Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Family Educational Rights and Privacy Act (FERPA) Basics For Faculty and Staff.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
R OBERTA K. B URFORD ( R. B.) S ENIOR D EPUTY G ENERAL C OUNSEL, USF.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
The Public Records Act: It Affects You More Than You Think Tina Dadio, University Public Records Officer/Paralegal David E. Broome, Jr., Vice Chancellor.
© 2015 Snell & Wilmer © 2015 Snell & Wilmer WAGE AND HOUR AND TRADITIONAL LABOR UPDATE April 2, 2015 John F. Lomax, Jr.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Transparency in Public Administration – FOI and EIR
INTERNET and CODE OF CONDUCT
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Class 13 Internet Privacy Law European Privacy.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Pretext Phone Calls Legal in Canada!!. Police-guided pretext phone calls do not violate Charter s. 8 if prior: -One party consent -Judicial Authorization.
Standards and Guidelines for Web Page Publishing December 9, 2009.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Presented by Bishop & McKenzie LLP May 30, Vancouver Sun, “Anti-Spam Legislation Has Businesses Scrambling to Comply”, May 26, 2014.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Electronic Communications State Owned System Mandates Presented by: Eileen Goldgeier.
CPS Acceptable Use Policy Day 2 – Technology Session.
(Edited) WORKPLACE PRIVACY.
Electronic Use Policies.   Social Media  Internet.
Data protection supervision authority’s practice concerning exception provided in par. 2 of article 5 of Directive 2002/58/EC DIJANA ŠINKŪNIENĖ State Data.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Questions about broadband What do we do about broadband services? –Why didn’t the ILECs deploy DSL faster? Could regulation be to blame? –How do we get.
Canada’s Anti Spam Legislation. What is CASL? CASL was intended to combat negative online behaviour  spam  phishing  malware  spyware  It will create.
Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Electronic Communications Privacy Act Distinction between wire and electronic communication Title III defines “electronic communication” –Any transfer.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Dr. Ihab Nada DOE, MSKMC.  The information a patient reveals to a health care provider is private and has limits on how and when it can be disclosed.
Presented by Beang Tong ENGL393, Spring’03
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
Confidentiality A Training Without the Video. Laws FERPA (1976) or the Buckley Amendment (1994) IDEA (1991) KY Safe Schools (1998)
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Elected Officials and Health Department Records Indiana Public Health Foundation February 27, 2008.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Personal data protection in research projects
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
WISHA, 7/23/04 Employee Medical and Exposure Records Chapter WAC Employer Responsibilities.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Courts System Search Warrants.
Prepared by Kris Twomey Law Office of Kristopher E. Twomey, P.C.
Confidentiality October 14, 2005.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
General Data Protection Regulations 2018
Laws Governing Police Surveillance
HIPAA Overview.
Government Data Practices & Open Meeting Law Overview
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring does not acquire the content of the calls Monitoring content of calls legal if –Monitoring is for a reasonable business purpose –Personal calls are not monitored beyond time needed to determine they are personal –Uses regular phone equipment –Scope and manner of monitoring is not unreasonable

More on telephone monitoring Illegal to intercept or disclose intercepted phone communication unless certain exceptions apply: –The consent exception –The business extension exception

The consent exception Interception is allowed when one of the parties to a communication has given prior consent –Express consent versus implied consent –Consent for monitoring of business calls should not be considered consent for monitoring of personal calls

Business extension exemption Does not require consent Very specific conditions apply –Either the phone company or the subscriber furnished the intercepting telephone instrument, equipment, or component –The equipment was used in the ordinary course of business

Case law Pascale v. Carolina Freight Carriers Corp: voice activated tape recorders attached to telephone to monitor employees’ calls—thrown out because recorders not excepted telephone equipment T.B. Proprietary Corp v. Sposato Builders—extension phone eavesdropping OK United States v. Harpel—may not monitor personal phone calls any longer than necessary to determine they were personal in nature Sanders v. Robert Bosch Corp—recording all telephone calls in their entirety is a drastic measure if no business reason to do so

Recommended steps for employer Identify reason for monitoring Do not intercept personal calls Provide a separate unmonitored phone for personal calls Inform employees in writing about the policy an reason for it Only allow authorized personnel to monitor the calls Get written consent from employees If recording interstate calls, both parties to the call must have notice of the recording

Other employee surveillance Oral conversations –Avoid use of electronic or mechanical devices –Only eavesdrop in situations where conversations could not reasonably be expected to be overheard –Obtain consent Video surveillance –If limited to video images without sound, would not be subject to wiretap laws (don’t try lip reading cause it would be an “interception”

“Electronic communication” does not include the content of such communication while in storage (so interception not involved) Accessing stored electronic communication allowed if authorized by the person owning the service –Gives employers right to access stored messages on their system May intercept if necessary to provide the service or to protect the rights or property of the provider (i.e., employer)

More on It is safer for employers to access stored s than to intercept them while in transit Always a good idea to publish policy regarding treatment of messages, whether accessing stored or in-transit messages

More communication monitoring Voice mail messages—treated like regular voice telephone calls Computer files—not a form of communication so don’t fall under wiretap laws because no transmission of information Computer tracking systems—no subject to wiretap laws