1 EMPLOYMENT LAW BACK TO BASICS WEBINAR SERIES Program 2 – Enforcing Social Media and Computer Usage Policies Friday, April 26, 2013 12:00 (Noon) – 1:00.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Alabama ABC Board Press the Enter key to begin! Alabama ABC Board.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
ETHICS. Business Conduct  The Agent agrees to conform to all applicable federal, state and local laws in conducting business under this agreement.
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
1 WHAT CAN I DO ABOUT OPPOSING COUNSEL TALKING TO OUR EMPLOYEES? James H. Gilliam BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
INTERVIEW DO’S AND DON’T’S ANN HOLDEN KENDELL BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:
USC Health and Safety Training Workplace Violence.
1 LATEST DEVELOPMENTS FROM THE NLRB Brenton D. Soderstrum BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:
NEW FEE DISCLOSURE RULES FOR RETIREMENT PLANS – WHAT MUST YOU PROVIDE TO PARTICIPANTS? Alice E. Helle BrownWinick 666 Grand Avenue, Suite 2000 Des Moines,
NEW SEC RULES ALLOW FOR GENERAL SOLICITATION – WHAT YOU NEED TO KNOW BEFORE YOU RAISE CAPITAL Joe Leo BrownWinick 666 Grand Avenue, Suite 2000 Des Moines,
Personal Liability Pitfalls: Tips for Officers and Directors Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
BRET STRONG, MANAGING SHAREHOLDER THE STRONG FIRM, P.C. NOVEMBER, 2013 Social Media: A Double-Edged Sword (the ever evolving world….LOL)
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
Hospitals & Social Media. Laws Implicated Federal Trade Commission –Disclosure of employment status –False or misleading statements State & Federal Wiretap.
SOCIAL NETWORKING – WORKPLACE CHALLENGES EMPLOYMENT LAW UPDATE for the TENNESSEE HUMAN RIGHTS COMMISSION & TN DEPARTMENT OF HUMAN RESOURCES By: TIM K.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Social Media & The Workplace: recent NLRB developments Megan Erickson Moritz BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
INTERNET and CODE OF CONDUCT
Network security policy: best practices
ARE YOUR AT-WILL AND SOCIAL MEDIA POLICIES COMPLIANT?: LATEST DEVELOPMENTS FROM THE NLRB James H. Gilliam BrownWinick 666 Grand Avenue, Suite 2000 Des.
Uncle Sam Needs More Cash – And This Means From You! Recent Tax Law Changes Affecting You and Your Business Chris Nuss 666 Grand Ave, Suite 2000 Des Moines,
E-Verify and Immigration-Related Employment Discrimination Beth Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Severance Agreements: Practical Considerations to Minimize Business Disruption Elizabeth A. Coonan Ann Holden Kendell BrownWinick 666 Grand Avenue, Suite.
1 The Bermuda Triangle Elizabeth A. Coonan Ann Holden Kendell
CURRENT ISSUES IN HEALTHCARE REFORM Alice Helle BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Veterinary Practice Law Quiz J EFFREY L. R OTH FEES & BURGESS, P.C. 213 Green Street Huntsville, Alabama Telephone  Facsimile
James H. Gilliam BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:
USD Sexual Harassment You may not know what it is………. You may not know what it is………. But you know how it makes you feel!!! But you know how it makes you.
An Educational Computer Based Training Program CBTCBT.
Electronic Use Policies.   Social Media  Internet.
Iowa Civil Rights Commission Disclaimer The information contained in this presentation is a brief overview and should not be construed as legal advice.
Sexual Harassment for Managers. Definition: According to the EEOC, sexual harassment is defined as: Any unwelcome sexual advances, Requests for sexual.
Affordable Care Act – Current Issues in Healthcare Reform Alice Helle - Cynthia Boyle Lande –
Tips for Managing Intellectual Property Camille L. Urban BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Module 1.  Objectives - Provide information about worker rights under OSHA law - Learn how to file a complaint, and rights against discrimination and.
Private Funding for Agribusiness and Energy Technologies Christopher R. Sackett BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
SMALL BUSINESS ISSUES Beth Coonan, Ann Kendell, Megan Moritz BrownWinick
Don’t Call My Bluff The Ethics of Negotiation James H. Gilliam BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Record Retention and Destruction Considerations Beth Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Use: Policies to Enhance Employee Productivity Elizabeth A. Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Brenton D. Soderstrum BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:
SECNAVINST D DON POLICY ON SEXUAL HARASSMENT
Tom Jones Employers Resource Group Facilitated by: Associated Industries of Massachusetts Employee Handbooks 2015/2016 South Coast Resource Council November.
What is Sexual Harassment? Deliberate and/or repeated sexual or sexual based behavior that is not welcome, not asked for, and not returned.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Affordable Care Act – Wellness Programs Cynthia Boyle Lande BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
ROUNDTABLE DISCUSSION: The Latest Pronouncements from the EEOC and Your Recruiting and Hiring Processes EMPLOYMENT LAW PRACTICE GROUP.
Frequently Asked Questions I Get Regarding OSHA Brenton D. Soderstrum BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
1. On a blank sheet of paper… Write down one reason why you may be disciplined (written up) at work.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
By: John G. Kruchko, Esq. September 12, 2011 Kruchko & Fries © 2011 Privileged and Confidential 1.
Protection of CONSUMER information
25 TIPS FOR BUSINESS LEADERS FROM A LAWYER
Code of Conduct/ Fraud, Waste & Abuse
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
The Health Insurance Portability and Accountability Act
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Presentation transcript:

1 EMPLOYMENT LAW BACK TO BASICS WEBINAR SERIES Program 2 – Enforcing Social Media and Computer Usage Policies Friday, April 26, :00 (Noon) – 1:00 p.m. (Central) Other Program Dates / Topics to be Selected by Webinar Participants Friday, June 28, 2013 / 12:00 (Noon) – 1:00 p.m. (Central) Friday, August 30, 2013 / 12:00 (Noon) – 1:00 p.m. (Central) Friday, October 25, 2013 / 12:00 (Noon) – 1:00 p.m. (Central) Friday, December 20, 2013 / 12:00 (Noon) – 1:00 p.m. (Central)

2 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone: Facsimile:

3 With advent of social media many employers looking for ways to capitalize on advantages inherent in these new ways of communicating with customers, vendors and employees

4 Social Media Pitfalls Proprietary/confidential information Identity protection Cyber-bullying/harassment Deceptive trade practices

5 “Best Practice Policies” v. National Labor Relations Board (NLRB)

6 NLRB Federal agency responsible for safeguarding rights of employees to organize and to prevent and remedy unfair labor practices

7 Protected Concerted Activity The right to engage in concerted activities for the purpose of collective bargaining or other mutual aid or protection

8 Overbroad employer policies Unlawful discharge or discipline Two Contexts of NLRB Review

9 NLRB Analysis of Employer Policies 1.Explicitly restrict protected activities; or

10 NLRB Analysis of Employer Policies 2.a. Would employee reasonably construe policy to prohibit protected activity, or

11 NLRB Analysis of Employer Policies 2.b. Was rule enacted in response to union activity, or

12 NLRB Analysis of Employer Policies 2.c. Has rule been applied to restrict protected activity

13 Rules that are ambiguous as to their application to Section 7 activity, and contain no limiting language or context that would clarify to employees that the rule does not restrict Section 7 rights, are unlawful.

14 In contrast, rules that clarify and restrict their scope by including examples of clearly illegal or unprotected conduct, such that they would not reasonably be construed to cover protected activity, are not unlawful.

15 OK? Not OK? Use technology appropriately If you enjoy blogging or using online social networking sites such as Facebook and YouTube, (otherwise known as Consumer Generated Media, or CGM) please note that there are guidelines to follow if you plan to mention [Employer] or your employment with [Employer] in these online vehicles... Don’t release confidential guest, team member or company information...

16 OK? Not OK? Communicating confidential information You also need to protect confidential information when you communicate it. Here are some examples of rules that you need to follow: Make sure someone needs to know. You should never share confidential information with another team member unless they have a need to know the information to do their job. If you need to share confidential information with someone outside the company, confirm there is proper authorization to do so. If you are unsure, talk to your supervisor.

17 OK? Not OK? (cont.) Develop a healthy suspicion. Don’t let anyone trick you into disclosing confidential information. Be suspicious if asked to ignore identification procedures. Watch what you say. Don’t have conversations regarding confidential information in the Breakroom or in any other open area. Never discuss confidential information at home or in public areas.

18 OK? Not OK? (cont.) Unauthorized access to confidential information: If you believe there may have been unauthorized access to confidential information or that confidential information may have been misused, it is your responsibility to report that information.... We’re serious about the appropriate use, storage and communication of confidential information. A violation of [Employer] policies regarding confidential information will result in corrective action, up to and including termination. You also may be subject to legal action, including criminal prosecution. The company also reserves the right to take any other action it believes is appropriate.

19 OK? Not OK? Treat Everyone with Respect Offensive, demeaning, abusive or inappropriate remarks are as out of place online as they are offline, even if they are unintentional. We expect you to abide by the same standards of behavior both in the workplace and in your social media communications. Other [Employer] Policies that Apply Think carefully about ‘friending’ co-workers... on external social media sites. Communications with co- workers on such sites that would be inappropriate in the workplace are also inappropriate online, and what you say in your personal social media channels could become a concern in the workplace.

20 OK? Not OK? (cont.) [Employer], like other employers, is making internal social media tools available to share workplace information within [Employer]. All employees and representatives who use these social media tools must also adhere to the following: Report any unusual or inappropriate internal social media activity to the system administrator. [Employer’s] Social Media Policy will be administered in compliance with applicable laws and regulations (including Section 7 of the National Labor Relations Act).

21 OK? Not OK? You are encouraged to resolve concerns about work by speaking with co-workers, supervisors, or managers. [Employer] believes that individuals are more likely to resolve concerns about work by speaking directly with co-workers, supervisors or other management-level personnel than by posting complaints on the Internet. [Employer] encourages employees and other contingent resources to consider using available internal resources, rather than social media or other online forums, to resolve these types of concerns.

22 OK? Not OK? Employees should avoid harming the image and integrity of the company and any harassment, bullying, discrimination, or retaliation that would not be permissible in the workplace is not permissible between co-workers online, even if it is done after hours, from home and on home computers.

23 OK? Not OK? No unauthorized postings: Users may not post anything on the Internet in the name of [Employer] or in a manner that could reasonably be attributed to [Employer] without prior written authorization from the President or the President’s designated agent.

24 So what can my policy include?

25 NLRB Analysis of Discipline  Was employee acting with or on the authority of other employees?

26 NLRB Analysis of Discipline  Was employee making statements that clearly implicated working conditions?

27 NLRB Analysis of Discipline  Was employee protesting supervisory action?

28 Employer Defenses  Employee would have been discharged even if not engaged in protected activity

29 Employer Defenses  Employee activity so “opprobrious” as to render employee “unfit for further service”

30 Employer Defenses  Employee was so disloyal as to lose protections under law

31 Before you discipline, consider:  Is employee activity related to terms and conditions of employment?

32 Before you discipline, consider:  Were co-workers involved or did they comment on the post?

33 Before you discipline, consider:  Was the activity related to prior discussions with co-workers?

34 Before you discipline, consider:  Has the issue (or will it) been discussed with management?

35 Computer Fraud & Abuse Act (CFAA) 18 USC § 1030

36 Prohibits accessing a “protected computer” in interstate or foreign commerce “without authorization” and obtaining information, or damaging data/equipment

37 Violation is a criminal act, punishable by fines / imprisonment

38 Courts have reluctantly enforced, focusing on “without authorization” requirement in CFAA

39 Recommendations...  Clearly delineate restriction: Avoid broad bans on “unauthorized use” or “competitive purposes”

40 Recommendations...  Report and reinforce prohibition –Training –Security reminders –Logon prompts

41 Recommendations...  Caution against undercutting policy through statements or condoning violations

42 Recommendations...  Include personal devices used / approved for business use

43 Recommendations...  Articulate that authorization ends upon termination or accepting competitive employment

44 Restrictive Covenants and LinkedIn

45 Restrictive Covenants  Non-competition  Non-solicitation

46 “Direct or indirect”

47 Public nature of LinkedIn-type social media may undercut argument that employee’s business contacts are a proprietary resource

48 Consider...  Limiting use of LinkedIn with clients / vendors  Requiring employees to “disconnect” upon termination

49 QUESTIONS?

50 Website: Toll Free Phone Number: OFFICE LOCATIONS: 666 Grand Avenue, Suite 2000 Des Moines, Iowa Telephone: (515) Facsimile: (515) Franklin Place Pella, Iowa Telephone: (641) Facsimile: (641) DISCLAIMER: No oral or written statement made by BrownWinick attorneys should be interpreted by the recipient as suggesting a need to obtain legal counsel from BrownWinick or any other firm, nor as suggesting a need to take legal action. Do not attempt to solve individual problems upon the basis of general information provided by any BrownWinick attorney, as slight changes in fact situations may cause a material change in legal result.