The medium is too large. Employee Relations in the age of social media. Hogan, Sarzynski, Lynch, DeWind & Gregory LLP.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

This is a Mr. Levoy PowerPoint The United States Court System.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
ERIC PALTELL, ESQ. KOLLMAN & SAUCIER, P.A CUMBERLAND VALLEY SHRM LEGAL & LEGISLATIVE CONFERENCE Recent Developments in Maryland Employment Law.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
Social Media and Other Investigative Tools Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas.
Teaching American History: Moot Courts and Constitutional Concepts.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
1 Social Media: Strategy and Implementation Are you protected? Amy D. Cubbage & Cynthia L. Effinger.
ISP Liability for Defamation and Copyright Violation Richard Warner.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
Your Rights Under the Internet Law By: Sannita S. Lam.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
What are the rights and responsibilities of a citizen?
Chapter 5 Freedom of Expression
Grade 5 Student Assistants
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
What Every Principal & Staff Should Know About The Ethics of Technology ( Internet ) * Establish Guidelines * Acceptable Use Policy *Internet Safety *Privacy.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Legal Ethics and Social Networks Prof. David W. Opderbeck Seton Hall University Law School © 2011 David W. Opderbeck Licensed Under Creative Commons Attribution.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
The Bill of Rights Amendments Two through Ten. The Second Amendment The Second Amendment gives people the right to bear arms (weapons) and the right to.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Bill of Rights  The Bill of Rights was not included in the 1787 Constitution.  The first ten amendments (Bill of Rights) were ratified on December 15,
University of Maryland College Park, Maryland October 7, 2011 By: Rochelle S. Eisenberg, Esq. Hodes, Pessin & Katz, P.A
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Business Law Jeopardy True or False?MultipleChoiceTortsVocabularyBonus.
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
Moffatt Thomas Z Group PR SOCIAL MEDIA... “THE BALANCING ACT” Julia Zunich and Paul D. McFarlane April 12, 2011.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
© 2011 Dickie, McCamey & Chilcote, P.C. All rights reserved. Confidential Attorney/Client Work Product. Electronic Communication and Social Networking.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
The Federal System Powers of the National Government
Stalking Awareness And Prevention Francis A. Arenas, Esq.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
The Bill of Rights The First 10 Amendments to the Constitution Take notes on the slides as they appear. Draw pictures to represent at least five of the.
Freedom of Speech Computers in the World.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
F.E.R.P.A.. What is F.E.R.P.A. ? The Family Educational Rights and Privacy Act of 1974,
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Sexting Presentation Written by: Brandon Falls Jefferson County District Attorney Brian Huff Jefferson County Circuit Court Judge Family Court.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Miller County Board of Education Updated 2/7/2016 Microsoft Office Clip Art.
Hiring and Social Networks Zach Dingmann Jess Hogan Laura Kerkaert.
Democracy and Constitutions The Texas System of Justice p
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Virginia RULES Teens Learn & Live the Law Virginia’s Judicial System.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
The Acceptable Use of Technology
College of Nursing December 13, 2006 John O. Cates
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Cabarrus County schools SECURITY, Social Media POLICY AND BYOT
Freedom of Expression.
Information Security Footprint.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Media Law.
Freedom Independence Transition
Sadi R. Antonmattei-Goitia Sullo & Sullo, LLP February 16, 2019
Presentation transcript:

The medium is too large. Employee Relations in the age of social media. Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

The first amendment and social media  It all started with the 18 th century analog of social media—the independent newspaper.  The colonial Governor’s attempted to shut down a newspaper by throwing its only skilled printer in jail. It didn’t work.

The Court’s View of Social Media and protected speech  “[I]t is probably safe to assume that Samuel Adams, Benjamin Franklin, Alexander Hamilton and Thomas Jefferson would have loved to tweet their opinions as much as they loved to write for the newspapers of their day (sometimes under anonymous pseudonyms similar to today's twitter user names). Those men, and countless soldiers in service to this nation, have risked their lives for our right to tweet or to post an article on Facebook; but that is not the same as arguing that those public tweets are protected. The Constitution gives you the right to post, but as numerous people have learned, there are still consequences for your public posts. What you give to the public belongs to the public. What you keep to yourself belongs only to you.” People v Harris, 36 Misc. 3d 868, 878 (N.Y. City Crim. Ct. 2012) People v Harris, 36 Misc. 3d 868, 878 (N.Y. City Crim. Ct. 2012)

The Court’s View of Social Media  Social media web sites, such as Facebook and Twitter, exist to allow individuals to interact with "real world" friends, relatives and those individuals sharing common interests that may be as close as your own town, or as far away as a distant continent…Whether these broadcasts take the form of "tweets," or postings to a user's "wall," the intent of the users is to disseminate this information.  Judge Matthew Sciarrino pointed out in his decision concerning an "Occupy Wall Street" protestor charged in the Criminal Court of New York County that, [i]f you post a tweet, just like you scream it out the window, there is no reasonable expectation of privacy. Fawcett v. Altieri, 38 Misc. 3d 1022, 1025 (N.Y. Sup. Ct. 2013) Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

Employees Say the Darndest Things The free speech rights of school employees are not violated when a school district imposes discipline on such employees for directing ethnic slurs or disparaging comments towards students in class … Matter of Watt (East Greenbush Cent. Sch. Dist.85 A.D. 3d 1357, 1359 (N.Y. App. Div. 3 rd Dept., 2011) Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

Employees Use Social Media After today, I am thinking the beach sounds like a wonderful idea for my 5th graders! I HATE THEIR GUTS!They are the devils (sic) spawn  On June 22, 2010, a New York City public school student fatally drowned during a field trip to the beach. (Id.). On June 23, 2010, after the school day was over and petitioner was at home, she posted the following on her Facebook page: " After today, I am thinking the beach sounds like a wonderful idea for my 5th graders! I HATE THEIR GUTS! They are the devils (sic) spawn !" One of her Facebook friends then posted, "oh you would let little Kwame float away!" to which petitioner responded, "Yes, I wld (sic) not throw a life jacket in for a million!!" (Id.). Matter of Rubino v. City of New York, 34 Misc. 3d 1220(A), 1220(A) (N.Y. Sup. Ct. 2012) Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

Emerging trends in social media investigation  Insurance defense lawyers have blazed a trail seeking disclosure of social media content to oppose claims of disability and severe injury.  For example, in Jennings v. TD Bank 2013 N.Y. Misc. LEXIS 5085; 2013 NY Slip Op 32783(U), the Court granted full disclosure of the Plaintiff’s Facebook account after an internet search revealed photographs of the “disabled” Plaintiff on a cruise ship.

Monitoring Social Media May Get Harder  A8890/S1701( in committee): 2. (a) An employer, employer's agent or representative, or its designee shall not require any employee or applicant to disclose any log-in name, password or other means for accessing a personal account or service through an electronic communications device. Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

No Exceptions  The pending bill has no carve outs for employers in investigation of employee misconduct.  Violations are punishable by fine of $300 for the first one and $500 for each violation thereafter.  But it isn’t law-yet. Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

The anonymity arms race  Digital tools to prevent discovery of the user’s identity and usage.  In private (ie) or incognito (chrome) browsing, Private Window (Firefox), private Browsing (Safari). When enabled, these tools prevent recording of the session in the browsing history and erase all information on sign off.

The anonymity arms race  Proxy and VPN’s  TOR (the onion router) “Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network… It can even threaten your job and physical safety by revealing who and where you are.”

The anonymity arms race  Hidemyass.com: “Connect to our VPN service to anonymously encrypt your internet activity from prying eyes. All applications on your computer that utilize your internet connection will become anonymous with just a click of a button; no technical experience is required due to our easy to use VPN software. Enjoy internet freedom and anonymity knowing that your sensitive web traffic is securely hidden behind 76'500+ IP addresses located in 158 locations in 75 countries.”

What About Sexting  UNITED STATES OF AMERICA, Appellee, v. JOHN PUGLISI, Defendant-Appellant  Defendant John Puglisi, 31, of Endicott, New York and a former Newark Valley High School teacher, was sentenced in Binghamton federal court to 15 years in federal prison and a life term of supervised release to follow the imprisonment term. Puglisi had been convicted and found guilty after a five-day jury trial held in federal court. He was convicted of production and attempted production of child pornography; persuading, inducing, and enticing a minor to engage in sexual conduct; and possession of child pornography. FBI.com Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

What About Sexting  To convict Puglisi of attempted production and production of child pornography under 18 U.S.C. § 2251(a), the government was required to prove that "(1) the victim was less than 18 years old; (2) the defendant used, employed, persuaded, induced, enticed, or coerced the minor to take part in sexually explicit conduct for the purpose of producing a visual depiction of that conduct; and (3) the visual depiction was produced using materials that had been transported in interstate or foreign commerce. 18 U.S.C. § 2251(a) Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

What About sexting? carries a statutory minimum sentence of 15 years' (180 months') imprisonment  In this case, Puglisi's conviction for violating 18 U.S.C. § 2251 carries a statutory minimum sentence of 15 years' (180 months') imprisonment. See 18 U.S.C. § 2251(e)18 U.S.C. § U.S.C. § 2251(e)  He lost the appeal, he lost his family, he lost job, he lost his teaching certificate and he lost his freedom. Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

A policy might help.  NYC DOE has a good one 7CED-604B-4FDD-B752- DC2D /0/SMG_FINAL_ p df 7CED-604B-4FDD-B752- DC2D /0/SMG_FINAL_ p df

A policy might help  Some of the good parts of NYC DOE policy:  Defines social media;  draws a distinction between professional and private use;  Prohibits social media contact with students;  Warns employees “Personal social media use, including off-hours use, has the potential to result in disruption at school and/or the workplace, and can be in violation of DOE policies, Chancellor’s Regulations, and law.”

What About FOIL?  [W]hen a public officer or employee uses a personal computer or laptop in the course of his or her official duties, logs involving the use of that computer, in our opinion, would be relevant to the performance of that person's duties. On that basis, we do not believe that disclosure would result in an unwarranted invasion of personal privacy with respect to an officer or employee serving as a government officer or employee. COOG Opinion Number Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

What About My Private ? even if the official uses his/her private address and his/her own computer.  From my perspective, kept, transmitted or received by a school board member or school district employee in relation to the performance of his or her duties is subject to the Freedom of Information Law, even if the official uses his/her private address and his/her own computer. COOG Opinion Number Hogan, Sarzynski, Lynch, DeWind & Gregory LLP

What about SARA ED-1  The State Archives and Records Administration devoted a portion of its website to social media. /mr_social_media.shtml /mr_social_media.shtml

What about SARA ED-1  “By law, you must ensure that records are accessible and are retained for the duration of their retention periods. This means you will usually need to manage most records—except for records with very short retention periods—in your own technical environment.  Consider how frequently you will need to capture information. This will depend on how frequently the content changes, the quantity of the content, the stability of the networking site, and the functionality of the tools available for extracting the information from the site.”

Social media and defamation law.  The Communications Decency Act of 1996 (47 USC 230 et seq) provides immunity to interactive computer services from civil liability for defamatory content. See, Finkel v. Facebook, Inc., 2009 NY Slip Op 32248(U)47 USC 230 et seq

Social media and defamation law.  To be actionable, a statement of fact is required, and "rhetorical hyperbole" or "vigorous epithet" will not suffice.  Only facts "are capable of being proven false." Finkel v. Dauber, 29 Misc. 3d 325, (N.Y. Sup. Ct. 2010) Finkel v. Dauber, 29 Misc. 3d 325, (N.Y. Sup. Ct. 2010)

Social media and defamation law.  Context is key, as assertions that a person is guilty of "blackmail," "fraud," "bribery" and "corruption" in certain contexts could be understood as hyperbole or epithet. "The infinite variety of meanings conveyed by words--depending on the words themselves and their purpose, the circumstances surrounding their use, and the manner, tone and style with which they are used-- rules out... a formulistic approach.” Finkel v. Dauber, 29 Misc. 3d 325, (N.Y. Sup. Ct. 2010)

Social media and defamation law.  Determining whether a given statement expresses fact or opinion is a question of law for the court and one which must be answered "on the basis of what the average person hearing or reading the communication would take it to mean" (Steinhilber v Alphonse, 68 NY2d at 290). Finkel v. Dauber, 29 Misc. 3d 325, (N.Y. Sup. Ct. 2010)

The End!  John Lynch Hogan, Sarzynski, Lynch, DeWind & Gregory, LLP P.O. Box 660 Binghamton, NY tel: Hogan, Sarzynski, Lynch, DeWind & Gregory LLP