Everybody’s surfing: Social networking at work Thorsten Lauterbach Department of Law.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
BUSINESS B2 Ethics.
Social Media Policy ADM – E 21. CHS Social Media Policy Social media = media designed to be disseminated through social interaction, created using highly.
LEGAL ISSUES IN SOCIAL MEDIA Presented by: TAL WILLIAMS Partner (02)
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Security Controls – What Works
Legal Aspects of Web 2.0 and Social Networking 26 Feb 2010.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
72% of all parents are concerned that other people could locate their child through their mobile phone using location based services.
Business Plug-In B7 Ethics.
ICAICT202A - Work and communicate effectively in an IT environment
Chapter 14: Ethics, Justice and Fair Treatment at Work
1 Twitter This: Social Media & Hospitals Jenna Mooney, Partner Ingrid Brydolf, Partner.
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
INTERNET and CODE OF CONDUCT
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
Security Awareness Norfolk State University Policies.
Presented By: Stephanie R. Taylor ESTATE PLANNING FOR DIGITAL ASSETS R ANDALL |D ANSKIN A Professional Service Corporation.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
What is Social Networking ? What is Social Networking ?
Electronic Use Policies.   Social Media  Internet.
Moffatt Thomas Z Group PR SOCIAL MEDIA... “THE BALANCING ACT” Julia Zunich and Paul D. McFarlane April 12, 2011.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Social Media Smackdown Presenters Roy Hickman, Moderator David Palme, Con Stance Jeff Trudell, Pro Stance.
1.8 vs. 5.3 Benefits and Risks of Social Media in Healthcare Andy Malinoski Director of Risk Management Andy Malinoski Director of Risk Management.
Developing a Social Media Policy Manish Mandhyan, CRCM, CAMS.
Monitoring Employees on Networks: Unethical or Good Business?
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Should employers have access to your social feeds?
Social Networking Presentation to Department Heads January 21, 2010.
The Wire: Connecting the Middle College Community One Click at a Time Jessica Greenwood Jenny Guerra Ashley Gomez Florida International University.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
Data Protection: Workplace, Health and Safety. Employers’ responsibilities Employer obliged to provide safe place of work. Health and Safety Act 2004.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
UKOLN is supported by: Using Blogs, Micro-blogs and Social Networks Effectively Within Your Library: Beyond Blogs: Micro-blogs & Social Networks Brian.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
The Impact of Social Media on Employment Law Carmel Sunley Sunley Solicitors Limited.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Information Technology Acceptable Usage. What you should know… Employees provide the first and final defense in addressing and mitigating day-to-day security.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Acceptable Use Policy (Draft)
Digital Citizenship Grades 4-6
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Social Media Policy January 2014.
The Public Sector Equality Duty
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Internet law Business law.
The Public Sector Equality Duty
Presentation transcript:

Everybody’s surfing: Social networking at work Thorsten Lauterbach Department of Law

Agenda Social networking sites Why use them? SNS at the workplace The law – framework rather than solutions Policies and education Conclusions

The many faces of web surfing Facebook, Bebo, MySpace, LinkedIn YouTube – info-sharing sites –Scomi Oiltools Digger Spin, Peterhead, March 2008 – ms:/news/newArticle http:// ms:/news/newArticle – Blogs – online diaries, opinion columns –“Waterstone's throws book at blogger”, 2005 – Ebay – personal shopping and auction sites

Perils ENISA Report 2007 Spending too much time on SNS Individual privacy concerns Inviting computer viruses into the business Disseminating confidential information Cyber-bullying and harassment; posting of defamatory messages

Business usage & benefits? Establishing of professional contacts; often key business resource (e.g. LinkedIn) Usage of SNS instead of face-to-face meetings within and amongst businesses Vetting of existing and/or prospective employees (socially/morally acceptable?) –“e-footprint” being left by SNS users

Restricting Use of SNS Technology available to block sites –... but there are too many! No clear way of identifying which sites should be blocked as ‘time-wasting’ Difficult to establish what is ‘business use’ against ‘personal use’ Professionals take dim view on external restrictions on Internet access (mistrust; assumption that staff cannot be trusted)

Monitoring use & content Data Protection Act 1998 Regulation of Investigatory Powers Act 2000 Data Protection Codes of Practice issued by the Information Commissioner Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 European and UK-based human rights legislation

What does this mean in practice? Businesses need to make all employees aware of the nature and extent of any monitoring and the reasons for it Monitoring must be conducted in a proportionate manner and in a way which preserves the privacy of an individual insofar as possible: at the least intrusive level vis-à-vis the purpose of the monitoring Impact assessment: –who monitors, and are they aware of their legal obligations –monitoring for which purposes –how will the information from the monitoring be used and stored

Employment tribunal decisions resist bans or similar knee-jerk reactions Best to resist bans or similar knee-jerk reactions –Taylor v Somerfield Stores Ltd 24 July 2007, Aberdeen –Sanderson v Dixon Wilson (2006) –Simonetti v Delta Airlines (2004) –Goudie v Royal Bank of Scotland (2004)

Solutions? Outright ban of SNS use at workplace –Allen & Overy; Argos Reasonable usage permissible Education – awareness of concerns –Staff development Education – internet use policy –Clear guidelines of what is permitted and what isn’t –Clear guidelines on possible sanctions and levels of seriousness Embracing SNS via internet use policy and education – be proactive, not reactive: –Meall, L. “Risk and reward” Accountancy 2008, (Aug), 75-76

Indicative bibliography Yeoman, A. “Facing up to Facebook” Comps. & Law 2007, 18(4), Delaney, A. “Online misconduct” Emp.L.B. 2008, 84(Apr), 4-5 Westbrooke, A. “Surf and Skive: Work and Play” Comps. & Law 2008, Bradshaw, M “Monitoring Employee Internet Use” Comps. & Law 2008, Armstrong, N. “Blog and be damned?” N.L.J. 2008, 158(7312), 387 James, Steven, “SNS: regulating the online “Wild West” of Web 2.0”, Ent. L.R. 2008, 19(2), (Pinsent Masons online)