Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc.

Similar presentations


Presentation on theme: "Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc."— Presentation transcript:

1 Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

2 14-2 Learning Objectives  Describe the nature of privacy as a fundamental right  Explain the three general ways in which privacy is legally protected in the United States  Define the legal concept of a “reasonable expectation of privacy” and its application to the workplace

3 14-3 Learning Objectives  Identify and apply the standard for unreasonable searches and seizures under the Fourth Amendment  Explain the distinctions between the protections for public- and private sector privacy protections  Describe the legal framework that applies to private-sector privacy cases

4 14-4 Learning Objectives  Identify and differentiate the prima facie cases for common-law claims of privacy invasions (intrusion into seclusion, public disclosure of private facts, publication in a false light, and breach of contract/defamation)  Explain the extent to which an employer can legally dictate the off-work acts of its employees  Discuss how advances in technology have impacted employee privacy

5 14-5 Learning Objectives  State the key business justifications for employee monitoring  Explain the most effective means by which to design and to implement a technology use policy  Describe the legal environment that surrounds employee use of social media technologies

6 14-6 Are There Guarantees in Life?  The right “to be let alone”  Privacy as a fundamental right  Employer’s need for private information  Global marketplace  Protecting employees’ personal information

7 14-7 Realities about Employee Privacy Rights  Employees do not have an absolute right to privacy in their workplace  It is not a breach of an employee’s right to privacy for an employer to ask with whom the employee lives  In the private sector, the Constitution does not protect employees’ right to be free from unreasonable searches and seizures

8 14-8 Realities about Employee Privacy Rights  Without constitutional protection, employees are safe guarded to some extent by common law protections against invasions of privacy  Though an employee may give information to an employer, the employer is still bound to use that information only for the purpose for which it was collected

9 14-9 Background  Privacy may be protected by  Constitution (federal or state)  federal and/or state statutes  common law  Fundamental rights: A right that is guaranteed by the Constitution whether stated or not  Required disclosure of certain types of personal information should be considered an unreasonable search

10 14-10 Workplace Privacy, Generally “Reasonable” Areas in Which to Expect Privacy in the Workplace One’s body and physical space; one has a reasonable expectation to be free from a pat-down or body search Normally private locations, such as a purse or briefcase Personal information, accessed without permission

11 14-11 Workplace Privacy, Generally  No broad rights to privacy  No comprehensive federal workplace privacy legislation exists  Employees may be fired at will (provided it is not for illegal reasons)

12 14-12 Public Sector Employee Privacy  Public sector: That segment of the workforce represented by governmental employers and governmental agency employers  The Fourth Amendment  Protection against unreasonable search and seizure  Violation if the search is  Unreasonable  Unjustified at its inception  Impermissible in scope

13 14-13 Public Sector Employee Privacy  Search warrant  Drug testing  Search of employer-owned property  False imprisonment

14 14-14 Public Sector Employee Privacy  The 5th and 14th amendments  Strict scrutiny  Compelling state interest  Rationally related to a valid state interest  Is the right fundamental?  Implicit in the concept of ordered liberty  Deeply rooted in this Nation’s history and tradition  No general right of the individual to be left alone

15 14-15 The Privacy Act of 1974  Regulates the release of personal information about federal employees by federal agencies  Basic principles  Employee access to their files  Mechanism to correct or amend information  Prevention of inappropriate revelation of information  Maintenance of information

16 14-16 The Privacy Act of 1974  The right to privacy is not absolute  Eleven exceptions to the act  Guiding factors  Employee relief  Criminal penalties  Civil remedies

17 14-17 Privacy Protection Study Commission  Privacy Act not extended to private sector  Commission recommendations  Not yet implemented by Congress – vocal rejection from private employers

18 14-18 Federal Wiretapping―Title III  Federal Wiretapping – Title III  Governs the interception of oral, wire, and electronic communications  Interception by state and local law enforcement  ECPA  Covers all forms of digital communication  Prohibits unauthorized eavesdropping  Prohibits unauthorized access to messages

19 14-19 Private Sector Employee Privacy  State action – actions by state or federal government  Private action – action by private employer  No constitutional protection triggered  Compliance-related costs for private employers  Private-sector employers do not carry out invasive activities

20 14-20 Legal Framework for Employee Rights in the Private Sector  At-will employment doctrine: Employers are free to fire an employee—and employees are free to leave the position—at any time and for any reason  Protection for private-sector employees  State and federal laws prohibiting adverse employment action for discriminatory reasons  Employment at will limited by certain statute or case law

21 14-21 Bases for Right to Privacy in the Private Sector  Statutory Claims – inadequate protection for private employees  Tort: A tort is a private wrong in which one person causes injury to another person  Allows the injured person to sue the wrongdoer and to collect damages  The injury can be physical, mental, or financial

22 14-22 Bases for Right to Privacy in the Private Sector  Tort Law Protections/Common Law  Intrusion into Seclusion  Wrongful invasion – objectionable to a reasonable person  Public disclosure of private facts  Intentional or negligent public disclosure of private matters  Such disclosure would be objectionable to a reasonable person of ordinary sensitivities

23 14-23 Bases for Right to Privacy in the Private Sector  Other tort law protections  Publication in a false light  Public disclosure of facts that place the employee in a false light  Breach of contract  Defamation  Libel vs. slander  Compelled self-disclosure

24 14-24 Regulation of Employee’s Off-Work Activities  Private activities may be regulated if the off-work conduct affects the employee’s performance at the workplace  Smoking, weight, marital status, romantic involvement, political status, and lifestyle discrimination  Enforcement  U.S. companies with operations in Europe must comply with data protection laws

25 14-25 Employer’s Information-Gathering Process/Justified Use/Disclosure of Information  Process of information gathering  Harassment  Improper filing  Dissemination of the information  Function creep

26 14-26 Employer’s Information-Gathering Process/Justified Use/Disclosure of Information  Collection and retrieval of information  Limitation of questions to potential employee  Proper storage of information  References

27 14-27 Electronic Monitoring or Surveillance of Employee Activities  Written policies concerning e-mail and Internet use  Bloggers beware  New technologies  Global positioning systems (GPS)  Radio frequency identification devices (RFID)  Biometrics  Informal intrusions

28 14-28 Forms of Monitoring  Surveillance by glitch  Information uncovered by mistake  Surveillance by default  All information sent through a system is caught and cataloged

29 14-29 Forms of Monitoring  Surveillance by design  Entire purpose is to collect information and the user is aware of this purpose  Surveillance by possession  Employee information contained in a database or some other list

30 14-30 How Does Monitoring Work?  Silentrunner  Global positioning  Websense/Websense reporter  MIMEsweeper

31 14-31 How Does Monitoring Work?  Reasons to monitor  Avoid legal liability  Prevent employee theft  Protection from overt intrusions  Prior consent  Business extension

32 14-32 Percentage of Large U.S. Companies That Monitor Employee E-mail

33 14-33 Business Justifications for Monitoring Employees’ Technology Use  Reasons to limit workplace Internet use  Wasted time  Overclogged networks  Inappropriate material seepage into the workplace  Concern about impression

34 14-34 Business Justifications for Monitoring Employees’ Technology Use  Areas of employer potential liability  Defamation  Copyright infringement  Sexual harassment  Discrimination  Obscenity

35 14-35 The Case of Employee E-mail  Employers’ needs vs. employees’ right to privacy  The employer’s interception must not exceed the scope of the employee’s consent  Employee must be informed  State imposed notice requirements

36 14-36 Developing Computer Use Policies  Policies – written, communicated to employees, and adhered to  Suggested guidelines  Appropriate areas  Employee access to information gathered  Ban on continuous monitoring and secret monitoring  Only job relevant information collected  Only for business interest

37 14-37 Blogging and Other Social Media (“Web 2.0”)  Social media: User-created content, including text, video, audio, and other multimedia  Published in a shared environment, such as a blog, wiki, or other similar site created to enable such sharing  Employers have wide latitude in off-duty blogging

38 14-38 Blogging and Other Social Media (“Web 2.0”)  Company’s social media policy  Defined objectives that do not overreach  A reminder that company policies apply  Personal comment rules  Disclosure, monitoring, and copyright reminders

39 14-39 Waivers of Privacy Rights  Waiver: The intentional relinquishment of a known right  Waiver of privacy rights as a condition of employment  Requiring a waiver is a questionable approach

40 14-40 Waivers of Privacy Rights  Requirements of a waiver  Should be accompanied by an offer of employment  Must be knowingly and intelligently given  Must be clear and unmistakable, given in writing, and voluntary

41 14-41 Privacy Rights Since September 11, 2001  USA PATRIOT Act  Allows government to monitor anyone on the Internet simply by contending that the information is “relevant” to an ongoing criminal investigation  Employer response to governmental request for information  Anti–USA PATRIOT Act resolutions


Download ppt "Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc."

Similar presentations


Ads by Google