OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010
|
|
|
- Katherine Horton
- 10 years ago
- Views:
Transcription
1 OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor I. USE OF INFORMATION DURING HIRING PROCESS Accessing an applicant s social media during the hiring process can help ensure you are hiring the best possible person for the job and can also protect an employer from negligent hire claims. However, those same sites can reveal information to the employer than cannot be considered during the pre-conditional job offer stage, such as medical history or current problems, sexual orientation, religion, or other protected characteristics. An employer cannot refuse to hire an applicant for a discriminatory reason regardless of how the information is discovered. In addition, even if an employer has a good faith nondiscriminatory reason not to hire the person, the very fact of having the information calls into question whether it influenced the rejection. If you are going to seek out social media sites before a conditional job offer is made, there are some general rules of good practice to follow: confine your search to websites available to the public do not friend an applicant in order to gain access to nonpublic sites; consider letting applicants know that you intend to view social media sites; consider using an employee not involved in the hiring decision to conduct the searches, so that if protected information is on the sites it can be shielded from the decisionmaker; treat all applicants in the same way- if you search for additional information on one applicant, do the same for all. NOTE: waiting to look for social media until after a conditional job offer is made (as part of general background checking) will protect against some of these concerns. If you find negative, nondiscriminatory information or information that contradicts what the applicant has offered that affects your decision as to that applicant, ask the applicant about it to ensure the information you found is accurate and is not a case of mistaken identity. II. EMPLOYMENT ISSUES RAISED BY COMPUTER ACCESS 1
2 A. Privacy Employees of private employers generally do not have a constitutionally protected right to privacy in use of an employer s computer systems. Nevertheless, such employees may have some privacy rights. To try to prevent any such claim, private employers should have a policy addressing employee use of computers. The following elements might be included in such policies, among others: notice that employees should not expect privacy in their use of computers owned by the business; notice that the employer will monitor, access, retrieve, review, search and/or inspect any part of the system or any data stored, deleted, maintained or transmitted in it at any time without notice to the extent necessary to ensure that electronic media and services are being used in compliance with the law and company policies; notice that using the employer s equipment demonstrates 1) an employee s acknowledgement that the systems are not private and 2) an employee s consent to have his or her use of the computer system monitored by authorized company personnel at its discretion; notice that use of any password has to be pre-approved by the employer, shared with the employer, and does not create any right to privacy. In addition to privacy concerns, an employer s ability to review messages is also impacted by state and federal wiretapping laws (i.e., Titles I and II of the Electronic Communications Protection Act (Wire and Electronic Communications Interception and Interception of Oral Communications and Stored Wire and Electronic Communications and Transactional Records Access). Generally, these laws do allow an employer to monitor electronic communications with consent of the employee, making the acknowledgment discussed above especially important. Many employers also have a statement of the extent, if any, to which non-business-related personal use of the systems are permitted. Prohibiting any non-work-related use of the internet or systems is nearly impossible to enforce. Further, if an employer does try to enforce such a policy, the inclination is to let usage by certain individuals slide, while disciplining others (usually the troublemakers ) for the same behavior, which can lead directly to a discrimination claim. For that reason, a policy that makes it clear that some limited personal use is acceptable as long it is periodic, does not interfere with work, and meets all of the other requirements of the computer usage policies, is probably most useful. Other computer use policies should contain statements that: copyright laws and computer licensing rights and obligations must be respected in the use of the systems; sexual and other anti-discrimination and harassment policies apply to all electronic communications just as they do to verbal or written communications; public communications to third parties from employees on company-related matters should be consistent with the company s public image; 2
3 use of electronic mail for non-company related commercial activities or for solicitations or canvassing is not permitted; workplace communications must be courteous and professional; employees should not engage in other inappropriate use of the electronic mail system, including but not limited to: unauthorized use of any document protected by copyright, software licensing rule, or property rights of others; opening from unknown or unreliable sources; or revealing or misappropriating confidential information or trade secrets through unauthorized communications; abuse of the communication system may lead to disciplinary action, up to and including termination. B. Blogging Loss of productivity. This would pertain to blogs or other personal web pages written or maintained by an employee during work hours. In most cases, this would be addressed just as any other performance-related issue based on productivity, or lack thereof. Revealing confidential and/or proprietary company information. Casting employer in a negative light. Suppose a blog directly disparages an employer or provides information about what occurs on a daily basis in the workplace that may cast the employer in a negative light. Since blogs can be accessed by current or potential customers or clients, this raises legitimate concerns. While publishing blatantly false information might give rise to a defamation claim against the employee, there are limitations on an employer s right to regulate opinions and facts. For instance, all employees, even in non-unionized environments, are protected by Section 7 of the National Labor Relations Act. This law gives all employees the right to engage in concerted activities for the purpose of mutual aid or protection. However, the law does not protect action by individuals taken only on behalf of themselves. So, for instance, a blog stating an employee was angry he had to work overtime on a particular date would not constitute concerted activity. However, if the blog discussed the fact that several employees were being required to work in excess of what they, as a group, felt was safe, that could constitute concerted activity and consequently be protected conduct for which the employee cannot be disciplined or fired. Whistleblower activity. Employers must be cautious about disciplining or firing an employee for blog information that could arguably be considered protected whistleblower activity. Regulation of off-duty conduct. Issues to consider in regulating an employee s off-duty conduct, or in taking job action based on such conduct, includes privacy concerns, antidiscrimination laws, public policy, and state or federal laws that may restrict the ability to take action based on certain types of conduct. Public policy may also suggest that an employee should not be fired for engaging in lawful conduct outside the workplace unless that conduct is directly harmful to an employer s business. The employee handbook should address this issue so employees are on notice that such conduct could have employment-related consequences. The policy should notify them that they are subject to discipline, up to and including discharge, for certain off-duty conduct such as failing to comply with local, state, and federal laws; being 3
4 convicted of or pleading guilty to a crime that reflects unfitness for the job; or engaging in conduct that could undermine the company's reputation. Discrimination. Blogging or pages maintained by an employee on sites like YouTube or MySpace might contain personal information about that individual that an employer should not or does not want to have. This might be particularly true of applicants but also presents a dichotomy in terms of protecting yourself from negligent hire claims. The law requires an employer to prevent negligent behavior by an employee that they know or reasonably could know would occur. So, if an applicant does not reveal certain information but it was available through their own webpage, is an employer deemed to know that information? This also presents a further problem. If an employer accesses the applicant s personal information through these sites, it is likely they will discover information they are not supposed to have at the applicant stage, such as age, date of birth, marital status, and possibly the existence of a disability of some kind. There are ways in which blogs can potentially help an employer. Just as negative information on a blog could harm an employer s reputation, positive information may help attract new clients. Likewise, reading employee blogs may allow an employer to monitor morale and discover and address potential problems before they impact the workplace. Blogging may also play a role in workers compensation or discrimination claims. Suppose a secretary alleges carpal tunnel due to what she contends is work-related typing. But suppose also you discover she has an extensive blog (whether workplace related or not) that she maintains and adds to on a regular basis. This information may help demonstrate the injury is not work-related or at least was aggravated by non-work activity. Similarly, suppose an employee brings a discrimination claim against an employer alleging sexual harassment by a co-worker. Information maintained by that employee on a blog that provides information contradictory to the claims made in the lawsuit, such as that the relationship was consensual, will help defeat the claim. If an employer is going to allow blogging at work, it should make certain parameters clear to all employees. A sample blogging policy might include some or all of the following: Prohibition against harassing or discriminatory language or content; Prohibition against use or discussion of confidential or proprietary information (including names of clients); Reiteration that the employer can access Internet and other computer usage; Parameters on what degree of blogging will be tolerated on work time; Requirement that any blogs make clear that the views presented are that of the blogger, and not necessarily that of the company; Prohibition against using the company logo on a personal or non-employer sponsored blog; and Whether the employee will have to identify themselves and their role in the company in their blog. III. OTHER ISSUES RAISED BY ELECTRONIC COMMUNICATIONS 4
5 Proper /texting etiquette Professionalism: tag lines, pictures, smiley faces *Beware of sending unintended messages/attorney client communications Safe use of electronic media Wage and hour issues IV. CONFIDENTIALITY AND TERMINATION ISSUES Many employees have the ability to access information that may be confidential, contain business or trade secrets, or may simply be harmful to the business if made public. For those employees who have access to such information, employers should strongly consider confidentiality agreements or, at the very least, policies that address the private and confidential nature of certain information. Once an employer has made a decision to terminate the employment of an employee, or when an employee resigns, the employer should consider whether to allow that individual to work through any notice period. In many situations, it may be wiser to simply pay out the notice period rather than providing the employee with access to computers and information during that time period. V. UNION ISSUES RELATED TO ELECTRONIC COMMUNICATIONS An employer s system can attract union organizers because it is free and reaches a lot of people with very little effort. Section 7 of the National Labor Relations Act (NLRA) gives employees the right to form, join and assist unions, and unions are permitted to solicit members during nonworking hours. Generally, the rule has been that an employer cannot prohibit solicitations from unions while allowing solicitations from other organizations, such as an employee s child s basketball team selling popcorn or magazine subscriptions. In December 2007, the National Labor Relations Board decided The Guard Publishing Co., d/b/a The Register-Guard and Eugene Newspaper Guild, which shed some light on the law in this area. In that case, the employer had an policy that stated: Company communications systems and the equipment used to operate the communication system are owned and provided by the Company to assist in conducting the business of The Register-Guard. Communications systems are not to be used to solicit or proselytize for commercial ventures, religious or political causes, outside organizations, or other non-job-related solicitations. Technically, this policy did not prohibit all non-job-related use of the systems, and in fact employees had used the systems for years to communicate with each other about personal matters such as baby announcements, offering sports tickets and services like dog-walking, organizing poker games, and making lunch plans. However, there was no evidence that employees had used the system to solicit other employees for commercial ventures, religious cause, or any outside organization. During a collective bargaining session, the union s president, an employee, used the system three times. The first informed employees about an inaccuracy in a prior union communication about a union rally. This was sent from a company-owned computer while the employee was at work. The second solicited employees to wear green in support of the union s demands, and the third solicited 5
6 employees to march with the union in a local parade to show solidarity. Both the second and third s were sent from the union s office but addressed to employees at their work addresses. The employer disciplined the employee for each of the three s. The NLRB held that an employer does not violate the NLRA by having a policy that prohibits employees from using the employer s system for any non-job-related solicitations. The Board also clarified that while an employer may not discriminate based on union content it may draw distinctions based on other criteria. For instance, it may distinguish between solicitations and mere talk; between solicitations of a personal nature and those for sale of a product; between charitable and non-charitable solicitations; and between business-related use and non-business related use. The employer could lawfully prohibit solicitations of support for, or participation in, causes and organizations. In this case, the employer discriminated by disciplining the employee because other non-work-related s, mentioned above, had been permitted without discipline. Since the s at issue just gave information without soliciting union support, the discipline was based unlawfully on the union content of the message. 6
Social Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Human Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
Social Media in the Workplace. Stacey L. Smiricky Partner, Labor & Employment Group
Social Media in the Workplace Stacey L. Smiricky Partner, Labor & Employment Group Lessons Learned Employee who called in sick later places a status update on his Facebook page announcing sick day at Wrigley
Our Vendor Code of Conduct
Our Vendor Code of Conduct Jones Lang LaSalle and LaSalle Investment Management Vendor Code of Conduct Copyright Jones Lang LaSalle IP, Inc. Ethics Everywhere Where we stand Jones Lang LaSalle stands for
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
University Schools Social Media Guidelines for Employees
University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available
13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
Pacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
COLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
CODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
Social Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY
Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Communications & Marketing Policy 12-745 Approved by: System Management Team Origination Date: 08/2009 Revised Date:
Social Media in the Workplace: Avoiding Legal Pitfalls
Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:
Communications 01: Social Media
Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional
Social Media An Employment Nightmare. Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C.
Social Media An Employment Nightmare Presented By: Howard L. Bolter Bolter Law, LLC Cynthia Bremer Ogletree, Deakins, Nash, Smoak & Stewart, P.C. Show of hands: Who uses social media to screen job applicants?
Fair Employment Practices
In the GE Community Fair Employment Practices (Policy 20.2) Issued: October 2000 Supersedes: April 1993 GE is committed to fair employment practices, including the prohibition against all forms of illegal
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Undocumented Workers Employment Rights
Undocumented Workers Employment Rights YOUR LEGAL RIGHTS 1. What legal rights do I have as an undocumented worker? With a few exceptions, undocumented workers enjoy the legal rights and remedies provided
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
Employee Handbook. Welcome to ATB Staffing Services. 534 Main Street Medina, NY 14103 (585) 318-4218 (585) 318-4257 fax
Welcome to ATB Staffing Services 534 Main Street Medina, NY 14103 (585) 318-4218 (585) 318-4257 fax [email protected] www.atbstaffingservices.com Employee Handbook Revised March 2010 13 Notes
WHISTLEBLOWING AND CONDUCTING INVESTIGATIONS. Eileen P. Kennedy Berliner Cohen
WHISTLEBLOWING AND CONDUCTING INVESTIGATIONS Eileen P. Kennedy Berliner Cohen 1 Topics I. New Laws Protecting Whistleblowers. II. III. IV. Other Anti-Retaliation and Whistleblower Protections. Discipline
Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems
Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD Employee use of the District s Computer Systems Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Managing Social Media Employment Issues
Managing Social Media Employment Issues October 1, 2013 Katie Carder McCoy 206.447.2880 [email protected] Presentation Outline: What is social media and who cares? Risks of employer-sponsored social media,
Ryanair Holdings PLC Code of Business Conduct & Ethics 2012
Ryanair Holdings PLC Code of Business Conduct & Ethics 2012 1 TABLE OF CONTENTS 1. INTRODUCTION 3 2. WORK ENVIRONMENT 3 2.1 Discrimination & Harassment 3 2.2 Privacy of Personal Information 3 2.3 Internet
EADS-NA Code of Ethics
Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and
CENTRAL VIRGINIA LEGAL AID SOCIETY, INC.
CENTRAL VIRGINIA LEGAL AID SOCIETY, INC. 1000 Preston Ave, Suite B 101 W Broad, Ste 101 2006 Wakefield Street Charlottesville, VA 22903 Richmond, VA 23241 Petersburg, VA 23805 434-296-8851 (Voice) 804-648-1012
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY
Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such
(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
EMPLOYEE RIGHTS AND RESPONSIBILITIES UNDER THE FAMILY AND MEDICAL LEAVE ACT
EMPLOYEE RIGHTS AND RESPONSIBILITIES UNDER THE FAMILY AND MEDICAL LEAVE ACT Basic Leave Entitlement FMLA requires covered employers to provide up to 12 weeks of unpaid, job-protected leave to eligible
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Third Party Code of. Business Conduct and Ethics
Third Party Code of Business Conduct and Ethics Dear Valued Third Party: In a letter to Capital One associates, Richard Fairbank, Chairman and Chief Executive Officer of the company, has said the following:
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
Supplier Integrity Guide
Supplier Integrity Guide Wayne Fueling Systems and its Wayne Fueling Systems business are committed to unyielding Integrity and high standards of business conduct in everything we do, especially in our
WHAT POLICIES SHOULD AN EMPLOYER HAVE IN PLACE TO PREVENT LAWSUITS?
WHAT POLICIES SHOULD AN EMPLOYER HAVE IN PLACE TO PREVENT LAWSUITS? Many Employers Are Unaware of the Types of Policies Necessary to Limit Lawsuit Risk or of How to Effectively Draft Employment Policies
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
Overview of Sample Drug and Alcohol Abuse Policy
Overview of Sample Drug and Alcohol Abuse Policy All employers should have a vital interest in maintaining a safe, healthy, and efficient working environment. Being under the influence of a drug or alcohol
Media Traps. Attorney Nilesh P. Patel
Workplace Social Media Traps Attorney Nilesh P. Patel Mahadev Law Group, LLC Human Resources & Employment Law Solutions www.mahalawgroup.com [email protected] 877-210-2499 Definition: Online forums
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
RULE 15 CODE OF CONDUCT
RULE 15 CODE OF CONDUCT Section 15-5 Employee Conduct (6/5/80, 121A) Every employee in the Career Service shall conscientiously fulfill the duties and responsibilities of his or her position. The conduct
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors
SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE
New Jersey League of Municipalities SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE Presented by: BRIAN W. KRONICK, ESQ. Genova, Burns & Giantomasi (973) 533-0777 November
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
Evergreen Solar, Inc. Code of Business Conduct and Ethics
Evergreen Solar, Inc. Code of Business Conduct and Ethics A MESSAGE FROM THE BOARD At Evergreen Solar, Inc. (the Company or Evergreen Solar ), we believe that conducting business ethically is critical
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Topics of Discussion Employment Law Update
Topics of Discussion Employment Law Update CHAMPS Webcast 03/22/2004 Jim Miles, Esq. Miles, McLaren & Peters, P.C. 1430 Larimer Square, Suite 400 Denver, Colorado 80202 303-892-9900 I. Federal Anti-Discrimination
