SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
Social Media, Employee
   Privacy Interests and
Employer Business Interests
        Victoria L. Herring
         December 2011




                 1
Social Media? Anti-Social Media?

One-way delivery of information
      memos, letters, brochures, ads
         versus
two-way ‘street’, interaction between
parties; collaboration
      blogs, networks, social sites



                   2
Examples of Social Media

 Facebook and LinkedIn
 Twitter
 Digg, Delicious and StumbleUpon
 YouTube and SlideShare
 Flickr, Picasa, Instagram



                  3
“...And thus, is great teaching in action. Great teachers are now
    syndicators (sp?) of content. Great teachers share. Great
                      teachers teach us all.”




                4
Types of Social Media Sites

Sharing of all sorts of things
  News & Articles [blogs, news
 aggregators]

  Information [chat rooms, IMs, texts]

   Images [Flickr, Picasa, Google
 Images, iReporter]

  Knowledge [Wikipedia]


                5
Privacy Rights Clearinghouse
         www.privacyrights.org




     Categories of Social Media
     Personal

     Status Update
     Location
     Content-sharing
     Shared Interest


                 6
Social Media as Evidence
Relationships
Location
Activities
Lack of emotional distress, damage
Reputation
Billing practices
Copyright or Trademark Use
Employment actions

                7
Dangers from use of Social Media
  Misunderstandings
   sarcasm, parody, joking
  Divulging information broader than
  intended
   failure to properly set privacy settings
   failure to understand what is or is not
   private
  Permanent record
   assuming fleeting nature of what is said
   misunderstanding electronic media
                     8
Internet Archive: www.archive.org
       “Wayback Machine”




                9
May 8, 1998, Apple.com
          10
Employee Privacy Interests
 Legal Protections for Employees

   Federal Constitution

   Federal Statutes

   State Statutes

   Common Law Recognition


                    11
Other Rights?


lst Amendment Rights:
  Free Speech
  Petition the Government
  Peaceable Assembly
  Free Press



            12
Distinction between Government and
          Private Employment

   Constitutional Provisions limit intrusion
   upon employee’s privacy by government

   Statutory provisions may affect private
   employer’s ‘right’ to intrude on its
   employees




                       13
Federal Statutes
Electronic Communications Privacy Act of 1986,
amending the Wiretapping Act

FACTA: Fair & Accurate Credit Transaction Act of
2003, amending the Fair Credit Reporting Act
[FCRA]

Health Insurance Portability & Accountability Act of
1996 [“HIPAA”], 42 U.S.C. § 1302(d) & regulations
   no private right of action under HIPAA, go thru
   HHS & Department of Justice


                       14
National Labor Relations Act



NLRB interprets to protect employees:
  surveillance cameras

  meetings regarding discipline

  free speech if a matter of employment concern




                         15
Software to Monitor




“a computer monitoring tool that records what your employee,
         roommate or child does on your computer”


                             16
Methods of Monitoring
          Telephone
Computer [keystroke monitoring]
          Mail, eMail,
           Voicemail
       Video surveillance
         Social Media

               17
Cautions re Monitoring
Depends on application of EPCA, Federal and
State* Laws, Employer policies and assurances.
    Telephone
    Computer [keystroke monitoring]
    Mail, eMail [not private if employer’s terminal]
    Voicemail, IMs
    Video surveillance
    Social Media
                              *Note: Iowa differs from California, etc.

                         18
Monitoring with Social Media




             © Dilbert by Scott Adams, DMRegister 12/4/11


             19
Government Employees
O’Connor v. Ortega [1987]: 4th
Amendment applies == the question is
whether the employee
  has a reasonable expectation of privacy in
  area searched
  whether employer’s search of area was
  reasonable under circumstances: “context”



                    20
O’Connor v. Ortega

operational realities of the workplace may make
expectation of privacy unreasonable
tested on case-by-case basis: depends on context and
balance of legitimate expectation of privacy with
employer need for supervision, control and efficient
operation of workplace




                       21
O’Connor
 public employee’s reasonable expectation is
 qualified, subject to the ‘operational realities’ of the
 workplace

         policy in existence?

         keys to the office?

         work-based need for

          investigation?

         consent given?

         other factors, Quon

                           22
City of Ontario, California v. Quon,
                6/17/2010

Police official sent text messages. Department
had computer policy on personal use of email,
not of text messages although treated them
the same.
Messages reviewed, many personal and some
sexually explicit - Quon was disciplined for
violation of department rules.


                     23
Under O’Connor, Quon had reasonable
expectation of privacy. The question was
whether the search was reasonable.

  Criteria for justifying search = a work
  related purpose, not excessively
  intrusive, among others



                  24
Private Employee Rights
Must be provided a copy of his or her personnel file, under
Section 91B, Iowa Code

ADA & ICRA Protections ref. medical information; see
ADA § 12112(d)(3)(B) & 29 CFR § 1630.14(b)(1)

Electronic Communications Privacy Act [ECPA];
digital privacy protections, outstripped by
technology




                          25
Private Employee Rights
Some Courts have recognized email as protected
by the ECPA, and others have not
   ECPA: email over 6 months old ‘abandoned’
   versus continual existence in the ‘cloud’
May depend upon employer adoption of policies
and notice to employees of what they can expect,
or not, in terms of personal privacy




                       26
Private Employee Rights
 General view: employer ownership of
 place of employment and Iowa view of ‘at
 will’ employment combine to limit
 expectation of personal privacy in the
 private workplace
    especially if policy or other notice
    provided

                     27
Unionized Employees
Brewers & Maltsters, Local No. 6, D.C.
Cir. 2005 [NLRB]:
   secretive installation of hidden
   surveillance cameras in workplace
   violated NLRA because their use was a
   subject of bargaining



                    28
T or more Employees
      wo

NLRB applies to employees engaged in
“concerted activity”, regardless of
whether unionized
NLRB v. American Medical Response of
Connecticut, Inc., NLRB No. 34-
CA-12576; postings on Facebook which
are protected, concerted activity cannot
be used to discipline or fire employees

                    29
NLRB v. American Medical Response
NLRA gives employees rights to complain
about pay, safety and other working
conditions.
   AMR: employee who called her supervisor
   a “scumbag” [and worse] on Facebook
   from home computer could not be fired -
   postings were made in online discussion
   among employees about supervisory
   action, provoked by unlawful denial of
   union representation.
                    30
NLRB v. American Medical Response



NLRB: employee posting on Facebook
engaged in protected concerted activity
AMR policy/firing interfered with
employees’ right to engage in concerted
activities
   cannot ban discussion of wages, employment conditions

   cannot have an overly broad policy




                       31
Huffington Post: “Fired over Facebook, 13 Posts
            that Got People CANNED”
    surfing FB while home ‘sick’

    FB posted photos caused firing of professional football
    cheerleader

    13 crew members on Virgin Atlantic participated in FB
    discussion; references to passengers & bringing company into
    disrepute

    fired for a derogatory, mocking FB group that mocked
    customers

    high school teacher for FB photos with wine, beer & expletive

    posting of video derogatory of employer; exposing patient
    confidential information [HIPPA violation]


                                  32
TSA Agent - anti-Muslim, racist FB comments
Doctor fired after posting information about a
trauma patient on FB page, even if did not
reveal name
State police officer fired because of FB photos
and comments about being drunk
Professor fired after posting about a failing
student; teacher fired for joking about
drowning her students


[search, Huffington Post, “fired over Facebook”; not all firings
                        were upheld]




                            33
Watch what you Say
100155.strip.zoom.gif 1,000×311 pixels                                                  12/13/11 10:05 AM




                                                     © Dilbert by Scott Adams, www. Dilbert.com




                                                34
Wiretapping & Eavesdropping

“Get a good night’s sleep, and don’t
bug anybody without asking me.”
  Richard M. Nixon to re-election campaign manager
  Clark MacGregor, recorded on tape [Christian
  Science Monitor, 8/14/80]




                       35
Eavesdropping
Eavesdrip is an Anglo-Saxon word, and refers to the wide
overhanging eaves used to prevent rain from falling close to a
house's foundation. The eavesdrip provided "a sheltered place
where one could hide to listen clandestinely to conversation
within the house."       W. MORRIS & M. MORRIS, MORRIS DICTIONARY OF WORD AND PHRASE ORIGINS,

198 (1977)




Dilbert by Scott Adams, from http://www.spybusters.com/History_Cartoons.html

                                          36
Can We Tape?
State v. Philpott, 702 N.W.2d 500 (Iowa 2005), illegal
to tape while not present.

Iowa Code § 727.8: Electronic and Mechanical
eavesdropping - a misdemeanor
   Any person, other than a participant or listener to
   communication, without right or authority who taps
   into or connects a device to any telephone or other
   communication wire
   or who by any electronic or mechanical means listens
   to, records, intercepts a communication



                        37
Iowa Code Ch. 808B: Interception of
Communications - a felony
  Unless as specifically authorized under Chapter 808B

  willfully intercepts or endeavors to intercept a wire, oral or
  electronic communication; uses or endeavors to use an
  electronic, mechanical or other device to intercept any oral
  communication

  willfully discloses contents or uses them knowing it was
  obtained in violation of Ch. 808B.2, although some
  exceptions for communications carrier employees and
  parties to communication, or prior consent given




                              38
Section 808B.7: contents of intercepted
communication shall not be received in evidence “if
the disclosure of that information would be in
violation of this chapter”.

Section 808B.8: person whose communication is
intercepted, disclosed or used has a cause of action
against any person who does that, for injunction
and damages




                      39
Can we Use the Information?
Genetic Nondiscrimination Act of 2008
[GINA];      illegal to use or discriminate because of
‘genetic information’

“Genetic Information” broadly defined [disease/disorder in
family]

Exceptions for inadvertent disclosure, etc.

Example: Employee fired a week after mentioning that her
mother had died of Huntington’s disease and she had 50%
chance of developing it.

  in context of social media: mention of such on blog, FB,
  etc. in casual conversation which is then known to
  employer - Q whether ‘inadvertent’ or not?


                           40
1986 Electronic Communications Privacy Act
[ECPA], 18 U.S.C. § 2510 et. seq.
     prohibits interception of wire, oral or
     electronic communications
    ECPA added prohibition against
    interception or accessing electronic
    communications
    Warrant requires to obtain emails stored up
    to 180 days, not afterward




                      41
U.S. v. Warshak, 6th Circuit; 4th
Amendment & ECPA: A warrant is
required for searches within the 6
months. There is a reasonable
expectation of privacy for emails
stored on 3rd party servers.



                 42
United States v. Jones, U.S.S.Ct., decided
Jan 2012: GPS Satellite monitoring of
vehicle’s movements is a “search” and violates
the 4th Amendment to the U.S. Constitution.

     -- Earlier cases [Karo, Knotts] in
    U.S.S.Ct. had allowed use of a
    monitoring device while moving in
    public or if limited in extent.



                      43
Life of an Email
      Email                 message
Written [computer]         packetized
                                            INTERNET

 Packets                Packet            Re-packetized
 Routed               Reassembled
                       & Copied



  Message                                      Received at
   Stored               Reassembled            Mailserver



                     Retrieved & Read

                                 44
Post
                                   Life of a Posting
                Upload
Written           to
                 web                     INTERNET

Packets
                       Re-assembled, re-packetized
Routed

                                              Public
  Posting
                                                or
 stored on
                        Reassembled           Private
  Server                                      Access?

             Retrieved & Read
             and stored forever
                             45
Library of Congress is
creating an Twitter archive
of all public tweets since
         2006 -




             46
Employer’s Protections
 Theory of At Will Employment
 Policies governing appropriate use of
 employer’s facilities, including
 communications and computer equipment
    Handbook
    separate policy
    signed receipt

                      47
Handbooks and Manuals

   retention policies

   destruction policies and procedures

   FACTA - FTC regulations on proper
   disposition of records & handling of employee
   misconduct investigations




                        48
Ownership of Social Media Writings

   non-compete agreements
   non-solicitation agreements
   intellectual property agreements
   confidentiality agreements
   severance agreements



                49
non-compete agreements and non-solicitation
agreements -
 Amway Global v. Woodward, E.D. Mich. 9/30/10, blog post can be
 evidence of solicitation

 TEKSystems v. Hammernik, 2010, complaint alleges violation of
 Noncompete and nonsolicit agreements based on Defendant’s
 LinkedIn profile.

intellectual property/trade secrets
 Sasqua Group, Inc. v. Courtney, E.D. N.Y. 2010, employer failure to
 treat information truly secret meant customer list not such in today’s
 Internet society




                              50
Risk to Employers: Failing to treat social
media abuse differently from harassment

   Kiesau v. Bantz, 686 N.W.2d 164 [Iowa
   2004]: emailed photoshopped image
   resulted in $150,000 judgment plus
   possibility of more for failure to
   properly supervise


                    51
Some online resources particularly
helpful:

   Privacy Rights Clearinghouse,
   www.privacyrights.org

   Electronic Privacy Information Center
   www.epic.org




                     52
Thank you.

 Victoria L. Herring

                   53

Mais conteúdo relacionado

Mais procurados

Online Privacy
Online PrivacyOnline Privacy
Online Privacyapazooki2
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
Social media, staff policy and law legal
Social media, staff policy and law legalSocial media, staff policy and law legal
Social media, staff policy and law legalAdam Lewis
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaBailey and Wyant PLLC
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
 
Social networking navigating the work place minefield
Social networking   navigating the work place minefieldSocial networking   navigating the work place minefield
Social networking navigating the work place minefieldRedchip
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineAllen Matkins
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual PropertyPrimumMarketing
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHNI Risk Services
 
The Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for DummiesThe Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for DummiesEMC
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 
Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011LexisNexis
 

Mais procurados (20)

Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Social media, staff policy and law legal
Social media, staff policy and law legalSocial media, staff policy and law legal
Social media, staff policy and law legal
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social Media
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data Security
 
Social networking navigating the work place minefield
Social networking   navigating the work place minefieldSocial networking   navigating the work place minefield
Social networking navigating the work place minefield
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims Handling
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
The Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for DummiesThe Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for Dummies
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
DOI Social Media Guidebook
DOI Social Media GuidebookDOI Social Media Guidebook
DOI Social Media Guidebook
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
Online Piracy Paper
Online Piracy PaperOnline Piracy Paper
Online Piracy Paper
 
Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011
 

Destaque

Mac Tech Resources for Lawyers [outline] [Jan 2015]
Mac Tech Resources for Lawyers [outline] [Jan 2015]Mac Tech Resources for Lawyers [outline] [Jan 2015]
Mac Tech Resources for Lawyers [outline] [Jan 2015]Victoria Herring
 
Social Networking: De-Mystifying the Trend
Social Networking: De-Mystifying the TrendSocial Networking: De-Mystifying the Trend
Social Networking: De-Mystifying the TrendVictoria Herring
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and PrivacyTypeset
 
Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean? Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean? Crafted
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
Hackers vs Hackers
Hackers vs HackersHackers vs Hackers
Hackers vs Hackersjobandesther
 
Unblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyUnblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyDragnoz -
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaJOSE LUIS
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersWSO2
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 

Destaque (20)

Social media privacy
Social media privacySocial media privacy
Social media privacy
 
Mac Tech Resources for Lawyers [outline] [Jan 2015]
Mac Tech Resources for Lawyers [outline] [Jan 2015]Mac Tech Resources for Lawyers [outline] [Jan 2015]
Mac Tech Resources for Lawyers [outline] [Jan 2015]
 
Social Networking: De-Mystifying the Trend
Social Networking: De-Mystifying the TrendSocial Networking: De-Mystifying the Trend
Social Networking: De-Mystifying the Trend
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Privacy & social media
Privacy & social media Privacy & social media
Privacy & social media
 
Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean? Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean?
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
La historia secreta del mossad
La historia secreta del mossadLa historia secreta del mossad
La historia secreta del mossad
 
Hackers vs Hackers
Hackers vs HackersHackers vs Hackers
Hackers vs Hackers
 
Unblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyUnblocking the brain so you can think creatively
Unblocking the brain so you can think creatively
 
Hacking
HackingHacking
Hacking
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Mossad
MossadMossad
Mossad
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-Users
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 

Semelhante a Privacy and Social Media

Pleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlinePleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlineAllen Matkins
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and BeyondAlexNemiroff
 
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTXAttention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTXKathryn Winn
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsCEL Public Relations
 
Student Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomStudent Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomChristina Gagnier
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)onlineprivacy
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12Maurice Blackburn Lawyers
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the WorkplaceAllisha Anderson
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeStacey Burke
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1James Williams
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Parsons Behle & Latimer
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxketurahhazelhurst
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxbartholomeocoombs
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy PrimerBrett Elphick
 

Semelhante a Privacy and Social Media (20)

Pleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlinePleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers Online
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
Social media in the workplace
Social media in the workplaceSocial media in the workplace
Social media in the workplace
 
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTXAttention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTX
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR Implications
 
Student Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomStudent Privacy Rights in the Classroom
Student Privacy Rights in the Classroom
 
Social media and its impact on employment
Social media and its impact on employmentSocial media and its impact on employment
Social media and its impact on employment
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the Workplace
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docx
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docx
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy Primer
 

Mais de Victoria Herring

Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]
Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]
Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]Victoria Herring
 
Closing a Practice in the Post PC World from GPSolo July/August 2012
Closing a Practice in the Post PC World from GPSolo July/August 2012Closing a Practice in the Post PC World from GPSolo July/August 2012
Closing a Practice in the Post PC World from GPSolo July/August 2012Victoria Herring
 
When Your Pastime becomes a Profession
When Your Pastime becomes a ProfessionWhen Your Pastime becomes a Profession
When Your Pastime becomes a ProfessionVictoria Herring
 
Note Taking Applications for Mac Users [2010]
Note Taking Applications for Mac Users [2010]Note Taking Applications for Mac Users [2010]
Note Taking Applications for Mac Users [2010]Victoria Herring
 
Ditch the Laptop for the iPhone 3G [2008]
Ditch the Laptop for the iPhone 3G [2008]Ditch the Laptop for the iPhone 3G [2008]
Ditch the Laptop for the iPhone 3G [2008]Victoria Herring
 
iPhone, you phone, we all phone [2010]
iPhone, you phone, we all phone [2010]iPhone, you phone, we all phone [2010]
iPhone, you phone, we all phone [2010]Victoria Herring
 
The Iowa judicial System: Merit-based Selection
The Iowa judicial System:  Merit-based SelectionThe Iowa judicial System:  Merit-based Selection
The Iowa judicial System: Merit-based SelectionVictoria Herring
 
Managing Gender Issues in the Workplace
Managing Gender Issues in the WorkplaceManaging Gender Issues in the Workplace
Managing Gender Issues in the WorkplaceVictoria Herring
 
Retaliation and Whistleblower Claims
Retaliation and Whistleblower ClaimsRetaliation and Whistleblower Claims
Retaliation and Whistleblower ClaimsVictoria Herring
 
Bhutan Photography Tour in 2006
Bhutan Photography Tour in 2006Bhutan Photography Tour in 2006
Bhutan Photography Tour in 2006Victoria Herring
 

Mais de Victoria Herring (13)

Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]
Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]
Mac OS X and iOS resources for litigators [GPSolo Magazine, SeptOct 2014]
 
Closing a Practice in the Post PC World from GPSolo July/August 2012
Closing a Practice in the Post PC World from GPSolo July/August 2012Closing a Practice in the Post PC World from GPSolo July/August 2012
Closing a Practice in the Post PC World from GPSolo July/August 2012
 
When Your Pastime becomes a Profession
When Your Pastime becomes a ProfessionWhen Your Pastime becomes a Profession
When Your Pastime becomes a Profession
 
My Working iVacation
My Working iVacationMy Working iVacation
My Working iVacation
 
Note Taking Applications for Mac Users [2010]
Note Taking Applications for Mac Users [2010]Note Taking Applications for Mac Users [2010]
Note Taking Applications for Mac Users [2010]
 
Macs at Trial [2009]
Macs at Trial  [2009]Macs at Trial  [2009]
Macs at Trial [2009]
 
Ditch the Laptop for the iPhone 3G [2008]
Ditch the Laptop for the iPhone 3G [2008]Ditch the Laptop for the iPhone 3G [2008]
Ditch the Laptop for the iPhone 3G [2008]
 
iPhone, you phone, we all phone [2010]
iPhone, you phone, we all phone [2010]iPhone, you phone, we all phone [2010]
iPhone, you phone, we all phone [2010]
 
The Iowa judicial System: Merit-based Selection
The Iowa judicial System:  Merit-based SelectionThe Iowa judicial System:  Merit-based Selection
The Iowa judicial System: Merit-based Selection
 
Managing Gender Issues in the Workplace
Managing Gender Issues in the WorkplaceManaging Gender Issues in the Workplace
Managing Gender Issues in the Workplace
 
Retaliation and Whistleblower Claims
Retaliation and Whistleblower ClaimsRetaliation and Whistleblower Claims
Retaliation and Whistleblower Claims
 
Harassment Investigations
Harassment InvestigationsHarassment Investigations
Harassment Investigations
 
Bhutan Photography Tour in 2006
Bhutan Photography Tour in 2006Bhutan Photography Tour in 2006
Bhutan Photography Tour in 2006
 

Último

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 

Último (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

Privacy and Social Media

  • 1. Social Media, Employee Privacy Interests and Employer Business Interests Victoria L. Herring December 2011 1
  • 2. Social Media? Anti-Social Media? One-way delivery of information memos, letters, brochures, ads versus two-way ‘street’, interaction between parties; collaboration blogs, networks, social sites 2
  • 3. Examples of Social Media Facebook and LinkedIn Twitter Digg, Delicious and StumbleUpon YouTube and SlideShare Flickr, Picasa, Instagram 3
  • 4. “...And thus, is great teaching in action. Great teachers are now syndicators (sp?) of content. Great teachers share. Great teachers teach us all.” 4
  • 5. Types of Social Media Sites Sharing of all sorts of things News & Articles [blogs, news aggregators] Information [chat rooms, IMs, texts] Images [Flickr, Picasa, Google Images, iReporter] Knowledge [Wikipedia] 5
  • 6. Privacy Rights Clearinghouse www.privacyrights.org Categories of Social Media Personal Status Update Location Content-sharing Shared Interest 6
  • 7. Social Media as Evidence Relationships Location Activities Lack of emotional distress, damage Reputation Billing practices Copyright or Trademark Use Employment actions 7
  • 8. Dangers from use of Social Media Misunderstandings sarcasm, parody, joking Divulging information broader than intended failure to properly set privacy settings failure to understand what is or is not private Permanent record assuming fleeting nature of what is said misunderstanding electronic media 8
  • 9. Internet Archive: www.archive.org “Wayback Machine” 9
  • 10. May 8, 1998, Apple.com 10
  • 11. Employee Privacy Interests Legal Protections for Employees Federal Constitution Federal Statutes State Statutes Common Law Recognition 11
  • 12. Other Rights? lst Amendment Rights: Free Speech Petition the Government Peaceable Assembly Free Press 12
  • 13. Distinction between Government and Private Employment Constitutional Provisions limit intrusion upon employee’s privacy by government Statutory provisions may affect private employer’s ‘right’ to intrude on its employees 13
  • 14. Federal Statutes Electronic Communications Privacy Act of 1986, amending the Wiretapping Act FACTA: Fair & Accurate Credit Transaction Act of 2003, amending the Fair Credit Reporting Act [FCRA] Health Insurance Portability & Accountability Act of 1996 [“HIPAA”], 42 U.S.C. § 1302(d) & regulations no private right of action under HIPAA, go thru HHS & Department of Justice 14
  • 15. National Labor Relations Act NLRB interprets to protect employees: surveillance cameras meetings regarding discipline free speech if a matter of employment concern 15
  • 16. Software to Monitor “a computer monitoring tool that records what your employee, roommate or child does on your computer” 16
  • 17. Methods of Monitoring Telephone Computer [keystroke monitoring] Mail, eMail, Voicemail Video surveillance Social Media 17
  • 18. Cautions re Monitoring Depends on application of EPCA, Federal and State* Laws, Employer policies and assurances. Telephone Computer [keystroke monitoring] Mail, eMail [not private if employer’s terminal] Voicemail, IMs Video surveillance Social Media *Note: Iowa differs from California, etc. 18
  • 19. Monitoring with Social Media © Dilbert by Scott Adams, DMRegister 12/4/11 19
  • 20. Government Employees O’Connor v. Ortega [1987]: 4th Amendment applies == the question is whether the employee has a reasonable expectation of privacy in area searched whether employer’s search of area was reasonable under circumstances: “context” 20
  • 21. O’Connor v. Ortega operational realities of the workplace may make expectation of privacy unreasonable tested on case-by-case basis: depends on context and balance of legitimate expectation of privacy with employer need for supervision, control and efficient operation of workplace 21
  • 22. O’Connor public employee’s reasonable expectation is qualified, subject to the ‘operational realities’ of the workplace policy in existence? keys to the office? work-based need for investigation? consent given? other factors, Quon 22
  • 23. City of Ontario, California v. Quon, 6/17/2010 Police official sent text messages. Department had computer policy on personal use of email, not of text messages although treated them the same. Messages reviewed, many personal and some sexually explicit - Quon was disciplined for violation of department rules. 23
  • 24. Under O’Connor, Quon had reasonable expectation of privacy. The question was whether the search was reasonable. Criteria for justifying search = a work related purpose, not excessively intrusive, among others 24
  • 25. Private Employee Rights Must be provided a copy of his or her personnel file, under Section 91B, Iowa Code ADA & ICRA Protections ref. medical information; see ADA § 12112(d)(3)(B) & 29 CFR § 1630.14(b)(1) Electronic Communications Privacy Act [ECPA]; digital privacy protections, outstripped by technology 25
  • 26. Private Employee Rights Some Courts have recognized email as protected by the ECPA, and others have not ECPA: email over 6 months old ‘abandoned’ versus continual existence in the ‘cloud’ May depend upon employer adoption of policies and notice to employees of what they can expect, or not, in terms of personal privacy 26
  • 27. Private Employee Rights General view: employer ownership of place of employment and Iowa view of ‘at will’ employment combine to limit expectation of personal privacy in the private workplace especially if policy or other notice provided 27
  • 28. Unionized Employees Brewers & Maltsters, Local No. 6, D.C. Cir. 2005 [NLRB]: secretive installation of hidden surveillance cameras in workplace violated NLRA because their use was a subject of bargaining 28
  • 29. T or more Employees wo NLRB applies to employees engaged in “concerted activity”, regardless of whether unionized NLRB v. American Medical Response of Connecticut, Inc., NLRB No. 34- CA-12576; postings on Facebook which are protected, concerted activity cannot be used to discipline or fire employees 29
  • 30. NLRB v. American Medical Response NLRA gives employees rights to complain about pay, safety and other working conditions. AMR: employee who called her supervisor a “scumbag” [and worse] on Facebook from home computer could not be fired - postings were made in online discussion among employees about supervisory action, provoked by unlawful denial of union representation. 30
  • 31. NLRB v. American Medical Response NLRB: employee posting on Facebook engaged in protected concerted activity AMR policy/firing interfered with employees’ right to engage in concerted activities cannot ban discussion of wages, employment conditions cannot have an overly broad policy 31
  • 32. Huffington Post: “Fired over Facebook, 13 Posts that Got People CANNED” surfing FB while home ‘sick’ FB posted photos caused firing of professional football cheerleader 13 crew members on Virgin Atlantic participated in FB discussion; references to passengers & bringing company into disrepute fired for a derogatory, mocking FB group that mocked customers high school teacher for FB photos with wine, beer & expletive posting of video derogatory of employer; exposing patient confidential information [HIPPA violation] 32
  • 33. TSA Agent - anti-Muslim, racist FB comments Doctor fired after posting information about a trauma patient on FB page, even if did not reveal name State police officer fired because of FB photos and comments about being drunk Professor fired after posting about a failing student; teacher fired for joking about drowning her students [search, Huffington Post, “fired over Facebook”; not all firings were upheld] 33
  • 34. Watch what you Say 100155.strip.zoom.gif 1,000×311 pixels 12/13/11 10:05 AM © Dilbert by Scott Adams, www. Dilbert.com 34
  • 35. Wiretapping & Eavesdropping “Get a good night’s sleep, and don’t bug anybody without asking me.” Richard M. Nixon to re-election campaign manager Clark MacGregor, recorded on tape [Christian Science Monitor, 8/14/80] 35
  • 36. Eavesdropping Eavesdrip is an Anglo-Saxon word, and refers to the wide overhanging eaves used to prevent rain from falling close to a house's foundation. The eavesdrip provided "a sheltered place where one could hide to listen clandestinely to conversation within the house." W. MORRIS & M. MORRIS, MORRIS DICTIONARY OF WORD AND PHRASE ORIGINS, 198 (1977) Dilbert by Scott Adams, from http://www.spybusters.com/History_Cartoons.html 36
  • 37. Can We Tape? State v. Philpott, 702 N.W.2d 500 (Iowa 2005), illegal to tape while not present. Iowa Code § 727.8: Electronic and Mechanical eavesdropping - a misdemeanor Any person, other than a participant or listener to communication, without right or authority who taps into or connects a device to any telephone or other communication wire or who by any electronic or mechanical means listens to, records, intercepts a communication 37
  • 38. Iowa Code Ch. 808B: Interception of Communications - a felony Unless as specifically authorized under Chapter 808B willfully intercepts or endeavors to intercept a wire, oral or electronic communication; uses or endeavors to use an electronic, mechanical or other device to intercept any oral communication willfully discloses contents or uses them knowing it was obtained in violation of Ch. 808B.2, although some exceptions for communications carrier employees and parties to communication, or prior consent given 38
  • 39. Section 808B.7: contents of intercepted communication shall not be received in evidence “if the disclosure of that information would be in violation of this chapter”. Section 808B.8: person whose communication is intercepted, disclosed or used has a cause of action against any person who does that, for injunction and damages 39
  • 40. Can we Use the Information? Genetic Nondiscrimination Act of 2008 [GINA]; illegal to use or discriminate because of ‘genetic information’ “Genetic Information” broadly defined [disease/disorder in family] Exceptions for inadvertent disclosure, etc. Example: Employee fired a week after mentioning that her mother had died of Huntington’s disease and she had 50% chance of developing it. in context of social media: mention of such on blog, FB, etc. in casual conversation which is then known to employer - Q whether ‘inadvertent’ or not? 40
  • 41. 1986 Electronic Communications Privacy Act [ECPA], 18 U.S.C. § 2510 et. seq. prohibits interception of wire, oral or electronic communications ECPA added prohibition against interception or accessing electronic communications Warrant requires to obtain emails stored up to 180 days, not afterward 41
  • 42. U.S. v. Warshak, 6th Circuit; 4th Amendment & ECPA: A warrant is required for searches within the 6 months. There is a reasonable expectation of privacy for emails stored on 3rd party servers. 42
  • 43. United States v. Jones, U.S.S.Ct., decided Jan 2012: GPS Satellite monitoring of vehicle’s movements is a “search” and violates the 4th Amendment to the U.S. Constitution. -- Earlier cases [Karo, Knotts] in U.S.S.Ct. had allowed use of a monitoring device while moving in public or if limited in extent. 43
  • 44. Life of an Email Email message Written [computer] packetized INTERNET Packets Packet Re-packetized Routed Reassembled & Copied Message Received at Stored Reassembled Mailserver Retrieved & Read 44
  • 45. Post Life of a Posting Upload Written to web INTERNET Packets Re-assembled, re-packetized Routed Public Posting or stored on Reassembled Private Server Access? Retrieved & Read and stored forever 45
  • 46. Library of Congress is creating an Twitter archive of all public tweets since 2006 - 46
  • 47. Employer’s Protections Theory of At Will Employment Policies governing appropriate use of employer’s facilities, including communications and computer equipment Handbook separate policy signed receipt 47
  • 48. Handbooks and Manuals retention policies destruction policies and procedures FACTA - FTC regulations on proper disposition of records & handling of employee misconduct investigations 48
  • 49. Ownership of Social Media Writings non-compete agreements non-solicitation agreements intellectual property agreements confidentiality agreements severance agreements 49
  • 50. non-compete agreements and non-solicitation agreements - Amway Global v. Woodward, E.D. Mich. 9/30/10, blog post can be evidence of solicitation TEKSystems v. Hammernik, 2010, complaint alleges violation of Noncompete and nonsolicit agreements based on Defendant’s LinkedIn profile. intellectual property/trade secrets Sasqua Group, Inc. v. Courtney, E.D. N.Y. 2010, employer failure to treat information truly secret meant customer list not such in today’s Internet society 50
  • 51. Risk to Employers: Failing to treat social media abuse differently from harassment Kiesau v. Bantz, 686 N.W.2d 164 [Iowa 2004]: emailed photoshopped image resulted in $150,000 judgment plus possibility of more for failure to properly supervise 51
  • 52. Some online resources particularly helpful: Privacy Rights Clearinghouse, www.privacyrights.org Electronic Privacy Information Center www.epic.org 52
  • 53. Thank you. Victoria L. Herring 53