INVESTIGATION OF SCHOOL EMPLOYEE MISCONDUCT INVOLVING THE MISUSE OF TECHNOLOGY

Similar documents
4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February Purpose.

Electronic Communications: , Voic , Telephones, Internet and Computers

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

Children s Internet Protection Plan. IIBGA Children s Internet Protection Plan (CIPA) Plan. Children s Internet Protection Act (CIPA) Safety Plan

MINNETONKA PUBLIC SCHOOLS

Responsible Use of Technology

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Bank Independent Online Financial Management Addendum

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised:

MEDICAID COMPLIANCE POLICY

Electronic Funds Transfer, Internet and Mobile Banking Agreement and Disclosure For Personal Accounts

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

INTERNET ACCEPTABLE USE AND SAFETY POLICY

Descriptor Code: EFE-P

Internet and Computers. Acceptable Use and Internet Safety

Beaumont Public Library Computer Usage Policies

New York State Office Of Children And Family Services VPN

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

Forrestville Valley School District #221

COMPUTER USE POLICY. 1.0 Purpose and Summary

Acceptable Use Policy

Dracut Public Schools Technology Acceptable Use Policy Revised 2014

Student & Staff Access and Use of Networked Information Resources and Communications

Revelstoke Board of Education Policy Manual

HOT TOPICS IN EMPLOYMENT LAW. , Voic , and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.

USE OF TECHNOLOGY RESOURCES IN INSTRUCTION

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

RIVERVIEW SCHOOL DISTRICT

POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS

524 INTERNET ACCEPTABLE USE AND SAFETY POLICY I. PURPOSE

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

Administrative Procedure 3720 Computer and Network Use

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

6415 C Internet, and Network Rules for Staff Use

Riverside Community College District Policy No General Institution

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

Virginia Commonwealth University Police Department

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT , INTERNET AND COMPUTER USE

Pierce County Policy on Computer Use and Information Systems

4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

Instruction. Neoga Community Unit School District #3 Page 1 of 5

I. Issues Surrounding /Computer Monitoring and Searches of an Employee's Property

Website & Hosting Terms & Conditions

STUDENTS Children s Internet Protection Act, Pub. Law , codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250

BOBCAT COMPUTING POLICY

Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

EMPLOYEE COMPUTER USE POLICY

Case 2:08-cv EFM Document 44 Filed 12/14/09 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

DIOCESE OF DALLAS. Computer Internet Policy

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Acceptable Use Policy

COMPUTER, INTERNET, & USE POLICY

region16.net Acceptable Use Policy ( AUP )

System and Network Security Policy Internet User Guidelines and Policy. North Coast Council West Canal Road Valley View, Ohio 44125

Social Media In the Workplace

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources

U.S. Utilities And Preventing Obscure - Internet By Users

NEBO SCHOOL DISTRICT BOARD OF EDUCATION POLICIES AND PROCEDURES

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut

Technology Department 1350 Main Street Cambria, CA 93428

THE SCHOOL DISTRICT OF PHILADELPHIA

section 15 Computers, , Internet, and Communications

COMPUTER, NETWORK AND INTERNET USE POLICY

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+

Dear Parents/Guardians,

How to Monitor Employee Web Browsing and Legally

North Clackamas School District 12

UK Dedicated Servers Limited. Acceptable Use Policy

Lutheran Education Association of Houston Acceptable Use Policy (Students)

ACCEPTABLE USE OF INFORMATION TECHNOLOGY RESOURCES

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

READING SCHOOL DISTRICT

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

3. Electronic Mail ( )

CENTRAL CAMBRIA SCHOOL DISTRICT

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

File: EDE COMPUTER/ONLINE SERVICES

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

PERSONNEL - Certified and Noncertified

MEMORANDUM. The Officers and Directors of the Company. Publicity Before and After Filing an IPO Registration Statement

3-3 (a) POLICY ADMINISTRATION IN GENERAL. 3-3 Acceptable Use Policy (AUP) A. Philosophy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

Federal Trade Commission Privacy Impact Assessment

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Transcription:

INVESTIGATION OF SCHOOL EMPLOYEE MISCONDUCT INVOLVING THE MISUSE OF TECHNOLOGY 2003 ELA Convention Savannah, Georgia Jeffrey J. Horner Bracewell & Patterson, L.L.P. 711 Louisiana, Suite 2900 Houston, Texas 77002 713-221-1219 telephone 713-222-3257 fax jeffrey.horner@bracepatt.com

1. INTRODUCTION INVESTIGATION OF SCHOOL EMPLOYEE MISCONDUCT INVOLVING THE MISUSE OF TECHNOLOGY Technology in the workplace has increased significantly in recent years, including the introduction of e-mail, voicemail, facsimile machines, the Internet, and sophisticated computer software. Employers are frequently confronted with the need to investigate allegations that employees are involved in misconduct relating to the use of technology, and take appropriate action when the investigation uncovers wrongdoing. Due to the application of various state and federal statutes and constitutional provisions, the importance of fair and objective investigations is even more pronounced in the public school setting. This outline outlines the legal setting in this area, and provides practical tips for handling investigations relating to the misuse of technology by employees. 2. LEGAL SETTING Public school districts are political subdivisions of the state. Thus, their activities constitute "state action" for constitutional purposes. This means federal constitutional guarantees both protect and constrain public school officials and employees. These same guarantees do not apply to private educational institutions. Regardless of whether your institution is public or private, managing employees in this legal setting begins with the promulgation of policies and procedures to ensure fairness and compliance with the law. Courts generally review claims by determining the existence of any policies and procedures and, if they exist, whether they were followed. If these inquiries are satisfied, administrators and educational entities stand a significantly better chance of having their decisions supported in court. It is important to note that achieving fairness in the workplace does not mean that employees accused of wrongdoing are entitled to all the formal standards applicable to investigation and prosecution in the criminal setting. To the contrary, courts have generally recognized a distinction between the criminal setting and the employment context. The U.S. Supreme Court recognizes that a public employer has a substantial interest in investigating misconduct by employees in an informal manner that does not impose significant administrative burdens or intolerable delays. 1 Another legal consideration for public schools in the investigatory realm involves due process standards. The U.S. Supreme Court outlined the general requirements for providing pre-termination due process to public employees in Loudermill v. Cleveland Board of Education. 2 Under Loudermill, public employees are entitled to: (1) oral or written notice of the charges against them; (2) an explanation of the employer's evidence; and (3) an opportunity for the accused to present his or her side of the story. 3 In this analysis, the Court presumed that a post-termination hearing would follow. The process due private employees will depend upon the policies of the particular institution. 1 O'Connor v. Ortega, 480 U.S. 709 (1987). 2 470 U.S. 532 (1985). 3 Id. At 546.

A final consideration in investigations is the need for clearly articulated, reasonable standards of conduct set forth in employee handbooks. The handbooks should include any applicable policies and procedures. Furthermore, the handbook must be careful to follow school policy and not to inadvertently convert an "at-will" employment relationship into a constitutionally protected property right to continuous employment. 3. INVESTIGATIONS RELATING TO THE MISUSE OF TECHNOLOGY As noted above, in recent years a proliferation of technological advances has permeated the school setting. The possibility of abuse of technology in the school setting is very real. Therefore, school administrators must be aware of possible areas of abuse or misuse of technology, and be prepared to react accordingly. A. Initial Considerations Personal use of school technology, including school computers, can help employees become more knowledgeable about technology. However, excessive personal use clearly interferes with job performance, and can sometimes violate the law. For example, some personal e-mail communications can be inappropriate and unacceptable for the school environment. Furthermore, although the Internet is a useful tool to secure information on a variety of subjects, viewing and downloading of inappropriate materials, such as pornographic material, cannot be permitted. Educational institutions have substantial discretion in preventing or regulating personal use of their computers. This section will address some of the legal issues relating to the misuse of technology. 4 B. Statutes Relating to Misuse of Technology To a great extent, the primary legal issue on the misuse of technology relates to privacy. As O'Connor v. Ortega indicated, an employee has a "reasonable expectation of privacy" in the contents of his or her office. 5 However, this expectation of privacy is not unfettered, and school officials may make a search of individual belongings at school, including his or her computer files, if "reasonable suspicion" exists to determine that a violation of the law or school rules has occurred. 6 Various statutes relate to the possible misuse of technology. Electronic Communications Privacy Act The Electronic Communications Privacy Act ("ECPA") was passed in the late 1980's as an amendment to the Federal Wire Tap Act. 7 The ECPA protects the privacy of electronic communications, including e-mail. It criminalizes the interception of electronic messages, such as e-mail, while in transit. 8 The ECPA 4 The author wishes to recognize the contributions of Mr. Bruce Smith of Drummond Woodsum & McMahon, an attorney from Portland, Maine, in the drafting of this outline. In particular, Mr. Smith's article in the August 2001 issue of National School Board Association's Inquiry & Analysis was very helpful in drafting this outline. 5 480 U.S. at 719-720. 6 Id. At 725-726. 7 See 18 U.S.C. 2510-2522. 8 See 18 U.S.C. 2511; see also Steve Jackson Games Inc. v. U.S. Secret Service, 36 F.3d 457 (5 th Cir. 1994).

9 20 U.S.C. 1232g et seq. contains an exception for the provider of the electronics communication service. In most cases, educational institutions will fit this exception. In general, the ECPA is not a significant obstacle to school monitoring of employee e-mail communications. Family Educational Rights and Privacy Act The Family Educational Rights and Privacy Act ("FERPA") 9 relates to student educational records at any schools, whether public or private, which receive federal funding. Generally, an employee cannot misuse or unlawfully disseminate student records without violating FERPA. Of course, when a school employee is required to use student records as part of his or her job duties, FERPA would not be violated. However, the inappropriate dissemination of student records by school employees could subject an employee to adverse employment action or even civil liability. 10 One recent U.S. Supreme Court case held that school districts cannot be held liable for monetary damages under FERPA. 11 Communications Decency Act In 1996, the U.S. Congress passed the Communications Decency Act ("CDA"). 12 One provision of this statute permits blocking and filtering software to restrict student and employee access to inappropriate on-line material at school. 13 Children's Internet Protection Act The Children's Internet Protection Act ("CIPA") requires schools to restrict employee and student access to the Internet. 14 Under the CIPA, covered schools must have an Internet safety program which filters both adult and student access to visual depictions that are obscene or constitute child pornography. The program must also prevent students from accessing materials that are harmful to minors. 15 A Recent Case in Point A Second Circuit Court of Appeals case illustrates the balancing act which courts must undertake regarding the misuse of employee technology. In Leventhal v. Knapek, 16 based on an anonymous tip, a school supervisor sought 10 See Fay v. South Colonie Central School District, 802 F.2d 21 (2d Cir. 1986). 11 Doe v. Gonzaga Univ., 122 S.Ct. 2268 (2002). 12 47 U.S.C. 230, et seq. 13 See 47 U.S.C. 230(b)(4). 14 Pub. L. 106-554 1(a)(4). 15 Id. 16 266 F.3d 64 (2d Cir. 2001).

evidence for the alleged unauthorized use of computer equipment by searching the employee's office and computer files. The court recognized that the employee had a reasonable expectation of privacy in his computer. However, the court held that the supervisor had a reasonable basis for the search. 17 This case illustrates the permissible actions of school officials when confronted with reasonable suspicion of technology misuse. 4. GUIDANCE FOR EMPLOYEE USE OF SCHOOL TECHNOLOGY Schools should establish a written set of rules or policies relating to the use of school technology, including school computers and Internet connections. These rules will reduce the misuse of the computer system and provide a foundation for investigation and discipline as discussed earlier in this paper. School rules and policies should address at least the following areas: A. Personal Use School districts should restrict computer networks and Internet connections to purposes related to job performance. Personal use should at the very least be restricted or, if necessary, disallowed completely. B. Confidentiality Employees should be directed not to transmit confidential information concerning students or others; these transmissions could violate FERPA. Schools may want to consider purchasing secure systems to safeguard information which is not subject to open records laws, particularly student records. C. Non-Privacy Statement A policy should directly state that all data in school computers and the computer networks themselves are considered school business and subject to being monitored; employees should have no right to privacy in their computer files. D. Illegal Uses A policy should identify categories of illegal uses and state that an individual can be subject to adverse employment action, including termination, for such illegal uses. E. Advertising and Solicitation A policy should prohibit advertising and solicitation on school computers by outside groups. The policy should be written broadly to apply to employees, students, and anyone who might have outside access to school computers. F. Account Safeguarding and Passwords Employees should be reminded that they are responsible for safeguarding their own passwords; they will be held accountable for the consequences of intentional or 17 Id. at 72.

negligent disclosure of this information. Employees should also be required to "log off" at the end of each workday. G. Role of the Technology Coordinator 5. CONCLUSION Each school should appoint a person to coordinate and police the district's technology system. The duties of this individual should include implementation of the technology policies. Employees should be reminded to contact this person in the event they have questions regarding the policies. Furthermore, employees should be instructed to report all violations of this policy to the technology coordinator, and to assist the coordinator in any investigation regarding possible misuse of technology. Assuring that employees are treated fairly when they are accused of wrongdoing starts with a carefully planned, timely, and impartial investigation. The relaxed standards of reasonable suspicion apply, as opposed to criminal law standards. The investigation should be conducted in a manner which allows any wrong to be detected while protecting the rights of the accused. Regarding technology, policies should be developed in writing to guide employee conduct. Investigators should treat people with whom they come into contact in the same manner they would expect to be treated in a similar situation. Follow the "Golden Rule." Care must be exercised to avoid trampling on the dignity of an accused. By doing so, the objective of the investigation can be obtained, and the school can continue to function efficiently after the investigation is complete. Jeffrey J. Horner is a partner at the Houston, Texas law firm of Bracewell & Patterson, L.L.P. He is head of the firm's Public Law Section, and has specialized in the representation of school districts and colleges for 20 years. Mr. Horner served as president of the Education Law Association in 1998. He is also an adjunct professor of education law at the South Texas College of Law in Houston. Mr. Horner received his law degree from the University of Virginia School of Law.