SlideShare uma empresa Scribd logo
1 de 48
Social Media In the Workplace and Beyond

                      Alexander Nemiroff, Esq.
                         Jackson Lewis, LLP
                   1601 Cherry Street, Suite 1650
                     Philadelphia, Pennsylvania
                            267.319.7816
               Alexander.Nemiroff@jacksonlewis.com
What is “Social Media”?
• MySpace      • Blogs
• Facebook     • Digg, Reddit, Technorati
• Friendster   • YouTube
• LinkedIn     • Unvarnished
• Twitter      • Instant Messaging
• Skype        • Texting
Social NOTworking?
• How many working hours are lost?

  • 50% of Facebook users log on every day

      • 22% visit social networking sites 5+
        times/week

   • Only 52% of employees say they don’t
     use social networking sites during work
     hours

   • And that’s not counting time spent
     texting, instant messaging, surfing,
     making phone calls, etc. …




                 Copyright 2011 Jackson Lewis LLP
Employee Views on Social Media Use

• Survey says:

   •   53% of employees say their social networking pages
       are none of their employers’ business

   •   74% say it’s easy to damage a company’s reputation
       on social media

   •   15% say that if their employer did something that
       they didn’t agree with, they would comment about it
       online




                 Copyright 2011 Jackson Lewis LLP
What Do Employers Do?

• 40% of business executives surveyed disagree that
  what employees put on their social networking
  pages is not the employer’s business

• 30% admit to informally monitoring social
  networking sites




              Copyright 2011 Jackson Lewis LLP
Key Legal Challenges for Employers

   Negligent hiring/supervision
   Discrimination/harassment/retaliation
   Disclosure of trade secrets or proprietary
    information
   Reputational harm to employees
   Reputational harm to employers
   Privacy pitfalls
   Legal constraints on employee discipline




                Copyright 2011Jackson Lewis LLP
Would You Hire Him as a Lifeguard?




           Copyright 2011 Jackson Lewis LLP
Do You Have the Same Response?




          Copyright 2011 Jackson Lewis LLP
Risk Factor:
Negligent Hiring/Supervision/Retention

An employer may be held liable for an employee’s
wrongful acts if the employer knew or had reason to
know of the risk the employment created


  Doe v. XYC Corp., N.J. Super. 122 (2005)
  • Employee was criminally charged with child
    pornography using a workplace computer
  • Court held employer had a duty to
    investigate and respond




              Copyright 2011Jackson Lewis LLP
Risks for Employers
• Using the Web to Make Hiring Decisions
   •   Many employers and job recruiters check out potential
       employees on the Web
          Using search engines such as Google or Yahoo and
           internet sites such as
           PeopleFinders.com, Local.Live.com or Zillow.com
   •   Some studies show more than half of employers use
       some kind of screening on social networking sites




                 Copyright 2011 Jackson Lewis LLP
Information Found on Social Networking Sites
Hiring Decisions Based Upon
          Social Networking Activity
Problem: A search may identify an applicant’s protected
characteristics such as age, race, sexual orientation,
marital status, arrests or other factors that should not
be considered in a hiring decision.

Solution: Have a non-decision maker conduct the
search and filter out protected information.
Alternatively, hire a third party to conduct the search
and filter out protected information.




                Copyright 2011 Jackson Lewis LLP
Hiring Decisions Based Upon
          Social Networking Activity
   Guidelines for Employers on Internet Search of Applicants

If you are going to do these searches:

  Do them consistently; towards the end of the hiring
   process

  Screen out protected information

  Verify information

  Document the search; and

  Determine how relevant the information is to the
   job
                 Copyright 2011 Jackson Lewis LLP
Risk Factor: Discrimination, Harassment -
Employee Use of Social Media
• Electronic communications offer opportunities for
  misuse
• Can be used as evidence to support a harassment or
  discrimination claim

   Blakely v. Continental Airlines, Inc., 164 N.J. 38
   (2000)
   • Alleged harassment via “Crew Member Forum”
   • Company has duty to take effective measure to
     stop the conduct once it knew or should have
     known harassment was taking place
“Sexting” Concerns




        20% of teens and 33% of young
         adults electronically sent nude
         photographs of themselves
        39% of teens and 59% of young
         adults sent sexually explicit text
         messages

       Source: National Campaign to Prevent Teen
       and Unplanned Pregnancy, 2008 Survey




              Copyright 2011 Jackson Lewis LLP
Risk Factor: Reputational Harm to Employees

  Defamation - plaintiff must prove defendant
   published a false statement about plaintiff that
   tends to harm plaintiff’s reputation
  Employer can be liable if the employee had
   apparent authority to speak on its behalf –
   Beware of personal references!!




              Copyright 2011Jackson Lewis LLP
Risk Factor: Reputational Harm to Employers


  Employees posting videos and photographs
  damaging to company’s image


  Former employee slamming company’s system
  with disparaging e-mails



  Former employees “cyber-smearing” employer




             Copyright 2011Jackson Lewis LLP
Is this the Image You Want for Your Company?




              Copyright 2011 Jackson Lewis LLP
How about this one?




           Copyright 2011 Jackson Lewis LLP
Not Laughing Now




            Copyright 2011 Jackson Lewis LLP
Risk Factor: Employee Discipline

 National Labor Relations Act
          oEmployees who IM or blog
           about their working conditions
           or employers may be protected
           under the NLRA
   o Employees have a right to engage in
     "concerted activity“ for the purpose of
     collective bargaining or other mutual
     aid or protection
   o Applies to both union and non-union
     employees
           Copyright 2011Jackson Lewis LLP
Legal Constraints on Disciplining Employees for Online
Activity

Unlawful Restrictions:

          Statement that prohibits the sharing of information
          concerning other employees, such as wages, hours and
          terms and conditions of employment.

Lawful Restrictions:

      o   Prohibition on disclosing confidential company business
          information and documents; Prohibition on disclosing
          “confidential” employee information;

      o   Prohibition of conduct which is or has the effect of being
          injurious, offensive, threatening, intimidating, coercing, or
          interfering with the Company’s employees.

                                                                22
                   Copyright 2011 Jackson Lewis LLP
Legal Constraints on Employee Discipline:
NLRA
 What is protected activity:

 • Kiewitt Power Constructors Co., 355 NLRB No. 150
   (8/27/10)
   Held two employees complained to their supervisor regarding
   the location of where they were required to take their breaks
   and then told the supervisor the situation could “get ugly” and
   supervisor had “better bring [his] boxing gloves” engaged in
   protected concerted activity under the Act because the
   statements were spontaneous and not outright threats.
 • Plaza Auto Center, Inc. 355 NLRB No. 85 (8/16/10)

    Held that a salesperson who shouted at his employer’s owner
    that he was a “f…ing crook” and an “a..hole” during a meeting
    with management to discuss pay and commissions, among
    other things, was engaged in protected concerted activity at
    the meeting and that his outburst was not so egregious so as
    to lose the protection under the Act.

                                                                     23
                    Copyright 2011 Jackson Lewis LLP
Other Outlets for the Disgruntled Employee


   www.jobvent.com
   www.hateboss.com
   www.workrant.com
   www.fthisjob.com
   www.rantasaurus-rex.com




            Copyright 2011 Jackson Lewis LLP
Risk Factor: Employee Discipline

 Expression of political opinions (e.g. New Jersey)
 Legal off-duty activities (e.g.
  California, Colorado, Connecticut, New York)
 Wrongful termination in violation of public policy
  (arrests, convictions, bankruptcy, workers’
  compensation history)
 Whistleblowing (SOX, Wage & Hour)




              Copyright 2011Jackson Lewis LLP
Risk Factor: Federal Wiretap Act

 Prohibits “interception” of electronic
  communications
 Most courts hold that acquisition of electronic
  communications must occur
  contemporaneously with transmission
 Is monitoring of Instant Messages
  “interception”?




              Copyright 2011Jackson Lewis LLP
Risk Factor:
Federal Stored Communications Act
Prevents employers from using illicit or coercive means to
access employees’ private electronic communications
Pietrylo v. Hillstone Rest. Group, 29 I.E.R. Cases 1438 (D.N.J.
2009)
Jury verdict for employees under the Stored Communications
Act, 18 U.S.C. 2701(a)(1), affirmed by federal court where
managers accessed employee’s blog.
Employees of Houston’s restaurant maintained an invitation-only
chat room (the “Spec-Tater”) on MySpace for fellow employees to
“vent” about their work experiences. It became populated with
complaints about the restaurant, customers, and supervisors.
One employee told supervisors about the site and they asked for
her password.




                Copyright 2011Jackson Lewis LLP
Pure PowerBootCamp v. WarriorFitnessBootCamp
LLC (2nd Cir., 2011)

 Accessing Personal E-mails Can Violate Federal Stored
  Communications Act Even With No Actual Damages
 Two employees left to start competing fitness facility.
 Pure Power learned through 546 e-mails from four
  personal accounts belonging to the former employees (e.g.
  Hotmail) that former employees had taken customer lists,
  training and instruction materials, and solicited customers.
   How? The former employees had stored their usernames
    and passwords on company’s computers.
 Employees countersued under SCA -- $1,000 per count




                 Copyright 2011 Jackson Lewis LLP
Employee Monitoring and Privacy Issues

• Key question: Did the employee have a
  reasonable expectation of privacy in the electronic
  communication?

• Ensure monitoring is:
   • based on legitimate needs, and
   • limited in scope to achieve those needs




              Copyright 2011Jackson Lewis LLP
It’s Amazing What Folks Put on the Internet
for Everyone to See




            Copyright 2011 Jackson Lewis LLP
It’s Amazing What Folks Put on the Internet
for Everyone to See




            Copyright 2011 Jackson Lewis LLP
WHAT??




         Copyright 2011 Jackson Lewis LLP
Employee Monitoring and Privacy Issues

 Courts are more likely to rule for the employer if:
  o Employer owns the computer and e-mail system
  o Employee voluntarily uses an employer’s
    network
  o Employee has consented to be monitored
    (usually based in written personnel policy)




              Copyright 2011Jackson Lewis LLP
Employee Monitoring and Privacy Issues

 Currently unclear if an employee has a reasonable
  expectation of privacy in blogs or IMs

 Courts have split on whether there is a reasonable
  expectation of privacy in content maintained on
  third-party servers (e.g., web-based e-mail
  accounts)




              Copyright 2011Jackson Lewis LLP
Is There a Right to Privacy in Email, Texts, and
       Communications on Employer Systems?
• In a unanimous decision, the U.S. Supreme Court held that
  the City of Ontario’s review of transcripts of an employee’s
  text messages sent and received on a City-issued pager
  was a reasonable search under the Fourth
  Amendment. City of Ontario, Calif. v. Jeff Quon, et al., No.
  08-1332 (June 17, 2010).
• The Court disposed of the case on narrow grounds,
  preferring to avoid the risks of establishing "far-reaching
  premises" before the role of technology in society and its
  Fourth Amendment implications becomes clear.”
• Nevertheless, the Supreme Court outlined principles
  instructive to all employers that allow employees to use
  electronic communications devices, including cell phones,
  i-Phones, and Blackberries.
                 Copyright 2011 Jackson Lewis LLP
Policy Guidance from Quon
All employers must be prepared with comprehensive
computer and electronic equipment usage
policies. The Court noted that these policies will help
shape an employee’s expectation of privacy. Further,
it is critical that practices and policies be consistent,
reflect current technologies, and be clearly
communicated.


Employers also should consider requiring employees
to acknowledge in writing that they received and
reviewed these and similar policies and procedures,
particularly as new technologies are introduced.

              Copyright 2011 Jackson Lewis LLP
Methods to Minimize Risk
•       Develop a written policy regarding access by HR
        and hiring managers to applicant and employee
        social networking sites

•       Train HR and IT personnel responsible for
        monitoring and using electronic information on:
    •      Avoiding improper access
    •      Screening out information that cannot be lawfully
           considered in hiring and disciplinary decisions




                  Copyright 2011 Jackson Lewis LLP
Methods to Minimize Risk
•   Prohibit access to private password social
    networking sites without proper authorization
•   Do not allow any third party to “friend” an
    applicant to gain access to the applicant’s site
•   Ensure employment decisions are made based on
    lawful, verified information




               Copyright 2011 Jackson Lewis LLP
Methods to Minimize Risk

• Consider restriction on professional references via
  LinkedIn

• Consider blocking or limiting employee access to
  social networking sites through company
  computers




               Copyright 2011 Jackson Lewis LLP
Drafting an Effective E-Mail
  and Internet Use Policy
Key Elements of Electronic Communications Policies


 Consider company philosophy and business

 No expectation of privacy when using company
  equipment

 Employees must abide by non-disclosure and
  confidentiality policies and agreements




              Copyright 2011Jackson Lewis LLP
Key Elements of Electronic Communications Policies

 Only individuals officially designated may speak on
  behalf of the Company
 “Bloggers Beware” - Require a disclaimer:



            “The views expressed in this
            blog are my personal views and
            opinions and do not necessarily
            represent the views or opinions
            of my employer.”




              Copyright 2011Jackson Lewis LLP
Key Elements of Electronic Communications Policies

 Company policies governing corporate
  logos, branding, and identity apply to all
  electronic communications
 Employees may not make defamatory comments
  when discussing the employer, co-
  workers, products, services and/or competitors
 Based on the FTC’s endorsement
  guidelines, require employees to obtain prior
  approval before referring to company products
  and services and to disclose the nature of the
  employment relationship



              Copyright 2011Jackson Lewis LLP
Key Elements of Electronic Communications Policies

• Do not prohibit employees from discussing terms
  and conditions of employment

• If allowed at work, time spent social networking,
  blogging or texting should not interfere with job
  duties



• Remind employees expected to comport
  themselves professionally both on and off duty




              Copyright 2011 Jackson Lewis LLP
Terms of an Effective E-Mail and Internet Use Policy

• Employer should REVIEW AND REVISE policies regularly

   –   Need to put date on each revision
• Employer should ACTUALLY
  MONITOR use of the system and
  devices to maintain and protect
  policy’s integrity
   – Guard against violations and
       inconsistent use


                Copyright 2011 Jackson Lewis LLP         46
Employer Overreaching

• The Town of Bozeman, Montana, required job
  applicants to provide passwords to email (Google,
  Yahoo!) and social networking sites (MySpace,
  Facebook) accounts.


• 98% of people polled believed this policy to be an
  invasion of privacy


• On June 22, 2009, the town rescinded the policy


                Copyright 2011 Jackson Lewis LLP
48
Copyright 2011 Jackson Lewis LLP

Mais conteúdo relacionado

Mais procurados

Social Media
Social MediaSocial Media
Social Mediaclggibson
 
Managing employee online behavior presentation 111715
Managing employee online behavior presentation 111715Managing employee online behavior presentation 111715
Managing employee online behavior presentation 111715Ohio Restaurant Association
 
Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette caseMichael Perez
 
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Ohio Restaurant Association
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsCEL Public Relations
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineAllen Matkins
 
10 tedesco karia social media - tedesco law group - wscff april 2014
10 tedesco karia   social media - tedesco law group - wscff april 201410 tedesco karia   social media - tedesco law group - wscff april 2014
10 tedesco karia social media - tedesco law group - wscff april 2014shibrah76
 
Human Resources On Facebook Mse
Human Resources On Facebook MseHuman Resources On Facebook Mse
Human Resources On Facebook MseMelanie Echavarria
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesDan Michaluk
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water coolerwychepa
 
Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014Charles Krugel
 
Employee complaints on facebook and social media policies
Employee complaints on facebook and social media policiesEmployee complaints on facebook and social media policies
Employee complaints on facebook and social media policiesddubberly
 
5 Things to Do Before You Start A New Job
5 Things to Do Before You Start A New Job5 Things to Do Before You Start A New Job
5 Things to Do Before You Start A New JobCharles H. Martin
 
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards   amo conference 2011 draft 5Social media risks and rewards   amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5Dan Michaluk
 
2012 01 24 Report of the Acting General Counsel concerning social media cases
2012 01 24 Report of the Acting General Counsel concerning social media cases2012 01 24 Report of the Acting General Counsel concerning social media cases
2012 01 24 Report of the Acting General Counsel concerning social media casesKrishna De
 

Mais procurados (20)

Social Media
Social MediaSocial Media
Social Media
 
Managing employee online behavior presentation 111715
Managing employee online behavior presentation 111715Managing employee online behavior presentation 111715
Managing employee online behavior presentation 111715
 
Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette case
 
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR Implications
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
 
10 tedesco karia social media - tedesco law group - wscff april 2014
10 tedesco karia   social media - tedesco law group - wscff april 201410 tedesco karia   social media - tedesco law group - wscff april 2014
10 tedesco karia social media - tedesco law group - wscff april 2014
 
Human Resources On Facebook Mse
Human Resources On Facebook MseHuman Resources On Facebook Mse
Human Resources On Facebook Mse
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water cooler
 
Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
Employee complaints on facebook and social media policies
Employee complaints on facebook and social media policiesEmployee complaints on facebook and social media policies
Employee complaints on facebook and social media policies
 
5 Things to Do Before You Start A New Job
5 Things to Do Before You Start A New Job5 Things to Do Before You Start A New Job
5 Things to Do Before You Start A New Job
 
Converging ethics, governance, and culture
Converging ethics, governance, and cultureConverging ethics, governance, and culture
Converging ethics, governance, and culture
 
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards   amo conference 2011 draft 5Social media risks and rewards   amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5
 
2012 01 24 Report of the Acting General Counsel concerning social media cases
2012 01 24 Report of the Acting General Counsel concerning social media cases2012 01 24 Report of the Acting General Counsel concerning social media cases
2012 01 24 Report of the Acting General Counsel concerning social media cases
 

Semelhante a Social media, staff policy and law legal

Sustainable Work Practices: Keeping the Staff Afloat
Sustainable Work Practices: Keeping the Staff AfloatSustainable Work Practices: Keeping the Staff Afloat
Sustainable Work Practices: Keeping the Staff AfloatJames Leventhal
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesThomas Benjamin Huggett
 
Social Media for Employers: Tips and Guidance
Social Media for Employers:  Tips and GuidanceSocial Media for Employers:  Tips and Guidance
Social Media for Employers: Tips and GuidanceDavid Kight
 
The Double Edged Sword of the Social Network
The Double Edged Sword of the Social NetworkThe Double Edged Sword of the Social Network
The Double Edged Sword of the Social NetworkCarol Spencer
 
2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social NetworkCarol Spencer
 
Social media
Social mediaSocial media
Social mediaSheila A
 
O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...
O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...
O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...Gordon Schmidt
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media PolicyMRDC1230
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media PolicyMRDC1230
 
Social media background checks policy development
Social media background checks policy developmentSocial media background checks policy development
Social media background checks policy developmentMike McCarty
 
AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014Jacinta Buchbach
 
Social Media: What's Not to Like About Social Media in the Workplace?
 Social Media: What's Not to Like About Social Media in the Workplace? Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?Parsons Behle & Latimer
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace AlphaStaff
 
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"Employers Association of New Jersey
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate ItJanine Anthony Bowen, Esq.
 
Social Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small FirmsSocial Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small FirmsInternet Law Center
 
Employment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceEmployment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceThe Organic Agency
 
Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Werkshop Marketing
 

Semelhante a Social media, staff policy and law legal (20)

Sustainable Work Practices: Keeping the Staff Afloat
Sustainable Work Practices: Keeping the Staff AfloatSustainable Work Practices: Keeping the Staff Afloat
Sustainable Work Practices: Keeping the Staff Afloat
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer Responses
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Social Media for Employers: Tips and Guidance
Social Media for Employers:  Tips and GuidanceSocial Media for Employers:  Tips and Guidance
Social Media for Employers: Tips and Guidance
 
The Double Edged Sword of the Social Network
The Double Edged Sword of the Social NetworkThe Double Edged Sword of the Social Network
The Double Edged Sword of the Social Network
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 
2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network
 
Social media
Social mediaSocial media
Social media
 
O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...
O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...
O'Connor & Schmidt (2014 OBTC) "Facebook Fired:" Educating Students About the...
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media Policy
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media Policy
 
Social media background checks policy development
Social media background checks policy developmentSocial media background checks policy development
Social media background checks policy development
 
AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014
 
Social Media: What's Not to Like About Social Media in the Workplace?
 Social Media: What's Not to Like About Social Media in the Workplace? Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace
 
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
 
Social Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small FirmsSocial Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small Firms
 
Employment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceEmployment Law - Social Media in the Workplace
Employment Law - Social Media in the Workplace
 
Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?
 

Mais de Adam Lewis

Stories from front line of Content Marketing
Stories from front line of Content MarketingStories from front line of Content Marketing
Stories from front line of Content MarketingAdam Lewis
 
What works in B2B technology content
What works in B2B technology contentWhat works in B2B technology content
What works in B2B technology contentAdam Lewis
 
How to use social media to recruit more overseas students
How to use social media to recruit more overseas studentsHow to use social media to recruit more overseas students
How to use social media to recruit more overseas studentsAdam Lewis
 
Digital Evolution in B2B marketing
Digital Evolution in B2B marketingDigital Evolution in B2B marketing
Digital Evolution in B2B marketingAdam Lewis
 
Burson Marsteller Crisis Preparedness 2011
Burson Marsteller Crisis Preparedness 2011Burson Marsteller Crisis Preparedness 2011
Burson Marsteller Crisis Preparedness 2011Adam Lewis
 
Social media-crisis-comms-decision-tree
Social media-crisis-comms-decision-treeSocial media-crisis-comms-decision-tree
Social media-crisis-comms-decision-treeAdam Lewis
 
What marketers say about working online: Mckinsey Quarterly Global survey
What marketers say about working online: Mckinsey Quarterly Global surveyWhat marketers say about working online: Mckinsey Quarterly Global survey
What marketers say about working online: Mckinsey Quarterly Global surveyAdam Lewis
 
Value of a facbook fan (Syncapse))
Value of a facbook fan (Syncapse))Value of a facbook fan (Syncapse))
Value of a facbook fan (Syncapse))Adam Lewis
 
Edelman on social business
Edelman on social businessEdelman on social business
Edelman on social businessAdam Lewis
 
Ibm social business jam report
Ibm social business jam reportIbm social business jam report
Ibm social business jam reportAdam Lewis
 
Ernst and Young pdf on social media
Ernst and Young pdf on social mediaErnst and Young pdf on social media
Ernst and Young pdf on social mediaAdam Lewis
 
Booz & co campaigns to capabilities-social-media-and-marketing-2011
Booz & co campaigns to capabilities-social-media-and-marketing-2011Booz & co campaigns to capabilities-social-media-and-marketing-2011
Booz & co campaigns to capabilities-social-media-and-marketing-2011Adam Lewis
 
Bain brief putting social media to work
Bain brief putting social media to workBain brief putting social media to work
Bain brief putting social media to workAdam Lewis
 
Altimeter social business readiness survey aug 2011
Altimeter social business readiness survey aug 2011Altimeter social business readiness survey aug 2011
Altimeter social business readiness survey aug 2011Adam Lewis
 
Weber shandwick nov 2011
Weber shandwick nov 2011Weber shandwick nov 2011
Weber shandwick nov 2011Adam Lewis
 

Mais de Adam Lewis (15)

Stories from front line of Content Marketing
Stories from front line of Content MarketingStories from front line of Content Marketing
Stories from front line of Content Marketing
 
What works in B2B technology content
What works in B2B technology contentWhat works in B2B technology content
What works in B2B technology content
 
How to use social media to recruit more overseas students
How to use social media to recruit more overseas studentsHow to use social media to recruit more overseas students
How to use social media to recruit more overseas students
 
Digital Evolution in B2B marketing
Digital Evolution in B2B marketingDigital Evolution in B2B marketing
Digital Evolution in B2B marketing
 
Burson Marsteller Crisis Preparedness 2011
Burson Marsteller Crisis Preparedness 2011Burson Marsteller Crisis Preparedness 2011
Burson Marsteller Crisis Preparedness 2011
 
Social media-crisis-comms-decision-tree
Social media-crisis-comms-decision-treeSocial media-crisis-comms-decision-tree
Social media-crisis-comms-decision-tree
 
What marketers say about working online: Mckinsey Quarterly Global survey
What marketers say about working online: Mckinsey Quarterly Global surveyWhat marketers say about working online: Mckinsey Quarterly Global survey
What marketers say about working online: Mckinsey Quarterly Global survey
 
Value of a facbook fan (Syncapse))
Value of a facbook fan (Syncapse))Value of a facbook fan (Syncapse))
Value of a facbook fan (Syncapse))
 
Edelman on social business
Edelman on social businessEdelman on social business
Edelman on social business
 
Ibm social business jam report
Ibm social business jam reportIbm social business jam report
Ibm social business jam report
 
Ernst and Young pdf on social media
Ernst and Young pdf on social mediaErnst and Young pdf on social media
Ernst and Young pdf on social media
 
Booz & co campaigns to capabilities-social-media-and-marketing-2011
Booz & co campaigns to capabilities-social-media-and-marketing-2011Booz & co campaigns to capabilities-social-media-and-marketing-2011
Booz & co campaigns to capabilities-social-media-and-marketing-2011
 
Bain brief putting social media to work
Bain brief putting social media to workBain brief putting social media to work
Bain brief putting social media to work
 
Altimeter social business readiness survey aug 2011
Altimeter social business readiness survey aug 2011Altimeter social business readiness survey aug 2011
Altimeter social business readiness survey aug 2011
 
Weber shandwick nov 2011
Weber shandwick nov 2011Weber shandwick nov 2011
Weber shandwick nov 2011
 

Último

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 

Último (20)

Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 

Social media, staff policy and law legal

  • 1. Social Media In the Workplace and Beyond Alexander Nemiroff, Esq. Jackson Lewis, LLP 1601 Cherry Street, Suite 1650 Philadelphia, Pennsylvania 267.319.7816 Alexander.Nemiroff@jacksonlewis.com
  • 2. What is “Social Media”? • MySpace • Blogs • Facebook • Digg, Reddit, Technorati • Friendster • YouTube • LinkedIn • Unvarnished • Twitter • Instant Messaging • Skype • Texting
  • 3. Social NOTworking? • How many working hours are lost? • 50% of Facebook users log on every day • 22% visit social networking sites 5+ times/week • Only 52% of employees say they don’t use social networking sites during work hours • And that’s not counting time spent texting, instant messaging, surfing, making phone calls, etc. … Copyright 2011 Jackson Lewis LLP
  • 4. Employee Views on Social Media Use • Survey says: • 53% of employees say their social networking pages are none of their employers’ business • 74% say it’s easy to damage a company’s reputation on social media • 15% say that if their employer did something that they didn’t agree with, they would comment about it online Copyright 2011 Jackson Lewis LLP
  • 5. What Do Employers Do? • 40% of business executives surveyed disagree that what employees put on their social networking pages is not the employer’s business • 30% admit to informally monitoring social networking sites Copyright 2011 Jackson Lewis LLP
  • 6. Key Legal Challenges for Employers  Negligent hiring/supervision  Discrimination/harassment/retaliation  Disclosure of trade secrets or proprietary information  Reputational harm to employees  Reputational harm to employers  Privacy pitfalls  Legal constraints on employee discipline Copyright 2011Jackson Lewis LLP
  • 7. Would You Hire Him as a Lifeguard? Copyright 2011 Jackson Lewis LLP
  • 8. Do You Have the Same Response? Copyright 2011 Jackson Lewis LLP
  • 9. Risk Factor: Negligent Hiring/Supervision/Retention An employer may be held liable for an employee’s wrongful acts if the employer knew or had reason to know of the risk the employment created Doe v. XYC Corp., N.J. Super. 122 (2005) • Employee was criminally charged with child pornography using a workplace computer • Court held employer had a duty to investigate and respond Copyright 2011Jackson Lewis LLP
  • 10. Risks for Employers • Using the Web to Make Hiring Decisions • Many employers and job recruiters check out potential employees on the Web  Using search engines such as Google or Yahoo and internet sites such as PeopleFinders.com, Local.Live.com or Zillow.com • Some studies show more than half of employers use some kind of screening on social networking sites Copyright 2011 Jackson Lewis LLP
  • 11. Information Found on Social Networking Sites
  • 12. Hiring Decisions Based Upon Social Networking Activity Problem: A search may identify an applicant’s protected characteristics such as age, race, sexual orientation, marital status, arrests or other factors that should not be considered in a hiring decision. Solution: Have a non-decision maker conduct the search and filter out protected information. Alternatively, hire a third party to conduct the search and filter out protected information. Copyright 2011 Jackson Lewis LLP
  • 13. Hiring Decisions Based Upon Social Networking Activity Guidelines for Employers on Internet Search of Applicants If you are going to do these searches:  Do them consistently; towards the end of the hiring process  Screen out protected information  Verify information  Document the search; and  Determine how relevant the information is to the job Copyright 2011 Jackson Lewis LLP
  • 14. Risk Factor: Discrimination, Harassment - Employee Use of Social Media • Electronic communications offer opportunities for misuse • Can be used as evidence to support a harassment or discrimination claim Blakely v. Continental Airlines, Inc., 164 N.J. 38 (2000) • Alleged harassment via “Crew Member Forum” • Company has duty to take effective measure to stop the conduct once it knew or should have known harassment was taking place
  • 15. “Sexting” Concerns  20% of teens and 33% of young adults electronically sent nude photographs of themselves  39% of teens and 59% of young adults sent sexually explicit text messages Source: National Campaign to Prevent Teen and Unplanned Pregnancy, 2008 Survey Copyright 2011 Jackson Lewis LLP
  • 16. Risk Factor: Reputational Harm to Employees  Defamation - plaintiff must prove defendant published a false statement about plaintiff that tends to harm plaintiff’s reputation  Employer can be liable if the employee had apparent authority to speak on its behalf – Beware of personal references!! Copyright 2011Jackson Lewis LLP
  • 17. Risk Factor: Reputational Harm to Employers Employees posting videos and photographs damaging to company’s image Former employee slamming company’s system with disparaging e-mails Former employees “cyber-smearing” employer Copyright 2011Jackson Lewis LLP
  • 18. Is this the Image You Want for Your Company? Copyright 2011 Jackson Lewis LLP
  • 19. How about this one? Copyright 2011 Jackson Lewis LLP
  • 20. Not Laughing Now Copyright 2011 Jackson Lewis LLP
  • 21. Risk Factor: Employee Discipline  National Labor Relations Act oEmployees who IM or blog about their working conditions or employers may be protected under the NLRA o Employees have a right to engage in "concerted activity“ for the purpose of collective bargaining or other mutual aid or protection o Applies to both union and non-union employees Copyright 2011Jackson Lewis LLP
  • 22. Legal Constraints on Disciplining Employees for Online Activity Unlawful Restrictions: Statement that prohibits the sharing of information concerning other employees, such as wages, hours and terms and conditions of employment. Lawful Restrictions: o Prohibition on disclosing confidential company business information and documents; Prohibition on disclosing “confidential” employee information; o Prohibition of conduct which is or has the effect of being injurious, offensive, threatening, intimidating, coercing, or interfering with the Company’s employees. 22 Copyright 2011 Jackson Lewis LLP
  • 23. Legal Constraints on Employee Discipline: NLRA What is protected activity: • Kiewitt Power Constructors Co., 355 NLRB No. 150 (8/27/10) Held two employees complained to their supervisor regarding the location of where they were required to take their breaks and then told the supervisor the situation could “get ugly” and supervisor had “better bring [his] boxing gloves” engaged in protected concerted activity under the Act because the statements were spontaneous and not outright threats. • Plaza Auto Center, Inc. 355 NLRB No. 85 (8/16/10) Held that a salesperson who shouted at his employer’s owner that he was a “f…ing crook” and an “a..hole” during a meeting with management to discuss pay and commissions, among other things, was engaged in protected concerted activity at the meeting and that his outburst was not so egregious so as to lose the protection under the Act. 23 Copyright 2011 Jackson Lewis LLP
  • 24. Other Outlets for the Disgruntled Employee www.jobvent.com www.hateboss.com www.workrant.com www.fthisjob.com www.rantasaurus-rex.com Copyright 2011 Jackson Lewis LLP
  • 25. Risk Factor: Employee Discipline  Expression of political opinions (e.g. New Jersey)  Legal off-duty activities (e.g. California, Colorado, Connecticut, New York)  Wrongful termination in violation of public policy (arrests, convictions, bankruptcy, workers’ compensation history)  Whistleblowing (SOX, Wage & Hour) Copyright 2011Jackson Lewis LLP
  • 26. Risk Factor: Federal Wiretap Act  Prohibits “interception” of electronic communications  Most courts hold that acquisition of electronic communications must occur contemporaneously with transmission  Is monitoring of Instant Messages “interception”? Copyright 2011Jackson Lewis LLP
  • 27. Risk Factor: Federal Stored Communications Act Prevents employers from using illicit or coercive means to access employees’ private electronic communications Pietrylo v. Hillstone Rest. Group, 29 I.E.R. Cases 1438 (D.N.J. 2009) Jury verdict for employees under the Stored Communications Act, 18 U.S.C. 2701(a)(1), affirmed by federal court where managers accessed employee’s blog. Employees of Houston’s restaurant maintained an invitation-only chat room (the “Spec-Tater”) on MySpace for fellow employees to “vent” about their work experiences. It became populated with complaints about the restaurant, customers, and supervisors. One employee told supervisors about the site and they asked for her password. Copyright 2011Jackson Lewis LLP
  • 28. Pure PowerBootCamp v. WarriorFitnessBootCamp LLC (2nd Cir., 2011)  Accessing Personal E-mails Can Violate Federal Stored Communications Act Even With No Actual Damages  Two employees left to start competing fitness facility.  Pure Power learned through 546 e-mails from four personal accounts belonging to the former employees (e.g. Hotmail) that former employees had taken customer lists, training and instruction materials, and solicited customers.  How? The former employees had stored their usernames and passwords on company’s computers.  Employees countersued under SCA -- $1,000 per count Copyright 2011 Jackson Lewis LLP
  • 29. Employee Monitoring and Privacy Issues • Key question: Did the employee have a reasonable expectation of privacy in the electronic communication? • Ensure monitoring is: • based on legitimate needs, and • limited in scope to achieve those needs Copyright 2011Jackson Lewis LLP
  • 30. It’s Amazing What Folks Put on the Internet for Everyone to See Copyright 2011 Jackson Lewis LLP
  • 31. It’s Amazing What Folks Put on the Internet for Everyone to See Copyright 2011 Jackson Lewis LLP
  • 32. WHAT?? Copyright 2011 Jackson Lewis LLP
  • 33. Employee Monitoring and Privacy Issues  Courts are more likely to rule for the employer if: o Employer owns the computer and e-mail system o Employee voluntarily uses an employer’s network o Employee has consented to be monitored (usually based in written personnel policy) Copyright 2011Jackson Lewis LLP
  • 34. Employee Monitoring and Privacy Issues  Currently unclear if an employee has a reasonable expectation of privacy in blogs or IMs  Courts have split on whether there is a reasonable expectation of privacy in content maintained on third-party servers (e.g., web-based e-mail accounts) Copyright 2011Jackson Lewis LLP
  • 35. Is There a Right to Privacy in Email, Texts, and Communications on Employer Systems? • In a unanimous decision, the U.S. Supreme Court held that the City of Ontario’s review of transcripts of an employee’s text messages sent and received on a City-issued pager was a reasonable search under the Fourth Amendment. City of Ontario, Calif. v. Jeff Quon, et al., No. 08-1332 (June 17, 2010). • The Court disposed of the case on narrow grounds, preferring to avoid the risks of establishing "far-reaching premises" before the role of technology in society and its Fourth Amendment implications becomes clear.” • Nevertheless, the Supreme Court outlined principles instructive to all employers that allow employees to use electronic communications devices, including cell phones, i-Phones, and Blackberries. Copyright 2011 Jackson Lewis LLP
  • 36. Policy Guidance from Quon All employers must be prepared with comprehensive computer and electronic equipment usage policies. The Court noted that these policies will help shape an employee’s expectation of privacy. Further, it is critical that practices and policies be consistent, reflect current technologies, and be clearly communicated. Employers also should consider requiring employees to acknowledge in writing that they received and reviewed these and similar policies and procedures, particularly as new technologies are introduced. Copyright 2011 Jackson Lewis LLP
  • 37. Methods to Minimize Risk • Develop a written policy regarding access by HR and hiring managers to applicant and employee social networking sites • Train HR and IT personnel responsible for monitoring and using electronic information on: • Avoiding improper access • Screening out information that cannot be lawfully considered in hiring and disciplinary decisions Copyright 2011 Jackson Lewis LLP
  • 38. Methods to Minimize Risk • Prohibit access to private password social networking sites without proper authorization • Do not allow any third party to “friend” an applicant to gain access to the applicant’s site • Ensure employment decisions are made based on lawful, verified information Copyright 2011 Jackson Lewis LLP
  • 39. Methods to Minimize Risk • Consider restriction on professional references via LinkedIn • Consider blocking or limiting employee access to social networking sites through company computers Copyright 2011 Jackson Lewis LLP
  • 40.
  • 41. Drafting an Effective E-Mail and Internet Use Policy
  • 42. Key Elements of Electronic Communications Policies  Consider company philosophy and business  No expectation of privacy when using company equipment  Employees must abide by non-disclosure and confidentiality policies and agreements Copyright 2011Jackson Lewis LLP
  • 43. Key Elements of Electronic Communications Policies  Only individuals officially designated may speak on behalf of the Company  “Bloggers Beware” - Require a disclaimer: “The views expressed in this blog are my personal views and opinions and do not necessarily represent the views or opinions of my employer.” Copyright 2011Jackson Lewis LLP
  • 44. Key Elements of Electronic Communications Policies  Company policies governing corporate logos, branding, and identity apply to all electronic communications  Employees may not make defamatory comments when discussing the employer, co- workers, products, services and/or competitors  Based on the FTC’s endorsement guidelines, require employees to obtain prior approval before referring to company products and services and to disclose the nature of the employment relationship Copyright 2011Jackson Lewis LLP
  • 45. Key Elements of Electronic Communications Policies • Do not prohibit employees from discussing terms and conditions of employment • If allowed at work, time spent social networking, blogging or texting should not interfere with job duties • Remind employees expected to comport themselves professionally both on and off duty Copyright 2011 Jackson Lewis LLP
  • 46. Terms of an Effective E-Mail and Internet Use Policy • Employer should REVIEW AND REVISE policies regularly – Need to put date on each revision • Employer should ACTUALLY MONITOR use of the system and devices to maintain and protect policy’s integrity – Guard against violations and inconsistent use Copyright 2011 Jackson Lewis LLP 46
  • 47. Employer Overreaching • The Town of Bozeman, Montana, required job applicants to provide passwords to email (Google, Yahoo!) and social networking sites (MySpace, Facebook) accounts. • 98% of people polled believed this policy to be an invasion of privacy • On June 22, 2009, the town rescinded the policy Copyright 2011 Jackson Lewis LLP

Notas do Editor

  1. Karen
  2. The court held Jasmine retained the standing to sueThe court analogizes to a victim of an automobile accident who does not need to keep her damaged vehicle until trial to recover for the damages caused by a negligent driver
  3. The Court avoided deciding whether public employees have a reasonable expectation of privacy in text messages sent on employer-owned equipment under the Fourth Amendment and what particular standard ought to apply in making that determination.  It acknowledged that rapid changes in communications and the means by which information is transmitted, as illustrated by advancements in technology and what society views as proper behavior, created significant challenges to setting legal standards for the workplace that would survive the test of time.    So, the Court assumed, without deciding, that Quon had a reasonable expectation of privacy in his text messages and the case could be decided on narrower grounds, i.e., whether the search was reasonable under well-defined Fourth Amendment standards.