SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
North Central Texas
Council of Governments
e-Government
2000 Fall Forum
MUNICIPALITIES
& THE INTERNET:
A FEW LEGAL ISSUES
Shawn E. Tuma Donohoe, Jameson & Carroll
Telephone: 214-747-5700 3400 Renaissance Tower
E-mail: STuma@djcpc.com Dallas, Texas 75270-2120
Copyright ©2000
All Rights Reserved
The Author’s Biography
Shawn E. Tuma is an attorney practicing with DONOHOE, JAMESON & CARROLL, P.C. in
Dallas, Texas. His practice focuses on the developing law of the Internet and litigation
of commercial disputes involving contract, technology, intellectual property, deceptive
trade practices, insurance, and employment issues.
Mr. Tuma received his B.A., with honors, from Northwestern State University and his
J.D., magna cum laude, from Regent University School of Law, where he was selected
as the Outstanding Graduate in the School of Law, served as Editor-in-Chief of the
Regent University Law Review, received the Corpus Juris Secundum Award for
Contracts and Civil Procedure, and was chosen as a member of Who’s Who Among
Students in American Universities & Colleges and Who’s Who Among American Law
Students.
Mr. Tuma is licensed in all State and Federal Courts in Texas and the Fifth Circuit
Court of Appeals, is a member of the American Bar Association, and Dallas Bar
Association. Mr. Tuma has recently participated in the following professional activities:
PRESENTATIONS
" Contracting Over the Internet in Texas, Presentation to the
Dallas Bar Association, February 2000
" Shifting Paradigms: Practicing Law in the Information Age,
a symposium at Texas Tech School of Law, March 2000
" Contracting Over the Internet, B2B and B2C E Commerce Seminar,
forthcoming February 2001
PUBLICATIONS
" Contracting Over the Internet in Texas, Baylor Law Review,
Volume 51
" It Ain’t Over ‘Till . . . A Post Y-2K Analysis of Y2K Litigation
& Legislation, Texas Tech Law Review, Volume 31, Book IV
" Preserving Liberty: United States v. Printz and the Vigilant
Defense of Federalism, Regent University Law Review,
Volume 10, Number 1
Mr. Tuma is married to Stacy Tuma and they currently have three children, Katherine
who is five, Seth who is four, and Andrew who is two. They are expecting another child
in December. Their family resides in The Colony, Texas.
1
Associate Attorney, Donohoe, Jameson & Carroll, P.C., Dallas, Texas. B.A., Northwestern
State University; J.D., magna cum laude, Regent University School of Law.
MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES
Shawn E. Tuma1
I. INTRODUCTION
The benefits to using the Internet in the day to day operation of municipal
governments are many. Among those, are the dramatic increase in public accessability
to information and governmental efficiency in conducting day-to-day affairs.
Unfortunately, using the Internet poses just as many potential problems as it does
benefits. Unless a municipal government is careful to understand the many pitfalls of
the Internet and prepare itself in advance for those problems, all of the benefits it brings
forth can be lost through disputes and litigation. Thus, it is important for you all to
know where you, your colleagues, and employees stand with a few basic legal issues that
are likely to be encountered with regard to Internet usage. There number of issues that
use of the Internet can raise is incalculable and it would be impossible to address them
all in this article. Accordingly, this article will focus on three issues: first, personal use
of the Internet by officials and employees; second, public access to open government; and
third, entering transactions over the Internet.
II. PERSONAL USE OF THE INTERNET
Personal use of the Internet from the municipality’s office, or using the
municipality’s Internet service by “logging on” from a remote location such as an
employee’s own home, can present several problems for the municipality. Though there
are numerous issues that arise in this area this section will focus on two main problems
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -2-
(stuma@djcpc.com) Copyright © 2000
2
See Paul Sperry, Web-porn scandal rocks White House, WORLDNETDAILY, Aug. 9, 2000
(visited Sept. 29, 2000)
<http://www.worldnetdaily.com/readerservice.../20000809_xnspy_webporn_sc.shtm>; Paul Sperry,
Porn Downloaders ‘ought to be fired’, WORLDNETDAILY, Aug. 11, 2000 (visited Sept. 29, 2000)
<http://www.worldnetdaily.com/readerservice.../20000811_xnspy_porn_downl.shtm>; Lisa Napoli,
White House staff nailed for cyberporn, MSNBC, Aug. 10, 2000 (visited Sept. 29, 2000)
<http://www.zdnet.com/zdnn/stories/news/0,4586,2614219,00.html>.
3
See Paul Sperry, Bush to Gore: No more smut, WORLDNETDAILY, Aug. 12, 2000 (visited
Sept. 29, 2000) <http://www.worldnetdaily.com/readerservice.../20000812_bush_to_go.shtm>; White
House Porn Update: Bush campaign Challenges Gore over Smut, Reports WorldNetDaily.com,
YAHOO!, Aug. 12, 2000 (visited Sept. 29, 2000)
<http://biz.yahoo.com/prnews/000812/dc_worldne.html>.
that are foreseeable, using an example from recent national headlines for illustrative
purposes.
In early August of 2000, WorldNetDaily.com broke a story detailing how a
contractor hired last year to replace the White House Internet “fire wall” as part of Y2K
security upgrades had discovered that numerous White House officials and staffers in
the West Wing had been viewing and downloading hardcore pornographic pictures and
movies (consisting of, among other things, “teen . . . gay and bestiality stuff too. . . .”)
over computers in the White House. This was discovered because the pornography
accounted for “the majority of traffic going through the firewall” and with such frequency
and volume that it jammed the bandwith and slowed down the White House network for
legitimate business.2
This discovery was later dubbed “Porngate” and even became a
talking point in the presidential campaign.3
But the purpose of this article is not to
discuss presidential politics. Rather, it is to discuss what impact such activity would
have if it were occurring in your own municipality — and, believe it or not, it probably
is occurring already, though perhaps to a lesser degree.
This kind of activity raises two serious implications, aside from the obvious
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -3-
(stuma@djcpc.com) Copyright © 2000
4
42 U.S.C. § 20003-2(a)(1).
5
Faragher v. City of Boca Raton, 118 S. Ct. 2275, 2282-83 (1998) (quoting Title VII of the
Civil Rights Act of 1964, 42 U.S.C. § 20003-2(a)(1)).
6
Faragher, 118 S. Ct. at 2283 (citations omitted).
7
See Wyerick v. Bayou Steel Corp., 887 F.2d 1271 (5th
Cir. 1989).
8
Oncale v. Sundowner Offshore Services, Inc., 118 S. Ct. 998, 1002-03 (1998) (citations
omitted).
9
See id. at 1003.
problem that you have someone sitting in their cubicle or office and viewing pornography
while they are being paid to work.
A. Harassing & Discriminatory Conduct
1. Sexual Harassment
As a local government, municipalities are subject to federal sexual harassment
laws which are enforced pursuant to Title VII of the Civil Rights Act of 19644
making it
“‘an unlawful employment practice for an employer . . . to discriminate against any
individual with respect to his compensation, terms, conditions, or privileges of
employment, because of such individual’s . . . sex.’”5
Title VII is violated when the sexual harassment is pervasive enough to “‘”alter
the conditions of [the victim’s] employment and create an abusive working
environment.”’”6
A common way that such harassment claims are made is by the
employee claiming he or she worked in a “sexually hostile environment,” which is
present when there is a “sexually charged” atmosphere.7
Courts look to circumstantial evidence to see if a work environment is sexually
charged.8
Where it is found that circumstances created an environment that a
reasonable person would find hostile, the employer can be found liable for sexual
harassment in violation of Title VII.9
While the mere hidden presence of sexually
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -4-
(stuma@djcpc.com) Copyright © 2000
10
See Urofsky v. Allen, 995 F. Supp. 634, 640-41 (E.D. Va. 1998) (citations omitted), rev’d on
other grounds, Urofsky v. Gilmore, 167 F.3d 191 (4th
Cir. 1999).
11
See Amy Rogers, You Got Mail But Your Employer Does Too: Electronic Communication
and Privacy in the 21st
Century Workplace, 5.1 J. TECH. L.& POL’Y 1 (visited Sept. 29, 2000)
<http://grove.ufl.edu/~techlaw/vol5/emailfinal.htm> (2000) (citing Susan E. Gindin, Guide to E-Mail
and the Internet in the Workplace, The Bureau of National Affairs, 1999
<http://www.info.law.com/guide/html>). See also Farpella-Crosby v. Horizon Health Care, 97 F.3d
803, 806 (5th
Cir. 1996) (Evidence of pervasive comments and questions pertaining to sex may be
sufficient to constitute a hostile working environment).
oriented materials in the workplace alone is insufficient to constitute a sexually hostile
environment,10
it has recently been suggested that even one glimpse of a sexually
explicit picture on a co-worker’s monitor could constitute sexual harassment.11
Imagine that your office was the one described in the “Porngate” discussion in
which numerous employees were viewing pornographic pictures and movies while at
their desks. Moreover, imagine that you have an employee who is unhappy (for any
reason whatsoever) and that her co-worker—or worse yet, supervisor—is sitting a few
feet away from her watching hardcore sex movies at his desk.
You already know the result, should she decide to leave her employment (or be
terminated): an enterprising attorney will ask her whether there was any sexually
oriented activity in the workplace and, upon hearing of the previously mentioned
activities in her presence, will have a solid basis for bringing a sexual harassment
lawsuit against the local government. Accordingly, all of the savings in time and
resources that were brought about through the benefits of using the Internet will be lost
in fighting the lawsuit, also brought on by the Internet.
Other Potential Discriminatory Problems Created by the Internet. In addition to
viewing inappropriate sexual materials in the workplace, a workplace can be found as
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -5-
(stuma@djcpc.com) Copyright © 2000
12
See Laura Pincus Hartman, The Rights and Wrongs of Workplace Snooping, (visited Sept.
29, 2000) <http://www.depaul.edu/ethics/monitor.html>.
13
See Amy Rogers, You Got Mail But Your Employer Does Too: Electronic Communication
and Privacy in the 21st
Century Workplace, 5.1 J. TECH. L.& POL’Y 1 (visited Sept. 29, 2000)
<http://grove.ufl.edu/~techlaw/vol5/emailfinal.htm> (2000).
14
See id.
sexually hostile through the use of the e-mail system. For example, if a supervisor or
employee sends e-mails containing inappropriate sexually related jokes, innuendo, or
derogatory references, such conduct can, and likely would, be considered as contributing
to a hostile work environment. In fact, the Chevron Corporation was recently required
to pay over $2 million to sexual harassment plaintiffs in a somewhat analogous
situation. The “smoking gun” in the case was actually jokes derogatory to women (“why
beer is better than women”) were found on the company’s e-mail server that had been
sent around by several people within Chevron.12
2. Racial / Ethnic Harassment
The Internet has practically been defined by sex and sex-related activities.
Nonetheless, though not as prevalent as sexually related activities, the Internet serves
as host to racial and ethnically demeaning materials as well. Should an officer or
employee of a municipality view racially or ethnically demeaning materials on the
Internet and a co-worker or subordinate learn of those activities, such activities could
certainly be used in a discrimination or harassment lawsuit against the municipality.13
The distribution of such messages doesn’t have to be intentional; it can often occur
inadvertently by typing in the wrong e-mail address.14
Moreover, if an officer or employee of a municipality used their official e-mail
account to send or forward racially or ethnically demeaning messages, the messages
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -6-
(stuma@djcpc.com) Copyright © 2000
15
See id.
16
See Burlington v. Ellerth, 118 S. Ct. 2257 (1998).
17
See Burlington Industries, Inc. v. Ellerth, 118 S. Ct. 2257, 2261 (1998); Faragher v. City of
Boca Raton, 118 S. Ct. 2275, 2292-93 (1998); Walker v. Thompson, 214 F.3d 615, 626-27 (5th
Cir.
2000) (“The Supreme Court explained that although it is not necessary as a matter of law for an
employer to have ‘promulgated an antiharassment policy with complaint procedure,’ the need for
such an expressed policy may be raised when litigating the first element [of the employer’s
affirmative] defense.” (quoting Faragher, 118 S. Ct. at 2293)).
18
Op. Tex. Att’y Gen. No. H-1165 (1978).
would contain a reference to your municipality in them that would be associated with
the message and broadcast to all recipients for as long as the message continues to be
forwarded.15
Such messages could later provide evidence of a discriminatory
environment in a lawsuit against the municipality.
3. Municipality’s Defense
In the event that an employee or former employee chooses to file a discrimination
or harassment lawsuit against a municipality, the municipality can be held liable for the
discriminatory or harassing acts of its officers and employees.16
One of its only defenses
is to show that it took all reasonable steps necessary to prevent such conduct from
occurring in the workplace. One of the key things a municipality can do to further this
is to have a written policy prohibiting such conduct and a clear grievance procedure that
enables an employee to report such conduct should it occur.17
B. Theft
Perhaps the most imposing problem on persons using the Internet for non-public
purposes is that they could be charged with theft. On May 10, 1978, John L. Hill, the
Texas Attorney General, issued an opinion which speaks directly to this subject.18
The
Texas House Judiciary Committee asked General Hill the following questions, which is
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -7-
(stuma@djcpc.com) Copyright © 2000
19
Id.
20
Id.
21
Id. (emphasis added).
22
See id.
23
The relevant portion of section 31.03 provides, "A person commits an offense if he
unlawfully appropriates property with intent to deprive the owner of property.” TEX. PEN. CODE
ANN. §§ 31.03(a). The relevant portion of section 31.04 provides, “A person commits theft of service
if, with intent to avoid payment for service that he knows is provided only for compensation . . .
having control over the disposition of services of another to which he is not entitled, he intentionally
or knowingly diverts the other’s services to his own benefit or another not entitled to them . . . .”
TEX. PEN. CODE ANN. §§ 31.04(a)(2).
24
See id.
relevant to this issue; whether “an elected official, employee, or appointee of the State,
County or Municipal Government can use for private profit or benefit to himself, any
property, supplies, equipment, or other things of value belonging to the State, County
or Municipalities, . . . .”19
General Hill responded as follows: “The misconduct about which you inquire is
clearly prohibited by current law and . . . [codified] under Penal Code chapter 31, which
concerns theft.”20
In summarizing his opinion, General Hill stated: “Use of public
property . . . or services by a public official or employee for private benefit constitutes the
offense of theft.”21
The Attorney General’s opinion clearly indicates that officers or
employees of municipalities are forbidden from using property or services belonging to
the municipality when the use is for private benefit.22
While the Attorney General’s opinion is not binding legal authority, it is the
Attorney General’s interpretation of section 31.03 and 31.04 of the Texas Penal Code23
and the Attorney General has the authority to prosecute violations of that law.
Punishment for violations of those laws can range from a Class C misdemeanor up to a
felony punishable by jail.24
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -8-
(stuma@djcpc.com) Copyright © 2000
25
See Op. Tex. Att’y Gen. No. H-1165 (1978).
26
3 S.W.3d 218 (Tex. App.--Dallas 1999, no pet.).
Therefore, the question that must be addressed is, does one’s use of the
municipality’s computer to send a personal e-mail or to search the Internet for personal
reasons, such as the current price of your stocks, the best air fare for your upcoming
vacation, or the latest presidential polls, fall within the class of prohibited activities?
Under a strict interpretation of the opinion, such activities appear to be prohibited as
they constitute the “[u]se of public property [the computer] . . . [and] services [the
Internet service] by a public official or employee for private benefit [which] constitutes
the offense of theft.”25
However, the more important question is, perhaps, whether the Opinion should
be interpreted so strictly. Consider the following example, underthe strict interpretation
just explained: A city employee is at work and receives a telephone call from her
daughter who is at school but is suffering from an illness and needs to be taken home.
Did the employee violate the strict interpretation of the Attorney General’s opinion? Yes.
She is a public employee who used the city’s telephone (public property) to take a
telephone call for a personal reason (private benefit).
In Garth v. State,26
the Dallas Court of Appeals upheld the conviction of an
undercover police detective for improperly using her employee fuel card to pump
gasoline into her personal vehicle. Admittedly, this case is distinguishable from my
example in that the use of the fuel card actually deprived the public of the amount of
gasoline taken where the use of a public telephone does not deplete the public resource.
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -9-
(stuma@djcpc.com) Copyright © 2000
27
See id. at 221.
28
See id.
29
See Garth, 3 S.W.3d at 222.
30
See id.
Nonetheless, the Garth Court focused on the use of the improper use of the card, not just
the depravation of the fuel.27
The court stated that the employee had a right to possess
the card and control the use of the card but once she decided to use the card for her own
benefit, her possession ceased to be consensual and at that point, her use of the card was
improper.28
The court’s focus on the use of the card as opposed to merely the
misappropriation of the fuel is consistent with the Attorney General’s Opinion stating
that public property should not be used for personal reasons.
Surely there are very few people that would construe the Attorney General’s
opinion so strictly and prosecute our hypothetical mother for theft. Likewise, there are
few who would prosecute someone for using the Internet to check the local weather
before they leave work. But, as extreme as these examples may seem, I use them to
emphasize the importance of making and promulgating a written policy that resolves
these kind of questions.
In the Garth case, the court upheld the defendant’s conviction because it found
the defendant used the city’s property beyond the city’s consent. The court considered
the shift supervisor of the facility upon which the fuel pumps were located as the
owner.29
The court found that because the defendant did not have the supervisor’s
consent to take the fuel, the taking was improper, implying that the supervisor could
have consented to the use.30
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -10-
(stuma@djcpc.com) Copyright © 2000
31
Amy Rogers, supra note 11.
32
See Erik C. Garcia, E-Mail and Privacy Rights, Computers and the Law, Fall 1996 (visited
Sept. 29, 2000) <http://wings.buffalo.edu/law/Complaw/CompLawPapers/garcia.html>.
In following with the Garth court’s reasoning, a municipality could establish an
unambiguous policy allowing its officials and employees to use its computers and
Internet service within certain limits, for example, employees could be allowed to send
and check personal e-mails that do not contain sexually oriented, discriminatory, or
harassing content during non-business hours only. As long as the person’s use is
consistent with the stated policy, it is acting with the municipality’s consent and not
violating the law. Providing a clear written policy that states the municipality’s position
on the use of its computers and the Internet is the best way to insure that its officials
and employees use them properly.
C. Monitoring Internet Usage
The first thing that should come to mind with the mention of monitoring the use
of the Internet is privacy. This is the paramount concern because if done improperly,
what you do to protect yourself from your employee’s actions could actually be used by
your employee against you. In fact, “[t]he issue most often litigated between employers
and employees regarding e-mail and Internet privacy is employee’s expectations of
privacy versus the monitoring practices of the company.”31
Fortunately, however, in reality employees have little or no privacy rights in the
things they access or view over the Internet.32
There are laws that attempt to limit the
unauthorized monitoring of e-mails but, at best, those laws provide only minimal
protection.
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -11-
(stuma@djcpc.com) Copyright © 2000
33
914 F. Supp. 97 (E.D. Penn. 1996).
34
See Rogers, supra note 11,
35
See Jenna Wischmeyer, E-Mail and the Workplace, (visited Sept. 29, 2000)
<http://raven.cc.ukans.edu/~cybermom/CLJ/wisch.html> (citing Pillsbury, 914 F. Supp. at 101).
36
See Rogers, supra note 11.
37
18 U.S.C. §§ 2510 et seq. (1994), <http://www.law.cornell.edu/uscode/18/ch119.html>. See
Wischmeyer, supra note 35.
38
See id.
1. General Privacy Rights
In Smyth v. Pillsbury Co.,33
one of the few cases that has examined the issue of
employees’ privacy rights vis-a-vis employers’ monitoring employees’e-mail andInternet
usage found that employees have very little expectation of privacy in the workplace
setting.34
In this case the court held that even though the employer had assured the
employee that all e-mail communications would remain confidential and would not be
used against him, the employer did not violate his privacy rights by subsequently
intercepting and using his e-mail communications as grounds for terminating his
employment.35
In this case, the court used a balancing test in which it weighed the
employer’s interest in ensuring its e-mail was being used appropriately against the
employee’s privacy interest in sending confidential messages, ultimately finding for the
employer.36
2. The Electronic Communications Privacy Act of 1986
With regards to e-mail communications, employees’ communications are
theoretically protected by The Electronic Communications Privacy Act of 1986 (ECPA),37
which prohibits an anyone, including employers, from intentionally intercepting or
attempting to intercept electronic communications.38
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -12-
(stuma@djcpc.com) Copyright © 2000
39
See Wischmeyer, supra note 35 (citing Steve Jackson Games, Inc. v. United States Secret
Service, 36 F.3d 457 (5th
Cir. 1994); Bohac v. City of Reno, 932 F. Supp. 1232 (D. Nev. 1996)).
40
See id. (citing Jarrod J. White, E-mail@Work.Com: Employer Monitoring of Employee E-
mail, 48 ALA. L. REV.1079, 1082-83 (1997), <http://boots.law.ua.edu/lawreview/whitfull.htm>).
41
See id.
42
See Wischmeyer, supra note 35 (citing 18 U.S.C. § 2511(2)(d) (1994)).
43
704 F.2d 577 (11th
Cir. 1983).
44
See Wischmeyer, supra note 35 (citing Watkins, 704 F.2d at 581-82).
45
Id. (quoting Watkins, 704 F.2d at 581-82).
However, courts have interpreted the interception language strictly and held that
accessing a recordofstoredcommunications is not intercepting a communication.39
Thus,
because there is such a narrow window during which an e-mail communication can be
intercepted(usually only mili-seconds), it would be rare for an employer to violate this
law.40
In fact, probably the only way an employer could violate this law is if it used a
form of automatic routing software to instantaneously send duplicate messages to the
persons monitoring the system.41
The ECPA also has provides an exception that allows an the interception of
electronic communications when one of the parties to the communication has previously
given consent.42
Consent can be given either expressly or implicitly. However, inWatkins
v. L.M. Berry & Co.,43
the court found that an employee did not give implicit consent to
having her telephone conversations monitored simply because she accepted the job with
the knowledge that the employer monitored telephone calls as a part of training.44
As the
court stated, “‘mere knowledge of monitoring capability cannot be considered implied
consent to employer monitoring of all calls.’”45
The court’s reasoning with regard to
telephone calls should apply equally well to e-mail communications. Thus, if an
employer intends to monitor employees’ e-mail messages in a manner that would
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -13-
(stuma@djcpc.com) Copyright © 2000
46
See id. (citations omitted).
47
See id. (quoting 18 U.S.C. § 2511(2)(a)(I) 1994)). Specifically, this provision allows for
interception where an
officer, employee, or agent of a provider of wire or electronic communication service,
whose facilities are used in the transmission of a wire or electronic communication,
intercept[s], disclose[s], or use[s] that communication in the normal course of his
employment while engaged in any activity which is necessarily incident to the
rendition of his service or to the protection of the rights or property of the provider
of that service.
Id.
48
See id.
49
See id.
50
See id. (citing Watkins, 704 F.2d at 582-84).
“intercept” them, it should ensure that it has an unambiguous written policy clearly
stating that it will engage in such practices and also state the degree to which it will
examine the communications.46
The ECPA contains a second exception called the business use exception.47
As the
courts have interpreted this exception, employers who provide the e-mail service may
intercept e-mail communications in the ordinary course of business.48
Most employers
that provide the e-mail service should be considered a “provider of wire or electronic
communication service” even thoughsome believe that was not Congress’ intent.49
Under
this exception, the employer may intercept all business messages and intercept personal
messages only to the extent that it could determine the nature of the message but not
its content.50
At first, Title II of the ECPA seems to provide employees with the most
substantive protection against e-mail monitoring. It makes it “illegal to ‘intentionally
access[] without authorization a facility through which an electronic communication
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -14-
(stuma@djcpc.com) Copyright © 2000
51
See id. (quoting 18 U.S.C. § 2701(a) (1994)).
52
See Rogers, supra note 11 (citing 18 U.S.C. § 2511).
53
See U.S. CONST. Amend. IV.
54
See Rogers, supra note 11 (citing Vega-Rodriguez v. Puerto Rico Tel. Co., 110 F.3d 174, 178
(1st
Cir. 1997)).
service is provided’ or to ‘intentionally exceed [] an authorization to access [a] facility.’”51
However, there is one exception: it does not apply “if ‘the person or entity providing a
wire or electronic communications service’ authorizes the access”52
—the employer.
It is relatively clear that municipalities, as employers, can monitor employees’ use
of the municipalities’ Internet service. Moreover, most of the current laws and court
decisions do very little to limit the employer’s right to monitor e-mail usage.
Nonetheless, a municipality should be prudent in establishing and promulgating an
unambiguous policy that addresses each of these concerns and states the manner in
which they will be addressed. In doing so, the municipality’s employees will have a
better understanding of that is expected of them as well as what they should expect with
regard to privacy. In addition to that, and perhaps most important, such guidelines will
deter employees from challenging the municipality’s monitoring of their Internet usage
and e-mail communications in court.
3. The Fourth Amendment
The Fourth Amendment to the United States Constitution protects people against
unreasonable searches and seizures.53
While this provisions does not apply to private
employers, it does apply to municipal governments. However, it is largely
inconsequential. Courtswill typically uphold a municipality’s right to monitor workplace
communications when there are legitimate business reasons54
as determined by
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -15-
(stuma@djcpc.com) Copyright © 2000
55
See Rogers, supra note 11 (citing Connick v. Meyers, 461 U.S. 138, 152-53 (1983)).
56
See id. (referencing the Freedom of Information Act, 5 U.S.C. § 552 (1988)).
57
See Jeffrey Norgle, Revising the Freedom of Information Act for the Information Age: The
Electronic Freedom of Information Act, 14 J. MARSHALL J. COMPUTER & INFO. L. 817, 821-22 (1996).
58
5 U.S.C. § 552 (Supp. II 1996).
59
Stephen M. Johnson, The Internet Changes Everything: Revolutionizing Public
Participation and Access to Government Information Through the Internet, 50 ADMIN. L. REV. 277,
291 (1998).
60
See Norgle, supra note 57 (citing Dismukes v. Dep’t of the Interior, 603 F. Supp. 760, 763
(D.D.C. 1984)). See also id. (citing Armstrong v. Bush, 721 F. Supp. 343 (D.D.C. 1989)).
balancing the importance of the municipality’s maintaining control of the work
environment against the rights of the employee and public.55
III. THE PUBLIC’S RIGHT TO INFORMATION
A. Federal Law
The Freedom of Information Act (FOIA),56
enacted in 1966, gave the press and
public access to information held by the federal government and its agencies.57
Thirty-
years later, in 1996, Congress amended the Freedom of Information Act with the
Electronic Freedom of Information Act Amendments (EFOIA)58
for the purpose of
encouraging the federal government and its “agencies to use new technology to
disseminate and ensure access to government information collected through new
technology.59
Under the pre-amendment FOIA, one of the major problems was that the
government was allowed to chose what form of media it would provide when disclosing
information as long as the form the agency chose neither unreasonably hampered the
requester nor reduced the usefulness of the information.60
For example, where an agency
kept records on both microfiche and computer tapes, the agency could chose to disclose
the information on microfiche even the person requested the information on computer
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -16-
(stuma@djcpc.com) Copyright © 2000
61
See Norgle, supra note 57 (citing Dismukes, 603 F. Supp. at 762).
62
See Johnson, supra note 59 (citing 5 U.S.C. § 552(a)(3)(B)).
63
See id.
64
See id. (citing 5 U.S.C. § 552(a)(2)(E)).
65
See id.
66
See id. (citing 5 U.S.C. § 552(a)(3)).
67
Cf. 5. U.S.C. § 551(1) (“‘agency’ means each authority of the Government of the United
States, whether or not it is within or subject to review by another agency, . . . .”).
68
See also Op. Tex. Att’y Gen. No. 654 (1997).
69
TEX. GOV’T CODE ANN. § 551.001 et. seq.
tape.61
Under the EFOIA, if the request is made for “records in electronic format, and the
records are readily reproducible in that format, the agency must provide them in that
format.”62
The EFOIA further requires agencies to make an effort to maintain records in
electronic format,63
create a computer accessible index of frequently requested files
available to the public,64
and make records that it creates pursuant to the FOIA
“accessible to the public by computer or other electronic means.”65
Finally, it requires
agencies to make annual reports of their compliance with these requirements.66
Of course, being in Texas, we are aware that the Freedom of Information Act and
the Electronic Freedom of Information Act Amendments are limited to the federal
government and neither apply to state or local governments.67
Nonetheless, it is
important to consider them as the Texas Attorney General has looked to the provisions
of the EFOIA in interpreting the relevant Texas laws.68
B. Texas Law
1. Open Meetings Act
The Open Meetings Act (OMA)69
requires that “[e]very regular, special, or called
meeting of a governmental body shall be open to the public, except as provided” within
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -17-
(stuma@djcpc.com) Copyright © 2000
70
TEX. GOV’T CODE ANN. § 551.002.
71
TEX. GOV’T CODE ANN. § 551.001(4)(A)-(B). Specifically, section the OMA defines a meeting
as being
(A) a deliberation between a quorum of a governmental body, or between a quorum
of a governmental body and another person, during which public business or public policy
over which the governmental body has supervision or control is discussed or considered or
during which the governmental body takes formal action; or
(B) except as otherwise provided by this subdivision, a gathering:
(i) that is conducted by the governmental body or for which the
governmental body is responsible;
(ii) at which a quorum of members of the governmental body is present;
(iii) that has been called by the governmental body; and
(iv) at which the members receive information from, give information to, ask
questions of, or receive questions from any third person, including an employee of the
governmental body, about the public business or public policy over which the governmental
has supervision or control. The term does not include a gathering of a quorum of a
governmental body as a social function unrelated to the public business that is conducted by
the body, or the attendance by a quorum of a governmental body at a regional, state, or
national convention or workshop, if formal action is not taken and any discussion of public
business is incidental to the social function, convention, or workshop. The term includes a
session of a governmental body.
Id.
72
See id.
73
See Alan J. Bojorquez, Wide Open Government (visited Oct. 30, 2000)
<http://www.bickerstaff.com/articles/wideopen7.htm> (citing Op. Tex. Att’y Gen. Nos. JC-0060
(1999), JM-1072 (1989), and H-238 (1974)).
74
See id. (citing Op. Tex. Att’y Gen. No. JM-1072 (1989)).
the Act.70
The use of the Internet by municipalities raises two questions concerning this
mandate: First, what is a “meeting”? Second, what is considered to be “open to the
public”?
The OMA provides a fairly elaborate definition of meeting.71
In essence, there is
a “meeting” when there is deliberation of official governmental business by a quorum
of a governmental body, even if others are present.72
The Attorney General has even
applied the Open Meetings Act to meetings where a quorum was not present.73
One of
the few situations the OMA doesn’t apply is in social gatherings or seminars where any
discussion of official business is purely incidental.74
As a general rule, it would be safe
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -18-
(stuma@djcpc.com) Copyright © 2000
75
See TEX. GOV’T CODE ANN. § 551.128.
76
Id.
77
See Op. Tex. Att’y Gen. No. DM-480 (1998) (Where technical difficulties are experienced
during the broadcast of a video-conference call, the meeting must be recessed.).
78
“‘Quorum’ means a majority of a governmental body, unless defined differently by
applicable law or rule of the charter of the governmental body.” TEX. GOV’T CODE ANN. 551.001(6).
79
See Acker v. Tex. Water Comm’n, 790 S.W.2d 299, 300-01 (Tex. 1990); Bexar Medina
Atascosa Water Dist. v. Bexar Medina Atascosa Landowners’ Ass’n, 2 S.W.3d 459, 461 (Tex.
to assume that if a quorum of a governmental body is physically present and official
business is discussed, it will be considered a meeting.
The real issue for our purposes, however, is how Internet communications
between government officials will be treated for purposes of the OMA. In 1999 a new
section was added to the Open Meetings Act that specifically allows meetings to be
broadcast over the Internet, subject to certain requirements.75
Specifically, this section
provides that “a governmental body may broadcast an open meeting over the Internet.
. . . [provided that it] shall establish an Internet site and provide access to the broadcast
from that site. . . . [and] provide the same notice of the meeting that the governmental
body is required to [ordinarily] post.”76
However, if a technical problem arises that
disrupts the Internet broadcast, the meeting must be recessed.77
Neither the Legislature nor the Attorney General has specifically addressed
whether communications between governmental officers made by e-mail of over the
Internet by other means are considered meetings. However, a brief analysis of some of
the basics of what constitutes meetings and deliberations should provide an accurate
prediction of what will constitute a meeting.
The key inquiry with regard to this issue is whether a quorum (majority)78
participates in the deliberation.79
In Acker v. Texas Water Comm’n,80
the Supreme Court
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -19-
(stuma@djcpc.com) Copyright © 2000
App.–San Antonio 1999, pet. denied).
80
790 S.W.2d 299 (Tex. 1990).
81
Id. at 300.
82
See id. at 301 (The Open Meetings Act forbids ex parte deliberations between a majority of
government decisionmakers.).
83
See id. at 302.
84
See Faulder v. Texas Bd. of Pardons and Paroles, 990 S.W.2d 944, 946 (Tex. App.–Austin
1999, no pet.).
85
See id.
86
See Harris County Emergency Service Dist. #1 v. Harris County Emergency Corps., 999
S.W.2d 163, 168 (Tex. App.–Houston [14th
Dist.] 1999, no pet.).
87
See Shawn E. Tuma & Christopher R. Ward, Contracting Over the Internet in Texas, 51
BAYLOR L. REV. 15 (forthcoming 2001), <http://www.geocities.com/dallaslawyer_23456/econ.pdf>.
88
See TEX. GOV’T CODE ANN. § 551.001(4)(B).
of Texas stated that “when a majority of a public decisionmaking body is considering a
pending issue, there can be no ‘informal’ discussions. There is either formal
consideration of a matter in compliance with the Open Meetings Act or an illegal
meeting.”81
Focusing on whether there was a majority of decisionmakers participating,82
the Court held the Open Meetings Act was violated where two of the three
commissioners had an ex parte discussion of official matters while in the restroom.83
The meeting requirements apply to telephone conversations between government
officials.84
Consistent with the reasoning in Acker, where public officials have used the
telephone to discuss official business and a quorum participated, the discussions were
considered to be meetings.85
However, where public officials discussofficial business over
the telephone but there is no quorum participating in the discussion, the telephone
discussion is not a meeting.86
When governmental officials participate in meetings over the telephone, they are
in a real-time two-way conversation such that they are in each other’s “virtual
presence”87
which is a “gathering” pursuant to the Open Meetings Act.88
Internet “chat
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -20-
(stuma@djcpc.com) Copyright © 2000
89
See TEX. GOV’T CODE ANN. § 551.128.
90
See Tuma & Ward, supra note 87.
91
See id. (citing Thomas J. Smedinghoff, Electronic Contracts & Digital Signatures: An
Overview of Law and Legislation, 564 PRAC. L. INST. 125, 135 (1999); Jeff C. Dodd & James A.
Hernandez, Contracting in Cyberspace, 1998 COMPUTER L. REV. & TECH. J. 1, 12 (1998)).
92
See Acker, 790 S.W.2d at 300-01.
rooms,” “instant messages,” and other real-time methods of communicating over the
Internet provide the same “virtual presence” as telephone discussions. Accordingly,
Internet communications that provide such “virtual presence” will be subject to the
requirements of the Open Meetings Act and should not be engaged in by a quorum of
government officials unless the meetings are conducted in accordance with requirements
for meetings broadcast over the Internet.89
E-mail communications do not necessarily provide the same “virtual presence” as
do the real-time Internet communications.90
E-mail messages are often routed through
different servers for significant periods of time and often remain in the recipient’s
mailbox for days before being opened.91
Without this “virtual presence,” e-mail
communications should not be considered analogous to telephone conversations for
determining whether such constitute a meeting.
Because of the quorum principle, it is relatively clear that if an e-mail is sent from
one governmental official to another governmental official and the two of them do not
constitute a quorum, the communication will not be considered a meeting.92
The question
becomes whether an e-mail communication that is sent among a quorum is a meeting.
Such a message would be more analogous to a letter or other written correspondence
sent among a quorum of officials.
In 1992, the Texas Attorney General issued an opinion on the following question,
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -21-
(stuma@djcpc.com) Copyright © 2000
93
See Op. Tex. Att’y Gen. DM-95 (1992).
94
See id. (quoting the definition of “meeting” as set forth in the Act).
95
See id. (quoting the definition of “deliberation” as set forth in the Act).
96
See id.
which it called hypothetical: “whether members of a city council violate the Open
Meetings Act . . . when the members constituting a majority of the council, sign a letter
expressing an opinion on matters relevant to the city government.”93
In analyzing this
issue, the Attorney General acknowledged that there can be no meeting unless there is
a “deliberation”94
and that “deliberation” requires the existence of “a verbal exchange .
. . .”95
Accordingly, the signing of such a letter by a quorum does not seem to fit within
the precise language of the Open Meetings Act. Nonetheless, the Attorney General
looked to the public policy behind the Open Meetings Act and ultimately concluded that
signing of a letter by a quorum, even if they never met to discuss it, would be violative
of the OMA.96
At this time, one must assume that the Attorney General’s Office would view an
e-mail message sent to a quorum of a governmental body the same way it did the written
letter and treat it as a “meeting” for purposes of the OMA. Given the increased use of
technology by Texas’ state and local governments, this is an important issue that the
Attorney General needs to clarify. For now, however, government officials should not
send e-mail messages pertaining to official business to a quorum of the members of the
governmental body as such messages would likely be construed as a meeting violative
of the OMA. Moreover, officials should also avoid sending e-mails pertaining to official
business to one or members constituting less than quorum. Consider the following
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -22-
(stuma@djcpc.com) Copyright © 2000
97
See Bojorquez, supra note 73 (citing Op. Tex. Att’y Gen. No. ORD 654 (1997).
98
See Jeff C. Dodd & James A. Hernandez, Contracting in Cyberspace, 1998 COMPUTER L.
REV. & TECH. J. 1, 12 (1998); Thomas J. Smedinghoff, Electronic Contracts & Digital Signatures:
An Overview of Law and Legislation, 564 PRAC. L. INST. 125, 135 (1999); Shawn E. Tuma &
Christopher R. Ward, Contracting Over the Internet in Texas, 51 BAYLOR L. REV. ___ (forthcoming
2001), <http://www.geocities.com/dallaslawyer_23456/econ.pdf>.
99
For an excellent compilation of these laws, see the Texas Electronic Commerce Homepage
at the following Internet address: <http://www.state.tx.us/EC/>.
example: There are five members on a local governing body, with three constituting a
quorum. Member 1 sends such a message to Member 2, with the two of them being less
than a quorum. Member 2, however, is close friends with Member 3 and believes the
content of the message is something to which Member 3 should be privy. Member 2
forwards the message to Member 3 and now the message has been circulated among a
quorum: the Open Meetings Act is violated according to the Attorney General’s current
position. One other reason to consider not communicating by e-mail is that e-mail
messages may be considered a public document and subject to disclosure pursuant to the
Public Information Act.97
IV. ISSUES RAISED IN ENTERING TRANSACTIONS VIA THE INTERNET
Municipal governments are generally subject to the same rules governing
electronic contracts as are private entities. Because these rules have been discussed at
length in other articles98
they need not be repeated. However, along with the numerous
other laws recently promulgated by the Legislature with regard to the Internet and
electronic commerce in general,99
there are specific rules that apply to electronic
contracts entered into by municipal governments and other state agencies that are
worthy of mention.
House Bill 984 in the 1997 Legislature was directly addressed the issue of
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -23-
(stuma@djcpc.com) Copyright © 2000
100
A digital signature is any symbol “executed or adopted by the party with the present
intention to authenticate a writing.” TEX. BUS. & COMM. CODE. ANN. § 1.201(39).
101
See TEX. GOV’T CODE ANN. § 2054.060(a). Specifically, this key provisions regarding state
agencies are as follows:
(a) A digital signature may be used to authenticate a written electronic
communication sent to a state agency if it complies with rules adopted by the
department. Before adopting the rules, the department shall consult with the
comptroller, state auditor, attorney general, secretary of state, and office of court
administration, and with representatives of county and municipal governments,
regarding the content of the rules. When adopting the rules, the department shall
consider factors that may affect the reliability of a digital signature, including
whether a digital signature is:
(1) unique to the person using it;
(2) capable of independent verification;
(3) under the sole control of the person using it; and
(4) transmitted in a manner that will make it infeasible to change the data in
the communication or digital signature without invalidating the digital signature.
Id.
102
See TEX. GOV’T CODE ANN. § 2054.060(b). Specifically, this key provisions regarding local
governments is as follows:
(b) A digital signature may be used to authenticate a written electronic
communication sent to a local government if it complies with rules adopted by the
governing body of the local government. Before adopting the rules, the governing
body of the local government shall consider the rules adopted by the department
and, to the extent possible and practicable, shall make the governing body's rules
consistent with the department's rules.
Id.
entering electronic transactions by local governments. The Bill amended Chapter 2054
of the Government Code by adding Section 2054.060 which expressly allows digital
signatures100
to be used in transactions with state agencies101
and local governments,102
subject to some qualifications.
V. CLOSING
The use of the Internet by state and local governments will undoubtedly flourish
over the next few years. With its use comes the potential for a tremendous increase in
both accessibility to the public and efficiency in attending to governmental affairs.
Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -24-
(stuma@djcpc.com) Copyright © 2000
However, along with the increased use of the Internet comes several potential problems.
Many of these problems can be easily addressed with clear policies that are promulgated
to officials and employees alike while others require a clearer understanding of the law.
Nonetheless, if proper measures are taken to avoid these potential problems, state and
local governments will be able to reap all of the promise that the Internet holds without
compromising the gains through disputes and litigation.

Mais conteúdo relacionado

Mais procurados

The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionSteven Brownstein
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
PerspectivesmanageArt Bowker
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)Felipe Prado
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHNI Risk Services
 
Memorandum of Points and References in Support of Petition for Post Convictio...
Memorandum of Points and References in Support of Petition for Post Convictio...Memorandum of Points and References in Support of Petition for Post Convictio...
Memorandum of Points and References in Support of Petition for Post Convictio...awc166
 
02/10/13 ADECCO EMAIL (For Translation)
02/10/13 ADECCO EMAIL (For Translation)02/10/13 ADECCO EMAIL (For Translation)
02/10/13 ADECCO EMAIL (For Translation)VogelDenise
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Lilian Edwards
 
The Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPAThe Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPAShanna Kurpe
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?Lilian Edwards
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 

Mais procurados (19)

The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims Handling
 
Memorandum of Points and References in Support of Petition for Post Convictio...
Memorandum of Points and References in Support of Petition for Post Convictio...Memorandum of Points and References in Support of Petition for Post Convictio...
Memorandum of Points and References in Support of Petition for Post Convictio...
 
02/10/13 ADECCO EMAIL (For Translation)
02/10/13 ADECCO EMAIL (For Translation)02/10/13 ADECCO EMAIL (For Translation)
02/10/13 ADECCO EMAIL (For Translation)
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
The Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPAThe Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPA
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
File000098
File000098File000098
File000098
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
PIPA and SOPA
PIPA and SOPAPIPA and SOPA
PIPA and SOPA
 

Destaque

KCB201 Week 5 Slidecast: Networked People
KCB201 Week 5 Slidecast: Networked PeopleKCB201 Week 5 Slidecast: Networked People
KCB201 Week 5 Slidecast: Networked PeopleAxel Bruns
 
Internet code of conduct.
Internet code of conduct.Internet code of conduct.
Internet code of conduct.Margo Edgar
 
Legal issues of internet marketing
Legal issues of internet marketingLegal issues of internet marketing
Legal issues of internet marketingSuzanne Dibble
 
Is Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the Internet
Is Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the InternetIs Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the Internet
Is Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the InternetConnie Crosby
 
Internet Legal Research
Internet Legal ResearchInternet Legal Research
Internet Legal ResearchDittakavi Rao
 
Legal and ethical powerpoint
Legal and ethical powerpointLegal and ethical powerpoint
Legal and ethical powerpointnadiaalimuddin
 

Destaque (6)

KCB201 Week 5 Slidecast: Networked People
KCB201 Week 5 Slidecast: Networked PeopleKCB201 Week 5 Slidecast: Networked People
KCB201 Week 5 Slidecast: Networked People
 
Internet code of conduct.
Internet code of conduct.Internet code of conduct.
Internet code of conduct.
 
Legal issues of internet marketing
Legal issues of internet marketingLegal issues of internet marketing
Legal issues of internet marketing
 
Is Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the Internet
Is Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the InternetIs Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the Internet
Is Web 2.0 a Threat to Legal Knowledge? -- Legal Services via the Internet
 
Internet Legal Research
Internet Legal ResearchInternet Legal Research
Internet Legal Research
 
Legal and ethical powerpoint
Legal and ethical powerpointLegal and ethical powerpoint
Legal and ethical powerpoint
 

Semelhante a Municipalities & The Internet: A Few Legal Issues

Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Kim Moore
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11TeamOneI1MBA11
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)Felipe Prado
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)Felipe Prado
 
Censorship down under
Censorship down underCensorship down under
Censorship down underErhan Boduk
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 

Semelhante a Municipalities & The Internet: A Few Legal Issues (12)

Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Usa Patriot Act
Usa Patriot ActUsa Patriot Act
Usa Patriot Act
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 

Mais de Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital EngagementShawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 

Mais de Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Último

一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 

Último (20)

Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 

Municipalities & The Internet: A Few Legal Issues

  • 1. North Central Texas Council of Governments e-Government 2000 Fall Forum MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Shawn E. Tuma Donohoe, Jameson & Carroll Telephone: 214-747-5700 3400 Renaissance Tower E-mail: STuma@djcpc.com Dallas, Texas 75270-2120 Copyright ©2000 All Rights Reserved
  • 2. The Author’s Biography Shawn E. Tuma is an attorney practicing with DONOHOE, JAMESON & CARROLL, P.C. in Dallas, Texas. His practice focuses on the developing law of the Internet and litigation of commercial disputes involving contract, technology, intellectual property, deceptive trade practices, insurance, and employment issues. Mr. Tuma received his B.A., with honors, from Northwestern State University and his J.D., magna cum laude, from Regent University School of Law, where he was selected as the Outstanding Graduate in the School of Law, served as Editor-in-Chief of the Regent University Law Review, received the Corpus Juris Secundum Award for Contracts and Civil Procedure, and was chosen as a member of Who’s Who Among Students in American Universities & Colleges and Who’s Who Among American Law Students. Mr. Tuma is licensed in all State and Federal Courts in Texas and the Fifth Circuit Court of Appeals, is a member of the American Bar Association, and Dallas Bar Association. Mr. Tuma has recently participated in the following professional activities: PRESENTATIONS " Contracting Over the Internet in Texas, Presentation to the Dallas Bar Association, February 2000 " Shifting Paradigms: Practicing Law in the Information Age, a symposium at Texas Tech School of Law, March 2000 " Contracting Over the Internet, B2B and B2C E Commerce Seminar, forthcoming February 2001 PUBLICATIONS " Contracting Over the Internet in Texas, Baylor Law Review, Volume 51 " It Ain’t Over ‘Till . . . A Post Y-2K Analysis of Y2K Litigation & Legislation, Texas Tech Law Review, Volume 31, Book IV " Preserving Liberty: United States v. Printz and the Vigilant Defense of Federalism, Regent University Law Review, Volume 10, Number 1 Mr. Tuma is married to Stacy Tuma and they currently have three children, Katherine who is five, Seth who is four, and Andrew who is two. They are expecting another child in December. Their family resides in The Colony, Texas.
  • 3. 1 Associate Attorney, Donohoe, Jameson & Carroll, P.C., Dallas, Texas. B.A., Northwestern State University; J.D., magna cum laude, Regent University School of Law. MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Shawn E. Tuma1 I. INTRODUCTION The benefits to using the Internet in the day to day operation of municipal governments are many. Among those, are the dramatic increase in public accessability to information and governmental efficiency in conducting day-to-day affairs. Unfortunately, using the Internet poses just as many potential problems as it does benefits. Unless a municipal government is careful to understand the many pitfalls of the Internet and prepare itself in advance for those problems, all of the benefits it brings forth can be lost through disputes and litigation. Thus, it is important for you all to know where you, your colleagues, and employees stand with a few basic legal issues that are likely to be encountered with regard to Internet usage. There number of issues that use of the Internet can raise is incalculable and it would be impossible to address them all in this article. Accordingly, this article will focus on three issues: first, personal use of the Internet by officials and employees; second, public access to open government; and third, entering transactions over the Internet. II. PERSONAL USE OF THE INTERNET Personal use of the Internet from the municipality’s office, or using the municipality’s Internet service by “logging on” from a remote location such as an employee’s own home, can present several problems for the municipality. Though there are numerous issues that arise in this area this section will focus on two main problems
  • 4. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -2- (stuma@djcpc.com) Copyright © 2000 2 See Paul Sperry, Web-porn scandal rocks White House, WORLDNETDAILY, Aug. 9, 2000 (visited Sept. 29, 2000) <http://www.worldnetdaily.com/readerservice.../20000809_xnspy_webporn_sc.shtm>; Paul Sperry, Porn Downloaders ‘ought to be fired’, WORLDNETDAILY, Aug. 11, 2000 (visited Sept. 29, 2000) <http://www.worldnetdaily.com/readerservice.../20000811_xnspy_porn_downl.shtm>; Lisa Napoli, White House staff nailed for cyberporn, MSNBC, Aug. 10, 2000 (visited Sept. 29, 2000) <http://www.zdnet.com/zdnn/stories/news/0,4586,2614219,00.html>. 3 See Paul Sperry, Bush to Gore: No more smut, WORLDNETDAILY, Aug. 12, 2000 (visited Sept. 29, 2000) <http://www.worldnetdaily.com/readerservice.../20000812_bush_to_go.shtm>; White House Porn Update: Bush campaign Challenges Gore over Smut, Reports WorldNetDaily.com, YAHOO!, Aug. 12, 2000 (visited Sept. 29, 2000) <http://biz.yahoo.com/prnews/000812/dc_worldne.html>. that are foreseeable, using an example from recent national headlines for illustrative purposes. In early August of 2000, WorldNetDaily.com broke a story detailing how a contractor hired last year to replace the White House Internet “fire wall” as part of Y2K security upgrades had discovered that numerous White House officials and staffers in the West Wing had been viewing and downloading hardcore pornographic pictures and movies (consisting of, among other things, “teen . . . gay and bestiality stuff too. . . .”) over computers in the White House. This was discovered because the pornography accounted for “the majority of traffic going through the firewall” and with such frequency and volume that it jammed the bandwith and slowed down the White House network for legitimate business.2 This discovery was later dubbed “Porngate” and even became a talking point in the presidential campaign.3 But the purpose of this article is not to discuss presidential politics. Rather, it is to discuss what impact such activity would have if it were occurring in your own municipality — and, believe it or not, it probably is occurring already, though perhaps to a lesser degree. This kind of activity raises two serious implications, aside from the obvious
  • 5. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -3- (stuma@djcpc.com) Copyright © 2000 4 42 U.S.C. § 20003-2(a)(1). 5 Faragher v. City of Boca Raton, 118 S. Ct. 2275, 2282-83 (1998) (quoting Title VII of the Civil Rights Act of 1964, 42 U.S.C. § 20003-2(a)(1)). 6 Faragher, 118 S. Ct. at 2283 (citations omitted). 7 See Wyerick v. Bayou Steel Corp., 887 F.2d 1271 (5th Cir. 1989). 8 Oncale v. Sundowner Offshore Services, Inc., 118 S. Ct. 998, 1002-03 (1998) (citations omitted). 9 See id. at 1003. problem that you have someone sitting in their cubicle or office and viewing pornography while they are being paid to work. A. Harassing & Discriminatory Conduct 1. Sexual Harassment As a local government, municipalities are subject to federal sexual harassment laws which are enforced pursuant to Title VII of the Civil Rights Act of 19644 making it “‘an unlawful employment practice for an employer . . . to discriminate against any individual with respect to his compensation, terms, conditions, or privileges of employment, because of such individual’s . . . sex.’”5 Title VII is violated when the sexual harassment is pervasive enough to “‘”alter the conditions of [the victim’s] employment and create an abusive working environment.”’”6 A common way that such harassment claims are made is by the employee claiming he or she worked in a “sexually hostile environment,” which is present when there is a “sexually charged” atmosphere.7 Courts look to circumstantial evidence to see if a work environment is sexually charged.8 Where it is found that circumstances created an environment that a reasonable person would find hostile, the employer can be found liable for sexual harassment in violation of Title VII.9 While the mere hidden presence of sexually
  • 6. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -4- (stuma@djcpc.com) Copyright © 2000 10 See Urofsky v. Allen, 995 F. Supp. 634, 640-41 (E.D. Va. 1998) (citations omitted), rev’d on other grounds, Urofsky v. Gilmore, 167 F.3d 191 (4th Cir. 1999). 11 See Amy Rogers, You Got Mail But Your Employer Does Too: Electronic Communication and Privacy in the 21st Century Workplace, 5.1 J. TECH. L.& POL’Y 1 (visited Sept. 29, 2000) <http://grove.ufl.edu/~techlaw/vol5/emailfinal.htm> (2000) (citing Susan E. Gindin, Guide to E-Mail and the Internet in the Workplace, The Bureau of National Affairs, 1999 <http://www.info.law.com/guide/html>). See also Farpella-Crosby v. Horizon Health Care, 97 F.3d 803, 806 (5th Cir. 1996) (Evidence of pervasive comments and questions pertaining to sex may be sufficient to constitute a hostile working environment). oriented materials in the workplace alone is insufficient to constitute a sexually hostile environment,10 it has recently been suggested that even one glimpse of a sexually explicit picture on a co-worker’s monitor could constitute sexual harassment.11 Imagine that your office was the one described in the “Porngate” discussion in which numerous employees were viewing pornographic pictures and movies while at their desks. Moreover, imagine that you have an employee who is unhappy (for any reason whatsoever) and that her co-worker—or worse yet, supervisor—is sitting a few feet away from her watching hardcore sex movies at his desk. You already know the result, should she decide to leave her employment (or be terminated): an enterprising attorney will ask her whether there was any sexually oriented activity in the workplace and, upon hearing of the previously mentioned activities in her presence, will have a solid basis for bringing a sexual harassment lawsuit against the local government. Accordingly, all of the savings in time and resources that were brought about through the benefits of using the Internet will be lost in fighting the lawsuit, also brought on by the Internet. Other Potential Discriminatory Problems Created by the Internet. In addition to viewing inappropriate sexual materials in the workplace, a workplace can be found as
  • 7. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -5- (stuma@djcpc.com) Copyright © 2000 12 See Laura Pincus Hartman, The Rights and Wrongs of Workplace Snooping, (visited Sept. 29, 2000) <http://www.depaul.edu/ethics/monitor.html>. 13 See Amy Rogers, You Got Mail But Your Employer Does Too: Electronic Communication and Privacy in the 21st Century Workplace, 5.1 J. TECH. L.& POL’Y 1 (visited Sept. 29, 2000) <http://grove.ufl.edu/~techlaw/vol5/emailfinal.htm> (2000). 14 See id. sexually hostile through the use of the e-mail system. For example, if a supervisor or employee sends e-mails containing inappropriate sexually related jokes, innuendo, or derogatory references, such conduct can, and likely would, be considered as contributing to a hostile work environment. In fact, the Chevron Corporation was recently required to pay over $2 million to sexual harassment plaintiffs in a somewhat analogous situation. The “smoking gun” in the case was actually jokes derogatory to women (“why beer is better than women”) were found on the company’s e-mail server that had been sent around by several people within Chevron.12 2. Racial / Ethnic Harassment The Internet has practically been defined by sex and sex-related activities. Nonetheless, though not as prevalent as sexually related activities, the Internet serves as host to racial and ethnically demeaning materials as well. Should an officer or employee of a municipality view racially or ethnically demeaning materials on the Internet and a co-worker or subordinate learn of those activities, such activities could certainly be used in a discrimination or harassment lawsuit against the municipality.13 The distribution of such messages doesn’t have to be intentional; it can often occur inadvertently by typing in the wrong e-mail address.14 Moreover, if an officer or employee of a municipality used their official e-mail account to send or forward racially or ethnically demeaning messages, the messages
  • 8. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -6- (stuma@djcpc.com) Copyright © 2000 15 See id. 16 See Burlington v. Ellerth, 118 S. Ct. 2257 (1998). 17 See Burlington Industries, Inc. v. Ellerth, 118 S. Ct. 2257, 2261 (1998); Faragher v. City of Boca Raton, 118 S. Ct. 2275, 2292-93 (1998); Walker v. Thompson, 214 F.3d 615, 626-27 (5th Cir. 2000) (“The Supreme Court explained that although it is not necessary as a matter of law for an employer to have ‘promulgated an antiharassment policy with complaint procedure,’ the need for such an expressed policy may be raised when litigating the first element [of the employer’s affirmative] defense.” (quoting Faragher, 118 S. Ct. at 2293)). 18 Op. Tex. Att’y Gen. No. H-1165 (1978). would contain a reference to your municipality in them that would be associated with the message and broadcast to all recipients for as long as the message continues to be forwarded.15 Such messages could later provide evidence of a discriminatory environment in a lawsuit against the municipality. 3. Municipality’s Defense In the event that an employee or former employee chooses to file a discrimination or harassment lawsuit against a municipality, the municipality can be held liable for the discriminatory or harassing acts of its officers and employees.16 One of its only defenses is to show that it took all reasonable steps necessary to prevent such conduct from occurring in the workplace. One of the key things a municipality can do to further this is to have a written policy prohibiting such conduct and a clear grievance procedure that enables an employee to report such conduct should it occur.17 B. Theft Perhaps the most imposing problem on persons using the Internet for non-public purposes is that they could be charged with theft. On May 10, 1978, John L. Hill, the Texas Attorney General, issued an opinion which speaks directly to this subject.18 The Texas House Judiciary Committee asked General Hill the following questions, which is
  • 9. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -7- (stuma@djcpc.com) Copyright © 2000 19 Id. 20 Id. 21 Id. (emphasis added). 22 See id. 23 The relevant portion of section 31.03 provides, "A person commits an offense if he unlawfully appropriates property with intent to deprive the owner of property.” TEX. PEN. CODE ANN. §§ 31.03(a). The relevant portion of section 31.04 provides, “A person commits theft of service if, with intent to avoid payment for service that he knows is provided only for compensation . . . having control over the disposition of services of another to which he is not entitled, he intentionally or knowingly diverts the other’s services to his own benefit or another not entitled to them . . . .” TEX. PEN. CODE ANN. §§ 31.04(a)(2). 24 See id. relevant to this issue; whether “an elected official, employee, or appointee of the State, County or Municipal Government can use for private profit or benefit to himself, any property, supplies, equipment, or other things of value belonging to the State, County or Municipalities, . . . .”19 General Hill responded as follows: “The misconduct about which you inquire is clearly prohibited by current law and . . . [codified] under Penal Code chapter 31, which concerns theft.”20 In summarizing his opinion, General Hill stated: “Use of public property . . . or services by a public official or employee for private benefit constitutes the offense of theft.”21 The Attorney General’s opinion clearly indicates that officers or employees of municipalities are forbidden from using property or services belonging to the municipality when the use is for private benefit.22 While the Attorney General’s opinion is not binding legal authority, it is the Attorney General’s interpretation of section 31.03 and 31.04 of the Texas Penal Code23 and the Attorney General has the authority to prosecute violations of that law. Punishment for violations of those laws can range from a Class C misdemeanor up to a felony punishable by jail.24
  • 10. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -8- (stuma@djcpc.com) Copyright © 2000 25 See Op. Tex. Att’y Gen. No. H-1165 (1978). 26 3 S.W.3d 218 (Tex. App.--Dallas 1999, no pet.). Therefore, the question that must be addressed is, does one’s use of the municipality’s computer to send a personal e-mail or to search the Internet for personal reasons, such as the current price of your stocks, the best air fare for your upcoming vacation, or the latest presidential polls, fall within the class of prohibited activities? Under a strict interpretation of the opinion, such activities appear to be prohibited as they constitute the “[u]se of public property [the computer] . . . [and] services [the Internet service] by a public official or employee for private benefit [which] constitutes the offense of theft.”25 However, the more important question is, perhaps, whether the Opinion should be interpreted so strictly. Consider the following example, underthe strict interpretation just explained: A city employee is at work and receives a telephone call from her daughter who is at school but is suffering from an illness and needs to be taken home. Did the employee violate the strict interpretation of the Attorney General’s opinion? Yes. She is a public employee who used the city’s telephone (public property) to take a telephone call for a personal reason (private benefit). In Garth v. State,26 the Dallas Court of Appeals upheld the conviction of an undercover police detective for improperly using her employee fuel card to pump gasoline into her personal vehicle. Admittedly, this case is distinguishable from my example in that the use of the fuel card actually deprived the public of the amount of gasoline taken where the use of a public telephone does not deplete the public resource.
  • 11. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -9- (stuma@djcpc.com) Copyright © 2000 27 See id. at 221. 28 See id. 29 See Garth, 3 S.W.3d at 222. 30 See id. Nonetheless, the Garth Court focused on the use of the improper use of the card, not just the depravation of the fuel.27 The court stated that the employee had a right to possess the card and control the use of the card but once she decided to use the card for her own benefit, her possession ceased to be consensual and at that point, her use of the card was improper.28 The court’s focus on the use of the card as opposed to merely the misappropriation of the fuel is consistent with the Attorney General’s Opinion stating that public property should not be used for personal reasons. Surely there are very few people that would construe the Attorney General’s opinion so strictly and prosecute our hypothetical mother for theft. Likewise, there are few who would prosecute someone for using the Internet to check the local weather before they leave work. But, as extreme as these examples may seem, I use them to emphasize the importance of making and promulgating a written policy that resolves these kind of questions. In the Garth case, the court upheld the defendant’s conviction because it found the defendant used the city’s property beyond the city’s consent. The court considered the shift supervisor of the facility upon which the fuel pumps were located as the owner.29 The court found that because the defendant did not have the supervisor’s consent to take the fuel, the taking was improper, implying that the supervisor could have consented to the use.30
  • 12. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -10- (stuma@djcpc.com) Copyright © 2000 31 Amy Rogers, supra note 11. 32 See Erik C. Garcia, E-Mail and Privacy Rights, Computers and the Law, Fall 1996 (visited Sept. 29, 2000) <http://wings.buffalo.edu/law/Complaw/CompLawPapers/garcia.html>. In following with the Garth court’s reasoning, a municipality could establish an unambiguous policy allowing its officials and employees to use its computers and Internet service within certain limits, for example, employees could be allowed to send and check personal e-mails that do not contain sexually oriented, discriminatory, or harassing content during non-business hours only. As long as the person’s use is consistent with the stated policy, it is acting with the municipality’s consent and not violating the law. Providing a clear written policy that states the municipality’s position on the use of its computers and the Internet is the best way to insure that its officials and employees use them properly. C. Monitoring Internet Usage The first thing that should come to mind with the mention of monitoring the use of the Internet is privacy. This is the paramount concern because if done improperly, what you do to protect yourself from your employee’s actions could actually be used by your employee against you. In fact, “[t]he issue most often litigated between employers and employees regarding e-mail and Internet privacy is employee’s expectations of privacy versus the monitoring practices of the company.”31 Fortunately, however, in reality employees have little or no privacy rights in the things they access or view over the Internet.32 There are laws that attempt to limit the unauthorized monitoring of e-mails but, at best, those laws provide only minimal protection.
  • 13. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -11- (stuma@djcpc.com) Copyright © 2000 33 914 F. Supp. 97 (E.D. Penn. 1996). 34 See Rogers, supra note 11, 35 See Jenna Wischmeyer, E-Mail and the Workplace, (visited Sept. 29, 2000) <http://raven.cc.ukans.edu/~cybermom/CLJ/wisch.html> (citing Pillsbury, 914 F. Supp. at 101). 36 See Rogers, supra note 11. 37 18 U.S.C. §§ 2510 et seq. (1994), <http://www.law.cornell.edu/uscode/18/ch119.html>. See Wischmeyer, supra note 35. 38 See id. 1. General Privacy Rights In Smyth v. Pillsbury Co.,33 one of the few cases that has examined the issue of employees’ privacy rights vis-a-vis employers’ monitoring employees’e-mail andInternet usage found that employees have very little expectation of privacy in the workplace setting.34 In this case the court held that even though the employer had assured the employee that all e-mail communications would remain confidential and would not be used against him, the employer did not violate his privacy rights by subsequently intercepting and using his e-mail communications as grounds for terminating his employment.35 In this case, the court used a balancing test in which it weighed the employer’s interest in ensuring its e-mail was being used appropriately against the employee’s privacy interest in sending confidential messages, ultimately finding for the employer.36 2. The Electronic Communications Privacy Act of 1986 With regards to e-mail communications, employees’ communications are theoretically protected by The Electronic Communications Privacy Act of 1986 (ECPA),37 which prohibits an anyone, including employers, from intentionally intercepting or attempting to intercept electronic communications.38
  • 14. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -12- (stuma@djcpc.com) Copyright © 2000 39 See Wischmeyer, supra note 35 (citing Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457 (5th Cir. 1994); Bohac v. City of Reno, 932 F. Supp. 1232 (D. Nev. 1996)). 40 See id. (citing Jarrod J. White, E-mail@Work.Com: Employer Monitoring of Employee E- mail, 48 ALA. L. REV.1079, 1082-83 (1997), <http://boots.law.ua.edu/lawreview/whitfull.htm>). 41 See id. 42 See Wischmeyer, supra note 35 (citing 18 U.S.C. § 2511(2)(d) (1994)). 43 704 F.2d 577 (11th Cir. 1983). 44 See Wischmeyer, supra note 35 (citing Watkins, 704 F.2d at 581-82). 45 Id. (quoting Watkins, 704 F.2d at 581-82). However, courts have interpreted the interception language strictly and held that accessing a recordofstoredcommunications is not intercepting a communication.39 Thus, because there is such a narrow window during which an e-mail communication can be intercepted(usually only mili-seconds), it would be rare for an employer to violate this law.40 In fact, probably the only way an employer could violate this law is if it used a form of automatic routing software to instantaneously send duplicate messages to the persons monitoring the system.41 The ECPA also has provides an exception that allows an the interception of electronic communications when one of the parties to the communication has previously given consent.42 Consent can be given either expressly or implicitly. However, inWatkins v. L.M. Berry & Co.,43 the court found that an employee did not give implicit consent to having her telephone conversations monitored simply because she accepted the job with the knowledge that the employer monitored telephone calls as a part of training.44 As the court stated, “‘mere knowledge of monitoring capability cannot be considered implied consent to employer monitoring of all calls.’”45 The court’s reasoning with regard to telephone calls should apply equally well to e-mail communications. Thus, if an employer intends to monitor employees’ e-mail messages in a manner that would
  • 15. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -13- (stuma@djcpc.com) Copyright © 2000 46 See id. (citations omitted). 47 See id. (quoting 18 U.S.C. § 2511(2)(a)(I) 1994)). Specifically, this provision allows for interception where an officer, employee, or agent of a provider of wire or electronic communication service, whose facilities are used in the transmission of a wire or electronic communication, intercept[s], disclose[s], or use[s] that communication in the normal course of his employment while engaged in any activity which is necessarily incident to the rendition of his service or to the protection of the rights or property of the provider of that service. Id. 48 See id. 49 See id. 50 See id. (citing Watkins, 704 F.2d at 582-84). “intercept” them, it should ensure that it has an unambiguous written policy clearly stating that it will engage in such practices and also state the degree to which it will examine the communications.46 The ECPA contains a second exception called the business use exception.47 As the courts have interpreted this exception, employers who provide the e-mail service may intercept e-mail communications in the ordinary course of business.48 Most employers that provide the e-mail service should be considered a “provider of wire or electronic communication service” even thoughsome believe that was not Congress’ intent.49 Under this exception, the employer may intercept all business messages and intercept personal messages only to the extent that it could determine the nature of the message but not its content.50 At first, Title II of the ECPA seems to provide employees with the most substantive protection against e-mail monitoring. It makes it “illegal to ‘intentionally access[] without authorization a facility through which an electronic communication
  • 16. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -14- (stuma@djcpc.com) Copyright © 2000 51 See id. (quoting 18 U.S.C. § 2701(a) (1994)). 52 See Rogers, supra note 11 (citing 18 U.S.C. § 2511). 53 See U.S. CONST. Amend. IV. 54 See Rogers, supra note 11 (citing Vega-Rodriguez v. Puerto Rico Tel. Co., 110 F.3d 174, 178 (1st Cir. 1997)). service is provided’ or to ‘intentionally exceed [] an authorization to access [a] facility.’”51 However, there is one exception: it does not apply “if ‘the person or entity providing a wire or electronic communications service’ authorizes the access”52 —the employer. It is relatively clear that municipalities, as employers, can monitor employees’ use of the municipalities’ Internet service. Moreover, most of the current laws and court decisions do very little to limit the employer’s right to monitor e-mail usage. Nonetheless, a municipality should be prudent in establishing and promulgating an unambiguous policy that addresses each of these concerns and states the manner in which they will be addressed. In doing so, the municipality’s employees will have a better understanding of that is expected of them as well as what they should expect with regard to privacy. In addition to that, and perhaps most important, such guidelines will deter employees from challenging the municipality’s monitoring of their Internet usage and e-mail communications in court. 3. The Fourth Amendment The Fourth Amendment to the United States Constitution protects people against unreasonable searches and seizures.53 While this provisions does not apply to private employers, it does apply to municipal governments. However, it is largely inconsequential. Courtswill typically uphold a municipality’s right to monitor workplace communications when there are legitimate business reasons54 as determined by
  • 17. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -15- (stuma@djcpc.com) Copyright © 2000 55 See Rogers, supra note 11 (citing Connick v. Meyers, 461 U.S. 138, 152-53 (1983)). 56 See id. (referencing the Freedom of Information Act, 5 U.S.C. § 552 (1988)). 57 See Jeffrey Norgle, Revising the Freedom of Information Act for the Information Age: The Electronic Freedom of Information Act, 14 J. MARSHALL J. COMPUTER & INFO. L. 817, 821-22 (1996). 58 5 U.S.C. § 552 (Supp. II 1996). 59 Stephen M. Johnson, The Internet Changes Everything: Revolutionizing Public Participation and Access to Government Information Through the Internet, 50 ADMIN. L. REV. 277, 291 (1998). 60 See Norgle, supra note 57 (citing Dismukes v. Dep’t of the Interior, 603 F. Supp. 760, 763 (D.D.C. 1984)). See also id. (citing Armstrong v. Bush, 721 F. Supp. 343 (D.D.C. 1989)). balancing the importance of the municipality’s maintaining control of the work environment against the rights of the employee and public.55 III. THE PUBLIC’S RIGHT TO INFORMATION A. Federal Law The Freedom of Information Act (FOIA),56 enacted in 1966, gave the press and public access to information held by the federal government and its agencies.57 Thirty- years later, in 1996, Congress amended the Freedom of Information Act with the Electronic Freedom of Information Act Amendments (EFOIA)58 for the purpose of encouraging the federal government and its “agencies to use new technology to disseminate and ensure access to government information collected through new technology.59 Under the pre-amendment FOIA, one of the major problems was that the government was allowed to chose what form of media it would provide when disclosing information as long as the form the agency chose neither unreasonably hampered the requester nor reduced the usefulness of the information.60 For example, where an agency kept records on both microfiche and computer tapes, the agency could chose to disclose the information on microfiche even the person requested the information on computer
  • 18. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -16- (stuma@djcpc.com) Copyright © 2000 61 See Norgle, supra note 57 (citing Dismukes, 603 F. Supp. at 762). 62 See Johnson, supra note 59 (citing 5 U.S.C. § 552(a)(3)(B)). 63 See id. 64 See id. (citing 5 U.S.C. § 552(a)(2)(E)). 65 See id. 66 See id. (citing 5 U.S.C. § 552(a)(3)). 67 Cf. 5. U.S.C. § 551(1) (“‘agency’ means each authority of the Government of the United States, whether or not it is within or subject to review by another agency, . . . .”). 68 See also Op. Tex. Att’y Gen. No. 654 (1997). 69 TEX. GOV’T CODE ANN. § 551.001 et. seq. tape.61 Under the EFOIA, if the request is made for “records in electronic format, and the records are readily reproducible in that format, the agency must provide them in that format.”62 The EFOIA further requires agencies to make an effort to maintain records in electronic format,63 create a computer accessible index of frequently requested files available to the public,64 and make records that it creates pursuant to the FOIA “accessible to the public by computer or other electronic means.”65 Finally, it requires agencies to make annual reports of their compliance with these requirements.66 Of course, being in Texas, we are aware that the Freedom of Information Act and the Electronic Freedom of Information Act Amendments are limited to the federal government and neither apply to state or local governments.67 Nonetheless, it is important to consider them as the Texas Attorney General has looked to the provisions of the EFOIA in interpreting the relevant Texas laws.68 B. Texas Law 1. Open Meetings Act The Open Meetings Act (OMA)69 requires that “[e]very regular, special, or called meeting of a governmental body shall be open to the public, except as provided” within
  • 19. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -17- (stuma@djcpc.com) Copyright © 2000 70 TEX. GOV’T CODE ANN. § 551.002. 71 TEX. GOV’T CODE ANN. § 551.001(4)(A)-(B). Specifically, section the OMA defines a meeting as being (A) a deliberation between a quorum of a governmental body, or between a quorum of a governmental body and another person, during which public business or public policy over which the governmental body has supervision or control is discussed or considered or during which the governmental body takes formal action; or (B) except as otherwise provided by this subdivision, a gathering: (i) that is conducted by the governmental body or for which the governmental body is responsible; (ii) at which a quorum of members of the governmental body is present; (iii) that has been called by the governmental body; and (iv) at which the members receive information from, give information to, ask questions of, or receive questions from any third person, including an employee of the governmental body, about the public business or public policy over which the governmental has supervision or control. The term does not include a gathering of a quorum of a governmental body as a social function unrelated to the public business that is conducted by the body, or the attendance by a quorum of a governmental body at a regional, state, or national convention or workshop, if formal action is not taken and any discussion of public business is incidental to the social function, convention, or workshop. The term includes a session of a governmental body. Id. 72 See id. 73 See Alan J. Bojorquez, Wide Open Government (visited Oct. 30, 2000) <http://www.bickerstaff.com/articles/wideopen7.htm> (citing Op. Tex. Att’y Gen. Nos. JC-0060 (1999), JM-1072 (1989), and H-238 (1974)). 74 See id. (citing Op. Tex. Att’y Gen. No. JM-1072 (1989)). the Act.70 The use of the Internet by municipalities raises two questions concerning this mandate: First, what is a “meeting”? Second, what is considered to be “open to the public”? The OMA provides a fairly elaborate definition of meeting.71 In essence, there is a “meeting” when there is deliberation of official governmental business by a quorum of a governmental body, even if others are present.72 The Attorney General has even applied the Open Meetings Act to meetings where a quorum was not present.73 One of the few situations the OMA doesn’t apply is in social gatherings or seminars where any discussion of official business is purely incidental.74 As a general rule, it would be safe
  • 20. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -18- (stuma@djcpc.com) Copyright © 2000 75 See TEX. GOV’T CODE ANN. § 551.128. 76 Id. 77 See Op. Tex. Att’y Gen. No. DM-480 (1998) (Where technical difficulties are experienced during the broadcast of a video-conference call, the meeting must be recessed.). 78 “‘Quorum’ means a majority of a governmental body, unless defined differently by applicable law or rule of the charter of the governmental body.” TEX. GOV’T CODE ANN. 551.001(6). 79 See Acker v. Tex. Water Comm’n, 790 S.W.2d 299, 300-01 (Tex. 1990); Bexar Medina Atascosa Water Dist. v. Bexar Medina Atascosa Landowners’ Ass’n, 2 S.W.3d 459, 461 (Tex. to assume that if a quorum of a governmental body is physically present and official business is discussed, it will be considered a meeting. The real issue for our purposes, however, is how Internet communications between government officials will be treated for purposes of the OMA. In 1999 a new section was added to the Open Meetings Act that specifically allows meetings to be broadcast over the Internet, subject to certain requirements.75 Specifically, this section provides that “a governmental body may broadcast an open meeting over the Internet. . . . [provided that it] shall establish an Internet site and provide access to the broadcast from that site. . . . [and] provide the same notice of the meeting that the governmental body is required to [ordinarily] post.”76 However, if a technical problem arises that disrupts the Internet broadcast, the meeting must be recessed.77 Neither the Legislature nor the Attorney General has specifically addressed whether communications between governmental officers made by e-mail of over the Internet by other means are considered meetings. However, a brief analysis of some of the basics of what constitutes meetings and deliberations should provide an accurate prediction of what will constitute a meeting. The key inquiry with regard to this issue is whether a quorum (majority)78 participates in the deliberation.79 In Acker v. Texas Water Comm’n,80 the Supreme Court
  • 21. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -19- (stuma@djcpc.com) Copyright © 2000 App.–San Antonio 1999, pet. denied). 80 790 S.W.2d 299 (Tex. 1990). 81 Id. at 300. 82 See id. at 301 (The Open Meetings Act forbids ex parte deliberations between a majority of government decisionmakers.). 83 See id. at 302. 84 See Faulder v. Texas Bd. of Pardons and Paroles, 990 S.W.2d 944, 946 (Tex. App.–Austin 1999, no pet.). 85 See id. 86 See Harris County Emergency Service Dist. #1 v. Harris County Emergency Corps., 999 S.W.2d 163, 168 (Tex. App.–Houston [14th Dist.] 1999, no pet.). 87 See Shawn E. Tuma & Christopher R. Ward, Contracting Over the Internet in Texas, 51 BAYLOR L. REV. 15 (forthcoming 2001), <http://www.geocities.com/dallaslawyer_23456/econ.pdf>. 88 See TEX. GOV’T CODE ANN. § 551.001(4)(B). of Texas stated that “when a majority of a public decisionmaking body is considering a pending issue, there can be no ‘informal’ discussions. There is either formal consideration of a matter in compliance with the Open Meetings Act or an illegal meeting.”81 Focusing on whether there was a majority of decisionmakers participating,82 the Court held the Open Meetings Act was violated where two of the three commissioners had an ex parte discussion of official matters while in the restroom.83 The meeting requirements apply to telephone conversations between government officials.84 Consistent with the reasoning in Acker, where public officials have used the telephone to discuss official business and a quorum participated, the discussions were considered to be meetings.85 However, where public officials discussofficial business over the telephone but there is no quorum participating in the discussion, the telephone discussion is not a meeting.86 When governmental officials participate in meetings over the telephone, they are in a real-time two-way conversation such that they are in each other’s “virtual presence”87 which is a “gathering” pursuant to the Open Meetings Act.88 Internet “chat
  • 22. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -20- (stuma@djcpc.com) Copyright © 2000 89 See TEX. GOV’T CODE ANN. § 551.128. 90 See Tuma & Ward, supra note 87. 91 See id. (citing Thomas J. Smedinghoff, Electronic Contracts & Digital Signatures: An Overview of Law and Legislation, 564 PRAC. L. INST. 125, 135 (1999); Jeff C. Dodd & James A. Hernandez, Contracting in Cyberspace, 1998 COMPUTER L. REV. & TECH. J. 1, 12 (1998)). 92 See Acker, 790 S.W.2d at 300-01. rooms,” “instant messages,” and other real-time methods of communicating over the Internet provide the same “virtual presence” as telephone discussions. Accordingly, Internet communications that provide such “virtual presence” will be subject to the requirements of the Open Meetings Act and should not be engaged in by a quorum of government officials unless the meetings are conducted in accordance with requirements for meetings broadcast over the Internet.89 E-mail communications do not necessarily provide the same “virtual presence” as do the real-time Internet communications.90 E-mail messages are often routed through different servers for significant periods of time and often remain in the recipient’s mailbox for days before being opened.91 Without this “virtual presence,” e-mail communications should not be considered analogous to telephone conversations for determining whether such constitute a meeting. Because of the quorum principle, it is relatively clear that if an e-mail is sent from one governmental official to another governmental official and the two of them do not constitute a quorum, the communication will not be considered a meeting.92 The question becomes whether an e-mail communication that is sent among a quorum is a meeting. Such a message would be more analogous to a letter or other written correspondence sent among a quorum of officials. In 1992, the Texas Attorney General issued an opinion on the following question,
  • 23. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -21- (stuma@djcpc.com) Copyright © 2000 93 See Op. Tex. Att’y Gen. DM-95 (1992). 94 See id. (quoting the definition of “meeting” as set forth in the Act). 95 See id. (quoting the definition of “deliberation” as set forth in the Act). 96 See id. which it called hypothetical: “whether members of a city council violate the Open Meetings Act . . . when the members constituting a majority of the council, sign a letter expressing an opinion on matters relevant to the city government.”93 In analyzing this issue, the Attorney General acknowledged that there can be no meeting unless there is a “deliberation”94 and that “deliberation” requires the existence of “a verbal exchange . . . .”95 Accordingly, the signing of such a letter by a quorum does not seem to fit within the precise language of the Open Meetings Act. Nonetheless, the Attorney General looked to the public policy behind the Open Meetings Act and ultimately concluded that signing of a letter by a quorum, even if they never met to discuss it, would be violative of the OMA.96 At this time, one must assume that the Attorney General’s Office would view an e-mail message sent to a quorum of a governmental body the same way it did the written letter and treat it as a “meeting” for purposes of the OMA. Given the increased use of technology by Texas’ state and local governments, this is an important issue that the Attorney General needs to clarify. For now, however, government officials should not send e-mail messages pertaining to official business to a quorum of the members of the governmental body as such messages would likely be construed as a meeting violative of the OMA. Moreover, officials should also avoid sending e-mails pertaining to official business to one or members constituting less than quorum. Consider the following
  • 24. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -22- (stuma@djcpc.com) Copyright © 2000 97 See Bojorquez, supra note 73 (citing Op. Tex. Att’y Gen. No. ORD 654 (1997). 98 See Jeff C. Dodd & James A. Hernandez, Contracting in Cyberspace, 1998 COMPUTER L. REV. & TECH. J. 1, 12 (1998); Thomas J. Smedinghoff, Electronic Contracts & Digital Signatures: An Overview of Law and Legislation, 564 PRAC. L. INST. 125, 135 (1999); Shawn E. Tuma & Christopher R. Ward, Contracting Over the Internet in Texas, 51 BAYLOR L. REV. ___ (forthcoming 2001), <http://www.geocities.com/dallaslawyer_23456/econ.pdf>. 99 For an excellent compilation of these laws, see the Texas Electronic Commerce Homepage at the following Internet address: <http://www.state.tx.us/EC/>. example: There are five members on a local governing body, with three constituting a quorum. Member 1 sends such a message to Member 2, with the two of them being less than a quorum. Member 2, however, is close friends with Member 3 and believes the content of the message is something to which Member 3 should be privy. Member 2 forwards the message to Member 3 and now the message has been circulated among a quorum: the Open Meetings Act is violated according to the Attorney General’s current position. One other reason to consider not communicating by e-mail is that e-mail messages may be considered a public document and subject to disclosure pursuant to the Public Information Act.97 IV. ISSUES RAISED IN ENTERING TRANSACTIONS VIA THE INTERNET Municipal governments are generally subject to the same rules governing electronic contracts as are private entities. Because these rules have been discussed at length in other articles98 they need not be repeated. However, along with the numerous other laws recently promulgated by the Legislature with regard to the Internet and electronic commerce in general,99 there are specific rules that apply to electronic contracts entered into by municipal governments and other state agencies that are worthy of mention. House Bill 984 in the 1997 Legislature was directly addressed the issue of
  • 25. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -23- (stuma@djcpc.com) Copyright © 2000 100 A digital signature is any symbol “executed or adopted by the party with the present intention to authenticate a writing.” TEX. BUS. & COMM. CODE. ANN. § 1.201(39). 101 See TEX. GOV’T CODE ANN. § 2054.060(a). Specifically, this key provisions regarding state agencies are as follows: (a) A digital signature may be used to authenticate a written electronic communication sent to a state agency if it complies with rules adopted by the department. Before adopting the rules, the department shall consult with the comptroller, state auditor, attorney general, secretary of state, and office of court administration, and with representatives of county and municipal governments, regarding the content of the rules. When adopting the rules, the department shall consider factors that may affect the reliability of a digital signature, including whether a digital signature is: (1) unique to the person using it; (2) capable of independent verification; (3) under the sole control of the person using it; and (4) transmitted in a manner that will make it infeasible to change the data in the communication or digital signature without invalidating the digital signature. Id. 102 See TEX. GOV’T CODE ANN. § 2054.060(b). Specifically, this key provisions regarding local governments is as follows: (b) A digital signature may be used to authenticate a written electronic communication sent to a local government if it complies with rules adopted by the governing body of the local government. Before adopting the rules, the governing body of the local government shall consider the rules adopted by the department and, to the extent possible and practicable, shall make the governing body's rules consistent with the department's rules. Id. entering electronic transactions by local governments. The Bill amended Chapter 2054 of the Government Code by adding Section 2054.060 which expressly allows digital signatures100 to be used in transactions with state agencies101 and local governments,102 subject to some qualifications. V. CLOSING The use of the Internet by state and local governments will undoubtedly flourish over the next few years. With its use comes the potential for a tremendous increase in both accessibility to the public and efficiency in attending to governmental affairs.
  • 26. Shawn E. Tuma MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES Page -24- (stuma@djcpc.com) Copyright © 2000 However, along with the increased use of the Internet comes several potential problems. Many of these problems can be easily addressed with clear policies that are promulgated to officials and employees alike while others require a clearer understanding of the law. Nonetheless, if proper measures are taken to avoid these potential problems, state and local governments will be able to reap all of the promise that the Internet holds without compromising the gains through disputes and litigation.