Striking a Balance Between Employer Business Interests and Employee Privacy: Using Respondeat Superior to Justify the Monitoring of Web-Based, Personal Electronic Mail Accounts of Employees in the Workplace by Micah Echols* I. INTRODUCTION Electronic mail (“e-mail”) is a convenient and financially beneficial tool in the workplace.1 Although businesses that take advantage of e-mail have experienced many benefits, these same businesses also face a number of disadvantages. One such disadvantage is the legal liability that employers may face—under a vicarious liability theory—for the e-mail-related actions of their employees.2 Due to this exposure, nearly eighty percent of employers have turned to various methods of monitoring their employees, including direct e-mail monitoring.3 Traditionally, this type of monitoring has been limited to company, proprietary e-mail accounts, in which courts have routinely held that an employee has no reasonable expectation of privacy.4 In response to the lack of privacy afforded company e-mail accounts, many employees choose to conduct their personal affairs via web-based, personal e-mail accounts that are typically available through Internet access provided by the employer.5 But web-based accounts may not isolate an employer from liability; most companies, therefore, seek the ability to monitor webbased, personal e-mail accounts as well. Recent developments in monitoring technology available to employers allow for the monitoring of most web-based, personal e-mail accounts, such * Mr. Echols is currently serving as the Judicial Clerk for the Honorable Sally Loehrer, District Judge, Eighth Judicial District (Clark County), Las Vegas, Nevada for the 2003–2004 term. He received his law degree earlier this year from the J. Reuben Clark Law School at Brigham Young University. 1. See Dennis Dorman, Email Overload; Some Solutions; Industry Trend or Event, 4 INTELLIGENT ENTERPRISE, May 24, 2001, at 14. 2. See, e.g., Booker v. GTE.Net LLC, 214 F. Supp. 2d 746, 750 (E.D. Ky. 2002) (finding the employer not liable for the acts of two employees committed on an e-mail account, but referring to the finding as a “close call”). 3. American Management Association, 2001 AMA Survey: Workplace Monitoring & Surveillance: Summary of Key Findings, 2001, available at http://www.ama net.org/research/pdfs/ems_short2001.pdf (last visited Mar. 12, 2003). 4. See discussion infra Part III.A. 5. See Bob Sullivan, Who’s Spying on My Hotmail?, Aug. 28, 2002, available at http://www.msnbc.com/news/800409.asp (last visited Feb. 19, 2003). 274 Computer Law Review and Technology Journal [Vol. VII as “Hotmail” and “Yahoo!”.6 Nevertheless, the same criteria that courts use to uphold the employer monitoring of employee e-mail accounts on company, proprietary systems will most likely have the opposite effect on the monitoring of web-based, personal e-mail accounts.7 As a result, controversy remains regarding an employer’s possible liability for employees’ activities on web-based, personal e-mail accounts that cannot be legally monitored. This Article proposes that if courts use a respondeat superior approach, employers will be able to legally take advantage of the new technology and justifiably monitor employees’ web-based e-mail accounts when they are used in the workplace. To explore the issue presented, Part Two will provide the relevant background, an explanation of how e-mail accounts work, and the perspectives of both employer and employee. Part Three will present four cases discussing the analysis courts have applied to the monitoring of employee e-mail in the workplace on company, proprietary e-mail accounts. Part Four will analyze issues related to web-based, personal e-mail accounts, such as new monitoring technology, the traditional privacy analysis as it relates to the new monitoring technology, and the respondeat superior approach to the issue of employer monitoring of employees’ web-based, personal e-mail accounts in the workplace. Part Five will comment on methods through which employer and employee can maintain their respective positions while avoiding conflicts. Part Six will argue that clear guidelines should be adopted for e-mail monitoring, and that those guidelines should balance the interests of employers and employees. II. BACKGROUND A. Statutory Background 1. Federal Wiretap Act8 The Federal Wiretap Act applies to wire communications, which are defined as follows: any aural transfer made in whole or in part through the use of facilities for the transmission of communications by the aid of wire, cable, or other like connection between the point of origin and the point of reception (including the use of such connection in a switching station) furnished or operated by any person engaged in providing or operating such facilities for the transmission of interstate or foreign communications or communications affecting interstate or foreign commerce.9 6. See id. 7. See id. 8. 18 U.S.C. §§ 2510–2522 (2000). 9. Id. § 2510(1). 2003] Striking a Balance 275 The Wiretap Act makes it illegal to intentionally intercept or attempt to intercept any wire communications.10 But the Act allows exceptions either when a person is a party to the conversation or when at least one party to the conversation has consented to interception, provided that, in either case, the interception is not in violation of law.11 2. Electronic Communications Privacy Act12 The Electronic Communications Privacy Act amended the Federal Wiretap Act to include electronic communications, which are “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce.”13 The Electronic Communications Privacy Act allows an exception for providers of such electronic communications “to record the fact that a wire or electronic communication was initiated or completed in order to protect [that] provider.”14 3. Stored Communications Act15 The Stored Communications Act makes it unlawful for a person to intentionally access, without authorization, a facility through which an electronic communication service is provided, or to intentionally exceed an authorization to access that facility and thereby obtain, alter, or prevent authorized access to the communication while it is in storage in the system.16 The Stored Communications Act carves out two liability exceptions: one for the person or entity providing the communication service17 and another for 10. Id. § 2511(1)(a). 11. Id. § 2511(2)(d). 12. Pub. L. No. 99-508 (Oct. 21, 1986). Recent case law acknowledges that the Electronic Communications Privacy Act was written prior to the advent of the Internet and the World Wide Web and, therefore, until Congress brings the laws in line with modern technology, protection of the Internet and other electronic communications will remain a confusing and uncertain area of the law. See Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 874 (9th Cir. 2002). 13. 18 U.S.C. § 2510(12) (2000) (The statute provides the following exceptions from the definition of “electronic communications”: (1) any wire or oral communication; (2) any communication made through a tone-only paging device; (3) any communication from a tracking device; or (4) electronic funds transfer information stored by a financial institution in a communications system used for the electronic storage and transfer of funds). 14. Id. § 2511(2)(h)(ii). 15. 18 U.S.C. §§ 2701–2711 (2000). 16. Id. § 2701(a)(1)–(2). 17. Id. § 2701(c)(1). 276 Computer Law Review and Technology Journal [Vol. VII users of the service with respect to their own communications or those intended for them.18 4. USA PATRIOT Act19 In response to the terrorist attacks of September 11, 2001, Congress enacted the USA PATRIOT Act. This Act amended both the Federal Wiretap Act and the Stored Communications Act by liberalizing governmental power to search wire, stored, and electronic information.20 In terms of the scope of this paper, this Act is mentioned only to note that privacy in electronic mail is generally being diminished in the public sector, a trend that will eventually have repercussions in the private sector. B. E-mail Accounts 1. Company, Proprietary E-mail Accounts Company, proprietary e-mail accounts are for internal company communications and for communication with a company’s clients. Such accounts are installed on a network using an e-mail program such as Microsoft Outlook or Novell GroupWise. The company network is wired through a company server, to which the employer has complete access.21 Every e-mail that is sent or received on the company proprietary e-mail account is stored on the company server, regardless of whether the employee deletes and purges the 18. Id. § 2701(c)(2). 19. Pub. L. No. 107-56 (Oct. 26, 2001) (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act). The USA PATRIOT Act amended the Electronic Communications Privacy Act, giving less protection to stored electronic communications such as voice-mail. See H.R. Rep. 107-236(I), at 54 (2001). This amendment memorializes the view courts have adopted with respect to e-mail—that the wiretap statutes are violated only when the communication is intercepted simultaneous to the transmittal. See, e.g., Steve Jackson Games, Inc. v. United States Secret Serv., 36 F.3d 457, 458 (5th Cir. 1994). 20. One of the tools authorized and developed under this Act is the FBI’s DCS1000, commonly known as Carnivore. Carnivore is a computer program that allows the FBI to monitor the content of e-mails by attaching to an Internet Service Provider. See Marcia Coyle, Debating the Intrusive Teeth of a “Carnivore”, 24 NAT’L LAW J., Oct. 15, 2001, at A9; see also Congress Must Attach a Leash to Carnivore, SAN JOSE MERCURY NEWS, Jan. 3, 2002 (commenting on the new FBI technology, “Magic Lantern,” which can bypass encrypted e-mail by secretly recording a suspect’s keystrokes). See generally Manton M. Grier, Jr., The Software Formerly Known as “Carnivore”: When Does E-mail Surveillance Encroach Upon a Reasonable Expectation of Privacy?, 52 S.C. L. REV. 875 (2001). 21. See Bohach v. City of Reno, 932 F. Supp. 1232, 1234 (D. Nev. 1996) (“E-mail messages are, by definition, stored in a routing computer.”). 2003] Striking a Balance 277 e-mail from his individual computer.22 Additionally, the employer has unfettered access to the stored e-mails in the folders of any employee e-mail account on the company server, even if the employee has protected his folders by password.23 Since the company network is by definition a restricted network, Internet access from another network and another server, such as from an employee’s home Internet Service Provider, will not provide access to the company proprietary e-mail account unless the company specifically creates a parallel web-based, company e-mail system for the purpose of allowing employees to communicate company business from their residences without extending the network to all of their houses.24 2. Web-based, Personal E-mail Accounts Web-based, personal e-mail accounts of employees are accessible through the Internet. If an employer provides Internet service through its company server, the employee may access a web-based e-mail account from a workplace terminal. One significant difference between the company, proprietary e-mail account and the web-based, personal e-mail account is that emails sent and received on the web-based account are not automatically stored on the company server. But a history of websites visited by the employee is stored on the company server. Moreover, the e-mails sent and received from the web-based account are stored on the server of the Internet company; e-mails sent and received on a Hotmail account, for example, are stored on the Hotmail server. But because the employer provides the Internet access, the employer has the ability to block whatever websites it wishes, thereby blocking employee use of web-based e-mail accounts. Nevertheless, the number of websites offering e-mail accounts is far too great for employers to block all of them. Further, though an employer may learn through a company server that an employee has visited a particular website, it is impossible for the employer to determine whether the employee has created a webbased, personal e-mail account on that site. C. Perspectives An employer favors monitoring whenever it faces potential liability because of the actions of its employees. Conversely, an employer favors privacy when it cannot be held liable for the actions of its employees. But when liability is uncertain, an employer will seek to protect its own interests. Since liability is a highly factual inquiry and is determined only after an employee 22. See McLaren v. Microsoft Corp., 1999 Tex. App. LEXIS 4103, at *2–3 (Tex. App. May 28, 1999). 23. See id. 24. See Smyth v. Pillsbury Co., 914 F. Supp. 97, 98 (E.D. Pa. 1996) (referring to an e-mail system in which an employee at home was able to communicate to a company supervisor over the company e-mail system). 278 Computer Law Review and Technology Journal [Vol. VII has acted, it is impossible for an employer to grant employees the complete privacy they would like and still avoid its own liability. 1. Employer Perspective Although e-mail and other electronic technologies are a great asset to companies, three main concerns accompany the benefits. Rather than removing the technology altogether, over seventy-seven percent of major U.S. firms have decided to record and review employee communications, including e-mail, to mitigate their liabilities.25 First, employers rank legal liability as the number one reason for monitoring employee e-mail.26 Lawsuits against employers associated with e-mail include fraud, libel, sexual harassment, racial harassment, securities fraud, and trespass.27 Employers rank company security as the second-most important reason for monitoring employee e-mail.28 While companies may not face legal liability in this area, violations of theft, misappropriation of trade secrets, embezzlement, and copyright infringement will continue to damage companies absent monitoring of employees’ e-mail activities.29 The third concern is productivity; inappropriate or personal use of email on company time, employers argue, adversely impacts desired efficiency. This argument, though, only applies to hourly wage earners. While salaried employees may waste time while at work, they are required to meet a certain level of productivity. According to a recent study, employees spend approximately ten hours per week, or one-fourth of a work week, online sending personal e-mails and visiting Internet sites unrelated to work.30 2. Employee Perspective In addition to the general argument that most people prefer privacy over surveillance, there are numerous arguments against monitoring employee e25. See 2001 AMA Survey, supra note 3. 26. See Computer Forensics, Employee Privacy: Should Your Firm Monitor Email? HR Says Yes, HR WIRE, Nov. 15, 1999. 27. See Erin M. Davis, The Doctrine of Respondeat Superior: An Application to Employers’ Liability for the Computer or Internet Crimes Committed by Their Employees, 12 ALB. L.J. SCI. & TECH. 683, 696 (2002). 28. See Computer Forensics, supra note 26. 29. See Davis, supra note 27, at 696. 30. See Jay P. Kesan, Cyber-Working or Cyber-Shirking?: A First Principles Examination of Electronic Privacy in the Workplace, 54 FLA. L. REV. 289, 314 (2002) (citing Frank C. Morris, Jr., The Electronic Platform and Critical Employment Related Issues in the New Millennium, ALI-ABA, Current Developments in Employment Law 1071, 1071 (July 27, 2000); Amy Rogers, You’ve Got Mail But Your Employer Does Too: Electronic Communication and Privacy in the 21st Century Workplace, 5 J. TECH. L. & POL’Y 1, 20 (2000)). 2003] Striking a Balance 279 mail in the workplace. If an employee does not have privacy in the workplace, he may feel that his employer does not trust him.31 This perceived lack of trust lowers employee morale and erodes mutual respect between employer and employee. Without mutual respect, employees do not have an incentive to optimize production. Stress, depression, and anxiety often result from employer monitoring of e-mail and other electronic communications in the workplace, especially if such monitoring is conducted unfairly.32 It is estimated that employee stress costs employers fifty to seventy-five billion dollars annually in the form of increased absenteeism, turnover, poorer management, lower productivity, higher health care costs, and the avoidance of e-mail altogether.33 Furthermore, a new study reveals that the loss of productivity due to email use in the workplace is not as great as previously believed.34 At least seventy-five percent of employees spend an hour or less per day using email; twenty-five percent spend less than fifteen minutes.35 In fact, sixty percent of Americans who use e-mail while at work receive no more than ten messages on an average day.36 The same study also indicates, however, that managers and high-level directors often spend more than two hours daily on e-mail, with many spending more than four hours daily.37 III. COMPANY, PROPRIETARY E-MAIL ACCOUNTS A. Case Law With the proliferation of e-mail in the workplace, an emerging body of case law that grapples with the issue of employee privacy has developed. As is evident from the following cases, not all courts are in accord as to the degree of privacy that should be afforded employees or as to the extent of employer liability resulting from the use of company e-mail accounts. 1. Smyth v. Pillsbury Company38 Michael Smyth was employed by the Pillsbury Company as a regional operations manager. Pillsbury maintained a proprietary e-mail system to promote internal corporate communications. Pillsbury assured its employees that 31. See Kesan, supra note 30, at 319. 32. See id. at 320. 33. See id. 34. See Wired News, Study Refutes E-mail Myth, ASSOCIATED PRESS, Dec. 9, 2002, available at http://www.wired.com/news/technology/0,1282,56781,00.html (last visited Feb. 15, 2003). 35. See id. 36. See id. 37. See id. 38. 914 F. Supp. 97 (E.D. Pa. 1996). 280 Computer Law Review and Technology Journal [Vol. VII e-mail communications could not be intercepted and used against its employees as grounds for termination or reprimand. While Smyth was using the Pillsbury e-mail system from his home, he exchanged e-mails containing unprofessional comments with his supervisor. Smyth had relied on the company e-mail policy and assurances from his superiors in believing that his e-mails would be confidential, but his e-mails were in fact intercepted and he was later terminated. The Smyth court first pointed out that an employer can terminate an atwill employee for any reason, unless the reason is against public policy.39 The court also explained that Smyth’s situation did not fit into the any of the clearly mandated exceptions;40 other exceptions could be taken, however, from legislation, administrative rules, regulation, or judicial decisions on a case-by-case basis.41 Accordingly, Smyth asked the court to recognize a public policy exception for termination in violation of an employee’s right to privacy.42 The claim of “invasion of privacy,” also known as “intrusion upon seclusion,” was a tort then recognized under Pennsylvania law.43 Pennsylvania had adopted the Restatement approach to “intrusion upon seclusion”: “One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.”44 Applying this law to the facts, the Smyth court found that the plaintiff failed to state a claim upon which relief could be granted because there was no “reasonable expectation of privacy in e-mail communications voluntarily made by an employee to his supervisor over the company e-mail system notwithstanding any assurances that such communications would not be intercepted by management.”45 The court further reasoned that, once the e-mail was sent, Smyth lost any reasonable expectation of privacy.46 In dicta, the court commented that even if Smyth had a reasonable expectation of privacy in his e-mail communications, a reasonable person would not consider Pillsbury’s interception of the communications to be a “substantial and highly 39. See id. at 99. 40. See id. (explaining that Pennsylvania courts have recognized three such exceptions: (1) serving on jury duty; (2) having a prior conviction; and (3) reporting violations of federal regulations to the Nuclear Regulatory Commission). 41. See id. 42. See id. at 100. 43. See id. (citing Borse v. Piece Goods Shop, Inc., 963 F.2d 611 (3d Cir. 1992)). 44. Id. (quoting RESTATEMENT (SECOND) 45. Id. at 100-01. 46. See id. at 101. OF TORTS § 652B). 2003] Striking a Balance 281 offensive invasion of his privacy.”47 As a final note, the Smyth court stated that Pillsbury’s interest in preventing inappropriate or illegal activity over its e-mail system outweighed any privacy interests that Smyth may have had in the e-mail communications.48 2. McLaren v. Microsoft Corporation49 Microsoft suspended Bill McLaren from his employment pending an investigation into allegations of sexual harassment and what Microsoft referred to as “inventory questions.” During the course of the investigation, McLaren requested access to his work e-mail so that he could disprove the allegations. McLaren also requested that no one tamper with his workstation or his e-mail. As a precaution, Microsoft restricted McLaren’s access to his e-mail, permitting him to access a particular message only by requesting it from Microsoft officials. Later that month, Microsoft terminated McLaren’s employment with the company. In his complaint against Microsoft, McLaren alleged, as his sole cause of action, a claim for invasion of privacy based on the belief that Microsoft had broken into his personal e-mail files, which were protected by password, and disclosed the information contained within to third parties.50 Although McLaren conceded that Microsoft had the capability to decrypt his password, he asserted that there was a reasonable expectation of privacy in his personal files because they were guarded by password.51 Microsoft filed a special exception to McLaren’s petition, contending that Texas law did not recognize “any right of privacy in the contents of electronic mail systems and storage that are provided to employees by the employer as part of the employment relationship.”52 Accordingly, the trial court ordered McLaren to replead his petition to eliminate all statements claiming tortious invasion of privacy in connection with the facts alleged therein.53 47. See id. (noting that, unlike a personal property search or urinalysis, electronic communication does not require the disclosure of personal information and, therefore, does not create an expectation of privacy). 48. See id. 49. No. 05-97-00824-CV, 1999 Tex. App. LEXIS 4103 (Tex. App.—Dallas, May 28, 1999, no pet.). 50. See id. at *2. 51. See id. at *2–3. 52. Id. at *3. 53. See id. at *4. The appellate court noted that Texas law recognizes four distinct torts, any of which constitutes an invasion of privacy: (1) intrusion upon the plaintiff’s seclusion or solitude or into his private affairs; (2) public disclosure of embarrassing private facts about the plaintiff; (3) publicity which places the plaintiff in a false light in the public eye; or (4) appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness. See id. at *8. 282 Computer Law Review and Technology Journal [Vol. VII On appeal, the Dallas Court of Appeals considered whether McLaren met the two elements for an invasion of privacy cause of action: “(1) an intentional intrusion, physically or otherwise, upon another’s solitude, seclusion, or private affairs or concerns, which (2) would be highly offensive to a reasonable person.”54 The appellate court rejected McLaren’s contention that his personal files in the company, proprietary e-mail account, protected by password, were similar to a personal locker, locked with a personal lock, provided by an employer.55 The court pointed out that a locker would contain only personal items of the employee; the e-mail messages contained on the company computer, on the other hand, were not McLaren’s personal property.56 Moreover, unlike the discrete physical location of a locker and its contents, an e-mail message could be accessed from a variety of locations, including from a third party, since e-mail messages were first transmitted over the network server.57 Like the Smyth court, the McLaren court concluded in dicta that, even if it had found that McLaren had established a reasonable expectation of privacy in his e-mail messages, a reasonable person would not consider Microsoft’s interception of these communications a very offensive invasion.58 Further, McLaren’s personal e-mails were relevant to the investigation into sexual harassment and inventory questions, thereby giving Microsoft a business interest in the e-mails.59 3. Garrity v. John Hancock Mutual Life Insurance Company60 Nancy Garrity and Joanne Clark were employees of John Hancock Mutual Life Insurance Company for twelve and two years respectively. These two employees exchanged sexually explicit jokes with coworkers on the company, proprietary electronic mail system. After a fellow employee received one such e-mail and complained to the company, management searched the e-mail folders of the plaintiffs and those of the employees the plaintiffs regularly e-mailed. Based on the information uncovered from the investigation, the company determined that plaintiffs had violated its e-mail policy, which prohibited “[m]essages that are defamatory, abusive, obscene, 54. See id. at *9 (citing Valenzuela v. Aquino, 853 S.W.2d 512, 513 (Tex. 1993)). 55. See id. at *10-12 (discussing K-Mart Corp. Store No. 7441 v. Trotti, 677 S.W.2d 632 (Tex. App.—Houston [1st Dist.] 1984), writ ref’d n.r.e., 686 S.W.2d 593 (1985) (finding that when an employee uses his own lock on the employer-owned locker, the employee has an expectation that the locker and its contents will be free from intrusion and interference)). 56. See id. at *11. 57. See id. at *11–12 (quoting Bohach, 932 F. Supp. at 1234 (“E-mail messages are by definition ‘stored in a routing computer.’”)). 58. See id. at *13. 59. See id. 60. No. 00-12143-RWZ, 2002 U.S. Dist. LEXIS 8343 (D. Mass. May 7, 2002). 2003] Striking a Balance 283 profane, sexually oriented, threatening or racially offensive.”61 A violation of this company policy was punishable by disciplinary action, including termination.62 The company policy also reserved a right for John Hancock to access all e-mail files, which it did in this instance.63 As a result of what the company discovered in the e-mail files, the plaintiffs were terminated. The plaintiffs argued that, although John Hancock had reminded its employees to know the company e-mail policy and had warned of former employees that had been disciplined for policy violations, they could not easily find the policy on the company Intranet or decipher it.64 Additionally, plaintiffs stated that John Hancock led them to believe that the e-mails were private because the messages were protected by personal passwords.65 First, the Garrity court determined that, despite plaintiffs’ belief that their e-mail communications were private, there was no reasonable expectation of privacy in those e-mails.66 This conclusion was based partly on the fact that once the e-mails were sent, the messages could be forwarded to anyone.67 Relying on McLaren, the Garrity court also stated that creating passwords or personal folders did not create a reasonable expectation of privacy because all e-mail messages were transmitted over the company network and stored for possible viewing by a third party.68 Similar to the reasoning in Smyth and McLaren, the court in Garrity reasoned that even if plaintiffs had established a reasonable expectation of privacy in their work e-mail, John Hancock’s business interests would likely trump plaintiffs’ privacy interests.69 Under Title VII of the Civil Rights Act of 1964 and under Massachusetts law, John Hancock was required to take affirmative steps to “maintain a workplace free of harassment and to investigate and take prompt and effective remedial action when potentially harassing conduct is discovered.”70 Garrity and Clark next argued that John Hancock violated the Massachusetts Wiretap Statute, which was patterned after the Federal Wiretap Statute.71 The language of the Massachusetts statute prohibits interception of 61. Id. at *2. 62. See id. 63. See id. 64. See id. at *2. 65. See id. at *3. 66. See id. at *4. 67. See id. (citing Smyth, 914 F. Supp. at 97). 68. See id. at *5–6. 69. See id. at *6. 70. See id. 71. See id. at *7. 284 Computer Law Review and Technology Journal [Vol. VII wire and oral communications.72 Basing its reasoning on a Fifth Circuit case, the Garrity court found that there was no wiretap violation because the wrongful interception must occur during transmission; in this case, plaintiffs’ e-mails were intercepted from a server where the e-mails were stored after reception.73 Finally, the Garrity court noted that John Hancock would be further insulated from liability through the ordinary business exemption, which protects the practice of an automatic e-mail back-up system.74 4. TBG Insurance Services Corporation v. Superior Court75 This case involved the review of a California Superior Court’s refusal to compel production of an employer-owned computer, which was being held by the employee at his home. Robert Zieminski worked as a senior executive for TBG Insurance Services Corporation. For purposes of employment, TBG supplied Zieminski with a computer at the office and another computer at home. Pursuant to this arrangement, TBG required Zieminski to sign a company policy in which he agreed that he would use both computers “for business purposes only and not for personal benefit or non-Company purposes.”76 In the agreement, Zieminski also consented to company monitoring of electronic and telephonic communications. TBG terminated Zieminski’s employment when it discovered that he had repeatedly accessed pornographic websites on his work computer. According to Zieminski, the pornographic sites had simply “popped up” on his computer.77 Zieminski sued TBG for wrongful termination.78 After answering the lawsuit, TBG sought to discover the files stored on Zieminski’s company home computer. Any incriminating stored files on the company 72. See MASS. ANN. LAWS ch. 272, § 99 (Law. Co-Op. 1992). 73. See Garrity, 2002 U.S. Dist. LEXIS 8343, at *7–8 (citing Steve Jackson Games, Inc. v. United States Secret Serv., 36 F.3d 457, 461-62 (5th Cir. 1994)). See also Fraser v. Nationwide Mut. Ins. Co., 135 F. Supp. 2d 623, 634-35 (E.D. Pa. 2001) (holding, inter alia, that employer did not violate federal statutes by reading employee’s stored e-mail because the federal statutes only prohibited interception and access of communications while in the course of transmission). 74. See id. at *8–9 (citing Restuccia v. Burk Tech., Inc., No. 95-2125, 1996 Mass. Super. LEXIS 367, at *2–6 (Mass. Super. Aug. 12, 1996) (protecting employer from liability for reading employee e-mails according to the ordinary business exemption of backing up all e-mails sent within the company and justifying employer’s termination of employees for excessive chatting on the company email system, regardless of the content of the conversations)). 75. 117 Cal. Rptr. 2d 155 (Cal. Ct. App. 2002). 76. Id. at 157. 77. Id. at 158. 78. See id. 2003] Striking a Balance 285 computer at Zieminski’s home, TBG reasoned, would resolve the factual question of intent. Zieminski contended that his constitutional right of privacy precluded TBG from forcing him to turn over the home computer containing his personal files.79 Zieminski also set forth the argument that “it was universally accepted and understood by all that the home computers would also be used for personal purposes as well.”80 The California appellate court found that Zieminski did not establish the elements of the invasion of privacy cause of action because his home computer was the property of TBG and because he had consented to monitoring.81 Further, a combination of reasons led the court to conclude that Zieminski voluntarily waived whatever right of privacy he might otherwise have had in the information stored on his home computer.82 The court held, therefore, that the home computer was discoverable, and that the trial court should compel production.83 B. Summary The test for analyzing employee claims against employers for monitoring e-mail in the workplace centers on whether the employee has a reasonable expectation of privacy in the e-mails in question84 and whether the alleged intrusion would be highly offensive to a reasonable person.85 As this issue relates to employee use of company, proprietary e-mail accounts, courts have overwhelming ruled in favor of the employer. The courts have based their reasoning on the following factors: (1) There is no reasonable expectation of privacy in e-mail sent or received on the company e-mail system;86 (2) Once e-mails are sent, they can be forwarded to anyone;87 79. See id. 80. Id. at 158–59. 81. See id. at 160–61 (“When affirmative relief is sought to prevent a constitutionally prohibited invasion of privacy, the plaintiff must establish “(1) a legally protected privacy interest; (2) a reasonable expectation of privacy in the circumstances; and (3) conduct by defendant constituting a serious invasion of privacy.”) (citing Hill v. Nat’l Collegiate Athletic Ass’n, 865 P.2d 633, 654 (Cal. 1994)). 82. See id. at 164. 83. See id. at 164–65. 84. See id. at 160. 85. See Smyth, 914 F. Supp. at 100 (citing RESTATEMENT (SECOND) § 652B). 86. See id. at 101. 87. See Garrity, 2002 U.S. Dist. LEXIS 8343, at *4. OF TORTS 286 Computer Law Review and Technology Journal [Vol. VII (3) Company interception of e-mail communications is not a substantial and highly offensive invasion of employees’ privacy;88 (4) The company’s interests in preventing inappropriate or illegal activity over its e-mail system generally outweigh employee privacy interests;89 (5) Employers are able to decrypt employees’ personal passwords;90 (6) In order to trigger federal protection, electronic communications must be intercepted simultaneous to transmittal;91 (7) E-mails are “backed-up” on company servers, a practice that is permissible according to the ordinary business exemption;92 (8) The employer owns the computer and e-mail system;93 (9) The employee has consented to be monitored.94 IV. WEB-BASED, PERSONAL E-MAIL ACCOUNTS Since most employees have become aware that employers monitor company e-mail systems, the trend for employees has been to move personal and potentially offensive activities to web-based, personal e-mail accounts. The following case demonstrates why strict employer monitoring of employee use of the company, proprietary e-mail accounts is not sufficient to protect itself from liability. A. Booker v. GTE.net LLC95 In Booker, two employees of Verizon, an Internet Service Provider company, in an effort to avoid detection, created a dummy, web-based e-mail account under the name of Jarmilia Booker, an employee of the Kentucky Attorney General’s Office. With this dummy account, the employees responded to a customer complaint regarding problems connecting to the Internet using Verizon’s service. Verizon conceded that the employees’ e-mail was “rude and critical of the recipient.”96 When the customer complained, Booker was questioned by her superiors at the Attorney General’s Office. It was later determined that Booker did not send the e-mail in question and that the web-based e-mail account did not belong to her. 88. See Smyth, 914 F. Supp. at 101. 89. See id. 90. See McLaren, 1999 Tex. App. LEXIS 4103, at *2–3. 91. See Garrity, 2002 U.S. Dist. LEXIS 8343, at *7–8. 92. See id. at *8–9. 93. See TBG Ins. Servs., 117 Cal. Rptr. 2d at 159–61. 94. See id. at 163-64. 95. 214 F. Supp. 2d 746 (D. Ky. 2002). 96. Id. at 747. 2003] Striking a Balance 287 In addition to bringing suit against the individual employees of Verizon, Booker brought suit against Verizon under vicarious liability and respondeat superior theories.97 Booker alleged five causes of action against the employer for the employees’ actions: (1) violation of Washington state statutes prohibiting unsolicited or misleading electronic mail; (2) failure to supervise; (3) intentional infliction of emotional distress (“outrage”); (4) civil conspiracy; and (5) defamation/libel.98 The court first delineated the intentional infliction of emotional distress, civil conspiracy, and defamation/libel claims as being of a respondeat superior nature and thus requiring a plaintiff to show intent of the employees, not the employer.99 The statutory violations and failure to supervise claims, on the other hand, were applicable directly to the employer and required the plaintiff to show intent on the part of the employer.100 In analyzing the respondeat superior claims, the court presented the question of whether the tortious acts were performed in the scope of employment.101 The court noted that intentional torts are generally considered to fall outside of the scope of employment, but commented that “this rule is far from categorical.”102 The Booker court adopted the view from the United States Court of Appeals for the Sixth Circuit, which stated: To determine whether a particular employee action is within the scope of employment, Kentucky courts consider the following: (1) whether the conduct was similar to that which the employee was hired to perform; (2) whether the action occurred substantially within the authorized spacial and temporal limits of the employment; (3) whether the action was in furtherance of the employer’s business; and (4) whether the conduct, though unauthorized, was expectable in view of the employee’s duties.103 The Booker court first pointed out that the employees were employed to respond to customers by e-mail, but not in the manner that they did.104 Because of this fact, the scope of employment inquiry did not help to resolve the overall question of liability. The court next affirmed that the action “occurred substantially within the authorized spatial and temporal limits of the employment.”105 Third, the court determined that the e-mail was not sent “in 97. See id. at 748. 98. See id. 99. See id. at 749. 100. See id. 101. See id. 102. See id. 103. Id. (quoting Coleman v. United States, 91 F.3d 820, 823–24 (6th Cir. 1996)). 104. See id. at 750. 105. Id. 288 Computer Law Review and Technology Journal [Vol. VII furtherance of the employer’s business” because it encouraged the customer to switch to a different Internet Service Provider.106 Regarding the fourth prong, the court concluded that “creating false third-party e-mail accounts and sending intentionally offensive e-mails is not expected from company employees.”107 Although it was a “close call,” the court found that the employees acted outside the scope of their employment.108 Booker’s other claims—failure to supervise and statutory violations— were attributable directly to the employer.109 With respect to the failure to supervise (or “negligent supervision”) claim, the court reasoned that, although the plaintiff claimed that the employer owed a duty to supervise its employees, the plaintiff did not allege that the employer knew or should have known that the offending employees would act as they did, a crucial element of the prima facie case.110 The statutory claims also failed because a requisite element was the intent of promoting the employer’s business, an allegation that was already disproved.111 Consequently, the employer was neither vicariously liable for the acts of its employees, nor directly liable according to the alternative theories of liability.112 B. New Monitoring Technology As illustrated in Booker, when Internet access is available in the workplace, the potential remains for employees to commit acts on web-based, personal e-mail accounts that could possibly make employers vicariously liable. New monitoring technology allows employers to monitor such e-mail accounts in an effort to thwart ongoing illegal employee activities. Booker demonstrates that a single e-mail communication may be the basis of a lawsuit. Monitoring may not necessarily prevent a lawsuit. But if the cause of action is sexual harassment, the employer may avoid liability based on just one e-mail if it (1) had a written sexual harassment policy, and (2) immediately and effectively responded to the complaint.113 E-mail can also be directed against the employer, such as when company trade secrets are stolen. Therefore, employer monitoring of web-based, personal accounts in the workplace would still be justified. 106. Id. 107. Id. 108. Id. 109. See id. at 750-51. 110. See id. at 751. 111. See id. 112. See id. 113. See Faragher v. City of Boca Raton, 524 U.S. 775, 778 (1998); see also Burlington Indus., Inc. v. Ellerth, 524 U.S. 742, 745 (1998). 2003] Striking a Balance 289 1. Spyware Spyware was originally created to monitor Internet use for the purposes of marketing.114 While a user surfs the Internet, programs such as “Gator” and “BonziBUDDY” are often secretly installed onto the user’s computer, monitoring surfing patterns, keystrokes, and other information.115 In addition to retrieving confidential corporate information, spyware programs also drain network bandwidth, thereby causing system slowdowns.116 These programs were the forerunners for spyware that monitors web-based, personal e-mail accounts. 2. eBlaster Software such as eBlaster 3.0 spyware, created by the SpectorSoft Corporation, allows a user to receive a secret, undetected copy of any e-mail sent or received from the subject’s web-based e-mail account, such as “Hotmail” or “Yahoo!”.117 The user of the software does not necessarily need to be on the same network. A parent at work, for example, can monitor the e-mail use of his child at home.118 Because of this function, an employer monitoring an employee’s web-based, personal e-mail account in the workplace could possibly abuse the monitoring by reaching into the employee’s e-mail activity at the employee’s home if the employee uses the same web-based account both at work and at home.119 Because the secret copy is sent during the transmission of the e-mail, even the manufacturer characterizes the new software as “almost a wiretap.”120 Privacy advocates believe that, even when this software is used in the workplace, it violates employees’ reasonable expectations of privacy because they take an extra step to protect their privacy by creating a personal e-mail account that is not controlled by the employer.121 Supporters of the software contend that the software is not illegal in the workplace because employers can monitor whatever they want on company computers.122 114. See ITsecurity.com, Websense Launches New Database Category to Combat Security Threat: Spyware Found to Create Security Holes and Severely Drain Corporate Bandwidth, M2 PRESSWIRE (London) Nov. 25, 2002, available at http://www.itsecurity.com/tecsnews/nov2002/nov213.htm (last visited Feb. 18, 2003). 115. See id. 116. See id. 117. See Sullivan, supra note 5. 118. See id. 119. See id. 120. Id. 121. See id. 122. See id. 290 Computer Law Review and Technology Journal [Vol. VII C. Traditional Privacy Analysis Applied to Monitoring of Web-based, Personal E-mail Accounts When the traditional privacy analysis is applied to the practice of monitoring web-based, personal e-mail accounts in the workplace, employers do not have such a strong legal position as they do when monitoring only company, proprietary e-mail accounts.123 While the new monitoring technology may not affect many of the factors of legal analysis, employer monitoring may not be justified in every situation and may actually impinge employees’ interests. As a result, it is very likely that the new monitoring technology will be deemed illegal. On the other hand, the employer cannot simply discard the new monitoring technology unless it wishes to face possible liability in situations similar to Booker. In the following parts of this Article, each of the factors courts have used to justify monitoring on the proprietary, company email system will be analyzed in light of the new monitoring technology as applied to the web-based, personal e-mail accounts of employees. 1. There is no reasonable expectation of privacy in e-mail sent or received on the company e-mail system As pointed out in the Sullivan article, there may be a reasonable expectation of privacy in web-based, personal e-mail accounts. When an employee takes an extra step to protect his privacy, he manifests an expectation of privacy and a reasonable person would most likely believe that there is at least a higher degree of privacy in web-based, personal e-mail used in the workplace than in company, proprietary e-mail.124 2. Once e-mails are sent, they can be forwarded to anyone Once e-mails are sent on a web-based, personal e-mail account, they can still be forwarded to anyone. This capability justifies lessening the employee’s expectation of privacy in web-based, personal e-mail, especially if the employee sends an e-mail from a web-based account to a company, proprietary account. An e-mail can be the basis of liability at the point at which it enters the company e-mail system.125 Similar reasoning has been employed in Fourth Amendment jurisprudence. Specifically, a search does not occur when information is freely viewable to the public because once information is openly released, it can be learned by anyone.126 123. See supra discussion, Part III.A. & Part III.B. 124. See Sullivan, supra note 5. 125. See Garrity, 2002 U.S. Dist. LEXIS 8343, at *4. 126. See, e.g., United States v. Miller, 425 U.S. 435, 442-43 (1976) (financial records); Smith v. Maryland, 442 U.S. 735, 743-44 (1979) (pen registers); United States v. Meriwether, 917 F.2d 955, 959 (6th Cir. 1990) (electronic pagers); California v. Greenwood, 486 U.S. 35, 40 (1988) (trash). 2003] Striking a Balance 291 3. Company interception of e-mail communications is not a substantial and highly offensive invasion of employees’ privacy The fact that an e-mail is intercepted when it was thought to be private and unreachable is much more offensive than traditional monitoring of a company, proprietary e-mail system. This factor does not favor the employer since, according to the first factor, the employee may have a higher expectation of privacy in a web-based, personal e-mail account. Accordingly, intrusion upon an e-mail account that is held at a higher level of privacy will result in a higher level of offensiveness, perhaps rising to the level of a substantial invasion of an employee’s privacy. 4. The company’s interests in preventing inappropriate or illegal activity over its e-mail system generally outweigh employee privacy interests Of all the factors considered by a court, the factor that could exclusively justify employer monitoring of employee web-based e-mail is the company’s interest in avoiding legal liability. If all other analyses are viewed through this factor, it is the argument of this Article that the employer will be legally justified in monitoring employee web-based e-mail accounts when they are used in the workplace. The new monitoring technology does not downplay this factor used to justify monitoring. 5. Employers are able to decrypt employees’ personal passwords Employers have technology that enables them to decrypt the personal passwords of employees’ e-mail folders, and this practice has been justified in part because the employer owned the e-mail system.127 But employees would argue that taking an extra step to create a personal e-mail account on the Internet creates a higher reasonable expectation of privacy; it stands to reason, then, that just because employers may have the ability to decrypt personal passwords of web-based, personal e-mail accounts does not necessarily mean that they may legally do so. Hence, the ability that an employer has to decrypt passwords is less meaningful when there is actually a reasonable expectation of privacy in the e-mail, or even if there is simply a higher expectation of privacy.128 127. See McLaren, 1999 Tex. App. LEXIS 4103, at *2-3. 128. See Sarah DiLuzio, Workplace E-mail: It’s Not as Private as You Might Think, 25 DEL. J. CORP. L. 741, 758 (2000) (arguing that encryption of e-mail in the workplace would create a reasonable expectation of privacy, but is unlikely to be implemented). But see Orin S. Kerr, The Fourth Amendment in Cyberspace: Can Encryption Create a “Reasonable Expectation of Privacy?”, 33 CONN. L. REV. 503, 517-18 (2001) (arguing that there is no reasonable expectation of privacy in encrypted e-mail). 292 Computer Law Review and Technology Journal [Vol. VII 6. In order to trigger federal protection, electronic communications must be intercepted simultaneous to transmittal Since the seminal case of Smyth v. Pillsbury Co.,129 courts have universally held that in order to trigger protection of the Federal Wiretap Act and its amendment under the Electronic Communications Privacy Act, the communication must be intercepted simultaneous to its transmission.130 Opponents of this line of reasoning argue, however, that it is meaningless to make a distinction between e-mail messages sent, received, and en route because they all occur within a split second of each other.131 This rule of law, in light of recent monitoring technology, makes it difficult for employers to legally monitor employees’ personal, web-based e-mail accounts because, according to the operation of new spyware technology, emails would be intercepted during transmission.132 This poses a problem, as personal, web-based e-mail accounts are presumptively for the use of personal e-mail. Thus, using the traditional privacy analysis for monitoring of web-based e-mail in the workplace as it pertains to new monitoring technology, employers will likely face liability for invasion of privacy. 7. E-mails are “backed-up” on company servers, a practice that is permissible according to the ordinary business exemption When e-mail is sent on a web-based, personal account, a company only records which websites have been visited. The record of e-mails sent and received is stored on the website server, not on the company server.133 Nevertheless, with new monitoring technology, employers will know when employees send and receive personal e-mails on their web-based accounts.134 Technically, the web-based e-mails will be backed-up on the company server because a secret carbon copy will be sent to a company supervisor’s e-mail 129. 914 F. Supp. 97. 130. See, e.g., Fraser, 135 F. Supp. 2d at 634–35 (“[I]nterception of a communication occurs when transmission is interrupted, or in other words when the message is acquired after it has been sent by the sender, but before it is received by the recipient. The point in time when the message is acquired is the determining factor for whether or not interception has occurred. The Wiretap Act provides protection for private communication only during the course of transmission.”). 131. See Benjamin F. Sidbury, You’ve Got Mail . . . and Your Boss Knows It: Rethinking the Scope of the Employer E-mail Monitoring Exceptions to the Electronic Communications Privacy Act, 2001 UCLA J.L. & TECH. (2001). 132. See Sullivan, supra note 5 (“[T]he moment a spy subject sends or receives an e-mail, a copy of the correspondence is forwarded to the spy.”). 133. See discussion supra Part II.B.2. 134. See Sullivan, supra note 5. 2003] Striking a Balance 293 account, which will then register the e-mail on the company server.135 So again, courts will be faced with measuring “ability” as it relates to “legality.”136 But it is not clear whether the ordinary business exemption will protect businesses that utilize the new monitoring technology, unless the employer uses a back-up system that automatically stores all computer files, including an employee’s e-mail messages.137 8. The employer owns the computer and e-mail system Employers have been completely justified in examining anything on its proprietary computers and e-mail system; it is not so clear, though, whether, when an employee accesses a website that is protected by password, the employer has the right to examine information beyond the password, because the employer does not own the website. The relevant question then becomes whether the employer’s ownership of the computer and the network outweigh the employee’s privacy interest in information that is beyond the ownership of the employer. What was once a clear-cut answer has become a factor in a balancing test. 9. The employee has consented to be monitored The Smyth court ruled that, regardless of what the company officials had stated, the employer was free to monitor the company, proprietary e-mail accounts of its employees.138 Similarly, the plaintiffs in Garrity signed a company policy and were able to view the policy on the company database.139 The employee in TBG Insurance Services signed a company policy that computer use was for business purposes only and that the employer could monitor the electronic communications of its employees.140 Since each of these cases involved the company, proprietary e-mail system, it cannot be assumed that general consent to monitor will also cover the web-based, personal e-mail accounts. The spyware that allows monitoring of such personal accounts is a new innovation, with which many employees are not familiar; this type of monitoring, therefore, will most likely need specific consent. As such, absent specific consent to monitor web-based, personal e-mail ac135. See id. 136. See O’Connor v. Ortega, 480 U.S. 709, 717 (1987) (stating that constitutional protection against unreasonable searches by the government does not disappear merely because the government has the ability to make reasonable intrusions, but that some government offices may be so open to fellow employees or to the public that no expectation of privacy is reasonable.). 137. See Restuccia, at *2–3 (commenting on the ordinary business exemption as requiring all e-mails to be captured and stored). 138. See Smyth, 914 F. Supp. at 101. 139. See Garrity, 2002 U.S. Dist. LEXIS 8343, at *2. 140. See TBG Ins. Servs., 117 Cal. Rptr. 2d at 157. 294 Computer Law Review and Technology Journal [Vol. VII counts, an employer will likely face liability for use of the new monitoring technology on these types of e-mail accounts. D. The Respondeat Superior Approach to Employer Liability for Monitoring Employee E-mail 1. Respondeat superior and vicarious liability The most widely adopted definition of respondeat superior is found in the Restatement (Second) of Agency: (1) Conduct of a servant is within the scope of employment if, but only if: (a) it is of the kind he is employed to perform; (b) it occurs substantially within the authorized time and space limits; (c) it is actuated, at least in part, by a purpose to serve the master, and (d) if force is intentionally used by the servant against another, the use of force is not unexpectable by the master. (2) Conduct of a servant is not within the scope of employment if it is different in kind from that authorized, far beyond the authorized time or space limits, or too little actuated by a purpose to serve the master.141 The doctrine of respondeat superior provides a framework through which an employer, despite using new technology, can avoid liability for monitoring employee e-mail on web-based, personal accounts.142 It is counter-intuitive to hold an employer liable for illegal acts committed by employees over e-mail through respondeat superior without providing the employer with the means to monitor any and all types of e-mail that could be the basis of liability. For example, although the reasoning in Booker led to a finding that the employer was not liable for the acts committed by its employees, the court referred to the finding as a “close call.”143 Additionally, intentional torts committed by employees were not held to fall categorically outside the scope of employment.144 Ultimately, the finding of no liability was based on the content of the e-mail, which was deemed “most certainly not sent in furtherance of Verizon’s business.”145 Also, the court was persuaded to hold the em141. RESTATEMENT (SECOND) OF AGENCY § 228 (2002). 142. See generally Erin M. Davis, supra note 27, at 713 (applying the theory of respondeat superior to employer liability for computer and Internet based crimes). 143. See Booker, 214 F. Supp. 2d at 750. 144. See id. at 749 (“While it is quite true that, as a general rule, intentional torts are deemed to fall outside the scope of employment, this rule is far from categorical.”). 145. See id. at 750. The court also noted that that the e-mail encouraged the recipient to switch from Verizon to a different service. Id. 2003] Striking a Balance 295 ployer not liable because the creation of false third-party e-mail accounts and the intentional sending of offensive e-mails was not expected from company employees.146 It follows that, after facing the Booker situation, it would be more foreseeable to have a future occurrence of an e-mail with only slightly different content, especially without safeguards such as monitoring of employee web-based e-mail in place. In this situation, the very factors that worked in favor of the Booker employer might easily be turned upside down according to the facts since the rule is not categorical. Because of the ability employees have in their web-based, personal email accounts to circumvent protections that employers enjoy in monitoring company, proprietary e-mail accounts, courts should apply respondeat superior to the traditional privacy analysis of electronic communications in the workplace. This approach would allow employers to maintain their business interests by legally taking advantage of new technology for monitoring employees’ web-based e-mail accounts without facing the liability that would normally attach under the traditional privacy analysis. Such an approach would necessarily minimize the increased expectation of privacy that employees may have in their web-based, personal e-mail accounts when they are used in the workplace. 2. Within the scope of employment As pointed out in Booker, in determining the liability of the employer in vicarious liability cases, the first inquiry is whether the employee acted within the scope of his employment.147 According to the Restatement definition of respondeat superior148 and the Booker holding, when an employee acts outside the scope of his employment, his acts cannot be attributed to the employer for purposes of liability. As in Booker, most plaintiffs can easily prove the first two prongs of the “scope of employment” test.149 Liability, then, usually turns on the last two prongs. a. Whether the action is actuated by a purpose to serve the employer The Booker court found that the two employees did not act with a purpose to serve the employer because the content of the e-mail encouraged the customer to switch to a different Internet Service Provider.150 This finding seems clear in a third-party plaintiff case, but such a finding may not be so clear in e-mail harassment and discrimination cases in which the plaintiff is a co-worker of the employee tortfeasor. 146. See id. 147. See id. at 749. 148. See RESTATEMENT (SECOND) OF AGENCY § 228. 149. See Booker, 214 F. Supp. 2d at 750. 150. See id. 296 Computer Law Review and Technology Journal [Vol. VII Many companies maintain e-mail systems to encourage employees to email each other for business purposes and thereby improve internal corporate communications. In addition, many companies encourage their employees to e-mail in order to build camaraderie. Therefore, when employees e-mail each other, these actions are actuated by a purpose to serve the employer. The limits on the content of these e-mails are not as clear as in the Booker situation, especially when employees communicate from one web-based e-mail account to another. When employees communicate exclusively by web-based e-mail, they are virtually undetected by the employer unless monitoring is allowed. Moreover, if legally prohibitory language is contained in the emails, questions of notice and foreseeability arise. b. Whether the employee action is foreseeable to the employer The Booker court found that intentionally sending offensive e-mails was not expected of company employees, especially those working in customer service.151 Yet Booker would have had a valid claim if she was able to prove that Verizon had failed to supervise its employees.152 Booker alleged that Verizon had a legal duty to supervise its employees, but failed to allege that Verizon knew or should have known that the offending employees would act as they did.153 Thus, the court was not required to analyze Booker’s claim for negligent supervision. While an employer could claim ignorance of discrimination of a coworker in the workplace, a court may be reluctant to allow an employer to do nothing if an employee’s civil rights are violated. Nevertheless, it would be very difficult for an employer to detect discrimination carried out over webbased, personal e-mail accounts. A hostile work environment in such a scenario could be avoided if the employer simply had the legal ability to monitor its employees’ web-based e-mail accounts.154 On the issue of liability alone, one could argue that an employer, by not monitoring web-based, personal e-mail accounts, could argue lack of notice and not be found liable for any civil rights violations. But while intentional torts committed by employees are usually not within the scope of employ- 151. See id. 152. See id. at 751. 153. See id. 154. See, e.g., Crawford v. Medina Gen. Hosp., 96 F.3d 830, 834-35 (6th Cir. 1996) (requiring that to prove a hostile environment cause of action in an ADEA (The Age Discrimination in Employment Act) context, a plaintiff must show (1) he is in the protected class–40 years or older; (2) he was subject to harassment in words or actions based on age; (3) the harassment had the effect of unreasonably interfering with the employee’s work performance and creating an intimidating hostile or offensive work environment; and (4) there exists some basis for liability of the employer). 2003] Striking a Balance 297 ment, “this rule is far from categorical.”155 Additionally, while turning a blind eye may be successful in a limited number of factual scenarios, it will do nothing to prevent the myriad of other types of crimes, such as misappropriation of trade secrets committed over web-based, personal e-mail accounts.156 In such damaging e-mail crimes as securities fraud, there is no way to completely turn back the clock, yet monitoring of employee web-based email accounts could effectively minimize these described risks. 3. Exception to the Federal Wiretap Act As discussed above, many of the criteria courts rely on to justify employer monitoring of employee use of the company, proprietary e-mail system will actually favor the employee when new monitoring technology is utilized to monitor web-based, personal e-mail accounts.157 This heightened expectation of employee privacy is diminished, however, when courts consider that web-based accounts create potential vicarious liability for employers. And this potential liability increases when employers choose not to monitor. While almost all of the factors can be explained in this way to justify monitoring the web-based e-mail account, the issues surrounding the Federal Wiretap Act need additional explanation. eBlaster software creates an undetected, secret carbon copy e-mail that is sent to the user of the software, presumably during the transmission of the e-mail, which is in violation of the Federal Wiretap Statute, unless the e-mail is business related.158 But according to the language of the Federal Wiretap Act, there are exceptions either when a person is a party to the conversation or when at least one party to the conversation has consented to interception.159 The Stored Communications Act also provides exceptions for (1) “the person or entity providing a wire or electronic communication service”;160 and (2) “a user of that service with respect to a communication of or intended for that user.”161 If an employer is to take advantage of the exemption from the Federal Wiretap Act for business related e-mail, the employer will have to initially monitor each e-mail from the web-based account to determine if the individual e-mail is business related, which means that all e-mails will be read. In addition, a strict construction of an agency theory would make the agentemployee one and the same with the principal employer, thereby making the employer a party to all conversations the employee has while in the work155. See Booker, 214 F. Supp. 2d at 749. 156. See discussion supra Part II.C.A.1.a–b. 157. See discussion supra Part IV.C.1–9. 158. See discussion supra Part IV.C.6. 159. See 18 U.S.C. § 2511(2)(d). 160. Id. § 2701(c)(1). 161. Id. § 2701(c)(2). 298 Computer Law Review and Technology Journal [Vol. VII place, and a “user” of the web-based e-mail account. Finally, specific consent to monitor the employee’s web-based, personal e-mail account may be gained from the employee, which would provide a third theory of exemption from the Federal Wiretap Act. V. AVOIDING CONFLICTS BETWEEN EMPLOYER AND EMPLOYEE The controversy surrounding employer monitoring of employee e-mail in the workplace will persist; nevertheless, steps can be taken to alleviate conflicts between the competing interests of each party. A. Separate Computers in Non-work Areas for Use During Nonwork Time For businesses that do not rely on the Internet for distributing job assignments, an easy way to eliminate e-mail problems is to not install Internet browsers on workstation computers, thereby removing the threat of employee activities on personal, web-based e-mail accounts. Further, companies could continue to maintain their proprietary e-mail systems for company use and monitor employee e-mail according to the current state of the law. As a benefit to employees, the employer could create a separate network of computers with Internet browsers but without company e-mail. This setup would prevent the possibility of copying and pasting confidential or offensive information from company e-mail to personal e-mail. Employees would still have the opportunity to enjoy the Internet during non-work times, such as before and after work and during lunch and other breaks. Such a configuration would favor employers in the second prong of a scope of employment test— ”whether the action occurred substantially within the authorized spatial and temporal limits of the employment”162—thereby making employees ultimately liable for their own crimes. For businesses that rely on the Internet for job assignments, software is available that can monitor user patterns, enabling an employer to find out which sites employees are visiting and how often they are visited; such software thus allows the employer to investigate web-based e-mail use.163 Once the employer concludes that the frequently-visited websites are not work-related, it can use its technology to block those sites. B. New Technology Inhibiting E-mail Functions New technology like the e-mail policy solution created by Omniva Policy Systems allows companies to “exchange secure, confidential emails within and beyond the corporate boundaries without requiring any special software, downloads, or additional steps to read the protected email 162. See Booker, 214 F. Supp. 2d at 749. 163. See Jay P. Kesan, supra note 30, at 331-32 (citations omitted). 2003] Striking a Balance 299 messages.”164 The Omniva system allows for the following functions and email policies: • Confidentiality—Messages can be sent as ‘company confidential’ and cannot be read outside the company or as ‘do not forward’ and cannot be read by anyone but the original recipients; • Retention—Messages and attachments can be set to expire after a specified amount of time in compliance with corporate policies. After expiration, these messages are deleted, including all copies of the message–wherever they reside; • Privacy—Omniva Policy Manager Enterprise Edition allows users to easily block the ability to copy and paste, as well as print a message.165 This technology decreases the need for strict employee monitoring, while allowing employers to enjoy the financial benefits of company e-mail. Moreover, the misappropriation of confidential company information will not be so easily perpetuated. C. Employee Purchases Own Computer and Uses Own Network Courts have often relied on the argument that an employer can freely view any files stored on a company-owned computer.166 Interestingly, the fact that an employee owns the computer from which e-mail messages are sent does not determine whether the sent messages can be monitored.167 The dispositive element for determining the propriety of monitoring is the ownership of the computer where e-mail messages are stored. But when e-mail messages are sent, the dispositive element is the ownership of the network connection. Depending on his desire to protect personal e-mail messages, an employee can purchase a laptop to bring to work and store personal e-mail files, or he can connect to the Internet using an alternate network connection, perhaps a wireless connection, to keep his sent e-mail messages confidential. D. Electronic Communications Company Policy An employer should require specific consent from its employees to monitor company, proprietary e-mail accounts and web-based, personal email accounts.168 A company policy should not be simply read and signed by the employee but should be first explained by the employer before signing; the employee should then be reminded often of the policy so that there can be 164. ITsecurity.com, Omniva Unveils Omniva Policy Manager Enterprise Edition for Secure Email Policy, Aug. 25, 2002, available at http://www.itsecurity.com/ tecsnews/aug2002/aug152.htm (last visited Feb. 26, 2002). 165. Id. 166. See TBG Ins. Servs., 117 Cal. Rptr. 2d at 160–61. 167. See Smyth, 914 F. Supp. at 98. 168. See discussion supra Part IV.C.9. 300 Computer Law Review and Technology Journal [Vol. VII no mistake. For purposes of notice and enforcement, the main points of the electronic communications policy could be displayed at a log-in screen each time employees’ computers are activated. VI. CONCLUSION Although employers maintaining company, proprietary electronic mail systems face many liabilities for the acts of their employees, the overall financial benefits outweigh those liabilities. To limit their liabilities, companies engage in monitoring of employee e-mail use of company, proprietary email accounts. Since many employees have moved their personal e-mail activity and potentially threatening activity to web-based, personal e-mail accounts, new technology has evolved to allow employers to monitor employees’ web-based e-mail accounts. Applying the traditional line of reasoning in balancing employer interests and employee privacy, courts would most likely find the new monitoring technology illegal. But when the employees’ expectations of privacy are viewed through the respondeat superior doctrine, the new monitoring technology apparently serves a legitimate, legal purpose. Employers and employees have competing interests regarding the issue of e-mail in the workplace, but firm guidelines and policies can result in compromises in which respective interests are served and conflicts are avoided.
© Copyright 2025 Paperzz