Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
A Legal and Practical Primer on Development & Maintenance of Social Media Policies and Related Issues Richard I. Greenberg Jackson Lewis LLP 666 Third.
Northside I.S.D. Acceptable Use Policy
Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
Hospitals & Social Media. Laws Implicated Federal Trade Commission –Disclosure of employment status –False or misleading statements State & Federal Wiretap.
Boyertown Area School District Acceptable Use Policy.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
VISD Acceptable Use Policy
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
INTERNET and CODE OF CONDUCT
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
Standards and Guidelines for Web Page Publishing December 9, 2009.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
1. Review of Selected Employee Policies 2 DRUG FREE WORKPLACE PURPOSE OF POLICY To ensure compliance with the federal drug-free workplace act. Provide.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
CPS Acceptable Use Policy Day 2 – Technology Session.
University of Maryland College Park, Maryland October 7, 2011 By: Rochelle S. Eisenberg, Esq. Hodes, Pessin & Katz, P.A
SUPERVISING STUDENT EMPLOYEES August 13, 2002 Office of Human Resources Office of the General Counsel.
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
Electronic Use Policies.   Social Media  Internet.
Moffatt Thomas Z Group PR SOCIAL MEDIA... “THE BALANCING ACT” Julia Zunich and Paul D. McFarlane April 12, 2011.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Chapter 40 Regulation of Employment Twomey, Business Law and the Regulatory Environment (14th Ed.)
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
00870B2F.0/Internet%20Safety.jpg.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
CIVIL RIGHTS FOR SCHOOL NUTRITION PROGRAMS Presented to School Nutrition Managers and Employees North Carolina Department of Public Instruction Safe and.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
School Accounts Presented by: Mrs. Mazzola.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
ACCEPTABLE USE POLICY Perry Township Schools. ISTE-T Standard, Description and Rationale Standard #4 Promote and Model Digital Citizenship and Responsibility.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
YOU’RE IN BUSINESS YOUR PEOPLE ETHICS IN BUSINESS.
Avoiding (Un)Intentional Discrimination When Recruiting via Social Media Stephanie R. Thomas, Ph.D. Thomas Econometrics
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
SLO:I can understand the purpose of unions and statutes that protect worker’s rights.
By: John G. Kruchko, Esq. September 12, 2011 Kruchko & Fries © 2011 Privileged and Confidential 1.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Internet safety for your student
Ogletree, Deakins, Nash, Smoak & Stewart PC
Being CyberSmart! About Online Safety and Security At Schools
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Employee Privacy and Privacy of Employee Information
Student User Agreement and Policy 2022
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012

The Rule of Three 1. Tell them the behavior you expect 2. Tell them the consequences for violating your policy 3. Consistently and fairly enforce the consequences

DO NOT PUT ANYTHING IN WRITING THAT YOU ARE NOT WILLING TO ENFORCE

KEEP IT SHORT AND CONCISE

BE REALISTIC

Technology Is Pervasive in Our Society  Texting  Facebook, LinkedIn, Twitter  Tablets  Cell phones with cameras and video

BE REALISTIC  Banking Online  Employee Benefits  Communicating with Friends and Family Members  Building and Maintaining Relationships

The Important Things Your Policies Need to Address 1. Sexual harassment and discrimination issues 2. Expectations of privacy 3. Disruption to workforce 4. Viruses 5. Protection of intellectual property 6. Defamation/Consumer Protection Act claims

Sexual Harassment and Discrimination Issues You should not knowingly allow your employees to use company technology to: send off-color jokes view, create, or post inappropriate things (pornography) using technology ( s or voic s) to harass on the basis of race, sex, age, sexual orientation, marital preference, religion, national origin, genetic information, physical or mental disability, or other protected status

Expectations of Privacy  The Fourth Amendment to the U.S. Constitution, which prohibits unreasonable searches and seizures, only applies to government actions  Some federal and state laws provide rights to privacy Electronic Communications Privacy Act ("ECPA") -- generally prohibits: (1) unauthorized and intentional interception of wire, oral, and electronic communications during the transmission phase, and (2) unauthorized accessing of electronically stored wire or electronic communications.

Expectations of Privacy (cont’d) ECPA has consent exception, thus the need for a no expectation of privacy policy Idaho does not have a right to privacy statute like other states, but appellate court decisions from Idaho suggest that a court may balance the business need for the information with the employee’s expectation of privacy -- Cantwell v. City of Boise, 146 Idaho 127, 191 P.3d 205 (2008)

Expectations of Privacy (cont’d)  Your policy should advise employees that they should not have any expectation of privacy on anything they create, view, store, or access using the company's computer network or any of the company's electronic devices (desktop computers, laptops, cellular phones, tablets, voic , etc.)  Should you advise employees of any electronic monitoring?  Legal issues to consider if you do monitor employees’ voic s, s, and Internet usage  What about Gmail, Yahoo mail accounts, and other third party Internet accounts?  The reasonable suspicion standard for employee searches

Disruption to Workplace  Limit usage of company electronic devices for personal reasons to break periods, lunch breaks, or after hours and only if such usage does not interfere with other employees’ abilities to use those devices for business purposes  Advise employees that by using the company's electronic devices for personal purposes they agree to release the company from any claim associated with a third party obtaining their passwords or other confidential information  Address usage of personal cell phones in the workplace -- e.g., personal calls and text messages

Viruses  Advise employees that they will be responsible for any damages caused to company's electronic devices or computer network because of any virus downloaded during the employee's personal use of a company electronic device Prohibit employees from downloading or installing software or other materials without your permission Advise employees that their personal use of the Internet should be limited to viewing and accessing safe and well-known websites

Intellectual Property  Make sure your electronic usage policy addresses the misappropriation of both company intellectual property and the intellectual property rights of third parties  Protecting company IP rights Confidentiality agreements signed by employees:  make this a separate agreement, as employee handbook usually contains contract disclaimer  address assignment of IP rights, work for hire, etc.  define what is considered company IP (client lists, product formulations, manufacturing processes, etc.)  advise employees that they shall not disclose company’s IP to any third party without company’s written permission

Intellectual Property (cont’d) Advise employees that they must not use social media (Facebook, LinkedIn, or Twitter) to discuss company's confidential business matters Advise employees that the use of camera phones and other similar technology devices in the workplace is strictly prohibited Advise employees with access to company's IP that they are responsible for limiting others’ access to company IP by using password protections, timing out monitor displays after periods of inactivity, etc.

Intellectual Property (cont’d)  Avoiding third party misappropriation claims Advise employees that they are prohibited from downloading, copying, or transmitting software and/or documents protected by copyrights or licensing agreements without written permission from company  Dangers of open source software Open source software licensing agreements typically require public disclosure of any derivative work created using the open source software

Social Media Policies  Facebook, LinkedIn, Twitter, Blogs, Internet bulletin boards, and chat rooms risks Defamation claims Unfair trade practice claims Consumer protection act violations  NLRB decisions Cannot prohibit employees’ use of social media to post information regarding pay and benefits or working conditions as those are collective bargaining rights afforded to employees under the NLRA

Social Media Policies (cont’d)  What to do Advise employees that they are not authorized to publicly post any representations or statements regarding the company's products or services, about the company's employees, representatives, contractors or agents, or about the company's competitors, suppliers, or customers without the express written permission of the company Advise employees that they may be subject to discipline, including termination, for making any fraudulent, false, or misleading statement in a public forum regarding the company or its employees, representatives, contractors or agents, or about the company's competitors, suppliers, or customers Advise employees that they will not be subject to discipline for using public forums to exercise any rights granted to them under any federal or state law that grants them collective bargaining rights

For Further Information or Questions, Please Contact: C. Clayton Gill Moffatt, Thomas, Barrett, Rock & Fields, Chartered 101 S. Capitol Blvd., 10 th Floor Post Office Box 829 Boise, Idaho