Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.

Slides:



Advertisements
Similar presentations
Office of Human Resources Presentation
Advertisements

Managing the Risks of Wrongful Discharge Claims Raymond L. Hogge, Jr. HOGGE LAW Attorneys and Counselors at Law 500 E. Plume Street, Suite 800 Norfolk,
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
1 Social Media: Strategy and Implementation Are you protected? Amy D. Cubbage & Cynthia L. Effinger.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Developing a Records & Information Retention & Disposition Program:
14-1 Copyright ©2010 Pearson Education, Inc. publishing as Prentice Hall Respecting Employee Rights and Managing Discipline Chapter 14.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
Jeopardy The Sexual Harassment Edition. Definitions Rules, Regulations, Guidelines & Law What Next (or What’s Not Next)? Facts About Sexual Harassment.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
Session 3 – Information Security Policies
1 1 © 2011 Eaton Corporation. All rights reserved. Harassment Free Workplace Policy.
2. 11 Rights of employers and employees Rights of employer and employees Rights and responsibilities  Both employees and employers have legal rights.
Legal Considerations For Commercializing Technology and Intellectual Property Presentation for the Nikola Tesla Memorial Conference January 11, 2014, New.
Workplace Harassment What Supervisors Need to Know.
Chapter 3 The Legal and Ethical Environment Nature of employment laws Key equal employment opportunity laws Employment-at-will Fair Labor Standards Act.
Harassment Harassment by definition is to irritate or torment persistently or to wear out and exhaust.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
TSD Conference 2015 Top Ten Tips for Avoiding Liability Presented by: Peggy Burns, Esq. President, Education Compliance Group Mark Hinson, SPHR Chief Human.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Overview of the Hernando County School District Anti-Bullying and Harassment Policy January 2009.
Safety at Work Copyright © Texas Education Agency, All rights reserved.
Hospitality Operations Objective 4.02 – Human Resources.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Sexual Harassment Increasing Awareness. Section I Introduction 2.
CooperationObservationPartnership. The Pledge of Allegiance I pledge Allegiance to the flag of the United States of America and to the Republic for which.
Copyright ©2012 Pearson Education, Inc. publishing as Prentice Hall Chapter 14 Respecting Employee Rights and Managing Discipline 14-1.
Shoreline Community College Sexual Harassment Prevention for Supervisors Legal Liabilities and Human Behavior Presented by Stephen P. Smith, J.D. Vice.
Copyright © Education Compliance Group, Inc. All rights reserved. By Peggy A. Burns, Esq. and Mark Hinson, SPHR Internal Investigations & Decision-Making:
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Job Compliance 1.
Accommodation & Hospitality Services Equality & Diversity (Including the University’s Dignity and Respect Policy & Procedure)
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Human Resource Management Lecture-38. Summary of Lecture-37.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
SECNAVINST D DON POLICY ON SEXUAL HARASSMENT
Our Actions have to always keep in mind Our Mission: “To educate all students to high academic standards within a safe, stimulating environment and ensure.
POLICIES = CONTROL Simply stated, a policy lays out what management wants employees to do and a procedure describes how it should be done.
What is Sexual Harassment? Deliberate and/or repeated sexual or sexual based behavior that is not welcome, not asked for, and not returned.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Dignity for All Students Act & Sexual Harassment Avoidance Annual Training.
Copyright © 2014 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin FUNDAMENTALS OF HUMAN RESOURCE MANAGEMENT 5 TH EDITION BY R.A.
CULTURE CORE VALUESPERSONALITYFUTURE CULTURE CORE VALUESPERSONALITYFUTURE Performance Management & Corrective Discipline.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Promoting equality & diversity through volunteering Matthew Norfolk Volunteer Centre Liverpool.
1. On a blank sheet of paper… Write down one reason why you may be disciplined (written up) at work.
Inappropriate Workplace Behaviors.  Criminal Intent, customer or client, worker-on-worker, personal relationship  Act or threat of physical violence,
Right 1 - ACCESS Right to access health and community services I have a right to access health and community services that meet my identified needs.
Chapter 7 Employment Law Halsey/McLaughlin, Legal Environment You will be able to answer the following questions after reading this chapter: What is an.
Ogletree, Deakins, Nash, Smoak & Stewart PC
Chapter 1 The Regulation of Employment
The Counseling Center Purdue University Northwest
Privacy and Security in the Employment Relationship
Paul T. Smith Davis Wright Tremaine LLP
Chapter 3: IRS and FTC Data Security Rules
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
04-14 Sexual Harassment.
Presentation transcript:

Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW

Concerns: o Individual views, Group consequences o Privacy o Data Security & Loss o Confidential Information o Employee Laws & Regulations

Individual Views, Group Consequences o Misconduct leading to Harassment – ANALYSIS: o What is the reasonable response to any transgression or potential act of misconduct? o Do the views expressed constitute “unwanted conduct that has the purpose or effect of violating a person’s dignity or creating an offensive, intimidating or hostile environment? o Role of Human Resources is to investigate and support employees while balancing the risk taken on by the Organization o “Equal Opportunities” basis o Role of the organization: academic v. private entity v. public entity o Role of forum: private comments, public speech o Level of tolerance and support of expression, individual culpability, negativity to organization

Privacy Important:Manage employees’ expectations of privacy ◦Communicate the circumstances surrounding such expectations ◦Means by which an employee’s activities can be monitored ◦Example: NO EXPECTATION OF PRIVACY with electronic devices used for business purposes ◦Privacy Policies should be in place to provide for the Organization to access to these devices used to conduct business (including personal cell phones) as necessary

Data Security & Loss Everyone within the Organization needs to recognize that cybersecurity is a threat and be part of the plans and programs necessary for effective defense. Use of security tools/software and incident response reporting Passwords, PINs being kept secure Understanding technology and what information needs to be protected Driving every aspect of data v. Fire and forget “It’s not my job”

Confidential Information o Trade Secrets, Trademarks, & Copyrights of the Organization o Inventory to know the asset o Protocols to safe-guard including access to and use – restrictions or limitations have to be communicated o Sensitive Information of the Organization and/or its Clients o Understand the difference between Confidential Information and Sensitive Information o Not confidential: employees’ wages and working conditions, trademarks or copyrights o Confidential: social security numbers, health information, trade secrets o Potentially NOT or COULD BE Confidential: client contact information TELL EVERYONE WITH ACCESS TO THIS INFORMATION THAT THIS IS CONFIDENTIAL EITHER THROUGH A DESIGNATION IN THE COMPANY HANDBOOK, WHEN GIVEN ACCESS TO IT, OR IN ANY OTHER OBVIOUS WAY KEEP INFORMATION IN A SECURE LOCATION MEASURED BY A STANDARD OF REASONABLENESS, NOT PERFECTION

Employee Laws & Regulations Specific in social media area: o Must be compliant especially with Department of Labor in wage and hour policies o Contract/Tenured employee v. Independent contractor v. Common law employee MAIN IDEA: Employee reporting of time worked can ensure that employees are fully compensated for all time worked, lessening the risk of violating wage and hour regulations AND keeps a proactive, positive, effective work culture and environment KEEP IN MIND -- ALL COMPLIANT, ALL THE TIME: Discrimination, Employee fraud/misrepresentation, Hostile Work Environments +

What to do? #1 FORMAL WRITTEN POLICIES 1. Social Media Use Policy with meaningful training to highlight key risks and views of Organization with the understanding discharge may be an option if conduct brings an Organization into dispute. 2. Breach Plan or Protocol in place addressing how to manage or address a breach of the Organization information on Organization’s devices and personal devices used by employees for Organization business 3. Confidential/Trade Secret Agreements with employees outlining treatment and ownership of valuable and sensitive information 4. Clear and concise policies on employee’s report of all time worked 5. Clear and concise policies and protocol when issues arise, outlining the investigation process including the consideration of placing an employee on paid leave

What to do? #2 DON’T DISCRIMINATE #3 BE CIVIL, BUT NO SUGARCOATING #4 BE COMPLIANT WITH OTHER LAWS #5 DOCUMENT EVERYTHING #6 CONSULT AN ATTORNEY

Questions? Megan Quirk Attorney At Law 117 E Main Street Muncie, Indiana