Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy Issues at Work Training for Supervisors. ©SHRM 20082 Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.

Similar presentations


Presentation on theme: "Privacy Issues at Work Training for Supervisors. ©SHRM 20082 Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In."— Presentation transcript:

1 Privacy Issues at Work Training for Supervisors

2 ©SHRM 20082 Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In the novel, Orwell describes a society in which everyone is under complete surveillance by authorities. The people are continuously reminded of this by the phrase "Big Brother is watching you.“ The phrase "Big Brother" has entered general usage and is often heard in workplaces to describe company monitoring and surveillance activities. Despite their acknowledgement of these policies, employees often question whether employers have a legal right to invade what they regard as their right to privacy. To address employees’ concerns and their often erroneous beliefs in workplace privacy rights, supervisors need to be knowledgeable about workplace privacy issues. This sample presentation is intended for presentation to supervisors and other individuals who manage employees. It is designed to be presented by an individual who is knowledgeable in workplace privacy issue and the employer’s own policies and practices. This is a sample presentation that must be customized to match state laws and the employer’s own culture, policies and practices.

3 ©SHRM 20083 Objectives At the close of this session, you will be able to: Define what is meant by “right of privacy” and privacy in the workplace. Cite sources of privacy protection. List key workplace privacy issues. List types of employer electronic monitoring. Discuss key points of our policy on electronic monitoring.

4 ©SHRM 20084 What Is “Right of Privacy” in the Workplace? In the broad context, the “right of privacy” is an individual’s right to be free from intrusion into his or her private and personal matters. In the employment context, privacy refers to employee’s information that he or she regards as personal or private (i.e., medical information, work activities, off-duty behavior) and the right of that individual to not have such information shared with others.

5 ©SHRM 20085 Sources of Privacy Protections There are four primary sources of privacy rights: 1.The U.S. Constitution’s Bill of Rights and subsequent amendments as well as state constitutions have been interpreted to provide privacy protections. 2.Federal laws – The following are major federal laws that address specific aspects of privacy pertaining to employment: > Americans with Disabilities Act (ADA) – Regulates use of medical information, maintenance of medical documents and access. > Fair Credit Reporting Act (FCRA) – The FCRA restricts the use and requires disclosure of the contents of investigative consumer reports by employers.

6 ©SHRM 20086 Sources of Privacy Protections (cont’d) > Federal Wiretapping Act/Electronic Communications Privacy Act – Prohibits the intentional interception or disclosure of any wire, oral or electronic communication where there is a reasonable expectation of privacy. There are two exceptions, however: 1) if one party consents to the monitoring; and 2) businesses are permitted to use telephone equipment to monitor communications within the ordinary course of business. > Health Insurance Portability and Accountability Act (HIPPA) – Regulates the use and disclosure of protected health information by employers with health plans.

7 ©SHRM 20087 Sources of Privacy Protections (cont’d) 3.State Laws – Some state laws restrict employer access to information and regulate conduct under one or more of the following: > Non-discrimination acts regarding employee marital status and sexual orientation, AIDS and genetic testing, lawful products and activities. > Criminal, civil or other court records. > Medical information. > Disclosure to third parties. > Workplace monitoring.

8 ©SHRM 20088 Sources of Privacy Protections (cont’d) 4.Common law (Case Law) – The following are types of invasion of privacy recognized by courts: > Unreasonable intrusion into the seclusion of the employee – situations where the employee had a reasonable expectation of privacy, the employer’s intrusion was offensive and not justified by business necessity. Examples: personal history questionnaires, unjustified drug testing. > Unauthorized use of the employee’s name or likeness for the benefit of the employer. Example: using the employee’s photograph on the company web site without obtaining the employee’s authorization. > Public disclosure of private and personal information – Examples: disclosing a same-sex partnership, results of employment tests, reasons for involuntary termination.

9 ©SHRM 20089 Questions? Comments?

10 ©SHRM 200810 Workplace Privacy Issues Workplace privacy issues occur in the following areas: Hiring, particularly in the background checking process. Disclosure of medical information. Searches. Surveillance. Off-duty, off-premises conduct. Electronic monitoring.

11 ©SHRM 200811 Workplace Privacy Issues The federal law that pertains to the background checking process is the Fair Credit Report Act (FCRA). As previously explained, the FCRA restricts the use and requires disclosure of the contents of investigative consumer reports by employers. Disclosure of medical information by employers is governed by the Health Insurance Portability and Accountability Act (HIPPA) Medical Privacy Rules. Limitation on the employer’s use of medical information is regulated by the Americans with Disabilities Act (ADA).

12 ©SHRM 200812 Workplace Privacy Issues Workplace searches and surveillance are permitted under federal and state laws. Employers may face litigation, however, in situations where employees had a reasonable expectation of privacy, the intrusion was offensive or the employer’s actions were not justified by business necessity. Off-duty, off-premises conduct pertains to lifestyle discrimination. At the federal level, civil rights laws barring discrimination on the basis of race, gender or disability may apply to lifestyle discrimination. Twenty-one states have passed lifestyle discrimination statutes. The majority of these protect only smokers, but a few are broader. For example, Colorado and North Dakota ban discrimination based on any form of legal off-duty behavior.

13 ©SHRM 200813 Workplace Privacy Issues The Federal Wiretapping Act and Electronic Communications Privacy Act, as previously stated, prohibit the intentional interception or disclosure of any wire, oral or electronic communication where there is a reasonable expectation of privacy. There are two exceptions, however: 1) if one party consents to the monitoring; and 2) businesses are permitted to use telephone equipment to monitor communications within the ordinary course of business. Many state laws are modeled after the Federal Wiretapping Act and prohibit electronic eavesdropping allowing the same exceptions as the federal law. Monitoring of stored e-mails and voicemails is much less regulated and is generally permitted under federal and state law.

14 ©SHRM 200814 Electronic Monitoring Many employers are monitoring the following electronically: Telephones. Computer usage. Electronic mail (E-mail). The next slides review these types of electronic monitoring and the right of the employer to monitor these.

15 ©SHRM 200815 Electronic Monitoring Telephone Monitoring: Employers monitor calls with customers for quality-control purposes. Some states have laws that require one or all parties to a phone conversation to be informed that the call is being monitored or recorded. In those states, employers must have a recorded message when the call begins that the call is being monitored or recorded. Under federal law, an employer may conduct unannounced monitoring of business- related calls but must immediately stop monitoring when it realizes the call is personal. However, when employees are told not to make personal calls using company equipment, the employee loses that protection and the call may be monitored or recorded.

16 ©SHRM 200816 Electronic Monitoring Computer Usage: Employers may use computer software programs to allow them to see what is on the screen or stored in each employee’s computer and file folders. They monitor Internet usage, such as the various web sites the employee may access. Employees who perform word processing or data entry may have their keystroke speed and volume monitored. Employers may also keep track of the amount of time an employee spends away from the computer. As the employer owns the computers and provides the Internet access, it may legally conduct this type of monitoring. Good practice dictates that employers have a written policy stating its right to monitor computer equipment and usage and that employees should have no expectation of privacy when using it.

17 ©SHRM 200817 Electronic Monitoring Electronic Mail (E-Mail): E-mail systems used at a company have no privacy protections as the employer owns the systems and is allowed to review its contents. Messages sent within the company as well as those that are from an employee’s computer externally are subject to monitoring. Web-based systems such as Hotmail and Gmail as well as instant messaging may also be monitored.

18 ©SHRM 200818 [Company Name] Policy on Electronic Monitoring (Present and review key points of your company’s policy.) Examples of Levels of Delegation

19 ©SHRM 200819 Questions? Comments?

20 ©SHRM 200820 Summary In the employment context, privacy refers to information about an employee that he or she regards as personal or private (i.e., medical information, financial data, etc.) and the right of that individual to not have such information shared with others. There are four primary sources of privacy rights – the U.S. Constitution’s Bill of Rights and subsequent amendments, federal laws, state laws and common (case) law.

21 ©SHRM 200821 Summary (cont’d) Workplace privacy issues occur in many areas, such as hiring, testing, investigations and monitoring. Many employers are monitoring telephones, computer usage and e-mail electronically.

22 ©SHRM 200822 Course Evaluation Please be sure to complete and leave the evaluation sheet you received with your handouts Thank you for your attention and interest !


Download ppt "Privacy Issues at Work Training for Supervisors. ©SHRM 20082 Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In."

Similar presentations


Ads by Google