SlideShare a Scribd company logo
1 of 4
Download to read offline
Employers Association of New Jersey
A nonprofit association serving employers since 19/6

Workplace Monitoring Mter Stengart v. Loving Care Agency

John 1. Sarno, Esq.
April 14, 2010

For Discussion Only
In the past twenty years, businesses and private citizens alike have embraced the use of
computers, electronic communication devices, the Internet, and e-mail. As those and other forms
oftecbnology evolve, the line separating business from personal activities can easily blur.
In the modern workplace, for example, occasional, personal use of the Internet is commonplace.
Yet that simple act can raise complex issues about an employer's monitoring of the workplace
and an employee's reasonable expectation of privacy.
In a first impression case, the Supreme Court of New Jersey in Slengart v. Loving Care Agency,
Inc., held that company policies do not convert an employee's emails with her attorney - sent
through the employee's personal, password-protected, web-based email account, but via her
employer's computer - into the employer's property. This decision limits the ability of employers
to claim that an employee's personal communications conducted from employer-owned property
are no longer private and available for the company's review.
In thi s case, a discharged employee filed a lawsuit against the company, asserting various claims
including violations of New Jersey's Law Against Discrimination. Prior to getting fired. but
unknown to the company, she used a laptop computer provided by the company to send emails to
her attorneys via her personal, web-based, password-protected Yahoo email account

After the discharged employee sued, the company extracted and created a forensic image of that
laptop's hard drive. As a result of this process, the company's attorneys were able to discover
and review many emails between the employee and her attorneys. It was only months later, after
discovery commenced and the company was required to respond to requests, that the company
informed the former employee and her counsel that it had reviewed these emails. After
protracted legal argument, a trial judge found that the employer' s electronic communications
policy put the employee on notice that her emails would be viewed as company property and,
therefore, not protected by the attorney-client privilege.

30 West Mount Pl easan t Avenue - Su ite 201 • Li vingston, New Jersey 07039
(973) 758-6800 (609) 393-7100 . Fax (9 73) 758-6900 . Website www.eanj.org
An appellate court reversed and remanded the lower court's decision. The New Jersey Supreme
Court took case for review.
The Supreme Court reviewed various versions of the company's electronic communicati ons
policy and found it problematic for the company. The court's primary concern was that the
company asserted that the employee s emails with her attorneys were not pri vate, even though
she sent them via her personal web-based Yahoo emai l account. The trial court viewed the
company's policy as an adequate warning to employees that there would be no reasonable
expectation of privacy in any communications made using company laptops or servers regardless
of whether the email was sent via a company email account or a personal web-based email
account. The appellate court, however, pointed to language in the policy permitting some
personal use and found that an objective reader of that language could have reasonabl y believed
that personal emails with her attorney would be permitted.

The Court also reviewed the way courts have historically viewed employer-issued workplace
regulations and found that such regulations should concern the terms of employment and
reasonably further the legitimate business interests of the employer. Though many aspects of
the policy were specific enough to aid the company in conducting its business, the court found
that the company's overbroad interpretation of its electronic communications policy reached
into the employee's personal life without a sufficient connection to the employer's legitimate
business interests. The company's ownership of the computer that the employee us d to send
emails to her attorney was not enough to convert those emails into company property. An
employer may discipline or terminate an employee who is engaging in business other than the
company's business during work hours, the court said, but that right does not translate into a ri ght
to confiscate the employee's personal communications.
This decision appears to be limited to an employee's use of her personal email account to
communicate with her attorney. Courts have enforced clear electronic communications poli cies
and have often held that employees do not have a reasonable expectation of privacy when they
Some decisions have applied this view to communications between an employee and his attorney
but this decision chips away at this line of cases. How far courts will go is not clear, but
employers can expect challenges that rely on the appellate court's opinion. The Stengart court
emphasized the need for clear and unambiguous policies. Therefore, employers should adopt
electronic communications policies if they do not have them or review existing pol icies for
inconsistencies and ambiguities.
As a communications media, e-mail has fi gured prominently in several high-profile employment
cases. For example, Citibank, one of the nation's largest financial institutions, was recently sued
by African -American employees who discovered that e-mail messages containing racial and
ethnic "jokes" were being circulated among managers at corporate headquarters. They have
alleged that the offensive electronic message created a hostile work environment. Also, two
African-American employees sued Morgan Stanley for harassment based on race. In this case,
the employees alleged that a white employee sent an e-mail that contained racial comments,
using the electronic password of a black employee.
Generally, employers are liable for employee conduct that violates the rights of others and that
occurs within the scope of the employment relationship. Such is the case when a supervisor
unlawfully discriminates against or harasses a subordinate. While using e-mail to harass an
employee presents a unique problem, communications via e-mail are no different than verbal or
non-verbal communication. While the harassment suit against Morgan Stanley was eventually
dismissed, it was because the content of the electronic message did not rise to the level of
harassment, not because the electronic communication was excluded from the law. Therefore, as
a practical matter electronic communications should be included in a company's harassment
policy.
Electronic communications, like all communications in the workplace, reflect a company's
culture and environment. The reality is that employees often engage in an e-mai l subculture that
forwards jokes and pictures freely. The problem with "point, click, send" is that electronic
messages mUltiply effortlessly and information is difficult to control. An e-mail policy with clear
guidelines is one way to limit liability exposure.
Privacy in the workplace is not an absolute right and there are business justifications for
invasions of personal privacy. For example, employers must ensure safety of employees, protect
against sabotage, protect intellectual property, and protect themselves from harassment suits· not
to mention preventing lost productivity due to online shopping. Indeed, monitoring employees'
online activities is a growing issue. A recent report issued in 200 1 by the Privacy Foundation
found that about 35% of workers in the United States with regular online access are under
generalized electronic surveillance. Further, the rate of surveillance has been increasing about
twice that of the number if employees with Internet access.
In most cases, employees' expectations of privacy are lowered with a written policy. Such
policies put employees on notice of electronic monitOli ng and, therefore, their continued
employment constitutes consent to such a condition. Implied consent can also be given for
monitoring stored electronic mail. Additionally, such monitoring can occur without the consent
of employee, if it occurs within the regular course of business and the employer has a "legal
interest" in the communication, such as to determine whether an employee is disclosing
confi dential trade secrets. However, such nonconsensual monitoring must be limited in time and
purpose. The scope of the exception may not include personal communications. So the best
policy is to have a policy.
The first step in developing a policy is to recognize that e-mail is considered a "document" by
court rules. As a document, e-mail is subject to litigation discovery, subpoena, search warrants
and Freedom of Information Act requests. After suit has commenced, "deleting" relevant or
embarrassing e-mail may constitute a vio lation of court rules or, in a criminal proceeding,
obstruction ofjustice. Don't forget, even deleted e-mail messages usually can be retrieved. It is
important, therefore, that employees understand that they should act with appropriate care,
attention and decorum when composing and sending e-mail. Conversational or casual e-mail can
easily be misunderstood. For example in both the Microsoft antitrust litigation and the American
Home Products fen-phen litigation, e-mails have provided "smoking guns" for prosecutors and
plai ntiffs.
As a company record, e-mail should be retained in accordance with the organization' s records
retention policy. Employees must be informed that all electronic messages are company
property, that there is no right to "ownership" simply because an employee composed and sent an
electronic message, and that employees do not have any privacy interest in any communication
created or sent in a company computer, or received by a company computer.
Companies may prohibit electronic soliciting, although the practicality of enforcing such a policy
should be thought through carefully. For example, policies requiring that the computer systems
are to be used only for business reasons, but that are not enforced for birthday, wedding or other
personal messages, may open a company open to allegations of unfair labor practices or
selective/discriminatory enforcement.
Employers may also adopt written monitOling policies. These policies can include monitoring of
e-mail and general internet activity. Employers that do not adopt expressed, written monitoring
guidelines and that do not make sure that each employee is aware of the policy can face
invasion-of-privacy claims, wrongful termination suits and, possibility, criminal penalties.
Many companies monitor electronic communications. An effective electronic media policy
should educate employees about the proper use of company systems, as well as create the legal
justification for employee discipline. Moreover, it is essential that the policy diminish any
expectation of privacy. No model policy will fit every company since needs will vary according
to the nature of the company business and culture. At a minimum, however, a basic policy
should address the following:
• Does the policy apply equally to all employees? The scope of the policy should be clear and
state, if appropriate, which employees will have e-mail or Internet access.
• Will the company monitor all or some electronic communications? If so, will monitoring be
random or based on some reasonable suspicion of wrongdoing?
• Will the policy incorporate other policies or standards? If so, will the company's harassment or
non-solicitation policies be incorporated or cross-referenced?
• Will employees be permitted to use their own software for business purposes? If so, will the
company permit them to treat that software as personal property?
• Will employees be permitted to use e-mail for limited personal reasons, such as birthday
announcements or the sale of a car? If so, where does the policy draw the line between limited
and excessive personal use?
• Who enforces the policy? Will it be enforced consistently or selectively?
It is clear that while employers will be able to monitor emails, they will have to tread lightly on

those that are "personal" particularly if the emails are covered by the attorney-client privilege.

More Related Content

What's hot

Blog is Mightier Than the Sword
Blog is Mightier Than the SwordBlog is Mightier Than the Sword
Blog is Mightier Than the Sword
Wendy Angel, M.S.
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
Kelly Savage
 
Lack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate EmailLack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate Email
Andres Baytelman
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
Kelly Hart & Hallman LLP
 

What's hot (20)

Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media Policy
 
Blog is Mightier Than the Sword
Blog is Mightier Than the SwordBlog is Mightier Than the Sword
Blog is Mightier Than the Sword
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
 
EANJ Letter Brief to NLRB RE: Purple Communications
EANJ Letter Brief to NLRB RE: Purple CommunicationsEANJ Letter Brief to NLRB RE: Purple Communications
EANJ Letter Brief to NLRB RE: Purple Communications
 
Lack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate EmailLack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate Email
 
Linda Eagle v. Sandi Morgan, Haitham Saead, Joseph Mellaci, Elizabeth Sweeney...
Linda Eagle v. Sandi Morgan, Haitham Saead, Joseph Mellaci, Elizabeth Sweeney...Linda Eagle v. Sandi Morgan, Haitham Saead, Joseph Mellaci, Elizabeth Sweeney...
Linda Eagle v. Sandi Morgan, Haitham Saead, Joseph Mellaci, Elizabeth Sweeney...
 
Employees’ Privacy Rights In The Digital Age
Employees’ Privacy Rights In The Digital AgeEmployees’ Privacy Rights In The Digital Age
Employees’ Privacy Rights In The Digital Age
 
Trade secret-10-step-guide
Trade secret-10-step-guideTrade secret-10-step-guide
Trade secret-10-step-guide
 
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social Media
 
Social media, staff policy and law legal
Social media, staff policy and law legalSocial media, staff policy and law legal
Social media, staff policy and law legal
 
BUS 365: Show and tell
BUS 365: Show and tellBUS 365: Show and tell
BUS 365: Show and tell
 

Viewers also liked

Viewers also liked (14)

Sowing New Seeds: Garden Organic
Sowing New Seeds: Garden OrganicSowing New Seeds: Garden Organic
Sowing New Seeds: Garden Organic
 
Denver IT Support Company presents What is Cloud Computing? Answering Questio...
Denver IT Support Company presents What is Cloud Computing? Answering Questio...Denver IT Support Company presents What is Cloud Computing? Answering Questio...
Denver IT Support Company presents What is Cloud Computing? Answering Questio...
 
Virksomhetssøk for prosjekt - Comperio
Virksomhetssøk for prosjekt  - ComperioVirksomhetssøk for prosjekt  - Comperio
Virksomhetssøk for prosjekt - Comperio
 
Childrens views on disability in books
Childrens views on disability in booksChildrens views on disability in books
Childrens views on disability in books
 
Siklus asam sitrat
Siklus asam sitratSiklus asam sitrat
Siklus asam sitrat
 
Зарничка
ЗарничкаЗарничка
Зарничка
 
Jamia Noman Report
Jamia Noman ReportJamia Noman Report
Jamia Noman Report
 
tt9-16s54-56tv_osto
tt9-16s54-56tv_ostott9-16s54-56tv_osto
tt9-16s54-56tv_osto
 
De-Mystifying Twitter for Small Business - 2016
De-Mystifying Twitter for Small Business - 2016De-Mystifying Twitter for Small Business - 2016
De-Mystifying Twitter for Small Business - 2016
 
Ramagovhoda, Shudufhadzani - CID
Ramagovhoda, Shudufhadzani - CIDRamagovhoda, Shudufhadzani - CID
Ramagovhoda, Shudufhadzani - CID
 
Booklet «Ukraine with Discrimination: is there a way out?»
Booklet «Ukraine with Discrimination: is there a way out?» Booklet «Ukraine with Discrimination: is there a way out?»
Booklet «Ukraine with Discrimination: is there a way out?»
 
Maroba 30 November 2016
Maroba 30 November 2016Maroba 30 November 2016
Maroba 30 November 2016
 
República oriental de uruguay
República oriental de uruguayRepública oriental de uruguay
República oriental de uruguay
 
9a8
9a89a8
9a8
 

Similar to Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010

Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidence
wcodell
 
Social media
Social mediaSocial media
Social media
Sheila A
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse
Wendi Lazar
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
Shankar Myadharaveni
 
Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)
Janette Levey Frisch
 

Similar to Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010 (17)

Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Rachel Carson Essay Silent Spring
Rachel Carson Essay Silent SpringRachel Carson Essay Silent Spring
Rachel Carson Essay Silent Spring
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidence
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
Social media
Social mediaSocial media
Social media
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse
 
Case study 7
Case study 7Case study 7
Case study 7
 
HRM
HRMHRM
HRM
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
3
33
3
 
Week5 paper-susbauer
Week5 paper-susbauerWeek5 paper-susbauer
Week5 paper-susbauer
 
Spam- A Menace to Society
Spam- A Menace to SocietySpam- A Menace to Society
Spam- A Menace to Society
 
Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 

More from Employers Association of New Jersey

More from Employers Association of New Jersey (20)

EANJ Hybrid Workplace Survey
EANJ Hybrid Workplace SurveyEANJ Hybrid Workplace Survey
EANJ Hybrid Workplace Survey
 
Constitutionality of the Affordable Care Act
Constitutionality of the Affordable Care ActConstitutionality of the Affordable Care Act
Constitutionality of the Affordable Care Act
 
National Labor Relations Act
National Labor Relations ActNational Labor Relations Act
National Labor Relations Act
 
Preventing the Spread of Coronavirus at Work
Preventing the Spread of Coronavirus at WorkPreventing the Spread of Coronavirus at Work
Preventing the Spread of Coronavirus at Work
 
Talent Retention Survey 2019
Talent Retention Survey 2019Talent Retention Survey 2019
Talent Retention Survey 2019
 
Mental Health HR Toolkit
Mental Health HR ToolkitMental Health HR Toolkit
Mental Health HR Toolkit
 
N.J. Health Reform update - 2019
N.J. Health Reform update - 2019N.J. Health Reform update - 2019
N.J. Health Reform update - 2019
 
Medical Marijuana in the Workplace Update - 2019
Medical Marijuana in the Workplace Update - 2019Medical Marijuana in the Workplace Update - 2019
Medical Marijuana in the Workplace Update - 2019
 
Annual Meeting Presentation 2019
Annual Meeting Presentation 2019Annual Meeting Presentation 2019
Annual Meeting Presentation 2019
 
NJ Equal Pay Law
NJ Equal Pay LawNJ Equal Pay Law
NJ Equal Pay Law
 
Diane B. Allen Equal Pay Act - Effective July 1, 2018
Diane B. Allen Equal Pay Act - Effective July 1, 2018Diane B. Allen Equal Pay Act - Effective July 1, 2018
Diane B. Allen Equal Pay Act - Effective July 1, 2018
 
EEOC Scrutinizes Employer Social Networking Policies
EEOC Scrutinizes Employer Social Networking Policies EEOC Scrutinizes Employer Social Networking Policies
EEOC Scrutinizes Employer Social Networking Policies
 
Diversity, Knowledge and Human Potential
Diversity, Knowledge and Human Potential Diversity, Knowledge and Human Potential
Diversity, Knowledge and Human Potential
 
At Will Employment
At Will EmploymentAt Will Employment
At Will Employment
 
Medical Marijuana in the Workplace
Medical Marijuana in the WorkplaceMedical Marijuana in the Workplace
Medical Marijuana in the Workplace
 
Ethics Policies and Training Essential for Employers
Ethics Policies and Training Essential for EmployersEthics Policies and Training Essential for Employers
Ethics Policies and Training Essential for Employers
 
Retirement Savings Crisis: What Employers Can Do
Retirement Savings Crisis: What Employers Can DoRetirement Savings Crisis: What Employers Can Do
Retirement Savings Crisis: What Employers Can Do
 
N.J. Minimum Wage Constitutional Amendment
N.J. Minimum Wage Constitutional AmendmentN.J. Minimum Wage Constitutional Amendment
N.J. Minimum Wage Constitutional Amendment
 
Creating Value Innovation
Creating Value InnovationCreating Value Innovation
Creating Value Innovation
 
HR in the Middle Ethics in HR Management
HR in the Middle Ethics in HR ManagementHR in the Middle Ethics in HR Management
HR in the Middle Ethics in HR Management
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010

  • 1. Employers Association of New Jersey A nonprofit association serving employers since 19/6 Workplace Monitoring Mter Stengart v. Loving Care Agency John 1. Sarno, Esq. April 14, 2010 For Discussion Only In the past twenty years, businesses and private citizens alike have embraced the use of computers, electronic communication devices, the Internet, and e-mail. As those and other forms oftecbnology evolve, the line separating business from personal activities can easily blur. In the modern workplace, for example, occasional, personal use of the Internet is commonplace. Yet that simple act can raise complex issues about an employer's monitoring of the workplace and an employee's reasonable expectation of privacy. In a first impression case, the Supreme Court of New Jersey in Slengart v. Loving Care Agency, Inc., held that company policies do not convert an employee's emails with her attorney - sent through the employee's personal, password-protected, web-based email account, but via her employer's computer - into the employer's property. This decision limits the ability of employers to claim that an employee's personal communications conducted from employer-owned property are no longer private and available for the company's review. In thi s case, a discharged employee filed a lawsuit against the company, asserting various claims including violations of New Jersey's Law Against Discrimination. Prior to getting fired. but unknown to the company, she used a laptop computer provided by the company to send emails to her attorneys via her personal, web-based, password-protected Yahoo email account After the discharged employee sued, the company extracted and created a forensic image of that laptop's hard drive. As a result of this process, the company's attorneys were able to discover and review many emails between the employee and her attorneys. It was only months later, after discovery commenced and the company was required to respond to requests, that the company informed the former employee and her counsel that it had reviewed these emails. After protracted legal argument, a trial judge found that the employer' s electronic communications policy put the employee on notice that her emails would be viewed as company property and, therefore, not protected by the attorney-client privilege. 30 West Mount Pl easan t Avenue - Su ite 201 • Li vingston, New Jersey 07039 (973) 758-6800 (609) 393-7100 . Fax (9 73) 758-6900 . Website www.eanj.org
  • 2. An appellate court reversed and remanded the lower court's decision. The New Jersey Supreme Court took case for review. The Supreme Court reviewed various versions of the company's electronic communicati ons policy and found it problematic for the company. The court's primary concern was that the company asserted that the employee s emails with her attorneys were not pri vate, even though she sent them via her personal web-based Yahoo emai l account. The trial court viewed the company's policy as an adequate warning to employees that there would be no reasonable expectation of privacy in any communications made using company laptops or servers regardless of whether the email was sent via a company email account or a personal web-based email account. The appellate court, however, pointed to language in the policy permitting some personal use and found that an objective reader of that language could have reasonabl y believed that personal emails with her attorney would be permitted. The Court also reviewed the way courts have historically viewed employer-issued workplace regulations and found that such regulations should concern the terms of employment and reasonably further the legitimate business interests of the employer. Though many aspects of the policy were specific enough to aid the company in conducting its business, the court found that the company's overbroad interpretation of its electronic communications policy reached into the employee's personal life without a sufficient connection to the employer's legitimate business interests. The company's ownership of the computer that the employee us d to send emails to her attorney was not enough to convert those emails into company property. An employer may discipline or terminate an employee who is engaging in business other than the company's business during work hours, the court said, but that right does not translate into a ri ght to confiscate the employee's personal communications. This decision appears to be limited to an employee's use of her personal email account to communicate with her attorney. Courts have enforced clear electronic communications poli cies and have often held that employees do not have a reasonable expectation of privacy when they Some decisions have applied this view to communications between an employee and his attorney but this decision chips away at this line of cases. How far courts will go is not clear, but employers can expect challenges that rely on the appellate court's opinion. The Stengart court emphasized the need for clear and unambiguous policies. Therefore, employers should adopt electronic communications policies if they do not have them or review existing pol icies for inconsistencies and ambiguities. As a communications media, e-mail has fi gured prominently in several high-profile employment cases. For example, Citibank, one of the nation's largest financial institutions, was recently sued by African -American employees who discovered that e-mail messages containing racial and ethnic "jokes" were being circulated among managers at corporate headquarters. They have alleged that the offensive electronic message created a hostile work environment. Also, two African-American employees sued Morgan Stanley for harassment based on race. In this case, the employees alleged that a white employee sent an e-mail that contained racial comments, using the electronic password of a black employee.
  • 3. Generally, employers are liable for employee conduct that violates the rights of others and that occurs within the scope of the employment relationship. Such is the case when a supervisor unlawfully discriminates against or harasses a subordinate. While using e-mail to harass an employee presents a unique problem, communications via e-mail are no different than verbal or non-verbal communication. While the harassment suit against Morgan Stanley was eventually dismissed, it was because the content of the electronic message did not rise to the level of harassment, not because the electronic communication was excluded from the law. Therefore, as a practical matter electronic communications should be included in a company's harassment policy. Electronic communications, like all communications in the workplace, reflect a company's culture and environment. The reality is that employees often engage in an e-mai l subculture that forwards jokes and pictures freely. The problem with "point, click, send" is that electronic messages mUltiply effortlessly and information is difficult to control. An e-mail policy with clear guidelines is one way to limit liability exposure. Privacy in the workplace is not an absolute right and there are business justifications for invasions of personal privacy. For example, employers must ensure safety of employees, protect against sabotage, protect intellectual property, and protect themselves from harassment suits· not to mention preventing lost productivity due to online shopping. Indeed, monitoring employees' online activities is a growing issue. A recent report issued in 200 1 by the Privacy Foundation found that about 35% of workers in the United States with regular online access are under generalized electronic surveillance. Further, the rate of surveillance has been increasing about twice that of the number if employees with Internet access. In most cases, employees' expectations of privacy are lowered with a written policy. Such policies put employees on notice of electronic monitOli ng and, therefore, their continued employment constitutes consent to such a condition. Implied consent can also be given for monitoring stored electronic mail. Additionally, such monitoring can occur without the consent of employee, if it occurs within the regular course of business and the employer has a "legal interest" in the communication, such as to determine whether an employee is disclosing confi dential trade secrets. However, such nonconsensual monitoring must be limited in time and purpose. The scope of the exception may not include personal communications. So the best policy is to have a policy. The first step in developing a policy is to recognize that e-mail is considered a "document" by court rules. As a document, e-mail is subject to litigation discovery, subpoena, search warrants and Freedom of Information Act requests. After suit has commenced, "deleting" relevant or embarrassing e-mail may constitute a vio lation of court rules or, in a criminal proceeding, obstruction ofjustice. Don't forget, even deleted e-mail messages usually can be retrieved. It is important, therefore, that employees understand that they should act with appropriate care, attention and decorum when composing and sending e-mail. Conversational or casual e-mail can easily be misunderstood. For example in both the Microsoft antitrust litigation and the American Home Products fen-phen litigation, e-mails have provided "smoking guns" for prosecutors and plai ntiffs.
  • 4. As a company record, e-mail should be retained in accordance with the organization' s records retention policy. Employees must be informed that all electronic messages are company property, that there is no right to "ownership" simply because an employee composed and sent an electronic message, and that employees do not have any privacy interest in any communication created or sent in a company computer, or received by a company computer. Companies may prohibit electronic soliciting, although the practicality of enforcing such a policy should be thought through carefully. For example, policies requiring that the computer systems are to be used only for business reasons, but that are not enforced for birthday, wedding or other personal messages, may open a company open to allegations of unfair labor practices or selective/discriminatory enforcement. Employers may also adopt written monitOling policies. These policies can include monitoring of e-mail and general internet activity. Employers that do not adopt expressed, written monitoring guidelines and that do not make sure that each employee is aware of the policy can face invasion-of-privacy claims, wrongful termination suits and, possibility, criminal penalties. Many companies monitor electronic communications. An effective electronic media policy should educate employees about the proper use of company systems, as well as create the legal justification for employee discipline. Moreover, it is essential that the policy diminish any expectation of privacy. No model policy will fit every company since needs will vary according to the nature of the company business and culture. At a minimum, however, a basic policy should address the following: • Does the policy apply equally to all employees? The scope of the policy should be clear and state, if appropriate, which employees will have e-mail or Internet access. • Will the company monitor all or some electronic communications? If so, will monitoring be random or based on some reasonable suspicion of wrongdoing? • Will the policy incorporate other policies or standards? If so, will the company's harassment or non-solicitation policies be incorporated or cross-referenced? • Will employees be permitted to use their own software for business purposes? If so, will the company permit them to treat that software as personal property? • Will employees be permitted to use e-mail for limited personal reasons, such as birthday announcements or the sale of a car? If so, where does the policy draw the line between limited and excessive personal use? • Who enforces the policy? Will it be enforced consistently or selectively? It is clear that while employers will be able to monitor emails, they will have to tread lightly on those that are "personal" particularly if the emails are covered by the attorney-client privilege.