SlideShare uma empresa Scribd logo
1 de 17
EMPLOYEES AND
          INTERNET USE


Darius Whelan, Faculty of Law, University College Cork
Dublin Solicitors Bar Association Seminar, December 2012
BALANCING COMPETING INTERESTS




          Employee’s Privacy           Employer’s Interests




   Employees do not leave their privacy at the front door
    when they come to work

                                                              2
EMPLOYER‟S INTERESTS / DUTIES
 Employers have general right to determine work
  tasks and control contract performance
 Employer has property rights in equipment
 Employers may lay down quality and behaviour
  standards
 Employer must safeguard employees‟ health, safety
  and welfare
 Employer has duty of trust and confidence towards
  employee


                                                      3
PRIVACY
   Halford v UK (1997):
       Assistant Chief Constable – Office phones „tapped‟ – No
        warning
       She had a reasonable expectation of privacy and so art. 8
        had been breached
   Copland v UK (2007):
     Employer (Welsh public college) monitoring internet
      usage, e-mails and telephone traffic of Ms.C (employee)
      without her knowledge
     Content not monitored; instead names of recipients etc.
     Held: Breach of Article 8


                                                                    4
Köpke v Germany (2010)
 Employer had used covert video surveillance for
  two weeks to investigate employee for theft
 Domestic law required proportionality, etc.

 ECtHR held complaint under art. 8 manifestly ill-
  founded




                                                      5
KEY DATA PROTECTION PRINCIPLES
     Data Protection Acts 1988-2003:
         Data must be obtained and processed fairly
         Data subject must be informed of purpose for which data are
          processed
         Legitimate Processing:
             Various categories including
                 Data subject consenting to processing, or
                 processing is for „legitimate interests‟ of controller without unduly
                  prejudicing subject‟s rights/ freedoms / interests
         Data must be kept for specified, explicit and legitimate
          purposes
         There must be appropriate security measures
         Data subject has right of access to data

                                                                                          6
Gresham Hotel (2007)
   Data Protection Commissioner Case Study 6 of 2007
   Covert video surveillance
   Other employees being investigated, not this particular
    employee
   Gardaí were not involved
   Commissioner found data was being processed in a manner
    incompatible with its purpose
   Covert surveillance would require actual involvement of
    Gardaí or intention to involve them
   Amicable resolution reached

                                                              7
   Ali v First Quench (2001)
     Covert video surveillance in off-licence office – thefts of
      stock – Mr A prime suspect
     Mr A was filmed having sexual intercourse in office while
      shop open
     Dismissal fair


   McGowan v Scottish Water (2004)
     Video surveillance of employee‟s house, due to
      suspicion of timesheet irregularities
     Dismissal fair; did not breach privacy


                                                                    8
   Mehigan v Dyflin Publications (Ireland, 2002)
       M received 3 pornographic images by e-mail and forwarded them
        on to someone else
       Tribunal did not accept this was a one-off incident. Evidence of
        other material on computer inc. sexual cartoons
       E-mails can often cause offence
       The EAT will be heavily influenced by the existence of a written
        policy reserving right to dismiss
       Unlikely dismissal permissible otherwise
       Possible exception – downloading obscene pornography
           (Distinction between facts here and „exceptional‟ cases unclear)
       Onus on employer to introduce policy
       Dismissal unfair, but employee contributed substantially
       €2,000 for unfair dismissal plus €2,800 in lieu of notice
                                                                               9
Murray and Rooney v ICS Building Society (2011)
 Two employees allegedly circulated pornography by
  email
 EAT found investigation flawed

 Investigation took place without their knowledge;
  they could not make submissions on terms of
  reference
 Investigation involved only small sample of emails
  and did not include employees who had deleted
  emails
 Dismissal was disproportionate
                                                       10
 €30,000 to one employee; €36,000 to the other
Kiernan v A Wear (2008)
 Employee posted derogatory comments on BEBO

 E.g. Regarding manager “She called me a liar. I
  f**ing hate that c**t”
 Visible to customers

 Fair investigation held. Employee dismissed

 EAT found dismissal disproportionate

 Employee contributed to her dismissal

 €4,000 for unfair dismissal
                                                    11
Walker v Bausch and Lomb (2009)
 Employee wrote on intranet: “500 jobs to be gone at
  Waterford plant before end of first quarter 2008”
 No proof that employee had received intranet policy

 Fair hearing held. Employee dismissed.

 EAT found dismissal disproportionate

 Employee greatly contributed to situation

 €6,500 for unfair dismissal




                                                        12
O’Mahony v PJF Insurances (2011)
 Facebook – Employee called manager a “bitch”

 At first, the page was accidentally seen

 Employee then allowed full access

 A number of disparaging comments

 Suspended pending investigation

 EAT – Significant breach of trust which made
  employment untenable
 Employer acted reasonably. Dismissal fair.



                                                 13
GUIDANCE

    Council of Europe
        Recommendation R (89) 2 on Protection of
         Personal Data Used for Employment
         Purposes 1989
    International Labour Organisation
        Code of Practice on Protection of Workers‟
         Personal Data 1997
   Article 29 Working Party
     Opinion 8/2001 on processing of personal data in the
      employment context
     Opinion 4/2004 on video surveillance
 Data Protection Commissioner (Ireland), Monitoring
  of Staff, Guidance Note, 2004
 Data Protection Commissioner (Ireland), Data
  Protection and CCTV, Guidance Note, 2004




                                                             15
DRAWING UP A POLICY
   Review legislation, guidance and cases
   Clarify purposes of monitoring (if any) – must be
    proportionate
   Notify purposes of monitoring to employees – e.g.
    state if can be used for disciplinary purposes; may
    ultimately lead to dismissal; misconduct v gross
    misconduct
   Clarify ownership of Twitter followers, etc.
   Perhaps permit reasonable personal use of e-mail /
    internet / social media
   Regular reminders of policy
   Other issues – see material cited

                                                          16
   References - See list provided



   Contact Details:
       Dr Darius Whelan, Faculty of Law,
       University College Cork
       http://research.ucc.ie/profiles/B012/dwhelan
       Email d.whelan@ucc.ie
       Twitter: @dariuswirl




                                                       17

Mais conteúdo relacionado

Mais procurados

Software engineering: design for reuse
Software engineering: design for reuseSoftware engineering: design for reuse
Software engineering: design for reuse
Marco Brambilla
 

Mais procurados (20)

ICMP
ICMP ICMP
ICMP
 
Aca2 07 new
Aca2 07 newAca2 07 new
Aca2 07 new
 
Cs8493 unit 2
Cs8493 unit 2Cs8493 unit 2
Cs8493 unit 2
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitPrivileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
 
File replication
File replicationFile replication
File replication
 
Distributed system unit II according to syllabus of RGPV, Bhopal
Distributed system unit II according to syllabus of  RGPV, BhopalDistributed system unit II according to syllabus of  RGPV, Bhopal
Distributed system unit II according to syllabus of RGPV, Bhopal
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing Environment
 
Chapter 3: Processes
Chapter 3: ProcessesChapter 3: Processes
Chapter 3: Processes
 
Intruders
IntrudersIntruders
Intruders
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Chapter 3 - Processes
Chapter 3 - ProcessesChapter 3 - Processes
Chapter 3 - Processes
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
Communication costs in parallel machines
Communication costs in parallel machinesCommunication costs in parallel machines
Communication costs in parallel machines
 
Task Scheduling Using Firefly algorithm with cloudsim
Task Scheduling Using Firefly algorithm with cloudsimTask Scheduling Using Firefly algorithm with cloudsim
Task Scheduling Using Firefly algorithm with cloudsim
 
Software engineering: design for reuse
Software engineering: design for reuseSoftware engineering: design for reuse
Software engineering: design for reuse
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems
 
Models of Distributed System
Models of Distributed SystemModels of Distributed System
Models of Distributed System
 

Destaque

Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Usman Ahmed
 
Managing New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipManaging New Venture Formation and Entrepreneurship
Managing New Venture Formation and Entrepreneurship
Viktoria Kachaluba
 

Destaque (9)

Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Managing New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipManaging New Venture Formation and Entrepreneurship
Managing New Venture Formation and Entrepreneurship
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Employee Rights
Employee RightsEmployee Rights
Employee Rights
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Semelhante a Employees and Internet Use - Legal Aspects

Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
lnarvid
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
Dan Michaluk
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Osborne Clarke
 

Semelhante a Employees and Internet Use - Legal Aspects (20)

Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal Perspective
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
 
Law w23
Law w23Law w23
Law w23
 
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
 
Privacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and SurveillancePrivacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and Surveillance
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
 
Abubakar munir iisf2011
Abubakar munir iisf2011Abubakar munir iisf2011
Abubakar munir iisf2011
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture  Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture
 

Mais de Darius Whelan

Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Darius Whelan
 
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Darius Whelan
 
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Darius Whelan
 

Mais de Darius Whelan (20)

Legal Capacity
Legal CapacityLegal Capacity
Legal Capacity
 
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
 
Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020
 
Copyright Law for Digital Learning
Copyright Law for Digital Learning Copyright Law for Digital Learning
Copyright Law for Digital Learning
 
Copyright Law Update
Copyright Law Update Copyright Law Update
Copyright Law Update
 
LLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, IrelandLLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, Ireland
 
Human Rights and Mental Health Tribunals
Human Rights and Mental Health TribunalsHuman Rights and Mental Health Tribunals
Human Rights and Mental Health Tribunals
 
Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation
 
Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing
 
Proposed changes in the law on legal capacity
Proposed changes in the law on legal capacityProposed changes in the law on legal capacity
Proposed changes in the law on legal capacity
 
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition PerspectiveShari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
 
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
 
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's PerspectiveMaria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
 
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
 
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
 
Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)
 
Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK
 
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
 
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
 
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
 

Employees and Internet Use - Legal Aspects

  • 1. EMPLOYEES AND INTERNET USE Darius Whelan, Faculty of Law, University College Cork Dublin Solicitors Bar Association Seminar, December 2012
  • 2. BALANCING COMPETING INTERESTS Employee’s Privacy Employer’s Interests  Employees do not leave their privacy at the front door when they come to work 2
  • 3. EMPLOYER‟S INTERESTS / DUTIES  Employers have general right to determine work tasks and control contract performance  Employer has property rights in equipment  Employers may lay down quality and behaviour standards  Employer must safeguard employees‟ health, safety and welfare  Employer has duty of trust and confidence towards employee 3
  • 4. PRIVACY  Halford v UK (1997):  Assistant Chief Constable – Office phones „tapped‟ – No warning  She had a reasonable expectation of privacy and so art. 8 had been breached  Copland v UK (2007):  Employer (Welsh public college) monitoring internet usage, e-mails and telephone traffic of Ms.C (employee) without her knowledge  Content not monitored; instead names of recipients etc.  Held: Breach of Article 8 4
  • 5. Köpke v Germany (2010)  Employer had used covert video surveillance for two weeks to investigate employee for theft  Domestic law required proportionality, etc.  ECtHR held complaint under art. 8 manifestly ill- founded 5
  • 6. KEY DATA PROTECTION PRINCIPLES  Data Protection Acts 1988-2003:  Data must be obtained and processed fairly  Data subject must be informed of purpose for which data are processed  Legitimate Processing:  Various categories including  Data subject consenting to processing, or  processing is for „legitimate interests‟ of controller without unduly prejudicing subject‟s rights/ freedoms / interests  Data must be kept for specified, explicit and legitimate purposes  There must be appropriate security measures  Data subject has right of access to data 6
  • 7. Gresham Hotel (2007)  Data Protection Commissioner Case Study 6 of 2007  Covert video surveillance  Other employees being investigated, not this particular employee  Gardaí were not involved  Commissioner found data was being processed in a manner incompatible with its purpose  Covert surveillance would require actual involvement of Gardaí or intention to involve them  Amicable resolution reached 7
  • 8. Ali v First Quench (2001)  Covert video surveillance in off-licence office – thefts of stock – Mr A prime suspect  Mr A was filmed having sexual intercourse in office while shop open  Dismissal fair  McGowan v Scottish Water (2004)  Video surveillance of employee‟s house, due to suspicion of timesheet irregularities  Dismissal fair; did not breach privacy 8
  • 9. Mehigan v Dyflin Publications (Ireland, 2002)  M received 3 pornographic images by e-mail and forwarded them on to someone else  Tribunal did not accept this was a one-off incident. Evidence of other material on computer inc. sexual cartoons  E-mails can often cause offence  The EAT will be heavily influenced by the existence of a written policy reserving right to dismiss  Unlikely dismissal permissible otherwise  Possible exception – downloading obscene pornography  (Distinction between facts here and „exceptional‟ cases unclear)  Onus on employer to introduce policy  Dismissal unfair, but employee contributed substantially  €2,000 for unfair dismissal plus €2,800 in lieu of notice 9
  • 10. Murray and Rooney v ICS Building Society (2011)  Two employees allegedly circulated pornography by email  EAT found investigation flawed  Investigation took place without their knowledge; they could not make submissions on terms of reference  Investigation involved only small sample of emails and did not include employees who had deleted emails  Dismissal was disproportionate 10  €30,000 to one employee; €36,000 to the other
  • 11. Kiernan v A Wear (2008)  Employee posted derogatory comments on BEBO  E.g. Regarding manager “She called me a liar. I f**ing hate that c**t”  Visible to customers  Fair investigation held. Employee dismissed  EAT found dismissal disproportionate  Employee contributed to her dismissal  €4,000 for unfair dismissal 11
  • 12. Walker v Bausch and Lomb (2009)  Employee wrote on intranet: “500 jobs to be gone at Waterford plant before end of first quarter 2008”  No proof that employee had received intranet policy  Fair hearing held. Employee dismissed.  EAT found dismissal disproportionate  Employee greatly contributed to situation  €6,500 for unfair dismissal 12
  • 13. O’Mahony v PJF Insurances (2011)  Facebook – Employee called manager a “bitch”  At first, the page was accidentally seen  Employee then allowed full access  A number of disparaging comments  Suspended pending investigation  EAT – Significant breach of trust which made employment untenable  Employer acted reasonably. Dismissal fair. 13
  • 14. GUIDANCE  Council of Europe  Recommendation R (89) 2 on Protection of Personal Data Used for Employment Purposes 1989  International Labour Organisation  Code of Practice on Protection of Workers‟ Personal Data 1997
  • 15. Article 29 Working Party  Opinion 8/2001 on processing of personal data in the employment context  Opinion 4/2004 on video surveillance  Data Protection Commissioner (Ireland), Monitoring of Staff, Guidance Note, 2004  Data Protection Commissioner (Ireland), Data Protection and CCTV, Guidance Note, 2004 15
  • 16. DRAWING UP A POLICY  Review legislation, guidance and cases  Clarify purposes of monitoring (if any) – must be proportionate  Notify purposes of monitoring to employees – e.g. state if can be used for disciplinary purposes; may ultimately lead to dismissal; misconduct v gross misconduct  Clarify ownership of Twitter followers, etc.  Perhaps permit reasonable personal use of e-mail / internet / social media  Regular reminders of policy  Other issues – see material cited 16
  • 17. References - See list provided  Contact Details:  Dr Darius Whelan, Faculty of Law,  University College Cork  http://research.ucc.ie/profiles/B012/dwhelan  Email d.whelan@ucc.ie  Twitter: @dariuswirl 17