SlideShare uma empresa Scribd logo
1 de 31
Understanding Privacy in the
Workplace
Presented by Brittany Cullison, PHR
December 1, 2011
Important Notice
• I am not an attorney.
• This is not a substitute for experienced
legal counsel.
• This is not legal advice.
What to expect
• Laws that govern privacy in the workplace
• What employers can monitor-- and the
right way to do it
• Employer’s obligations to protect
employee’s private information—and best
practice guidelines
What governs privacy in the
workplace?
• Fourth Amendment
– Not applicable for private employees, but
offers protection in some cases for public
employees
• Electronic Communications Privacy Act
– Governs the monitoring and recording of
employee electronic communications
What governs privacy in the
workplace?
• FCRA and FACTA
– Promotes confidentiality, accuracy, relevancy,
and proper use of that information
• EPPA
– Prevents use of lie detectors in employment
practices
What governs privacy in the
workplace?
• ADA and FMLA
– Recordkeeping and confidentiality of employee
medical information
• HIPAA
– Privacy of personally identifiable health
information
• GINA
– Restricts employers from acquiring and
disclosing employee genetic information
What governs privacy in the
workplace?
• Identity theft laws
– Federal and state level
• Common Law
• Contractual Privacy Claims
Employer Rights
• Electronic Monitoring
– Computers
– Emails
– Internet Usage- Social Media
– Telephone
• Video Surveillance
• Workplace Searches
Electronic Monitoring:
Computers
• Company issued computers
– Employers can monitor
– Should have clear policy that dissolves any
expectation of privacy
• “Personal” files, password protected documents
• Personal Computer used for Work
– May be subject to discovery in litigation, but
typically only if subpoenaed
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring: Emails
• Stored Communications Act
– Established in 1986
– Title II of the ECPA
– Prohibits unauthorized access to electronic
communications stored on a third party site
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring:
Internet
• Internet usage on company device
– Employers can monitor
– Should have a written policy
• Social Networking
– Public vs. private
– Use caution when disciplining an employee for
disparaging comments found
– Section 7 of NLRA- applies to union and non-
union
Electronic Monitoring:
Internet
• Social Networking
– If someone has access, they can share access
– Should have a written Social Media policy
Electronic Monitoring:
Telephones
• Business telephones
– May be monitored when:
• employee has given consent or
• “Business Extension” exemption
– Personal calls on business phones cannot be
monitored
• Company issued cell phones
– Should have a policy that dissolves expectation
of privacy
– Searches, reviews, and monitoring should be
done only for legitimate, business purposes
Video Surveillance
• Acceptable in open and public work areas
• If recording audio, must comply with ECPA
• Limit access to the recorded material to
designated management
Workplace Searches
• Reasonable expectation of privacy
– Company property vs. Employee Property
– Written policy
• Justified Search
– Reasonable suspicion
– Violation of another company policy
• Drug and Alcohol Policy
• Weapons in the Workplace
• Confidentiality
Workplace Searches
• Reasonableness
– Discretion
– Other investigatory methods exhausted
– Appropriate scope
• Never force an employee to submit to
search
• Have another witness present during a
search
Employer Responsibilities
• Identify Theft Prevention
– Policy, Procedure and Training
• Confidentiality of Medical Information
• Additional confidentiality and
recordkeeping practices
• Clearly communicate workplace
monitoring policies
• Train employees and managers
ID Theft Prevention
• Evaluate information security and disposal
– How easy is it for someone to access your
office during business hours?
– How long documents stay at the printer
before some one retrieves them?
– Are documents that contain personal
information left out unattended?
– Are computer screens being locked every
time someone leaves there desk?
ID Theft Prevention
• Are cabinets and drawers being locked?
• Are emails that contain personal
information being sent securely?
• Are documents properly shredded when
no longer needed?
• Who in the office has access to sensitive
information?
ID Theft Prevention
• Develop a protection plan
– Conduct a “walk through”
– Identify potential risks
– Create easy to follow guidelines and procedures
• Educate your employees
– The importance of protecting personal
information.
– Measure that the company will take to began
this process.
– How the will be enforced.
ID Theft Prevention
• Have a Breach Plan
– Notify employee, law enforcement and possibly
FTC
– Notify credit bureaus
– Conduct internal investigation
– Take steps to minimize or prevent additional
loss
Confidentiality of Medical
Information
• Do not request medical exam or make
inquiry unless employee poses direct
threat or it’s job related and consistent
with business necessity
• Medical information should be kept
confidential and in separate file
– FMLA certifications
– Worker’s Comp reports
– Medical exam results
– HIPAA regulated documents, if applicable
Confidentiality of Medical
Information
• Train supervisors on how to respond
• Educate employees on what is appropriate
to disclose in the workplace
Additional Confidential
Recordkeeping
• Consumer Reports
– Reports must be disposed of properly under
FACTA
• Investigations
– Confidential to protect witnesses and accuser
Policies
• Electronic Monitoring
– Define system covered
– Business-use only
– Discuss prohibited use
– Explain consequences
– Inform of employers’ right to monitor
• Telephone Monitoring
– Define purpose of monitoring
– Discuss calls that appear to be personal
Policies
• Social Media
– Define what social media is
– Apply it to business and personal
– Compare to other policies
• Workplace Searches
– Define purpose and search areas
– Ensure that a search is not an accusation
– Refusal may lead to disciplinary action or termination
Summary
• Privacy in the workplace is a combination
of employer rights and employer
responsibilities
• The key to monitoring employees is to
dissolve the expectation of privacy
• Employee information protection is in the
hands of HR
Questions?
Brittany Cullison, PHR
713-784-1181
bcullison@gnapartners.com
www.gnapartners.com
Resources
www.shrm.com
www.hrlaws.com
www.twc.state.tx.us
www.prospera.com

Mais conteúdo relacionado

Mais procurados

legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commercemonchai sopitka
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Joel Briza
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Organizational Behavior Chapter 4 Personality and Values
Organizational Behavior Chapter 4 Personality and ValuesOrganizational Behavior Chapter 4 Personality and Values
Organizational Behavior Chapter 4 Personality and ValuesDr. John V. Padua
 
Whistleblowing for sustainable value
Whistleblowing for sustainable value Whistleblowing for sustainable value
Whistleblowing for sustainable value leadershipmgtservice
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systemsProf. Othman Alsalloum
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceCase IQ
 
ARC MGMT 374 Week 4 Presentation
ARC MGMT 374 Week 4 PresentationARC MGMT 374 Week 4 Presentation
ARC MGMT 374 Week 4 PresentationMichael Hill
 

Mais procurados (20)

Chapter 3 Business Ethics Issues
Chapter 3 Business Ethics IssuesChapter 3 Business Ethics Issues
Chapter 3 Business Ethics Issues
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Organizational Behavior Chapter 4 Personality and Values
Organizational Behavior Chapter 4 Personality and ValuesOrganizational Behavior Chapter 4 Personality and Values
Organizational Behavior Chapter 4 Personality and Values
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Whistleblowing for sustainable value
Whistleblowing for sustainable value Whistleblowing for sustainable value
Whistleblowing for sustainable value
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Review questions
Review questionsReview questions
Review questions
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the Workplace
 
management information system module3
management information system module3management information system module3
management information system module3
 
ARC MGMT 374 Week 4 Presentation
ARC MGMT 374 Week 4 PresentationARC MGMT 374 Week 4 Presentation
ARC MGMT 374 Week 4 Presentation
 

Destaque

6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top TalentFocal Upright
 
Working safely powerpoint_presentation
Working safely powerpoint_presentationWorking safely powerpoint_presentation
Working safely powerpoint_presentationHaseeb Butt
 
IIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development PortfolioIIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development PortfolioTom-Cramer
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
Mock interview training
Mock interview trainingMock interview training
Mock interview trainingNikita Pande
 
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com..."Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...Sarah Robbins
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreementruelcdogma
 
Quiz warehouse safety
Quiz warehouse safetyQuiz warehouse safety
Quiz warehouse safetyMark Bennett
 
Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520jo bitonio
 
10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should KnowOxbridge Academy
 
Health and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom pptHealth and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom pptQwizdom UK
 
Top 9 mock interview questions answers
Top 9 mock interview questions answersTop 9 mock interview questions answers
Top 9 mock interview questions answershudsons168
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentationgtwaddell
 

Destaque (20)

6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent
 
Working safely powerpoint_presentation
Working safely powerpoint_presentationWorking safely powerpoint_presentation
Working safely powerpoint_presentation
 
Privacy at workplace
Privacy at workplacePrivacy at workplace
Privacy at workplace
 
IIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development PortfolioIIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development Portfolio
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
HIPAA
HIPAAHIPAA
HIPAA
 
Mock interview training
Mock interview trainingMock interview training
Mock interview training
 
Mba Mock interview
Mba  Mock interviewMba  Mock interview
Mba Mock interview
 
Safety quiz
Safety quizSafety quiz
Safety quiz
 
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com..."Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreement
 
Quiz warehouse safety
Quiz warehouse safetyQuiz warehouse safety
Quiz warehouse safety
 
Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520
 
10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know
 
Health and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom pptHealth and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom ppt
 
Top 9 mock interview questions answers
Top 9 mock interview questions answersTop 9 mock interview questions answers
Top 9 mock interview questions answers
 
Mock interview tips
Mock interview tipsMock interview tips
Mock interview tips
 
Memorandum Of Agreement Sample
Memorandum Of Agreement SampleMemorandum Of Agreement Sample
Memorandum Of Agreement Sample
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentation
 
Portfolio Analysis
Portfolio AnalysisPortfolio Analysis
Portfolio Analysis
 

Semelhante a Understanding employee privacy

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protectionRachel Aldighieri
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - EdinburghRachel Aldighieri
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015Rachel Aldighieri
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection updateRachel Aldighieri
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Rachel Aldighieri
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014Rachel Aldighieri
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015Rachel Aldighieri
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researcherskclcompbio
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMichelleSaver
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awarenessitchomecare
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014Rachel Aldighieri
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillSymptai Consulting Limited
 

Semelhante a Understanding employee privacy (20)

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awareness
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Data Protection and IDEA
Data Protection and IDEAData Protection and IDEA
Data Protection and IDEA
 

Mais de G&A Partners

G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring ProcessG&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring ProcessG&A Partners
 
What's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and BeyondWhat's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and BeyondG&A Partners
 
How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace G&A Partners
 
Helping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life BalanceHelping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life BalanceG&A Partners
 
G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016 G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016 G&A Partners
 
Fundamentals of FMLA
Fundamentals of FMLAFundamentals of FMLA
Fundamentals of FMLAG&A Partners
 
Breaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee BurnoutBreaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee BurnoutG&A Partners
 
Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016G&A Partners
 
Setting & Discussing Performance Goals
Setting & Discussing Performance GoalsSetting & Discussing Performance Goals
Setting & Discussing Performance GoalsG&A Partners
 
Best Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and TerminationsBest Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and TerminationsG&A Partners
 
Building an effective safety culture edits
Building an effective safety culture editsBuilding an effective safety culture edits
Building an effective safety culture editsG&A Partners
 
Performance Appraisals Webinar
Performance Appraisals WebinarPerformance Appraisals Webinar
Performance Appraisals WebinarG&A Partners
 
Recruitment Process Outsourcing Webinar
Recruitment Process Outsourcing WebinarRecruitment Process Outsourcing Webinar
Recruitment Process Outsourcing WebinarG&A Partners
 
Labor and Employment Law 2015
Labor and Employment Law 2015Labor and Employment Law 2015
Labor and Employment Law 2015G&A Partners
 
G&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplaceG&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplaceG&A Partners
 
Professional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival HighProfessional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival HighG&A Partners
 
Feb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perrettaFeb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perrettaG&A Partners
 
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance LawsAvoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance LawsG&A Partners
 
Hr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jllHr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jllG&A Partners
 
Whitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOsWhitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOsG&A Partners
 

Mais de G&A Partners (20)

G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring ProcessG&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
 
What's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and BeyondWhat's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and Beyond
 
How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace
 
Helping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life BalanceHelping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life Balance
 
G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016 G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016
 
Fundamentals of FMLA
Fundamentals of FMLAFundamentals of FMLA
Fundamentals of FMLA
 
Breaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee BurnoutBreaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee Burnout
 
Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016
 
Setting & Discussing Performance Goals
Setting & Discussing Performance GoalsSetting & Discussing Performance Goals
Setting & Discussing Performance Goals
 
Best Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and TerminationsBest Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and Terminations
 
Building an effective safety culture edits
Building an effective safety culture editsBuilding an effective safety culture edits
Building an effective safety culture edits
 
Performance Appraisals Webinar
Performance Appraisals WebinarPerformance Appraisals Webinar
Performance Appraisals Webinar
 
Recruitment Process Outsourcing Webinar
Recruitment Process Outsourcing WebinarRecruitment Process Outsourcing Webinar
Recruitment Process Outsourcing Webinar
 
Labor and Employment Law 2015
Labor and Employment Law 2015Labor and Employment Law 2015
Labor and Employment Law 2015
 
G&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplaceG&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplace
 
Professional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival HighProfessional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival High
 
Feb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perrettaFeb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perretta
 
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance LawsAvoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
 
Hr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jllHr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jll
 
Whitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOsWhitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOs
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Understanding employee privacy

  • 1. Understanding Privacy in the Workplace Presented by Brittany Cullison, PHR December 1, 2011
  • 2. Important Notice • I am not an attorney. • This is not a substitute for experienced legal counsel. • This is not legal advice.
  • 3. What to expect • Laws that govern privacy in the workplace • What employers can monitor-- and the right way to do it • Employer’s obligations to protect employee’s private information—and best practice guidelines
  • 4. What governs privacy in the workplace? • Fourth Amendment – Not applicable for private employees, but offers protection in some cases for public employees • Electronic Communications Privacy Act – Governs the monitoring and recording of employee electronic communications
  • 5. What governs privacy in the workplace? • FCRA and FACTA – Promotes confidentiality, accuracy, relevancy, and proper use of that information • EPPA – Prevents use of lie detectors in employment practices
  • 6. What governs privacy in the workplace? • ADA and FMLA – Recordkeeping and confidentiality of employee medical information • HIPAA – Privacy of personally identifiable health information • GINA – Restricts employers from acquiring and disclosing employee genetic information
  • 7. What governs privacy in the workplace? • Identity theft laws – Federal and state level • Common Law • Contractual Privacy Claims
  • 8. Employer Rights • Electronic Monitoring – Computers – Emails – Internet Usage- Social Media – Telephone • Video Surveillance • Workplace Searches
  • 9. Electronic Monitoring: Computers • Company issued computers – Employers can monitor – Should have clear policy that dissolves any expectation of privacy • “Personal” files, password protected documents • Personal Computer used for Work – May be subject to discovery in litigation, but typically only if subpoenaed
  • 10. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 11. Electronic Monitoring: Emails • Stored Communications Act – Established in 1986 – Title II of the ECPA – Prohibits unauthorized access to electronic communications stored on a third party site
  • 12. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 13. Electronic Monitoring: Internet • Internet usage on company device – Employers can monitor – Should have a written policy • Social Networking – Public vs. private – Use caution when disciplining an employee for disparaging comments found – Section 7 of NLRA- applies to union and non- union
  • 14. Electronic Monitoring: Internet • Social Networking – If someone has access, they can share access – Should have a written Social Media policy
  • 15. Electronic Monitoring: Telephones • Business telephones – May be monitored when: • employee has given consent or • “Business Extension” exemption – Personal calls on business phones cannot be monitored • Company issued cell phones – Should have a policy that dissolves expectation of privacy – Searches, reviews, and monitoring should be done only for legitimate, business purposes
  • 16. Video Surveillance • Acceptable in open and public work areas • If recording audio, must comply with ECPA • Limit access to the recorded material to designated management
  • 17. Workplace Searches • Reasonable expectation of privacy – Company property vs. Employee Property – Written policy • Justified Search – Reasonable suspicion – Violation of another company policy • Drug and Alcohol Policy • Weapons in the Workplace • Confidentiality
  • 18. Workplace Searches • Reasonableness – Discretion – Other investigatory methods exhausted – Appropriate scope • Never force an employee to submit to search • Have another witness present during a search
  • 19. Employer Responsibilities • Identify Theft Prevention – Policy, Procedure and Training • Confidentiality of Medical Information • Additional confidentiality and recordkeeping practices • Clearly communicate workplace monitoring policies • Train employees and managers
  • 20. ID Theft Prevention • Evaluate information security and disposal – How easy is it for someone to access your office during business hours? – How long documents stay at the printer before some one retrieves them? – Are documents that contain personal information left out unattended? – Are computer screens being locked every time someone leaves there desk?
  • 21. ID Theft Prevention • Are cabinets and drawers being locked? • Are emails that contain personal information being sent securely? • Are documents properly shredded when no longer needed? • Who in the office has access to sensitive information?
  • 22. ID Theft Prevention • Develop a protection plan – Conduct a “walk through” – Identify potential risks – Create easy to follow guidelines and procedures • Educate your employees – The importance of protecting personal information. – Measure that the company will take to began this process. – How the will be enforced.
  • 23. ID Theft Prevention • Have a Breach Plan – Notify employee, law enforcement and possibly FTC – Notify credit bureaus – Conduct internal investigation – Take steps to minimize or prevent additional loss
  • 24. Confidentiality of Medical Information • Do not request medical exam or make inquiry unless employee poses direct threat or it’s job related and consistent with business necessity • Medical information should be kept confidential and in separate file – FMLA certifications – Worker’s Comp reports – Medical exam results – HIPAA regulated documents, if applicable
  • 25. Confidentiality of Medical Information • Train supervisors on how to respond • Educate employees on what is appropriate to disclose in the workplace
  • 26. Additional Confidential Recordkeeping • Consumer Reports – Reports must be disposed of properly under FACTA • Investigations – Confidential to protect witnesses and accuser
  • 27. Policies • Electronic Monitoring – Define system covered – Business-use only – Discuss prohibited use – Explain consequences – Inform of employers’ right to monitor • Telephone Monitoring – Define purpose of monitoring – Discuss calls that appear to be personal
  • 28. Policies • Social Media – Define what social media is – Apply it to business and personal – Compare to other policies • Workplace Searches – Define purpose and search areas – Ensure that a search is not an accusation – Refusal may lead to disciplinary action or termination
  • 29. Summary • Privacy in the workplace is a combination of employer rights and employer responsibilities • The key to monitoring employees is to dissolve the expectation of privacy • Employee information protection is in the hands of HR