SlideShare a Scribd company logo
1 of 22
SOCIAL MEDIA
&
EMPLOYEE PRIVACY
presented by Denisa Dobrin

New England College of Business and Finance
MBA530 – Legal Issues in Business

Prof. Deborah Sementa
Table of Contents

•

Introduction

……………….…………………………. 3

•

Social vs. Business ................................................... 5

•

What is Social Media? ……………………...………... 6

•

Main concerns ………...………………...…………... 10

•

Legal Liability ……….………………..……………….. 12

•

Legal Compliance …………………………………… 13

•

Productivity .………………………………...…………14

•

Security …………………………………………………15

•

Employee rights …………..………………………….... 16

•

Conclusion………………………………………….……18

•

References ………………………….…….…………… 22
Denisa
 Social media
 Public vs. Private
 Personal vs. business
 Freedom vs. liability
 Privacy vs. compliance

 Employee privacy
MAIN POINTS OF THE DEBATE
SOCIAL VS. BUSINESS
What is Social Media?
GROWTH
Privacy in today's workplace is largely illusory
Ellen Bayer
AMA’s human resources leader
Main concerns
 LIABILITY
 PRODUCTIVITY
 COMPLIANCE
 SECURITY
Privacy and Liability

It's not just a matter of
corporate curiosity,
but very real worries about
productivity and liability that push these policies.
Eric Rolfe Greenberg
Director of management studies, AMA.
Legal Liability
Legal Compliance
 Industry specific regulation
 Good “due diligence”
 Sarbanes-Oxley
Productivity
Security
Employee rights
WHAT RIGHTS DOES AN EMPLOYEE
HAVE?
Legal rights
CONCLUSION
Uncharted territory
Learn to navigate
change
THANK YOU
for watching!

I’M LOOKING FORWARD TO YOUR QUESTIONS…

?
REFERENCES
Reh, J. F. (2013) Your Boss Is Watching You. Retrieved from:
http://management.about.com/cs/people/a/MonitorEE062501.htm
Mello, J. A. (2012). SOCIAL MEDIA, EMPLOYEE PRIVACY AND CONCERTED ACTIVITY:
BRAVE NEW WORLD OR BIG BROTHER? Labor Law Journal, 63(3), 165-173.

Ribitzky, R. (2013). Active Monitoring of Employees Rises to 78%. ABC News. Retrieved
from: http://abcnews.go.com/Business/story?id=88319
Sánchez Abril, P., Levin, A., & Del Riego, A. (2012). Blurred Boundaries: Social Media
Privacy and the Twenty-First-Century Employee. American Business Law
Journal, 49(1), 63-124. Retrieved from:
http://search.proquest.com/docview/1081346543?accountid=33575
Saylin, G. M., Horrocks, T. C. (2013) The Risks of Pre-employment Social Media Screening.
SHRM. Retrieved from:
http://www.shrm.org/hrdisciplines/staffingmanagement/Articles/Pages/Preemploym
ent-Social-Media-Screening.aspx

More Related Content

Similar to Social media and employee privacy

10 Top HR Practices For 2012
10 Top HR Practices For 201210 Top HR Practices For 2012
10 Top HR Practices For 2012Robert Hutt
 
Top 10 Best Practices for Human Resources in 2012
Top 10 Best Practices for Human Resources in 2012Top 10 Best Practices for Human Resources in 2012
Top 10 Best Practices for Human Resources in 2012aaronsedwards
 
10 best practice hr in 2009
10 best practice hr in 200910 best practice hr in 2009
10 best practice hr in 2009Confidential
 
10 best practice hr in 2009
10 best practice hr in 200910 best practice hr in 2009
10 best practice hr in 2009Confidential
 
10 Best Practice Hr In 2009
10 Best Practice Hr In 200910 Best Practice Hr In 2009
10 Best Practice Hr In 2009Confidential
 
10 Best Practice Hr In 2009
10 Best Practice Hr In 200910 Best Practice Hr In 2009
10 Best Practice Hr In 2009Confidential
 
10 Best Practice Hr In 2009
10 Best Practice Hr In 200910 Best Practice Hr In 2009
10 Best Practice Hr In 2009Confidential
 
Office move checklist
Office move checklistOffice move checklist
Office move checklistConfidential
 
Hr best practices 2008
Hr best practices 2008Hr best practices 2008
Hr best practices 2008prashu75
 
What Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber InsuranceWhat Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber InsuranceSymantec
 
1201 2012 us training catalog final
1201 2012 us training catalog final1201 2012 us training catalog final
1201 2012 us training catalog finalMartin Cowling
 
NAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-ReportNAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-ReportZeinab Jeylani
 
NAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-ReportNAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-ReportAlysia Allen
 
Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...
Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...
Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...KBHN KT
 
Setting the-standard
Setting the-standardSetting the-standard
Setting the-standardblqmiata
 
Successful business marketing
Successful business marketingSuccessful business marketing
Successful business marketinginformationguide
 
How to answer the 64 toughtest interview questions
How to answer the 64 toughtest interview questionsHow to answer the 64 toughtest interview questions
How to answer the 64 toughtest interview questionsEDIN BROW, DCE, AMET
 
A Specialist Multi-discipline Recruitment Company
A Specialist Multi-discipline Recruitment CompanyA Specialist Multi-discipline Recruitment Company
A Specialist Multi-discipline Recruitment Companydaniellsmith
 

Similar to Social media and employee privacy (20)

10 Top HR Practices For 2012
10 Top HR Practices For 201210 Top HR Practices For 2012
10 Top HR Practices For 2012
 
Top 10 Best Practices for Human Resources in 2012
Top 10 Best Practices for Human Resources in 2012Top 10 Best Practices for Human Resources in 2012
Top 10 Best Practices for Human Resources in 2012
 
Hr article
Hr articleHr article
Hr article
 
10 best practice hr in 2009
10 best practice hr in 200910 best practice hr in 2009
10 best practice hr in 2009
 
10 best practice hr in 2009
10 best practice hr in 200910 best practice hr in 2009
10 best practice hr in 2009
 
10 Best Practice Hr In 2009
10 Best Practice Hr In 200910 Best Practice Hr In 2009
10 Best Practice Hr In 2009
 
10 Best Practice Hr In 2009
10 Best Practice Hr In 200910 Best Practice Hr In 2009
10 Best Practice Hr In 2009
 
10 Best Practice Hr In 2009
10 Best Practice Hr In 200910 Best Practice Hr In 2009
10 Best Practice Hr In 2009
 
Office move checklist
Office move checklistOffice move checklist
Office move checklist
 
Hr best practices 2008
Hr best practices 2008Hr best practices 2008
Hr best practices 2008
 
What Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber InsuranceWhat Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber Insurance
 
1201 2012 us training catalog final
1201 2012 us training catalog final1201 2012 us training catalog final
1201 2012 us training catalog final
 
NAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-ReportNAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-Report
 
NAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-ReportNAZ-2013-Community-Survey-Report
NAZ-2013-Community-Survey-Report
 
SEO Book by Aron Wall
SEO Book by Aron WallSEO Book by Aron Wall
SEO Book by Aron Wall
 
Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...
Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...
Identifying and prioritizing stakeholder needs in neurodevelopmental conditio...
 
Setting the-standard
Setting the-standardSetting the-standard
Setting the-standard
 
Successful business marketing
Successful business marketingSuccessful business marketing
Successful business marketing
 
How to answer the 64 toughtest interview questions
How to answer the 64 toughtest interview questionsHow to answer the 64 toughtest interview questions
How to answer the 64 toughtest interview questions
 
A Specialist Multi-discipline Recruitment Company
A Specialist Multi-discipline Recruitment CompanyA Specialist Multi-discipline Recruitment Company
A Specialist Multi-discipline Recruitment Company
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Social media and employee privacy

  • 1. SOCIAL MEDIA & EMPLOYEE PRIVACY presented by Denisa Dobrin New England College of Business and Finance MBA530 – Legal Issues in Business Prof. Deborah Sementa
  • 2. Table of Contents • Introduction ……………….…………………………. 3 • Social vs. Business ................................................... 5 • What is Social Media? ……………………...………... 6 • Main concerns ………...………………...…………... 10 • Legal Liability ……….………………..……………….. 12 • Legal Compliance …………………………………… 13 • Productivity .………………………………...…………14 • Security …………………………………………………15 • Employee rights …………..………………………….... 16 • Conclusion………………………………………….……18 • References ………………………….…….…………… 22
  • 3. Denisa  Social media  Public vs. Private  Personal vs. business  Freedom vs. liability  Privacy vs. compliance  Employee privacy
  • 4. MAIN POINTS OF THE DEBATE
  • 6. What is Social Media?
  • 8.
  • 9. Privacy in today's workplace is largely illusory Ellen Bayer AMA’s human resources leader
  • 10. Main concerns  LIABILITY  PRODUCTIVITY  COMPLIANCE  SECURITY
  • 11. Privacy and Liability It's not just a matter of corporate curiosity, but very real worries about productivity and liability that push these policies. Eric Rolfe Greenberg Director of management studies, AMA.
  • 13. Legal Compliance  Industry specific regulation  Good “due diligence”  Sarbanes-Oxley
  • 16. Employee rights WHAT RIGHTS DOES AN EMPLOYEE HAVE?
  • 21. THANK YOU for watching! I’M LOOKING FORWARD TO YOUR QUESTIONS… ?
  • 22. REFERENCES Reh, J. F. (2013) Your Boss Is Watching You. Retrieved from: http://management.about.com/cs/people/a/MonitorEE062501.htm Mello, J. A. (2012). SOCIAL MEDIA, EMPLOYEE PRIVACY AND CONCERTED ACTIVITY: BRAVE NEW WORLD OR BIG BROTHER? Labor Law Journal, 63(3), 165-173. Ribitzky, R. (2013). Active Monitoring of Employees Rises to 78%. ABC News. Retrieved from: http://abcnews.go.com/Business/story?id=88319 Sánchez Abril, P., Levin, A., & Del Riego, A. (2012). Blurred Boundaries: Social Media Privacy and the Twenty-First-Century Employee. American Business Law Journal, 49(1), 63-124. Retrieved from: http://search.proquest.com/docview/1081346543?accountid=33575 Saylin, G. M., Horrocks, T. C. (2013) The Risks of Pre-employment Social Media Screening. SHRM. Retrieved from: http://www.shrm.org/hrdisciplines/staffingmanagement/Articles/Pages/Preemploym ent-Social-Media-Screening.aspx

Editor's Notes

  1. Hello everyone and welcome!
  2. With employers’ increasing use and access to employees’ social media we need to understand how this has affected employee privacy. My name is Denisa Dobrin and this week I will examine potential future pros and cons of the social media trends as they relate to legal issues in business and the employee’s right to privacy. This presentation constitutes my Week 5 Assignment for the “Legal Issues in Business” class at NECB.
  3. The proliferation of social media and the affordability of internet connection have opened the door to a sudden explosion and modification in means of individual communication. Networking has changed dramatically – both at a personal and business level. But this new wave of connectivity has brought along new challenges.
  4. New trends impose adaptation, new rules and regulations and innovative approaches. With more computers (personal and business) in use than ever, the internet access and social media are gaining popularity among all ages for a variety of reasons. But access and desire of sharing often butts heads with business image and parceling of personal vs. work time. That’s what set in motion a heated debate: personal privacy and work responsibilities – how far can a company go when it comes to monitoring an employee?
  5. A good conversation starter on this topic would be defining the term: Social Media – also known as “Web 2.0”. Social Media is most commonly understood as a form of communication between organizations, communities, and individuals through the creation and exchange of user-generated content shared on highly interactive platforms, using mobile and web-based technologies.
  6. According to a new eMarketer report, “Worldwide Social Network Users: 2013 Forecast and Comparative Estimates,” “nearly one in four people worldwide will use social networks in 2013. The number of social network users around the world will rise from 1.47 billion in 2012 to 1.73 billion this year, an 18% increase. By 2017, the global social network audience will total 2.55 billion.” These trends impact businesses and employees alike and they are becoming harder and harder to ignore. So how do businesses respond?
  7. Ribitzky (2013) quotes an American Management Association (AMA) study that “nearly 80 percent of major companies now monitor employees' use of e-mail, Internet or phone.” The figure represents a sharp rise from 1997 and marks a trend. In 1997 only 35 % of companies kept tabs on their workers, and in 2007, 43 % of employers were actively monitoring their employees' internet use. The dramatic increase “comes while the percentage of workers with access to office e-mail and Internet remained virtually unchanged.” (Ribitzky, 2013)
  8. The evidence is more and more obvious. There’s less and less area left for individuals to claim as private. "Privacy in today's workplace is largely illusory.” (Reh, 2013) We have more open space cubicles, our desk space is often shared, computers are all networked for ease of communication, information sharing and back-up and working from home or an alternate location (teleworking) is becoming a conventional choice. As a result, “it is hard to realistically hold onto a belief in private space" - Ellen Bayer, AMA's human resources practice leader. (Reh, 2013)
  9. Here are the main reasons that have led to diminished personal privacy: liability, compliance, productivity and security.
  10. Eric Rolfe Greenberg, director of management studies for the AMA, explained the “why” great: "It's not just a matter of corporate curiosity, but very real worries about productivity and liability that push these policies." (Ribitzky, 2013)He continued to point out other potential reasons: “personal e-mail can clog a company's telecommunications system, and sexually explicit or other inappropriate material downloaded from the Internet can lead to claims of a hostile work environment" (Eric Rolfe Greenberg as cited by Ribitzky, 2013)
  11. One of the most important reasons for reduced privacy in a business scenario is to protect the employer from a variety of legal liabilities which could arise as the result of the content of such communications. And this can go both ways.When companies adopt social media, their first concern is related to people saying negative things about them. Thus, the first instinct is to issue a companywide policy that dictates what people can and cannot say, which can often backfire - since being able to talk about wages, hours and working conditions is protected by the NLRA. So from this legal angle, employers should be careful about disciplining employees for off-duty conduct. However, social media posts can be used as evidence in cases of work discrimination or harassment. Other social media associated risks that prompt legal liability for an employer/employee are related to inadvertently sharing details concerning: copyright and intellectual property (company’s trade secrets, internal strategy and financial information are confidential and should not be discussed outside the company), personal information (numerous Federal and State laws deal with employee privacy), offensive graphic material etc.
  12. According to Reh (2013), “in regulated industries, taping telemarketing activities gives both the company and the consumer some degree of legal protection.” In addition, “electronic recording and storage may be considered part of a company's "due diligence" in keeping adequate records and files.” (Reh, 2013)There are a number of reporting requirements imposed under the Sarbanes-Oxley which “require the retention and storage of all e-mails related to financial transactions.” (Sánchez, Levin & Del Riego, 2012)
  13. A significant number of employers monitor the communications and online activities of their employees in the workplace in order to determine “the extent to which employees are actually doing their jobs during work hours and not engaging in distracting personal business. Net-surfing, personal use of office e-mail, and/or dialing up 900 numbers expend time and assets on non-business related activities.” (Reh, 2013)
  14. A very important reason for an employer’s monitoring needs rests with the fact that “electronic media can be a means for disgruntled employees to transmit confidential files or provide access to secure parts of the employer's website or intranet.” (Mello, 2012). The most well known cases involved whistleblowers – such as Snowden. Security is not only an employer’s concern, but an employee’s as well. There are exceptional cases where passwords to social networks where requested by employers to an employee’s private networks, as a clause to getting hired. “Despite granting employers access to information about their private lives by participating online, respondents expect that work life and private life should be generally segregated—and that actions in one domain should not affect the other.” (Sánchez, Levin & Del Riego, 2012)
  15. So what rights does an employee have? How can an employee seek protection and privacy? Turns out that the employee has very few rights. According to the Privacy Rights Clearinghouse "New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications."
  16. Several states have already passed legislation to restrict employer actions that come as a result of an employee's legal off-duty conduct. However, “there is no body of law which addresses the issue of employer monitoring of and resultant discovery of information posted on social networking sites.” So, “the question remains as to whether employees are entitled to a reasonable amount of privacy in their personal, public communications on social networking sites.” (Mello, 2012).
  17. The debate in the employee privacy vs. business needs remains open. But the boundaries are slowly clarifying, as we all become more aware of the new realities in this era of the social media. One thing is certain: this is an uncharted territory and there is a fine line between a company’s right to protect its interests and hire the right people and the employee’s right to privacy (especially when they are off-duty).
  18. The good news is that an increasing number of states are passing laws that “prohibit employers from obtaining passwords to a job applicant’s social media accounts. Such legislation highlights companies’ interest in finding out as much as they can about potential and even current employees.“ (Saylin and Horrocks, 2013) But the honest truth is simple: the best way to navigate the changes is to protect yourself. Don’t post anything in the public realm that you wouldn’t say to your boss. Make sure you know the laws of your state and grant access to your private information only to your closest friends.