ABA –- National Symposium on Technology and Labor and Employment Law April 21-23, 2013 Berkeley, CA SOCIAL MEDIA AND NEW TECHNOLOGY ISSUES FOR UNIONS AND EMPLOYEES: THE NLRA AND BEYOND Pamela Jeffrey Levy Ratner, P.C. 80 Eighth Avenue, 8th Floor New York, NY 10011 (212) 627-8100 [email protected] Katy Dunn SEIU Local 32BJ 25 W. 18th Street New York, NY 10011 (212) 388-3970 [email protected] Alvin Velazquez Service Employees International Union 1800 Massachusetts Avenue, NW Washington, DC 20036 (202) 730-7000 [email protected] TABLE OF CONTENTS Page INTRODUCTION: NAVIGATING THE OPPORTUNITIES AND RISKS OF SOCIAL MEDIA AND NEW TECHNOLOGY ......................................................................................................... 1 PROTECTIONS FOR AND RESTRICTIONS ON THE CONTENT OF ONLINE ACTIVITY . 2 1. Developing Protections Under Section 7 ............................................................................. 2 a. The Facebook Case and the Beginning of a Section 7 Analysis...................................... 2 b. Guidance from the Office of the General Counsel: Protected, Concerted Activity or Individual Gripe? ............................................................................................................. 3 c. The Board Finds Facebook Postings To Be Protected Concerted Activity ..................... 5 d. The Application Of Section 7 To Social Media Policies And Related Work Rules........ 7 2. Protected Statements vs. Disparagement, Defamation, or Worse ....................................... 9 a. Statements by Employees ................................................................................................ 9 b. Protection For Unions – The Communications Decency Act ........................................ 11 c. New Avenues of Attack against “Watch” Websites and Other Union Online Activity 15 TIME, PLACE, AND MANNER: PRACTICAL CONSIDERATIONS FOR USE OF SOCIAL MEDIA ......................................................................................................................................... 16 1. The Register-Guard Saga ................................................................................................... 16 2. Employee Privacy Rights and the Use of Employer Resources ........................................ 19 BIG BROTHER AND SOCIAL MEDIA: IS YOUR EMPLOYER WATCHING YOU? .......... 22 1. Cyber-Surveillance and Section 8(A)(1) ........................................................................... 22 2. Statutory Protections Against Employer Surveillance – the Stored Communications Act 23 CAN SPAM AND THE TCPA: TEXTING AND EMAILING UNION MEMBERS ................ 25 1. CAN SPAM ....................................................................................................................... 26 a. Applicability to Labor Unions ....................................................................................... 26 b. Requirements ................................................................................................................. 27 c. Messages to Wireless Devices ....................................................................................... 28 d. Penalties and Safe Harbors ............................................................................................ 29 e. Text Messages and Emails ............................................................................................. 29 f. Robocalls........................................................................................................................ 30 g. TCPA Private Right of Action and Damages ................................................................ 32 THE SMALL PRINT: OTHER REGULATORY CONCERNS .................................................. 32 ii INTRODUCTION: NAVIGATING THE OPPORTUNITIES AND RISKS OF SOCIAL MEDIA AND NEW TECHNOLOGY Social media is increasingly becoming a way of life for people of all ages, at work and at home, for personal and work related matters. Almost every employer, union local, and international union has a website. Many provide features that allow viewers to post comments, read comments of others, and post or view photos and videos. Sites routinely ask users to sign up for ongoing updates by “following” them via Twitter or RSS feeds, or “liking” them on Facebook. Individuals also use social media sites like Facebook, Instagram, Google+, and Tumblr to maintain their own online presences. In addition, people communicate via Twitter in their personal and professional capacities, at home, at work and from various locations in between. All of these online tools, combined with advances in mobile phone technology like web browsers, high-definition cameras, GPS chips, and social media apps, present previously unimagined opportunities to communicate and to view communications of others. Many people use their phones to check and post to their own social media pages, and to those of their friends, numerous times throughout the day. It is now commonplace to shoot photos and videos constantly – whether at brunch with friends, 1 a concert, 2 a demonstration 3 or a union meeting – and upload them directly from their mobile phones to the web where friends and others can view and comment on them within a matter of moments. Moreover, photos can be “tagged” with the names of those appearing in them, and often carry embedded data reflecting the date, time and place they were taken. Legislatures, courts and regulators are having a hard time keeping up with the evolution of social media. While Section 7 of the National Labor Relations Act (“NLRA” or “Act”) continues to protect workers engaging in union activity, it can be hard to prove the concerted aspect of certain communications when individuals speak up in cyberspace, and the public nature of social networking can blur the lines between protected activity and disloyalty, disparagement 1 See Kate Murray, First Camera, then Fork, N.Y. Times, April 6, 2010, at D1 (Describing the rapidly growing trend of taking pictures of everything one eats and posting them online). 2 See, e.g. Lorne Manly, This Is Not Spinal Tap: A Concert Film by Fans, N.Y. Times, January 19, 2006, at E1 (reviewing “Awesome!” a concert film by the band the Beastie Boys inspired by a picture of the band taken using a fan’s cellphone). 3 See, e.g. Sarah Maslin Nir, Wall Street Protesters Broadcast Arrests on Social Media, N.Y. TIMES CITY ROOM BLOG (Sept. 24, 2011), http://cityroom.blogs.nytimes.com/2011/09/24/wall-street-protesters-broadcast-arrests-on-socialmedia/?scp=85&sq=use%20of%20video%20occupy%20protests&st=cse. or defamation, which fall outside the protection of the Act. Moreover, the developing interpretation of Section 7 by the National Labor Relations Board in the context of social media might lead to rude awakenings when employees discover that their speech is less protected than they believed from reading the flurry of headlines about the 2010 “Facebook case” and headlines about recent NLRB decisions and activity. 4 Meanwhile, outside of the NLRA, courts are struggling to adapt existing privacy law and wiretapping statutes to emerging technologies and the nature of electronic communication in today’s workplace, and legislatures are adopting new statutes to address issues associated with life in the social network. How can we help our clients harness the benefits of social media while avoiding the pitfalls? PROTECTIONS FOR AND RESTRICTIONS ON THE CONTENT OF ONLINE ACTIVITY 1. Developing Protections Under Section 7 a. The Facebook Case and the Beginning of a Section 7 Analysis In October 2010, NLRB Region 34 in Hartford, CT issued the now-famous complaint against an employer that fired an employee who posted negative remarks about her supervisor on Facebook after she was denied union representation in a meeting regarding a work incident. The employee posted the comments to her personal Facebook page using her home computer, and continued to post comments after coworkers who were also her Facebook “friends” posted comments in support. The Office of the General Counsel’s Division of Advice concluded that the Region should issue a complaint alleging that the employer violated Section 8(a)(1) by denying the employee her Weingarten rights, by threatening her for invoking those rights, by terminating her for engaging in protected activity and by maintaining unlawfully overbroad internet and blogging, standards of conduct and solicitation policies. 5 See American Med. Response of Conn., Inc., OGC Advice Memo, NLRB Case No. 34-CA-12576 (Oct. 5, 2010). The Region’s complaint addressed the discipline and the policy issues, and alleged that (1) the employee’s use of Facebook constituted protected concerted activity under the NLRA, and (2) the employer’s policies were unlawfully overbroad in that they prohibited employees from making disparaging remarks about the company or supervisors, or depicting the company name 4 See, e.g. Steven Greenhouse, Even If It Enrages Your Boss, Social Net Speech Is Protected, New York Times (Jan. 21, 2013) 5 The employer’s policy prohibiting all solicitations by e-mail was found facially lawful under Register-Guard as it prohibited all solicitation. 2 or logo in any way over the internet without permission. 6 See Complaint, American Med. Response of Conn., NLRB Case No. 34-CA-12576 (Oct. 27, 2010). The complaint drew enormous national attention as the first reported instance of the Board alleging that Section 7 protected an employee who was discharged for speaking out against her supervisor on Facebook. The New York Times quoted Acting General Counsel Lafe Solomon as stating “This is a fairly straightforward case under the National Labor Relations Act – whether it takes place on Facebook or at the water cooler, it was employees talking jointly about working conditions, in this case about their supervisor, and they have a right to do that.” Steven Greenhouse, Company Accused of Firing Over Facebook Post, New York Times (Nov. 8, 2010). Ultimately the case settled through a private agreement with the individual and a Board settlement by which (1) the employer would revise its overly-broad rules to allow employees to discuss terms and conditions of their employment with their co-workers and others while not at work; and (2) it would not discipline or discharge employees for engaging in such discussions. While the complaint and settlement did not provide any new guidance on social media per se, it was clear – particularly after the Advice memo was released – that the Board was using well-established law to analyze, and hold employers accountable for, Section 7 violations that occurred via social media. 7 b. Guidance from the Office of the General Counsel: Protected, Concerted Activity or Individual Gripe? The “Facebook case” left a remarkable e-trail. Countless news agencies and bloggers quickly started rehashing the limited public details of the case and speculating about what it meant for the future. The news stories and blogs gave one the impression that Section 7 would protect any worker who criticized her boss on Facebook. In reality, the requirement of proving the “concerted” nature of online activity can significantly limit the application of Section 7 to social media activity. And unprotected statements – having little or no connection to terms and conditions of employment – continue to be unprotected even if made on Facebook. In the Facebook case, the fact that coworkers appended comments of support to the fired employee’s original post was clearly a factor in establishing the concerted nature of the activity, and in the decision to issue the complaint (the postings were considered to be a discussion). Moreover, the Facebook posting arose out of the employer’s unlawful response to the employee’s request for union representation at an investigatory meeting. It does not take much 6 The Employee Handbook stated under its “Blogging and Internet Posting Policy” that employees were “prohibited from making disparaging, discriminatory or defamatory comments when discussing the Company or the employee’s superiors, co-workers and/or competitors.” 7 The Board had previously applied a traditional Section 7 analysis to other new forms of technology, including e-mail. See Timekeeping Systems, Inc., 323 NLRB 244 (1997). 3 imagination, however, to foresee a situation where a worker, desiring to incite change in the workplace, makes a comment via social media and cannot provide evidence showing that she acted concertedly. Absent substantive responsive comments from co-workers, such a contribution to discourse about working conditions via social media could stand alone and perhaps unprotected, despite the fact that under Board law “the guarantees of Section 7 of the Act extend to concerted activity which in its inception involves only a speaker and a listener, for such activity is an indispensable preliminary step to employee self-organization.” Meyers Industries (Meyers II), 281 NLRB 882, 887 (1986), quoting Root-Carlin, Inc., 92 NLRB 1313, 1314 (1951). The NLRB General Counsel’s Office recognized that the growing use of social media was likely to raise issues without clear direction from the Board. On April 12, 2011, Acting General Counsel Lafe Solomon issued a memo on Mandatory Submission to Advice that included “[c]ases involving employer rules prohibiting, or discipline of employees for engaging in, protected concerted activity using social media, such as Facebook or Twitter.” See Memorandum GC 11-11 (April 12, 2011). Although submission to Advice is no longer mandatory for all such cases, since that directive, the Division of Advice has issued numerous memoranda (“Advice Memos”) in cases involving social media use by employees and the Office of the General Counsel, Division of Operations-Management has issued three reports (“GC Reports”) concerning social media cases. See Memorandum OM 11-74 (August 18, 2011), Memorandum OM 12-31 (January 24, 2012) and Memorandum OM 12-59 (May 30, 2012). 8 These Advice Memos and GC Reports show the Office of the General Counsel, in case after case, applying traditional Section 7 analyses under the Meyers cases, 9 to determine whether social media activity constitutes concerted activity, under Atlantic Steel to determine whether an employee’s outburst at work is sufficiently opprobrious to result in the loss of protection, and under Jefferson Standard to determine whether employee statements to third parties constitute unprotected disparagement, disloyalty or defamation. The lion’s share of these published Advice Memos conclude that the social media conduct at issue was not protected activity because the topic of the posting, tweet, etc. was not related to terms and conditions of employment or, if so related, was not concerted in that there was no “call to action” or substantive comments from coworkers indicating a group concern, as opposed to individual griping. 10 8 Advice Memos and GC Reports can be found on the NLRB’s website (www.NLRB.gov). 9 Meyers Industries (Meyers I), 268 NLRB 493(1984), revd. Sub nom Prill v. NLRB, 755 F.2d 941 (D.C. Cir. 1985), cert. denied 474 U.S. 948 (1985), on remand Meyers Industries (Meyers II), 281 NLRB 882 (1986), affd. sub nom Prill v. NLRB, 835 F.2d 1481 (D.C. Cir. 1987), cert. denied 487 U.S. 1205. 10 Although the Facebook case involved a unionized workplace, most of the cases that have published Advice Memos do not, or at least do not reference union activity. 4 These Advice Memos contain a wealth of cautionary tales that employees would do well to heed. A recent example, Cox Communication, Inc., OGC Advice Memo, NLRB Case No. 17-CA-087612 (October 19, 2012), is a good reminder of the dangers of venting on social media about work related frustrations, and the importance of knowing (and remembering) how your chosen social media platform operates and your specific privacy settings and listed affiliations. In Cox, an employee, frustrated by an interaction with a customer, vented by posting an inappropriate comment about the customer (ending with “F--K YOU!”) on his Google+ account, failing to realize or remember (or care, at that moment) that his Google+ account affiliated him with his employer (and was publicly accessible). A supervisor saw the post and reported it to management, and the employee was ultimately terminated. It is no surprise that Advice found his post to be unprotected. As the numerous Advice Memos make clear, mere posting on a social media site does not by itself trigger Section 7 protection of an employee’s comments. In order for Section 7 to come into play, online comments must be about union activity or otherwise about terms and conditions of work, and the employee must either discuss the post with coworkers in person, have at least one coworker substantively comment on the post, or include in the post language clearly intended to spur coworkers to action. Coworker comments demonstrating a general affinity (such as “liking” a Facebook post) have not been perceived by the Office of the General Counsel as providing the same indication of concerted activity as comments in which co-workers add substantively to a discussion about terms and conditions of employment. Hopefully this will change, in light of a recent ALJ decision holding “liking” to be sufficiently meaningful participation to constitute concerted activity. 11 c. The Board Finds Facebook Postings To Be Protected Concerted Activity In Hispanics United of Buffalo, 359 NLRB No. 37 (Dec. 14, 2012), the Board issued its first decision in an 8(a)(1) discharge case where the Section 7 activity at issue occurred on Facebook, finding that the Facebook postings were concerted and protected activity. 11 See Triple Play Sports Bar and Grille, NLRB Case No. 34-CA-12915;12926, (NLRB Div. of Judges, Jan. 3, 2012) (Esposito, ALJ) (ALJ Op. Jan. 3, 2012) in which the ALJ found “liking” to constitute concerted activity. “I further find that Spinella’s selecting the ‘Like’ option on LaFrance’s Facebook account constituted participation in the discussion that was sufficiently meaningful as to rise to the level of concerted activity. Spinella’s selecting the ‘Like’ option, so that the words “Vincent VinnyCenz Spinella…like[s] this” appeared on the account, constituted, in the context of Facebook communications, an assent to the comments being made, and a meaningful contribution to the discussion.” Judge Esposito further noted that “[t]he Board has never parsed the participation of individual employees in otherwise concerted conversations, or deemed the protection of Section 7 to be contingent upon their level of engagement or enthusiasm.” Triple Play Sports Bar and Grille at 8-9. 5 The five employees involved were discharged for posts and comments referring to a coworker who had made comments about their poor work performance. The coworker had expressed, to the employee who initiated the Facebook postings, her intention of taking her complaints about their work performance to management. The Board stated that “[a]lthough the employees’ mode of communicating their workplace concerns might be novel, we agree with the judge that the appropriate analytical framework for resolving their discharge allegation has long been settled under Meyers Industries and its progeny.” Hispanics United, slip op. at 1. Applying the Meyers cases, the Board agreed with the ALJ that the employer violated 8(a)(1) when it discharged the employees for their protected, concerted Facebook activity. A useful fact in this case was that the initial employee post that alerted the other employees to the coworker’s work performance complaints ended with the question “[m]y fellow coworkers how do u feel?” The Board noted that “[b]y responding to this solicitation with comments of protest [the] four coworkers made ‘common cause’ with her and, together, their actions were concerted within the definition of Meyers I because they were undertaken ‘with…other employees.’” The Board further found the actions of the five to be concerted under the expanded definition of Meyers II because they were taking a first step towards group action to defend themselves against the accusations they could reasonably believe [their coworker] was going to make to management. Hispanics United, slip op. at 2. The Board found this to be true even though only the employee who initiated the first post was aware that the complaining coworker was going to voice her criticism to management. In his dissent, Board member Hayes contended that a “group defense” argument was therefore not applicable here. The Board, however, found that the initial poster’s Facebook communication with her coworkers, immediately after learning of the planned complaint about them to management, had the clear “mutual aid” objective of preparing her coworkers for a group defense to those complaints and that she was not required to discuss this objective with her coworkers or tell them it was made necessary by the impending visit with management. The Board noted that the initial poster’s “‘mutual aid’ object of preparing her coworkers for group action was implicitly manifest from the surrounding circumstances.” Hispanics United, slip op. at 3. While Hispanics United reflects the Board’s long awaited embrace of social media activity within the protection of Section 7, the outcome is based on the unique facts of the case and it must be remembered that “the question of whether an employee engaged in concerted activity is, at its heart, a factual one, the fate of a particular case rising or falling on the record evidence.” Meyers I, 268 NLRB at 497. 6 d. The Application Of Section 7 To Social Media Policies And Related Work Rules While the protected concerted nature of employees’ online activity has been the subject of numerous Advice Memos and much media attention, until recently there has been less attention paid to the application of Section 7 to employers’ overbroad social media policies. When the Facebook case was reported, practitioners were confused because the Division of Advice found the employer’s policy in American Medical Response to be overbroad, while it did not find a seemingly similar policy to be overbroad in the earlier Sears Holdings (Roebucks) case. See OGC Advice Memo, NLRB Case No. 18-CA-19081 (Dec. 4, 2009). The reasons for the different outcome became clear as more details became known, and once the Advice Memo was published it was also clear that Advice analyzed the policy under the same well settled Board law it had applied in the earlier Sears Holdings (Roebucks) case. It is well settled that in determining whether an employer’s work rule violates Section 8(a)(1), the appropriate inquiry is whether the rule would reasonably tend to chill employees in the exercise of their Section 7 rights. See Lafayette Park Hotel, 326 NLRB 824, 825 (1998), enf’d. 203 F.3d 52 (D.C. Cir. 1999). In Sears Holdings (Roebucks), the Division of Advice recommended dismissal of the charge because the policy could not “reasonably be interpreted to prohibit Section 7 protected activity” under Lafayette Park Hotel, as refined by Lutheran Heritage Village – Livonia, 343 NLRB 646 (2004). Under this line of cases, when a rule does not explicitly restrict Section 7 protected activity, a violation of 8(a)(1) will be found only “upon a showing of one of the following: (1) employees would reasonably construe the language to prohibit Section 7 activity; (2) the rule was promulgated in response to union activity; or (3) the rule has been applied to restrict the exercise of Section 7 rights.” Id. at 647. In Sears Holdings, there was no evidence that the employer used the policy to discipline anyone (as was the case in American Med. Response of Conn.) or that it was promulgated in response to a union campaign or other Section 7 activity. Left to review the policy for whether an employee would reasonably read it as limiting Section 7 activity, Advice concluded that because the rule included a list of “plainly egregious conduct” no employee “could reasonably construe” the social media policy as prohibiting Section 7 activities. 12 12 Subsequent Advice Memos continue to apply Lafayette Park Hotel and Lutheran Heritage Village-Livonia in reviewing challenged employer policies and rules. See, e.g., Flagler Hospital, OGC Advice Memo, NLRB Case No. 12-CA-27031 (May 10, 2011), (Broadly-written policy, when applied to protected conduct and in the absence of limiting or clarifying language, was unlawful as it could reasonably be interpreted to prohibit protected discussions, despite a generally phrased “savings clause”); Giant Eagle, OGC Advice Memo, NLRB Case No. 6-CA37260 (June 16, 2011) (Certain rules, including prohibition on employee use of company logos and photos unlawful in the absence of clarifying or limiting language, but rule prohibiting employees from pressuring co-workers to connect via social media was sufficiently narrowly drawn to restrict only unprotected harassing conduct). 7 On May 30, 2012 the Office of the General Counsel, Division of OperationsManagement issued a third GC Report concerning social media cases, focused solely on employer policies and rules that impact employee use of social media. See Memorandum OM 12-59 May 30, 2012. The Acting General Counsel’s cover memo notes that “Employee use of social media as it relates to the workplace continues to increase, raising various concerns by employers, and in turn, resulting in employers’ drafting new and/or revising existing policies and rules to address these concerns.” The Report discusses seven unnamed cases, the first six of which involve policies and rules that are, at least in part, overbroad and unlawful, including rules on “appropriate” use of social media technology and policies on “friending co-workers” and “use of good judgment about what you share and how you share” on social media. Examples of specific problematic provisions include: instructions to employees to “[t]hink carefully about ‘friending’ co-workers” (unlawfully overbroad because it discourages communication among coworkers) and instructions to employees to “[r]eport any unusual or inappropriate internal social media activity” (unlawful because it encourages employees to report to management the union activities of other employees). OM 12-59 at 9. The last reported case involves a social media policy that is found to be lawful, as revised with examples of prohibited conduct. A copy of this lawful policy is included in the Report. Subsequently, in September 2012, the Board issued its first social media decisions in Costco Wholesale Corp., 358 NLRB No. 106 (Sept. 7, 2012) and Knauz BMW, 358 NLRB No. 164 (Sept. 28, 2012). In both cases the Board applied the same Lafayette Park Hotel/Lutheran Heritage Village-Livonia analysis in determining whether the policies and rules violated 8(a)(1). In Costco, the Board found the employer’s policy of prohibiting employees from electronically posting statements that damage the company, defame any individual or damage a person’s reputation to be unlawful because employees would reasonably construe this rule as one that prohibits Section 7 activity. The Board noted there is nothing in the rule to suggest that protected communications are excluded and no accompanying language that would tend to restrict its application. See Costco, slip op. at 1-2. In Knauz, the Board found the employer’s “courtesy rule,” which prohibited “disrespectful” conduct and “language which injures the image or reputation” of the employer, to be unlawful, because nothing in the rule or elsewhere in the employee handbook “would reasonably suggest…that employee communications protected by Section 7…are excluded from the rule’s broad reach.” See Knauz, slip op. at 1. Moreover, the Board notes that ambiguous employer rules – rules that reasonably could be read to have a coercive meaning – are construed against the employer. Id. at 2, citing Flex Frac Logistics, LLC, 358 NLRB No. 127, slip op. at 2 (2012). 13 13 In his dissent, Board Member Hayes argued that the majority departed from precedent, reaching its result by reading words and phrases in isolation and effectively determining that the Act invalidates any policy that employees conceivably could construe to prohibit protected activity, regardless of whether they reasonably would do so. In debunking this argument, the 8 Finally, a recent Advice Memo in The Boeing Company, 19-CA-088157 (February 28, 2013), issued after Costco and Knauz, reminds us of the importance of context. In Boeing, a “Code of Conduct” maintained as part of the Employer’s business ethics policy was found to be lawful because employees would not reasonably construe its potentially overbroad language to restrict protected concerted activities in the context of voluminous explanations and examples immediately following the Code. Again applying the Lafayette Park Hotel/Lutheran Heritage Village-Livonia analysis, the Advice Memo reminds us that “[t]he Board has cautioned against ‘reading particular phrases in isolation,’” and that potentially violative phrases must be considered in the proper context. Although some of the language of Boeing’s Code is troubling and seemingly at odds with the guidance from the General Counsel and the Board’s recent decisions, it is the context of the challenged policy within the broader framework of the Employer’s detailed Ethical Guidelines that saves Boeing’s Code. 14 2. Protected Statements vs. Disparagement, Defamation, or Worse a. Statements by Employees Under well settled Board law, statements that would otherwise be protected can lose the protection of the Act if they are intentional appeals to outsiders and constitute disloyalty, disparagement or defamation of the employer. See NLRB v. Electrical Workers Local No. 1229 (Jefferson Standard), 346 U.S. 464 (1953). Moreover, employees can lose protection if, during the course of otherwise protected activity, their conduct toward a supervisor is sufficiently egregious and undermines or disrupts shop discipline. See Atlantic Steel Company, 245 NLRB 814 (1976). 15 Social media conduct generally fares well under the Atlantic Steel analysis as the postings occur and exist outside the workplace in cyberspace and cannot, for the most part, be said to disrupt work or pose any kind of real threat. However, the more public nature of social majority points out that Lutheran Heritage Village does not stand for the proposition that an employer rule must be upheld if employees could reasonably construe its language not to prohibit Section 7 activity. Slip op. at 2-3. 14 The Advice Memo notes that the Union’s presence at the new employee orientation where the policy is presented to employees is a factor that would lead employees to believe that restrictions on use of Employer assets and information would not extend to employee communications with their Union representatives, although that fact alone would not save an overbroad or ambiguous policy. 15 Under Atlantic Steel, the Board considers the following four factors in determining if employee conduct forfeits protection: (1) the place of the discussion; (2) the subject matter of the discussion; (3) the nature of the employee’s “outburst”; and (4) whether the outburst was, in any way, provoked by an employer unfair labor practice. Atlantic Steel, 245 NLRB at 816. 9 media communications make them vulnerable to potential loss of protection under Jefferson Standard. Interestingly, there has been a slight shift in the traditional “loss of protection” analysis seen in Advice Memos and GC Reports resulting in using a “modified Atlantic Steel analysis” that incorporates relevant considerations from the Jefferson Standard test when analyzing social media communications. An in-depth discussion of this modified analysis can be found in in GC Report OM 12-31, issued January 24, 2012. 16 Because the traditional application of Jefferson Standard does not provide a suitable framework to analyze most Facebook postings – which are more analogous to a conversation among employees overheard by third parties than to an intentional dissemination of employer information to the public seeking support – an Atlantic Steel analysis seems more appropriate. Nevertheless, an Atlantic Steel analysis typically focuses on whether the communications would disrupt or undermine shop discipline, and presents some complications when applied to Facebook comments. See GC Report OM 12-31, at 24. Because the Atlantic Steel analysis does not usually consider the impact of disparaging comments made to third parties, OGC “decided that a modified Atlantic Steel analysis that considers not only disruption to workplace discipline, but that also borrows from Jefferson Standard to analyze the alleged disparagement of the employer’s product and services, would more closely follow the spirit of the Board’s jurisprudence regarding the protection afforded to employee speech.” Id. Applying Atlantic Steel to the case under discussion in the Report, the GC notes that the “location of the conversation” and “nature of the outburst” factors must be adapted to reflect the inherent differences between Facebook discussion and a workplace outburst. The GC notes that because the conversation was also viewed by a small number of non-employee members of the public, the impact of the posting on the employer’s reputation and business must be considered. In such a context, the GC notes, “the ‘nature of the outburst’ and ‘location’ inquiries of Atlantic Steel merge to require consideration of the impact of the fact that the discussion could be viewed by third parties.” Id. at 25. In the case under discussion, the GC ultimately felt that the language, while critical, was not defamatory or otherwise so disparaging as to lose protection of the Act. This modified analysis represents a significant leap – but where we will land is not exactly clear. We must wait to see whether the Board adopts this modified Atlantic Steel analysis or not. Either way, one thing is clear: The nature of social media activity and the potential impact of statements made in that realm are a challenge for those charged with ensuring 16 See also, Wolters Kluwer, OGC Advice Memo, NLRB Case No. 18-CA-64873 (Nov. 28, 2011)(applying modified analysis and finding no loss of protection); Detroit Medical Center, OGC Advice Memo, NLRB Case No. 7-CA-06682 (Jan. 20, 2012)(applying modified analysis and finding racially inflammatory and threatening posts to be unprotected, even though related to Sec. 7 concerns). 10 that the protections of the Act keep pace with advances in technology and the resulting changes in how employees discuss workplace issues. b. Protection For Unions – The Communications Decency Act and the Digital Millennium Copyright Act Workers are using social media tools to communicate with each other, and sometimes going to union forums to talk about workplace issues with co-workers. Unions are increasingly using company “watch” websites as part of so-called corporate campaigns, to expose information such as labor law violations, dubious business practices, and quality of care or health and safety issues, and encourage employers to respect the union and be more cooperative with employee demands. These campaigns are an important tool in new organizing to get employers to agree to card check and neutrality and in contract campaigns. Unions can be found liable for making defamatory remarks or engaging in product disparagement, claims often levied against unions’ corporate campaigns. Even so, unions can comment negatively on an employer’s product if the critique is true. As unions’ use of interactive online media increases, they have an even more important protection against liability for comments made by the public on their union websites: Sec. 230 of the Communications Decency Act. The Communications Decency Act (“CDA”) of 1996 was Congress’s response to the New York state court decision in Stratton Oakmont holding Prodigy liable to the plaintiffs as a publisher for allowing people to post defamatory material about Stratton Oakmont (and therefore subject to liability for defamation regardless of actual or imputed knowledge). Stratton Oakmont v. Prodigy Services, Inc., 23 Media L.Rep. 1974 (1995 LEXIS 229). Congress enacted the CDA to provide Internet Service Providers (“ISP”) a shelter from liability by preventing state law from treating the internet service provider as the “publisher” of any material it did not remove or of any online content posted by third parties. 17 Interpreted broadly, CDA precludes liability from third-party republication. In most cases, the CDA provides a union, as well as its lawyers, with a measure of comfort that a court will not hold the union liable for engaging in defamation when someone else writes a post on a union sponsored Facebook page or blog. The CDA states, in pertinent part, that “[n]o provider of or user of an interactive computer service shall be treated as a publisher or speaker of any information provided by another information provider.” 47 U.S.C. §230(c)(1). Practically speaking, in evaluating whether a court will find that a union is protected from liability under Sec. 230 a union lawyer should ask three questions. First, is the union an 17 Pete Kennedy, Symposium, The Internet and the Law: Internet Libel—the Anonymous Writer and the Online Publisher, 52 The Advocate 509 (2010). 11 interactive computer services provider? In other words, does the union own or sponsor the web page or blog? Second, is the union an information content provider with respect to the disputed activity? In other words, did the union draft the posting with the potentially defamatory content on the web site? Third, is an adverse party seeking to hold the union liable for information originating with a third party user (such as a worker, or an anonymous commenter)? Doe II v. MySpace Inc., 175 Cal. App. 4th 561 (Cal. App. 2d Dist. 2009). Generally, a union creating a website or Facebook site will not be responsible for the content that third parties put on the page. Courts have broadly construed subpart 230(c)(1) to preempt virtually all speech-based claims (not merely defamation) brought against interactive computer services or users for content created by others. The issue under 230(c)(1) is frequently, “whether a given defendant should be treated as an information content provider (in which the exemption is not available) or merely the publisher or speaker of information provided by another information content provider?” 18 The Fourth Circuit articulated the theme of Section 230: Taken together, these provisions bar state-law plaintiffs from holding interactive computer service providers legally responsible for information created and developed by third parties. Congress thus established a general rule that providers of interactive computer services are liable only for speech that is properly attributable to them. State-law plaintiffs may hold liable the person who creates or develops unlawful content, but not the interactive computer service provider who merely enables that content to be posted online. To further the policies underlying the CDA, courts have generally accorded § 230 immunity a broad scope. Nemet Chevrolet, Ltd. v. Consumeraffairs.com, 791 F.3d 250, 254-55 (4th Cir. 2009) (internal citations omitted). There is an important caveat to keep in mind when advising a union on how to create a web site that will maximize the protection afforded pursuant to Sec. 230 of the Act. Sec. 230 immunity does not apply to a website owner or publisher who solicited defamatory or inflammatory comments, or who knew or should have known that she or he was soliciting defamatory material. In certain heated contract campaigns, it is entirely possible for a union to use its website as a forum for engaging its members including encouraging members or potential members to post on the website. The problem is that employees using a union’s website to discuss matters concerning their working conditions or engage in mutual concerted activity may unwittingly make defamatory comments, and it is unclear what the union’s liability would be in such a situation. Workers may feel like they were invited by the union to make defamatory 18 Ian C. Ballon, E-Commerce & Internet Law: Treatise with Forms, 2d Ed. Volume 3, 37-49 (2009). 12 statements about their employer, and the union may think that the CDA would insulate them from liability. To that end, counsel for unions should review two new cases that have come out recently: Directory Assistant’s, Inc. v. Supermedia, Inc., 884 F.Supp. 446 (E.D. Va. 2012) and Jones v. Dirty World Recording, Inc., 840 F.Supp. 2d. 1008 (E.D. Ky. 2012). These cases provide fresh insight into how federal courts are deciding who is soliciting defamatory material, and reinforce the fact specific nature of inquiring whether a web site host solicited users to post defamatory comments on its website. In Directory Assistant’s, the Plaintiff alleged that that the Defendant’s emails containing links to websites such as RipOffReport.com and ScamInformer.com that contained negative and defamatory comments. The Plaintiff claimed that Supermedia’s emails containing links to such information were defamatory as well. Directory Assistant’s Inc., 884 F.Supp. at 447-48. The court rejected that argument. In dismissing the complaint, the court held that the act of emailing links, without editorial comment, without solicitation, and without further development of defamatory material, does not constitute the creation of new information or otherwise defeat Sec. 230 immunity. Id. at 453. The facts in Jones led the court in that case to arrive at a different conclusion. In that case, the Defendant ran a website called theDirty.com, a gossip site. A user posted comments about a Bengals cheerleader and her personal activities. The host of the website also replied to user comments, and in doing so announced his negative opinion about the plaintiff. See Jones, 840 F.Supp. at 1009-10. The court concluded in that case that the CDA does not insulate the publisher of theDirty.com from liability because he had an active role in soliciting defamatory information. Specifically, the court noted that the name of the website itself indicated that it was a website for posting salacious information. The court also noted that the publisher of the site decided which posts he would publish of the thousands he received a day in his email. Finally and most significantly, the court noted that the posting of his own commentary showed he was no mere publisher, but an information content provider. Id. at 1012. In the court’s opinions, these facts were sufficient to show that the proprietor of the website was soliciting defamatory material and not entitled to immunity under Sec. 230 of the CDA. Even though the courts have decided hundreds of CDA cases, the NLRA is just starting to grapple with the Communications Decency Act. In ACTU Local 1433 v. Veolia Transit, 28CB-078377, the ALJ held that the Communications Decency Act shielded the union for liability for comments placed by non-agent union members on the union’s Facebook page. In that case, union members on strike had made general threats against co-workers who refused to join the strike on the union’s Facebook page. The General Counsel took the position that the union had a duty to disavow any threats made on its Facebook way in a complete and thorough manner. The ALJ held that Section 230 of the Communications Decency Act immunized the union from 13 liability because the union acted solely as a publisher, and not an information content provider, nor did it encourage members to make threats. ALJ Decision at 8. The case is currently before on the Board on exceptions. This is a case union lawyers interested in social media issues should follow closely because it will give a sense of how the Board will address laws affecting internet usage and its relationship with the National Labor Relations Act. Also, counsel should familiarize themselves with the Digital Millennium Copyright Act (DMCA) and its safe harbor provisions. See 17 U.S.C. §512. The “Safe Harbor” may provide a union with immunity from liability when third parties post trademark or copyright infringing content on the union’s website. Specifically, 17 U.S.C. §512(c)(1) states: A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider— (A) (i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing; (ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or (iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material; (B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and (C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity. The DMCA’s safe harbor can be used as an effective tool for limiting trademark related risk when the union acts quickly in response to take down notices. Since the union cannot control what third parties put onto its website at all times, the DMCA insulates parties from liability who act quickly to address the harm whether the content is found to ultimately infringe on an employer’s trademark or copyright. It may be useful for union counsel to search for music videos of their favorite artists on YouTube. Most times the artists or their labels will send a “take down” notice to YouTube, and it will promptly take down the video, leaving a user with a notice that it has been taken down. Unions should have on their website an address and a email 14 link that will send any take down notices to the correct staff to deal with the issue in an expeditious matter. c. New Avenues of Attack against “Watch” Websites and Other Union Online Activity Even though there are new defenses that unions can take advantage of, employers are suing unions pursuant to other federal statutes. With the increasing use of “watch” websites there has come increased employer interest in new avenues of attack for use against unions. In 2009, the Cintas Corporation brought a Racketeer Influenced and Corrupt Organizations Act (“RICO”) suit against UNITE HERE and the Teamsters for their “Cintas Exposed” website, in addition to trademark claims under the Lanham Act. Cintas Corp. v. Unite Here, 601 F.Supp.2d 571 (SDNY 2009), aff’d No. 09-1287-cv, 355 Fed.Appx. 508 (2d Cir. Dec. 8, 2009). This website encouraged customers to check their invoices and contracts carefully, as well as generated complaint and cancellation letters to send to Cintas. The court found that the union’s actions did not rise to the level of extortion, required to prove the RICO claim, or trademark infringement, and dismissed the case. While the union website succeeded in the end, the case demonstrated a new and creative approach to attack online tools for organizing. Another, more successful attempt by an employer to get creative in blocking union activity arose recently in Pulte Homes v LIUNA, 2011 U.S. App. Lexis 15828 (6th Cir 2011). In that case, the union asked supporters and members to mass call and mass email Pulte Homes, the employer, to ask that it reinstate a union supporter. So many calls came in that Pulte’s email system and phone system shut down. Pulte sued LIUNA, alleging that its actions constituted a violation of the Federal Computer Fraud and Abuse Act (CFAA), and the District Court for Eastern Michigan dismissed the suit on the basis of the anti-injunction provisions of the NorrisLaGuardia Act. The Sixth Circuit, however, held that even though the call-in and mass emails by LIUNA members constituted Sec. 7 concerted activity arising out of a labor dispute, the independent federal remedy doctrine provided the courts with subject matter jurisdiction over the action. See Id. at *4-*5. The Court further held that neither Machinists nor Garmon preemption barred Pulte’s CFAA claim from moving forward. 15 TIME, PLACE, AND MANNER: PRACTICAL CONSIDERATIONS FOR USE OF SOCIAL MEDIA At a time when social media has helped organize protests and the US Government has announced that internet access is a fundamental human right, employees are still struggling over electronic rights at the workplace. Although the General Counsel’s office has been policing the implementation of social media policies for possible chilling of Section 7 rights in cases that – for the most part – do not implicate employer property rights, the Board’s decision in The Guard Publishing Company d/b/a The Register-Guard, 351 NLRB 119 (2007), continues to tie the General Counsel’s hands in situations that involve the use of an employer’s equipment and systems. Even though many unions have challenged Register Guard, the challenges continue forward. In determining what rights, if any, employees have to use social media for Section 7 purposes at work, using the employer’s equipment and systems, the Board’s decision in RegisterGuard poses a fundamental problem for employees because it gives employers the nearly unfettered right to restrict electronic access – indeed almost an affirmative right to interfere with Section 7 rights – absent a showing of discriminatory motive or disparate treatment of similar Section 7 activities. 1. The Register-Guard Saga The Board’s 3-2 decision in The Guard Publishing Company d/b/a The Register-Guard, 351 NLRB 119 (2007), dealt a blow to the exercise of Section 7 rights at the workplace in the context of e-mail communications. In Register-Guard, the company disciplined an employee, who was also the union president, for sending out solicitations and other e-mails about union business that the company claimed violated its policy on computer use. The majority held that employers have a basic property right in their e-mail systems, that employees have no statutory right to use the company’s e-mail system for Section 7 purposes 19 and that an employer does not violate the Act by maintaining a policy prohibiting the use of its e-mail system for all non-job-related solicitations, including Section 7 activity. The majority also adopted a new discrimination standard distinguishing between different types of non-work-related use, finding unlawful discrimination only where employers engage in 19 The majority noted that there was no contention that the employees rarely saw each other in person, communicate solely by electronic means, or that the use of e-mail had rendered traditional forms of workplace communication useless. Register-Guard, 351 NLRB at 1116. This argument would not hold true in many workplaces today. 16 disparate treatment of activities or communications of a similar character because of their union or other Section 7 status. Because the employer supposedly permitted personal e-mail solicitations but not e-mails soliciting support for any outside group or organization, and because the majority viewed the union as an outside organization,20 the majority determined that the employer’s enforcement of its policy was lawful with respect to two e-mails that constituted a solicitation for union support. Thus, under the majority’s reasoning, an employer can lawfully allow employees to use e-mail to send personal solicitations, while prohibiting employees from using e-mail to send union solicitations, as long as the employer bans solicitations on behalf of all types of organizations. The D.C. Circuit reversed in part, 21 holding that the company violated the Act by discriminatorily enforcing its non-solicitation policy, and remanded the case back to the Board for further consideration consistent with its opinion. See Guard Publishing Co. v. NLRB, 571 F. 3d 53 (D.C. Cir. 2009). Denouncing the discrimination standard enunciated in Register Guard, the Court called the majority’s rationale a “post hoc invention,” noting that the company had never made a distinction between personal and organizational solicitations and had included outside organizational solicitations only as an example of the category of “all non-job related solicitations” forbidden under its policy. The Court further noted that the disciplinary warning to the employee failed to invoke any difference between organizational and personal solicitations, and instead reprimanded her and told her to refrain from using the system for union/personal business. The Court also found that the only employee emails that had ever led to discipline were those union related e-mails involved in the case. The year after the Board’s decision in Register-Guard, but before the D.C. Circuit’s remand, the Office of The General Counsel issued a memorandum that gave an overview of its application of Register-Guard through the discussion of five specific scenarios. See Memorandum GC 08-07 (May 15, 2008). Although the outcomes in each case are fact-specific, the memo sets forth the following relevant principles: 20 The acting GC has taken the position that Register-Guard should be overruled and has stated continued adherence to GC positions previously articulated in Register Guard including the argument – ignored by the majority – that when employees communicate about protected, concerted activity, whether those communications mention a union or not, they are not working on behalf of an “outside organization” but are invoking their fundamental statutory rights. See General Counsel’s February 22, 2007 Responsive Brief to the Board at p. 3. 21 The Union petitioned for review solely of the Board’s finding that the discipline regarding two e-mails was lawful, not of the Board’s finding that the e-mails policy was lawful. 17 • • • If an employer permits employees to send non work related solicitations that include institutional, commercial solicitations, it cannot apply its internet policy to forbid employees from sending union solicitations. Where the motive for line-drawing is anti-union, the action is unlawful. Thus, an otherwise valid rule promulgated for anti-union reasons is unlawful. 22 Direct communications with management seeking improvements in working conditions do not constitute solicitation and cannot be prohibited under a no-solicitation policy. 23 In addition, a June, 2008 Advice Memorandum issued in the Uloop case, OGC Advice Memo, (21-CA-038223), made it clear that Employees have a Section 7 right to use an employer’s electronic communication system in situations where they cannot communicate by traditional means and would otherwise be entirely deprived of their Section 7 rights to communicate at work on their own time. Although the facts in Uloop were unusual in that the employees had no common workplace and were scattered throughout various states and campuses, work situations increasingly involve a comparable degree of isolation, rendering “traditional means” of communication difficult, if not impossible. For example, as a result of new technology employees are increasingly working in environments isolated from co-workers (i.e., cyber-commuting). Also, employees in certain industries (i.e., homecare) have similar isolation issues, particularly now that direct-deposit of paychecks is the norm and other HR and personnel functions and even routine meetings are often handled electronically. Moreover, the combination of work place pressures to produce and new desktop technologies have resulted in decreased physical mobility for employees at the workplace. There is, quite simply, no real opportunity to engage in “traditional means” of communication for many employees. Indeed, the concept of “traditional means” of communication needs to be revisited and updated to reflect today’s workplace reality, as recognized by the Board in its electronic notice posting decision J. Picini Flooring, 356 NLRB No. 9, slip. op. at 3 (Oct. 22, 2010). 24 On July 26, 2011 the Board finally issued a Supplemental Decision and Order on the Register-Guard remand on July 26, 2011, solely on the issue of whether the employer had violated 8(a)(1) and (3) by disciplining the union president/employee for sending the two union 22 See also the Advice Memo in Sears Holdings (Roebucks), OGC Advice Memo, Case 18-CA19081, discussing Lutheran Heritage Village, 343 NLRB 646 (2004). 23 In “case 4” Advice found that the Employer had not drawn a meaningful distinction between personal e-mails that it allowed and those that it prohibited, and that employee e-mails to management seeking improvements in terms and conditions of employment were more jobrelated than personal as they were not a call for action in support of an outside organization. 24 “We find that given the increasing prevalence of electronic communications at and away from the workplace, respondents in Board cases should be required to distribute remedial notices electronically when that is a customary means of communicating with employees or members.” 18 related e-mails to unit employees using the employer’s e-mail system in August 2000. The Guard Publishing Co. d/b/a The Register-Guard, 357 NLRB No. 27 (July 26, 2011). The Board found violations with respect to the discipline for both e-mails at issue. The appeal did not raise, and the remand did not include, the issue of the discrimination standard itself, so the Board did not address it. The General Counsel’s office had clearly recognized that the Register Guard issue was still problematic and unsettled and included all “cases involving the issue of whether employees have a Section 7 right to use an employer’s email system or that require application of the discrimination standard enunciated in Register Guard,” as part of the April 12, 2011 Memorandum GC 11-11, on Mandatory Submissions to Advice. To date the GC’s office is still reviewing all cases involving Register-Guard issues and will hopefully find an appropriate case to overturn Register-Guard and reinstate Republic Aviation as the controlling standard for determining the rights of employees to use the employer’s computer equipment and e-mail/internet systems to engage in otherwise protected Section 7 conduct. 25 2. Employee Privacy Rights and the Use of Employer Resources Beyond labor law, employees’ privacy rights provide important, though somewhat limited, protections against employer monitoring and surveillance. These rights come into play especially in the context of employee use of employer-provided technology. Employees who spend their days in front of an employer-owned desktop might spend part of that time on personal internet use; an employee’s “home” computer might actually be a work-issued laptop; an employer-provided BlackBerry or cell phone might be an employee’s only telephone, her camera, and her most-used conduit to Facebook, Twitter, Instagram and the internet. As employees’ social media usage – and their personal lives in general – increasingly involve the use of employer resources, the question of employees’ privacy rights becomes more and more important. While there is very little privacy law addressing employees’ use of social media for union purposes, case law governing the right of privacy in employer-provided resources raises interesting questions about what protections will be available as technology and usage evolves. For public employees, employer monitoring of an employee’s work computer may be evaluated in the context of the employee’s Fourth Amendment protections against unreasonable search and seizure. In O’Connor v. Ortega, 480 U.S. 709 (1987), the Supreme Court announced that “[s]earches and seizures by government employers or supervisors of the private property of their employees are subject to Fourth Amendment restraints.” Whether a particular search 25 Although the GC has apparently authorized complaints to issue on alternate theories including that Register-Guard should be reversed, to date none of these cases have been addressed by ALJs or discussed in posted Advice Memos. 19 violated the Fourth Amendment depended on an employee’s reasonable expectation of privacy, but that reasonableness depended largely on the “operational realities of the workplace.” Id. at 717. Office practices and procedures, as well as legitimate regulation, might therefore make some employees’ expectations of privacy unreasonable. Id. Given the importance of these operational realities, courts would need to address the question of the reasonableness of employees’ expectations of privacy on a case-by-case basis. Id. at 718. Although private employees have no such Fourth Amendment protections against employer monitoring, some employer searches may constitute the tort of invasion of privacy. Courts have applied tort law to physical searches of employees’ exclusive space. In Doe v. Kohn, Nast & Graf, 862 F.Supp. 1310 (E.D. Pa 1994), a law firm partner allegedly searched an associate’s desk and found a doctor’s letter about the associate’s treatment for AIDS. The court found that the intentional tort of intrusion upon seclusion – involving a defendant who knowingly and substantially invades the plaintiff’s privacy without legal authority to do so in a way that a reasonable person would find offensive – can apply to “a search of an employee’s workplace which is done in such a way as to reveal matters unrelated to the workplace.” Id. at 1326. Ultimately, the permissibility of monitoring employee use of work-issued technology tends to turn on whether the employee has a reasonable expectation of that privacy in that use. To determine whether such a reasonable expectation exists, courts often look to behavior of employers – such as adopting and giving notice of an unambiguous monitoring policy – and employees – for example, using a password-protected personal e-mail account rather than a work account. Some courts begin with a baseline view that employers have an absolute right to adopt policies regarding monitoring of their own technological resources. Finding no violation where an employer inspected an employee’s company-issued laptop, the Seventh Circuit announced that because the laptop was the employer’s property, the employer “could attach whatever conditions to [the laptop’s] use it wanted to. They did not have to be reasonable conditions.” After all, the Court reasoned, “the abuse of access to workplace computers is so common… that reserving a right of inspection is so far from being unreasonable that the failure to do so might well be thought irresponsible.” Muick v. Glenayre Elecs., 280 F.3d 741, 743 (7th Cir. 2002). In order to reserve the right of inspection, courts generally require employers to adopt unambiguous monitoring policies. See Leventhal v. Knapek, 266 F.3d 64 (2d Cir. 2001) (employee had a reasonable expectation of privacy in files stored on a work computer in the absence of a clear monitoring policy). Generally, once employees are given notice that the employer plans to exercise the right of inspection, their expectations of privacy are undercut. For example, in United States v. Mosby, 3:08-CR-127, 2008 U.S. Dist. LEXIS 56583 (E.D. Va. 2008), an employee had no such reasonable expectation when he acknowledged a detailed warning of the employer’s monitoring policy every time he logged into his work computer. See also United States v. Bailey, 272 F.Supp. 2d 822, 824 (D. Neb. 2003) (“an employer’s notice to 20 an employee that workplace files, internet use, and e-mail may be monitored undermines the reasonableness of an employee’s claim that he or she believed such information was private and not subject to search”). Given the broad power of employers to institute monitoring policies, courts have closely examined the content and wording of those policies when evaluating employees’ privacy claims. In Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010), the employer’s monitoring policy declared that e-mails “are not to be considered private or personal to any individual employee” but also acknowledged that “[o]ccasional personal use [of e-mail] is permitted.” Id. at 659. That ambiguity was a factor in the court’s decision that the employee had a reasonable expectation of privacy in privileged e-mails sent from a private account, even though she used an employer-provided computer. Id. at 663; see also National Economic Research Associates v. Evans, Mass L. Rptr. No. 15. 337 at 338-39 (Mass.Super.Ct. Sept. 25, 2006) (finding that where an employee manual “did not expressly declare, or even implicitly suggest, that [the employer] would monitor the content of e-mail communications made from an employee’s personal e-mail account via the Internet whenever those communications were viewed on an [employer]-issued computer” an employee’s expectation of privacy in those e-mails was reasonable). Moreover, even with unambiguous monitoring policies in place, employers may still create a reasonable expectation of privacy by providing employees with resources intended for their individual use. An employee might reasonably expect computer files to be private when they are stored on a computer in an office meant for that employee’s exclusive use. United States v. Ziegler, 474 F.3d 1184 (9th Cir. 2007). There may also be a reasonable expectation of privacy with respect to files stored in computer directories created by employers for an employee’s personal use. Haynes v. Office of the Attorney General, 298 F.Supp.2d 1154 (D.Kan 2003). Finally, employee behavior might also be a factor in determining whether an expectation of privacy is reasonable. In Stengart, 990 A.2d 650, even though the plaintiff employee used a company-provided computer to exchange messages with her attorney, she did so using a password-protected, personal, third-party email account, and the messages were clearly labeled as privileged; the New Jersey Supreme Court took all of those factors into consideration when finding that she had a reasonable expectation of privacy in those messages. The law on employer searches of employer-provided technological equipment is still developing. When it recently considered the question of an employer’s audit of an employee’s personal text messages, sent from an employer-provided pager during work hours but paid for by the employee and stored on a third-party server, the Supreme Court urged “caution before the facts in the instant case are used to establish far-reaching premises that define the existence, and extent, of privacy expectations enjoyed by employees when using employer-provided communication devices.” City of Ontario v. Quon, 130 S. Ct. 2619, 2629 (2010). Rather than set such precedent, the Court decided to look to “settled principles determining when a search is 21 reasonable.” Id. 2624. But given the potential for rapidly expanding use of social media on employer-provided technology, such settled principles may ultimately be inadequate to address conditions in the modern workplace. When considering employer searches of employee social networks, will courts follow Stengart and find that employees have a reasonable expectation of privacy in password-protected Facebook pages or restricted-access groups? Will employers be allowed to inspect GPS tags from pictures taken on or posted from employer-provided camera phones? As employees become ever more likely to use employer resources to access social media, courts may find themselves forced to take bold new steps in interpreting the law. BIG BROTHER AND SOCIAL MEDIA: IS YOUR EMPLOYER WATCHING YOU? 1. Cyber-Surveillance and Section 8(A)(1) A Division of Advice Memorandum issued in May 2010 presented the first case in which the Board has considered employer surveillance in the context of social media. See MONOC, OGC Advice Memo, NLRB Case No. 22-CA-29008 (May 5, 2010). In MONOC the employer disciplined a group of employees based on Facebook comments they made suggesting they did not provide appropriate medical care to patients. “Concerned co-workers” allegedly printed out copies of the statements and gave them to management. Advice determined that because the employer received the postings from other employees “without soliciting them” and informed them of that fact, it did not create the unlawful impression of surveillance. Also troubling is Advice’s naïve conclusion that because the employee restricted access on her Facebook page to her “friends” she could not “reasonably conclude that the Employer was directly monitoring her Facebook page.” The Advice memo in Buel, Inc., NLRB Case No. 11-CA-22936 (July 28, 2011) adds another layer to the Facebook surveillance picture. In Buel, the Charging Party had “friended” his supervisor, allowing the supervisor access to the Facebook conversation at issue. Advice said that by “friending” his supervisor, the employee “essentially invited her to view his Facebook page.” Since there was no evidence that the employer’s sole purpose for being on Facebook was to monitor employees, the standard Board law applies that “there can be no unlawful surveillance if the employer’s agent was invited to observe.” The Ninth Circuit has provided additional guidance in Konop v. Hawaiian Airlines, 302 F.3d 868 (9th Cir. 2002), a case involving the Railway Labor Act in which an employer gained access to a password protected website to view what its employees were saying. The Ninth Circuit noted there that employers are generally prohibited from engaging in surveillance or organizing activities, absent a legitimate justification. The court found no “principled distinction” between unlawful employer eavesdropping and the employer’s access of Konop’s secure website. This decision also reversed a lower courts’ grant of summary judgment against Konop on his claims 22 that the viewing of his website under false pretenses constituted interference with organizing activities. Although an employer may observe open union activity, it “may not do something ‘out of the ordinary’ to give employees the impression that it is engaging in surveillance of their protected activities.” Sprain Brook Manor Nursing Home, LLC, 351 NLRB No. 75 (2007). There are recognized limits to how an employer may monitor activities, even those that occur “in public.” In NLRB v. Collins & Aikman Corp., 146 F.2d 454, 455 (4th Cir. 1944) the court found that unlawful surveillance occurred when a supervisor spent hours every night watching union activities that occurred in a public space. The Board has found it unlawful even to create the impression of surveillance through the statement that “it’s an open secret that you’ve joined the union.” Daikichi Corp. d/b/a/ Daikichi Sushi, 335 NLRB 622, 623 (2001); see also Flexsteel Indus., Inc., 311 NLRB 257 (1993). While the Division of Advice recommended dismissal of portions of the MONOC charge dealing with unlawful employer surveillance, it may have been overly persuaded that no unlawful monitoring occurred because the employer had actual printouts of the Facebook posts allegedly given to it by an employee. The MONOC Advice Memorandum applies existing case law to social media in a way that may yet be helpful in curbing employer surveillance of employees on social media. Situation that have not yet been squarely addressed by the Board include situations where an employee is required as part of her job duties to utilize social media -- and then the boss uses his/her access to that information to violate the Act or where a boss requests to be “friends” with his employees on Facebook and uses the connection to determine that employees are forming a union. There are situations being reported now where employers are requiring applicants and employees to provide their passwords to protected sites. It remains to be seen how the Board and the courts apply existing 8(a)(1) case law to these new scenarios. 2. Statutory Protections Against Employer Surveillance – the Stored Communications Act Beyond labor law, employees have some statutory protections against employee monitoring of their online behavior. Foremost among these is the Stored Communications Act, part of the broader Electronic Communications Privacy Act, 18 U.S.C. §2501 et seq. The Stored Communications Act (“SCA”) prohibits unauthorized intentional access to “a facility through which an electronic communication service is provided” and creates a further offense when one “intentionally exceeds an authorization to access that facility; and thereby obtains, alters or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system.” 18 U.S.C. § 2701(a). Courts have found the SCA to apply to e-mail systems, blogs, and Facebook accounts. 26 26 See, e.g., United States v. Councilman, 418 F.3d 67, 79 (1st Cir. 2005) (e-mail); Hall v. EarthLink Network, Inc., 396 F.3d 500, 503 n.1 (2d Cir. 2005) (e-mail); Baily v. Bailey, No. 07 Civ. 11672, 2008 U.S. Dist. LEXIS 8565, 2008 WL 324156 (E.D. Mich. Feb. 6, 2008) (e-mail); 23 The SCA provides an important protection to bloggers and users of social media who post anonymously about their employers. A common response by employers to such anonymous postings is a defamation suit allowing the employer to issue subpoenas to learn a poster’s identity. The SCA, however, protects electronic communications services, including Facebook and Twitter, from divulging such records. Courts have found that "unauthorized private parties and governmental entities are prohibited from using Rule 45 civil discovery subpoenas to circumvent the Privacy Act’s protections.” In re Subpoena Duces Tecum to AOL, LLC, 550 F.Supp. 2d 606, 611 (E.D. VA 2008)(internal quotations omitted). The SCA’s protections are limited by some important exceptions. First, they do not apply to conduct authorized “by the person or entity providing a wire or electronic communications service.” 18 U.S.C. § 2701(c)(1). The SCA therefore cannot be used to prevent an employer from searching files stored on its own electronic systems. See Fraser v. Nationwide Mutual Insurance, 352 F.3d 107 (3d Cir. 2003) (rejecting a claim under the SCA when an employer inspected e-mails stored on its server). The SCA also excepts from its coverage conduct authorized “by a user of that service with respect to a communication of or intended for that user.” 18 U.S.C. § 2701(c)(2). While this exception might allow an employer to gain access to an employee’s e-mail or social networking account with the employee’s authorization, it does not give blanket permission for employers to make use of employee passwords in their possession. In Pietrylo v. Hillstone Restaurant Group d/b/a Houston’s, No. 06- 5754, 2008 U.S. Dist. LEXIS 108834 (D.N.J. 2008), employees of Houston’s restaurant created a MySpace group for coworkers to vent their feelings about their employer. Access to the group was restricted only to those invited to join, and those invitees could view the group’s comments only through their personal, password-protected MySpace pages. Upon learning about the group, a Houston’s manager requested the MySpace password of one of the employees; fearing adverse employment consequences, that employee divulged her password. Denying the employer’s motion for summary judgment, the court found that a password given under duress did not constitute authorization for the employer to access the MySpace group. Id. at 12. Konop limited § 2701(c)(2) upon a close examination of the word “user” as defined by the SCA. 302 F.3d 868. In Konop, an employee of Hawaiian Airlines established a passwordprotected employee blog. He created a list of employees with the right to log in and create passwords for themselves. One of those coworkers voluntarily allowed a manager to use his name to log into the system and create a password. Id. at 873. In the absence of duress, the court looked to the fact that the authorizing employee had not logged in before, and found that Konop, 302 F.3d 868 (9th Cir. 2002) (blog); Crispin v. Christian Audigier, Inc., 717 F.Supp.2d 965 (C.D. Cal. 2010) (social media websites); Juror No. One v. California, 2011 U.S. Dist. LEXIS 16834 (E.D. Cal. 2011) (Facebook). 24 because he had not yet used the blog, he was therefore not a “user” for the purpose of § 2701(c)(2). In a recent development, the Fifth Circuit found another exception to the SCA ban on access to facilities in Garcia v. City of Laredo, 702 F.3d 788 (5th Cir. 2012). In that case the Laredo police department accessed private text messages of the employee, an employee of the department, that it claimed violated various policies of the Laredo police department. On the basis of those emails, the department terminated the Plaintiff. The Plaintiff claimed that the police department’s action violated the SCA because the department had improperly and without authorization accessed a facility storing electronic information, namely, her cell phone. 5th Circuit held that the SCA’s protections do not apply to data stored in a personal cell phone. Specifically, the Court held that the definition of unauthorized access did not include personal devices, but only information stored with a communications facility. In other words, the Court held that the only information the SCA protects is information stored with the telephone company, etc. Id. at 792-93. Beyond the SCA, other federal and state statutes might provide protections for employees’ online activity. For example, both Delaware and Connecticut require employers to give notice before monitoring employees’ e-mail or internet access. See DE Code § 19-7-705; Gen. Stat. CT § 31-48d. Colorado and Tennessee require all public employers to adopt monitoring policies. See CO Rev. Stat. § 24-72-204; TN Code § 10-7-512. Addressing employer monitoring of employees’ online behavior outside of work, the Maryland legislature considered but ultimately did not adopt Senate Bill 971, which would have prohibited employers from requiring employees and applicants to divulge their online accounts and passwords, and would have made it illegal for employers to access those accounts without authorization. See Meg Tully, Status update: Bill would stop bosses’ prying in social media, Frederick News-Post (Mar. 9, 2011). Finally, as more and more states adopt statutes prohibiting cyber-bullying and cyber-stalking, it will be interesting to see how those laws will be used to protect employees’ privacy from employer intrusion, and anti-union coercion. CAN SPAM AND THE TCPA: TEXTING AND EMAILING UNION MEMBERS Just as unions have given significant attention to legal issues surrounding social media tools, they should also think about other telecommunication laws, especially as unions integrate social media platforms with other communication medium. Unions are not using only Facebook, Digg, Instagram, and Twitter, also integrating those technologies with text messaging and robocalling. Two main federal laws apply to the use of these technologies: the Controlling the Assault of Non-Solicited Pornography and Marketing Act (“CAN SPAM”) and the Telephone Consumer Protection Act (“TCPA”). 27 27 As briefly noted below, there may also be state laws within your jurisdiction that are applicable. 25 1. CAN SPAM CAN SPAM, 15 U.S.C. §7701 et seq. was passed in 2003. The Act was Congress’ attempt to address on a nationwide level the large amount of unwanted, deceptive and pornographic emails being generated by professional spammers, which were slowing down internet traffic and requiring Internet Service Providers to purchase additional equipment to handle the onslaught. Id. at §7701. CAN SPAM, by its terms, preempts state laws which regulate electronic commercial messages, except those state laws which attempt to regulate “falsity or deception” in electronic messages. 15 U.S.C. §7707(b)(1). It does not preempt state laws that do not specifically target electronic messages—such as privacy and tort claims, or fraud or computer crime laws or causes of action. Id. at § 7707(b)(2). See also Gordon v. Virtumundo, Inc., 575 F.3d 1040 (9th Cir. 2009). a. Applicability to Labor Unions CAN SPAM applies to two types of e-mail messages, “commercial electronic mail messages” and “transactional or relationship messages.” A commercial message is any electronic message “the primary purpose of which is the commercial advertisement or promotion of a commercial product or service.” 15 U.S.C. §7702(2)(A). Transactional messages are expressly excluded from the definition of commercial messages. Id. at §7702(2)(B). In general, a transactional email is a message which provides information (such as warranties, notifications, or confirmations of a purchase) about a completed commercial transaction or commercial relationship. Id. §7702(17)(A). Importantly, a “transactional message” also includes an email to “provide information directly related to an employment relationship or related benefit plan in which the recipient [of the email] is currently involved, participating, or enrolled.” Id. at §7702(17)(A)(iv). A message can be a mix of commercial, transactional, or other content. Under the statute, a message is primarily commercial if: a) a reasonable person reading the subject line of the email would believe that it contains commercial content; b) the transactional elements of the message do not appear at the beginning of the body of the message; or c) a reasonable reader of the entire message would conclude that the message is a commercial advertisement or promotion. 16 C.F.R. 316.3(2) and (3). A message is considered “transactional” only if the content is exclusively transactional. Id. at 316(3)(b). 26 Although, CAN SPAM mainly regulates commercial speech (see 16 C.F.R. 316.3) and does not appear apply to labor unions, as any communications would presumably be transactional, the limited case law available has found otherwise. Aitken v. Communications Workers of Am., 496 F. Supp. 2d 653 (E.D.VA 2007), concerned the application of CAN SPAM to emails sent by CWA organizers during an organizing campaign. After Verizon, which had a unionized workforce, purchased MCI, which was non-union, two organizers created fake email addresses for Verizon supervisors and sent out a series of emails under these email addresses to the MCI employees. Id. at 657. The emails urged the MCI workers to join the union and contained information about the unionized workers wages, benefits and job security. Id. The emails contained no disclaimers, no way for workers to unsubscribe, and the majority of the emails did not identify either the real senders of the emails or the physical address of the union. Id. at 657-58. Although the Court acknowledged that CAN SPAM regulates only commercial speech within the meaning of the First Amendment, it found that the emails sent by the organizers during the organizing campaign were commercial speech within the meaning of the Act because they were “in essence, a sales pitch for union representation along with CWA contact information,” and found that the emails were commercial messages. Aitken, 496 F. Supp. 2d at 663-664. But see Nyak Hosp. v. Moran, 2010 U.S. Dist. LEXIS 111651 (S.D.N.Y. 2010) (dicta indicates that communications between unions and members are likely transactional, not commercial). Further, while the Court recognized that speech during organizing campaigns typically receives some protection, because the emails in Aitken were misleading they were not protected by the First Amendment. Aitken, 496 F. Supp. 2d at 664-665. b. Requirements 1) Email CAN SPAM requirements differ depending on whether the email message is commercial, transactional or a mix of commercial and transactional. 2) Requirements for both Commercial and Transactional Emails 27 Companies and individuals are prohibited from sending either commercial or transactional messages which contain materially misleading or false information or “header information.” 28 15 U.S.C. §7704 (a)(1). 3) Additional Requirements for Commercial Emails More stringent requirements apply to the transmission of commercial email messages, whether they are wholly or partially commercial. Commercial messages may not have deceptive “subject” headings. 15 U.S.C. §7704(2). In addition, for every commercial email message that is sent, the sender must maintain, for at least thirty (30) days, either a functioning return electronic email address (i.e. the recipient could reply back to the email that was sent), or there must be an internet-based mechanism that is “clearly and conspicuously displayed,” which permits email recipients to opt-out of future email messages. Id. at § 7704(3). In addition, each commercial email that is sent out must contain a “clear and conspicuous” notice that the email is a commercial solicitation and a notice that the recipient may unsubscribe from additional messages. 15 U.S.C. §7704(5). Moreover, each email sent must contain the physical address of the union at the bottom of the message. Id. If the recipient of the email has given the union prior affirmative consent to receive emails, the email message does not need to contain the notice that the email is a commercial solicitation. Id. at §7704(5)(B). Finally, if a member unsubscribes from receiving either text or email messages, a union is required to remove his cell phone and/or email address from the list of individuals it emails or texts within ten business days. 15 U.S.C. §7704(4). The transmission of additional emails or texts after ten business days to an individual who has opted out is unlawful, unless the union later receives affirmative consent that the individual would like to again receive emails or texts. Id. A union cannot charge people to unsubscribe. 16 C.F.R. 316.5. Liability is not limited to the entity who physically sends the offending email, but to anyone who procures the origination of the email. 15 U.S.C. §7702(9); FTC v. Phoenix Avatar, LLC, 2004 U.S. Dist. LEXIS 14717 (N.D.IL 2004). c. Messages to Wireless Devices CAN SPAM provides that its requirements should be extended include text messages to mobile phones. See 15 U.S.C. §7712 (directing the FCC to promulgate regulations to extend CAN SPAM requirements to mobile phone messages). In 69 FR 55765-01, the FCC issued 28 A header is the “source, destination, and routing information attached to an electronic mail message, including the originating domain name and originating electronic mail address and any other information that appears in the line identifying, or purporting to identify, a person initiating a message.” 28 rules implementing 47 C.F.R. Part 64 (“2004 Rules”). Included within CAN SPAM coverage are electronic mail messages that have a “unique electronic mail address that includes a reference to an Internet domain” and are “designated by carriers specifically for mobile service messaging, “which includes internet-to-phone SMS messages. Id. The comments to the 2004 Rules clarified that Section 14 of CAN SPAM does not include phone-to-phone wireless messages, although these messages are covered by the TCPA. The 2004 Rule flatly prohibited all commercial messages to wireless devices, unless the sender had obtained express prior authorization. Id.; 47 C.F.R. § 64.3100(a)(1). The sender has the burden to establish that it has obtained consent, and authorization may be obtained orally, or in writing, including electronically. Id.; 47 C.F.R. § 64.3100(d) All authorizations must specify the number to which messages can be sent and contain the recipient’s signature. Authorizations obtained orally must be reasonably subject to verification, and all authorizations must be affirmative, contain clear disclosures, and the recipient must be able to reply to a request for authorization without an additional cost. Id. Finally, much like email authorizations, subscribers to wireless messages must be able to unsubscribe at any time, and without additional cost. 47 C.F.R. § 64.3100(b). d. Penalties and Safe Harbors Damages under CAN SPAM are calculated by multiplying the number of violations by the penalty amount. 15 U.S.C. §7706. The statutory damages range between $25 per email up to $250, with caps from one million to two million dollars; attorneys’ fees and costs are also recoverable. Id. For aggravated violations, treble damages may also be awarded over and above the caps. Id. However, some damages may be reduced if “the defendant has established and implemented, with due care, commercially reasonable practices and procedures designed to effectively prevent such violations.” Id. at §7706(3)(D). 2. TCPA Another law that labor unions should be aware of is the Telephone Consumer Protection Act, as it may impact labor union operations in certain circumsntances. e. Text Messages and Emails The TCPA is codified at 47 U.S.C. §§227 et seq. Pursuant to the TCPA, no entity may “initiate any mobile service commercial message” (“MSCM”) unless it has the “express prior authorization” of the recipient. 47 C.F.R. §64.311(a)(1). 29 The 2004 Rules clarified that MSMC under the TCPA included both internet-to-phone and phone-to-phone messaging. 29 There are certain exceptions to this requirement, not applicable here. 29 1) Requirements Commercial electronic mail messages are defined by reference to the CAN SPAM, so Aitken likely has bearing on TCPA claims. 47 C.F.R. §64.311(c)(2). In order to send a commercial message, a union must include a functioning email address or other internet-based way that allows a recipient to stop receiving texts or emails, which is free of charge to the member and that remains in service for at least thirty days after any message is sent. Id. §64.311(b)(2), (4) and (6). Any message sent must also allow the recipient to reasonably identify from whom or where the message was sent. Id. §64.311(b)(5). When creating the opt-out mechanism, after a person has chosen to opt out, a union must cease sending further messages within ten days after the request, and the opt out mechanism itself cannot generate further commercial messages. Id. at §64.311(b)(1) and (2). If a union intends to gather emails and text messages via electronic means, it must permit members to unsubscribe by the same electronic means by which they signed up. 47 C.F.R. §64.311(b)(3). 2) Authorizations Express prior authorization may be obtained by written (including electronic) or oral means. 47 C.F.R. §64.311(d). For the written authorization to be valid, the subscriber must provide his signature (or electronic equivalent). Id. at §64.311(d)(1). All authorizations must permit the subscriber to identify the specific address(es) to which emails or texts may be sent. Id. at §64.311(d)(2). In addition, the authorization applies only to the specific entity that is named in the authorization. Id. at §64.311(d)(3). All text message authorizations must contain the following notices: a) that the subscriber agrees to receive messages from the entity; b) that the subscriber may be charged for by their wireless provider for receipt of the messages; and c) that the subscriber can revoke their authorization at any time. 47 C.F.R. §64.311(d)(5). The notices must be sufficiently large and legible and be presented separately from other authorizations; if a union chooses to translate the authorization, the entire authorization must be translated. Id. at §64.311(d)(6). f. Robocalls TCPA also regulates the use of automated telephone equipment, also known as “robocalls.” With the 2012 election and increasing reliance on cellphones, restrictions on robocalling have been the topic of recent litigation and FCC advisories. The TCPA forbids a 30 union from knowingly robocalling cellular telephone numbers, 47 U.S.C. §227(b)(1)(A)(iii), however, regulations clarify that, where a union has express consent, robocalling cellular telephones is permitted. 47 C.F.R. §64.1200(a)(iii) and (iv). A union may robocall a home telephone number, even without express consent if it is a tax-exempt non-profit organization, 47 C.F.R. §64.1200(a)(2)(v), or if it has the recipient’s express consent. Id. at §227(b)(1)(B). In February 2012, the FCC issued rules concerning telemarketers and robocalling. While the rules are inapplicable here, the comments attached to the rules clarified that express permission for non-telemarketing informational robocalls may be obtained by oral, written or electronic means. FCC 12-21, “Report and Order.” Robocalls must identify who is calling at the beginning of the message and at some point during or at the end of the message, must provide a telephone number where the entity can be contacted. 47 U.S.C. §227(d)(3); 47 C.F.R. §64.1200(b)(2). Importantly, states have also passed laws placing restrictions on autodialers that are more restrictive than the TCPA. For example, in New York, all telephone calls to a “consumer” using an autodialer must state the “nature of the call” at the beginning of the robocall and identify the name of the person making the call, and include the entities address and telephone number at the end of the call. NY CLS Gen Bus §399p. Accordingly, it is prudent to check state laws to see if there are additional restrictions on robocalling in a particular jurisdiction. In September 2012, the FCC issued an enforcement advisory concerning robocalls under the TCPA. 30 The advisory emphasized that, with limited exceptions, all robocalls to wireless devices must have express prior authorization. The advisory also stressed the identification requirements for prerecorded calls. Finally, the FCC clarified that requirements concerning robocalls apply to all calls made from equipment with the “capacity to dial numbers without human intervention, whether or not the numbers called actually are randomly or sequentially generated or come from calling lists.” Finally, to date, there is one case applying the TCPA restrictions on robocalling to a labor union, Ashland Hospital Corp. v. SEIU, District 1199, 195 LRRM 2077 (6th Cir. 2013). In Ashland Hospital, two labor unions orchestrated robocall campaigns where they used autodialed, pre-recorded messages to contact private residents, offering to connect them to hospital personnel to express concern over the hospital’s treatment of its workers. Id. at 2. If a resident wished to be connected, she pressed “1” and was redirected to a direct extension at the hospital, where she could speak directly with a hospital representative. Id. at *2-3. Although the prerecorded calls did not have prior authorization from residents, identify who the robocalls were from, or contain a phone number or address for SEIU, the robocalls generated hundreds of “live calls” to the hospital. Id. at *3-4. 30 http://www.fcc.gov/document/political-campaigns-restrictions-autodialed-prerecorded-calls. 31 The hospital sued, alleging inter alia, that SEIU had initiated robocalls without prior express consent and that it had “failed to comply with identification and disclosure requirements” of the TCPA Id. at *4-5. Both the district court and the Sixth Circuit found that the TCPA did not apply to the hospital’s complaint—that SEIU did not robocall the hospital. Rather, SEIU robocalled residents, and then facilitated the residents live calls to the hospital. Id. at *9-12. The court found that the facilitation of live calls is not, even if it is a result of an automated message, regulated by the TCPA. Id. at *14-17. Furthermore, the hospital did not have standing to enforce the TCPA’s identification and disclosure requirements—only government agents have such standing. Id. at *17-20. Importantly, in examining the calls made to residents, the Sixth Circuit found that calls made by SEIU were for a non-commercial purpose. Id. at *18-19. As of late March 2013, the hospital has applied for reconsideration by an en banc panel of the Sixth Circuit. g. TCPA Private Right of Action and Damages The TCPA provides for a private right of action for certain claims. 47 U.S.C. §227(b)(3). A person may seek to enjoin any further transmissions, recover actual monetary loss, or receive $500 per violation, whichever is greater. Id. at §227(b)(3)(A) and (B). If an entity is found to be a willful violator, the damages may be trebled. Id. at §227(b)(3)(C). In addition, the TCPA expressly does not preempt state laws. 47 U.S.C. §227(e). Federal courts do have exclusive jurisdiction over TCPA claims. Id. at §227(f)(2). Additional Text Messaging Restrictions In addition to legal restrictions, internal guidelines concerning text messaging must also comply with CTIA (the International Association for the Wireless Telecommunications and MMA (Mobile Marketing Association) Industry), http://www.ctia.org, http://www.mmaglobal.com requirements. THE SMALL PRINT: OTHER REGULATORY CONCERNS Another potential pitfall for online activity comes not from the employer, but from federal and state regulators; rather than relating to a site’s main content or user comments, these regulations focus on a website’s small print. The California Online Privacy Protection Act of 2003, Cal. Bus. & Prof. Code § 22575 et seq. requires that these privacy policies be conspicuously posted. 31 California requires that the privacy policy identify the information 31 California Online Privacy Protection Act of 2003, CAL. BUS. & PROF. CODE § 22575 et seq. (2007); see also JONATHAN D. HART, INTERNET LAW: A FIELD GUIDE 349 (5th ed. 2007). 32 collected by the site, identify any third persons with whom the info may be shared, describe any process by which a consumer may review or change collected information, and describe the process by which the site operator will notify consumers of policy changes. 32 Because the statute covers any website that collect personally identifiable information (PII) from consumers “who reside in California,” all websites are effectively covered by the statute and must therefore include privacy policies. 33 While California law states that essentially every website is required to have a privacy policy, federal law provides the Federal Trade Commission (FTC) with the authority to take action under § 5 of the Federal Trade Commission Act (§ 5) to insure that a company follows its stated privacy policy. Section 5 declares that unfair methods of competition and unfair or deceptive acts or practices are unlawful. 15 U.S.C. § 45. The FTC considers that a company not following its own privacy policy is an unfair or deceptive act. The following are key facts from recent FTC complaints against companies who violated their own online privacy policies: In June 2010, the FTC entered into a settlement agreement with Twitter over violations to its privacy policy. Twitter’s policy stated: “Twitter is very concerned about safeguarding the confidentiality of your personally identifiable information. We employ administrative, physical, and electronic measures designed to protect your information from unauthorized access.” However, after several hacker attacks on the company, the FTC found that Twitter had not taken reasonable precautions to protect its system and user’s information as it said it would. Similarly, in March 2011 the FTC entered into a settlement with Google over the launching of its “Buzz” social network. The complaint alleged that Google’s privacy policy for its existing email services stated: “When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use.” FTC claimed that Google violated its policy by using information provided for its email service for its social networking product without first obtaining consumers’ permission. 32 CAL. BUS. & PROF. CODE § 22575. 33 Id. § 22576. See also Allyson W. Haynes, Online Privacy Policies: Contracting Away Control Over Personal Information, 111 PENN ST. L. REV. 587, 601 n.82 (2007) (noting that operators must either generally abide by the California statute, forbid use by California residents, maintain a special policy for California users, or “go through the trouble of finding out where the consumer resides” before collecting any information). But see Doe v. Network Solutions, LLC, No. 07-5115, 2008 U.S. Dist. LEXIS 7397 (N.D. Cal. 2008) (upholding defendant website operator’s forum selection clause, naming Virginia, notwithstanding the fact that the choice of law provision would preclude plaintiff’s recovery under California’s privacy statute). 33 Additionally, the FTC falsely claimed that it was collecting personal information in accordance with the US-EU Safe Harbor privacy framework. The FTC also entered into a settlement agreement with Facebook over violations of its privacy policy. The FTC found several violations of Facebook’s policy, primarily that Facebook: • • • • • • changed its website so that user’s previously private information was made public without user warning or approval as required under the policy. represented that third-party applications would only have access to a user’s personal information that the application needed to operate, when in fact applications had access nearly all of a user’s personal data. represented that users could limit access to their personal information to their “Friends,” when in fact third-party applications that their “Friends” used also had access to the information. falsely claimed that it certified the security of certain applications. falsely claimed that it would not share their personal information with advertisers. falsely claimed that when users deactivated or deleted their accounts that their information would be inaccessible. While the claims against these companies were never adjudicated, they serve to underscore the importance of handling private information. Unions are using their website to collect information from members and potential members, and they should ensure that their privacy policy correctly describes how they use information and track web usage in order to comply with both the California Online Privacy Protection Act and the Federal Trade Act. CONCLUSION The Board’s recent social media decisions, GC Reports on social media cases and the Board’s own presence on Facebook and Twitter has made practitioners hopeful that the agency – once accused of being the Rip Van Winkle of administrative agencies - finally “gets it” and that the future of electronic and cyber Section 7 activity is in good hands. Social Media sites have clearly become the new water cooler, around which employees “gather” and discuss workplace issues. But there are problems with this analogy. For example, there still is no cyber-equivalent to employees gathered around a water cooler listening to a co-worker speak about a workplace issue. Just because employees do not comment on a post about a workplace issue does not mean that they were not listening and considering joining with their co-worker(s) in addressing the topic of the post – a first step toward concerted action. “Liking” has been found to be concerted activity by an ALJ but the Board has yet to decide this issue. And what about “sharing” and “retweeting” by employees? Do these reflect a first step toward concerted action? 34 In many ways the Board’s application of Section 7 law surrounding traditional fora may not sufficiently account for the realities of the online world, leading to permutations of traditional analyses such as that seen in the modified Atlantic Steel analysis discussed earlier. As the Board deepens its familiarity with, and understanding of, the ways in which employees and unions use new technologies and social media to communicate about Section 7 matters, it will need to be flexible and creative in its application of precedent grounded in traditional forms of communication to ensure the continuing vitality of Section 7 rights in lives of new generations of workers. In similar fashion, counsel for labor unions will have to adopt and think about a myriad of new legal issues. Unions also will have to consider how laws meant to regulate the online behavior of tech giants regulate their behavior and their engagement with workers. Unions will also have to adapt to laws about online privacy, email communications, and robocalling. Luckily, a lot of these laws do not apply once the union obtains consent. A union’s success in navigating these laws will hinge on the same things that have served as hallmarks of trade unionism: worker engagement and effective organizing. 35
© Copyright 2026 Paperzz