SlideShare uma empresa Scribd logo
1 de 53
www.schwabe.com



Workplace Privacy Law and
   New Technologies




                  Presented by:
     Jean Ohman Back & Devon Zastrow Newman
            Schwabe, Williamson & Wyatt

          Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




                                                Agenda

• Introduction to “Cloud Computing” and
  Technologies that Employ the Cloud

• Challenges faced by Security Professionals in
  Protecting Employer Assets and Data Privacy

• Legal Sources for Employee Privacy Rights in
  the Workplace

              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




     What is “Cloud Computing”?
The delivery of computing as a service rather than
 a product, whereby shared resources, software,
  and information are provided to computers and
other devices as a utility (like the electric grid) over
          a network (typically the Internet)

Briefly: purchase of external computing power



              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




                                                                           © Wikipedia Commons, Sam Johnston 2009

         Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




What are the benefits of “Cloud Computing”?

Centralized management of IT resources
  – Increase resource utilization rates (with faster
    speeds)
  – Lower costs (renting vs. owning resources)

   Workplace IT focused on policy management



             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




What are the downsides of Cloud Computing?

• Reliability of resources out of direct control

• Need to monitor/control resource use by
  users

• Data privacy concerns
  – Workplace confidential material
  – Intellectual property protection

             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Devices that use Cloud Computing

•   Smart phones
•   Laptops
•   Tablets
•   Home computers

Generally: Internet-available devices that
 connect to workplace infrastructure
               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




What these devices also access

•   Facebook
•   Twitter
•   MySpace
•   Tumblr
•   Google+
•   LinkedIn
    – “Apps” providing direct links to Internet from device
      with confidential material stored/accessed

               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Benefits and downfalls of social media

• Benefits: new marketing opportunities,
  timeliness, reaching “younger” generation
  with marketing messages

• Downfalls: potential for IP infringement,
  defamation, claims against employer,
  increased platform for litigation hold

             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Litigation hold
• Duty to retain documents that could reasonably
  relate to an issue in litigation
   – Duty lasts through conclusion of case

• Duty triggered when a business is sued (or has a
  reasonable apprehension of being sued)

• Retention obligation applies to all “data”
  accessible by a company
   – Includes smart phones, tablets, computers
   – Can include social media platforms
              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Document retention policy

• Businesses should have a document
  retention policy
  – Example: all emails not permanently needed
    should be deleted after 30 days
  – Obligations for what to retain clearly defined


• Businesses should follow their document
  retention policy

             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Managing workplace data privacy concerns

– What does the law PERMIT employers
  to regulate?

– What does the law REQUIRE employers
  to do in order to regulate data privacy?




              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Privacy Issues & Sources of Law




          Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Employer Monitoring
Employers may generally
monitor emails sent and
received on company-
owned systems.

Can be used to enforce
data privacy
obligations/needs.

Spell out actions &
intervals in policy

Do not target employees

              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Mechanisms for protecting employer data
• Employment agreement
  – Employee contract: defines the employer’s
    rights (e.g. monitoring computer activity)

  – Confidentiality agreement: spells out actions
    required to protect employer’s confidential
    information and/or intellectual property (trade
    secrets protection by independent contractor)
     • If you will enforce legally, should be a stand-alone
       agreement and not part of an employment manual.

            Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Mechanisms for protecting employer data

• Data management policy
  – Mobile device usage policy (if you want to use
    your iPhone, you’ll have to agree to …)

  – Can further address monitoring of employee
    activity that will occur
     • Case law: existing but “stale” policy is not effective:
       employees must be aware of policy and that it is
       regularly enforced

             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Employer Monitoring

Employers with
Electronic
Communications Policy
can monitor telephone
calls on their own phone
systems
-Spell out intended
actions in the policy
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com



    Employer Monitoring
City of Ontario v. Quon
•   Alleged 4th amendment privacy
    right violation where employer
    reviewed Quon’s private text
    messages on employer-issued
    device due to coverage charges
    and punished him for sexually
    explicit content
•   U.S. Supreme Court held review
    of message was incident to
    reasonable, work-related audit,
    and employee and no right of
    privacy in text messages on
    employer-owned devices
•   Public Employee

                   Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Employer Monitoring
• Recording telephone calls allowed in
  Oregon as long as all participants in the
  call are in Oregon, and as long as one
  person consents.

• But – it is illegal to obtain or attempt to
  obtain any part of a telecommunication or
  radio communication in which the person
  recording is not a participant.
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Employer Monitoring

• Increasingly, employers use technology to
  track keystrokes, and to monitor the time
  that an employee spends on a computer.

• Employers may not obtain employee
  passwords using keystroke monitoring


             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Privacy Guidelines
• Inform employees in                                          • Consistently apply
  writing of the ways                                            any monitoring
  that you plan to                                               policies across all
  monitor them;                                                  employees;

• Have a                                                       • Justify monitoring in
  comprehensive                                                  your policies by
  electronic                                                     including the
  communication policy                                           legitimate business
                                                                 interests that supports
                                                                 monitoring activities
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




    Sources of Privacy Rights




         Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights
•   4th Amendment
•   Common Law
•   Statutory Law
•   National Labor Relations Act




               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights
4th Amendment for Public Employees
Public employees have privacy rights
under the 4th Amendment if they have a
reasonable expectation of privacy. But
there are no privacy rights to employer-
owned systems where employer has
communicated this and follows policy.


             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Common Law Privacy Rights
• Includes specific causes of action in tort law (invasion of
  privacy, intrusion upon seclusion, false light)

• Employees have a general right to privacy where there is
  a reasonable expectation of privacy.

• An employee’s right to privacy in social media is
  governed by the nature of the social media site (i.e., is it
  publicly available?).


• The employer’s workplace policies.
               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Common Law Privacy Rights
• An employee does not have a privacy right to
  information that he or she posts to a public social
  media site.

• An employee may have a privacy right to a web
  site that restricts access to certain users, or that
  is password protected.

• Employer policies can dispel right of privacy for
  employer-owned systems or devices.

              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights

   Electronic Communications
      Privacy Act (“ECPA”)

• Pertains to interception of the content of a
  communication contemporaneous with the
                communication.
• Less likely to occur in employment setting.
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights

    Stored Communications Act
             (“SCA”)

• Prohibits third parties from intentionally
  accessing electronically stored
  communications.
• Includes emails or entries on private
  websites, without proper authorization
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights

   Stored Communications Act
            (“SCA”)

 Allows authorized permission to access
 stored communications if:
   (i) the person is the provider of the service; or
   (ii) the person is a user of the service and the
    communication is from or intended for that user.
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights

     Stored Communications Act
              (“SCA”)

 An employer may not intentionally access stored
 communications that are maintained by a third-
 party service provider without the user’s
 authorization


             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights

      Stored Communications Act
               (“SCA”)

• “User Authorization” Exception is extremely
  narrow:
   Employee must actually be a user in order to give
    authorization – he or she must have actually logged on.
   Court may not apply the exception where an employee
    is compelled to give access under threat of termination.
              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Sources of Privacy Rights

     Stored Communications Act
              (“SCA”)


• Consequences of violation are serious
   Criminal liability for intentional unauthorized access.
   Punitive damages and attorneys’ fees even without
    showing of actual damages.

              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




SCA – Employment Decisions with Attendant Risk
• Pietrylo v. Hillstone Restaurant Group, 2009 US Dist
  LEXIS 88702 (D.M.J. Sept. 29, 2009).

• A supervisor obtained a user name and password to a
  MySpace web page from a hostess who felt coerced into
  providing the information.

• The Plaintiff, who created the web page was discharged
  for violating policy requiring professionalism and positive
  attitude.

• Jury awarded $3,403 plus punitive damages of $13,612

               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




SCA – Employment Decisions with Attendant Risk
• Konop v. Hawaiian Airlines Inc., 302 F.3d 868 (9th Cir.
  2002).

• Company accessed an employee’s secure website using
  other employee’s login information (with his permission)
  even though the site’s terms prohibited access by
  management and prohibited authorized users from
  allowing others to access the site.

• Court found the airline violated the SCA and that the
  exception to the act (where permission to view is granted
  by a “user”) did not apply because the authorized
  employees had not actually “used” the site themselves.
               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Concerted Activity under the NLRA
• In both Union and Non-Union settings, Employees have
  the right to engage in concerted activity relating to the
  terms and conditions of employment, including:

    2 or more employees addressing their employer about
     improving their working conditions and pay;

    1 employee speaking to his or her employer on behalf
     of himself or herself and one or more coworkers about
     improving workplace conditions;

    2 or more employees discussing pay or other work-
     related issues with each other.
               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Concerted Activity
• Concerted activity does not generally include the
  actions of a single employee unless he or she is
  attempting to enlist others, or unless acting
  based on prior concerted activity.

• Concerted activity may not include egregious or
  profane statements made in the heat of
  discussion.


              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Concerted Activity Protected by the NLRB

• The NLRB protects discussions or
  statements by employees in a social media
  platform if the discussion or statement is
  “protected.”

• Discussions are protected if they involve
  terms and conditions of employment.

             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Concerted Activity Protected by the NLRB
The NLRB has taken action in two areas:

  1) Where the employer’s social media policy is
     overbroad and violates Section 7 of the
     NLRA on its face, or chills the
  2) Where the employer’s discipline or discharge
     of an employee based on social media
     activity violates the NLRA because it
     concerns protected concerted activity.
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




NLRA example – Souza v. AMR
•   Employee was upset with her supervisor because he would not allow
    her union representative to assist her in preparation of a response to
    a consumer complaint.

•   She posted her annoyance on Facebook from her home computer.
    Other employees commented on her post in her favor.

•   AMR fired the employee after her post, but allegedly based on many
    different employment issues.

•   The NLRB took issue with the termination arguing that AMR fired her
    because she had requested a union representative and because she
    complained about her workplace on her Facebook



                 Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




NLRA example – Souza v. AMR
•   AMR’s policy provides that “Employees are prohibited from making
    disparaging, discriminatory or defamatory comments when
    discussing the Company or the employee's superiors, co-workers
    and/or competitors.”

•   The NLRB complaint charges that AMR's application of its policy
    unlawfully interfered with the employee's right under Section 7 of the
    NLRA to engage in “concerted, protected activity,” i.e., to
    communicate with coworkers about the terms and conditions of
    employment.

•   AMR and the NLRB settled this complaint, so we do not know what
    an Administrative Law Judge would decide.


                 Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com



Examples of conduct that the NLRB
had determined are protected
• Statements related to staffing levels;

• Statements related to choice of food as a sales event that
  could impact the level of commission on sales;

• Statements about the employer’s administration of
  income tax withholdings;

• Complaints about a supervisor’s refusal to provide a
  union representative in meetings.

               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Concerted Activity
• Be careful about disciplining or discharging
  based on one or more employees posting
  to a site where they are complaining about
  the terms and conditions of employment.

• Best practice – obtain legal advice, or refer
  discipline or discharge to HR before taking
  action.
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Should you have a Social Media Policy?
• The NLRB has placed increased scrutiny on
  social media policies;

• But, social media policies are still the best way to
  protect your company’s trade secrets and
  intellectual property

• Social media policies are recommended if
  carefully drafted, and reviewed often
              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Drafting a social media policy
• Your social media policy should include a statement
  setting out a narrowly drawn purpose for the policy;

• Include examples of activity that will and will not violate
  the policy provision;

• Include clear limited language – Ex: Nothing in this policy
  prohibits employees from discussing wages, working
  conditions, or terms of employment with each other.


               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




The Computer Fraud and Abuse Act
• Enacted by Congress in 1984 as an anti-hacking statute.

• Provides in part that
   – “Whoever * * * knowingly and with intent to defraud
     accesses a protected computer without authorization,
     or exceeds authorized access and by means of such
     conduct furthers the intended fraud and obtains
     anything of value * * * shall be punished”

• This is a criminal provision, and violation could mean jail
  time.
               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




The Computer Fraud and Abuse Act

• The CFAA further defines “exceeds
  authorized access” as “to access a
  computer with authorization and to use
  such access to obtain or alter information
  in the computer that the accesser is not
  entitled to obtain or alter.”



             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




The Computer Fraud and Abuse Act
• Some cases have found that employees
  who exceed authorization under a
  workplace computer use policy have
  violated the act and committed a crime.

• These cases are in other Federal Circuits:
  – United States v. Rodriguez – 11th Cir.
  – United States v. John – 5th Cir.
  – Int’l Airport Ctrs., v. Citrin – 7th Cir.
             Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




The Computer Fraud and Abuse Act
• United States v. Nosal

• On April 12, 2012, The 9th Circuit Court of
  Appeals rejected the argument that the CFAA
  applies to situations where employees with
  permission to access a company computer and
  unrestricted access to data, forwarded
  confidential information to former employee so
  that he could compete against the company.

              Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Summary on Sources of Privacy Rights
•    The 4th Amendment for Public employees
•    Common law privacy rights
•    Statutory rights (ECPA; SCA)
•    Concerted activity under the NLRA
5.   No criminal violation in the 9th Circuit for
     employees who exceed computer access
     under the Computer Fraud and Abuse
     Act
               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Helpful Resources
• http://www.iacpsocialmedia.org/ IACP Center for Social
  Media (law enforcement)

• National Institute of Standards and Technology
  Publication 800-144 (web): Guidelines on Security and
  Privacy in Public Cloud Computing

• http://business.ftc.gov/privacy-and-security Federal Trade
  Commission/Bureau of Consumer Protection: tracks what
  information can be collected from websites; information
  regarding regulations for data storage about consumers
  by companies which collect data

               Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




Helpful Resources
•   Advisen – Online Social Networking:A Brave New World of Liability.
    https://advisen.com/downloads/SocialNetworking.pdf

•   Department of Justice – Obtaining and Using Evidence from Social
    Networking Sites.
    http://www.eff.org/files/filenode/social_network/20100303_cirm_socialne

•   Florida Department of Law Enforcement – Social Networking Sites –
    How they are used to Perpetrate Criminal Activity and how Law
    Enforcement uses them as an Investigative tool.

•   http://www.fdle.state.fl.us/Content/Analyst-Academy/Documents/Social-
    Networking-Sites.apx


                 Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




                             Questions?




         Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA
www.schwabe.com




                    Contact Information

               Jean Ohman Back
              JBack@schwabe.com
                 (503) 796-2960

        Devon Zastrow Newman
       DNewman@schwabe.com
           (503) 796-2944
         Bend, OR   |   Portland, OR   |   Salem, OR   |   Seattle, WA |   Vancouver, WA

Mais conteúdo relacionado

Mais procurados

Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
IP Basics for Businesses and Entrepreneurs
IP Basics for Businesses and EntrepreneursIP Basics for Businesses and Entrepreneurs
IP Basics for Businesses and EntrepreneursErica Bristol
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Myths and Traps of Patent, Trademark and Copyright Law
Myths and Traps of Patent, Trademark and Copyright LawMyths and Traps of Patent, Trademark and Copyright Law
Myths and Traps of Patent, Trademark and Copyright Lawn5374j
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010dr2tom
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 

Mais procurados (7)

Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
IP Basics for Businesses and Entrepreneurs
IP Basics for Businesses and EntrepreneursIP Basics for Businesses and Entrepreneurs
IP Basics for Businesses and Entrepreneurs
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Myths and Traps of Patent, Trademark and Copyright Law
Myths and Traps of Patent, Trademark and Copyright LawMyths and Traps of Patent, Trademark and Copyright Law
Myths and Traps of Patent, Trademark and Copyright Law
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 

Semelhante a Workplace Privacy Law and New Technologies

Cloud Security Summit - InfoSec World 2014
Cloud Security Summit - InfoSec World 2014Cloud Security Summit - InfoSec World 2014
Cloud Security Summit - InfoSec World 2014Bill Burns
 
Healthcare Portals: 5 Core Practices to make a Great Digital Experience
Healthcare Portals: 5 Core Practices to make a Great Digital ExperienceHealthcare Portals: 5 Core Practices to make a Great Digital Experience
Healthcare Portals: 5 Core Practices to make a Great Digital ExperiencePerficient, Inc.
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Duty of Care Online
Duty of Care OnlineDuty of Care Online
Duty of Care Onlinebwiredgroup
 
Duty Of Care Online
Duty Of Care OnlineDuty Of Care Online
Duty Of Care Onlinebwiredgroup
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICAmazon Web Services
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICAmazon Web Services
 
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics OpportunityAIIM International
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practiceslisaabe
 

Semelhante a Workplace Privacy Law and New Technologies (20)

Online LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 WebinarOnline LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 Webinar
 
Cloud Security Summit - InfoSec World 2014
Cloud Security Summit - InfoSec World 2014Cloud Security Summit - InfoSec World 2014
Cloud Security Summit - InfoSec World 2014
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Healthcare Portals: 5 Core Practices to make a Great Digital Experience
Healthcare Portals: 5 Core Practices to make a Great Digital ExperienceHealthcare Portals: 5 Core Practices to make a Great Digital Experience
Healthcare Portals: 5 Core Practices to make a Great Digital Experience
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Duty of Care Online
Duty of Care OnlineDuty of Care Online
Duty of Care Online
 
Duty Of Care Online
Duty Of Care OnlineDuty Of Care Online
Duty Of Care Online
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 
Hiring and firing in the digital age
Hiring and firing in the digital ageHiring and firing in the digital age
Hiring and firing in the digital age
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practices
 

Mais de InnoTech

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"InnoTech
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is MaturingInnoTech
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?InnoTech
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostInnoTech
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering StormInnoTech
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the fieldInnoTech
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged InfrastructureInnoTech
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365InnoTech
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studiesInnoTech
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential InnoTech
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?InnoTech
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...InnoTech
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeInnoTech
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacyInnoTech
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumInnoTech
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2InnoTech
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionInnoTech
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentationInnoTech
 

Mais de InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Workplace Privacy Law and New Technologies

  • 1. www.schwabe.com Workplace Privacy Law and New Technologies Presented by: Jean Ohman Back & Devon Zastrow Newman Schwabe, Williamson & Wyatt Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 2. www.schwabe.com Agenda • Introduction to “Cloud Computing” and Technologies that Employ the Cloud • Challenges faced by Security Professionals in Protecting Employer Assets and Data Privacy • Legal Sources for Employee Privacy Rights in the Workplace Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 3. www.schwabe.com What is “Cloud Computing”? The delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electric grid) over a network (typically the Internet) Briefly: purchase of external computing power Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 4. www.schwabe.com © Wikipedia Commons, Sam Johnston 2009 Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 5. www.schwabe.com What are the benefits of “Cloud Computing”? Centralized management of IT resources – Increase resource utilization rates (with faster speeds) – Lower costs (renting vs. owning resources)  Workplace IT focused on policy management Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 6. www.schwabe.com What are the downsides of Cloud Computing? • Reliability of resources out of direct control • Need to monitor/control resource use by users • Data privacy concerns – Workplace confidential material – Intellectual property protection Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 7. www.schwabe.com Devices that use Cloud Computing • Smart phones • Laptops • Tablets • Home computers Generally: Internet-available devices that connect to workplace infrastructure Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 8. www.schwabe.com What these devices also access • Facebook • Twitter • MySpace • Tumblr • Google+ • LinkedIn – “Apps” providing direct links to Internet from device with confidential material stored/accessed Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 9. www.schwabe.com Benefits and downfalls of social media • Benefits: new marketing opportunities, timeliness, reaching “younger” generation with marketing messages • Downfalls: potential for IP infringement, defamation, claims against employer, increased platform for litigation hold Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 10. www.schwabe.com Litigation hold • Duty to retain documents that could reasonably relate to an issue in litigation – Duty lasts through conclusion of case • Duty triggered when a business is sued (or has a reasonable apprehension of being sued) • Retention obligation applies to all “data” accessible by a company – Includes smart phones, tablets, computers – Can include social media platforms Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 11. www.schwabe.com Document retention policy • Businesses should have a document retention policy – Example: all emails not permanently needed should be deleted after 30 days – Obligations for what to retain clearly defined • Businesses should follow their document retention policy Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 12. www.schwabe.com Managing workplace data privacy concerns – What does the law PERMIT employers to regulate? – What does the law REQUIRE employers to do in order to regulate data privacy? Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 13. www.schwabe.com Privacy Issues & Sources of Law Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 14. www.schwabe.com Employer Monitoring Employers may generally monitor emails sent and received on company- owned systems. Can be used to enforce data privacy obligations/needs. Spell out actions & intervals in policy Do not target employees Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 15. www.schwabe.com Mechanisms for protecting employer data • Employment agreement – Employee contract: defines the employer’s rights (e.g. monitoring computer activity) – Confidentiality agreement: spells out actions required to protect employer’s confidential information and/or intellectual property (trade secrets protection by independent contractor) • If you will enforce legally, should be a stand-alone agreement and not part of an employment manual. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 16. www.schwabe.com Mechanisms for protecting employer data • Data management policy – Mobile device usage policy (if you want to use your iPhone, you’ll have to agree to …) – Can further address monitoring of employee activity that will occur • Case law: existing but “stale” policy is not effective: employees must be aware of policy and that it is regularly enforced Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 17. www.schwabe.com Employer Monitoring Employers with Electronic Communications Policy can monitor telephone calls on their own phone systems -Spell out intended actions in the policy Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 18. www.schwabe.com Employer Monitoring City of Ontario v. Quon • Alleged 4th amendment privacy right violation where employer reviewed Quon’s private text messages on employer-issued device due to coverage charges and punished him for sexually explicit content • U.S. Supreme Court held review of message was incident to reasonable, work-related audit, and employee and no right of privacy in text messages on employer-owned devices • Public Employee Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 19. www.schwabe.com Employer Monitoring • Recording telephone calls allowed in Oregon as long as all participants in the call are in Oregon, and as long as one person consents. • But – it is illegal to obtain or attempt to obtain any part of a telecommunication or radio communication in which the person recording is not a participant. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 20. www.schwabe.com Employer Monitoring • Increasingly, employers use technology to track keystrokes, and to monitor the time that an employee spends on a computer. • Employers may not obtain employee passwords using keystroke monitoring Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 21. www.schwabe.com Privacy Guidelines • Inform employees in • Consistently apply writing of the ways any monitoring that you plan to policies across all monitor them; employees; • Have a • Justify monitoring in comprehensive your policies by electronic including the communication policy legitimate business interests that supports monitoring activities Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 22. www.schwabe.com Sources of Privacy Rights Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 23. www.schwabe.com Sources of Privacy Rights • 4th Amendment • Common Law • Statutory Law • National Labor Relations Act Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 24. www.schwabe.com Sources of Privacy Rights 4th Amendment for Public Employees Public employees have privacy rights under the 4th Amendment if they have a reasonable expectation of privacy. But there are no privacy rights to employer- owned systems where employer has communicated this and follows policy. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 25. www.schwabe.com Common Law Privacy Rights • Includes specific causes of action in tort law (invasion of privacy, intrusion upon seclusion, false light) • Employees have a general right to privacy where there is a reasonable expectation of privacy. • An employee’s right to privacy in social media is governed by the nature of the social media site (i.e., is it publicly available?). • The employer’s workplace policies. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 26. www.schwabe.com Common Law Privacy Rights • An employee does not have a privacy right to information that he or she posts to a public social media site. • An employee may have a privacy right to a web site that restricts access to certain users, or that is password protected. • Employer policies can dispel right of privacy for employer-owned systems or devices. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 27. www.schwabe.com Sources of Privacy Rights Electronic Communications Privacy Act (“ECPA”) • Pertains to interception of the content of a communication contemporaneous with the communication. • Less likely to occur in employment setting. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 28. www.schwabe.com Sources of Privacy Rights Stored Communications Act (“SCA”) • Prohibits third parties from intentionally accessing electronically stored communications. • Includes emails or entries on private websites, without proper authorization Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 29. www.schwabe.com Sources of Privacy Rights Stored Communications Act (“SCA”) Allows authorized permission to access stored communications if:  (i) the person is the provider of the service; or  (ii) the person is a user of the service and the communication is from or intended for that user. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 30. www.schwabe.com Sources of Privacy Rights Stored Communications Act (“SCA”) An employer may not intentionally access stored communications that are maintained by a third- party service provider without the user’s authorization Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 31. www.schwabe.com Sources of Privacy Rights Stored Communications Act (“SCA”) • “User Authorization” Exception is extremely narrow:  Employee must actually be a user in order to give authorization – he or she must have actually logged on.  Court may not apply the exception where an employee is compelled to give access under threat of termination. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 32. www.schwabe.com Sources of Privacy Rights Stored Communications Act (“SCA”) • Consequences of violation are serious  Criminal liability for intentional unauthorized access.  Punitive damages and attorneys’ fees even without showing of actual damages. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 33. www.schwabe.com SCA – Employment Decisions with Attendant Risk • Pietrylo v. Hillstone Restaurant Group, 2009 US Dist LEXIS 88702 (D.M.J. Sept. 29, 2009). • A supervisor obtained a user name and password to a MySpace web page from a hostess who felt coerced into providing the information. • The Plaintiff, who created the web page was discharged for violating policy requiring professionalism and positive attitude. • Jury awarded $3,403 plus punitive damages of $13,612 Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 34. www.schwabe.com SCA – Employment Decisions with Attendant Risk • Konop v. Hawaiian Airlines Inc., 302 F.3d 868 (9th Cir. 2002). • Company accessed an employee’s secure website using other employee’s login information (with his permission) even though the site’s terms prohibited access by management and prohibited authorized users from allowing others to access the site. • Court found the airline violated the SCA and that the exception to the act (where permission to view is granted by a “user”) did not apply because the authorized employees had not actually “used” the site themselves. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 35. www.schwabe.com Concerted Activity under the NLRA • In both Union and Non-Union settings, Employees have the right to engage in concerted activity relating to the terms and conditions of employment, including:  2 or more employees addressing their employer about improving their working conditions and pay;  1 employee speaking to his or her employer on behalf of himself or herself and one or more coworkers about improving workplace conditions;  2 or more employees discussing pay or other work- related issues with each other. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 36. www.schwabe.com Concerted Activity • Concerted activity does not generally include the actions of a single employee unless he or she is attempting to enlist others, or unless acting based on prior concerted activity. • Concerted activity may not include egregious or profane statements made in the heat of discussion. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 37. www.schwabe.com Concerted Activity Protected by the NLRB • The NLRB protects discussions or statements by employees in a social media platform if the discussion or statement is “protected.” • Discussions are protected if they involve terms and conditions of employment. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 38. www.schwabe.com Concerted Activity Protected by the NLRB The NLRB has taken action in two areas: 1) Where the employer’s social media policy is overbroad and violates Section 7 of the NLRA on its face, or chills the 2) Where the employer’s discipline or discharge of an employee based on social media activity violates the NLRA because it concerns protected concerted activity. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 39. www.schwabe.com NLRA example – Souza v. AMR • Employee was upset with her supervisor because he would not allow her union representative to assist her in preparation of a response to a consumer complaint. • She posted her annoyance on Facebook from her home computer. Other employees commented on her post in her favor. • AMR fired the employee after her post, but allegedly based on many different employment issues. • The NLRB took issue with the termination arguing that AMR fired her because she had requested a union representative and because she complained about her workplace on her Facebook Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 40. www.schwabe.com NLRA example – Souza v. AMR • AMR’s policy provides that “Employees are prohibited from making disparaging, discriminatory or defamatory comments when discussing the Company or the employee's superiors, co-workers and/or competitors.” • The NLRB complaint charges that AMR's application of its policy unlawfully interfered with the employee's right under Section 7 of the NLRA to engage in “concerted, protected activity,” i.e., to communicate with coworkers about the terms and conditions of employment. • AMR and the NLRB settled this complaint, so we do not know what an Administrative Law Judge would decide. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 41. www.schwabe.com Examples of conduct that the NLRB had determined are protected • Statements related to staffing levels; • Statements related to choice of food as a sales event that could impact the level of commission on sales; • Statements about the employer’s administration of income tax withholdings; • Complaints about a supervisor’s refusal to provide a union representative in meetings. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 42. www.schwabe.com Concerted Activity • Be careful about disciplining or discharging based on one or more employees posting to a site where they are complaining about the terms and conditions of employment. • Best practice – obtain legal advice, or refer discipline or discharge to HR before taking action. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 43. www.schwabe.com Should you have a Social Media Policy? • The NLRB has placed increased scrutiny on social media policies; • But, social media policies are still the best way to protect your company’s trade secrets and intellectual property • Social media policies are recommended if carefully drafted, and reviewed often Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 44. www.schwabe.com Drafting a social media policy • Your social media policy should include a statement setting out a narrowly drawn purpose for the policy; • Include examples of activity that will and will not violate the policy provision; • Include clear limited language – Ex: Nothing in this policy prohibits employees from discussing wages, working conditions, or terms of employment with each other. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 45. www.schwabe.com The Computer Fraud and Abuse Act • Enacted by Congress in 1984 as an anti-hacking statute. • Provides in part that – “Whoever * * * knowingly and with intent to defraud accesses a protected computer without authorization, or exceeds authorized access and by means of such conduct furthers the intended fraud and obtains anything of value * * * shall be punished” • This is a criminal provision, and violation could mean jail time. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 46. www.schwabe.com The Computer Fraud and Abuse Act • The CFAA further defines “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled to obtain or alter.” Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 47. www.schwabe.com The Computer Fraud and Abuse Act • Some cases have found that employees who exceed authorization under a workplace computer use policy have violated the act and committed a crime. • These cases are in other Federal Circuits: – United States v. Rodriguez – 11th Cir. – United States v. John – 5th Cir. – Int’l Airport Ctrs., v. Citrin – 7th Cir. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 48. www.schwabe.com The Computer Fraud and Abuse Act • United States v. Nosal • On April 12, 2012, The 9th Circuit Court of Appeals rejected the argument that the CFAA applies to situations where employees with permission to access a company computer and unrestricted access to data, forwarded confidential information to former employee so that he could compete against the company. Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 49. www.schwabe.com Summary on Sources of Privacy Rights • The 4th Amendment for Public employees • Common law privacy rights • Statutory rights (ECPA; SCA) • Concerted activity under the NLRA 5. No criminal violation in the 9th Circuit for employees who exceed computer access under the Computer Fraud and Abuse Act Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 50. www.schwabe.com Helpful Resources • http://www.iacpsocialmedia.org/ IACP Center for Social Media (law enforcement) • National Institute of Standards and Technology Publication 800-144 (web): Guidelines on Security and Privacy in Public Cloud Computing • http://business.ftc.gov/privacy-and-security Federal Trade Commission/Bureau of Consumer Protection: tracks what information can be collected from websites; information regarding regulations for data storage about consumers by companies which collect data Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 51. www.schwabe.com Helpful Resources • Advisen – Online Social Networking:A Brave New World of Liability. https://advisen.com/downloads/SocialNetworking.pdf • Department of Justice – Obtaining and Using Evidence from Social Networking Sites. http://www.eff.org/files/filenode/social_network/20100303_cirm_socialne • Florida Department of Law Enforcement – Social Networking Sites – How they are used to Perpetrate Criminal Activity and how Law Enforcement uses them as an Investigative tool. • http://www.fdle.state.fl.us/Content/Analyst-Academy/Documents/Social- Networking-Sites.apx Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 52. www.schwabe.com Questions? Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA
  • 53. www.schwabe.com Contact Information Jean Ohman Back JBack@schwabe.com (503) 796-2960 Devon Zastrow Newman DNewman@schwabe.com (503) 796-2944 Bend, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA