only be used for hiring or promotion decisions. In Illinois, an employer may not refuse to hire an applicant with a criminal record unless the underlying facts are corroborated and they speak directly to performance criteria for the job applied for by the applicant.
33 Medical Information Illinois does not have a specific law addressing employer use of medical information. The ADA however is both an antidiscrimination statute and a medical privacy law. The ADA places very strict limitations on the use of information obtained from medical examination and inquiries. All information obtained must be collected and maintained on separate forms, in separate medical files separate from personnel files, and must be treated as a confidential medical record.
34 Medical Information Exceptions: Supervisors and managers may be informed about necessary restrictions on the work or duties of an employee and necessary accommodations; first aid and safety personnel may be informed, when appropriate, if the disability might require emergency treatment or if any specific procedures are needed in the case of fire or other evacuations; government officials investigating compliance with the ADA and other federal and state laws prohibiting discrimination on the basis of disability or handicap should be provided relevant information on request; relevant information may be provided to state workers compensation offices or second injury funds, in accordance with state workers compensation laws; and relevant information may be provided to insurance companies where the company requires a medical examination to provide health or life insurance for employees.
35 Genetic Information - Illinois Illinois law protects genetic testing information. Genetic testing and information derived from genetic testing is confidential and privileged and may be released only to the individual tested and to persons specifically authorized. 410 ILCS 513/15 No person to whom the results of a test have been disclosed may disclose test results to another person except as authorized by Section ILCS 513/35 Section 25 details the use of genetic testing information by employers. It states that [a]n employer... shall treat genetic information in such a manner that is consistent with the requirements of federal law.
36 Genetic Information - Federal The Federal Genetic Information Nondiscrimination Act protects genetic testing information. Employers may not request, require, or purchase genetic information of an individual or family member of the individual. 29 C.F.R (a). Where a request includes conducting an Internet search on an individual in a way that is likely to result in... obtaining genetic information. 29 C.F.R (a).
37 Employer s Obligation to Prevent Disclosure and Notification Personal Information Protection Act Any data collector that owns or licenses personal information concerning an Illinois resident shall notify the resident at no charge that there has been a breach of the security of the system data following discovery or notification of the breach. 815 ILCS 530/10(a). An employer may be considered a data collector. However, Cooney v. Chicago Public Schools held that the PIPA does not create a duty to protect information of former employees. Unlike other states, Illinois does not have a data protection statute. Federal laws do exist that establish a duty to protect specific types of information as well.
38 Monitoring Issues The Electronic Communications Privacy Act of 1986 governs the privacy of oral, wire, and electronic communications for private and public entities. A violation of the act occurs when there is intentional or willful interception, accession, disclosure, or use of another s wire, oral, or electronic communication that affects interstate or foreign commerce. One exception to the act is to obtain its employee s consent to the interception, access, or disclosure of the electronic communication. Illinois requires the mutual consent of employees and employers in order to monitor communications.
39 Summary It is critical for your business to have a detailed electronic communications policy to enable your company to take advantage of the power of social media while protecting its goodwill and not infringing on privacy rights granted to employees.
40 Questions? Randy Green (217)
Social Media in the Workplace: Avoiding Legal Pitfalls
Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:
Social Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
Internet & Technology Usage in the Networked Workplace: Legal Implications
Internet & Technology Usage in the Networked Workplace: Legal Implications EDDY D. VENTOSE PROFESSOR OF LAW UNIVERSITY OF THE WEST INDIES, CAVE HILL CAMPUS The Employment Process 2 Recruitment Process
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor [email protected] I. USE OF INFORMATION DURING HIRING PROCESS
Human Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
Communications 01: Social Media
Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
Social Media in the Workplace. Stacey L. Smiricky Partner, Labor & Employment Group
Social Media in the Workplace Stacey L. Smiricky Partner, Labor & Employment Group Lessons Learned Employee who called in sick later places a status update on his Facebook page announcing sick day at Wrigley
REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE. Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant
USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant Employee Misuse of Social Media Employees Misuse Social Media By: Disclosing
SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE
New Jersey League of Municipalities SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE Presented by: BRIAN W. KRONICK, ESQ. Genova, Burns & Giantomasi (973) 533-0777 November
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
Managing Social Media Employment Issues
Managing Social Media Employment Issues October 1, 2013 Katie Carder McCoy 206.447.2880 [email protected] Presentation Outline: What is social media and who cares? Risks of employer-sponsored social media,
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Social Networking: Issues in Employment Law
Social Networking: Issues in Employment Law What is Social Media? Web-based technologies that enable people to interact with each other Journalist Broadcaster Expert Users become content producers, or
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Legal Ramifications of the Social Media Explosion: An Employer s Guide
SUMMIT LAW GROUP a professional limited liability company Legal Ramifications of the Social Media Explosion: An Employer s Guide 30 th Annual Labor Relations Institute April 28-30, 2010 Kristin D. Anger
Social Media An Employment Nightmare. Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C.
Social Media An Employment Nightmare Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C. Show of hands: Who uses social media to screen job applicants?
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
SOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
YWCA Metro St. Louis Social Media Policy
YWCA Metro St. Louis Social Media Policy I. Purpose Social media encompasses a growing collection of online technologies and tools that allow and encourage users to interact and build relationships by
POLICY. Responsible Use of Social Media
POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims
How To Protect Your Employees From Being Harassed On Social Media (For Women)
Surfing, Shopping and Blogging: Regulation of Employee Social Media Use Legal Issues in Higher Education University of Vermont October 17, 2011 Barbara A. Lee Rutgers University and Edwards Angell Palmer
Social Media in the Workplace
Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION
ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Organizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY
Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Communications & Marketing Policy 12-745 Approved by: System Management Team Origination Date: 08/2009 Revised Date:
Media Traps. Attorney Nilesh P. Patel
Workplace Social Media Traps Attorney Nilesh P. Patel Mahadev Law Group, LLC Human Resources & Employment Law Solutions www.mahalawgroup.com [email protected] 877-210-2499 Definition: Online forums
Fair Employment Practices
In the GE Community Fair Employment Practices (Policy 20.2) Issued: October 2000 Supersedes: April 1993 GE is committed to fair employment practices, including the prohibition against all forms of illegal
Model Policy for a Law Enforcement Agency s use of Social Networking
Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model
With the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
CODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Moreover, sexual harassment is a violation of federal, state and county fair employment laws.
Sexual harassment interferes with a productive working environment, interjects irrelevant considerations into personnel decisions and generally demeans employees who are victims of harassment. Moreover,
Employee Handbook. Welcome to ATB Staffing Services. 534 Main Street Medina, NY 14103 (585) 318-4218 (585) 318-4257 fax
Welcome to ATB Staffing Services 534 Main Street Medina, NY 14103 (585) 318-4218 (585) 318-4257 fax [email protected] www.atbstaffingservices.com Employee Handbook Revised March 2010 13 Notes
SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS
These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
SEXUAL HARASSMENT POLICY STATEMENT
SEXUAL HARASSMENT POLICY STATEMENT The company is committed to providing a workplace that is free from all forms of discrimination, including sexual harassment. Any employee's behavior that fits the definition
HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.
HOT TOPICS IN EMPLOYMENT LAW E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications by Andrew M. Low Employers have plenty of legitimate reasons for wanting to
Pacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
MINNETONKA PUBLIC SCHOOLS
MINNETONKA PUBLIC SCHOOLS Policy #470: Employee Use of Social Media I. PURPOSE As a national leader in using technology as an accelerator of learning, the Minnetonka School District recognizes the value
U.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
WHISTLEBLOWING AND CONDUCTING INVESTIGATIONS. Eileen P. Kennedy Berliner Cohen
WHISTLEBLOWING AND CONDUCTING INVESTIGATIONS Eileen P. Kennedy Berliner Cohen 1 Topics I. New Laws Protecting Whistleblowers. II. III. IV. Other Anti-Retaliation and Whistleblower Protections. Discipline
STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY
Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such
DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL
DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL Personnel Directive Subject: PROCEDURE FOR PREVENTING AND/OR RESOLVING PROBLEMS RELATED TO SEXUAL HARASSMENT ADOPTED BY THE BOARD OF PUBLIC WORKS, CITY OF LOS
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
