PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE , VOIC , AND INTERNET USE. June

Size: px
Start display at page:

Download "PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE E-MAIL, VOICEMAIL, AND INTERNET USE. June 2001. www.morganlewis.com"

Transcription

1 PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE , VOIC , AND INTERNET USE June Brussels Frankfurt Harrisburg London Los Angeles Miami New York Philadelphia Northern Virginia Pittsburgh Princeton Tokyo Washington

2 Privacy Rights in a High-Tech World: Monitoring Employee , Voic , and Internet Use June 2001 The technological innovations developed over the past several years have revolutionized the workplace. , voic , and Internet access have become an integral part of an employee s workstation and have dramatically increased worker productivity. Although these innovations provide many benefits, they also pose potential pitfalls for the unwary employer. With a few simple keystrokes, your employees may be able to view pornography on the Internet, send offensive s to co-workers or clients, or circulate your latest customer lists and other confidential information to your competitors. Putting aside lost productivity and other business consequences, employers are concerned about the content of their employees electronic files, communications, and Internet use for another reason: companies are increasingly being held accountable in harassment and discrimination lawsuits as a result of evidence derived from electronic or voic communications. Faced with these potential consequences, many employers routinely monitor employee , voic , and Internet use. As employer monitoring becomes more refined and as employee termination cases increase and continue to receive publicity, employees are becoming more concerned about the monitoring of their s and other activities and are questioning the propriety and legality of employer monitoring. Employer monitoring of employee , voic , and Internet use raises a host of issues under both state and federal laws. This paper is not intended to represent a comprehensive survey of the laws implicated by such monitoring. Those laws will vary from state-to-state. Rather, the goal is to alert employers of some of the risks associated with monitoring , voic , and Internet use and to provide some suggestions about how to minimize the risk that such activity will give rise to legal liability. THE EMPLOYER S DILEMMA: PROTECTING ITS LEGITIMATE BUSINESS INTERESTS FROM THE THREATS POSED BY , VOIC , AND INTERNET USE WHILE NOT VIOLATING APPLICABLE LAWS RESTRICTING EMPLOYER MONITORING , voic , and desktop Internet access have opened up numerous additional avenues for sexually-oriented or offensive messages and material to be disbursed throughout the workplace. A hostile work environment may be created through unwelcome and voic messages and inappropriate Internet usage. Courts have also addressed race and age harassment claims based, at least in part, upon offensive s. The extent to which an employer may be held liable for a sexual harassment claim based upon the content of or voic messages or Internet material depends upon the frequency and severity of the messages or material, the employer=s knowledge of it, and the employer=s response. The versatility and simplicity of also undermines the ability of companies to protect their trade secrets and other confidential information from disclosure. A disgruntled employee, for example, could easily disseminate sensitive information to anyone connected to the This White Paper is published to inform clients and friends of Morgan Lewis and should not be construed as providing legal advice on any particular matter Morgan, Lewis & Bockius LLP

3 network, including outside users, competitors, and future employers. Given the potential liability and business consequences inherent in unfettered employee use of the Internet and office electronic and voice communication tools, employers are monitoring their employees activities. Employer action is not only justified, but is arguably mandated by the Supreme Court=s opinions in Faragher v. City of Boca Raton, 524 U.S. 775, 807 (1998) and Burlington Industries, Inc. v. Ellerth, 524 U.S. 742, (1998). In those opinions, the Supreme Court made clear that responding aggressively to harassment complaints is the only way for a company to protect itself from costly claims. The predicament in which employers now find themselves is that, in seeking to avoid harassment liability by taking preventive and/or remedial actions, they run the risk of being sued by the disciplined/terminated employees or their unions. Employers thus face legal risks both from failing to monitor their employees use of , voic , and the Internet, and from monitoring such use. This legal predicament necessitates that employers act pursuant to clearly-defined policies regulating both employee use of the company s systems and the employer s monitoring of such use. PRIVACY RIGHTS IMPLICATED BY EMPLOYER SURVEILLANCE A. State Law Common Law Invasion of Privacy: Unreasonable Intrusion Upon Seclusion An employee's right to /voic /internet use privacy is largely governed by state tort law. There are four distinct torts protecting the right to privacy, but the one that is most relevant to the monitoring of /internet use by employers is unreasonable intrusion upon the seclusion of another. See Restatement (Second) of Torts 652A. The Restatement defines the tort as intentionally intruding, physically or otherwise, into the private affairs of another or upon his/her seclusion. Liability under this tort does not require that the information acquired be publicized or used by the employer. Rather, to establish the tort, the complainant must show that a reasonable person would consider the intrusion highly offensive. Courts generally consider electronic surveillance, such as telephone monitoring, an Aintrusion@ sufficient to establish that element of the tort. In evaluating the offensiveness of the intrusion, courts examine Athe degree of intrusion, the context, conduct and circumstances surrounding the intrusion, as well as the intruder=s motives and objectives, the setting into which he intrudes, and the expectations of those whose privacy is invaded.@ Id. While express or implied consent is one defense to liability, the mere good faith belief that consent has been given is normally not a defense. State courts responding to such tort claims have generally attempted to balance the employee's reasonable expectation of privacy against the employer's business justification for monitoring. Thus, the critical issues examined when determining whether an employer should be held liable in tort for monitoring or intercepting employee messages are: (1) does the plaintiff have a reasonable expectation of privacy and, if so, (2) was there a legitimate business justification for the intrusion sufficient to override that privacy expectation. This White Paper is published to inform clients and friends of Morgan Lewis and should not be construed as providing legal advice on any particular matter Morgan, Lewis & Bockius LLP

4 State Statutes and Constitutions Several states have statutes protecting against the interception of electronic communications. See, e.g., New Jersey Wiretapping and Electronic Surveillance Control Act, N.J.S.A. 2A:156A-1 et seq.; Pennsylvania Wiretapping and Electronic Surveillance Act, 18 Pa. Cons. Stat. Ann et seq. In 1998, Connecticut enacted legislation, which requires employers to give previous written notice of electronic monitoring to all employees who may be affected by that monitoring. Ct. St. Ann d. The statute, however, carves out exceptions to the notice requirement to protect companies and their employees from criminal activity and from hostile work environments. This statute, and those like it in other states, is largely patterned after the federal Electronic Communications Privacy Act, discussed below. Proposed legislation in Indiana would require employers, who do not monitor s and Internet use on a continuous basis, to notify workers of surveillance with a flashing light or beeping tone. See Weaver, G., Indiana Bill Calls For Workplace Surveillance Guidelines, The Indianapolis Star (Jan. 23, 2001). Some state constitutions, like California s, include a right to privacy that is applicable to private entities. The propriety of employer monitoring of , voic , and Internet use under such constitutions likely will hinge on factors similar to those analyzed under the Fourth Amendment to the United States Constitution. The Fourth Amendment considerations are discussed below. B. Federal Law The Electronic Communications Privacy Act The Electronic Communications Privacy Act of 1986 ("ECPA"), 18 U.S.C et seq., prohibits the unlawful intentional interception of wire, oral and electronic communications, including . Although the ECPA seemingly prohibits the monitoring of employee s, the statute contains numerous exceptions that allow employers to avoid its application. For instance, the prohibition against intercepting communications does not apply where the monitoring is conducted by an service provider in its usual course of business or where one of the parties to the communication consents to the monitoring or interception. See 18 U.S.C. 2511(2)(d); 18 U.S.C. 2511(2)(a)(i). a. Ordinary Course of Business There is an exception to the ECPA for the monitoring of electronic communications by employers in the ordinary course of business. In applying this exception, courts have focused on whether the business reasons set forth by the employer justify the monitoring. In performing this analysis, courts have applied either a context approach or a content approach. Courts applying the context approach focus on the following two factors: (i) did the employer provide notice to the employee of the monitoring? and (ii) was the level of monitoring justified? Under this analysis, employers generally may not engage in unlimited monitoring. Thus, employers should be aware that courts will explore the reasons for employer monitoring and will limit the scope of monitoring. In contrast, the content approach examines the employer=s business interest by evaluating Morgan, Lewis & Bockius LLP 2

5 whether the communication at issue was business or personal. Courts usually find that employer monitoring of business communications is justified, but employer monitoring of personal communications is unjustified. b. Consent Consent is another exception to the ECPA. Consent may be implied or actual. Implied consent may be found where employees know, or should know, that the employer is monitoring communications on its systems. Courts will not find implied consent where an employee is merely aware that communications may be monitored, as opposed to being aware that they are being monitored. c. Other considerations Electronic under the Act are limited to those affecting interstate commerce. Thus, arguably, messages that are not intercepted in the course of interstate transmission or those transmitted on an employer=s completely internal system would not be considered an Aelectronic within the meaning of the ECPA. See, e.g., Andersen Consulting LLP v. UOP and Bickel & Brewer, 991 F. Supp. 2d 1041, 1042 (N.D. Ill. 1998) (determining that a partnership that maintained an internal system was not a Aprovider@ of electronic communication that could be held liable under the ECPA). Finally, there is authority that retrieving messages from storage after they have been transmitted does not constitute an interception under the ECPA. See, e.g., Fraser v. Nationwide Mutual Ins. Co., No. 98-CV-6726, 2001 WL , at *9 (E.D. Pa. Mar. 27, 2001) (The court granted summary judgment in favor of the employer on this claim, explaining that [r]etrieval of a message from storage while it is in the course of transmission is interception under the Wiretap Act; retrieval of a message from storage after transmission is complete is not interception under the Act. ). Public Employers Potential Constitutional Implications In contrast to private employers, public employers are constrained by the United States Constitution when monitoring employee communications. Monitoring and restricting of employee and Internet use may implicate both the Fourth Amendment, which protects individuals from unreasonable searches and seizures by state actors, and the First Amendment, which protects against restrictions on speech by state actors. In making decisions about monitoring and restricting employee and Internet use, public employers must balance their own interests in invading employee privacy and/or restricting employee speech against their employees' constitutional rights and reasonable expectations of privacy. The Supreme Court explained this principle in O'Connor v. Ortega, 480 U.S. 709 (1987), in which it held that public-sector workplace searches are constitutional if they are narrowly tailored to the government's interest in the efficient and proper operation of the job site. The Court found that Fourth Amendment rights are violated only if public employees have an expectation of privacy that society is prepared to recognize as reasonable. The Court noted that this privacy expectation may be reduced by virtue of actual office practices and procedure, or by legitimate regulation. Id. at 717. First Amendment issues raised by the restriction of Internet use were addressed by the Fourth Circuit in Urofsky v. Gilmore, 216 F.3d 402 (4th Cir. 2000), cert. denied, 121 S. Ct. 759 (2001). Morgan, Lewis & Bockius LLP 3

6 The plaintiffs in that case were professors at public universities and colleges who brought suit challenging the constitutionality of a Virginia statute restricting state employees from accessing sexually explicit materials on computers owned or leased by the state. The court upheld the statute, finding that the state=s interest in preventing a sexually hostile working environment outweighed the state employees= interest in free speech. Although the above Fourth and First Amendment considerations apply primarily to public employers, private employers who act at the direction of government regulations or officials may be found to be state actors. Additionally, constitutional provisions may apply to private employers that act as governmental bodies or substantially undertake governmental functions. Thus, in certain situations, private employers may need be to be sensitive to their employees= rights under the Fourth and First Amendments. /VOIC /INTERNET USE POLICIES The cases discussed above demonstrate the importance of reducing employees expectations of privacy in the workplace. One effective way to do so is to create and publish an /voic /internet use policy. The benefits of a written policy are manifold. First, it sets the boundaries for employee use of and the Internet. Second, it puts an employee on notice that the employer will monitor the use of its computer equipment and electronic services. This diminishes any expectation of privacy an employee may have regarding and Internet use. Although policies must be crafted based on the specific needs of a company, all policies should, at a minimum: $ Notify employees that company communication systems are primarily for business use and that the company reserves the right to review, audit, and disclose all matters disseminated or stored on its systems; $ Include , voic , and computer files stored on the employer=s computer systems; $ Inform employees that all computer files, , and communications stored on company computer systems are company property; $ Inform employees that the mere deletion of a message or file does not eliminate the employer=s ability to receive and review it; $ State that the employer reserves the right to review computer files, , and communications stored on the company=s computer system at any time for any reason; $ State that the company policy prohibits discriminatory messages and prohibits obscene, derogatory, defamatory, or other inappropriate messages, including any sexually explicit material, ethnic or racial slurs, or anything that could be interpreted as disparaging of others based on race, national origin, gender, sexual orientation, age, disability, or religion; $ Explain that any password protection provided to the employee with respect to e- mail or voic does not provide a special right of privacy to the employee. Password protection is given only to prevent other employees from accessing the employee=s communications, and does not protect the employee from access by the employer; Morgan, Lewis & Bockius LLP 4

7 $ Make clear what use is acceptable and what use is unacceptable, and explain the consequences for violating the policy (for example verbal warnings, written warnings, dismissal, or other disciplinary action), while leaving the employer room to impose the appropriate discipline on a case-by-case basis. With regard to implementation, if the employer is instituting a new policy or changing the policy, it must alert all employees via company-wide s or meetings, update its handbook with the policy, and include the policy in the information packet provided to new hires. In addition to the written notification in the handbook or other materials, ongoing notice to employees can be provided by programming a message that would appear on employee computer monitors each time the employee accesses the computer system. Any policy that is implemented should be accompanied by a form that employees should be required to sign acknowledging the employer s absolute right to access the system s information. Requiring employees to sign the form will further diminish any expectation of privacy in the information transmitted and may be used to combat a claim that the employee was unaware of the policy. Finally, employers must be prepared to enforce the policy if it is violated, and must be as consistent as possible in their enforcement efforts. In addition to any policy that is implemented to prevent against discrimination or harassment claims, a policy that prohibits the unauthorized disclosure of confidential information to third parties via electronic media may be implemented. In such a policy, employees should be encouraged to report immediately any such incidents to the appropriate corporate personnel, and the company's overall written confidentiality policy should reflect these concerns. Employees should also be reminded periodically not to leave messages on their screens when they leave their computers and to change their passwords frequently to avoid unauthorized access by hackers. Morgan, Lewis & Bockius LLP 5

8 Morgan Lewis Labor and Employment Law Practice Group has extensive experience in the drafting and implementing /voic /internet use policies, in addition to defending claims of sexual harassment, discrimination, and invasion of privacy. If you have any questions about the risks of employer monitoring of , voic , or Internet use, feel free to contact one of the following attorneys: Philadelphia Steven R. Wall Princeton Thomas A. Linthorst Pittsburgh Christopher K. Ramsey Washington Nancy R. Kuhn New York Amber L. Kagan Los Angeles Jane Howard-Martin Miami Anne Marie Estevez Morgan, Lewis & Bockius LLP 6

HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.

HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M. HOT TOPICS IN EMPLOYMENT LAW E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications by Andrew M. Low Employers have plenty of legitimate reasons for wanting to

More information

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

EEOC RELEASES ENFORCEMENT GUIDANCE ON VICARIOUS EMPLOYER LIABILITY FOR UNLAWFUL HARASSMENT BY SUPERVISORS

EEOC RELEASES ENFORCEMENT GUIDANCE ON VICARIOUS EMPLOYER LIABILITY FOR UNLAWFUL HARASSMENT BY SUPERVISORS EEO RELEASES ENFOREMENT GUIDANE ON VIARIOUS EMPLOYER LIABILITY FOR UNLAWFUL HARASSMENT BY SUPERVISORS July 1999 www.morganlewis.com Brussels Frankfurt Harrisburg London Los Angeles Miami New York Philadelphia

More information

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use

More information

MONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian

MONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian MONITORING THE ELECTRONIC WORKPLACE Jonathan Topazian A. Introduction Forty years ago, well before the advent of the electronic workplace, the Maryland Court of Appeals first recognized that individuals

More information

Electronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees. M. Amy Carlin

Electronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees. M. Amy Carlin Electronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees M. Amy Carlin Computers are ubiquitous in the workplace, and in recent years some employees have attempted

More information

EMPLOYMENT LAW DEFINITION OF AN EMPLOYEE

EMPLOYMENT LAW DEFINITION OF AN EMPLOYEE EMPLOYMENT LAW The Internet affects the relationships between employers and employees. E-mail communication has become commonplace as a fast and easy method of communication between employees, clients,

More information

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

Mindful. Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT

Mindful. Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT Mindful Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT ON JANUARY 30, 2001, Anthony Cochenour called the FBI with a tip. Cochenour s company, an Internet service provider, sold e-mail services to

More information

Liabilities and defenses for sexual harassment

Liabilities and defenses for sexual harassment Liabilities and defenses for sexual harassment Liabilities and defenses for sexual harassment Resource kit 90132 By Jill R. Muratori, Esq. The U.S. Supreme Court issued two ground-breaking decisions on

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

GUIDANCE ON SEXUAL HARASSMENT FOR ALL EMPLOYERS IN NEW YORK STATE

GUIDANCE ON SEXUAL HARASSMENT FOR ALL EMPLOYERS IN NEW YORK STATE ANDREW M. CUOMO Governor HELEN DIANE FOSTER Commissioner GUIDANCE ON SEXUAL HARASSMENT FOR ALL EMPLOYERS IN NEW YORK STATE STATUTORY REQUIREMENTS Sex discrimination is unlawful pursuant to the New York

More information

Moreover, sexual harassment is a violation of federal, state and county fair employment laws.

Moreover, sexual harassment is a violation of federal, state and county fair employment laws. Sexual harassment interferes with a productive working environment, interjects irrelevant considerations into personnel decisions and generally demeans employees who are victims of harassment. Moreover,

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

SEXUAL HARASSMENT. Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016

SEXUAL HARASSMENT. Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016 SEXUAL HARASSMENT Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016 1 Agenda Overview-Why talk about sexual harassment? Why get training? Statistics What is sexual harassment?

More information

Monitoring Employee Communications: Data Protection and Privacy Issues

Monitoring Employee Communications: Data Protection and Privacy Issues Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,

More information

4014.2. PERSONNEL All Staff Permanent Personnel Conditions of Employment Equal Employment Opportunity/Anti-Harassment

4014.2. PERSONNEL All Staff Permanent Personnel Conditions of Employment Equal Employment Opportunity/Anti-Harassment PERSONNEL All Staff Permanent Personnel Conditions of Employment Equal Employment Opportunity/Anti-Harassment 4014.2 It is the policy of the Clintonville Public School District that no person may be illegally

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

MUTUAL INSURANCE EMPLOYEE HANDBOOK

MUTUAL INSURANCE EMPLOYEE HANDBOOK MUTUAL INSURANCE EMPLOYEE HANDBOOK A. Introduction to Handbook We would like to welcome you as an employee to Mutual Insurance Company. The purpose of this Handbook is to explain the current policies and

More information

NEW JERSEY STATE POLICY PROHIBITING DISCRIMINATION IN THE WORKPLACE

NEW JERSEY STATE POLICY PROHIBITING DISCRIMINATION IN THE WORKPLACE NEW JERSEY STATE POLICY PROHIBITING DISCRIMINATION IN THE WORKPLACE I. POLICY a. Protected Categories The State of New Jersey is committed to providing every State employee and prospective State employee

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

BULLYING/ANTI-HARASSMENT

BULLYING/ANTI-HARASSMENT BULLYING/ANTI-HARASSMENT The state of Mississippi has established legislation requiring Bullying Prevention to be taught in schools. Executive Summary The purpose of this policy is to assist the Mississippi

More information

LE.201 Employee Privacy Rights in the Electronic/Social Media Age

LE.201 Employee Privacy Rights in the Electronic/Social Media Age LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,

More information

6141.9. Internet and Computers. Acceptable Use and Internet Safety

6141.9. Internet and Computers. Acceptable Use and Internet Safety 6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

Privacy is the ability of an individual or group to keep their lives and

Privacy is the ability of an individual or group to keep their lives and Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.

More information

August 2007 Education and Membership Development Department

August 2007 Education and Membership Development Department August 2007 Education and Membership Development Department Table of Contents Title VII of the Civil Rights Act of 1964 3 What is Sexual Harassment? 3 4 How Can Sexual Harassment Occur? 4 5 When is an

More information

ETHICAL ISSUES IN EMPLOYMENT LAW. Judith E. Harris. whether to provide representation and/or indemnification for individual employees;

ETHICAL ISSUES IN EMPLOYMENT LAW. Judith E. Harris. whether to provide representation and/or indemnification for individual employees; ETHICAL ISSUES IN EMPLOYMENT LAW I. INTRODUCTION Judith E. Harris In today s workplace, employers are increasingly subject to lawsuits involving multiple defendants. This trend is most often evidenced

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Ryanair Holdings PLC Code of Business Conduct & Ethics 2012

Ryanair Holdings PLC Code of Business Conduct & Ethics 2012 Ryanair Holdings PLC Code of Business Conduct & Ethics 2012 1 TABLE OF CONTENTS 1. INTRODUCTION 3 2. WORK ENVIRONMENT 3 2.1 Discrimination & Harassment 3 2.2 Privacy of Personal Information 3 2.3 Internet

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,

More information

Non-Discrimination and Anti-Harassment Policy OP 03.03

Non-Discrimination and Anti-Harassment Policy OP 03.03 Non-Discrimination and Anti-Harassment Policy OP 03.03 Policy Mississippi State University is committed to assuring that the University and its programs are free from discrimination and harassment based

More information

MONITORING EMPLOYEE E-MAIL: EFFICIENT WORKPLACES VS. EMPLOYEE PRIVACY

MONITORING EMPLOYEE E-MAIL: EFFICIENT WORKPLACES VS. EMPLOYEE PRIVACY ibrief / ecommerce Cite as 2001 Duke L. & Tech. Rev. 0026 7/25/2001 MONITORING EMPLOYEE E-MAIL: EFFICIENT WORKPLACES VS. EMPLOYEE PRIVACY Employer monitoring of electronic mail constitutes an emerging

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

PeopleMatrix Application Hosting Services Agreement

PeopleMatrix Application Hosting Services Agreement PeopleMatrix Application Hosting Services Agreement WolfeReiter, LLC CONTENTS 1. Services Agreement... 2 1.1. Description of Services... 2 1.2. Term... 2 1.3. Customer Responsibilities... 2 1.4. Payment

More information

DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL

DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL Personnel Directive Subject: PROCEDURE FOR PREVENTING AND/OR RESOLVING PROBLEMS RELATED TO SEXUAL HARASSMENT ADOPTED BY THE BOARD OF PUBLIC WORKS, CITY OF LOS

More information

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE 2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology

More information

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems. VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

2.2.2 Policy Prohibiting Discrimination and Harassment The University of San Diego is committed to upholding standards that promote respect and human

2.2.2 Policy Prohibiting Discrimination and Harassment The University of San Diego is committed to upholding standards that promote respect and human 2.2.2 Policy Prohibiting Discrimination and Harassment The University of San Diego is committed to upholding standards that promote respect and human dignity in an environment that fosters academic excellence

More information

ADMINISTRATIVE POLICY

ADMINISTRATIVE POLICY POLICY 14-UMBER &/tay2-6t/v ISSUED Edward Mar _ City _Manager March 13, 1997 REVISIONS REVISED SECTION III. Legal Ramifications IV. Policy Implementation V. Non-Retaliation VI. Notification SUBJECT: POLICY

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Town of Salisbury 5 Beach Road Salisbury, Massachusetts 01952

Town of Salisbury 5 Beach Road Salisbury, Massachusetts 01952 Town of Salisbury 5 Beach Road Salisbury, Massachusetts 01952 This policy is applicable to all employees of the Town of Salisbury. For those employees covered by Collective Bargaining Agreements, the provisions

More information

Corporate Communications

Corporate Communications New Mexico State University ENGL 218G SCIENTIFIC AND TECHNICAL COMMUNICATIONS August 2 nd, 2010 Corporate Communications Corporate Wiretapping in the Digital Information Age Christopher M. Kane Contents

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

CITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE

CITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE CITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE The policy of the City of Los Angeles has been, and will continue to be, to promote and

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS. Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out.

EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS. Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out. EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out. Last year, 15,222 charges of sexual harassment were filed

More information

2.25 HOSTILE WORK ENVIRONMENT CLAIMS UNDER THE NEW JERSEY LAW AGAINST DISCRIMINATION (SEXUAL AND OTHER HARASSMENT) (05/2015)

2.25 HOSTILE WORK ENVIRONMENT CLAIMS UNDER THE NEW JERSEY LAW AGAINST DISCRIMINATION (SEXUAL AND OTHER HARASSMENT) (05/2015) 2.25 HOSTILE WORK ENVIRONMENT CLAIMS UNDER THE NEW JERSEY LAW AGAINST DISCRIMINATION (SEXUAL AND OTHER HARASSMENT) (05/2015) The following charge is based on the Supreme Court's decision in Lehmann v.

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)

More information

Workplace Mysteries: Employment Law Under the Magnifying Glass. Employment Law Half-Day Seminar

Workplace Mysteries: Employment Law Under the Magnifying Glass. Employment Law Half-Day Seminar Employment Law Half-Day Seminar October 30, 2012 Seattle, Washington November 1, 2012 Portland, Oregon This notebook is a publication of Miller Nash llp. It is provided for informational purposes only

More information

The Coca-Cola Company

The Coca-Cola Company The Coca-Cola Company EQUAL OPPORTUNITY AND AFFIRMATIVE ACTION POLICY STATEMENT 1.0 Policy Statement and Purpose The Coca-Cola Company is an Equal Opportunity Employer and maintains a work environment

More information

Workplace Policies. Computer Software (Unauthorized Copying)

Workplace Policies. Computer Software (Unauthorized Copying) Workplace Policies Computer Software (Unauthorized Copying) Cornerstone Systems does not condone the illegal duplication of software. The copyright law is clear. The copyright holder is given certain exclusive

More information

Conflicts of Interest Issues in Simultaneous Representation of Employers and Employees in Employment Law. Janet Savage 1

Conflicts of Interest Issues in Simultaneous Representation of Employers and Employees in Employment Law. Janet Savage 1 Conflicts of Interest Issues in Simultaneous Representation of Employers and Employees in Employment Law Janet Savage 1 Plaintiffs suing their former employers for wrongful discharge or employment discrimination

More information

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF INDIANA INDIANAPOLIS DIVISION

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF INDIANA INDIANAPOLIS DIVISION Case 1:05-cv-01379-RLY-WTL Document 41 Filed 11/20/06 Page 1 of 7 PageID #: UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF INDIANA INDIANAPOLIS DIVISION CYNTHIA Y. MARCH, Plaintiff, vs. ADT

More information

State By State Employee Monitoring Laws

State By State Employee Monitoring Laws Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com State By State Employee Monitoring Laws Law360,

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

Department of Homeland Security DHS Directives System Directive Number: 256-01 Revision Number: 00. Issue Date: ANTI HARASSMENT POLICY

Department of Homeland Security DHS Directives System Directive Number: 256-01 Revision Number: 00. Issue Date: ANTI HARASSMENT POLICY I. Purpose Department of Homeland Security DHS Directives System Directive Number: 256-01 Revision Number: 00 Issue Date: ANTI HARASSMENT POLICY This Directive is intended to prohibit and prevent harassment

More information

Administrative Procedure 3720 Computer and Network Use

Administrative Procedure 3720 Computer and Network Use Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District

More information

WHO'S ON THE FIRING LINE? TIPS FOR AVOIDING WRONGFUL/RETALIATORY DISCHARGE CLAIMS by William R. Hanna

WHO'S ON THE FIRING LINE? TIPS FOR AVOIDING WRONGFUL/RETALIATORY DISCHARGE CLAIMS by William R. Hanna WHO'S ON THE FIRING LINE? TIPS FOR AVOIDING WRONGFUL/RETALIATORY DISCHARGE CLAIMS by William R. Hanna I. INTRODUCTION A. Union members were only 7.2% of the private sector work force in 2009, down from

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

Policy on Non-Discrimination and Equal Employment Opportunity

Policy on Non-Discrimination and Equal Employment Opportunity Supreme Court of Pennsylvania Unified Judicial System of Pennsylvania Policy on Non-Discrimination and Equal Employment Opportunity The Supreme Court of Pennsylvania declares that it is the policy of the

More information

ANTI-DISCRIMINATION, HARASSMENT AND BULLYING (STUDENT POLICY)

ANTI-DISCRIMINATION, HARASSMENT AND BULLYING (STUDENT POLICY) Page 1 ANTI-DISCRIMINATION, HARASSMENT AND BULLYING (STUDENT POLICY) The Board of Education is committed to promoting the worth and dignity of all individuals. It believes that all employees and students

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

The faculty of BGSU reaffirms that the following are an accepted part of their responsibilities as teacher-scholars:

The faculty of BGSU reaffirms that the following are an accepted part of their responsibilities as teacher-scholars: Page 1 of 7 SECTION E: ETHICAL RESPONSIBILITIES Faculty members shall follow professional ethical standards in conducting the affairs of the University. These standards are articulated in the Statement

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA CONSENT DECREE. Introduction

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA CONSENT DECREE. Introduction r S9 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA EQUAL EMPLOYMENT OPPORTUNITY COMMISSION, Plaintiff, CIVIL ACTION NO.: 07-cv-2179 Honorable Paul S. Diamond TROPIANO TRANSFORATION

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION BRIAN Z. FRANCE, v. MEGAN P. FRANCE, Plaintiff, Defendant. Case No. 3:11-CV-00186 PLAINTIFF S MEMORANDUM OF LAW IN SUPPORT

More information

MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions

MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions Welcome to MTNL Mumbai Email services. MTNL Mumbai provides e-mail services pursuant to the terms and conditions set forth below. By using MTNL Mumbai

More information

HIGH SCHOOL FOR RECORDING ARTS

HIGH SCHOOL FOR RECORDING ARTS Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities

More information

NORTH CAROLINA WESLEYAN COLLEGE POLICY ON GENDER DISCRIMINATION AND SEXUAL HARASSMENT

NORTH CAROLINA WESLEYAN COLLEGE POLICY ON GENDER DISCRIMINATION AND SEXUAL HARASSMENT NORTH CAROLINA WESLEYAN COLLEGE POLICY ON GENDER DISCRIMINATION AND SEXUAL HARASSMENT It is the policy of North Carolina Wesleyan college that unlawful gender discrimination in any form, including sexual

More information

Employee Privacy Laws: Pennsylvania

Employee Privacy Laws: Pennsylvania View the online version at http://us.practicallaw.com/7-574-1705 Employee Privacy Laws: Pennsylvania TOM JOHNSON, DECHERT LLP, WITH PRACTICAL LAW LABOR & EMPLOYMENT A guide to state law on employee privacy

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING

EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com

More information

LABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE. Timothy L. Davis. Burke, Williams & Sorensen, LLP www.bwslaw.

LABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE. Timothy L. Davis. Burke, Williams & Sorensen, LLP www.bwslaw. LABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE Timothy L. Davis Burke, Williams & Sorensen, LLP www.bwslaw.com OVERVIEW FOR 2016 UPDATE Labor Law Court Decisions Employment

More information

CENTERPIECE FOCUS ON: SEXUAL HARASSMENT POLICIES ESTABLISHING AND IMPLEMENTING AN EFFECTIVE HARASSMENT POLICY

CENTERPIECE FOCUS ON: SEXUAL HARASSMENT POLICIES ESTABLISHING AND IMPLEMENTING AN EFFECTIVE HARASSMENT POLICY CENTERPIECE FOCUS ON: SEXUAL HARASSMENT POLICIES ESTABLISHING AND IMPLEMENTING AN EFFECTIVE HARASSMENT POLICY BY L. ROBERT BATTERMAN AND SHERI L. GILBERT On June 26, 1998, the Supreme Court issued two

More information

OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010

OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010 OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor astorey@rudman-winchell.com I. USE OF INFORMATION DURING HIRING PROCESS

More information

COUNTY OF LOS ANGELES POLICY OF EQUITY

COUNTY OF LOS ANGELES POLICY OF EQUITY COUNTY OF LOS ANGELES POLICY OF EQUITY Effective July 1, 2011 THE POLICY All Los Angeles County (County) employees are required to conduct themselves in accordance with the entirety of this County Policy

More information

MONITORING EMPLOYEE USE OF E-MAIL AND THE INTERNET. Elizabeth J. Forster Blaney McMurtry LLP 416.593.3919 eforster@blaney.com

MONITORING EMPLOYEE USE OF E-MAIL AND THE INTERNET. Elizabeth J. Forster Blaney McMurtry LLP 416.593.3919 eforster@blaney.com MONITORING EMPLOYEE USE OF E-MAIL AND THE INTERNET Elizabeth J. Forster Blaney McMurtry LLP 416.593.3919 eforster@blaney.com MONITORING EMPLOYEE USE OF E-MAIL AND THE INTERNET 1. INTRODUCTION Personal

More information

Response to Complaints of Harassment, Violence and Discrimination

Response to Complaints of Harassment, Violence and Discrimination Response to Complaints of Harassment, Violence and Discrimination To limit potential liability, employers should immediately respond to complaints of harassment, violence or threats of violence, and discrimination.

More information

Pacific Northwest University of Health Sciences

Pacific Northwest University of Health Sciences Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,

More information

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

CITY OF PORTLAND POLICY AGAINST HARASSMENT

CITY OF PORTLAND POLICY AGAINST HARASSMENT CITY OF PORTLAND POLICY AGAINST HARASSMENT I. POLICY AGAINST HARASSMENT Employees are the most important part of this organization. They deserve to be treated with respect and dignity. It is the policy

More information

CHAPTER FIVE. The EEOC s regulations, at 29 CFR 1604.11(a), provide an explanation of what constitutes tangible employment action sexual harassment:

CHAPTER FIVE. The EEOC s regulations, at 29 CFR 1604.11(a), provide an explanation of what constitutes tangible employment action sexual harassment: CHAPTER FIVE Harassment Cases The theory of harassment can be divided into two categories: (1) harassment resulting in a tangible employment action, and (2) hostile environment harassment. In tangible

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

Social Media in the Workplace: Avoiding Legal Pitfalls

Social Media in the Workplace: Avoiding Legal Pitfalls Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:

More information