SlideShare uma empresa Scribd logo
1 de 54
Workplace Privacy In the Year 2013
June 18, 2013
Margaret A. Keane
Littler Mendelson, P.C., San Francisco Office
mkeane@littler.com
www.linkedin.com/in/makeane/
Presented to Practicing Law Institute by:
1
Today’s program
• Workplace Privacy Issues
– The New World
– Hiring Practices, circa 2013
• Overview of Social Media in the Hiring Process
• Social Media Checks
• Password Protection Statutes
• FCRA
• EEOC Guidance on Criminal Background Checks
• Foreign data protection laws
– Employee Monitoring, Whistleblower Hotlines
– Yours, Mine or Ours: BYOD and Other Challenges of
Mobile Devices
– Geo-location – GPS, RFID and more
– The NLRA, Drafting Social Media Policies, and
Confidentiality
– Ownership and Control of Social Media Accounts
– Genetic Information Non-Discrimination Act
2
No Expectation of Privacy?
Despite diminished expectations of privacy, numerous laws address
aspects of workplace privacy.
• Federal privacy laws include HIPPA, Gramm-Leach-Bliley (“GLB”),
Children’s On-Line Privacy Protection Act (“COPPA”), Electronic
Communications Protection Act (“ECPA”), Stored Communications Act
(“SCA”), Fair Credit Reporting Act (“FCRA”), Genetic Information Non-
Discrimination Act (“GINA”), Americans with Disabilities Act (“ADA”)
• State privacy and “lifestyle” laws and new state Password Protection
laws (ex. CA AB 1844)
• Related Laws
– Record Retention Requirements, particularly for government contractors,
medical and financial services sectors
– Security Breach Notification Statutes
– FINRA, FDA and other sector-specific regulations
3
No Expectation of Privacy?
In Europe, employees have privacy
expectations, because legal protections
do not depend on a “reasonable
expectation of privacy”
- data protection laws
- wiretap, telecommunications secrets
- labor & employment laws
4
New Hiring Paradigms
• In many sectors, work no longer needs to be
performed in a designated place or at a designated
time.
– Cloud-based applications can be reached anywhere/anytime
• New work models are prevalent for providing IT and
other task or project-based services
– Ex. – Elance, oDesk, Collabworks
• On-demand sourcing models are becoming
mainstream in legal community – scope goes well
beyond e-discovery
• New models challenge legal system of employment
laws tied to physical location and fixed hours
5
Today’s Mobile Worker:
A World of Sharing
6
We Love Our Smartphones. . .
7
Source: http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013?utm_source=slideshow03&utm_medium=ssemail&utm_campaign=share_slideshow_loggedout
7
Are Smartphones An Extension
of Our Brains?
8
Source: http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013?utm_source=slideshow03&utm_medium=ssemail&utm_campaign=share_slideshow_loggedout
Social Media Use and Channels
Continue to Grow
9
Source: http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013?utm_source=slideshow03&utm_medium=ssemail&utm_campaign=share_slideshow_loggedout
What Do You Do When You
First Wake Up?
Always Connected, IDC Study,
Sponsored by Facebook, March
2013
10
10
Blurring The Lines:
Work vs. Personal
 90% of full-time employees use a personal smartphone
for work purposes
– 62% of those use it every day
– 39% don’t use password protection
– 52% access unsecured wifi networks
– 69% believe they are expected to access work emails
after hours
 1 in 10 workers receive a stipend for their smartphone
(Cisco, BYOD Insights in 2013: A Cisco Partner Network Survey, March 2013)
11
11
Social Media, Privacy and
the Hiring Process
12
Social Networking in Talent Sourcing
and Promotion
• 91% of employers had hired a staff member
based on their social networking profile
• 69% decided not to make job offer to candidate
after seeing profile (photos of drugs/drinking
or inappropriate behavior were the most
popular reasons for eliminating candidate)
• 47% of companies check candidates' profiles on
social networking sites after they receive an
application and 27% review after a screening
interview.
Source: Job Screening With Social Networks: How Are Employers
Screening Job Applicants, Reppler, October 2011
Source: The Use of Social Networking Websites and Online Search
Engines in Screening Job Candidates, Society for Human
Resource Management, August 25, 2011
13
Getting to Know You:
Risks of Using Social Media in the Hiring Process
• Risk of making employment decisions based
on inaccurate, irrelevant or false info
• Online social networking profiles often
present personal information not properly
subject to inquiry during the hiring process
• Potential to eliminate applicants based on
protected class status in violation of federal
and state anti-discrimination laws
• Need to balance applicant’s rights with
employer’s need to screen candidates
thoroughly
• Decisions made based on lawful, off-duty
conduct may violate state “lifestyle” laws
14
15
Source: www.facebook.com/blaise.dipersia (Facebook Page Designer -- Sample Page)
Passwords
• At last count, thirteen states have enacted legislation to prohibit
employers from asking applicants or employees for social media
passwords or other log-in credentials, including CA, CT, CO, HI, IL, MD,
MI, NV, NM, OR, UT, VT and VI. Others have pending legislation and
federal legislation has also been introduced.
• California’s statute provides an exception that permits employers to
“request an employee to divulge personal social media reasonable
believed to be relevant to an investigation” of allegations of misconduct.
• California also has an exception for
usernames and passwords used
to access employer-issued devices.
• Be aware of tensions between State
laws and FINRA obligations to supervise
and retain records.
16
Passwords
Service providers usually prohibit password sharing in
their terms of use; consequently, access by a third
party constitutes ‘unauthorized access to’ or
‘interference with’ a computer under trespass laws,
such as a the U.S. Computer Fraud and Abuse Act
17
• Build a process for lawful use of social media data
– Determine when on-line searches will be used in hiring and
promotion process (ex. after initial screening interviews)
– Determine scope of review: what sources will be
checked and what information will be collected?
– Decide whether to inform applicants
about on-line searches and whether to
ask for email addresses, user names
and blog posts
– Give notice and obtain consent
where needed and comply with FCRA if using third
parties to conduct search
– Do not engage in unauthorized access to password protected sites,
“shoulder surf” or require users to disclose passwords unlawfully
– Isolate protected class information from the decision-maker
– Update forms for recording information, maintain
contemporaneous documentation and comply with applicable
retention requirements
Responsible Use of Social Media in Recruiting,
Hiring and Promotions
18
Fair Credit Reporting Act
(“FCRA”) Concerns
19
Fair Credit Reporting Act Overview
• Applies to reports prepared by a third party that regularly assembles or
evaluates credit or other information on a consumer (“consumer
reporting agency” or “CRA”) and includes background screening
companies
• Covers any inquiry for employment purposes bearing on an individual’s
“credit, general reputation, personal characteristics, or mode of living”
– Criminal history checks, credit checks, sex offender registry, motor vehicle
record checks, employment and education verification
• Regulates public records, including criminal records, and is not limited to
traditional credit reports
• Does not regulate purely in-house investigations, such as reference
checks made by internal human resources personnel
20
FCRA Compliance
1. Obtain informed consent
from job applicants
2. Issue "adverse action"
letters if the background
check will result in
disqualification
3. Secure destruction of
consumer information
21
FCRA Remedies
• Cases can be based on failure to use FCRA disclosure and authorization
forms; failure to give adverse action notices
• Minimum statutory damages of $100 to $1,000 for willful violations
– Class action-friendly remedy where CRA’s and employer follow standard
procedures
– Low damages add up when multiplied against large applicant pools
• Actual damages for negligent violations
• Attorney fees to a successful plaintiff
• No statutory cap on defendant’s exposure
22
Class Litigation and FCRA
• Spike in class action filings against employers
– FCRA disclosure and authorization forms
– FCRA adverse action notices
– State equivalents
• Several multi-million dollar settlements in
nationwide class actions
23
SOCIAL MEDIA AND CRIMINAL
BACKGROUND CHECKS
24
25
Updated EEOC Enforcement Guidance
Updated Enforcement Guidance ─ Approved 4-1 on April
25, 2012:
– “EEOC Enforcement Guidance on the Consideration of
Arrest and Conviction Records in Employment
Decisions Under Title VII of the Civil Rights Act of
1964”
– Accompanying “Questions and Answers About
EEOC’s Enforcement Guidance”
See http://www.eeoc.gov/laws/guidance/arrest_conviction.cfm and
http://www.eeoc.gov/laws/guidance/qa_arrest_conviction.cfm
26
26
EEOC Recommended “Best Practices”
EEOC’s View of “Employer Best Practices”
• Eliminate blanket exclusions “based on any criminal record”
• Develop narrowly tailored written policy/procedures excluding individuals from particular
jobs based on a criminal history record
(1) Identify essential job requirements
(2) Identify specific offenses tied to “unfitness” for job
(3) Identify time limits applicable to exclusion
(4) Document research/consultations to support policy/procedures
(5) Provide for individualized assessment before final hiring decision
• When asking questions about criminal records, limit inquiries to records job
related/consistent with business necessity
• Make inquiries of criminal record – post application (e.g. “ban the box” approach)
• Train managers, hiring officials, and decision-makers on how to implement the policy and
procedures consistent with Title VII.
• Maintain confidentiality of criminal records
27
27
State EEO Laws
• State counterparts to Title VII
• Specific ex-offender protections
– Workplace posting and notice obligations
– Sequencing restrictions (when an employer can
ask questions)
– Inquiry restrictions (what employer cannot ask about)
– Source restrictions (what employer cannot access)
– “Job-relatedness” requirements (what discretion employer
has to screen out applicants)
28
Employee monitoring and
Whistleblower hotlines
29
Employee monitoring, hotlines
• USA: employers can destroy privacy
expectations in notices
– hardly any limits
– but: notices must be updated regularly
• Rest of the World (ROW)
– many jurisdicitons require voluntary employee consent
– EEA+ countries require limitations to monitoring programs and reportable
topics for hotlines, notice to employees, consultations with works council
and data protection officers, notifications to data protection authorities or
applications for prior authorization, labor courts, labor inspectorate, etc.
30
Bring Your Own Device
(“BYOD”) and Beyond
31
Lingo:
Dual Use Mobile Devices and BYOD
• Dual Use Mobile Device: Mobile device used to create, store
and transmit both personal and work-related data
• BYOD: Bring Your Own Device
– A BYOD program includes:
• Policies that govern use of personal devices to
access corporate services
• Policies attempt to manage risk associated with
storage and transmittal of data using devices that
may be outside of the employers control
• Policies to address impact of mobile devices on existing
workplace behavior
• COPE: Corporate Owned, Personally Enabled
32
What is MDM – Mobile Device
Management?
Mobile Device Management:
• Software that allows corporate IT to manage use of mobile devices.
Component of BYOD programs. Features may allow an employer to:
– Require users to register devices as condition of network access
– Enable remote locking or wipe of device
– Implement anti-spam solutions, block specific apps,
and prevent users from disabling or altering
security settings on devices
– Monitor employee use and location of user
and device
33
Policies Affected by BYOD:
Mobile devices have impact on policies throughout your
business
• Data Privacy & Security
• Harassment, Discrimination & EEO
• Workplace Safety
• Time Recording and Overtime
• Acceptable Use of Technology
• Compliance and Ethics
• Records Management
• Litigation Holds
• Confidentiality & Trade Secret Protection
34
Setting Up a BYOD Program:
A Master Plan for mobile device use in your
organization
• Need to address challenges of dual use devices, REGARDLESS of whether
you adopt a BYOD program
• If you implement BYOD, your policy should be part of an integrated
Information Governance Plan
• Determine goals and objectives
• Privacy Considerations
– Remote wipes
– Containers
– Backups
35
Setting Up a BYOD Program
• Who Participates?
• What conditions will be imposed on participants?
• Who pays?
• Program may include limits on acceptable
applications, passwords, encryption,
employer monitoring, reporting obligations and remote
wipes
• Address tradeoffs
– Participation in program is a privilege,
not a right
– May have privacy tradeoff for convenience of
remote access and device 36
Privacy in a BYOD World
Will your program distinguish between personal and business use?
Privacy Parameters
• Distinguish between data and device
• Device
– May require return upon demand or inspection as part of investigation
– May require return, with data intact, upon separation from employment
• Data
– Determine whether employer will retain right to review all contents of
device or will exclude categories such as music and photos
– Require employee to provide access to cloud
backups or home server?
– Monitor/limit employee’s use of web-based
applications? Example: Siri, Dropbox, iCloud, etc.
– Set parameters for timing, terms and extent of remote
wipes 37
Privacy in a BYOD World
1. Remote wipes of lost devices – can be
viewed as either pro-privacy or an
intrusion. Participation in BYOD program
may be conditioned upon consent to
remote wipes.
2. Litigation issues:
– Identification of BYOD devices/information
– Practical challenges of data collection
– Does the employee “control” data on the
devices?
– Will employees be required to produce mobile
devices to employer for inspection, preservation
and production?
38
Privacy in a BYOD World:
What is a Reasonable Expectation of Privacy?
3. Even if your policy gives you access to the device , employees may have
privacy expectations in personal data stored with online services. Be
careful.
– Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 587 F. Supp. 2d 548 (S.D.N.Y. 2008)
(employee had reasonable expectation of privacy in password protected emails stored on hotmail
and gmail servers, regardless of fact that she accessed them on a work computer)
– Steingart v. Loving Care Agency, Inc., 201 N.J. 300 (NJ 2010) (employee had reasonable expectation
of privacy in personal password protected web-based email sent through employer’s computer)
– Pietrylo v. Hillstone Restaurant Group, No. 06-5754, 2008 U.S. Dist. LEXIS 108834, at *20 (D.N.J. July
24, 2008) (question of whether employee had a reasonable expectation of privacy in My Space page
is a question of fact)
– Ehling v. Monmouth-Ocean Hospital Service Corp., Civ. No. 2:11-CV 033305 (WJM) (D.N.J. May
30, 2012)(plaintiff may have reasonable expectation of privacy in Facebook posting where she
restricted access to her Facebook page)
– Doe v. City of San Francisco, No. C10-04700 THE (N.D. Cal. June 12, 2012)(employee had reasonable
expectation of privacy in web-based emails viewed from a shared workplace computer designated
for personal use by employees)
39
Geolocation Tracking and Telematics
• FTC: Geographic location is sensitive information
• CA Penal Code 637.7. No person or entity in this
state shall use an electronic tracking device to
determine the location or movement of a person
• Tread carefully
Source: CTIA – The Wireless Association, Best Industry Practices and Guidelines for
providers of location based services
40
Social Media, the NLRB
and Protected Activity
41
What is Protected Concerted Activity?
• The NLRA prohibits discipline against employees
who engage in “protected concerted activity”
Protected = related to the terms or conditions of
employment, unionization, or an on-going labor dispute
Concerted = “with, or on the authority of, other employees
and not solely by and on behalf of the employee himself.”
Meyers Industries, 268 NLRB 493, 497 (1984)
Note: Employees in a non-unionized workplace can
engage in protected, concerted activity
42
What is Protected Activity?
1. What is the subject matter of the post?
– Union organizing or exercise of rights under CBA or labor law
– Work hours, wages, tax administration
– Job performance or meetings with management
2. Who is participating in the discussion?
– Only personal friends/relatives or co-workers included?
3. Is the employee expressing only an individual gripe?
4. Are employees acting collectively?
– Preparing for discussion with management or otherwise acting on behalf
of group
5. Are the social media posts a direct outgrowth of prior group
discussions?
43
Drafting and Enforcing
Your Social Media Policy
44
NLRB: Unlawful Policy Provisions
1. Inappropriate Discussions
2. Defamation
3. Disparagement
4. Privacy
5. Confidentiality
6. Contact Information
7. Logo Restrictions
8. Photographs
45
Social Media Policies:
General Rule:
An employer’s social media policy may
run afoul of the NLRA if it infringes on
an employee’s ability to engage in
protected activity.
Employers should be careful not to
make their policies too broad, and
should also include specific language
that they do not mean for the policy to
prohibit or restrict any lawfully
protected activity.
46
Disclaimer Options
Board’s repeated comment: “*T+he rules contained
no limiting language to inform employees that [the
rules+ did not apply to Section 7 activity.”
Use a disclaimer: This policy will not be construed
or applied in a way that improperly interferes with
(A) employees’ exercise of their rights under the
NLRA or any other law, or (B) employees’ legally
protected social media discussions regarding wages,
hours, or working conditions.
47
Unlawful Lawful
No posting of confidential
information
No posting trade secrets and private and
confidential information with examples
No “inappropriate conduct” or “be
respectful”
Examples prohibiting discriminatory remarks,
harassment and threats of violence or similar
inappropriate conduct
“Be respectful”
No malicious, obscene, threatening or
intimidating conduct, harassing or bullying,
posting intentionally meant to harm a co-
workers’ reputation or could contribute to
hostile work environment
Use of employer name or logo
Ensuring postings are consistent with the
code of ethics or conduct
48
Affirmative Guidelines
1. Require compliance with all
Company policies (e.g.
confidentiality, harassment)
2. Include: “Do not claim to be
acting on the Company’s
behalf without prior
authorization;”
3. Require that employees
disclose affiliation with the
Company whenever endorsing
its products or services;
49
Affirmative Guidelines
4. Remember:
Blanket policy that requires employee
confidentiality during an HR investigation is
deemed to violate the National Labor
Relations Act and employees’ rights to
engage in concerted activity – must be case-
by-case determination.
5. If a Policy explicitly restricts activities
protected by NLRA, NLRB will find it
unlawful...and will also find unlawful if:
--employees would reasonably construe language
to prohibit protected activity; Policy issued in
response to Union activity; or Policy has been
applied to restrict protected rights....AND,
FINALLY:
50
Breaking Up is Hard to Do:
Clarify your right to wipe devices and ownership of social
media assets before the breakup
• Clarify ownership of social media
assets. Maintain access to, and
right to change, passwords to
corporate accounts.
51
Genetic Information
Nondiscrimination Act of 2008 (GINA)
• Illegal to discriminate against employees or applicants because of genetic
information
• Employers may not use genetic information in making employment decisions and
may not request, require or purchase genetic information
• Any employer that possesses genetic information about an employee must
maintain such information in separate files; and must treat it as a confidential
medical record and may disclose it only under very limited circumstances
• Prohibition on requesting information defines “request” to include “conducting
an internet search on an individual in a way that is likely to result in a covered
entity obtaining genetic information.” 29 C.F.R. §1635
• Safe harbor for inadvertent acquisition applies where employer “inadvertently
learns genetic information from a social media platform where he or she was
given permission to access by the creator of the profile at issue (e.g., a supervisor
and employee are connected on a social networking site and the employee
provides family medical history on his page).” 29 C.F.R. §1634
52
Questions?
53
Margaret A. Keane
Shareholder
Littler Mendelson, P.C.
San Francisco Office
415.288.6303
mkeane@littler.com
54

Mais conteúdo relacionado

Mais procurados

Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justifiedParker Donat
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from MisuseWendi Lazar
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsCEL Public Relations
 
Social Media in the Workplace
Social Media in the Workplace Social Media in the Workplace
Social Media in the Workplace Rachel Hamilton
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsAmy Shriner
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsSaad Mazhar
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillanceitsika
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
Social media
Social mediaSocial media
Social mediaSheila A
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
 
In house lawyers' forum, September 2017
In house lawyers' forum, September 2017In house lawyers' forum, September 2017
In house lawyers' forum, September 2017Browne Jacobson LLP
 
spy after employees
spy after employeesspy after employees
spy after employeesJuscutum
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Digital Forensics Company
Digital Forensics CompanyDigital Forensics Company
Digital Forensics Companycyberrecovery
 

Mais procurados (20)

Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR Implications
 
Social Media in the Workplace
Social Media in the Workplace Social Media in the Workplace
Social Media in the Workplace
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal Rights
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillance
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Social media
Social mediaSocial media
Social media
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data Security
 
In house lawyers' forum, September 2017
In house lawyers' forum, September 2017In house lawyers' forum, September 2017
In house lawyers' forum, September 2017
 
COPPA for Newbies
COPPA for NewbiesCOPPA for Newbies
COPPA for Newbies
 
spy after employees
spy after employeesspy after employees
spy after employees
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Digital Forensics Company
Digital Forensics CompanyDigital Forensics Company
Digital Forensics Company
 

Semelhante a Pli workplace privacy in the year 2013 2013-6-13

2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplacemkeane
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Social Media's Impact on Pre-Screening
Social Media's Impact on Pre-ScreeningSocial Media's Impact on Pre-Screening
Social Media's Impact on Pre-ScreeningSSDlaw
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Smarsh
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadashibrah76
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Jason Haislmaier
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Amy Purcell
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14ACFCS
 
Ohio Means Jobs: Background Checks 101
Ohio Means Jobs: Background Checks 101Ohio Means Jobs: Background Checks 101
Ohio Means Jobs: Background Checks 101SSDLaw2014
 

Semelhante a Pli workplace privacy in the year 2013 2013-6-13 (20)

2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Social Media's Impact on Pre-Screening
Social Media's Impact on Pre-ScreeningSocial Media's Impact on Pre-Screening
Social Media's Impact on Pre-Screening
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
 
Ohio Means Jobs: Background Checks 101
Ohio Means Jobs: Background Checks 101Ohio Means Jobs: Background Checks 101
Ohio Means Jobs: Background Checks 101
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Pli workplace privacy in the year 2013 2013-6-13

  • 1. Workplace Privacy In the Year 2013 June 18, 2013 Margaret A. Keane Littler Mendelson, P.C., San Francisco Office mkeane@littler.com www.linkedin.com/in/makeane/ Presented to Practicing Law Institute by: 1
  • 2. Today’s program • Workplace Privacy Issues – The New World – Hiring Practices, circa 2013 • Overview of Social Media in the Hiring Process • Social Media Checks • Password Protection Statutes • FCRA • EEOC Guidance on Criminal Background Checks • Foreign data protection laws – Employee Monitoring, Whistleblower Hotlines – Yours, Mine or Ours: BYOD and Other Challenges of Mobile Devices – Geo-location – GPS, RFID and more – The NLRA, Drafting Social Media Policies, and Confidentiality – Ownership and Control of Social Media Accounts – Genetic Information Non-Discrimination Act 2
  • 3. No Expectation of Privacy? Despite diminished expectations of privacy, numerous laws address aspects of workplace privacy. • Federal privacy laws include HIPPA, Gramm-Leach-Bliley (“GLB”), Children’s On-Line Privacy Protection Act (“COPPA”), Electronic Communications Protection Act (“ECPA”), Stored Communications Act (“SCA”), Fair Credit Reporting Act (“FCRA”), Genetic Information Non- Discrimination Act (“GINA”), Americans with Disabilities Act (“ADA”) • State privacy and “lifestyle” laws and new state Password Protection laws (ex. CA AB 1844) • Related Laws – Record Retention Requirements, particularly for government contractors, medical and financial services sectors – Security Breach Notification Statutes – FINRA, FDA and other sector-specific regulations 3
  • 4. No Expectation of Privacy? In Europe, employees have privacy expectations, because legal protections do not depend on a “reasonable expectation of privacy” - data protection laws - wiretap, telecommunications secrets - labor & employment laws 4
  • 5. New Hiring Paradigms • In many sectors, work no longer needs to be performed in a designated place or at a designated time. – Cloud-based applications can be reached anywhere/anytime • New work models are prevalent for providing IT and other task or project-based services – Ex. – Elance, oDesk, Collabworks • On-demand sourcing models are becoming mainstream in legal community – scope goes well beyond e-discovery • New models challenge legal system of employment laws tied to physical location and fixed hours 5
  • 6. Today’s Mobile Worker: A World of Sharing 6
  • 7. We Love Our Smartphones. . . 7 Source: http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013?utm_source=slideshow03&utm_medium=ssemail&utm_campaign=share_slideshow_loggedout 7
  • 8. Are Smartphones An Extension of Our Brains? 8 Source: http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013?utm_source=slideshow03&utm_medium=ssemail&utm_campaign=share_slideshow_loggedout
  • 9. Social Media Use and Channels Continue to Grow 9 Source: http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013?utm_source=slideshow03&utm_medium=ssemail&utm_campaign=share_slideshow_loggedout
  • 10. What Do You Do When You First Wake Up? Always Connected, IDC Study, Sponsored by Facebook, March 2013 10 10
  • 11. Blurring The Lines: Work vs. Personal  90% of full-time employees use a personal smartphone for work purposes – 62% of those use it every day – 39% don’t use password protection – 52% access unsecured wifi networks – 69% believe they are expected to access work emails after hours  1 in 10 workers receive a stipend for their smartphone (Cisco, BYOD Insights in 2013: A Cisco Partner Network Survey, March 2013) 11 11
  • 12. Social Media, Privacy and the Hiring Process 12
  • 13. Social Networking in Talent Sourcing and Promotion • 91% of employers had hired a staff member based on their social networking profile • 69% decided not to make job offer to candidate after seeing profile (photos of drugs/drinking or inappropriate behavior were the most popular reasons for eliminating candidate) • 47% of companies check candidates' profiles on social networking sites after they receive an application and 27% review after a screening interview. Source: Job Screening With Social Networks: How Are Employers Screening Job Applicants, Reppler, October 2011 Source: The Use of Social Networking Websites and Online Search Engines in Screening Job Candidates, Society for Human Resource Management, August 25, 2011 13
  • 14. Getting to Know You: Risks of Using Social Media in the Hiring Process • Risk of making employment decisions based on inaccurate, irrelevant or false info • Online social networking profiles often present personal information not properly subject to inquiry during the hiring process • Potential to eliminate applicants based on protected class status in violation of federal and state anti-discrimination laws • Need to balance applicant’s rights with employer’s need to screen candidates thoroughly • Decisions made based on lawful, off-duty conduct may violate state “lifestyle” laws 14
  • 16. Passwords • At last count, thirteen states have enacted legislation to prohibit employers from asking applicants or employees for social media passwords or other log-in credentials, including CA, CT, CO, HI, IL, MD, MI, NV, NM, OR, UT, VT and VI. Others have pending legislation and federal legislation has also been introduced. • California’s statute provides an exception that permits employers to “request an employee to divulge personal social media reasonable believed to be relevant to an investigation” of allegations of misconduct. • California also has an exception for usernames and passwords used to access employer-issued devices. • Be aware of tensions between State laws and FINRA obligations to supervise and retain records. 16
  • 17. Passwords Service providers usually prohibit password sharing in their terms of use; consequently, access by a third party constitutes ‘unauthorized access to’ or ‘interference with’ a computer under trespass laws, such as a the U.S. Computer Fraud and Abuse Act 17
  • 18. • Build a process for lawful use of social media data – Determine when on-line searches will be used in hiring and promotion process (ex. after initial screening interviews) – Determine scope of review: what sources will be checked and what information will be collected? – Decide whether to inform applicants about on-line searches and whether to ask for email addresses, user names and blog posts – Give notice and obtain consent where needed and comply with FCRA if using third parties to conduct search – Do not engage in unauthorized access to password protected sites, “shoulder surf” or require users to disclose passwords unlawfully – Isolate protected class information from the decision-maker – Update forms for recording information, maintain contemporaneous documentation and comply with applicable retention requirements Responsible Use of Social Media in Recruiting, Hiring and Promotions 18
  • 19. Fair Credit Reporting Act (“FCRA”) Concerns 19
  • 20. Fair Credit Reporting Act Overview • Applies to reports prepared by a third party that regularly assembles or evaluates credit or other information on a consumer (“consumer reporting agency” or “CRA”) and includes background screening companies • Covers any inquiry for employment purposes bearing on an individual’s “credit, general reputation, personal characteristics, or mode of living” – Criminal history checks, credit checks, sex offender registry, motor vehicle record checks, employment and education verification • Regulates public records, including criminal records, and is not limited to traditional credit reports • Does not regulate purely in-house investigations, such as reference checks made by internal human resources personnel 20
  • 21. FCRA Compliance 1. Obtain informed consent from job applicants 2. Issue "adverse action" letters if the background check will result in disqualification 3. Secure destruction of consumer information 21
  • 22. FCRA Remedies • Cases can be based on failure to use FCRA disclosure and authorization forms; failure to give adverse action notices • Minimum statutory damages of $100 to $1,000 for willful violations – Class action-friendly remedy where CRA’s and employer follow standard procedures – Low damages add up when multiplied against large applicant pools • Actual damages for negligent violations • Attorney fees to a successful plaintiff • No statutory cap on defendant’s exposure 22
  • 23. Class Litigation and FCRA • Spike in class action filings against employers – FCRA disclosure and authorization forms – FCRA adverse action notices – State equivalents • Several multi-million dollar settlements in nationwide class actions 23
  • 24. SOCIAL MEDIA AND CRIMINAL BACKGROUND CHECKS 24
  • 25. 25
  • 26. Updated EEOC Enforcement Guidance Updated Enforcement Guidance ─ Approved 4-1 on April 25, 2012: – “EEOC Enforcement Guidance on the Consideration of Arrest and Conviction Records in Employment Decisions Under Title VII of the Civil Rights Act of 1964” – Accompanying “Questions and Answers About EEOC’s Enforcement Guidance” See http://www.eeoc.gov/laws/guidance/arrest_conviction.cfm and http://www.eeoc.gov/laws/guidance/qa_arrest_conviction.cfm 26 26
  • 27. EEOC Recommended “Best Practices” EEOC’s View of “Employer Best Practices” • Eliminate blanket exclusions “based on any criminal record” • Develop narrowly tailored written policy/procedures excluding individuals from particular jobs based on a criminal history record (1) Identify essential job requirements (2) Identify specific offenses tied to “unfitness” for job (3) Identify time limits applicable to exclusion (4) Document research/consultations to support policy/procedures (5) Provide for individualized assessment before final hiring decision • When asking questions about criminal records, limit inquiries to records job related/consistent with business necessity • Make inquiries of criminal record – post application (e.g. “ban the box” approach) • Train managers, hiring officials, and decision-makers on how to implement the policy and procedures consistent with Title VII. • Maintain confidentiality of criminal records 27 27
  • 28. State EEO Laws • State counterparts to Title VII • Specific ex-offender protections – Workplace posting and notice obligations – Sequencing restrictions (when an employer can ask questions) – Inquiry restrictions (what employer cannot ask about) – Source restrictions (what employer cannot access) – “Job-relatedness” requirements (what discretion employer has to screen out applicants) 28
  • 30. Employee monitoring, hotlines • USA: employers can destroy privacy expectations in notices – hardly any limits – but: notices must be updated regularly • Rest of the World (ROW) – many jurisdicitons require voluntary employee consent – EEA+ countries require limitations to monitoring programs and reportable topics for hotlines, notice to employees, consultations with works council and data protection officers, notifications to data protection authorities or applications for prior authorization, labor courts, labor inspectorate, etc. 30
  • 31. Bring Your Own Device (“BYOD”) and Beyond 31
  • 32. Lingo: Dual Use Mobile Devices and BYOD • Dual Use Mobile Device: Mobile device used to create, store and transmit both personal and work-related data • BYOD: Bring Your Own Device – A BYOD program includes: • Policies that govern use of personal devices to access corporate services • Policies attempt to manage risk associated with storage and transmittal of data using devices that may be outside of the employers control • Policies to address impact of mobile devices on existing workplace behavior • COPE: Corporate Owned, Personally Enabled 32
  • 33. What is MDM – Mobile Device Management? Mobile Device Management: • Software that allows corporate IT to manage use of mobile devices. Component of BYOD programs. Features may allow an employer to: – Require users to register devices as condition of network access – Enable remote locking or wipe of device – Implement anti-spam solutions, block specific apps, and prevent users from disabling or altering security settings on devices – Monitor employee use and location of user and device 33
  • 34. Policies Affected by BYOD: Mobile devices have impact on policies throughout your business • Data Privacy & Security • Harassment, Discrimination & EEO • Workplace Safety • Time Recording and Overtime • Acceptable Use of Technology • Compliance and Ethics • Records Management • Litigation Holds • Confidentiality & Trade Secret Protection 34
  • 35. Setting Up a BYOD Program: A Master Plan for mobile device use in your organization • Need to address challenges of dual use devices, REGARDLESS of whether you adopt a BYOD program • If you implement BYOD, your policy should be part of an integrated Information Governance Plan • Determine goals and objectives • Privacy Considerations – Remote wipes – Containers – Backups 35
  • 36. Setting Up a BYOD Program • Who Participates? • What conditions will be imposed on participants? • Who pays? • Program may include limits on acceptable applications, passwords, encryption, employer monitoring, reporting obligations and remote wipes • Address tradeoffs – Participation in program is a privilege, not a right – May have privacy tradeoff for convenience of remote access and device 36
  • 37. Privacy in a BYOD World Will your program distinguish between personal and business use? Privacy Parameters • Distinguish between data and device • Device – May require return upon demand or inspection as part of investigation – May require return, with data intact, upon separation from employment • Data – Determine whether employer will retain right to review all contents of device or will exclude categories such as music and photos – Require employee to provide access to cloud backups or home server? – Monitor/limit employee’s use of web-based applications? Example: Siri, Dropbox, iCloud, etc. – Set parameters for timing, terms and extent of remote wipes 37
  • 38. Privacy in a BYOD World 1. Remote wipes of lost devices – can be viewed as either pro-privacy or an intrusion. Participation in BYOD program may be conditioned upon consent to remote wipes. 2. Litigation issues: – Identification of BYOD devices/information – Practical challenges of data collection – Does the employee “control” data on the devices? – Will employees be required to produce mobile devices to employer for inspection, preservation and production? 38
  • 39. Privacy in a BYOD World: What is a Reasonable Expectation of Privacy? 3. Even if your policy gives you access to the device , employees may have privacy expectations in personal data stored with online services. Be careful. – Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 587 F. Supp. 2d 548 (S.D.N.Y. 2008) (employee had reasonable expectation of privacy in password protected emails stored on hotmail and gmail servers, regardless of fact that she accessed them on a work computer) – Steingart v. Loving Care Agency, Inc., 201 N.J. 300 (NJ 2010) (employee had reasonable expectation of privacy in personal password protected web-based email sent through employer’s computer) – Pietrylo v. Hillstone Restaurant Group, No. 06-5754, 2008 U.S. Dist. LEXIS 108834, at *20 (D.N.J. July 24, 2008) (question of whether employee had a reasonable expectation of privacy in My Space page is a question of fact) – Ehling v. Monmouth-Ocean Hospital Service Corp., Civ. No. 2:11-CV 033305 (WJM) (D.N.J. May 30, 2012)(plaintiff may have reasonable expectation of privacy in Facebook posting where she restricted access to her Facebook page) – Doe v. City of San Francisco, No. C10-04700 THE (N.D. Cal. June 12, 2012)(employee had reasonable expectation of privacy in web-based emails viewed from a shared workplace computer designated for personal use by employees) 39
  • 40. Geolocation Tracking and Telematics • FTC: Geographic location is sensitive information • CA Penal Code 637.7. No person or entity in this state shall use an electronic tracking device to determine the location or movement of a person • Tread carefully Source: CTIA – The Wireless Association, Best Industry Practices and Guidelines for providers of location based services 40
  • 41. Social Media, the NLRB and Protected Activity 41
  • 42. What is Protected Concerted Activity? • The NLRA prohibits discipline against employees who engage in “protected concerted activity” Protected = related to the terms or conditions of employment, unionization, or an on-going labor dispute Concerted = “with, or on the authority of, other employees and not solely by and on behalf of the employee himself.” Meyers Industries, 268 NLRB 493, 497 (1984) Note: Employees in a non-unionized workplace can engage in protected, concerted activity 42
  • 43. What is Protected Activity? 1. What is the subject matter of the post? – Union organizing or exercise of rights under CBA or labor law – Work hours, wages, tax administration – Job performance or meetings with management 2. Who is participating in the discussion? – Only personal friends/relatives or co-workers included? 3. Is the employee expressing only an individual gripe? 4. Are employees acting collectively? – Preparing for discussion with management or otherwise acting on behalf of group 5. Are the social media posts a direct outgrowth of prior group discussions? 43
  • 44. Drafting and Enforcing Your Social Media Policy 44
  • 45. NLRB: Unlawful Policy Provisions 1. Inappropriate Discussions 2. Defamation 3. Disparagement 4. Privacy 5. Confidentiality 6. Contact Information 7. Logo Restrictions 8. Photographs 45
  • 46. Social Media Policies: General Rule: An employer’s social media policy may run afoul of the NLRA if it infringes on an employee’s ability to engage in protected activity. Employers should be careful not to make their policies too broad, and should also include specific language that they do not mean for the policy to prohibit or restrict any lawfully protected activity. 46
  • 47. Disclaimer Options Board’s repeated comment: “*T+he rules contained no limiting language to inform employees that [the rules+ did not apply to Section 7 activity.” Use a disclaimer: This policy will not be construed or applied in a way that improperly interferes with (A) employees’ exercise of their rights under the NLRA or any other law, or (B) employees’ legally protected social media discussions regarding wages, hours, or working conditions. 47
  • 48. Unlawful Lawful No posting of confidential information No posting trade secrets and private and confidential information with examples No “inappropriate conduct” or “be respectful” Examples prohibiting discriminatory remarks, harassment and threats of violence or similar inappropriate conduct “Be respectful” No malicious, obscene, threatening or intimidating conduct, harassing or bullying, posting intentionally meant to harm a co- workers’ reputation or could contribute to hostile work environment Use of employer name or logo Ensuring postings are consistent with the code of ethics or conduct 48
  • 49. Affirmative Guidelines 1. Require compliance with all Company policies (e.g. confidentiality, harassment) 2. Include: “Do not claim to be acting on the Company’s behalf without prior authorization;” 3. Require that employees disclose affiliation with the Company whenever endorsing its products or services; 49
  • 50. Affirmative Guidelines 4. Remember: Blanket policy that requires employee confidentiality during an HR investigation is deemed to violate the National Labor Relations Act and employees’ rights to engage in concerted activity – must be case- by-case determination. 5. If a Policy explicitly restricts activities protected by NLRA, NLRB will find it unlawful...and will also find unlawful if: --employees would reasonably construe language to prohibit protected activity; Policy issued in response to Union activity; or Policy has been applied to restrict protected rights....AND, FINALLY: 50
  • 51. Breaking Up is Hard to Do: Clarify your right to wipe devices and ownership of social media assets before the breakup • Clarify ownership of social media assets. Maintain access to, and right to change, passwords to corporate accounts. 51
  • 52. Genetic Information Nondiscrimination Act of 2008 (GINA) • Illegal to discriminate against employees or applicants because of genetic information • Employers may not use genetic information in making employment decisions and may not request, require or purchase genetic information • Any employer that possesses genetic information about an employee must maintain such information in separate files; and must treat it as a confidential medical record and may disclose it only under very limited circumstances • Prohibition on requesting information defines “request” to include “conducting an internet search on an individual in a way that is likely to result in a covered entity obtaining genetic information.” 29 C.F.R. §1635 • Safe harbor for inadvertent acquisition applies where employer “inadvertently learns genetic information from a social media platform where he or she was given permission to access by the creator of the profile at issue (e.g., a supervisor and employee are connected on a social networking site and the employee provides family medical history on his page).” 29 C.F.R. §1634 52
  • 54. Margaret A. Keane Shareholder Littler Mendelson, P.C. San Francisco Office 415.288.6303 mkeane@littler.com 54