Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Basic Nursing: Foundations of Skills & Concepts Chapter 6 LEGAL RESPONSIBILITIES.
Employment Law for BUSINESS sixth edition
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Chapter 4 Legal Construction of the Employment Environment
CHAPTER FOURTEEN Testing McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved The Constitution will always protect an.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Chapter 3 Tort Law.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Law for Business and Personal Use
3 Ethics and Privacy.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 17 Administrativ e Law.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
Chapter 7.1 – An introduction to civil law
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
EMPLOYER/EMPLOYEE PRIVACY RIGHTS
Security Services Constitutional Issues in Private Security.
Legal & Ethical Issues in News. Anyone can sue...  Tort -- a wrong other than breach of contract for which an injured party is able to bring a lawsuit.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Business Law for the Entrepreneur and Manager
(Edited) WORKPLACE PRIVACY.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
EMPLOYEE PRIVACY RIGHTS
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
Electronic Use Policies.   Social Media  Internet.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
CHAPTER NINE Affinity Orientation Discrimination.
CHAPTER 1 Legal Foundations Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Unit 3 Regulation. 2 Regulation of Nursing Practice l Protection of Public l Licensure l Certification.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Copyright © 2012, 2009, 2007 Pearson Education, Inc. All Rights Reserved. Public Relations Strategies and Tactics Tenth Edition Dennis L. Wilcox Glen T.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
© 2004 West Legal Studies in Business, a Division of Thomson Learning 10.1 Chapter 10 Torts: Negligence, Strict Liability, and Intentional Torts.
Lecture 11: Law and Ethics
Essentials Of Business Law Chapter 28 Employment Law McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Chapter 8 Ethics and Technology
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch The Legal Environment of Business A Critical Thinking.
Copyright © 2008 Pearson Education Canada4-1 Chapter 4: Intentional Torts.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Torts and Product Liability.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
The Twelve Most Important Public Employment Law Developments Ever Bob Joyce PANC Asheville October 5, 2015.
Chapter Two Ethical and Legal Issues Chapter 2-1 Fourth Edition Linda D. Urden Kathleen M. Stacy Mary E. Lough Priorities in C RITICAL C ARE N URSING Copyright.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Ethical Decision-Making: Technology and Privacy in the Workplace McGraw-Hill/Irwin Business Ethics: Decision-Making for Personal Integrity & Social.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Chapter 7 Employment Law Halsey/McLaughlin, Legal Environment You will be able to answer the following questions after reading this chapter: What is an.
Privacy and the Law.
Surveillance around the world
Chapter 9: Internet Law, Social Media, and Privacy
Copyright 2015 McGraw-Hill Education. All rights reserved
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Privacy and Security in the Employment Relationship
Legal & Ethical Issues in News
Essentials of the legal environment today, 5e
Employment Law for BUSINESS sixth edition
Presentation transcript:

Chapter 14 The Employee’s Right to Privacy and Management of Personal Information McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

14-2 Learning Objectives  Describe the nature of privacy as a fundamental right  Explain the three general ways in which privacy is legally protected in the United States  Define the legal concept of a “reasonable expectation of privacy” and its application to the workplace

14-3 Learning Objectives  Identify and apply the standard for unreasonable searches and seizures under the Fourth Amendment  Explain the distinctions between the protections for public- and private sector privacy protections  Describe the legal framework that applies to private-sector privacy cases

14-4 Learning Objectives  Identify and differentiate the prima facie cases for common-law claims of privacy invasions (intrusion into seclusion, public disclosure of private facts, publication in a false light, and breach of contract/defamation)  Explain the extent to which an employer can legally dictate the off-work acts of its employees  Discuss how advances in technology have impacted employee privacy

14-5 Learning Objectives  State the key business justifications for employee monitoring  Explain the most effective means by which to design and to implement a technology use policy  Describe the legal environment that surrounds employee use of social media technologies

14-6 Are There Guarantees in Life?  The right “to be let alone”  Privacy as a fundamental right  Employer’s need for private information  Global marketplace  Protecting employees’ personal information

14-7 Realities about Employee Privacy Rights  Employees do not have an absolute right to privacy in their workplace  It is not a breach of an employee’s right to privacy for an employer to ask with whom the employee lives  In the private sector, the Constitution does not protect employees’ right to be free from unreasonable searches and seizures

14-8 Realities about Employee Privacy Rights  Without constitutional protection, employees are safe guarded to some extent by common law protections against invasions of privacy  Though an employee may give information to an employer, the employer is still bound to use that information only for the purpose for which it was collected

14-9 Background  Privacy may be protected by  Constitution (federal or state)  federal and/or state statutes  common law  Fundamental rights: A right that is guaranteed by the Constitution whether stated or not  Required disclosure of certain types of personal information should be considered an unreasonable search

14-10 Workplace Privacy, Generally “Reasonable” Areas in Which to Expect Privacy in the Workplace One’s body and physical space; one has a reasonable expectation to be free from a pat-down or body search Normally private locations, such as a purse or briefcase Personal information, accessed without permission

14-11 Workplace Privacy, Generally  No broad rights to privacy  No comprehensive federal workplace privacy legislation exists  Employees may be fired at will (provided it is not for illegal reasons)

14-12 Public Sector Employee Privacy  Public sector: That segment of the workforce represented by governmental employers and governmental agency employers  The Fourth Amendment  Protection against unreasonable search and seizure  Violation if the search is  Unreasonable  Unjustified at its inception  Impermissible in scope

14-13 Public Sector Employee Privacy  Search warrant  Drug testing  Search of employer-owned property  False imprisonment

14-14 Public Sector Employee Privacy  The 5th and 14th amendments  Strict scrutiny  Compelling state interest  Rationally related to a valid state interest  Is the right fundamental?  Implicit in the concept of ordered liberty  Deeply rooted in this Nation’s history and tradition  No general right of the individual to be left alone

14-15 The Privacy Act of 1974  Regulates the release of personal information about federal employees by federal agencies  Basic principles  Employee access to their files  Mechanism to correct or amend information  Prevention of inappropriate revelation of information  Maintenance of information

14-16 The Privacy Act of 1974  The right to privacy is not absolute  Eleven exceptions to the act  Guiding factors  Employee relief  Criminal penalties  Civil remedies

14-17 Privacy Protection Study Commission  Privacy Act not extended to private sector  Commission recommendations  Not yet implemented by Congress – vocal rejection from private employers

14-18 Federal Wiretapping―Title III  Federal Wiretapping – Title III  Governs the interception of oral, wire, and electronic communications  Interception by state and local law enforcement  ECPA  Covers all forms of digital communication  Prohibits unauthorized eavesdropping  Prohibits unauthorized access to messages

14-19 Private Sector Employee Privacy  State action – actions by state or federal government  Private action – action by private employer  No constitutional protection triggered  Compliance-related costs for private employers  Private-sector employers do not carry out invasive activities

14-20 Legal Framework for Employee Rights in the Private Sector  At-will employment doctrine: Employers are free to fire an employee—and employees are free to leave the position—at any time and for any reason  Protection for private-sector employees  State and federal laws prohibiting adverse employment action for discriminatory reasons  Employment at will limited by certain statute or case law

14-21 Bases for Right to Privacy in the Private Sector  Statutory Claims – inadequate protection for private employees  Tort: A tort is a private wrong in which one person causes injury to another person  Allows the injured person to sue the wrongdoer and to collect damages  The injury can be physical, mental, or financial

14-22 Bases for Right to Privacy in the Private Sector  Tort Law Protections/Common Law  Intrusion into Seclusion  Wrongful invasion – objectionable to a reasonable person  Public disclosure of private facts  Intentional or negligent public disclosure of private matters  Such disclosure would be objectionable to a reasonable person of ordinary sensitivities

14-23 Bases for Right to Privacy in the Private Sector  Other tort law protections  Publication in a false light  Public disclosure of facts that place the employee in a false light  Breach of contract  Defamation  Libel vs. slander  Compelled self-disclosure

14-24 Regulation of Employee’s Off-Work Activities  Private activities may be regulated if the off-work conduct affects the employee’s performance at the workplace  Smoking, weight, marital status, romantic involvement, political status, and lifestyle discrimination  Enforcement  U.S. companies with operations in Europe must comply with data protection laws

14-25 Employer’s Information-Gathering Process/Justified Use/Disclosure of Information  Process of information gathering  Harassment  Improper filing  Dissemination of the information  Function creep

14-26 Employer’s Information-Gathering Process/Justified Use/Disclosure of Information  Collection and retrieval of information  Limitation of questions to potential employee  Proper storage of information  References

14-27 Electronic Monitoring or Surveillance of Employee Activities  Written policies concerning and Internet use  Bloggers beware  New technologies  Global positioning systems (GPS)  Radio frequency identification devices (RFID)  Biometrics  Informal intrusions

14-28 Forms of Monitoring  Surveillance by glitch  Information uncovered by mistake  Surveillance by default  All information sent through a system is caught and cataloged

14-29 Forms of Monitoring  Surveillance by design  Entire purpose is to collect information and the user is aware of this purpose  Surveillance by possession  Employee information contained in a database or some other list

14-30 How Does Monitoring Work?  Silentrunner  Global positioning  Websense/Websense reporter  MIMEsweeper

14-31 How Does Monitoring Work?  Reasons to monitor  Avoid legal liability  Prevent employee theft  Protection from overt intrusions  Prior consent  Business extension

14-32 Percentage of Large U.S. Companies That Monitor Employee

14-33 Business Justifications for Monitoring Employees’ Technology Use  Reasons to limit workplace Internet use  Wasted time  Overclogged networks  Inappropriate material seepage into the workplace  Concern about impression

14-34 Business Justifications for Monitoring Employees’ Technology Use  Areas of employer potential liability  Defamation  Copyright infringement  Sexual harassment  Discrimination  Obscenity

14-35 The Case of Employee  Employers’ needs vs. employees’ right to privacy  The employer’s interception must not exceed the scope of the employee’s consent  Employee must be informed  State imposed notice requirements

14-36 Developing Computer Use Policies  Policies – written, communicated to employees, and adhered to  Suggested guidelines  Appropriate areas  Employee access to information gathered  Ban on continuous monitoring and secret monitoring  Only job relevant information collected  Only for business interest

14-37 Blogging and Other Social Media (“Web 2.0”)  Social media: User-created content, including text, video, audio, and other multimedia  Published in a shared environment, such as a blog, wiki, or other similar site created to enable such sharing  Employers have wide latitude in off-duty blogging

14-38 Blogging and Other Social Media (“Web 2.0”)  Company’s social media policy  Defined objectives that do not overreach  A reminder that company policies apply  Personal comment rules  Disclosure, monitoring, and copyright reminders

14-39 Waivers of Privacy Rights  Waiver: The intentional relinquishment of a known right  Waiver of privacy rights as a condition of employment  Requiring a waiver is a questionable approach

14-40 Waivers of Privacy Rights  Requirements of a waiver  Should be accompanied by an offer of employment  Must be knowingly and intelligently given  Must be clear and unmistakable, given in writing, and voluntary

14-41 Privacy Rights Since September 11, 2001  USA PATRIOT Act  Allows government to monitor anyone on the Internet simply by contending that the information is “relevant” to an ongoing criminal investigation  Employer response to governmental request for information  Anti–USA PATRIOT Act resolutions