SlideShare a Scribd company logo
1 of 61
Download to read offline
Social Media: Legal Liabilities,
    Loopholes and Lessons Learned




August 10, 2011            Jennifer Mansfield
                       Lindsay Dennis Swiger

                      Copyright © 2011 Holland & Knight LLP All Rights Reserved
Important notice:

Information contained in this PowerPoint is for
the presenter’s use in an August 2011 program.
It is being used for informational purposes only
and is not legal advice. Specific facts require the
application of specific laws. Federal and state
laws change frequently. Thus, consult your
attorney with particular legal questions.



                         2
Today’s Topics
•       Legal concerns:
    –       Who has liability for social media content?
    –       Regulatory, privacy and other legal considerations for marketing
            through social media

•       Employment issues
•       Crafting state of the art policies
    –       Employee Policies
    –       Privacy Policies
    –       Terms of use for your website



                                       3
Social Media




               4
Social Media – Potential PR Nightmare

• Dominos: bad publicity suffered by Dominos from the
  infamous YouTube prank video posted by two of its
  employees:
                                                http://www.youtube.com/w
                                                atch?v=OhBmWxQpedI




• Also:
   – Nurses in Wisconsin terminated for posting patient Xrays on Facebook
   – Univ of New Mexico Hospital works terminated for taking pictures of
     patient injuries with cellphone cameras and posting them on MySpace



                                    5
LEGAL

CONCERNS


    6
Release of Sensitive/Protected Information

• Data security: An employee could unwittingly click on links to spam and
  phishing schemes or download malicious code onto the company network.
• Re-Posting of material: E-mail messages, firm-wide memos, or employee
  rants may end up before a wider audience, with little recourse from the
  original author.
   – Twitter tweets, even if original followers are restricted can be retweeted
   – See e.g., Moreno v. Hanford Sentinel, Inc., 172 Cal.App.4th 1125
     (2009) (author who posted an article on social network site cannot state
     a cause of action for invasion of privacy against the person who
     submitted that article to a newspaper for republication)
– Hackers: Need to maintain security to protect information of your
  customers/clients.




                                      7
Internet Security



   You never
want to have to
  send one of
these emails to
     your
 customers. . .




                     8
Defamation
• A false statement that tends to hold a person up to hatred,
  contempt, or ridicule or causes him to be shunned or avoided by
  others.
• Re-publisher just as liable as the original speaker
• Section 230 of the Communications Decency Act;
   – Craigslist was absolved of liability for assault with a handgun sold on its site
   – MySpace was immune from liability for sexual predators communicating with
     minors on its site
   – Union immune from defamatory postings by members on its site




                                            9
Invasion of Privacy

Four types of invasion of
privacy claims:
(1) intrusion upon seclusion,
(2) appropriation of name or
    likeness of another,
(3) publication of private
    facts;
(4) False light (not in Florida)


Yath v. Fairview Clinics, N.P., 767
                                           http://www.youtube.com/w
N.W. 2d 34 (Minn. App. 2009)               atch?feature=player_embe
                                           dded&v=mg11glsBW4Y




                                      10
Intellectual Property

• Harm to Reputation: A company could suffer a harm to its
  reputation from the creation of false profiles.
• “Name squatting” and “brandjacking” – when a third- party
  uses a company name in social media without authorization.
• Copyright:
   – Get a license: Copyright in original UGC belongs to the
     user, unless agreed otherwise. If you re-post, make sure
     what you’re reposting does not contain copyright violations.
   – Fair use is an affirmative defense, but can be very tricky


                               11
Digital Millennium Copyright Act (DMCA)
                                                                       17 USC § 512


                                                         • Protects Intellectual
                                                           Property(sword): Notice and
                                                           Takedown procedures
                                                           without litigation.
                                                         • Protection From User's
                                                           Infringing Acts (shield):
                                                           "Safe Harbor" protects
                                                           service providers until notice
Lenz v. Universal, 572 F.Supp.2d 1150 (N.D. Cal. 2008)
                                                           of a violation is properly
                                                           given.
               http://www.youtube.c
               om/watch?v=N1KfJH
               FWlhQ

                                                           12
Social Media – Litigation Concerns
• Discovery, preservation issues:
   – Ensure that data can be preserved, retrieved and produced if required.
   – Adopt/implement written computer maintenance schedule.
   – Include procedures for preserving electronic records in case of
     subpoena or threatened litigation; and
   – Consult legal counsel and IT early to identify computers/other devices
     of employer, employees and third parties that may have relevant
     information.
• Just because an attorney is cc’d, doesn’t make it privileged.
• If a privilege exists, it can be lost: Once communications are
  shared with others, any privilege of confidentiality will be lost.


                                    13
Federal Regulations

• HIPAA : Healthcare Insurance Portability and Accountability
  Act of 1996.
   • Nurses in Wisconsin terminated for posting patient Xrays on Facebook
   • Univ of Mexico Hospital workers terminated for taking pictures of
     patient injuries with cellphone cameras and posting them on MySpace

• HITECH Act – requires businesses or third parties who receive
  HIPAA information to maintain confidentiality and must notify
  people if their confidential information is released.




                                   14
Federal Regulations

• Food, Drug, and Cosmetics Act (FDCA) – regulation of
  labeling and advertising for drugs and devices.
   – Labeling – brochures, detailing pieces, letters, prices lists, etc.
   – Advertising – journals, magazines, broadcast media, telephone, etc.

• FDA says all manufacturers are in control of their websites and
  thus all FDCA requirements apply.
   – Testimonials – especially for an off-label use – can create a problem
     for the company




                                       15
Federal Regulations

• FTC Regulations
      • Testimonials/Endorsements regulation implemented in 2009.
      • Must disclose connections between advertisers and their endorsers
        that might materially affect the weight or credibility of the
        endorsement
      • Free Product is considered compensation

• Children’s Online Privacy Protection Act (COPPA); 15 U.S.C.
  6501-6506; 16 CFR Part 312.
      • Applies to websites that target children under 13 or know, or should
        know, that a visitor is under age 13


                                   16
Social Media – User Privacy Concerns

FTC Staff Report: Self-Regulatory Principles For Online
 Behavioral Advertising (Feb. 2009)

• Transparency: The Report calls for companies to obtain
  affirmative express consent from consumers for material
  changes in use of PII
• Consumer Control: clear statement that (1) data about
  consumers’ activities online is being collected for behavioral
  advertising and (2) consumers can choose whether or not to
  have their information collected for such purpose.



                                17
Social Networks – SEC regulation

• Violation of securities laws: Loose communication about
  public companies might violate securities laws that regulate
  material misstatements, public disclosures, and solicitations
  made by or on behalf of the company.
• Example, in 2007, the SEC opened an informal inquiry into
  Whole Foods CEO John Mackey’s “sock puppet” activities,
  that is, his anonymous posts and commentary to online
  financial message boards praising Whole Foods and offering
  other opinions about its competitors. Mackey was eventually
  cleared, but not before he and the company were dragged
  through a media gauntlet.




                                18
Yikes!

What can I do about all of this?




                 19
Website
Privacy Policies
      and
 Terms of Use

        20
Website Privacy Policies and Terms of Use

• Two perspectives:
   – Looking: from inside your home site to outside
   – Looking: from outside to inside a third party site

• Are they “contracts” or “policies”?
   – The FTC says they are contracts

• The ideal is “spontaneous participation” in social media, but the
reality is that enterprises must require disciplined participation
according to rules
   – Pointer: make underlying rules look like spontaneous participation
     (technical and process measures)


                                      21
How the Two Fit Together

•Privacy Policy                               •Terms of Use
 • Notice of privacy practices                • Define services

     – Definition of personal information • Rules on passwords & authentication
     – Host’s use of personal information • Technology rules (bots, deep-linking)
     – Sharing of personal information        • Code of conduct
       between users                          • Grants and cross-grants of rights
 • Consent                                    • Advertisement policies
 • Access                                     • Right to Monitor

 • Security                                   • DMCA information

 • Enforcement                                • Member disputes
                                              • Warranties, disclaimers & general


                                         22
Privacy controls

• User behavior
   – Facebook admonitions
      • “Please choose carefully the information you post on your
        profile, and that you provide to other Members.
      • If you make your profile freely available to other Members,
        your profile should not include information that personally
        identifies you, such as your telephone number, street
        address, last name, email address, and any geographically
        recognizable photographs.”

• User choice
   – Ability to opt-in and opt-out


                                     23
Employment
   Law
  Issues


     24
Social Media for Employers

•Use of Social Media to Recruit and Screen Job
 Applicants.
•Social Media at Work.




                      25
Use of Social Media to Recruit and Screen Job
Applicants

• Recruiting
   – Identify potential applicants who might not be looking for a new job
   – Target applicants with specific job levels and skill sets


• Screening
   – Vet job applicants for corporate culture “fit”
   – Verify qualifications on an applicant’s resume or CV




                                     26
Use of Social Media to Recruit and Screen
Applicants


•73% of employers use social networks or
 social media to support their recruitment
 efforts (Jobvite survey, 2010).
•53% of employers research job candidates on
 social media websites (CareerBuilder.com
 survey, 2010).



                       27
Screening Applicants Online

• A 2008 SHRM survey found that negative information found
  through social media was more likely to affect an employer
  than positive information.
• According to CareerBuilder.com, 2 in 5 employers had found
  content on a social network site that dissuaded them from
  hiring a candidate.
   – Lies about qualifications on resumes or CV’s
   – Discriminatory comments
   – Questionable judgment
   – Provocative or inappropriate photographs


                                   28
Revoking Offers

• A soon-to-be Cisco employee posted the following tweet on
  Twitter:
   – Cisco just offered me a job! Now I have to weigh the utility of a fatty
     paycheck against the daily commute to San Jose and hating the work.

• Tim Levad at Cisco saw the tweet, and tweeted him back:
   – Who is the hiring manager? I’m sure they would love to know that you
     will hate the work. We here at Cisco are versed in the web.

• This post went viral overnight and became an internet
  sensation. The offer was subsequently rescinded. (CA Labor &
  Employment Bulletin, p. 91March/April 2010.)


                                     29
Pitfalls of Pre-employment Online Screening

• Discrimination – Failure to Hire
• Case Study: Gaskell v. University of Kentucky, E.D. Kentucky,
  Nov. 23, 2010
• Facts:
   – The University of Kentucky wanted to hire a Founding Director for its
     astronomical observatory. The University put together a search
     committee which received about 12 applications for the position.
   – The most qualified applicant by far was Martin Gaskell. He was the
     top candidate until…




                                   30
Gaskell v. University of Kentucky (cont.)

• One of the members of the search committee conducted an
  internet search for information about Gaskell and found his
  professional website which linked to his personal website
  which contained an article titled “Modern Astronomy, the
  Bible, and Creation.”
• This information was circulated to the entire search committee.
• From there, the search committee discussed Gaskell’s religious
  beliefs with other professors at the University, with the
  University Dean and Provost, and with Gaskell’s previous
  employer. The search committee also reviewed Gaskell’s
  student evaluations for references to his religious beliefs.

                               31
Gaskell v. University of Kentucky (cont.)

• In the end, Gaskell was not hired for the position. Instead, a
  less qualified candidate was selected.
• Gaskell filed a lawsuit claiming that he was not hired because
  of religious discrimination.
• The Court’s Decision:
• The court concluded that the case should go to trial because
  Gaskell had presented direct evidence of discrimination.
• The smoking gun? An email from the chair of the search
  committee.


                                32
Gaskell v. University of Kentucky (cont.)

• The email, with the subject line “The Gaskell Affair,” stated:
• It has become clear to me that there is virtually no way Gaskell will be offered the
  job despite his qualifications that stand far above those of any other applicant.
  Other reasons will be given for this choice when we meet Tuesday. In the end,
  however, the real reason why we will not offer him the job is because of his
  religious beliefs in matters that are unrelated to astronomy or to any of the duties
  specified for this position. (For example, the job does not involve outreach in
  biology.). . . If Martin were not so superbly qualified, so breathtakingly above the
  other applicants in background and experience, then our decision would be much
  simpler. We could easily choose another applicant, and we could content ourselves
  with the idea that Martin's religious beliefs played little role in our decision.
  However, this is not the case. As it is, no objective observer could possibly
  believe that we excluded Martin on any basis other than religious. . . .




                                          33
How to Avoid Claims Arising From Social Media
Searches of Job Applicants

•Implement and consistently follow practices
 and procedures regarding social media
 screening of applicants.
•Train hiring personnel.




                       34
Suggestions and Considerations for a Social
Media Screening Practice and Procedure

• Create a list of the lawful information the company wants to find out from
  the online search and use that list in every search.
• Decide whether the company will screen all applicants for all positions, or
  only for certain positions.
• Have a neutral person conduct the online screening, filter out any protected
  information about the applicant, and report to the decision maker only
  information that lawfully can be considered.
• Consider whether to conduct the online search before or after the in-person
  interview.
• Consider whether to provide notice to applicants and whether to obtain the
  applicant’s consent before conducting the online search. Notice and
  consent is required if using a third party vendor.


                                      35
Social Media at Work




         36
Employees’ use of social networking sites

• During work hours using the employer’s computer system.
• On the employee’s own time using the employer’s computer
  system.
• On the employee’s own time and about the company.
• On the employee’s own time and about personal, but potentially
  illegal or otherwise objectionable, topics.




                              37
Overview of Employment Law Issues



• Fair Employment Practices
• Invasion of Privacy
• Stored Communications Act
• Labor Law
• Wage and Hour




                              38
Fair Employment Practices

• Two general areas of concerns: Disparate Treatment and
  Harassment.
• Disparate Treatment:
   – Posts by a manager or supervisor on a social media site
     may be used as evidence of a discriminatory animus or
     provide admissions to support a discrimination claim.
   – Discriminatory application or enforcement of the
     employer’s social media policy.
• Harassment: The use of blogs and other social media outlets to
  create an unlawful hostile work environment for an employee
  or group of employees in a protected class.

                               39
Maremont v. Susan Fredman Design Group,
Ltd., 2011 WL 902444 (N.D. Ill. 2011)

• Plaintiff, Jill Maremont, was the Director of Marketing, Public
  Relations and e-commerce for an interior design firm.
• She had a popular personal following on Facebook and
  Twitter, and posted to both sites for work.
• She created and posted to a blog for the interior design firm.
• Plaintiff’s picture appeared on each Facebook post and Tweet.
• She was seriously injured in an accident and was unable to
  work for 9 months.



                                40
Maremont v. Susan Fredman Design Group,
Ltd.

• While Maremont was out of work, her co-workers made
  Facebook posts and Tweets that looked like Maremont sent
  them.
• She asked them to stop but they did not.
• She finally changed her passwords.
• She decided not return to work because of the firm’s hostility
  toward her.




                               41
Maremont v. Susan Fredman Design Group,
Ltd.

• Maremont brought a false endorsement claim under the
  Lanham (Trademark) Act against her employer.
• False endorsement occurs when a person’s identity (the
  trademark) is connected with a product or service in such a
  way that consumers are likely to be misled about that person’s
  sponsorship or approval of the product or service.
• Her employer, the interior design firm, filed a motion to
  dismiss.




                                42
Maremont v. Susan Fredman Design Group,
Ltd.

• The Court denied the motion to dismiss because Maremont
  alleged:
   – She was well-known in the interior design community and had a
     popular personal following on Facebook and Twitter.
   – She used Facebook and Twitter in a commercial context as an
     employee of the interior design firm.
   – Her employer deceptively used her name and picture to make posts on
     Facebook and Tweet.




                                  43
Maremont v. Susan Fredman Design Group,
Ltd.

• Lessons Learned:
• If you want an employee to post to social media sites as part of
  his or her job duties, be sure to have the employee do so using
  the company’s Facebook page or Twitter name or blog.
• The company can control the content of what is posted and
  what is not.
• If the employee is unable to post or no longer works for the
  company, the company keeps the page/blog/name and the
  following.
• No liability for Lanham Act violations.

                                44
Pietrylo v. Hillstone Restaurant Group, 2009
WL 3128420 (D.N.J. 2009)

• Former employees claimed violation of Stored
  Communications Act.
• The Act makes it an offense to intentionally access stored
  communications without authorization or in excess of
  authorization.
• Exception: Conduct authorized by a user of the service with
  respect to the communication intended for that user.
• Example: A Facebook account holder may authorize a non-
  account holder to access the account holder’s account.



                               45
Pietrylo v. Hillstone Restaurant Group

• At issue was whether an employee “voluntarily”
  granted access to management to access the
  employee’s account on MySpace to access the “Spec-
  Tator” group, which housed pages created by
  employees to vent about work.




                         46
Pietrylo v. Hillstone Restaurant Group

• The employee testified that:
   – She had to give her MySpace password to her supervisor because she
     worked for the restaurant and for the supervisor.
   – She would not have given her supervisor the password if he had not
     been a manager.
   – She would not have given her MySpace password to other co-workers.
   – She felt that she would have gotten in trouble if she had not given him
     the password.




                                    47
Pietrylo v. Hillstone Restaurant Group (2009)

• Jury verdict for the former employees
• The restaurant, through its managers, had knowingly or
  intentionally or purposefully accessed the Spec-Tator group
  without authorization on 5 occasions.
• The court denied the defendants’ motion for new trial and
  motion for judgment as a matter of law, concluding that the
  jury could reasonably infer that the employee’s purported
  “authorization” was coerced or provided under pressure.




                               48
Wage and Hour (Fair Labor Standards Act)

• Nonexempt employees
   – Minimum wage for all “hours worked”
   – Overtime for all “hours worked” over 40 in a workweek
• Use of social media on behalf of employer
   – May be “hours worked”, if employer had actual or
     constructive knowledge and gave explicit or implicit
     consent.
   – Even if outside of normal working hours.



                              49
Labor Law/National Labor Relations Act



                    SECTION 7 OF NLRA
• Provides all nonsupervisory employees the right to engage in
  protected and “concerted” activity
• Includes discussions of “terms and conditions of employment”
• Affords protection to non-unionized employees as well as
  employees represented by union



                               50
Labor Law (continued)


                    SECTION 7 OF NLRA
• Employer violates section 7 if employees would reasonably
  interpret work rule to limit concerted activity.
• Violation occurs even if employer never enforces rule in a way
  that infringes on Section 7 rights.
• Work rules relating to social media posts are unlawful if they
  can be reasonably interpreted as limiting employees’ right to
  discuss terms and conditions of employment.


                                51
Labor Law (continued)


 Examples of overly restrictive policies include rules prohibiting
 posting or discussion of:
• Wages or benefits.
• “Gossip”
• Derogatory statements about employer or managers.
• “Company’s business”



                                52
Facebook & Protected Concerted Activities
Protected Concerted Activity                    Individual Grievances and Gripes
Prohibiting “disparaging, discriminatory        Posting that customers are “rednecks”
or defamatory comments” about                   and hoping that they choke on glass as
Company, supervisors, or coworkers              they drove home drunk; no response
                                                from co-workers (although he received a
                                                Facebook message from his boss that he
                                                was fired!)
Criticizing supervisor on Facebook              Complaining on Facebook to sister-in-
                                                law about not getting a raise and doing
                                                the work of waitresses without tips
Posting comment on Facebook                     Posting that “mental institution” where
criticizing food and beverage served at         employee worked (actually a homeless
sales event because poor quality affected       shelter) was “spooky” at night; employee
sales commissions; employee was                 was not “friends” with co-workers on
“friends” with co-workers on Facebook           Facebook


                                           53
Labor Law (continued)

• Unlawful Surveillance: Monitoring or creating impression that
  employer is monitoring employee’s private, off hours social
  media posts related to union organizing.
• However, it is lawful to routinely scan a broad range of social
  media sites for references to the employer or its
  products/services.
   – The employer is not focused on or creating the impression
     of focusing on union activity.
   – Thus, the employer should not be seen as spying on its
     employees’ protected and concerted activities.


                                54
Minimizing the Risks because of Employees’ Use
of Social Media

• Implement and consistently follow policies and procedures
  regarding employees’ use of online social networking,
  blogging, and other social media sites (e.g. YouTube) at work
  and outside of work.
• Develop a (lawful and reasonable) method to check
  compliance with the policies and procedures.




                               55
Basics of a Social Media Policy

• Define what constitutes “social media” and “blogging”
   – “Blogging” should be defined to mean all web postings,
     such as those in chat rooms, on bulletin boards, and social
     networking sites (“micro-blogging”).
• On social media sites that are not employer-sponsored,
  employees who mention their employer’s name should be
  required to include a disclaimer that the statements posted are
  those of the poster and do not necessarily represent the
  opinion of the employer and have not been approved or
  otherwise reviewed by the employer



                                56
Basics of a Social Media Policy (continued)


• Don’t prohibit all postings relating to the employer because that would
  violate the NLRA.
    – Specifically define what topics are “off-limits.”
• Notify employees that the policy applies at all times.
• Advise employees to notify their supervisor or human resources about
  possible violations of the policy or other company policies, such as anti-
  harassment policies.
• Notify employees that the company monitors internet usage on company-
  provided equipment and system for compliance with the policy.
    – This includes an employee’s personal email account that is accessed
      using the company’s computer system.


                                      57
Basics of a Social Media Policy (continued)

• A social media policy may prohibit:
   – The disclosure of the employer’s confidential information
     (which should be defined elsewhere in the handbook)
   – Disparaging remarks about the employer’s products or
     services
   – Disparaging and defamatory comments about competitors
     and other third-parties (especially if the poster identifies his
     or her employer)
   – Postings that threaten, harass or intimidate coworkers
   – Postings that endorse the employer’s products or services.

                                 58
Basics of a Social Media Policy (continued)

• A social media policy may prohibit:
   – Employees from using the employer’s trademark or logo without
     consent of a designated company official
   – Employees from using the employer’s computer systems or network
     access for posting to social media sites that are not sponsored by the
     employer
   – Postings that violate patient confidentiality or privacy rights under state
     or federal law (e.g., HIPAA).

• Where employees are permitted to post on behalf of or for the
  employer, include policies limiting when employees may make
  those posts so as to control overtime.

                                      59
Monitoring Employee Use of
Social Media Sites (Lawfully)

• Set up “Google alert” for company name and other key words.
• Conduct key word search through company server.
• Use of Internet search tools that provide “real-time and
  interactive social media monitoring and analytics”
   – Examples: sysomos, buzzstream, biz360, customscoop,
     echosonar, sentimentmetrics
                        (not an endorsement)




                                60
THANK YOU
Jennifer A. Mansfield                           Lindsay Dennis Swiger
Jennifer.Mansfield@hklaw.com               Lindsay.Swiger@hklaw.com
                  50 N. Laura Street, Suite 3900
                     Jacksonville, FL 32202
                         904-353-2000



                                  61

More Related Content

What's hot

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14
Jessica Stokes
 

What's hot (20)

Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social Media Ethics Presentation
Social Media Ethics PresentationSocial Media Ethics Presentation
Social Media Ethics Presentation
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Copyright
CopyrightCopyright
Copyright
 
Software liability
Software liabilitySoftware liability
Software liability
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Privacy And Copyrights
Privacy And CopyrightsPrivacy And Copyrights
Privacy And Copyrights
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 

Similar to Social Media Privacy Laws and Legal Liabilities

Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
Vivastream
 
Legal matters in social media
Legal matters in social mediaLegal matters in social media
Legal matters in social media
Ishmeet Bedi
 

Similar to Social Media Privacy Laws and Legal Liabilities (20)

Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted Marketing
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
E commerce
E commerce E commerce
E commerce
 
Hiring and firing in the digital age
Hiring and firing in the digital ageHiring and firing in the digital age
Hiring and firing in the digital age
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff SchultzThe Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
Deloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationsDeloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerations
 
Protecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your BrandProtecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your Brand
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Nytlegal #56866-v3-ona 2013-_ds_draft
Nytlegal #56866-v3-ona 2013-_ds_draftNytlegal #56866-v3-ona 2013-_ds_draft
Nytlegal #56866-v3-ona 2013-_ds_draft
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Legal matters in social media
Legal matters in social mediaLegal matters in social media
Legal matters in social media
 
Protect you Rights and Avoid Liability! Current Developments and Major Implic...
Protect you Rights and Avoid Liability! Current Developments and Major Implic...Protect you Rights and Avoid Liability! Current Developments and Major Implic...
Protect you Rights and Avoid Liability! Current Developments and Major Implic...
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache
 

More from Tommy Hobin

Fundamentals of Keyword Research
Fundamentals of Keyword ResearchFundamentals of Keyword Research
Fundamentals of Keyword Research
Tommy Hobin
 
6 Steps to LinkedIn Success Presentation
6 Steps to LinkedIn Success Presentation6 Steps to LinkedIn Success Presentation
6 Steps to LinkedIn Success Presentation
Tommy Hobin
 
Why use Google Analytics
Why use Google AnalyticsWhy use Google Analytics
Why use Google Analytics
Tommy Hobin
 

More from Tommy Hobin (19)

Get a Better Understanding of the Internet of Things (IoT)
Get a Better Understanding of the Internet of Things (IoT)Get a Better Understanding of the Internet of Things (IoT)
Get a Better Understanding of the Internet of Things (IoT)
 
Marketing Automation - What is Inbound Marketing?
Marketing Automation - What is Inbound Marketing?Marketing Automation - What is Inbound Marketing?
Marketing Automation - What is Inbound Marketing?
 
Localization Listing Solutions by DiscoverTec
Localization Listing Solutions by DiscoverTecLocalization Listing Solutions by DiscoverTec
Localization Listing Solutions by DiscoverTec
 
Email Marketing Worksheet
Email Marketing WorksheetEmail Marketing Worksheet
Email Marketing Worksheet
 
Email Marketing Glossary
Email Marketing GlossaryEmail Marketing Glossary
Email Marketing Glossary
 
Non-Profit Email Marketing - How to segment your email list
Non-Profit Email Marketing - How to segment your email listNon-Profit Email Marketing - How to segment your email list
Non-Profit Email Marketing - How to segment your email list
 
The Story of Analytics - Community First Credit Union / DiscoverTec
The Story of Analytics - Community First Credit Union / DiscoverTecThe Story of Analytics - Community First Credit Union / DiscoverTec
The Story of Analytics - Community First Credit Union / DiscoverTec
 
DiscoverTec Internship
DiscoverTec InternshipDiscoverTec Internship
DiscoverTec Internship
 
The importance of Processes
The importance of ProcessesThe importance of Processes
The importance of Processes
 
Fundamentals of Keyword Research
Fundamentals of Keyword ResearchFundamentals of Keyword Research
Fundamentals of Keyword Research
 
Beware the 5 Pitfalls of Digital Marketing
Beware the 5 Pitfalls of Digital MarketingBeware the 5 Pitfalls of Digital Marketing
Beware the 5 Pitfalls of Digital Marketing
 
Cats vs. Bacon on the Internet
Cats vs. Bacon on the InternetCats vs. Bacon on the Internet
Cats vs. Bacon on the Internet
 
Linked in seminar book
Linked in seminar bookLinked in seminar book
Linked in seminar book
 
6 Steps to LinkedIn Success Presentation
6 Steps to LinkedIn Success Presentation6 Steps to LinkedIn Success Presentation
6 Steps to LinkedIn Success Presentation
 
Analytics Discussion Handout
Analytics Discussion HandoutAnalytics Discussion Handout
Analytics Discussion Handout
 
Why use Google Analytics
Why use Google AnalyticsWhy use Google Analytics
Why use Google Analytics
 
Foursquare Statistics
Foursquare StatisticsFoursquare Statistics
Foursquare Statistics
 
Get Connected
Get ConnectedGet Connected
Get Connected
 
Find Your Audience
Find Your AudienceFind Your Audience
Find Your Audience
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Social Media Privacy Laws and Legal Liabilities

  • 1. Social Media: Legal Liabilities, Loopholes and Lessons Learned August 10, 2011 Jennifer Mansfield Lindsay Dennis Swiger Copyright © 2011 Holland & Knight LLP All Rights Reserved
  • 2. Important notice: Information contained in this PowerPoint is for the presenter’s use in an August 2011 program. It is being used for informational purposes only and is not legal advice. Specific facts require the application of specific laws. Federal and state laws change frequently. Thus, consult your attorney with particular legal questions. 2
  • 3. Today’s Topics • Legal concerns: – Who has liability for social media content? – Regulatory, privacy and other legal considerations for marketing through social media • Employment issues • Crafting state of the art policies – Employee Policies – Privacy Policies – Terms of use for your website 3
  • 5. Social Media – Potential PR Nightmare • Dominos: bad publicity suffered by Dominos from the infamous YouTube prank video posted by two of its employees: http://www.youtube.com/w atch?v=OhBmWxQpedI • Also: – Nurses in Wisconsin terminated for posting patient Xrays on Facebook – Univ of New Mexico Hospital works terminated for taking pictures of patient injuries with cellphone cameras and posting them on MySpace 5
  • 7. Release of Sensitive/Protected Information • Data security: An employee could unwittingly click on links to spam and phishing schemes or download malicious code onto the company network. • Re-Posting of material: E-mail messages, firm-wide memos, or employee rants may end up before a wider audience, with little recourse from the original author. – Twitter tweets, even if original followers are restricted can be retweeted – See e.g., Moreno v. Hanford Sentinel, Inc., 172 Cal.App.4th 1125 (2009) (author who posted an article on social network site cannot state a cause of action for invasion of privacy against the person who submitted that article to a newspaper for republication) – Hackers: Need to maintain security to protect information of your customers/clients. 7
  • 8. Internet Security You never want to have to send one of these emails to your customers. . . 8
  • 9. Defamation • A false statement that tends to hold a person up to hatred, contempt, or ridicule or causes him to be shunned or avoided by others. • Re-publisher just as liable as the original speaker • Section 230 of the Communications Decency Act; – Craigslist was absolved of liability for assault with a handgun sold on its site – MySpace was immune from liability for sexual predators communicating with minors on its site – Union immune from defamatory postings by members on its site 9
  • 10. Invasion of Privacy Four types of invasion of privacy claims: (1) intrusion upon seclusion, (2) appropriation of name or likeness of another, (3) publication of private facts; (4) False light (not in Florida) Yath v. Fairview Clinics, N.P., 767 http://www.youtube.com/w N.W. 2d 34 (Minn. App. 2009) atch?feature=player_embe dded&v=mg11glsBW4Y 10
  • 11. Intellectual Property • Harm to Reputation: A company could suffer a harm to its reputation from the creation of false profiles. • “Name squatting” and “brandjacking” – when a third- party uses a company name in social media without authorization. • Copyright: – Get a license: Copyright in original UGC belongs to the user, unless agreed otherwise. If you re-post, make sure what you’re reposting does not contain copyright violations. – Fair use is an affirmative defense, but can be very tricky 11
  • 12. Digital Millennium Copyright Act (DMCA) 17 USC § 512 • Protects Intellectual Property(sword): Notice and Takedown procedures without litigation. • Protection From User's Infringing Acts (shield): "Safe Harbor" protects service providers until notice Lenz v. Universal, 572 F.Supp.2d 1150 (N.D. Cal. 2008) of a violation is properly given. http://www.youtube.c om/watch?v=N1KfJH FWlhQ 12
  • 13. Social Media – Litigation Concerns • Discovery, preservation issues: – Ensure that data can be preserved, retrieved and produced if required. – Adopt/implement written computer maintenance schedule. – Include procedures for preserving electronic records in case of subpoena or threatened litigation; and – Consult legal counsel and IT early to identify computers/other devices of employer, employees and third parties that may have relevant information. • Just because an attorney is cc’d, doesn’t make it privileged. • If a privilege exists, it can be lost: Once communications are shared with others, any privilege of confidentiality will be lost. 13
  • 14. Federal Regulations • HIPAA : Healthcare Insurance Portability and Accountability Act of 1996. • Nurses in Wisconsin terminated for posting patient Xrays on Facebook • Univ of Mexico Hospital workers terminated for taking pictures of patient injuries with cellphone cameras and posting them on MySpace • HITECH Act – requires businesses or third parties who receive HIPAA information to maintain confidentiality and must notify people if their confidential information is released. 14
  • 15. Federal Regulations • Food, Drug, and Cosmetics Act (FDCA) – regulation of labeling and advertising for drugs and devices. – Labeling – brochures, detailing pieces, letters, prices lists, etc. – Advertising – journals, magazines, broadcast media, telephone, etc. • FDA says all manufacturers are in control of their websites and thus all FDCA requirements apply. – Testimonials – especially for an off-label use – can create a problem for the company 15
  • 16. Federal Regulations • FTC Regulations • Testimonials/Endorsements regulation implemented in 2009. • Must disclose connections between advertisers and their endorsers that might materially affect the weight or credibility of the endorsement • Free Product is considered compensation • Children’s Online Privacy Protection Act (COPPA); 15 U.S.C. 6501-6506; 16 CFR Part 312. • Applies to websites that target children under 13 or know, or should know, that a visitor is under age 13 16
  • 17. Social Media – User Privacy Concerns FTC Staff Report: Self-Regulatory Principles For Online Behavioral Advertising (Feb. 2009) • Transparency: The Report calls for companies to obtain affirmative express consent from consumers for material changes in use of PII • Consumer Control: clear statement that (1) data about consumers’ activities online is being collected for behavioral advertising and (2) consumers can choose whether or not to have their information collected for such purpose. 17
  • 18. Social Networks – SEC regulation • Violation of securities laws: Loose communication about public companies might violate securities laws that regulate material misstatements, public disclosures, and solicitations made by or on behalf of the company. • Example, in 2007, the SEC opened an informal inquiry into Whole Foods CEO John Mackey’s “sock puppet” activities, that is, his anonymous posts and commentary to online financial message boards praising Whole Foods and offering other opinions about its competitors. Mackey was eventually cleared, but not before he and the company were dragged through a media gauntlet. 18
  • 19. Yikes! What can I do about all of this? 19
  • 20. Website Privacy Policies and Terms of Use 20
  • 21. Website Privacy Policies and Terms of Use • Two perspectives: – Looking: from inside your home site to outside – Looking: from outside to inside a third party site • Are they “contracts” or “policies”? – The FTC says they are contracts • The ideal is “spontaneous participation” in social media, but the reality is that enterprises must require disciplined participation according to rules – Pointer: make underlying rules look like spontaneous participation (technical and process measures) 21
  • 22. How the Two Fit Together •Privacy Policy •Terms of Use • Notice of privacy practices • Define services – Definition of personal information • Rules on passwords & authentication – Host’s use of personal information • Technology rules (bots, deep-linking) – Sharing of personal information • Code of conduct between users • Grants and cross-grants of rights • Consent • Advertisement policies • Access • Right to Monitor • Security • DMCA information • Enforcement • Member disputes • Warranties, disclaimers & general 22
  • 23. Privacy controls • User behavior – Facebook admonitions • “Please choose carefully the information you post on your profile, and that you provide to other Members. • If you make your profile freely available to other Members, your profile should not include information that personally identifies you, such as your telephone number, street address, last name, email address, and any geographically recognizable photographs.” • User choice – Ability to opt-in and opt-out 23
  • 24. Employment Law Issues 24
  • 25. Social Media for Employers •Use of Social Media to Recruit and Screen Job Applicants. •Social Media at Work. 25
  • 26. Use of Social Media to Recruit and Screen Job Applicants • Recruiting – Identify potential applicants who might not be looking for a new job – Target applicants with specific job levels and skill sets • Screening – Vet job applicants for corporate culture “fit” – Verify qualifications on an applicant’s resume or CV 26
  • 27. Use of Social Media to Recruit and Screen Applicants •73% of employers use social networks or social media to support their recruitment efforts (Jobvite survey, 2010). •53% of employers research job candidates on social media websites (CareerBuilder.com survey, 2010). 27
  • 28. Screening Applicants Online • A 2008 SHRM survey found that negative information found through social media was more likely to affect an employer than positive information. • According to CareerBuilder.com, 2 in 5 employers had found content on a social network site that dissuaded them from hiring a candidate. – Lies about qualifications on resumes or CV’s – Discriminatory comments – Questionable judgment – Provocative or inappropriate photographs 28
  • 29. Revoking Offers • A soon-to-be Cisco employee posted the following tweet on Twitter: – Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work. • Tim Levad at Cisco saw the tweet, and tweeted him back: – Who is the hiring manager? I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the web. • This post went viral overnight and became an internet sensation. The offer was subsequently rescinded. (CA Labor & Employment Bulletin, p. 91March/April 2010.) 29
  • 30. Pitfalls of Pre-employment Online Screening • Discrimination – Failure to Hire • Case Study: Gaskell v. University of Kentucky, E.D. Kentucky, Nov. 23, 2010 • Facts: – The University of Kentucky wanted to hire a Founding Director for its astronomical observatory. The University put together a search committee which received about 12 applications for the position. – The most qualified applicant by far was Martin Gaskell. He was the top candidate until… 30
  • 31. Gaskell v. University of Kentucky (cont.) • One of the members of the search committee conducted an internet search for information about Gaskell and found his professional website which linked to his personal website which contained an article titled “Modern Astronomy, the Bible, and Creation.” • This information was circulated to the entire search committee. • From there, the search committee discussed Gaskell’s religious beliefs with other professors at the University, with the University Dean and Provost, and with Gaskell’s previous employer. The search committee also reviewed Gaskell’s student evaluations for references to his religious beliefs. 31
  • 32. Gaskell v. University of Kentucky (cont.) • In the end, Gaskell was not hired for the position. Instead, a less qualified candidate was selected. • Gaskell filed a lawsuit claiming that he was not hired because of religious discrimination. • The Court’s Decision: • The court concluded that the case should go to trial because Gaskell had presented direct evidence of discrimination. • The smoking gun? An email from the chair of the search committee. 32
  • 33. Gaskell v. University of Kentucky (cont.) • The email, with the subject line “The Gaskell Affair,” stated: • It has become clear to me that there is virtually no way Gaskell will be offered the job despite his qualifications that stand far above those of any other applicant. Other reasons will be given for this choice when we meet Tuesday. In the end, however, the real reason why we will not offer him the job is because of his religious beliefs in matters that are unrelated to astronomy or to any of the duties specified for this position. (For example, the job does not involve outreach in biology.). . . If Martin were not so superbly qualified, so breathtakingly above the other applicants in background and experience, then our decision would be much simpler. We could easily choose another applicant, and we could content ourselves with the idea that Martin's religious beliefs played little role in our decision. However, this is not the case. As it is, no objective observer could possibly believe that we excluded Martin on any basis other than religious. . . . 33
  • 34. How to Avoid Claims Arising From Social Media Searches of Job Applicants •Implement and consistently follow practices and procedures regarding social media screening of applicants. •Train hiring personnel. 34
  • 35. Suggestions and Considerations for a Social Media Screening Practice and Procedure • Create a list of the lawful information the company wants to find out from the online search and use that list in every search. • Decide whether the company will screen all applicants for all positions, or only for certain positions. • Have a neutral person conduct the online screening, filter out any protected information about the applicant, and report to the decision maker only information that lawfully can be considered. • Consider whether to conduct the online search before or after the in-person interview. • Consider whether to provide notice to applicants and whether to obtain the applicant’s consent before conducting the online search. Notice and consent is required if using a third party vendor. 35
  • 36. Social Media at Work 36
  • 37. Employees’ use of social networking sites • During work hours using the employer’s computer system. • On the employee’s own time using the employer’s computer system. • On the employee’s own time and about the company. • On the employee’s own time and about personal, but potentially illegal or otherwise objectionable, topics. 37
  • 38. Overview of Employment Law Issues • Fair Employment Practices • Invasion of Privacy • Stored Communications Act • Labor Law • Wage and Hour 38
  • 39. Fair Employment Practices • Two general areas of concerns: Disparate Treatment and Harassment. • Disparate Treatment: – Posts by a manager or supervisor on a social media site may be used as evidence of a discriminatory animus or provide admissions to support a discrimination claim. – Discriminatory application or enforcement of the employer’s social media policy. • Harassment: The use of blogs and other social media outlets to create an unlawful hostile work environment for an employee or group of employees in a protected class. 39
  • 40. Maremont v. Susan Fredman Design Group, Ltd., 2011 WL 902444 (N.D. Ill. 2011) • Plaintiff, Jill Maremont, was the Director of Marketing, Public Relations and e-commerce for an interior design firm. • She had a popular personal following on Facebook and Twitter, and posted to both sites for work. • She created and posted to a blog for the interior design firm. • Plaintiff’s picture appeared on each Facebook post and Tweet. • She was seriously injured in an accident and was unable to work for 9 months. 40
  • 41. Maremont v. Susan Fredman Design Group, Ltd. • While Maremont was out of work, her co-workers made Facebook posts and Tweets that looked like Maremont sent them. • She asked them to stop but they did not. • She finally changed her passwords. • She decided not return to work because of the firm’s hostility toward her. 41
  • 42. Maremont v. Susan Fredman Design Group, Ltd. • Maremont brought a false endorsement claim under the Lanham (Trademark) Act against her employer. • False endorsement occurs when a person’s identity (the trademark) is connected with a product or service in such a way that consumers are likely to be misled about that person’s sponsorship or approval of the product or service. • Her employer, the interior design firm, filed a motion to dismiss. 42
  • 43. Maremont v. Susan Fredman Design Group, Ltd. • The Court denied the motion to dismiss because Maremont alleged: – She was well-known in the interior design community and had a popular personal following on Facebook and Twitter. – She used Facebook and Twitter in a commercial context as an employee of the interior design firm. – Her employer deceptively used her name and picture to make posts on Facebook and Tweet. 43
  • 44. Maremont v. Susan Fredman Design Group, Ltd. • Lessons Learned: • If you want an employee to post to social media sites as part of his or her job duties, be sure to have the employee do so using the company’s Facebook page or Twitter name or blog. • The company can control the content of what is posted and what is not. • If the employee is unable to post or no longer works for the company, the company keeps the page/blog/name and the following. • No liability for Lanham Act violations. 44
  • 45. Pietrylo v. Hillstone Restaurant Group, 2009 WL 3128420 (D.N.J. 2009) • Former employees claimed violation of Stored Communications Act. • The Act makes it an offense to intentionally access stored communications without authorization or in excess of authorization. • Exception: Conduct authorized by a user of the service with respect to the communication intended for that user. • Example: A Facebook account holder may authorize a non- account holder to access the account holder’s account. 45
  • 46. Pietrylo v. Hillstone Restaurant Group • At issue was whether an employee “voluntarily” granted access to management to access the employee’s account on MySpace to access the “Spec- Tator” group, which housed pages created by employees to vent about work. 46
  • 47. Pietrylo v. Hillstone Restaurant Group • The employee testified that: – She had to give her MySpace password to her supervisor because she worked for the restaurant and for the supervisor. – She would not have given her supervisor the password if he had not been a manager. – She would not have given her MySpace password to other co-workers. – She felt that she would have gotten in trouble if she had not given him the password. 47
  • 48. Pietrylo v. Hillstone Restaurant Group (2009) • Jury verdict for the former employees • The restaurant, through its managers, had knowingly or intentionally or purposefully accessed the Spec-Tator group without authorization on 5 occasions. • The court denied the defendants’ motion for new trial and motion for judgment as a matter of law, concluding that the jury could reasonably infer that the employee’s purported “authorization” was coerced or provided under pressure. 48
  • 49. Wage and Hour (Fair Labor Standards Act) • Nonexempt employees – Minimum wage for all “hours worked” – Overtime for all “hours worked” over 40 in a workweek • Use of social media on behalf of employer – May be “hours worked”, if employer had actual or constructive knowledge and gave explicit or implicit consent. – Even if outside of normal working hours. 49
  • 50. Labor Law/National Labor Relations Act SECTION 7 OF NLRA • Provides all nonsupervisory employees the right to engage in protected and “concerted” activity • Includes discussions of “terms and conditions of employment” • Affords protection to non-unionized employees as well as employees represented by union 50
  • 51. Labor Law (continued) SECTION 7 OF NLRA • Employer violates section 7 if employees would reasonably interpret work rule to limit concerted activity. • Violation occurs even if employer never enforces rule in a way that infringes on Section 7 rights. • Work rules relating to social media posts are unlawful if they can be reasonably interpreted as limiting employees’ right to discuss terms and conditions of employment. 51
  • 52. Labor Law (continued) Examples of overly restrictive policies include rules prohibiting posting or discussion of: • Wages or benefits. • “Gossip” • Derogatory statements about employer or managers. • “Company’s business” 52
  • 53. Facebook & Protected Concerted Activities Protected Concerted Activity Individual Grievances and Gripes Prohibiting “disparaging, discriminatory Posting that customers are “rednecks” or defamatory comments” about and hoping that they choke on glass as Company, supervisors, or coworkers they drove home drunk; no response from co-workers (although he received a Facebook message from his boss that he was fired!) Criticizing supervisor on Facebook Complaining on Facebook to sister-in- law about not getting a raise and doing the work of waitresses without tips Posting comment on Facebook Posting that “mental institution” where criticizing food and beverage served at employee worked (actually a homeless sales event because poor quality affected shelter) was “spooky” at night; employee sales commissions; employee was was not “friends” with co-workers on “friends” with co-workers on Facebook Facebook 53
  • 54. Labor Law (continued) • Unlawful Surveillance: Monitoring or creating impression that employer is monitoring employee’s private, off hours social media posts related to union organizing. • However, it is lawful to routinely scan a broad range of social media sites for references to the employer or its products/services. – The employer is not focused on or creating the impression of focusing on union activity. – Thus, the employer should not be seen as spying on its employees’ protected and concerted activities. 54
  • 55. Minimizing the Risks because of Employees’ Use of Social Media • Implement and consistently follow policies and procedures regarding employees’ use of online social networking, blogging, and other social media sites (e.g. YouTube) at work and outside of work. • Develop a (lawful and reasonable) method to check compliance with the policies and procedures. 55
  • 56. Basics of a Social Media Policy • Define what constitutes “social media” and “blogging” – “Blogging” should be defined to mean all web postings, such as those in chat rooms, on bulletin boards, and social networking sites (“micro-blogging”). • On social media sites that are not employer-sponsored, employees who mention their employer’s name should be required to include a disclaimer that the statements posted are those of the poster and do not necessarily represent the opinion of the employer and have not been approved or otherwise reviewed by the employer 56
  • 57. Basics of a Social Media Policy (continued) • Don’t prohibit all postings relating to the employer because that would violate the NLRA. – Specifically define what topics are “off-limits.” • Notify employees that the policy applies at all times. • Advise employees to notify their supervisor or human resources about possible violations of the policy or other company policies, such as anti- harassment policies. • Notify employees that the company monitors internet usage on company- provided equipment and system for compliance with the policy. – This includes an employee’s personal email account that is accessed using the company’s computer system. 57
  • 58. Basics of a Social Media Policy (continued) • A social media policy may prohibit: – The disclosure of the employer’s confidential information (which should be defined elsewhere in the handbook) – Disparaging remarks about the employer’s products or services – Disparaging and defamatory comments about competitors and other third-parties (especially if the poster identifies his or her employer) – Postings that threaten, harass or intimidate coworkers – Postings that endorse the employer’s products or services. 58
  • 59. Basics of a Social Media Policy (continued) • A social media policy may prohibit: – Employees from using the employer’s trademark or logo without consent of a designated company official – Employees from using the employer’s computer systems or network access for posting to social media sites that are not sponsored by the employer – Postings that violate patient confidentiality or privacy rights under state or federal law (e.g., HIPAA). • Where employees are permitted to post on behalf of or for the employer, include policies limiting when employees may make those posts so as to control overtime. 59
  • 60. Monitoring Employee Use of Social Media Sites (Lawfully) • Set up “Google alert” for company name and other key words. • Conduct key word search through company server. • Use of Internet search tools that provide “real-time and interactive social media monitoring and analytics” – Examples: sysomos, buzzstream, biz360, customscoop, echosonar, sentimentmetrics (not an endorsement) 60
  • 61. THANK YOU Jennifer A. Mansfield Lindsay Dennis Swiger Jennifer.Mansfield@hklaw.com Lindsay.Swiger@hklaw.com 50 N. Laura Street, Suite 3900 Jacksonville, FL 32202 904-353-2000 61