Reasonable Expectation of Privacy When Using Employer Email 28 th Annual Carl A. Warns, Jr. Labor & Employment Law Institute, Louis D. Brandeis School.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Protect Our Students Protect Ourselves
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
ETHICS. Business Conduct  The Agent agrees to conform to all applicable federal, state and local laws in conducting business under this agreement.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Workplace Privacy and Technology: Legal and Ethical Issues presented CS 340.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
BELMONT UNIVERSITY AMERICAN INN OF COURT SEPTEMBER 9, 2014 PRESENTED BY KRISANN HODGES DEPUTY CHIEF DISCIPLINARY COUNSEL - LITIGATION BOARD OF PROFESSIONAL.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Legislative Changes to the County Employees Retirement Law of 1937 (AB 340 and AB 197) Presented by: Contra Costa County Employees’ Retirement Association.
Jeanne M. Kincaid, Esq. Drummond Woodsum & MacMahon 40 Pleasant Street Portsmouth, New Hampshire /
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Developing a Records & Information Retention & Disposition Program:
New HR Challenges in the Dynamic Environment of Legal Compliance By Teri J. Elkins.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
DATA PRIVACY PERSONNEL FILES “P-FILE”. Wisconsin Public Records Wisconsin Statue – Wisconsin Statue – Wisconsin Statue 230 Wisconsin.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
CPS Acceptable Use Policy Day 2 – Technology Session.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
HIPAA PRIVACY AND SECURITY AWARENESS.
Use Policies Deputy Attorney General Robert Morgester
Electronic Use Policies.   Social Media  Internet.
PRACTICAL ADVICE IN THE TIME OF SOCIAL MEDIA Department-Issued Equipment Personal Equipment Brought to the Work Place.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Confidentiality and Public Information Act LISD Special Education Department Training SY
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
 Court: U.S. Supreme Court  Date: 1985  Issue: Did New York City's decision to use Title I funds to pay salaries of parochial school teachers violate.
United States v. Jones Presented by: Rebecca Son.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
HOOVER CITY SCHOOLS In-Service Training: Annual Review of.
Essentials Of Business Law Chapter 28 Employment Law McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Data Mining Opinions Rita Assetto E-Discovery Fall 2009.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
Chapter 8 Ethics and Technology
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Emerging Case Law and Recent eDiscovery Decisions.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
The Twelve Most Important Public Employment Law Developments Ever Bob Joyce PANC Asheville October 5, 2015.
“Kids First, New Mexico Wins!” NMPED Data Conference Spring 2016 Dan Hill General Counsel, Public Education Department Randi Johnson General Counsel, State.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Nassau Association of School Technologists
Surveillance around the world
Indiana Access to Public Records Act (APRA) Training
Protection of CONSUMER information
Chapter 10 Cyberlaw, Social Media, and Privacy
Privacy & Confidentiality
Disability Services Agencies Briefing On HIPAA
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Employee Privacy and Privacy of Employee Information
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

Reasonable Expectation of Privacy When Using Employer 28 th Annual Carl A. Warns, Jr. Labor & Employment Law Institute, Louis D. Brandeis School of Law William A. Herbert, Deputy Chair and Counsel New York State Public Employment Relations Board 80 Wolf Road, Suite 500 Albany, New York (518)

 Privacy Expectations and Other Technological Tools WebmailPersonal Laptops Flash drivesHome computers TextingRFID Social networkingGPS WebsitesBiometrics BlogsGenetic ID Blackberries Smartphones  The Reasonableness of the Search  Elephant in the Room: Ediscovery -2-

Olmstead v. United States, 277 U.S. 438, 478 (1928) (Brandeis, J. dissenting] [ The Founders] knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment -3-

Sources of Law 1. Fourth Amendment 2. State Constitutional Provisions 3. Common Law: Intrusion upon Seclusion Tort 4. State and Federal Statutes a. Electronic Communications Privacy Act of 1986 b. National Labor Relations Act c. Open Records Laws d. State laws mandating notice 5. Terms of a Collective Bargaining Agreement 6. Laws of Other Countries -4- l

2007 American Management Association Survey 304 companies surveyed 28% terminated employees for misuse violations of company policies inappropriate or offensive language excessive personal use breach of confidentiality 45% track content, keystrokes, and time spent at keyboard 10% monitor social networking sites -5-

Justice Harlan’s Classic Formulation for an Enforceable Expectation of Privacy Katz v. United States, 389 U.S. 347, 361 (1967) Whether the individual possessed a subjective expectation of privacy; and Whether that subjective expectation is “one that society is prepared to recognize as ‘reasonable’” -6-

O’Connor v. Ortega 480 U.S. 709 (1987) 42 U.S.C. §1983 action challenging repeated searches of state employee’s office, desk and file cabinets Four Justice Plurality: Two-Step Test (O’Connor, Rehnquist, White and Powell) Principle: reasonable expectation of privacy in the workplace is determined on a case by case basis. Whether an expectation of privacy is reasonable, look to “operational realities” office practices, procedures and policies Employer had no established “reasonable regulation or policy discouraging employees from storing personal papers and effects in their desk or file cabinets.” 480 U.S. at

O’Connor v. Ortega 480 U.S. 709 (1987) If employee has reasonable expectation, then court must determine whether the employer’s search was reasonable at inception and whether the scope of the intrusion was reasonable. Justice Scalia’s Concurrence Rejects operational realities test. Public employees have general Fourth Amendment protections in their offices. A government employer’s search to retrieve work-related materials or to investigate violations of work rules does not violate the Fourth Amendment -8-

Ontario v. Quon 130 S.Ct (2010) 1.Whether Quon had a reasonable expectation of privacy in the content of his text messages sent and received from employer’s pager utilizing a wireless service provider? Whether a workplace practice created by a supervisor regarding the texting permitting payment for overages in exchange for no auditing created a reasonable expectation or privacy despite existence of a contrary city policy? 2. Whether the City engaged in an unreasonable search when it obtained and read the transcripts of Quon’s texts while on-duty during a two month period ? Quiz: How many texts while on duty were work-related? -9-

Ontario v. Quon, 130 S.Ct (2010) Unanimous Supreme Court holds that the City’s search was reasonable under Fourth Amendment Majority Decision (Kennedy, Roberts, Thomas, Ginsburg, Breyer, Alito and Sotomayor] assumes that Quon had a reasonable expectation of privacy under operational realities test.  Need for judicial caution to avoid unforeseen consequences in this area of the law.  Technological innovations may modify societal willingness to recognize the reasonableness of an employee’s expectation of privacy. -10-

Ontario v. Quon 130 S.Ct (2010) Majority Decision’s Dicta Regarding Application of the Operational Realities Test  Whether the practice created by Quon’s supervisor can be interpreted as changing city’s computer-use policy regarding privacy of text messages;  Whether supervisor had actual or apparent authority to make such a policy change that guaranteed the privacy of text messages;  Whether reviewing on-duty messages was justified for performance evaluations, litigation regarding the lawfulness of police actions and whether the texts are subject to applicable state open records laws. -11-

Ontario v. Quon, 130 S.Ct (2010) City of Ontario Computer Use Policy:  Signed acknowledgement of receipt and understanding of the policy. No training;  Computer systems and equipment for official use only but incidental and occasional personal permitted;  use subject to monitoring without notice and “[u]sers should have no expectation of privacy or confidentiality.”  Deleted is retrievable and some may be considered an official city record;  Policy silent on texting but Quon received written and oral notice that the policy was applicable to texting on city pagers. -12-

Ontario v. Quon 130 S.Ct (2010) The Reasonableness of the Search  Quon Had a Limited Reasonable Expectation of Privacy  Pager was provided for use during emergencies;  Told that texting may be subject to auditing;  Reasonable police officer should have known that on-duty communications are subject to scrutiny;  Reasonable employee would be aware that employer might need to the audit messages to determine whether the pager was being appropriately used. -13-

Ontario v. Quon 130 S.Ct (2010) The Reasonableness of the Search Search Justified from Inception Because of its Purpose:  To determine whether monthly contractual character limitation was sufficient;  To ensure that employees were not paying for work-related text expenses; and  To ensure that City was not paying for extensive personal communications. Scope of Search was Reasonable:  Efficient and expedient means for determining whether the overages were work-related or for personal use.  It was not excessively intrusive because City reviewed only two months worth of on-duty text messages; -14-

State Constitutional Decisions State v. Campbell, 759 P.2d 1040, 1044 (Or. 1988) (“reasonable expectation of privacy” is a “formula for expressing a conclusion rather than a starting point for analysis, masking the various substantive considerations that are the real bases on which Fourth Amendment searches are defined”] People v. Weaver, 909 N.E.2d 1195 (N.Y. 2009) (diminished expectation of privacy while driving a car in public is sufficient to support a constitutional violation when police utilize, without a warrant, an attached GPS device to track the vehicle for a prolonged period.] State v. Jackson, 76 P.3d 217 (Wash.2003)

Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010)  Private sector employee had a reasonable expectation of privacy in pre-litigation password protected webmail with her private attorney sent and received on employer’s computer.  Computer-use policy reserved to the company the right to review, intercept and access all matters on its system.  Policy stated that all , internet use, communication and computer files are not private or personal and are considered part of the company’s business records but permitted occasional personal use of its computers.  Policy silent with respect to webmail. -16-

Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010) Factors Considered in Determining that Employee Had a Reasonable Expectation of Privacy  Employee utilized password protected webmail and did not save account password on the company computer;  Company policy was silent regarding webmail and she was unaware that images from webmails were retrievable from computer hard-drive;  She was communicating with her personal attorney and did not knowingly disclose the information or fail to take reasonable steps to maintain confidentiality. -17-

Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010) Ethical Issue Court held that employer's counsel violated professional conduct rules by continuing to read the attorney-client webmail without notifying opposing counsel or seeking a court order. What are the ethical obligations of plaintiff’s counsel when ing a client at his or her job? -18-

In Re Asia Global Crossing, Ltd, 322 BR 247 (S.D.N.Y 2005) Four factors for determining whether an employee has a reasonable expectation of privacy with respect to personal e- mail sent and received from an employer’s computer:  did the employer maintain a policy prohibiting personal or other objectionable use;  did the company monitor employee use of its computer and/or ;  do third parties have a right to access to the computer or e- mails; and  did the employer notify the employee, or was the employee aware, of the computer use and monitoring policies. -19-

U.S. v. Heckenkamp, 482 F.3d 1142 (9 th Cir 2007) Student had a reasonable expectation of privacy regarding content of his personal dormitory computer connected to university’s network because university policy failed to provide notice of the university’s general network monitoring program. University’s remote and warrantless search of the student’s computer was reasonable under the Fourth Amendment because university had a special need to secure one of its mail servers that had been hacked and its policy affirmatively stated that university would access networked computers when necessary to protect university’s computer system. -20-

Holmes v. Petrovich Development Co. 119 Cal.Rptr.3d 878 (Cal. App. 3d Dist 2011 )  Pre-litigation with attorney through the employer’s e- mail system was not a confidential attorney-client communication.  Computer-use policy required computers to be utilized only for employer business and prohibited employees from using the computers to send or receive personal .  Plaintiff notified that the employer would be monitoring employee computer use and that she had no expectation of privacy in messages sent via the company’s computers. -21-

Tort of Intrusion Upon Seclusion Restatement (Second) of Torts §652B One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person Muick v. Glenayre Electronics, 280 F.3d 741 (7 th Cir. 2002) No reasonable expectation of privacy regarding material stored on employer’s laptop because employer reserved the right to inspect the laptop. -22-

State Law Notice Requirements Delaware: Employers are obligated to provide daily electronic notice to employees that and internet use is subject to monitoring or the employer must obtain a signed acknowledgement of receipt of employer’s monitoring policy Connecticut: In general, an employer is required to provide notice to employees prior to engaging in computer monitoring. -23-

Conclusion To Live Outside the Law You Must Be Honest Possible Remedies? A. Legislation or regulations; B. Workplace policies and training; C. Collective negotiated agreements; D. Technological design changes; E. Personal communicative devices; F. Cultural and societal changes. -24-T