SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010
Overview What I’ll discuss Monitoring business systems for misconduct Employee publication and “off duty” conduct Related issues others will discuss Corporate policy – Burns Enforcement and non-employees – Kratz/O’Keefe
Monitoring business systems Why? To engage in maintenance, repair and management To meet a legal requirement to produce To ensure continuity of business practice To improve business processes To maintain internal control (including preventing misconduct and ensuring legal compliance)
Monitoring business systems How businesses maintain internal control Conduct routine audits* Investigate suspicions of misconduct* Respond to what they find Keep a good record of the same
Monitoring business systems The traditional law Notification does count The employer owns the medium and has lots of good reasons to look E-mail communication is too insecure to expect privacy No balancing of interests at all
Monitoring business systems Challenge #1 – Decision-maker value shift LethbridgeCommunity College (2007) MS Hotmail e-mails retrieved through forensic analysis First case to impose a reasonable grounds requirement for investigation Value shift may also be gleaned from Cole and Tfaily (two very recent and hot Ontario cases)
Monitoring business systems Challenge #2 – Supervisor value shift Quontext message case heard by SCOTUS in April 2010 Will your supervisors enforce policies they deem to be intrusive?
Monitoring business systems Change #3 – Privacy legislation Imposes an “objective reasonableness” requirement At play in UBC spyware case But, notably, Johnson case suggests PIPEDA does not apply to “personal” e-mails
Monitoring business systems Option #1 – Try harder to control expectation Personal use does not come with privacy! Routine acknowledgements Audit and communicate audit results to employees
Monitoring business systems Option #2 – Go with a purpose-based policy List purposes and stick with purposes Give the same expectation of privacy warning re personal use Set a evidence-based standard for investigation Set a protocol or procedure for audits
Publication and “off duty” conduct Bob and Sue had a long day. They go to the Dirty Dog Pub after work and, over the course of four hours, take jabs at their supervisor, Phil.
Publication and “off duty” conduct Jack had a long day. He goes home, cracks open a beer, and boots up his home computer.  Using a picture of his supervisor taken from the company intranet and some internet based software, he alters the picture so the manager looks ridiculous.  Jack posts it to his Facebook page. He feels good.
Publication and “off duty” conduct Nexus commonly derived from Impact on other employees rights Impact on job responsibilities Impact on reputation
Publication and “off duty” conduct Duty of fidelity applies when employee expression  is likely to significantly affect a legitimate employer interest All other activity is “private”
Publication and “off duty” conduct Subject to a narrow whistleblower exception Serious and imminent threat to health and safety Illegality
Publication and “off duty” conduct Measuring gravity of offence Job responsibilities Nature and content of expression Visibility of expression Sensitivity of issue Truth of statements Steps taken to determine facts before speaking
Publication and “off duty” conduct Measuring gravity of offence Efforts made to raise matters internally Extent of reputational damage Impact on employer’s ability to conduct business
Publication and “off duty” conduct Review of and non-culpable employee expression Duty to maintain a violence free workplace Bill 168 promotes threat assessment based on fulsome information about threats Assess all relevant and available information, including information published online Takes steps to manage reasonably perceived threats based on sound assessment practice
Dan Michaluk daniel-michaluk@hicksmorley.com http://danmichaluk.wordpress.com http://twitter.com/danmichaluk http://ca.linkedin.com/in/danmichaluk
Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010

Weitere ähnliche Inhalte

Was ist angesagt?

Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette case
Michael Perez
 
Social Media In the Workplace
Social Media In the WorkplaceSocial Media In the Workplace
Social Media In the Workplace
RosenthalLurie
 
The New Normal
The New NormalThe New Normal
The New Normal
wychepa
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2
Damo Ward
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
Dan Michaluk
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
satyakam_biswas
 

Was ist angesagt? (20)

Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Osgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesOsgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slides
 
Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette case
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the Workplace
 
Social Media In the Workplace
Social Media In the WorkplaceSocial Media In the Workplace
Social Media In the Workplace
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer Responses
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Employee issues and privacy
Employee issues and privacyEmployee issues and privacy
Employee issues and privacy
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
 
The New Normal
The New NormalThe New Normal
The New Normal
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2
 
Sapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmSapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory Paradigm
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and Litigation
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 

Andere mochten auch

Teradata Social Media Guidelines
Teradata Social Media GuidelinesTeradata Social Media Guidelines
Teradata Social Media Guidelines
Teradata
 

Andere mochten auch (6)

Social Media Powerpoint Final
Social Media Powerpoint   FinalSocial Media Powerpoint   Final
Social Media Powerpoint Final
 
Social Media Employee Policies
Social Media Employee PoliciesSocial Media Employee Policies
Social Media Employee Policies
 
Indonesia digital landscape groupon indonesia
Indonesia digital landscape   groupon indonesia Indonesia digital landscape   groupon indonesia
Indonesia digital landscape groupon indonesia
 
Teradata Social Media Guidelines
Teradata Social Media GuidelinesTeradata Social Media Guidelines
Teradata Social Media Guidelines
 
Visual Brand Guidelines to Manage Social Media Accounts
Visual Brand Guidelines to Manage Social Media AccountsVisual Brand Guidelines to Manage Social Media Accounts
Visual Brand Guidelines to Manage Social Media Accounts
 
Manajemen Media Sosial untuk Instansi Pemerintah
Manajemen Media Sosial untuk Instansi PemerintahManajemen Media Sosial untuk Instansi Pemerintah
Manajemen Media Sosial untuk Instansi Pemerintah
 

Ähnlich wie Social Media and Employee Privacy

Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
Amy Shriner
 
Developing your social media policies amcto presentation
Developing your social media policies amcto presentationDeveloping your social media policies amcto presentation
Developing your social media policies amcto presentation
Dan Michaluk
 
Workplace privacy here and now
Workplace privacy here and nowWorkplace privacy here and now
Workplace privacy here and now
Dan Michaluk
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
Dan Michaluk
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
wtidwell
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
Kelly Hart & Hallman LLP
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
AlexNemiroff
 

Ähnlich wie Social Media and Employee Privacy (20)

Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Developing your social media policies amcto presentation
Developing your social media policies amcto presentationDeveloping your social media policies amcto presentation
Developing your social media policies amcto presentation
 
Workplace privacy here and now
Workplace privacy here and nowWorkplace privacy here and now
Workplace privacy here and now
 
Hbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individualsHbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individuals
 
Social media background checks policy development
Social media background checks policy developmentSocial media background checks policy development
Social media background checks policy development
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring process
 
Case study 7
Case study 7Case study 7
Case study 7
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 
Digital Literacy Fundamentals Part 2.pptx
Digital Literacy Fundamentals Part 2.pptxDigital Literacy Fundamentals Part 2.pptx
Digital Literacy Fundamentals Part 2.pptx
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdfA Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
ethics and justice in HRM
ethics and justice in HRMethics and justice in HRM
ethics and justice in HRM
 
Internal Investigations Workshop for HR Practitioners
Internal Investigations Workshop for HR PractitionersInternal Investigations Workshop for HR Practitioners
Internal Investigations Workshop for HR Practitioners
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Business law & ethics project
Business law & ethics projectBusiness law & ethics project
Business law & ethics project
 

Mehr von Dan Michaluk

Mehr von Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Kürzlich hochgeladen

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 

Kürzlich hochgeladen (20)

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

Social Media and Employee Privacy

  • 1. Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010
  • 2. Overview What I’ll discuss Monitoring business systems for misconduct Employee publication and “off duty” conduct Related issues others will discuss Corporate policy – Burns Enforcement and non-employees – Kratz/O’Keefe
  • 3. Monitoring business systems Why? To engage in maintenance, repair and management To meet a legal requirement to produce To ensure continuity of business practice To improve business processes To maintain internal control (including preventing misconduct and ensuring legal compliance)
  • 4. Monitoring business systems How businesses maintain internal control Conduct routine audits* Investigate suspicions of misconduct* Respond to what they find Keep a good record of the same
  • 5. Monitoring business systems The traditional law Notification does count The employer owns the medium and has lots of good reasons to look E-mail communication is too insecure to expect privacy No balancing of interests at all
  • 6. Monitoring business systems Challenge #1 – Decision-maker value shift LethbridgeCommunity College (2007) MS Hotmail e-mails retrieved through forensic analysis First case to impose a reasonable grounds requirement for investigation Value shift may also be gleaned from Cole and Tfaily (two very recent and hot Ontario cases)
  • 7. Monitoring business systems Challenge #2 – Supervisor value shift Quontext message case heard by SCOTUS in April 2010 Will your supervisors enforce policies they deem to be intrusive?
  • 8. Monitoring business systems Change #3 – Privacy legislation Imposes an “objective reasonableness” requirement At play in UBC spyware case But, notably, Johnson case suggests PIPEDA does not apply to “personal” e-mails
  • 9. Monitoring business systems Option #1 – Try harder to control expectation Personal use does not come with privacy! Routine acknowledgements Audit and communicate audit results to employees
  • 10. Monitoring business systems Option #2 – Go with a purpose-based policy List purposes and stick with purposes Give the same expectation of privacy warning re personal use Set a evidence-based standard for investigation Set a protocol or procedure for audits
  • 11. Publication and “off duty” conduct Bob and Sue had a long day. They go to the Dirty Dog Pub after work and, over the course of four hours, take jabs at their supervisor, Phil.
  • 12. Publication and “off duty” conduct Jack had a long day. He goes home, cracks open a beer, and boots up his home computer. Using a picture of his supervisor taken from the company intranet and some internet based software, he alters the picture so the manager looks ridiculous. Jack posts it to his Facebook page. He feels good.
  • 13. Publication and “off duty” conduct Nexus commonly derived from Impact on other employees rights Impact on job responsibilities Impact on reputation
  • 14. Publication and “off duty” conduct Duty of fidelity applies when employee expression is likely to significantly affect a legitimate employer interest All other activity is “private”
  • 15. Publication and “off duty” conduct Subject to a narrow whistleblower exception Serious and imminent threat to health and safety Illegality
  • 16. Publication and “off duty” conduct Measuring gravity of offence Job responsibilities Nature and content of expression Visibility of expression Sensitivity of issue Truth of statements Steps taken to determine facts before speaking
  • 17. Publication and “off duty” conduct Measuring gravity of offence Efforts made to raise matters internally Extent of reputational damage Impact on employer’s ability to conduct business
  • 18. Publication and “off duty” conduct Review of and non-culpable employee expression Duty to maintain a violence free workplace Bill 168 promotes threat assessment based on fulsome information about threats Assess all relevant and available information, including information published online Takes steps to manage reasonably perceived threats based on sound assessment practice
  • 19. Dan Michaluk daniel-michaluk@hicksmorley.com http://danmichaluk.wordpress.com http://twitter.com/danmichaluk http://ca.linkedin.com/in/danmichaluk
  • 20. Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010

Hinweis der Redaktion

  1. Employment lawyer with strong focus on information and management and privacy law issuesTwo issues in which privacy law touches on use of social media by employeesMonitoring law… tied very loosely to social media use… but time theft issue is important and topic is timely… cautionary message to employers… law is in fluxDiscipline law… when can employer sanction employees for publishing things online? cautionary message to employees… more than you thinkNot going to talk about other aspects of managing employee use of social mediaBuilt in time for questions so ask away
  2. Let’s start with the basicsOur privacy law is based strongly on proportionality and balancing…The challenge is for management to deal with a claimed privacy interestBut what interests is management protecting?Employers have an unquestionable legitimate interest in looking at the information flowing through their systemsHere are the most common purposes[Briefly explain one to four. Turn over slide for five.]
  3. Internal control is importantLet’s look at context – era of accountability… both public and private sector -post Enron-post Westray -post Gomrey -post Bill 168 (expanded regulation of interaction between people)Quote from National Post last week. .. “The role of investigative journalism has expanded over the years to help fill what has been described as a democratic deficit in the transparency and accountability of our public institutions.”Looking at communications is a key means of maintaining internal control – 90% of communication is electronic… picture of all activity within your businessTwo kinds of looking -audits (risk based, proactive) -investigations (targeted, reactive)Take corrective action based on what’s found -change in process or technology -change in people – terminations or lesser sanctionsAnd keep a record of diligenceSimple right? And then comes personal privacy.
  4. Traditional law has been very permissiveRemember our purposesThose are usually reinforced by an acceptable use or computer use policy that says in one paragraph “YOU HAVE NO EXPECTATION OF PRIVACY”Some employers use annual acknowledgements… some use login dialog boxesBeen effective…Most law is in unionized workplaces… arbitrators have said, “I’m not even balancing interests here. An employer can look for lots of reasons it’s not reasonable for an employee to make any privacy claim.”Lakehead University case in 2009 re Google Apps outsourcing – e-mail is no more secure than a postcard
  5. Watch out for shifting valuesPremised on change in permissibility of personal useTen years ago employees worked at work and went home and watched TVPolicies said “no personal use”Now employees work at work and work at home on the same devicePolicies now say “reasonable personal use”When employees are banking on your computers is it reasonable to capture their keystrokes?When employees are sending legitimate personal communications to loved ones about medical conditions… is it legitimate review their communications?Identify Lethbridge, Cole and Tfaily as showing that decision makers are struggling
  6. Even if your decision-makers are okay, managers can interfere with policy enforcementIn Quon a supervisor said something like, “If you pay the overages we won’t look.”If supervisors or others in authority think that your monitoring policy is not reasonable they may undermine it
  7. That was about the reasoning applied by arbitrators and courtsIn Canada we have employee privacy legislation in three provinces and for federal worksIf it applies, there is a regulatory requirement to balance interestsCollection of personal information must be reasonably necessary to meet a legitimate purposeCall this an “objective reasonableness requirement”At play in UBC spyware case of 2007 – all you needed to do to investigate time theft was look at traffic logs… you didn’t need to install spyware to capture screen imagesWrinkle from Johnson under PIPEDA… about access to personal e-mails sent about an employee… said personal e-mails are not regulated by PIPEDA because they are not sufficiently related to the commercial enterprise… like “bycatch”Perverse (though possibly correct) ruling… saying employers have very limited domain over employee e-mails, but in doing so rules out protection of privacy legislation
  8. So what do employers do?Put an express condition on personal useUse routine acknowledgementsCommunicate audit results… use a newsletter… prove to employees you are lookingOne sided solution… focuses on employer right… doesn’t control to protect employee privacy
  9. You create policy to address the privacy interestEspecially appropriate where regulatedList the purposes from my earlier slideWarn them still… give good notice stillSet an evidence-based standard for investigationTell them how you will go about auditsExamples-internal audit staff conduct an investigation at direction of VP-VP directs audits based on a bona fide security risk-should line manager need to find work product, e-mails will be pulled by internal audit where possibleThese will kill your no expectation argument but should still enable everything you need to do at a lower risk
  10. Let’s move on to a different privacy issue – an employee’s right to live a private existence without employment-related consequenceSupported by Joseph Cohen-Lyons paper in materialsHere’s a scenarioNot so oddAnyone think this interferes with an employer’s interest?Nah. It’s blowing off steam. It’s “private” off duty conduct. Outside the workplace – no physical nexus. No intangible nexus to legitimate interests.
  11. This is (sadly) what happens today.Same question. Is it private?Would it make a difference if Jack has only ten friends? What if none of them are employees?Happens all the time. This is how people blow off steam now. There’s a perception that this is somehow analogous to a barroom chat with a close friend.But let’s look at the difference. It’s clearly a publication. Often to other employees. Even if not there’s no legal or practical restriction on what recipients can do with the communication. Jack’s picture of his supervisor can be copied and mailed around.So there’s a good argument that this is about as public as it gets. Consistent with a traditional privacy law principle – a disclosure to one is a disclosure to all.
  12. Now Jack’s supervisor has a beef. But why can an employer discipline that conduct.Well, there’s a nexus back to employment interests isn’t there? -impact on other employee’s rights -right to work in a safe and harassment free work environment -reasonably likely to interfere with that right-employer’s burden but…-… decision-maker may presume harm (arguable issue) -evidence of actual harm helps (give example)-Nexus is commonly derived from these three things-no case law, but these are in order of moral weight-we’re balancing again here-example tough case – employee a professional adviser… goes out and does a beer mile… better have a pretty good case for reputational harm
  13. This is an issue of loyalty and fidelity, which is implicit in every employment relationshipDon’t need special status… not like a fiduciaryThis is my expression of the test that defines the scope of the dutyVery, very contextual casesNo black and whiteThere will be some easy cases, but many are hard to predictExample… student speech cases out of U.S. Third Circuit (in materials)Many employment cases will settle
  14. There is developed case lawBased in public sector but theory applies to private sector employmentRecognizes a whistleblower exception to the duty of fidelityIdentify cases - Fraser of SCC 1985, Haydon of FC 2005, Read of FC 2005Employers protect themselves by having internal systems to receive reports of wrongdoingAn employee may have a duty to report internally firstEndorsed in Read and by our Supreme Court of Canada in a case called Merk – 2004Thrown somewhat into question by our broadly worded Criminal Code anti-reprisal provision – section 425.1But only provides immunity from reporting to law enforcement, not blogging, not passing things to the media, not passing things to a bloggerOf course, whistleblowing unusually means point to the pressCase from Supreme Court of Canada last week that says a court will assess whether it will honour a journalist’s promise of confidentiality on a case-by-case basisNo reason why a whistleblower couldn’t tweet it to the world anonymously… will be investigations…
  15. In assessing any case there is two questionsIs there a nexus?How culpable is it?Here is a list of factors. Speak for themselves.
  16. And here are some more.
  17. This is a different issue, but it relates to privacy and social media use by employees.Employers have a duty to maintain a violence free workplace. Done through something called threat assessment. For an assessment to be proper it must be based on all relevant and available information.Remember Virginia Tech. Representative of common problem. Not having a complete picture. Same as Columbine. In Columbine two shooters had posted a number of violent writings online.Information on social media sites is probative. Employer’s shouldn’t discount it in conducting threat assessments.Exceptions in privacy legislation allow for this, but each piece of legislation is slightly different.