PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE , VOIC , AND INTERNET USE. June
|
|
- Jemimah Singleton
- 8 years ago
- Views:
Transcription
1 PRIVACY RIGHTS IN A HIGH-TECH WORLD: MONITORING EMPLOYEE , VOIC , AND INTERNET USE June Brussels Frankfurt Harrisburg London Los Angeles Miami New York Philadelphia Northern Virginia Pittsburgh Princeton Tokyo Washington
2 Privacy Rights in a High-Tech World: Monitoring Employee , Voic , and Internet Use June 2001 The technological innovations developed over the past several years have revolutionized the workplace. , voic , and Internet access have become an integral part of an employee s workstation and have dramatically increased worker productivity. Although these innovations provide many benefits, they also pose potential pitfalls for the unwary employer. With a few simple keystrokes, your employees may be able to view pornography on the Internet, send offensive s to co-workers or clients, or circulate your latest customer lists and other confidential information to your competitors. Putting aside lost productivity and other business consequences, employers are concerned about the content of their employees electronic files, communications, and Internet use for another reason: companies are increasingly being held accountable in harassment and discrimination lawsuits as a result of evidence derived from electronic or voic communications. Faced with these potential consequences, many employers routinely monitor employee , voic , and Internet use. As employer monitoring becomes more refined and as employee termination cases increase and continue to receive publicity, employees are becoming more concerned about the monitoring of their s and other activities and are questioning the propriety and legality of employer monitoring. Employer monitoring of employee , voic , and Internet use raises a host of issues under both state and federal laws. This paper is not intended to represent a comprehensive survey of the laws implicated by such monitoring. Those laws will vary from state-to-state. Rather, the goal is to alert employers of some of the risks associated with monitoring , voic , and Internet use and to provide some suggestions about how to minimize the risk that such activity will give rise to legal liability. THE EMPLOYER S DILEMMA: PROTECTING ITS LEGITIMATE BUSINESS INTERESTS FROM THE THREATS POSED BY , VOIC , AND INTERNET USE WHILE NOT VIOLATING APPLICABLE LAWS RESTRICTING EMPLOYER MONITORING , voic , and desktop Internet access have opened up numerous additional avenues for sexually-oriented or offensive messages and material to be disbursed throughout the workplace. A hostile work environment may be created through unwelcome and voic messages and inappropriate Internet usage. Courts have also addressed race and age harassment claims based, at least in part, upon offensive s. The extent to which an employer may be held liable for a sexual harassment claim based upon the content of or voic messages or Internet material depends upon the frequency and severity of the messages or material, the employer=s knowledge of it, and the employer=s response. The versatility and simplicity of also undermines the ability of companies to protect their trade secrets and other confidential information from disclosure. A disgruntled employee, for example, could easily disseminate sensitive information to anyone connected to the This White Paper is published to inform clients and friends of Morgan Lewis and should not be construed as providing legal advice on any particular matter Morgan, Lewis & Bockius LLP
3 network, including outside users, competitors, and future employers. Given the potential liability and business consequences inherent in unfettered employee use of the Internet and office electronic and voice communication tools, employers are monitoring their employees activities. Employer action is not only justified, but is arguably mandated by the Supreme Court=s opinions in Faragher v. City of Boca Raton, 524 U.S. 775, 807 (1998) and Burlington Industries, Inc. v. Ellerth, 524 U.S. 742, (1998). In those opinions, the Supreme Court made clear that responding aggressively to harassment complaints is the only way for a company to protect itself from costly claims. The predicament in which employers now find themselves is that, in seeking to avoid harassment liability by taking preventive and/or remedial actions, they run the risk of being sued by the disciplined/terminated employees or their unions. Employers thus face legal risks both from failing to monitor their employees use of , voic , and the Internet, and from monitoring such use. This legal predicament necessitates that employers act pursuant to clearly-defined policies regulating both employee use of the company s systems and the employer s monitoring of such use. PRIVACY RIGHTS IMPLICATED BY EMPLOYER SURVEILLANCE A. State Law Common Law Invasion of Privacy: Unreasonable Intrusion Upon Seclusion An employee's right to /voic /internet use privacy is largely governed by state tort law. There are four distinct torts protecting the right to privacy, but the one that is most relevant to the monitoring of /internet use by employers is unreasonable intrusion upon the seclusion of another. See Restatement (Second) of Torts 652A. The Restatement defines the tort as intentionally intruding, physically or otherwise, into the private affairs of another or upon his/her seclusion. Liability under this tort does not require that the information acquired be publicized or used by the employer. Rather, to establish the tort, the complainant must show that a reasonable person would consider the intrusion highly offensive. Courts generally consider electronic surveillance, such as telephone monitoring, an Aintrusion@ sufficient to establish that element of the tort. In evaluating the offensiveness of the intrusion, courts examine Athe degree of intrusion, the context, conduct and circumstances surrounding the intrusion, as well as the intruder=s motives and objectives, the setting into which he intrudes, and the expectations of those whose privacy is invaded.@ Id. While express or implied consent is one defense to liability, the mere good faith belief that consent has been given is normally not a defense. State courts responding to such tort claims have generally attempted to balance the employee's reasonable expectation of privacy against the employer's business justification for monitoring. Thus, the critical issues examined when determining whether an employer should be held liable in tort for monitoring or intercepting employee messages are: (1) does the plaintiff have a reasonable expectation of privacy and, if so, (2) was there a legitimate business justification for the intrusion sufficient to override that privacy expectation. This White Paper is published to inform clients and friends of Morgan Lewis and should not be construed as providing legal advice on any particular matter Morgan, Lewis & Bockius LLP
4 State Statutes and Constitutions Several states have statutes protecting against the interception of electronic communications. See, e.g., New Jersey Wiretapping and Electronic Surveillance Control Act, N.J.S.A. 2A:156A-1 et seq.; Pennsylvania Wiretapping and Electronic Surveillance Act, 18 Pa. Cons. Stat. Ann et seq. In 1998, Connecticut enacted legislation, which requires employers to give previous written notice of electronic monitoring to all employees who may be affected by that monitoring. Ct. St. Ann d. The statute, however, carves out exceptions to the notice requirement to protect companies and their employees from criminal activity and from hostile work environments. This statute, and those like it in other states, is largely patterned after the federal Electronic Communications Privacy Act, discussed below. Proposed legislation in Indiana would require employers, who do not monitor s and Internet use on a continuous basis, to notify workers of surveillance with a flashing light or beeping tone. See Weaver, G., Indiana Bill Calls For Workplace Surveillance Guidelines, The Indianapolis Star (Jan. 23, 2001). Some state constitutions, like California s, include a right to privacy that is applicable to private entities. The propriety of employer monitoring of , voic , and Internet use under such constitutions likely will hinge on factors similar to those analyzed under the Fourth Amendment to the United States Constitution. The Fourth Amendment considerations are discussed below. B. Federal Law The Electronic Communications Privacy Act The Electronic Communications Privacy Act of 1986 ("ECPA"), 18 U.S.C et seq., prohibits the unlawful intentional interception of wire, oral and electronic communications, including . Although the ECPA seemingly prohibits the monitoring of employee s, the statute contains numerous exceptions that allow employers to avoid its application. For instance, the prohibition against intercepting communications does not apply where the monitoring is conducted by an service provider in its usual course of business or where one of the parties to the communication consents to the monitoring or interception. See 18 U.S.C. 2511(2)(d); 18 U.S.C. 2511(2)(a)(i). a. Ordinary Course of Business There is an exception to the ECPA for the monitoring of electronic communications by employers in the ordinary course of business. In applying this exception, courts have focused on whether the business reasons set forth by the employer justify the monitoring. In performing this analysis, courts have applied either a context approach or a content approach. Courts applying the context approach focus on the following two factors: (i) did the employer provide notice to the employee of the monitoring? and (ii) was the level of monitoring justified? Under this analysis, employers generally may not engage in unlimited monitoring. Thus, employers should be aware that courts will explore the reasons for employer monitoring and will limit the scope of monitoring. In contrast, the content approach examines the employer=s business interest by evaluating Morgan, Lewis & Bockius LLP 2
5 whether the communication at issue was business or personal. Courts usually find that employer monitoring of business communications is justified, but employer monitoring of personal communications is unjustified. b. Consent Consent is another exception to the ECPA. Consent may be implied or actual. Implied consent may be found where employees know, or should know, that the employer is monitoring communications on its systems. Courts will not find implied consent where an employee is merely aware that communications may be monitored, as opposed to being aware that they are being monitored. c. Other considerations Electronic under the Act are limited to those affecting interstate commerce. Thus, arguably, messages that are not intercepted in the course of interstate transmission or those transmitted on an employer=s completely internal system would not be considered an Aelectronic within the meaning of the ECPA. See, e.g., Andersen Consulting LLP v. UOP and Bickel & Brewer, 991 F. Supp. 2d 1041, 1042 (N.D. Ill. 1998) (determining that a partnership that maintained an internal system was not a Aprovider@ of electronic communication that could be held liable under the ECPA). Finally, there is authority that retrieving messages from storage after they have been transmitted does not constitute an interception under the ECPA. See, e.g., Fraser v. Nationwide Mutual Ins. Co., No. 98-CV-6726, 2001 WL , at *9 (E.D. Pa. Mar. 27, 2001) (The court granted summary judgment in favor of the employer on this claim, explaining that [r]etrieval of a message from storage while it is in the course of transmission is interception under the Wiretap Act; retrieval of a message from storage after transmission is complete is not interception under the Act. ). Public Employers Potential Constitutional Implications In contrast to private employers, public employers are constrained by the United States Constitution when monitoring employee communications. Monitoring and restricting of employee and Internet use may implicate both the Fourth Amendment, which protects individuals from unreasonable searches and seizures by state actors, and the First Amendment, which protects against restrictions on speech by state actors. In making decisions about monitoring and restricting employee and Internet use, public employers must balance their own interests in invading employee privacy and/or restricting employee speech against their employees' constitutional rights and reasonable expectations of privacy. The Supreme Court explained this principle in O'Connor v. Ortega, 480 U.S. 709 (1987), in which it held that public-sector workplace searches are constitutional if they are narrowly tailored to the government's interest in the efficient and proper operation of the job site. The Court found that Fourth Amendment rights are violated only if public employees have an expectation of privacy that society is prepared to recognize as reasonable. The Court noted that this privacy expectation may be reduced by virtue of actual office practices and procedure, or by legitimate regulation. Id. at 717. First Amendment issues raised by the restriction of Internet use were addressed by the Fourth Circuit in Urofsky v. Gilmore, 216 F.3d 402 (4th Cir. 2000), cert. denied, 121 S. Ct. 759 (2001). Morgan, Lewis & Bockius LLP 3
6 The plaintiffs in that case were professors at public universities and colleges who brought suit challenging the constitutionality of a Virginia statute restricting state employees from accessing sexually explicit materials on computers owned or leased by the state. The court upheld the statute, finding that the state=s interest in preventing a sexually hostile working environment outweighed the state employees= interest in free speech. Although the above Fourth and First Amendment considerations apply primarily to public employers, private employers who act at the direction of government regulations or officials may be found to be state actors. Additionally, constitutional provisions may apply to private employers that act as governmental bodies or substantially undertake governmental functions. Thus, in certain situations, private employers may need be to be sensitive to their employees= rights under the Fourth and First Amendments. /VOIC /INTERNET USE POLICIES The cases discussed above demonstrate the importance of reducing employees expectations of privacy in the workplace. One effective way to do so is to create and publish an /voic /internet use policy. The benefits of a written policy are manifold. First, it sets the boundaries for employee use of and the Internet. Second, it puts an employee on notice that the employer will monitor the use of its computer equipment and electronic services. This diminishes any expectation of privacy an employee may have regarding and Internet use. Although policies must be crafted based on the specific needs of a company, all policies should, at a minimum: $ Notify employees that company communication systems are primarily for business use and that the company reserves the right to review, audit, and disclose all matters disseminated or stored on its systems; $ Include , voic , and computer files stored on the employer=s computer systems; $ Inform employees that all computer files, , and communications stored on company computer systems are company property; $ Inform employees that the mere deletion of a message or file does not eliminate the employer=s ability to receive and review it; $ State that the employer reserves the right to review computer files, , and communications stored on the company=s computer system at any time for any reason; $ State that the company policy prohibits discriminatory messages and prohibits obscene, derogatory, defamatory, or other inappropriate messages, including any sexually explicit material, ethnic or racial slurs, or anything that could be interpreted as disparaging of others based on race, national origin, gender, sexual orientation, age, disability, or religion; $ Explain that any password protection provided to the employee with respect to e- mail or voic does not provide a special right of privacy to the employee. Password protection is given only to prevent other employees from accessing the employee=s communications, and does not protect the employee from access by the employer; Morgan, Lewis & Bockius LLP 4
7 $ Make clear what use is acceptable and what use is unacceptable, and explain the consequences for violating the policy (for example verbal warnings, written warnings, dismissal, or other disciplinary action), while leaving the employer room to impose the appropriate discipline on a case-by-case basis. With regard to implementation, if the employer is instituting a new policy or changing the policy, it must alert all employees via company-wide s or meetings, update its handbook with the policy, and include the policy in the information packet provided to new hires. In addition to the written notification in the handbook or other materials, ongoing notice to employees can be provided by programming a message that would appear on employee computer monitors each time the employee accesses the computer system. Any policy that is implemented should be accompanied by a form that employees should be required to sign acknowledging the employer s absolute right to access the system s information. Requiring employees to sign the form will further diminish any expectation of privacy in the information transmitted and may be used to combat a claim that the employee was unaware of the policy. Finally, employers must be prepared to enforce the policy if it is violated, and must be as consistent as possible in their enforcement efforts. In addition to any policy that is implemented to prevent against discrimination or harassment claims, a policy that prohibits the unauthorized disclosure of confidential information to third parties via electronic media may be implemented. In such a policy, employees should be encouraged to report immediately any such incidents to the appropriate corporate personnel, and the company's overall written confidentiality policy should reflect these concerns. Employees should also be reminded periodically not to leave messages on their screens when they leave their computers and to change their passwords frequently to avoid unauthorized access by hackers. Morgan, Lewis & Bockius LLP 5
8 Morgan Lewis Labor and Employment Law Practice Group has extensive experience in the drafting and implementing /voic /internet use policies, in addition to defending claims of sexual harassment, discrimination, and invasion of privacy. If you have any questions about the risks of employer monitoring of , voic , or Internet use, feel free to contact one of the following attorneys: Philadelphia Steven R. Wall Princeton Thomas A. Linthorst Pittsburgh Christopher K. Ramsey Washington Nancy R. Kuhn New York Amber L. Kagan Los Angeles Jane Howard-Martin Miami Anne Marie Estevez Morgan, Lewis & Bockius LLP 6
HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.
HOT TOPICS IN EMPLOYMENT LAW E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications by Andrew M. Low Employers have plenty of legitimate reasons for wanting to
More informationI. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
More informationSocial Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
More informationEEOC RELEASES ENFORCEMENT GUIDANCE ON VICARIOUS EMPLOYER LIABILITY FOR UNLAWFUL HARASSMENT BY SUPERVISORS
EEO RELEASES ENFOREMENT GUIDANE ON VIARIOUS EMPLOYER LIABILITY FOR UNLAWFUL HARASSMENT BY SUPERVISORS July 1999 www.morganlewis.com Brussels Frankfurt Harrisburg London Los Angeles Miami New York Philadelphia
More informationElectronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
More informationMONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian
MONITORING THE ELECTRONIC WORKPLACE Jonathan Topazian A. Introduction Forty years ago, well before the advent of the electronic workplace, the Maryland Court of Appeals first recognized that individuals
More informationElectronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees. M. Amy Carlin
Electronic Workplace Privacy Limiting Employers Liability for Monitoring Computer Usage of Employees M. Amy Carlin Computers are ubiquitous in the workplace, and in recent years some employees have attempted
More informationEMPLOYMENT LAW DEFINITION OF AN EMPLOYEE
EMPLOYMENT LAW The Internet affects the relationships between employers and employees. E-mail communication has become commonplace as a fast and easy method of communication between employees, clients,
More informationThe Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law
The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More informationMindful. Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT
Mindful Monitoring IAN D. MEKLINSKY AND ANNE CIESLA BANCROFT ON JANUARY 30, 2001, Anthony Cochenour called the FBI with a tip. Cochenour s company, an Internet service provider, sold e-mail services to
More informationLiabilities and defenses for sexual harassment
Liabilities and defenses for sexual harassment Liabilities and defenses for sexual harassment Resource kit 90132 By Jill R. Muratori, Esq. The U.S. Supreme Court issued two ground-breaking decisions on
More informationHuman Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
More informationGUIDANCE ON SEXUAL HARASSMENT FOR ALL EMPLOYERS IN NEW YORK STATE
ANDREW M. CUOMO Governor HELEN DIANE FOSTER Commissioner GUIDANCE ON SEXUAL HARASSMENT FOR ALL EMPLOYERS IN NEW YORK STATE STATUTORY REQUIREMENTS Sex discrimination is unlawful pursuant to the New York
More informationMoreover, sexual harassment is a violation of federal, state and county fair employment laws.
Sexual harassment interferes with a productive working environment, interjects irrelevant considerations into personnel decisions and generally demeans employees who are victims of harassment. Moreover,
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationSEXUAL HARASSMENT. Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016
SEXUAL HARASSMENT Taylor s Special Care Services, Inc. Simon Pop, MBA Chief Operating Officer 2015-2016 1 Agenda Overview-Why talk about sexual harassment? Why get training? Statistics What is sexual harassment?
More informationMonitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
More information4014.2. PERSONNEL All Staff Permanent Personnel Conditions of Employment Equal Employment Opportunity/Anti-Harassment
PERSONNEL All Staff Permanent Personnel Conditions of Employment Equal Employment Opportunity/Anti-Harassment 4014.2 It is the policy of the Clintonville Public School District that no person may be illegally
More informationBOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
More informationMUTUAL INSURANCE EMPLOYEE HANDBOOK
MUTUAL INSURANCE EMPLOYEE HANDBOOK A. Introduction to Handbook We would like to welcome you as an employee to Mutual Insurance Company. The purpose of this Handbook is to explain the current policies and
More informationNEW JERSEY STATE POLICY PROHIBITING DISCRIMINATION IN THE WORKPLACE
NEW JERSEY STATE POLICY PROHIBITING DISCRIMINATION IN THE WORKPLACE I. POLICY a. Protected Categories The State of New Jersey is committed to providing every State employee and prospective State employee
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationAdvice leaflet Internet and e-mail policies
Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.
More informationBULLYING/ANTI-HARASSMENT
BULLYING/ANTI-HARASSMENT The state of Mississippi has established legislation requiring Bullying Prevention to be taught in schools. Executive Summary The purpose of this policy is to assist the Mississippi
More informationLE.201 Employee Privacy Rights in the Electronic/Social Media Age
LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,
More information6141.9. Internet and Computers. Acceptable Use and Internet Safety
6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationPrivacy is the ability of an individual or group to keep their lives and
Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.
More informationAugust 2007 Education and Membership Development Department
August 2007 Education and Membership Development Department Table of Contents Title VII of the Civil Rights Act of 1964 3 What is Sexual Harassment? 3 4 How Can Sexual Harassment Occur? 4 5 When is an
More informationETHICAL ISSUES IN EMPLOYMENT LAW. Judith E. Harris. whether to provide representation and/or indemnification for individual employees;
ETHICAL ISSUES IN EMPLOYMENT LAW I. INTRODUCTION Judith E. Harris In today s workplace, employers are increasingly subject to lawsuits involving multiple defendants. This trend is most often evidenced
More informationPINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationRyanair Holdings PLC Code of Business Conduct & Ethics 2012
Ryanair Holdings PLC Code of Business Conduct & Ethics 2012 1 TABLE OF CONTENTS 1. INTRODUCTION 3 2. WORK ENVIRONMENT 3 2.1 Discrimination & Harassment 3 2.2 Privacy of Personal Information 3 2.3 Internet
More informationVirginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
More informationSuperintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS
Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,
More informationNon-Discrimination and Anti-Harassment Policy OP 03.03
Non-Discrimination and Anti-Harassment Policy OP 03.03 Policy Mississippi State University is committed to assuring that the University and its programs are free from discrimination and harassment based
More informationMONITORING EMPLOYEE E-MAIL: EFFICIENT WORKPLACES VS. EMPLOYEE PRIVACY
ibrief / ecommerce Cite as 2001 Duke L. & Tech. Rev. 0026 7/25/2001 MONITORING EMPLOYEE E-MAIL: EFFICIENT WORKPLACES VS. EMPLOYEE PRIVACY Employer monitoring of electronic mail constitutes an emerging
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationPeopleMatrix Application Hosting Services Agreement
PeopleMatrix Application Hosting Services Agreement WolfeReiter, LLC CONTENTS 1. Services Agreement... 2 1.1. Description of Services... 2 1.2. Term... 2 1.3. Customer Responsibilities... 2 1.4. Payment
More informationDEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL
DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL Personnel Directive Subject: PROCEDURE FOR PREVENTING AND/OR RESOLVING PROBLEMS RELATED TO SEXUAL HARASSMENT ADOPTED BY THE BOARD OF PUBLIC WORKS, CITY OF LOS
More informationDEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE
2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology
More informationVICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More information2.2.2 Policy Prohibiting Discrimination and Harassment The University of San Diego is committed to upholding standards that promote respect and human
2.2.2 Policy Prohibiting Discrimination and Harassment The University of San Diego is committed to upholding standards that promote respect and human dignity in an environment that fosters academic excellence
More informationADMINISTRATIVE POLICY
POLICY 14-UMBER &/tay2-6t/v ISSUED Edward Mar _ City _Manager March 13, 1997 REVISIONS REVISED SECTION III. Legal Ramifications IV. Policy Implementation V. Non-Retaliation VI. Notification SUBJECT: POLICY
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationTown of Salisbury 5 Beach Road Salisbury, Massachusetts 01952
Town of Salisbury 5 Beach Road Salisbury, Massachusetts 01952 This policy is applicable to all employees of the Town of Salisbury. For those employees covered by Collective Bargaining Agreements, the provisions
More informationCorporate Communications
New Mexico State University ENGL 218G SCIENTIFIC AND TECHNICAL COMMUNICATIONS August 2 nd, 2010 Corporate Communications Corporate Wiretapping in the Digital Information Age Christopher M. Kane Contents
More information719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationCity of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
More informationCITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE
CITY OF LOS ANGELES SEXUAL ORIENTATION, GENDER IDENTITY, AND GENDER EXPRESSION DISCRIMINATION COMPLAINT PROCEDURE The policy of the City of Los Angeles has been, and will continue to be, to promote and
More informationAcceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
More informationEMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS. Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out.
EMPLOYER S LIABILITY FOR SEXUAL HARASSMENT BY SUPERVISORS Charges of Sexual Harassment Are a Small Business Nightmare Statistics Bare This Out. Last year, 15,222 charges of sexual harassment were filed
More information2.25 HOSTILE WORK ENVIRONMENT CLAIMS UNDER THE NEW JERSEY LAW AGAINST DISCRIMINATION (SEXUAL AND OTHER HARASSMENT) (05/2015)
2.25 HOSTILE WORK ENVIRONMENT CLAIMS UNDER THE NEW JERSEY LAW AGAINST DISCRIMINATION (SEXUAL AND OTHER HARASSMENT) (05/2015) The following charge is based on the Supreme Court's decision in Lehmann v.
More informationGENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
More informationIN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)
More informationWorkplace Mysteries: Employment Law Under the Magnifying Glass. Employment Law Half-Day Seminar
Employment Law Half-Day Seminar October 30, 2012 Seattle, Washington November 1, 2012 Portland, Oregon This notebook is a publication of Miller Nash llp. It is provided for informational purposes only
More informationThe Coca-Cola Company
The Coca-Cola Company EQUAL OPPORTUNITY AND AFFIRMATIVE ACTION POLICY STATEMENT 1.0 Policy Statement and Purpose The Coca-Cola Company is an Equal Opportunity Employer and maintains a work environment
More informationWorkplace Policies. Computer Software (Unauthorized Copying)
Workplace Policies Computer Software (Unauthorized Copying) Cornerstone Systems does not condone the illegal duplication of software. The copyright law is clear. The copyright holder is given certain exclusive
More informationConflicts of Interest Issues in Simultaneous Representation of Employers and Employees in Employment Law. Janet Savage 1
Conflicts of Interest Issues in Simultaneous Representation of Employers and Employees in Employment Law Janet Savage 1 Plaintiffs suing their former employers for wrongful discharge or employment discrimination
More informationUNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF INDIANA INDIANAPOLIS DIVISION
Case 1:05-cv-01379-RLY-WTL Document 41 Filed 11/20/06 Page 1 of 7 PageID #: UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF INDIANA INDIANAPOLIS DIVISION CYNTHIA Y. MARCH, Plaintiff, vs. ADT
More informationState By State Employee Monitoring Laws
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com State By State Employee Monitoring Laws Law360,
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationDepartment of Homeland Security DHS Directives System Directive Number: 256-01 Revision Number: 00. Issue Date: ANTI HARASSMENT POLICY
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 256-01 Revision Number: 00 Issue Date: ANTI HARASSMENT POLICY This Directive is intended to prohibit and prevent harassment
More informationAdministrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
More informationWHO'S ON THE FIRING LINE? TIPS FOR AVOIDING WRONGFUL/RETALIATORY DISCHARGE CLAIMS by William R. Hanna
WHO'S ON THE FIRING LINE? TIPS FOR AVOIDING WRONGFUL/RETALIATORY DISCHARGE CLAIMS by William R. Hanna I. INTRODUCTION A. Union members were only 7.2% of the private sector work force in 2009, down from
More informationGUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
More informationPolicy on Non-Discrimination and Equal Employment Opportunity
Supreme Court of Pennsylvania Unified Judicial System of Pennsylvania Policy on Non-Discrimination and Equal Employment Opportunity The Supreme Court of Pennsylvania declares that it is the policy of the
More informationANTI-DISCRIMINATION, HARASSMENT AND BULLYING (STUDENT POLICY)
Page 1 ANTI-DISCRIMINATION, HARASSMENT AND BULLYING (STUDENT POLICY) The Board of Education is committed to promoting the worth and dignity of all individuals. It believes that all employees and students
More informationAssistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationThe faculty of BGSU reaffirms that the following are an accepted part of their responsibilities as teacher-scholars:
Page 1 of 7 SECTION E: ETHICAL RESPONSIBILITIES Faculty members shall follow professional ethical standards in conducting the affairs of the University. These standards are articulated in the Statement
More informationIN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA CONSENT DECREE. Introduction
r S9 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA EQUAL EMPLOYMENT OPPORTUNITY COMMISSION, Plaintiff, CIVIL ACTION NO.: 07-cv-2179 Honorable Paul S. Diamond TROPIANO TRANSFORATION
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationUNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION BRIAN Z. FRANCE, v. MEGAN P. FRANCE, Plaintiff, Defendant. Case No. 3:11-CV-00186 PLAINTIFF S MEMORANDUM OF LAW IN SUPPORT
More informationMTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions
MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions Welcome to MTNL Mumbai Email services. MTNL Mumbai provides e-mail services pursuant to the terms and conditions set forth below. By using MTNL Mumbai
More informationHIGH SCHOOL FOR RECORDING ARTS
Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities
More informationNORTH CAROLINA WESLEYAN COLLEGE POLICY ON GENDER DISCRIMINATION AND SEXUAL HARASSMENT
NORTH CAROLINA WESLEYAN COLLEGE POLICY ON GENDER DISCRIMINATION AND SEXUAL HARASSMENT It is the policy of North Carolina Wesleyan college that unlawful gender discrimination in any form, including sexual
More informationEmployee Privacy Laws: Pennsylvania
View the online version at http://us.practicallaw.com/7-574-1705 Employee Privacy Laws: Pennsylvania TOM JOHNSON, DECHERT LLP, WITH PRACTICAL LAW LABOR & EMPLOYMENT A guide to state law on employee privacy
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More informationEMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com
More informationLABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE. Timothy L. Davis. Burke, Williams & Sorensen, LLP www.bwslaw.
LABOR AND EMPLOYMENT LAW UPDATE FOR MAY 2016 LEAGUE OF CALIFORNIA CITIES CONFERENCE Timothy L. Davis Burke, Williams & Sorensen, LLP www.bwslaw.com OVERVIEW FOR 2016 UPDATE Labor Law Court Decisions Employment
More informationCENTERPIECE FOCUS ON: SEXUAL HARASSMENT POLICIES ESTABLISHING AND IMPLEMENTING AN EFFECTIVE HARASSMENT POLICY
CENTERPIECE FOCUS ON: SEXUAL HARASSMENT POLICIES ESTABLISHING AND IMPLEMENTING AN EFFECTIVE HARASSMENT POLICY BY L. ROBERT BATTERMAN AND SHERI L. GILBERT On June 26, 1998, the Supreme Court issued two
More informationOVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor astorey@rudman-winchell.com I. USE OF INFORMATION DURING HIRING PROCESS
More informationCOUNTY OF LOS ANGELES POLICY OF EQUITY
COUNTY OF LOS ANGELES POLICY OF EQUITY Effective July 1, 2011 THE POLICY All Los Angeles County (County) employees are required to conduct themselves in accordance with the entirety of this County Policy
More informationMONITORING EMPLOYEE USE OF E-MAIL AND THE INTERNET. Elizabeth J. Forster Blaney McMurtry LLP 416.593.3919 eforster@blaney.com
MONITORING EMPLOYEE USE OF E-MAIL AND THE INTERNET Elizabeth J. Forster Blaney McMurtry LLP 416.593.3919 eforster@blaney.com MONITORING EMPLOYEE USE OF E-MAIL AND THE INTERNET 1. INTRODUCTION Personal
More informationResponse to Complaints of Harassment, Violence and Discrimination
Response to Complaints of Harassment, Violence and Discrimination To limit potential liability, employers should immediately respond to complaints of harassment, violence or threats of violence, and discrimination.
More informationPacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
More informationELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationCITY OF PORTLAND POLICY AGAINST HARASSMENT
CITY OF PORTLAND POLICY AGAINST HARASSMENT I. POLICY AGAINST HARASSMENT Employees are the most important part of this organization. They deserve to be treated with respect and dignity. It is the policy
More informationCHAPTER FIVE. The EEOC s regulations, at 29 CFR 1604.11(a), provide an explanation of what constitutes tangible employment action sexual harassment:
CHAPTER FIVE Harassment Cases The theory of harassment can be divided into two categories: (1) harassment resulting in a tangible employment action, and (2) hostile environment harassment. In tangible
More informationPolicy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
More informationSocial Media in the Workplace: Avoiding Legal Pitfalls
Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:
More information