Presentation on theme: "Social Networking & Professional Liability"— Presentation transcript:
1 Social Networking & Professional Liability May 13, 2010Speakers:Gary Basham, Basham ParkerRebecca Pearson, AmWINS Insurance Brokerage of CaliforniaMichelle Kley, BeazleyModerator: Randall J. Krause
2 Rebecca S. Pearson, Esq.Assistant VP in the Financial Risk Solutions Group of AmWINS Insurance Brokerage, San Francisco.Focus is E&O, D&O, EPL and other professional and management liability insurance placements. Expertise in cyber liability, technology, privacy, architects and engineers, lawyers professional, real estate professionals and miscellaneous consultants.Before engaging in insurance brokerage in 2006, Becky practiced law in San Francisco. Practice included insurance coverage litigation representing policyholders in coverage disputes.Stanford University (B.A. Communications)University of San Francisco School of Law (J.D. 2000)
3 Michelle Kley, Esq.Legal counsel to Beazley’s Technology, Media and Business Solutions teamFocus is technology E&O, network security, privacy and media coverage.Prior to joining Beazley in 2009, she was an associate at Wilson Sonsini Goodrich & Rosati specializing in mergers and acquisitions.UC Berkeley School of Law (Boalt Hall) (J.D. 2003)Sonoma State University (B.A. psychology)
4 Gary R. Basham, Esq.Founding partner, Basham Parker LLP, with exclusive employment law practice.Focus is defending employers against claims for breach of contract, discrimination, retaliation, harassment, wrongful termination, unfair business practices, violation of wage and hour laws. Expertise in Age Discrimination and Employment Act, ADA, Title VII, Equal Pay Act, FMLA & CFRA, California’s FEHA, California Workplace Violence Safety Act, and workplace privacy laws.Member of the Labor and Employment Section of the State Bar of California, Sacramento County Bar Association, Sacramento Human Resource Management Association, Central Valley Human Resource Management Association.Mediator for the United States District Court for the Eastern District of California’s Voluntary Dispute Resolution Program.In addition to his law practice, Mr. Basham also is actively engaged in various community service activities. From December 2003 through May 2009, Mr. Basham was the Vice President of the Board of Directors for the Sacramento Union Gospel Mission, an organization dedicated to helping the homeless. Mr. Basham continues to volunteer his time to the Union Gospel Mission, as well as other organizations which feed the hungry and house the homeless.University of Michigan Law School, cum laude (J.D. 1987) Michigan State University, with honors (B.A. 1984).
5 Social Media DefinedSocial media is conversation and interaction online using highly accessible and scalable publishing techniques. Social media transforms people from content consumers to content producers.
6 Social Media UsersSocial media now appealing to big and small businesses.Companies are utilizing social media to reach customers and to build or maintain reputation.
7 Social Media – A Business Tool Examples: Facebook, Twitter, LinkIn, Ning, YouTubeSocial media have become the new "tool" for effective business marketing and sales.
9 Small Social Media Ziggs—a professional connection portal. Ecademy—networking for business, offline networking events and global networking groups.Fast Pitch—Social Network for Business Networking Professionals to market their business, press, blogs, events and networks.Yelp—a local business review and talk networking site, including user reviews and recommendations.
10 Social Media Statistics Social networking now accounts for 11 percent of all time spent online in the USIn December 2009, 248 million unique monthly users on the top eight social networking sites in the US, an increase of 41% from January 2009One in four (25%) US Internet page views occurred at one of the top social networking sites in December 2009, up 83% from 13.8% in December 2008
11 Social Media Statistics In December 2009, Twitter handled over 1 Billion tweets per month.Next month (January 2010), handled over 1.2 billionAverage 40 million tweets per dayMobile User Stats as of March 4, 2010:Twitter had 347% jump since 2009 in access via mobile browser.Over 30% of smartphone users access social networks using a mobile browser, up from 22% a year ago.Facebook uses w/mobile browser up 112%. In one month (January 2010): Facebook had 25.1 million users; MySpace had 11.4 million; Twitter had 4.7million
19 Here’s an example from my email account! KNBC Published: May 5, 2010 Over the past few months thousands of Facebook users report receiving messages or friend requests from people they don’t know.Researchers at VeriSign, an internet security company say they’ve tracked a growing trend of bogus or stolen Facebook accounts that are now up for sale in high volume on the black market.VeriSign says 1.5 million Facebook accounts appear to be for sale.Criminals apparently steal login data for accounts, typically with phishing techniques that trick users into disclosing their password. They use the accounts to send out spam or malicious programs or steal a person’s identity.Here’s an example frommy account!
23 SCREENING AND BACKGROUND CHECKS CareerBuilder.com reports that a survey of 3100 employers revealed that 22% of hiring managers said they use the Internet and social networking sites to research job candidatesAn additional 9% said they don't currently use the Internet and social networking sites to screen potential employees, but plan to start
24 SCREENING AND BACKGROUND CHECKS Twenty-four percent of hiring managers who researched job candidates via the Internet and social networking sites said they found content that helped to solidify their decision to hire the candidate; top factors that influenced their hiring decision included:48% of candidates background supported their qualifications for the job43% of candidates had great communication skills40% of candidates was a good fit for the company's culture36% of candidates site conveyed a professional image31% of candidates had great references posted about them by others30% of candidates showed a wide range of interests29% of candidates received awards and accolades24% of candidates profile was creative
25 SCREENING AND BACKGROUND CHECKS Of those hiring managers who have screened job candidates via the Internet and social networking profiles, one-third reported they found content which caused them to dismiss the candidate from consideration; top areas for concern among these hiring managers included:41% of candidates posted information about them drinking or using drugs40% of candidates posted provocative or inappropriate photographs or information (potential sexual harassment or gender discrimination claims)29% of candidates had poor communication skills28% of candidates bad-mouthed their previous company or fellow employee27% of candidates lied about qualifications22% of candidates used discriminatory remarks related to race, gender, religion, etc.21% of candidates were linked to criminal behavior19% of candidates shared confidential information from previous employers
27 EMPLOYEE PRODUCTIVITY Nucleus Research July 2009 Survey 237 Randomly Selected Office Workers Employers are losing 1.5 workers per 100 in employee productivity to social networkingNearly two-thirds of those who have Internet access visit social networking sites during working hoursThose who visit these sites at work do so for an average of 15 minutes each dayOf those who visit social networking sites at work, 87% could not define a clear business reason for itOf those who visit social networking sites at work, 6% never use it anywhere else, meaning one in every 33 workers do all of their social networking during work hours
28 RECOMMENDATIONS“It may look harmless, but it's a legal land mine for employers.”The National Law JournalJuly 6, 2009The California Supreme Court has ruled a former employer providing a recommendation owes a duty to protect employers and third parities and cannot misrepresent the qualifications and character of an ex-employee where there is a substantial risk of physical injury.(Randi W. v. Muroc Jt. Unified School District (1997) 14 Cal.4th 1066.)The law arguably places employers who give recommendations in a Catch-22, which ultimately raises the risks to the insurers – if an employer fails to disclose an accusation because of insufficient credible evidence, then the employer risks being sued by third party victims; however, if the employer does mention an accusation, the ex-employee can arguably sue for defamation.
30 POTENTIAL RISKS INVASION OF PRIVACY CLAIMS Generally, under federal and California state law, employers may utilize social networking sites to conduct background checks on employees if:The employer conducts the background check itselfThe site is readily accessible to the publicThe employer does not need to create a false alias to access the siteThe employer does not have to provide any false information to gain access to the siteThe employer does not use the information learned from the site in a discriminatory manner or otherwise prohibited by law
31 DISPARATE IMPACT DISCRIMINATION CLAIMS Even where an employer is not motivated by discriminatory intent, employers are prohibited from using a facially neutral employment practice that has an unjustified adverse impact on protected classesAccording to the latest data collected from Quantcast, users of social networking sites are primarily Caucasians age (on LinkedIn, only 4% of users are African-American, 8% are Asian, and just 2% are Hispanic)Recruiting on social networking can result in disparate impact on groups without a large social networking presence
32 DISPARATE TREATMENT DISCRIMINATION A PICTURE I$ WORTH A THOU$AND WORD$ AND MORE If you are not careful, a picture may be worth a claim of employment discrimination.Take a look at the following slide and photographs which have been uploaded to, and freely obtained from various FaceBook, MySpace, and blog sites.What information can you gain from these photos which would otherwise be “off-limits” when making employment decisions?
34 UNLAWFUL DISCRIMINATION WHAT CHARACTERISTICS ARE PROTECTED? Age (40 years or older)Association/affiliation (including political)Disability/medical condition (physical or mental)Marital statusNational origin/ancestry (including language use restrictions)Race/colorReligionRetaliation for engaging in protected activity or requesting a protected leave of absenceSex/gender (including gender identity)Sexual orientationVeteran statusSelf-explanatory. The diagram is intended to suggest that most people will fall into at least one protected category.
35 ON-DUTY CONDUCTImagine you are the manager of a Burger King restaurant and you have just discovered how to use MySpace. You decide to check the profiles of the employees who work the midnight shift. While perusing one employee's profile, you notice a link to a video.As you click on the link, you are immediately faced with the employee, possibly in his birthday suit, taking a bath in one of the restaurant's utility sinks.You instantly imagine every horrible situation that may result from this incident: health violations, customers getting sick, bad public relations.This situation is no fabrication. It actually occurred at a Burger King in Xenia, Ohio.
37 MANAGING RISKS OF MONITORING EMPLOYEE SOCIAL NETWORKING Employers have the right to monitor employees’ social networking activity if it occurs during work hours and as it relates to the employer’s businessEmployers can reduce the potential of claims for invasion of privacy and discrimination by:Ensuring employees are aware their computer usage may be monitored (policy, policy, policy)Monitor everyone – and equallyUse reliable monitoring techniques
38 LOSS CONTROL RECOMMENDATIONS Construct Clear Policies on Employee and Applicant Screening Processes When screening applicants and researching employees on social networking and blog sites, employers should create strict policies concerning which company representatives may research individuals, what they may research, and what methods of research they may useIn order to guard against discrimination suits, employers should designate a neutral party who is not an employment decision-maker to research the applicant or employee’s social networking profiles and blogsEmployers should instruct that neutral party to withhold any and all information pertaining to an individual’s protected class or characteristics when reporting back to the decision-makerThe neutral party should not unnecessarily delve into research that would focus on any of these protected traits
39 LOSS CONTROL RECOMMENDATIONS Construct Clear Policies on Employee and Applicant Screening Processes When researching employees or screening applicants on social networking and blog sites, individuals conducting research should not employ questionable tactics to gain access to profiles, blogs, and other informationEmployers should not try to “friend” an applicant or employee for the primary purpose of investigationEmployers should also not attempt to obtain passwords or access to the profile from other employees, as the other employees may feel compelled or obligated to provide the employer such information
40 LOSS CONTROL RECOMMENDATIONS Construct Clear Policies on Employee Use The policy should be designed to implement clear rules regarding the extent of allowable usage and whether it is permissible for employees to affiliate themselves with the companySocial media policies should be developed along the same guidelines as electronic communication policies and incorporated into existing confidentiality and technology policies whenever possibleThe policy should be disbursed in a manner that will provide confirmation that the employees have read and understood the policyEmployers should also take care to ensure the policy is effectively communicated to the workforce and should consider providing training sessions or include the content of the policy in orientation seminars
41 LOSS CONTROL RECOMMENDATIONS What Should Be Included In the Policy (Include a specific statement of what is prohibited.)Disclosing confidential or proprietary informationDisclosing the name of the business in personal websites or purely social networking sites except professional networking sites (e.g., LinkedIn)Revealing the name of the company on a site with sexual or violent contentUsing the company's intellectual property (e.g., trademarks)Infringing on the intellectual property rights of others
42 LOSS CONTROL RECOMMENDATIONS What Should Be Included In the Policy (Include a specific statement of what is prohibited.)Making statements adversely affecting the company's interests or reputationCriticizing customers or other important business partnersMaking statements supporting competitorsIssuing defamatory, harassing, or disparaging languageIssuing content that violates the law (e.g., obscenity)Writing or commenting on content that would constitute a violation of any other policies, rules, standards of conduct, or requirements applicable to employees
43 Social Networking & Data Security (Cyber) Issues