Gnarly Surfing, Dude: Risks Arising When Employers Surf the Internet to Monitor Employees’ Off‐Duty Conduct Using Social Media At‐Will Employment Subcommittee ABA Employment Rights & Responsibilities Mid‐winter Meeting March 24, 2010 Paul E. Starkman A R N S T EI N & L E H R LLP 120 S O UT H R I V E RS I D E P LA ZA | S UIT E 1200 C H I C A G O , I L 6 06 06 P 3 12 . 8 76 . 789 0 | F 3 12. 8 76 . 028 8 [email protected] PANEL Paul E. Starkman Chair, Labor & Employment Law Practice Group Arnstein & Lehr LLP 120 S. Riverside Plaza Suite 1200 Chicago, IL 60606 (312) 876-7890 [email protected] Tracey Wik Mile 36 Enterprises Chicago, IL J. Linsay Johnston Comcast Oaks, PA Steve Serratore Serratore Law Pasadena, CA 8901858.1 2/22/2010 TABLE OF CONTENTS I. Statistics on Social Networking and Employer Monitoring Efforts .................. 1 A. General Use of Social Networking Is Increasing Exponentially ..................... 1 B. Businesses’ Use of Social Networking Growing ............................................. 1 II. Employers’ Monitoring of Employee Internet Usage Has Increased ................ 2 A. Employer Concerns of Employee Social Networking Have Grown................ 2 B. Employers Generally Have No Duty to Monitor Employees’ Off-Duty Social Networking, But Most Do. .................................................................................. 2 C. In the Past Decade, the Percentage of Employers Monitoring Employee Internet Use Skyrocketed by More than 45%. .................................................. 2 D. Most American Employers Have Electronic Communications Policies. ....... 3 III. Employers’ Reasons for Monitoring Employees’ Off-Duty Internet Usage and Social Networking: ................................................................................................ 3 A. Monitoring To Prevent Reputational Damage from “Bad Employee” Blogs and Postings ....................................................................................................... 3 B. Monitoring To Prevent Cyber-Slander .............................................................. 5 C. Anonymous Posts Do Not Guarantee Protection from Detection.................. 5 D. Monitoring For Breaches Of Restrictive Covenants........................................ 6 E. Monitoring to Prevent “Cyber-smearing,” “Cyber-stalking” and “Cyberharassment.”....................................................................................................... 7 1) Employees may be Discharged for Cyber-threats Sent from Home Computers Using Company Email Systems ................................................. 7 2) Harassment by Text and Social Networking. ................................................ 8 3) New State Laws Criminalize Online Harassment. ......................................... 9 4) It is Hard to Address Cyber-Slander Through Civil Litigation. .................... 9 F. Monitoring to Prevent Discrimination............................................................. 10 G. Monitoring to Address Employees’ Disclosure of Confidential Information ........................................................................................................................... 10 1) Social Networking Sites Address Confidential Information and IP in Terms of Service........................................................................................................ 11 H. Monitoring to Prevent Improper “Friending,” Endorsements, and LinkedIn Recommendations ........................................................................................... 12 1) Ethical Rules for Attorneys and Judges. ..................................................... 12 2) The FTC’s Endorsement Guides................................................................... 12 i 8901858.1 2/22/2010 I. Screening Job Applicants’ Blogs, Social Networking Profiles, and Video Posts.................................................................................................................. 13 1) The Potential Pitfalls for Employers from Screening Job Applicants’ Social Networking.......................................................................................... 13 IV. The Potential Pitfalls for Employers Monitoring Employees’ Off-Duty Internet Usage and Social Networking ............................................................................ 16 A. NLRB Issues. .................................................................................................... 16 1) Policies Barring Worker Criticism of Employer May Cause Labor Problems. ....................................................................................................... 16 B. Invasion of Privacy Claims .............................................................................. 17 1) Employees’ Reasonable Expectation of Privacy and Employers’ “Offensive” Intrusion..................................................................................... 17 C. Federal Laws Affecting Employer Monitoring of Off-Duty Social Networking. ........................................................................................................................... 17 1) The Federal Electronic Communications Privacy Act (“ECPA”). .............. 17 2) The Stored Communications Act. ................................................................ 20 3) State Laws ...................................................................................................... 25 4) Attorney-Client Privilege Issues and Monitoring Emails............................ 26 V. Practical Considerations and Best Practices. .................................................. 29 VI. What the Future Holds for Employer Monitoring of Employee Off-Duty Internet Usage ..................................................................................................... 33 SUPPLEMENTAL MATERIALS Databases with Sample Social Networking/Blogging Policies and Guidelines ..... 35 Sample Technology and Electronic Communications Policy ................................. 36 Sample Policy on Monitoring Off-Duty Internet Usage and Social Networking..... 45 ii 8901858.1 2/22/2010 EMPLOYERS’ MONITORING OF EMPLOYEES’ OFF-DUTY INTERNET USAGE AND SOCIAL NETWORKING I. Statistics on Social Networking and Employer Monitoring Efforts A. General Use of Social Networking Is Increasing Exponentially Facebook advertises that it has 400,000,000 active users.1 There are more than 70 million blogs, with more than 1.4 million entries being added daily. Estimates of the number of twitter users range from 14 million to more than 70 million.2 B. Businesses’ Use of Social Networking Growing 1. According to Cisco’s 2009 Survey assessing how 97 organizations in 20 countries use social networking tools: • 75% of the organizations interviewed primarily use social networks as their consumer-based social media tool. • roughly 50% of the group also extensively used microblogging.3 2. President Obama, the Pope, and a number of major corporations such as Comcast, Bank of America, UPS, Wachovia, Southwest Airlines, Starbucks, Home Depot, Starbucks, Dell, Trader Joe’s, Rubbermaid, and General Motors, all have official Facebook pages or corporate Twitter accounts. They use Facebook and Twitter for communications, recruiting, marketing, customer service, or for other business reasons.4 3. 31% of American CEOs are on Facebook. 1 Source: http://www.facebook.com/advertising/?src=pf 2 Source: http://blog.taraganer.com/index.php/archive/how-many-twitter-users-are-there/. 3 Source: 2009 Cisco Study on the Business http://newsroom.cisco.com/dlls/2010/prod_011310.html Use of Social Networking, available at: 4 Dr. Tamara Johnson, Ph.D., Twitter, Facebook and MySpace: Employee Social Networking on Company Time, cityflight.com (August 31, 2009) Source: http://cityflight.com/?p=532; Vincent Pascual , Twitter and Employment Law Issues, produced for a course entitled “Employment Law and Technology,” taught at the University of San Diego School of Law during Spring Semester 2009 available at: http://socialmedialawstudent.com/twitter/the-first-law-schoolseminar-paper-on-twitter-twitter-and-employment-law-issues/#fn-1792-1 1 II. Employers’ Monitoring of Employee Internet Usage Has Increased A. Employer Concerns of Employee Social Networking Have Grown. • 55% of employees admit to visiting social networking sites during work hours according to a Deloitte LLP 2009 survey.5 • 74% of managers surveyed believe social networking sites put the firms and their brand at risk. 15% consider the risks of social networking sites at the boardroom level, but only 17% have risk mitigation policies or programs in place. • 60% of managers believe they have the “right to know” what their employees are saying about the company on the employees’ personal (and private) social networking web pages, according to the Deloitte 2009 Social Networking Survey. B. Employers Generally Have No Duty to Monitor Employees’ Off-Duty Social Networking, But Most Do. Employers normally are not legally required to monitor their employees’ internet activities, particularly off-duty activity using personally-owned equipment and systems.6 C. In the Past Decade, the Percentage of Employers Monitoring Employee Internet Use Skyrocketed by More than 45%. When it comes to workplace computer monitoring, North American employers are primarily concerned about inappropriate web surfing. • 66% of the employers in the survey stated that they watched workers’ Internet connections. • Another 45% stated that they tracked content, keystrokes, and time spent at the keyboard. • An additional 43% of employers stated that they monitored employee e-mail, either using software to review email automatically (73%) or assigning an individual to manually read and review workers’ messages (40%). • 12% of bosses regularly monitor the blogosphere. 5 Source: Social Networking and Reputation Risk in the Workplace” Deloitte LLP 2009 Ethics & Workplace Survey (“Deloitte 2009 Social Networking Survey”). http://www.deloitte.com/dtt/cda/doc/content/us_2009_ethicsworkplace_survey_150509.pdf. 6 See, e.g., Doe v. XYC Corp., 887 A.2d 1156, 1162 (N.J. Super. Ct. App. Div. 2005) (“The duty to monitor employee’s internet activities does not exist.”). 2 8901858.1 2/22/2010 • another 10% keep an eye on social networking sites to determine what employees, disgruntled ex-employees, competitors, customers, critics, fans, and others are posting about the company, its people, products, and services. • 13% of businesses retain instant messenger chat.7 • 24% of U.S. employers have had e-mail subpoenaed by courts, and another 15% have gone to court to battle lawsuits triggered by employee e-mail.8 D. III. Most American Policies. Employers Have Electronic Communications • 84% of U.S. employers have policies governing email use. • 81% of organizations have policies on Internet use. 9 • Over 80% of companies that monitor employee communications notify their employees about the possibility of monitoring.10 Employers’ Reasons for Monitoring Employees’ Off-Duty Internet Usage and Social Networking: A. Monitoring To Prevent Reputational Damage from “Bad Employee” Blogs and Postings The Burger King Employee Bath in Work Sink YouTube Video: In August 2008, a YouTube video of a Burger King employee taking a bath in a sink at work while others watched and while a manager counted money nearby. The video was posted on MySpace and someone sent it to the health department. The health department was not happy. All the employees involved were later fired, but Burger King had to endure the bad publicity and issue a public apology.11 7 2007 Electronic Monitoring and Surveillance Survey from American Management Association (AMA) and the ePolicy Institute (Results reported at: http://www.amanet.org/training/articles/The-Latest-onWorkplace-Monitoring-and-Surveillance.aspx). 8 2006 Workplace E-Mail, Instant Messaging & Blog Survey from American Management Association and The ePolicy Institute. 9 2005 American Management Association Survey on Employer Monitoring www.amanet.org/press/amanews/ems05.htm. 10 Adam C. Losey, Clicking Away Confidentiality: Workplace Waiver of Attorney-Client Privilege, 60 Fla. L. Rev. 1179, 1181 (2008)(citing Ericka Chickowski, Monitoring Employee Internet Usage, PROCESSOR, at 29, 29 (Apr. 14, 2006) and Kyle Schurman, E-mail & Your Legal Rights, SMART COMPUTING, July 2001, at 140, 140–41). 11 http://www.youtube.com/watch?v=a1iyN7Y-jJQ http://www.foxnews.com/story/0,2933,402264,00.html 3 8901858.1 2/22/2010 “KFC Moments” MySpace Posting: In December 2008, 3 KFC female employees used a KFC sink as a hot tub, took sexy pictures in their bathing suits, and posted it on MySpace. According to one article, the album was called “KFC Moments”. Apparently, the privacy settings weren’t on. The girls were fired, but not before the incident was immortalized on YouTube and other sites.12 U.S. Capitol Police “Make It Rain Foundation for Underprivileged Hoes” Facebook Group: In April 2009, the U.S. Capitol Police members were investigated for being part of a Facebook group degrading women. Someone tipped off the US Capital Police and also the Washington Post. The group was called “Make it Rain Foundation for Underprivileged Hoes” and had 1,750 members. The “let it rain” phrase referred to tossing money up over strippers and letting it “rain” down. The Post found Facebook pictures and links to that group for three of the nine officers that were alleged to be involved. Two of the three men wore something identifying them as Capitol Police – one in uniform and another in a Capitol Police T-shirt. Later the Facebook pages were taken down. Some of the men were also alleged to be part of another “Passed out in Trashcans” Facebook group. The investigation was announced April 23, 2009 but no resolution has been reported.13 The Julie/Julia Project Blog. On the first day of the Blog written by Julie Powell, the subject of the movie “Julie and Julia,” she posted this, which includes a link to the company that employed her: Government drone by day, renegade foodie by night. Too old for theatre, too young for children, and too bitter for anything else, Julie Powell was looking for a challenge. And in the Julie/Julia project she found it. Risking her marriage, her job, and her cats’ well-being, she has signed on for a deranged assignment.14 Later she posted this: http://consumerist.com/2008/08/burger-king-employee-takes-bath-in-sink-feels-wrath-of-healthdepartment.html 12 Here are links with pictures: http://images.google.com/images?hl=en&safe=off&client=firefox-a&rls=org.mozilla:enUS:official&hs=nt3&q=KFC+employees+sink&oq=&um=1&ie=UTF8&ei=OGBzS9TKHIKMtAOr78X8BQ&sa=X&oi=image_result_group&ct=title&resnum=4&ved=0CB8QsA QwAw http://www.nydailynews.com/news/national/2008/12/11/2008-1211_kentucky_fried_chicken_trio_photographed.html http://www.youtube.com/watch?v=LpAXRt4TVgM 13 http://www.washingtontimes.com/news/2009/apr/22/capitol-police-probe-officers-facebook-pages/ http://www.washingtontimes.com/news/2009/apr/23/capitol-police-chief-vows-action/ 14 Link: http://blogs.salon.com/0001399/2002/08/25.html 4 8901858.1 2/22/2010 For a week now the Project has forged on through several circles of hell -- the Moving Hell, the September 11th Anniversary Week at Downtown Development Agency Hell, the Soul-Sucking Dead-End Job Hell. B. Monitoring To Prevent Cyber-Slander Courtney Love’s tweets about her former fashion designer, Dawn Simorangkir, resulted in the filing of a libel claim against Love in Los Angeles Superior Court in March 2009. According to reports, Love tweeted that Simorangkir was a “nasty, lying, hosebag thief”; having “a history of dealing cocaine”; having “lost all custody of her child”; and, being guilty of “assault and burglary.” Love also said the designer would be “hunted til your [sic] dead.” Love then allegedly posted on a fashion site where Ms. Simorangkir sells her clothes: “The nastiest lying worst person I have ever known … evil incarnate, vile horrible lying bitch.” Simorangkir seeks punitive damages, citing that Love’s comments have destroyed her reputation and her business. The court papers stated Love’s tweets occurred because she was furious that Ms Simorangkir stopped working for her after Love failed to pay her bill and that this led to “an intense level of animosity … well beyond what any reasonable person would consider acceptable behavior.”15 C. Anonymous Posts Do Not Guarantee Protection from Detection Whole Foods CEO Blogging: The anonymous blog postings of the CEO of Whole Foods disparaging a smaller competitor Wild Oats prior to Whole Foods’ acquisition of Wild Oats were cited in a lawsuit filed by the FTC in 2007 to stop the acquisition as being anticompetitive. Between 1999 and 2006, Whole Foods CEO John Mackey posted anonymous messages on Yahoo! financial message boards about his own company, and smaller rival Wild Oats, using the pseudonym Rahodeb (his wife Deborah’s name spelled backwards, with the h and r at the end swapped). Mackey disparaged the management of Wild Oats and questioned why any company would be interested in acquiring the Whole Foods competitor. In addition to being cited in the FTC’s lawsuit, the SEC also investigated Mackey’s postings to see whether he was trying to manipulate Wild Oats’ stock before the acquisition, but decided not to pursue any action in 2008.16 Dooced: Heather Armstrong was a blogger who is credited with coining the term “dooced,” which means to lose your job for blogging. Armstrong used her blog Dooce.com to complain about her boss and obnoxious coworkers. While she kept the name of her employer a secret, never revealing the name of the software company that 15 Reported at: http://abcnews.go.com/Entertainment/AheadoftheCurve/story?id=7219953 with link to complaint filed against Love); Andrew Johnson and Ian Griggs, Love’s Online Spat Sparks First Twitter Libel Suit, The Independent, March 29, 2009, http://www.independent.co.uk/news/media/online/lovesonline-spat-sparks-first-twitter-libel-suit-1656621.html. 16 Reported at: http://industry.bnet.com/food/100063/whole-foods-mackey-back-to-blogging-after-sec- probe/ 5 8901858.1 2/22/2010 employed her, one reader figured out where Armstrong worked and sent an e-mail to Armstrong’s employer about her blog. Armstrong was fired immediately.17 The Delta Flight Attendant Blog: Delta Air Lines flight attendant Ellen Simonetti was fired, she said, for what her supervisor called a misuse of uniform. Simonetti had posted on her personal blog, Queen of Sky (now called Diary of a Fired Flight Attendant), pictures of herself, in her uniform, on an empty plane. Her blog also contained thinly veiled work stories. The airline terminated her, and she later sued for discrimination, arguing that male employees were not disciplined for postings on their blogs. Ellen Simonetti, Perspective: I was Fired for Blogging, News.com (December 16, 2004); Simonetti v. Delta Airlines, Inc., U.S. District Court, No. 1:05-cv-2321 (N.D. Ga. 2005). D. Monitoring For Breaches Of Restrictive Covenants Employer’s investigation of employee’s breach of fiduciary duty lead to employee suit for invasion of privacy: Employee came out ahead by $1.1 million before attorneys’ fees. Lawlor v. North American Corp. (Ill. Cir. Ct. 2009). Kathy Lawlor brought a breach of contract (for unpaid commissions) and an invasion-of-privacy lawsuit against her former employer, Glenview-based North American Corp. of Illinois, because the company hired a private investigator after Lawlor left North American in 2005 to see if she was stealing customers. The investigator obtained her phone records without her authorization, which is known as "pretexting," and turned them over to the company executives. A Cook County (Illinois) jury found that North American had invaded her privacy and ordered the company, a business services firm, to pay her $1.8 million. On Oct. 19, 2009, the judge sided with the company in its separate claim against Lawlor for anticompetitive conduct and ordered Lawlor to give back $78,781 in commissions she had earned, as well as to pay $551,467 in punitive damages. Bottom line: Lawlor came out ahead by about $1.1 million before she pays her attorneys and taxes. The two sides are still squabbling over both rulings, so it's too early to say if the outcome will stand.18 Starbucks Used Internet Searches to Monitor Compliance With Non-Compete And Sued To Block Exec From Joining Rival Dunkin' Donuts In 2009, Starbucks filed the lawsuit in U.S. district court in Seattle against Paul Twohig, who oversaw the company’s retail operations in the Southeast before joining Dunkin’ Donuts. Starbucks accuses Twohig of breaching an 18-month, non-compete agreement. Twohig was responsible for developing Starbucks’ brand for thousands of retail stores before he left Starbucks. Using periodic Internet searches, Starbucks discovered that Twohig had accepted a position with Dunkin’ Donuts as its brand operations officer. Starbucks then sued. Starbucks and Twohig settled with Starbucks 17 (Source: Urban Dictionary: http://www.urbandictionary.com/define.php?term=dooced 18 Lawlor v. North American Corp. (Ill. http://www.morelaw.com/verdicts/case.asp?n=&s=IL&d=41817) 6 8901858.1 2/22/2010 Cir. Ct. 2009)(Reported at reducing Twohig’s 18-month non-compete to 10 months and Twohig agreeing to pay Starbucks $500,000.19 E. Monitoring to Prevent “Cyber-smearing,” “Cyber-stalking” and “Cyber-harassment.” Employers can be liable for on-line harassment of employees by co-workers, particularly if the employers knew or should have known about the harassing communication. In Blakey v. Continental Airlines, Inc., 751 A.2d 538 (N.J. 2000), an employee sued Continental Airlines over derogatory comments made on a company electronic message board and the New Jersey Supreme Court reversed summary judgment for the employer, stating that the message board had sufficient connection to the employer that, if it had actual or constructive notice of the postings, it could be liable for hostile work environment. 20 In February 2009, three police officers in Harrison, N.Y., were suspended after they allegedly made lewd remarks about the town mayor on a Facebook account. The officers mistakenly thought the remarks were protected with a password, but city officials viewed the page, said Harrison police chief David Hall. The remarks about Mayor Joan Walsh might have violated the officer's code of conduct. Mr. Hall said the town board was considering firing the officers. The policemen have asked a federal judge in White Plains, N.Y., to limit the town of Harrison's inquiry into the online postings, citing privacy concerns, but no resolution was reported.21 1) Employees may be Discharged for Cyber-threats Sent from Home Computers Using Company Email Systems In Smyth v. Pillsbury, 914 F. Supp. 97 (E.D. Pa. 1996), the employee's termination was upheld by the court, even though the company had a policy of allowing e-mail use for personal communications. Smyth asserted that the company had assured employees that it would respect the confidentiality of e-mail communications; specifically, that email would not be intercepted or used as grounds for termination. He further alleged that he received an e-mail on his home computer from a supervisor and exchanged communications with him that disparaged company management and could be taken as potential threats to it. These were monitored and Smyth was discharged. He claimed that his discharge violated the state’s public policy by infringing on his right to privacy. The district court rejected his claim in part because: 19 Reported at: http://www.nrn.com/breakingNews.aspx?id=375036. Tim McLaughlin, Boston Business Journal (Wednesday, October 7, 2009, 5:29pm EDT). 20 See Jones v. R.R. Donnelley & Sons Co., 1999 WL 33257839 (N.D. Ill. 1999) (race discrimination claim based in part on 165 offensive jokes transmitted through e-mail system); Curtis v. Citibank, 1998 WL 3354 (S.D. N.Y. 1998) (racist e-mail). 21 Dionne Serarcey, Employers Watching Workers Online Spurs Privacy Debate, WSJ.com April 23, 2009). Source: http://online.wsj.com/article/SB124045009224646091.html. 7 8901858.1 2/22/2010 • “[o]nce plaintiff communicated the alleged unprofessional comments to a second person (his supervisor) over an e-mail system which was apparently utilized by the entire company, any reasonable expectation of privacy was lost” and • “the company’s interest in preventing inappropriate and unprofessional comments or even illegal activity over its e-mail system outweighs any privacy interest the employee may have in those comments.”22 2) Harassment by Text and Social Networking. Employers should be aware of the possibility that employees (including managers and supervisors) might post offensive language or pictures on social networking sites that can be viewed by co-workers and clients. These off duty postings can create an actionable hostile environment at work. In one sexual harassment suit in Connecticut against World Wrestling Entertainment Inc., a former licensing coordinator the married, senior director of the company's consumer products division made sexual advances via late-night texts and phone calls. D'Angelo v. World Wrestling Entertainment, Inc., Case No. 3:08-CV-01548 (D. Conn. 2008). In another case, four waitresses at Famous Dave's restaurant in Kanawha County, W. Va., also relied on text messages to bolster sexual harassment claims against a supervisor last year, alleging, among other things, that he sent text messages asking for sexual favors. Zeigler, et al. v. Famous Dave’s, et al., 2008 WLNR 4723590. In January, 2009, two women in Ohio used texts to secure a $495,000 settlement in a sex scandal that led to the resignation of state Attorney General Marc Dann. The texts to help show that they were placed in situations that made the AG's office a hostile work environment. In one case, one of the women produced a text message that said she was "in a weird situation" and needed a ride home from Dann's apartment one night.23 In April 2009, text messages helped two female soccer players who accused their coach of sexual harassment secure $450,000 in settlement from Central Michigan University. The players alleged that their coach manipulated them into having secret sexual relationships with him. The coach, Tony DiTucci, maintained he was innocent, claiming the two students had made suggestive romantic advances toward him, and that he reported it to his supervisors. However, the coach had sent the players inappropriate text messages, which helped settle the claims.24 22 914 F. Supp. at 101. 23 Tresa Baldas, In the Heat of the Moment, National Law Journal, ALM Media, Inc., July 20, 2009. 24 Id. 8 8901858.1 2/22/2010 3) New State Laws Criminalize Online Harassment. Texas recently enacted a law, effective September 1, 2009, that criminalizes online harassment, stalking and “spoofing.” Texas joins other states that have enacted similar legislation, including Nevada,25 New York26 and Tennessee.27 Although the Texas law uses the term “online harassment,” it prohibits online impersonation with the intent to cause harm, i.e., the unauthorized use of another’s name or persona to create a web page, or to post one or more messages on a commercial social networking site, with the intent to defraud, harm, intimidate or threaten another person. This offense is a third-degree felony, punishable by two to ten years imprisonment and a fine not to exceed $10,000. The law also criminalizes the unauthorized transmission of an electronic communication (e.g., e-mail, text message, or instant message) using another person’s identifying information (e.g., name, domain address, phone number, etc.) with the intent of causing (a) the recipient to believe the sender was the other person, and (b) harm to any person. This offense is a Class A misdemeanor, punishable by up to one year of imprisonment and a fine not to exceed $10,000. The Texas statute, and similar laws in other states, are designed to address situation when disgruntled former employees “spoof” a hated supervisor or executive by posting a phony social networking profile or by sending fake e-mail communication to other employees. These spoofs often are defamatory, but it is often difficult to uncover the identity of the perpetrator(s) or obtain any relief through civil litigation.28 4) It is Hard to Address Cyber-Slander Through Civil Litigation. Blockowicz v. Ramey, 2009 U.S. Dist. LEXIS 118599 (N.D. Ill. Dec. 21, 2009) illustrates the difficulties involved in addressing cyber-slander through the courts. The plaintiffs in Blockowicz v. Ramey were victims of online defamation on social networking and other websites. They successfully obtained a default judgment against the defendants and an injunction to remove the defamatory material. All but one of the third-party networking sites voluntarily removed the defamatory material. However, when the plaintiffs went back into court to force the last site (Xcentric) to comply with the injunction, the judge refused to enjoin Xcentric because it found the third-party site did not act in concert or aid in the posting of the defamatory comments since its Terms of Service prohibited the posting of defamatory material on the site.29 25 NRS 200.575 effective October 1, 2009, text available at: http://www.leg.state.nv.us/NRS/NRS200.html#NRS200Sec575). 26 Text of New York law available at: http://assembly.state.ny.us/leg/?bn=A08193). 27 Tennessee law available at http://state.tn.us/sos/acts/106/pub/pc0347.pdf). 28 Available at: http://www.legis.state.tx.us/tlodocs/81R/billtext/html/HB02003F.htm. 29 Blockowicz, 2009 U.S. Dist. LEXIS 118599, at *6-9. 9 8901858.1 2/22/2010 F. Monitoring to Prevent Discrimination Former Senator George Allen (R-VA) made an off-hand racist remark (“Macaca”) to his opponent’s cameraman, who was of Indian descent.30 His remark was recorded and posted to YouTube, where it may have contributed to his narrow defeat to Democrat Jim Webb.31 G. 1. Monitoring to Address Employees’ Disclosure of Confidential Information On February 4, 2010 at 10:10 am ET, Dow Jones Newswires reported that: Royal Dutch Shell PLC (RDSB.LN) data containing the contact details of tens of thousands of employees, which the company said could compromise their personal safety, has been leaked to a blogger critical of the company, according to emails seen by Dow Jones Newswires. The data, which includes mobile numbers and home postcodes of workers in dangerous locations.32 2. In 2009, U.S. Congressman Pete Hoekstra (R-Mich) got into trouble after he twitted about his exact whereabouts while traveling in Iraq.33 The Pentagon has ordered a review of the use of Twitter and other electronic devices in this fashion.34 3. Employees’ disclosure of confidential information on social networking sites and to the Press can be a legitimate basis for termination. In Tides v. The Boeing Co., 2010 WL 537639 (W. D. Wash. Feb. 9, 2010), a federal judge ruled that Boeing’s termination of fired two auditors for leaking information to a newspaper did not violate the whistleblower protections of the Sarbanes-Oxley Act. 30 Tim Craig & Michael D. Shear, Allen Quip Provokes Outrage, Apology, The Washington Post, August 15, 2006, http://www.washingtonpost.com/wp-dyn/content/article/2006/08/14/AR2006081400589.html. 31 More Than Fine, The Top 5 Viral Videos That Changed Someone’s Life (For the Worse), http://nomorequo.blogspot.com/2007/04/top-5-viral-videos-that-changed.html (last visited May 14, 2009); Vincent Pascual , Twitter and Employment Law Issues, produced for a course entitled “Employment Law and Technology,” taught at the University of San Diego School of Law during Spring Semester 2009 available at: http://socialmedialawstudent.com/twitter/the-first-law-school-seminar-paper-on-twitter-twitter-and-employment-law-issues/#fn-1792-1. 32 Source: http://online.wsj.com/article/BT-CO-20100204712072.html?mod=WSJ_World_MIDDLEHeadlinesMideast 33 Helen A.S. Popkin, Twitter Gets You Fired in 140 Characters or Less, MSNBC, March 23, 2009, http://www.msnbc.msn.com/id/29796962/. 34 Kyla King, Congressman Pete Hoekstra’s Twitter Flap Prompts Pentagon Policy Review, MLive, February 11, 2009. http://www.mlive.com/news/grand-rapids/index.ssf/2009/02/hoekstras_twitter_flap_prompts.html. 10 8901858.1 2/22/2010 4. “Pretexting” and poor investigation techniques may undermine employer’s efforts to protect confidential information and stop leaks In 2006, Hewlett-Packard hired private investigators to help find the source of information leaks. HP used poorly conceived investigatory such as digging through trash, sending fake e-mails loaded with hidden tracking software, and tailing journalists who were communicating with HP employees. They crossed the legal line when they used pretexting, or posing as someone else in order to get phone records. The chairman of HP Patricia Dunn and half a dozen board members resigned or were fired as a result. Dunn was charged with four felonies; as was Kevin Hunsaker, the company's senior counsel and chief ethics officer.35 1) Social Networking Sites Address Confidential Information and IP in Terms of Service. a. YouTube expressly states in its Terms of Service that it "does not permit copyright infringing activities and infringement of intellectual property rights on its Website" and, if such activities take place, YouTube will remove any infringing content from the site. YouTube, like most social media sites, states in its Terms of Service that the company reserves the right to make the call whether content is infringing or not and reserves the right to remove (or not remove) the complainedof content. b. Twitter devotes a specific section of its site to copyright violations (see "Copyright Policy": http://twitter.com/tos), including designating a specific "Copyright Agent" to receive DMCA requests in accordance with a specific DMCA procedure. c. Facebook's Statement of Rights and Responsibilities requires an individual or business signing up for a page on Facebook to agree among other things, not to "post content or take any action in Facebook that infringes or violates someone else's rights or otherwise violates the law." In this agreement, it is acknowledged that Facebook "can remove any content or information" if Facebook believes it violates provisions of the Statement. Like the YouTube and Twitter policies described above, Facebook provides separate 35 Reported at: Hannah Clark, How to Spy (Legally) on Your Employees, Forbes.com (Oct. 26, 2006), link: http://www.forbes.com/2006/10/25/leadership-hewlett-packard-spying-lead-managecx_hc_1025fiveways.html. 11 8901858.1 2/22/2010 mechanisms for reporting copyright and non-copyright infringement issues.36 H. Monitoring to Prevent Improper “Friending,” Endorsements, and LinkedIn Recommendations 1) Ethical Rules for Attorneys and Judges. The Judicial Ethics Advisory Committee of the Florida Supreme Court recently opined on the ethical issues relating to judges' use of online social networking sites, such as Facebook. The Committee advised that when judges “friend” lawyers online who may appear before them, it creates the appearance of a conflict of interest because it “reasonably conveys to others the impression that these lawyer ‘friends’ are in a special position to influence the judge.” The Philadelphia Bar Association Professional Guidance Committee issued its Opinion 2009-02 which held that a lawyer could not ask a “third person” (presumably a paralegal or office employee) to Facebook-friend a deposition witness so the lawyer could surreptitiously access the witness’ Facebook page.37 2) The FTC’s Endorsement Guides. On October 5, 2009, the FTC released its Final Guides Concerning the Use of Endorsements and Testimonials in Advertising, which state that the post of a blogger who receives cash or in-kind payment to review a product is considered an endorsement and bloggers who make an endorsement must disclose the material connections they share with the seller of the product or service. Thus, employees’ LinkedIn recommendations and other blogging endorsements of clients, customers, suppliers and other third parties based on the express or implied promise of compensation, kickbacks or continued business may result in potential liability for employers under the FTC’s new rules.38 LinkedIn recommendations may cause other trouble for employers. A supervisor’s LinkedIn recommendation of a subordinate could become evidence in a subsequent employment discrimination lawsuit. For instance, an employee who is terminated for performance reasons may claim that the discharge was discriminatory and the performance reasons were pretextual by relying upon a LinkedIn recommendation provided by his/her supervisor as proof that he/she was performing satisfactorily. 36 Available at: http://www.facebook.com/legal/copyright.php?copyright_notice=1. and http://www.facebook.com/legal/copyright.php?noncopyright_notice=1. 37 Copy of Opinion 209-02 available at: http://www.philadelphiabar.org/WebObjects/PBAReadOnly.woa/Contents/WebServerResources/CMSRes ources/Opinion_2009-2.pdf. 38 http://www.ftc.gov/opa/2009/10/endortest.shtm. 12 8901858.1 2/22/2010 I. Screening Job Applicants’ Blogs, Social Networking Profiles, and Video Posts With 400,000,000 million active users on Facebook alone, interviewers are now scrutinizing job candidates’ social networking profiles and video site postings for an unfiltered look at the real person behind the resume. According to a CareerBuilder.com 2009 survey, 45% of the employers polled said they've researched job candidates via social-networking sites like Facebook - an increase from only 22% in 2008. And 35 percent said the information they found—such as indications of drug and alcohol use or provocative pictures or messages—resulted in rejecting a candidate.39 1) The Potential Pitfalls for Employers from Screening Job Applicants’ Social Networking a. 1. The Risks of Requiring Access to Applicants’ Social Networking Sites. The Bozeman, Montana Fiasco January 2009: The City of Bozeman, Montana required all job applicants to not only list their social networking sites but also provide log in information. The City had apparently started requiring this three years earlier with fire and police applicants – supposedly looking for illegal activity – and then expanded it. The City’s Application Form asked applicants: “Please list any and all current personal or business Web sites, Web pages or memberships on any Internet-based chat rooms, social clubs or forums, to include, but not limited to: Facebook, Google, Yahoo, YouTube.com, MySpace, etc.” Three lines were provided for applicants to list log-in information for each site. The story made worldwide news, prompting lots of internet and media outrage. The Guardian, a major daily newspaper in London, named the city of Bozeman its “civil liberties villain of the week” on its Web site. In June 2009, the City apologized and suspended the policy but didn’t totally eliminate it. The City later claimed they had only required this information from people that were 39 Source: “Forty-Five Percent of Employers Use Social Networking Sites to Research Job Candidates CareerBuilder Survey Finds” Wall Street Journal August 19, 2009. http://bozemandailychronicle.com/articles/2009/06/19/news/10socialnetworking.txt. 13 8901858.1 2/22/2010 going to be offered a job. Note that the city commissioners were never subject to this policy.40 2. The Missouri School Superintendant’s Hiring Inquiries. April 2008: The Washington Post reported that a Missouri school superintendent asks potential teachers if they have a Facebook or MySpace page. If the candidate says yes, then the superintendent suggests taking an immediate look at the would-be teacher’s profile.41 b. Reasons Why Job Applicants Should Be Discrete About What They Tweet. The “Cisco Fatty” story: According to reports, a person offered a job at Cisco tweeted that “Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.” The “Cisco Fatty” did not protect her profile or limit access to her tweets. Someone claiming to be a Cisco associate responded that her Tweet would be passed along to her hiring manager. This Tweet was taken out of context, according to the Cisco Fatty, because the paycheck was for an internship she didn’t want and already turned down.42 c. The Legal Risks for Employers of Using Social Networking Sites to Screen Applicants Many hiring managers “Google” applicants or view Facebook profiles to uncover useful information about job candidates. Some employers/HR personnel engage in “ghosting” by posing as a random Twitter user interested in an applicant’s tweets or other their online accounts.43 However, they overlook the potential legal problems that arise from doing so. 1. For instance, while an employer cannot legally ask an applicant his/her age, sexual orientation, religion, national origin, disability status or personal health information. During a conventional application/interview process, the employer may unwittingly learn this information by doing a quick “Google” search. Once an employer has such information, it may face discrimination claims from applicants who are not hired and contend 40 Source: “Forty-Five Percent of Employers Use Social Networking Sites to Research Job Candidates CareerBuilder Survey Finds” Wall Street Journal August 19, 2009. http://bozemandailychronicle.com/articles/2009/06/19/news/10socialnetworking.txt. 41 When Young Teachers Go Wild On The Web (Washington Post April http://www.washingtonpost.com/wp-dyn/content/article/2008/04/27/AR2008042702213.html. 2008) : 42 Helen A.S. Popkin, Getting the skinny on Twitter’s ‘Cisco Fatty’, MSNBC, March 27, 2009, http://www.msnbc.msn.com/id/29901380/. 43 Charles Robinson, Social networking a potential trap for prospects, Yahoo! Sports, April 7, 2009, http://sports.yahoo.com/nfl/news?slug=cr-socialnetowrking040709. 14 8901858.1 2/22/2010 that the company’s decision was based on the protected factor revealed by a blog posting, tweet or Facebook profile. 2. The Equal Employment Opportunity Commission (EEOC) requested public comment in 2009 on whether employers should be prohibited from using social- networking sites like Facebook to research job candidates, since the online searches could reveal information about genetic information protected under the Genetic Information Nondiscrimination Act (GINA).44 3. Similarly, applicants may allege discrimination where the employer only conducts Google searches on some applicants (for example, minorities), and not others, or holds certain groups to a higher standard than others when viewing and considering information on social media sites. 4. In using such sites, the Fair Credit Reporting Act, 15 U.S.C. § 1681, et seq., and similar state laws may come into play if information on a social networking site, such as Facebook, was obtained by a third party investigator and included in a “consumer report” (i.e., a backgroundcheck) that the employer intends to use in an employment decision. The FCRA would not prohibit the acquisition or use of the information, but would require notices and disclosure of the fact that such information was the basis for the decision. 5. Facebook, Twitter and other accounts can be faked, so hiring personnel should not believe everything they see on these sites. There have been many lawsuits like this one from UK: http://news.bbc.co.uk/2/hi/uk_news/7523128.stm To reduce risk in this area, employers are well-advised to prepare and distribute a comprehensive Internet background search policy and train supervisors in this area. In addition, employers may have a third-party or “screened” employee conduct any Internet background checks and send only information relevant to the employment search to the company’s hiring decisionmakers. 44 (http://edocket.access.gpo.gov/2009/E9-4221.htm. Reported at: http://www.baerbizlaw.com/category/blog/genetic-information-and-social-media-employers-beware/). 15 8901858.1 2/22/2010 IV. The Potential Pitfalls for Employers Monitoring Employees’ Off-Duty Internet Usage and Social Networking A. NLRB Issues. 1) Policies Barring Worker Criticism of Employer May Cause Labor Problems. In February 2010, the Newspaper Guild of New York accused Thomson Reuters Corp. of neglecting to negotiate with the union before cutting the pay of unionized workers and imposing a policy barring workers from bashing the media giant on Twitter.45 In Register-Guard, 351 NLRB No. 70 (2007), the National Labor Relations Board held that employees could not use their employer's e-mail system as a matter of right to engage in union-related activities or union solicitation. On July 7, 2009, the D.C. Circuit refused to uphold the Board's conclusion as to whether the employer discriminatorily enforced its email policy but did not explicitly overrule the standard announced by the Board in December (because on appeal, the union did not challenge the lawfulness of the email policy), effectively holding that the newspaper in that case did not violate federal law by issuing a policy banning all solicitations, including union solicitations, from its corporate e-mail system. However, the D.C. Circuit found the newspaper’s inconsistent enforcement of its policy demonstrated unlawful discrimination against union activities because “in practice the only employee emails that had ever led to discipline were the union-related emails at issue here.”46 In Konop v. Hawaiian Airlines, Inc., the Ninth Circuit had held that surveillance of an employee’s secure website for utterances protected by the Railway Labor Act (applicable to airline employees) stated a claim for violation of that Act.47 45 Source: Employment Law360 (Feb. 8, 2010)(reporting on union’s NLRB claim against Reuters): http://employment.law360.com/registrations/user_registration?article_id=148166&concurrency_check=fal se 46 Guard Publishing Co. d/b/a The Register-Guard v. NLRB, 571 F.3d 53, 60 (D.C. Cir July 7, 2009). Cf. Media Gen'l Operations, Inc. v. NLRB, 2007 WL 806023, *3 (4th Cir. 2007) (affirming NLRB decision that had found an unfair labor practice based on an employer/newspaper's discriminatory enforcement of its email policy's prohibition on non-business uses, where employer had violated the NLRA by "ma[king] no attempt ... to enforce the policy against any violations other than union messages[, given that t]he re-cord contains numerous examples of messages unrelated to the work of the newspaper"). 47 Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir. 2002). 16 8901858.1 2/22/2010 B. Invasion of Privacy Claims 1) Employees’ Reasonable Expectation Employers’ “Offensive” Intrusion of Privacy and Employer’s Limited Hidden Workplace Surveillance to Uncover Who Viewed Pornography on Company Computer was Not Sufficiently Offensive. In Hernandez v. Hillsides, 47 Cal. 4th 272, 211 P.3d 1063, 97 Cal. Rptr. 274 (Cal. August 3, 2009), an executive director of a non-profit residential facility for abused children installed hidden cameras in an office shared by the plaintiffs to find out who was viewing pornographic web sites from a company computer after hours because he was concerned for the safety of the children at the center. The plaintiffs themselves were not suspects and were never recorded or videotaped as the recordings only took place overnight when plaintiffs were away from the office. Nonetheless, plaintiffs sued Hillsides for invasion of privacy after discovering the hidden camera. Even though the lower courts found for the plaintiffs, the California Supreme Court reversed because, based on the specific facts of this case, the employer’s intrusion was not “highly offensive and sufficiently serious” to constitute a violation of its employees’ privacy interests since the employer had a compelling reason for the surveillance (protecting the children at the center), and that the surveillance was limited to recording on three occasions with the camera pointed only at plaintiffs’ computers, and only after business hours so that plaintiffs were never actually videotaped. Other courts have rejected invasion of privacy claims based upon employers accessing employees’ “personal documents” on company computers where the no privileged communications with personal attorneys were involved and the companies had clear monitoring policies. See McLaren v. Microsoft Corp., 1999 WL 339015 (Tex. App. Dallas 1999) (rejecting claim for invasion of privacy when management had accessed employee's "personal" folders on a company computer). C. Federal Laws Affecting Employer Monitoring of Off-Duty Social Networking. 1) The Federal Electronic Communications Privacy Act (“ECPA”) prohibits the unauthorized interception of wire, oral or electronic communication.48 An “interception” is defined as the “aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.49 Criminal penalties for a violation of the ECPA can include a fine or imprisonment up to five years.50 Further, individuals whose communications were intercepted under this section can bring a civil action against the person or entity who 48 18 USC §§ 2510-2521. 49 Id. § 2510(4). 50 Id. § 2511(4)(a). 17 8901858.1 2/22/2010 engaged in the violation for damages including preliminary or equitable relief, actual damages, statutory damages amounting to the greater of $100/day for each day of the violation or $10,000, punitive damages, and attorney’s fees.51 There are two relevant exceptions to the ECPA: the consent exception and the business extension exception. a. The ECPA’s Consent Exception Under the EPCA’s “consent” exception, a party to a communication can “consent” to an otherwise impermissible monitoring of the communication: It shall not be unlawful under this chapter for a person. . .to intercept a wire, oral, or electronic communication where such person is a party to the communication or where of the parties to the communication has given prior consent to such interception unless such communication is intercepted for the purpose of committing any criminal or tortious act. . .52 Thus, employers will not face liability under the ECPA as long as it obtains consent from at least one of the parties to the communication. Consent under the ECPA can be either express or implied. One author noted that because the determination of whether there is implied consent is highly fact-specific, employers should attempt to obtain express consent in writing.53 Implied consent can be inferred from the surrounding circumstances indicating that the party knowingly agreed to the surveillance.54 Consent, however, is not “cavalierly implied.”55 Because the ECPA applies only to the interception of communications before they are stored and does not apply to the interception of communications that involves the consent of only one party, employers usually will not face liability under the ECPA for 51 Id. § 2520(a)(c). 52 18 U.S.C. § 2511(2)(d)(emphasis added) 53 Lee, Wrongful Termination Claims: What Plaintiffs and Defendants Have to Know, 651 PLI/Lit at 545. 54 Laughlin v. Maust, 1997 WL 436224 at *5 (N.D.Ill. Aug. 1, 1997) (restaurant employee who was notified that its main business line would be monitored had impliedly consented to the recording, but employees who had not been notified had not impliedly consented). 55 Abbott v. Village of Winthrop Harbor, 953 F. Supp. 931 (N.D.Ill. 1996) (fact that plaintiffs heard beep tones indicative of the “tapped phones” when using the line was insufficient to create “consent”); Deal v. Spears, 980 F. 2d 1153, 1157 (8th Cir. 1992) (informing employee that he “might” monitor was not sufficient to obtain “consent”); Watkins v. Berry, 704 F. 2d 577, 579-81 (11th Cir. 1983) (where employer told employees that personal calls would not be monitored except to the extent necessary to determine whether a call was personal or business related, monitoring of a personal call might violate ECPA). 18 8901858.1 2/22/2010 monitoring blogs, tweets and other social networking because they involve stored communications. b. The EPCA’s Business Extension Exception The business extension exception provides an alternative, although less clear-cut, defense for employers who face liability for monitoring communications under the ECPA.56 Unlike the consent exception, this exception is not explicitly set forth in the statute. Rather, courts have based it on the definition of the phrase “electronic, mechanical, or other device” (an “intercept” requires the use of a “mechanical, electronic, or other device”). The phrase is defined as: Any device or apparatus which can be used to intercept a wire, oral, or electronic communication other than – any telephone or telegraph instrument, equipment or facility, or any component thereof, i) furnished to the subscriber or user by a provider . . . in the ordinary course of its business and being used by the subscriber in the ordinary course of its business or furnished by such subscriber or user for connection to the facilities of such service and used in the ordinary course of its business. . . . Therefore, the exception is derived from the theory that telephone equipment used for intercepting communications furnished by a subscriber used in the ordinary course of business is not a “mechanical, electronic, or other device.” If an employer uses such equipment while monitoring a phone call for business purposes, there is no unlawful “intercept.” At least one court has held that consent is not a component of this exception.57 Courts applying the business extension exception have focused on the kind and source of equipment used to intercept to determine the applicability of the exception.58 Courts have also addressed the nature of the calls intercepted and reasons for doing so.59 Monitoring employee communications for training and quality control purposes in the ordinary course of business would probably be protected under the ECPA’s business 56 18 USC § 2510(5)(a)(i). 57 Arias v. Mutual Central Alarm Svc., Inc., 202 F.3d 553, 559 (2d Cir. 2000). 58 Laughlin v. Maust, 1997 WL 436224 at *3 (recording phone calls through an adapter and recorder attached to a main business line, where the employer merely recorded, but did not “listen in” and where the recording device at issue was not provided by the telephone company, did not satisfy the extension); Watkins v. Berry, 704 F. 2d at 582 (recording device purchased at Radio Shack attached to a phone extension did not qualify for the extension); Amati v. City of Woodstock, 1997 WL 857493 at * 3 (N.D. Ill. 1997) ( “[A] vast majority of the circuit courts of appeals having [addressed this issue] have held that a recorder acquired via a third party and attached to a telephone line does not fall within the exemption of section 2510(5)(a)”). 59 Epps. v. St. Mary’s Hospital, 802 F.2d 412, 416 (11th Cir. 1986). See also Smith v. Devers, 2002 WL 75803 at *3 (M.D. Ala. Jan. 17, 2002) (“It is quite apparent that the complete interception of personal phone calls of an employee is not and can never be protected behavior under the business-extension exemption. That exemption allows only the interception sufficient to determine the personal nature of the call.) 19 8901858.1 2/22/2010 extension exception, as long as the monitoring was does using through equipment provided by employers’ telephone service provider, and employers refrain from recording personal calls once they determine that the call is personal. 2) The Stored Communications Act. The Stored Communications Act (“SCA”), 18 U.S.C. §§ 2701-2711, makes it an offense to “intentionally access a facility through which an electronic communication service is provided . . . and thereby obtain ... access to a wire or electronic communication while it is in electronic storage in such system.” It is possible, therefore, that an employer could face liability under the SCA for accessing an employee external website where that website is password protected or contains other security measures – and the employer does so without the employee’s authorization. Like the ECPA, the SCA contains an exception from potential liability if the conduct is, in fact, authorized by the person using the service with respect to any communication intended for the user.60 Reviewing Employees’ Private Emails Violated the SCA. In Van Alstyne v. Electronic Scriptorium Limited, 560 F.3d 199 (4th Cir. 2009), the Fourth Circuit held that an employer who accessed a former employee's personal e-mail account without permission could be held liable for punitive damages and attorneys' fees under the federal Stored Communications Act (SCA), even without proof of any actual damages, but the SCA’s minimum statutory damages of $1,000 per violation were recoverable only with proof of actual damages (creating a conflict with district court decisions in other circuits). The Fourth Circuit noted that Edward Leonard, the president of Electronic Scriptorium Limited (ESL), gained access to the personal e-mail account of Bonnie Van Alstyne, ESL's former Vice President of Marketing, and reviewed her personal e-mail, after she initiated three separate proceedings against ESL involving employment-related claims. For more than one year after Van Alstyne's termination, Leonard accessed "Van Alstyne's AOL account at all hours of the day, from home and internet cafes, and from locales as diverse as London, Paris, and Hong Kong" and he downloaded 258 different emails from Van Alstyne's personal AOL account. Van Alstyne learned of Leonard's snooping through discovery in a separate lawsuit that ESL had filed against Van Alstyne. She then sued Leonard under the SCA and was awarded more than $400,000 in the trial court, but the Fourth Circuit vacated and remanded the entire award for reconsideration in light of the appellate court’s opinion.61 Employers’ Use of Other Employees to Gain Access to Employees’ PasswordProtected and Access-Restricted Social Networking Violated the SCA and State Law. In Pietrylo v. Hillstone Restaurant Group, d/b/a Houston’s, a Newark, New Jersey jury held that the employer, Houston’s Restaurant, violated the federal Stored Communications Act and the similar New Jersey Wiretapping and Electronic 60 18 U.S.C. § 2701(c)(2). Fischer v. Mt. Olive Lutheran Church, 207 F. Supp. 2d 914, 925-26 (W.D. Wis. 2002)(where an employer and a computer consultant it had hired accessed plaintiff's private Web-based e-mail account, the court found fact issues precluded summary judgment for defendants). 61 20 8901858.1 2/22/2010 Surveillance Control Act, by secretly monitoring employees’ postings on a private password-protected Internet chat room. A jury found in favor of the employees, awarding modest compensatory damages, but adding punitive damages after finding that the company had acted maliciously. The District court affirmed the jury’s finding in an unpublished opinion issued on September 25, 2009. Pietrylo v. Hillstone Restaurant Group, 2009 WL 3128420 (D.N.J. Sept. 25, 2009). The Pietrylo lawsuit arose after two of the restaurant’s managers accessed a MySpace chat group maintained by Pietrylo during his non-work hours. The chat group, called the “Spec-Tator,” could be accessed only via an electronic invitation from Pietrylo. When Pietrylo and Marino created the group, they invited a select group of Houston’s employees, but no managers. If the user accepted that invitation, he or she could access the site only by using a personal password. The site included language that indicated that the group was private, and that it was a place in which Hillstone employees could talk about the “crap/drama/and gossip” related to their workplace. No Hillstone upper manager was invited to join the group, and members accessed the site only during non-work hours and on non-company computers. One employee/chat group member, Karen St. Jean, made a Houston’s manager aware of the site. St. Jean later provided her password to another manager, Robert Anton, who shared the information with a regional manager, Robert Marano. In spite of the privacy warning on the page, Anton and Marano accessed the site on multiple separate occasions. After determining that the content of the postings in the chat group were “offensive,” Anton and Marano fired Pietrylo and Marino. Under the SCA, the plaintiffs had to prove that Houston’s managers accessed the chat group “knowingly, intentionally, or purposefully,” and without authorization. Although Houston’s argued that St. Jean willingly volunteered her password to Anton, St. Jean’s trial testimony included the fact that she would not have provided that information to Anton if he had not been a manager. The court’s decision to affirm the jury’s findings turned partly on the fact that there was no documentary evidence concerning the authorization, and so the jury had to rely on the testimony and demeanor of the witnesses. The court held that the jury could infer from St. Jean’s testimony, specifically her statement that she felt that she “would have gotten in trouble” if she hadn’t provided her password, that the purported authorization was coerced. In addition, the court cited that particular testimony, in conjunction with the fact that the restaurant’s managers viewed the site on several different occasions, even though the site specifically contained warnings that it was “private” and accessible to “members only,” to support its decision to deny Houston’s motions for JNOV or a new trial.62 Employer Take-Aways: The evidence that managers may have coerced a co-worker to disclose the password to the chat room, the lack of documentation regarding how the company obtained the password, the accessing of a self-designated “private” chat room by individuals without an actual invitation, and the repeated accessing of the site by 62 Id. at *2-4. 21 8901858.1 2/22/2010 manager with specific knowledge of its invitation-only status, all provided a basis for the court to support the jury’s findings against the company. Using Passwords Obtained from Co-Workers to Access Restricted Access Websites Violated the SCA In Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir. 2002), a dissident pilot, Konop, maintained a website on which he posted remarks critical of the company and its managers. He restricted access to it by requiring visitors to log in with a user name and password and to agree not to disclose the site’s contents. He provided user names to some co-workers, but not to managers. A company Vice President got permission from a pilot, who had been given access, to use his password to gain access. (Konop learned of the possible breach of the security of his site and took it down, but restored it shortly thereafter.) The Vice President continued to view the website, this time by using the password of another pilot with his permission. The Ninth Circuit addressed Konop’s claim that the Vice President’s access to his private website violated the Stored Communications Act, which prohibits unauthorized access to an electronic communication while in storage. The SCA exempts conduct authorized by a “user” of the service with respect to a communication intended for that user, but the Ninth Circuit read the SCA’s “user” exemption narrowly to mean only someone who had been authorized to access the service and had actually availed himself of the service. Reviewing Transcripts of Text Messages Sent on Employer-Owned Pagers, But Obtained from Employees’ Cell Phone Provider, Violated the Stored Communications Act and the Fourth Amendment (9th Cir. 2008 – cert. granted by U.S. Sup. Ct.) In Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892 (9th Cir. 2008), cert. granted sub nom. City of Ontario v. Quan, ___ U.S. ___, 2009 WL 1146443 (Dec. 14, 2009), the Ninth Circuit affirmed a the district court's ruling that the defendants violated the Stored Communications Act ("SCA") and their Fourth Amendment rights by producing plaintiff's text messages to the police department. The police department claimed it sought the plaintiffs' text message transcripts to determine if the usage overages the plaintiffs incurred were due to personal messages. Categorizing the defendant service provider as an "electronic communication service" (ECS) that knowingly provided transcripts of the text messages to the defendant City who was merely a "subscriber" and not "an addressee or intended recipient of such communication," the Ninth Circuit determined the defendant violated the SCA and remanded the case to the district court. The Ninth Circuit ruled that, without either a warrant or the employee's permission, the public employer was not entitled to obtain or review cell phone text messages that are not stored by the employer or by someone the employer pays for storage. While e-mails typically are stored on a company's own servers, text messages usually are stored by cell phone companies and the employer does not directly pay for their storage. Quon v. Arch Wireless, et al. 529 F.3d 892 (9th Cir 2008). The City of Ontario had a written electronics communications policy that expressly prohibited personal use of its computers and notified employees that they had no expectation of privacy with respect to any communications using the city's computer 22 8901858.1 2/22/2010 systems. The City's policy, however, did not make clear that this policy applied to its police officers' pagers or to text messaging. Instead, because the city's pager service contract with Arch Wireless charged the city additionally for each pager that exceeded 25,000 characters per month, the city informally permitted employees who exceed their monthly character limit to simply pay the overage charge. Despite this informal practice, the city contacted Arch Wireless to determine whether the pagers were being used primarily for personal reasons and Arch Wireless provided transcripts to enable the city to do so. After receiving these transcripts, the city learned that many of Sergeant Quon's texts were personal and even sexually explicit in nature. Upon learning that their texts had been reviewed, Sergeant Quon and others sued the city and the police department under the Fourth Amendment for an illegal search and seizure and the Stored Communications Act (SCA) and Arch Wireless for violating the SCA by turning the transcripts over to the city. The U.S. Supreme Court has accepted reviewed of the Ninth Circuit’s decision in Quon. On December 14, 2009, the United States Supreme Court agreed to hear the City of Ontario's appeal of the Ninth Circuit's decision in Quon v. Arch Wireless Operating Co. The questions presented to the United State Supreme Court for review are: 1. Whether an employee has a reasonable expectation of privacy in text messages transmitted on his employer-provided pager, where the police department has an official no-privacy policy but a non-policymaking supervisor announced an informal policy of allowing some personal use of the pagers. 2. Whether the Ninth Circuit violated the Supreme Court’s prior Fourth Amendment cases and created a conflict among the appellate courts by analyzing whether the police department could have used “less intrusive methods” of reviewing text messages transmitted by an employee on his employer-provided pager. 3. Whether individuals who sent text messages to an employee’s government-issued pager had a reasonable expectation that their messages would be free from review by the recipient’s government employer. It is somewhat surprising that the Supreme Court accepted this case for review decision. Reasons why Quon does not present a radical departure from existing law. First, the City's electronics communications policy did not explicitly address text messages. Then, complicating matters, the City official in charge of text messages announced an informal practice that strongly suggested to employees that their text messages would not be reviewed so long as they paid the overage charges from Arch Wireless. Simply put, by not updating its electronics communications policy and by permitting an informal practice to develop, the City created its own problem. 23 8901858.1 2/22/2010 How to Deal with Quon While Waiting for the Supreme Court’s Decision Regardless of what the Supreme Court decides, Quon should serve as a reminder to employers to ensure that not only are employee policies updated, but that they are also being strictly followed by managers. • Employers should consider whether to prohibit employees from conducting any company business other than over the corporate network. • Employers should consider limiting company-issued electronic devices to those, such as a Blackberry, that can be configured to route all communications through the corporate network. • Employers can lessen or defeat an employee’s expectation of privacy by distributing a policy unambiguously stating that any employees communications using any corporate technology or resources will be monitored and are not private. • Employers can condition payment for the cell phone, or for the service, on the employees giving written consent to the provider to disclose text messages to the employer. Accessing Employee’s Personal Email Accounts When Employee Failed to LogOff of Company Computer – SCA Violation? Sidell v. Structured Settlement Investments, LP, Case No. 3:08-cv-00710-VLB (D.Conn 2008), involved an employer’s access, using its own computer equipment, to an employee’s e-mail stored in an employee’s personal e-mail account. The company closed a branch and fired the office manager for cause. Before the company had changed the locks, the office manager entered his old office, logged on to his computer, and sent an e-mail to his personal attorney regarding his potential claims against the company. The office manager did not log-off from his Yahoo! account, or turn off his computer. As a result, this e-mail remained accessible through the computer in the exoffice manager’s former office. Over the next few weeks while using the same e-mail account, the ex-office manager sent his personal attorney numerous additional e-mails regarding his termination. When this came out during discovery in a subsequent arbitration over his termination, the former office manager then filed a lawsuit against the company, claiming violations of the ECPA, the Stored Communications Act, state statutes and for invasion of privacy. The case subsequently settled.63 Whether the SCA claim in Sidell would have survived depended upon: • 63 whether the former employee consented to the employer’s access to his personal e-mail because he did not log-off of his account or turn off his computer and he knew his former employer would have access to it; http://news.justia.com/cases/featured/connecticut/ctdce/3:2008cv00710/81493/ 24 8901858.1 2/22/2010 • the extent to which an employer may access information on an ex-employee’s personal web-based email account that the employee accessed through company owned and controlled computers, where the employee did not log-off or turn off the computer. 3) State Laws a. State Eavesdropping Laws. Various states have also adopted some form of the ECPA or the SCA, but these state wiretapping and eavesdropping laws typically prohibit the interception, eavesdropping, or recording of electronic communications, before they are stored, without the consent of one or all parties to the communications.64 b. State Laws Requiring That Employers Notify Employees Of On-Line Monitoring Only two states, Delaware and Connecticut, legally require employers to notify staff that their online activity is being monitored.65 c. State “Lawful Activity” Laws Illinois and other states have laws prohibiting employers from taking employment actions based upon certain kinds of lawful off-duty conduct or the use of lawful products.66 Two states, Illinois and Michigan, prohibit employers "from gathering or keeping a record of an employee's associations, political activities, publications, or 64 See, e.g., 720 ILCS § 5/14-2; NJ ST 2A: 156A-3(a)(containing a single party consent exception in NJ ST 2A: 156A- 4(d)); OH ST § 2933.52(A)(1)(containing single-party consent and business extension exception similar to ECPA)); GA ST § 16-11- 65; CA PENAL § 632(a)(requiring consent of all parties). 65 Conn. Gen. Stat. § 31-48(d) (1999)(requiring “prior written notice” to all employees who “may be affected” by an employer’s electronic monitoring, informing them of the types of monitoring which may occur, but defining electronic monitoring as “the collection of information on the employer’s premises concerning employees’ activities or communications by any means other than direct observation, including the use of a computer . . . .”)(emphasis added); Del. Code, tit. 19, § 705(b)(2002 Supp.)(requiring either a “one time notice” signed by the employee or a daily electronic notice of employer monitoring or interception of “any telephone conversation or transmission, electronic mail or transmission, or internet access or usage” of the employee, but the law exempts “processes that are designed to manage the type or volume of incoming or outgoing electronic mail or telephone voice mail or Internet usage, that are not targeted to monitor or intercept the electronic mail or telephone voice mail or Internet usage of a particular individual, and that are performed solely for the purpose of computer system maintenance and/or protection.”). See also Matthew W. Finkin, Information Technology and Workers’ Privacy: The United States Law, 23 Comp. Labor Law & Policy Journal 47, 477 (2002)(available at: http://www.law.uiuc.edu/publications/CLL&PJ/archive/vol_23/issue_2/FinkinCountryArticle23-2.pdf. 66 Illinois Right to Privacy in the Workplace Act, 820 ILCS 55/1 et seq. (prohibiting employers from discharging or otherwise retaliating against employees or prospective employees who use “lawful products” [defined as including but not limited to all tobacco products, all alcoholic beverages, all food products, all over-the-counter drugs, and any drugs lawfully prescribed by the employee’s own physician] outside the workplace during nonworking hours.). 25 8901858.1 2/22/2010 communications of non-employment activities, unless authorized by the employee in writ-ing or unless the activity occurs on the employer's premises or during working hours and interferes in the performance of the employee's or other employees' duties." citing 820 ILCS § 40/9 (1999); Mich. Comp. L. Ann. § 423.508 (1995) However, such laws do not mention social networking and are largely ignored. 4) Attorney-Client Privilege Issues and Monitoring Emails. a. Courts are split on whether emails sent using company email account remain privileged 1. Upholding Privilege Claim On December 10, 2009, in Convertino v. U.S. Dept. of Justice, No. 1:04-cv-00236 (D.D.C. Dec. 10, 2009), a federal judge in the District of Columbia upheld the attorneyclient privilege for an employee's emails to his attorney, even though sent the emails to his attorney from his work computer at the DOJ - and the DOJ later obtained them from its email server. The judge concluded that the privilege applied largely because the client was not aware that his employer had access to the emails: • The DOJ did not ban personal use of company e-mail. • The DOJ did not notify the employee that it would regularly access and save emails from his account. • The employee tried to keep his emails private by deleting them and was unaware that they were still on the DOJ servers. In Stengart vs. Loving Care Agency, 408 N.J. Super. 54 (App. Div. 2009), New Jersey’s Appellate Division held that Loving Care violated the attorney-client privilege by viewing private Web-based emails between Stengart and her attorney even though the emails were drafted on the Company’s computer and Loving Care’s email policy made clear, at least in some areas, that Stengart had no privacy interest in such emails. The New Jersey Supreme Court is currently reviewing this case. In Sims v. Lakeside School, 2007 WL 2745367, at *2 (W.D. Wash. Sept. 20, 2007), an employee used his employer’s laptop to communicate with his attorney and the employer later forensically recovered the e-mails. The court stated “that [the employee] was on notice that he did not possess a reasonable expectation of privacy in the contents of his laptop[,]” yet held that “[n]otwithstanding defendant Lakeside’s policy in its employee manual, public policy dictates that such communications shall be protected to preserve the sanctity of communications made in confidence.” Id. In re Asia Global Crossing, Ltd., 322 B.R. 247 (S.D.N.Y. 2005). In a bankruptcy proceeding, company officers used the company email system to communicate with their personal attorney. During discovery, the officers refused to produce these emails, withholding on the grounds of the attorney-client, work product, and joint defense 26 8901858.1 2/22/2010 privileges. The employer's trustee moved to compel production, claiming the officers waived any privileges with regard to the emails by using the corporate email system to draft them. The court noted that “[s]ending a message over [a company’s] e-mail system [is] like placing a copy of that message in the company files.” In re Asia Global Crossing, Ltd., 322 B.R. 247, 259 (Bankr.S.D.N.Y. 2005). However, the court nevertheless found the attorney-client privilege was not waived as a matter of law, because the company's email policies regarding use and monitoring were unclear and the officers may have reasonably believed the emails would remain confidential. People v. Jiang, 31 Cal.Rptr.3d 227 (Cal Ct. App. 2005) 2005), withdrawn 33 Cal. Rptr. 3d 184, 203 (Cal. Ct. App. 2005). In an appeal from a rape conviction, the defendant argued, inter alia, that password-protected documents contained on his employerissued laptop in a folder marked "Attorney" were protected by the attorney-client privilege. The trial court had previously determined these documents were not subject to the attorney-client privilege because the defendant had no reasonable expectation of privacy in documents on an employer-issued laptop computer. On appeal, the state argued the defendant did not have a reasonable expectation of privacy based on the terms of an employment agreement in which the defendant acknowledged he had no expectation of privacy for any company-owned property. The appellate court reversed the trial court’s holding and found the defendant "made substantial efforts to protect the documents from disclosure by password-protecting them and segregating them in a clearly marked and designated folder." The appellate court further declared the prosecution failed to prove the documents were not confidential and noted the employment agreement did not prevent the defendant from using the laptop for personal use. 2. Rejecting Privilege Claim In Alamar Ranch, LLC v. County of Boise, 2009 WL 3669741, 2009 U.S. Dist. LEXIS 101866 (D. Idaho Nov. 2, 2009), the district court judge held that the attorney-client privilege had been waived with respect to messages sent by the employee to the attorney using her employer-assigned e-mail account, and to messages sent to the employee at her employer e-mail address by the attorney. The court commented that it was “unreasonable for any employee in this technological age -- and particularly an employee [who received actual notice of such monitoring] -- to believe that her e-mails, sent directly from her company's e-mail address over its computers, would not be stored by the company and made available for retrieval.” • The court further found that knowledge of such monitoring could be imputed to the employee's attorney with respect to messages that he sent to the employee because the e-mail address to which he sent the messages “clearly” put him on notice that he was sending to the employee's work address. The court commented that workplace e-mail monitoring “is so ubiquitous that [the attorney] should have been aware that the [employer] would be monitoring, accessing, and retrieving e-mails sent to that address.” 27 8901858.1 2/22/2010 • But the court found that communications sent to the employee by other clients of the attorney in the multi-party litigation remained privileged because there was no evidence that the other clients knew or should have known of the workplace monitoring and “laypersons are simply not on ‘high-alert’ for such things as attorneys must be.” • The court in Alamar Ranch made clear that it was not ruling on whether the employee's communications would have been protected had she sent them while using the employer's computer network, but via her own Web mail account, and cited Stengart v. Loving Care as an example of such a case. Id. at *4. In Banks v. Mario Industries of Virginia, Inc., 650 S.E.2d 687 (Va. 2007). an employee used an employer-owned computer to prepare a memorandum for his attorney regarding his planned resignation., the employee printed the letter and sent it via nonelectronic mail, and then deleted the electronic copy of the letter. The employer later forensically recovered the memorandum, and sought to use it as evidence against the employee. The Virginia Supreme Court held that since “[the employer’s] employee handbook provided that there was no expectation of privacy regarding [the employer’s] computers[,]” the attorney-client privilege did not protect the deleted memorandum that “[the employee] created …on a work computer located at [the employer’s] office. Id. at 695–96. In Scott v. Beth Israel Med. Ctr., Inc., 2007 WL 3053351 (N.Y.Supp. Oct. 17, 2007), a former doctor-employee sought contractual damages arising from the defendant’s alleged termination without cause. On remand following reversal of the district court’s earlier summary judgment order, the plaintiff sought a protective order requiring the return of e-mail correspondence between himself and his attorney claiming attorney client privilege and the work product doctrine. The defendants argued that their e-mail policy stated that company e-mail is to be used solely for business purposes and that employees have no personal privacy rights in any material created or communicated on the company computer systems. The court agreed and denied the plaintiff’s motion since the defendant notified the plaintiff of the use and monitoring policies. Employees’ Use of Personal Password-Protected E-mail Accounts on Company Computers Can Preserve Privilege, But Not Always. In many cases, an employee’s sending emails using a personal password-protected email account, even though sent on a company-owned computer, has been enough to preclude waiver of the privilege as to attorney-client communications contained in the emails. Curto v. Medical World Communications, Inc., No. 03-CV-6327, 2006 WL 1318387, at *3 (E.D.N.Y. May 15, 2006)(“Plaintiff did take reasonable precautions to prevent inadvertent disclosure in that she sent the emails at issue through her personal AOL account which did not go through the Defendants servers.”); National Economic Research Associates, Inc. v. Evans, No. 04-2618-BLS2, 2006 WL 2440008, at *1 (Mass. Super. Ct. Aug. 3, 2006) (finding no waiver of the privilege regarding emails sent by an employee to his personal attorney on a company computer where “[m]any of these attorney-client communications were conducted by e-mail, with Evans sending 28 8901858.1 2/22/2010 and receiving e-mails from his personal, password-protected e-mail account with Yahoo rather than his NERA e-mail address.”). The use of password protection does not always equates to privacy. “[An employee] does not have an absolute expectation of privacy in records kept or accessed on his workplace computer, even if password protected.” Long v. Marubeni America Corporation, No. 05-Civ.-639, 2006 WL 2998671, at *3 (S.D.N.Y. Oct. 19, 2006)(finding that employees’ use of personal password-protected e-mail accounts was insufficient to preclude waiver of the privilege as to emails sent to their personal attorney using their personal password-protected email accounts, where they sent the emails on company computers while on notice that language in the employer’s policy handbook precluded any expectation of privacy). Employees Working from a Home Office In recognizing that an employee had not waived the privilege by leaving traces of privileged emails on a company computer, the court in Curto noted that “none of [the] cases [cited by the company] involve[d] an employee working from a home office.”67 The Curto court was careful to note that: [t]he Court’s holding is limited to the question of whether an employee’s personal use of a company-owned computer in her home waives any applicable attorney-client privilege or work product immunity that may attach to the employee’s computer files and/or e-mails. It does not purport to address an employee’s right to privacy in an office computer in general.68 V. Practical Considerations and Best Practices. The question for many employers is to what extent should it regulate use of its information technology software and hardware to protect itself from liability? A few simple measures can include: • Adopt written policies to address social networking as it pertains to your business activities, employees, and information. Policies should be consistent with organization’s policies and procedures on confidentiality and trade secrets; protection of the organization’s property; harassment and discrimination; privacy of employee/customer information; computer, internet, e-mail systems; and employee privacy. Every court addressing workplace waiver has looked to the employer’s policies regarding employee computer use.69 67 Curto, 2006 WL 1318387, at *5. 68 Curto, 2006 WL 1318387, at *8 (emphasis added). 69 Adam C. Losey, Clicking Away Confidentiality: Workplace Waiver of Attorney-Client Privilege, 60 Fla. L. Rev. 1179, 1181 (2008). 29 8901858.1 2/22/2010 The absence of any policy on monitoring employees’ internet activity or the failure of the policy to address the specific type of communication in question has been problematic for those employers.70 • Prohibit the use of company equipment and systems for personal purposes. Allowing common usage of personal e-mail on company computers has been problematic for employers.71 • Publish and notify employees of policies’ existence. In addition to providing prior notice to employees that they may be subject to monitoring in their employee handbooks and policies, employers may wan to include notice of monitoring or surveillance on computer log-in pages, signs posted on bulletin boards, and on company intranet communications.72 • Inform employees in these policies that they have no expectation of privacy in any document or communication created, sent or received using any company equipment or technology, even if the documents or communications are marked as “private” or password-protected. • Train employees on these policies consistent with training on other key policies. Instruct your IT personnel and others responsible for workplace monitoring not to make representations to employees that your business’ electronic resources policy will not be followed.73 70 See Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892 (9th Cir. 2008), cert. granted, __ U.S. __ (Dec. 19, 2009)(reasonable expectation of privacy found where the City of Ontario’s written electronics communications policy expressly prohibited personal use of its computers and notified employees that they had no expectation of privacy with respect to any communications using the city's computer systems, but the City's policy did not make clear that this policy applied to its police officers' pagers or to text messaging); Transocean Capital, Inc. v. Fortin, No. 05-0955-BLS2, 2006 WL 3246401, at *4 (Mass. Super. Ct. Oct. 20, 2006) (upholding privilege, where “[the employer] did not have its own Policies or Procedures Manual or Employment Manual setting forth the Company’s policy regarding the review of emails on the Company’s network”. 71 Curto, 2006 WL 1318387, at *3 & n.2 (finding no waiver of the privilege as to communications with a personal attorney using a company computer, despite the company’s policy prohibiting such activity, because “several other MWC employees, including its president, had personal [email] accounts on their work computers.”). 72 See People v. Ceja, 204 Ill.2d 332, 349 (2003) (inmates who knew their conversations were being monitored had impliedly consented to monitoring). 73 Quon, 529 F.3d at 896 (the Ninth Circuit noted that in the normal course, the City’s “Computer Use, Internet and E-Mail Policy” would have defeated Sgt. Quon’s privacy-based claim. However, the police 30 8901858.1 2/22/2010 • Enforce all policies consistent and uniformly. Curto, 2006 WL 1318387, at *4–5 (the court considered the frequency of the employer’s enforcement of its computer usage policy in upholding an employee’s privilege claims, but acknowledged that no other court had previously found this factor to be relevant). • Consider requesting that employees maintain “professional” social networking accounts separate from personal accounts. • Consider modifying your electronic resources policy to state that it can not be modified except by a written communication from a specified senior executive. See Quon. • Consider whether or not to prohibit supervisors, managers, and administrators from “friending,” linking/connecting to, recommending or otherwise endorsing subordinates, suppliers, contractors, and customers. • Employers should institute protocols and procedures to make sure that there is a legitimate business need and that legal counsel has been obtained before taking action that may be construed as an intrusion into employee privacy, such as harassment prevention, ensuring the safety of others, or maintaining corporate confidential information. • Incorporate and reference harassment and discrimination policies when adopting social networking policies that prevent employees from “posting material that is abusive, offensive, insulting, humiliating, obscene, profane, or otherwise inappropriate regarding the organization, its employees, vendors, suppliers, business partners and competitors.” • Internet usage policies should include language preventing employers from “engaging in any conduct that may be construed as harassment based on race, ethnicity, color, national origin, religion, sex, sexual orientation, age, disability, or any other legally protected characteristic.” • Policies should address confidentiality and trade secret protections and prohibit employees from disclosing or discussing while in social networking information about customers, partners or suppliers; organization’s confidential information and trade secrets; and information regarding the organization’s clients, affiliates, partnerships. Importantly, employers must train employees on the confidential information policy. lieutenant responsible for overseeing the City’s text-message program had established an informal policy, communicated orally to Sgt. Quon, that the City would not read an officer’s text messages to determine whether they were personal or business-related so long as the officer paid for any over charges). 31 8901858.1 2/22/2010 • Social networking policies should clearly state that employees engaging in social networking and blogging for either personal or professional reasons must remain respectful and refrain from defaming or disparaging the organization, its employees, customers, suppliers, business partners and competitors. • Employees should be prohibited from writing about, posting pictures of, or identifying by name any customers, suppliers, vendors or other employees without their permission. • Employers’ cyber-policies should limit employees’ authority to speak on behalf of the organization. Unless the employee has explicit authorization to do so, he or she may should not use the organization’s name in the online identity (e.g. username, “handle,” or screen name), claim or imply that authorized to speak as a representative of the organization, or use the organization’s intellectual property, logos, trademarks, and copyrights in any manner. The posting of pictures of Company events, activities that occur at Company facilities or while on Company business should also be prohibited. • Employers should put employees on notice and have them sign written acknowledgements that have no reasonable expectation of privacy on the organization’s computers, email systems, internet, and while on organization business (also address telecommuting situations). • Employers should have written notice to employees that information exchanged on non-private social networking sites can be accessed by the organization.74 • Employers should consider whether Social Networking Policies should also put employees on notice that when important corporate interests are involved (e.g., a governmental investigation), employees may be asked to suspend their off-duty blogging/twittering about the company and/or provide the company with access to password protected social networking sites. - They should also be informed in writing that their failure to cooperate with such requests by the company would result in discipline up to and including termination. - Employees should also be required to sign (electronically or a hard copy) a Consent Form and/or they should be notified 74 Eric L. Barnum and Nora Kersten Walsh, Every Breath You Take: Blogging, Texting, E-mails and Social Networking in the Workplace, American Bar Association Section of Labor and Employment 3rd Annual CLE Conference, Washington D.C. (November 5, 2009). 32 8901858.1 2/22/2010 that continued employment after receipt of the Social Networking Policies will be deemed consent to them. Cf., Biby v. Board of Regents, of University of Nebraska at Lincoln, 419 F.3d 845, 201 Ed. Law Rep. 36 (8th Cir. 2005) (rejecting contention that contractually authorized evidence-gathering ran afoul of a reasonable expectation of privacy, even where employer had erroneously asked for employee consent to do collection); TBGIns. Services Corp. v. Superior Court, 96 Cal. App. 4th 443, 452-54, 117 Cal. Rptr. 2d 155 (2d Dist. 2002) (no "reasonable expectation of privacy" under Const. Art. I, § 1 where employee had consented in writing to employer's policy statement that it monitored electronic communications conducted on work-at-home PCs and office PCs; in wrongful termination case based on employee's alleged intentional and repeated accessing of sexually explicit websites, employer could obtain discovery of hard drive of work-athome computer it had provided to employee); Garrity v. John Hancock Mut. Life Ins. Co., 2002 WL 974676, at *1-2 (D. Mass. 2002) (employees of company that has e-mail monitoring policy have no reasonable expectation of privacy in e-mail correspondence; and, even if they did, employer's legitimate interest in protecting other employees from harassment would likely trump privacy concerns); See also, Prosser and Keeton on the Law of Torts, p 112 (5th ed.)(requiring employees to give written consent to the monitoring of e-mail will normally vitiate common-law privacy claims). But see Pietrylo v. Hillstone Restaurant Group, 2009 WL 3128420 (D.N.J. Sept. 25, 2009), (upholding a jury verdict that a restaurant chain violated the SCA and a similar New Jersey law by allegedly requiring an employee to surrender to restaurant managers login information that allowed access to restricted-access employee MySpace chat room). VI. What the Future Holds for Employer Monitoring of Employee Off-Duty Internet Usage The “Cloud” One commentator referred to “the cloud” as “this virtual platform … where users interact with Internet applications and store data on distant [third-party owned] servers rather than on their own hard drives” and advocated treating digital assets on third-party sites the same way that the law currently would treat physical assets kept in an apartment or storage locker: [T]he service provider has a copy of the keys to a user's cloud "storage unit," much like a landlord or storage locker owner has keys to a tenant's space, a bank has the keys to a safe deposit box, and a postal carrier has 33 8901858.1 2/22/2010 the keys to a mailbox. Yet that does not give law enforcement the authority to use those third parties as a means to enter a private space. The same rationale should apply to the cloud. In some circumstances, such as search engine queries, the third party is clearly an interested party to the communication. But when content data, passwords, or URLs are maintained by a service provider in a relationship more akin to that of landlord-tenant, such as private Google accounts, any such data that the provider is not directly interested in should not be understood to be open to search via consent or a waiver of Fourth Amendment protection.75 75 David A. Couillard , "Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing," 93 Minn. L. Rev. 2005, 2237-38 (June 2009). Available at: http://www.minnesotalawreview.org/sites/default/files/Couillard_MLR.pdf 34 8901858.1 2/22/2010 Databases with Sample Social Networking/Blogging Policies and Guidelines Comprehensive Database of 117 Organizational Social Media Policies http://socialmediagovernance.com/policies.php Sample Social-Media Guidelines from Delaware Employment Law Blog published by Young, Conway, Stargatt & Taylor http://www.delawareemploymentlawblog.com/2009/12/sample_socialmedia_guidelines. html a. Policies from Media Organizations Associated Press Social Networking Q&A (PDF via Wired.com) http://www.wired.com/images_blogs/threatlevel/2009/06/apsocialnetworkingpolicy.pdf NPR News Staff Social Media Guidelines http://www.npr.org/about/ethics/social_media_guidelines.html b. Policies from Technology Industries IBM Social Computing Guidelines http://www.ibm.com/blogs/zz/en/guidelines.html Intel Social Media Guidelines http://www.intel.com/sites/sitewide/en_US/social-media.htm SAP Social Media Guidelines 2009 http://www.socialmediatoday.com/SMC/108483 Sun MicroSystems Guidelines on Public Discourse http://www.sun.com/communities/guidelines.jsp c. Online Repositories and Collections of Links to Social Media Policies TechRepublic Links to Social Media Policies http://downloads.techrepublic.com.com/abstract.aspx?docid=1018503 About.com Sample Blogging Policy http://humanresources.about.com/od/policysamplesb/a/blogging_policy.htm Laurel Papworth’s Collection of Social Media Policies from 40 Enterprises http://laurelpapworth.com/enterprise-list-of-40-social-media-staff-guidelines/ 35 8901858.1 2/22/2010 SAMPLE TECHNOLOGY AND ELECTRONIC COMMUNICATIONS POLICY [Covering Social Networking, Blogging and Twitter] I. Purpose The Company provides its attorneys and employees ("users") with technology resources to conduct the business of the Company. Such technology includes computer systems and networks, telephone systems, copy machines, facsimile machines and other equipment and software (collectively, the "Company Technology"). In addition, users may access Company Technology or transmit information belonging to the Company (or its clients) through equipment owned by a user or third party, such as home computers, smart phones (iPhones, Blackberrys) and other personal devices. In order to ensure that these technology resources are used properly, preserve the integrity of these systems and the information contained on them, comply with applicable laws and protect the reputation of the Company and its attorneys, staff, clients and business partners, the Company has created this Technology and Electronic Communications Policy. The rules and obligations described in this Policy apply to all users of Company Technology, irrespective of where they may be using Company Technology (i.e., at their office, home or otherwise) or how they may be accessing Company Technology. This Policy also applies to users who use equipment or technology that is owned by them or third parties in a manner that adversely affects the Company. Users who violate this Policy may be subject to discipline, up to and including termination. Obligations with respect to this Policy shall survive the end of any user's relationship with the Company. II. Use of Company Technology Users are given access to Company Technology to assist them in conducting the business of the Company. Consequently, all users have the responsibility to use the Company's computers, networks and communication systems in a professional, ethical and lawful manner. It is important to recognize that, since these resources belong to the Company, although some limited personal use may occasionally occur, Company Technology is intended to be used for authorized business purposes only. All information created, transmitted or stored using Company Technology is and shall remain the exclusive property of the Company. Further, no user may use Company Technology to violate any copyright, trade secrets or other rights of the Company or third parties. This includes, but is not limited to, the unauthorized copying, use or transmission of trademarked or copyrighted materials, trade secrets and intellectual property of others, including music, video and third party computer software. Users should assess the protected status of materials they send and receive by, among other things, looking for copyright notices and other indicia that the materials are protected. If a user is unsure about whether any material is protected, he or she should ask their supervisor or practice group leader or a member of the Information Technology Department ("IT Department"). All material generated, received 36 8901858.1 2/22/2010 or stored on Company Technology becomes the property of the Company and must be handled in accordance with its policies. Users may not use Company Technology to harass, defame, threaten or otherwise commit a violation of applicable laws, Company policies, rules, regulations or ethical rules. Use of Company Technology for personal gain, to send chain letters, or solicit money for religious or political causes is also not permitted. “Snooping,” “pretexting” (using another’s identity) and unauthorized monitoring (including attempts to read, copy, modify or delete) others’ e-mail, voice mail or other electronic communications violates this Policy and may be grounds for termination (and may subject user to other penalties). III. The Company's Right to Monitor and Regulate Usage of Company Technology Although it is not the Company's intention to unduly intrude upon a user's personal activities, the Company reserves the right to inspect files, messages or other uses of Company Technology at any time in its discretion to determine compliance with policies, respond to lawful subpoenas or court orders, investigate misconduct, locate information, or for any other business purpose. The Company reserves the right to delete, edit or move any files or software at any time from any Company-owned equipment without prior notice. The best way for a user to ensure the privacy of personal information is not to store or transmit it using Company Technology. The Company also reserves the right to monitor, access and disclose any and all usage of its computers, networks and communication systems, including but not limited to the usage of Company Technology via personal computers, smart phones and other devices owned by users or third parties. The Company may also monitor sites that users visit on the Internet, review material downloaded or uploaded by users, and review stored electronic mail and voice mail sent and received by users, which in any way involve the use of Company Technology. Users should have no expectation of privacy in anything they create, store, send or receive through the direct or indirect use of Company Technology. IV. The Company’s Rights Concerning Personal Internet Activity that Affects the Company. The Company also may require the immediate deletion, return or transfer of information belonging to the Company (or its clients) and the cessation of postings and other communications that may adversely affect the Company from personally-owned or thirdparty’s equipment, websites, blogs and other technologies. In rare cases when important Company interests are at stake, the Company may require that a user provide the Company with access to a personal website, blog or social networking page, even if it is protected by a personal password or is otherwise access-restricted. The failure to cooperate with such requests may result in discipline up to and including termination. 37 8901858.1 2/22/2010 The Company will cooperate fully with appropriate authorities to provide information related to actual or suspected activity not consistent with the law. All users are required to cooperate in any Company investigation of such conduct. V. User IDs and Passwords Each user at Arnstein & Lehr LLP is granted a unique set of user IDs and passwords to use Company Technology. These IDs grant full or partial access to the Company’s computer and voice mail systems. Users are responsible for any and all activity that occurs under their assigned IDs and passwords, regardless of who is using those IDs or passwords. A password is established in connection with the IDs. The password is to be kept confidential (except for designated Company personnel). Users should change their passwords periodically in accordance with Company policies. The fact that a user is allowed to use personal IDs and/or passwords does not create any reasonable expectation of privacy in Company Technology. Users should not share their passwords with co-workers or third parties, and should not allow others to use their user IDs and/or passwords, except in accordance with Company policies. The unauthorized use of another user’s IDs and passwords is prohibited. Users are required to disclose their IDs and passwords to members of the Company's IT Department or other designated Company representatives. Immediately, upon the end of a user’s relationship with the Company, the user’s IDs and passwords may be disabled or removed from the system. However, the user's IDs and passwords remain the property of the Company. VI. Software The rights to use the software and related documentation provided by the Company (collectively, the "Software") either belong to the Company or are governed by license agreements with which the Company must abide. Violation of these license agreements could subject the Company to liability. Therefore, to ensure that the Company complies with the license agreements governing the use of the Software, all users must abide by the provisions of this Policy (irrespective of the manner by which the Software is embodied or stored). Any client or third party interaction with or access to the Software or Company Technology (except for electronic mail messages) should be approved in advance by the Company's Director of Information Technology. As a general rule, the installation and maintenance of all Software shall be handled solely by the Company's IT Department. No user may use, alter, modify or change the Company's Software in any way other than as described in the documentation accompanying the Software. Users may not access or attempt to access any Company Software, files or directories that have not been authorized for their use. They also may not give or loan any Software, or allow access to Company Technology to any unauthorized individuals 38 8901858.1 2/22/2010 No user may copy or download any Company-owned/licensed software to any personal (non-Company) equipment without the express written permission of the Company. In addition, the Company's permission is required before a user may copy, transfer or download any non-Company software onto any Company Technology. VII. Data Retention Users should understand that information created, stored or transmitted using Company Technology may be electronically recalled or reconstructed, even though it may have been "deleted" by the users, so any communication using Company Technology should be written with that principle in mind. Thus, users should exercise care in what information or statements they create in electronic form in order to avoid potential embarrassment or legal liability for themselves or the Company. As a general rule, users should not place any data upon the “desktop” or non-integrated drives of Company computers, laptop computers, “thumb” or “flash” drives and other electronic storage devices, and personal computers that is not made part of Company Technology (e.g., IManage, etc.). In addition, users should refrain from transferring data belonging to the Company or its clients to personal email accounts and personal equipment except when needed to serve the Company and its clients. Users should immediately report the loss of Company-owned computer equipment (including the loss of personal computers, smart phones and other devices containing data belonging to the Company or its clients) to their supervisors, practice group leaders, and the IT Director. VIII. Internet Usage Because of its nature, users who access the Internet may encounter material that is inappropriate, offensive, and, in some cases, illegal. Users are advised that they will be held responsible for the Internet sites and the material they review, transmit or download from the Internet using Company Technology. The Company's general policies apply to users' use of Company Technology to access the Internet. Users need to exercise caution before transmitting confidential and/or personnel information (such as social security numbers, personal addresses or telephone numbers, banking information, and/or health information) on the Internet using Company Technology or personal equipment. Identity theft and other adverse consequences can result. Before a user contributes to any blog or Internet website using Company Technology or referring to the Company, the user will be expected to take steps described above in Section C of this Policy to ensure that what is said will not be interpreted as the opinion of the Company, will not disclose confidential information, reflect adversely on the Company, its clients, employees and attorneys or anyone connected with it, or otherwise violate any other Company policies. 39 8901858.1 2/22/2010 IX. Voice Mail and E-mail The Company provides voice and electronic mail systems to assist in timely and efficient communication on behalf of the Company. Users are responsible for ensuring the accuracy, security and control of information belonging to the Company and its clients and that the communications are appropriate and professional. The rules and obligations described in this Policy are applicable to all internal and external uses of Company Technology, including those which may, either directly or indirectly, use the Internet. No user may access the email or voicemail, retrieve any stored communication, or use the ID/password of any other user unless authorized to do so by the Company. The Company reserves the right to monitor and disclose stored email and voicemail messages, Internet usage, or other uses of technology that adversely affect the Company. Users are encouraged to use the Public Forum Bulletin Board feature in Outlook for messages relating to the sale or availability of sports or entertainment tickets, birth announcements involving Company personnel, or non-Company sponsored events, such as going-away parties, baby showers, etc. Instructions on the use of this feature are available from the IT Department. X. Ownership and Control of Company Technology Company Technology and any content, data or other electronically stored information created, stored or otherwise transmitted through the use of Company Technology, including but not limited to the Company’s computer, voice and electronic mail systems, are owned by the Company and are provided to assist in the performance of Company business. All messages and other information communicated through these systems are the property of the Company. XI. Security When using Company Technology or transmitting Company-related information or documents over the Internet, care must be taken to prevent computer viruses and unlawful or offensive materials from being brought into Company Technology. Users are required to use virus-scanning software provided by the Company to scan files, documents, e-mail attachments or diskettes brought in from the outside before they are opened and used. Any questions concerning this software should be directed to the IT Department. When communicating any message of a highly confidential nature, certain encryption technology may be employed to enhance the security of the transmitted message (the Company's Director of Information Technology should be consulted for further details). No User shall encrypt e-mail messages or files without using software pre-approved by the Company. 40 8901858.1 2/22/2010 Users are also prohibited from taking any action that deliberately or negligently attempts to degrade or harm the performance of Company Technology, including but not limited to installing viruses or other invasive software, destroying or improperly accessing unauthorized data, tampering with or attempting to disable any of the security systems protecting Company Technology, “hacking” into the system, or other unauthorized activity using technology that adversely affects the Company. XII. Driving While Using Communicative Devices Because of a concern for the safety of users and third parties, the Company prohibits the use of Company Technology or other communicative devices while operating a motor vehicle in connection with Company business, except with "hands-free" equipment or otherwise in accordance with applicable laws. This Policy applies to the use of Company Technology while driving, but also applies to the use of personal cellular telephones and other communicative devices while driving in connection with work for the Company or on client-related business (even if the call does not involve Company business). For safety reasons, users should always use “hands-free” equipment or pull off the road, stop their vehicles in a safe place, and then use their cell phone or other communicative device. XIII. Reporting Violations of This Policy A user who becomes aware of violations of this Policy, any Addenda should immediately report it to his/her supervisor/practice group leader, the Director of Human Resources, the Director of Information Technology, the Director of Administration, or if the above are not available, a member of the Company’s Executive Committee. All reports will be investigated promptly and confidentially. Retaliation against any user for reporting a violation of this Policy or cooperating with an investigation will not be tolerated. If a user has any questions about this Policy, any Addenda or any matter related to Company Technology or electronic communications that are not addressed here, please direct them to the persons identified in the preceding paragraph as appropriate. As with the Company’s other policies, no one connected with the Company, other than in writing issued by the Chair of the Company’s Executive Committee, has authority to modify this Policy or to suggest that this Policy, any Addenda or any other Company policy will not be enforced as written. The failure to comply with these policies may result in disciplinary action, up to and including discharge. XIV. Consent to This Policy and Any Addenda A user's continued employment or other relationship with the Company after receipt of this Policy or any Addenda constitutes consent to this Policy or any Addenda, including, but not limited to, the Company's right to monitor all usage of Company Technology and to require access to a user’s personal or third-party equipment, blogs and other modes 41 8901858.1 2/22/2010 of communication that affect the Company. Users will also be required to sign a written acknowledgement confirming that they have read this Policy and any Addenda and agree to comply with it. ADDENDUM TO TECHNOLOGY AND ELECTRONIC COMMUNICATIONS POLICY Blogging and Other Social Media In general, the Company takes a positive view of attorneys and employees using and posting to websites, blogs, social networking media (LinkedIn, Facebook, etc.), twittering and similar technology for personal use and Company-related business (all of which are referred to in this policy as “blogging” or social networking), provided that users observe certain guidelines and their activities do not adversely affect the Company, its clients, or its employees and attorneys. Personal Blogs and Other Modes of Self Expression. As a general rule, users should make sure they comply with Company policies and the guidelines listed below before they identify themselves as associated with the Company or discuss matters related to the Company, its technology, business or clients on personal or non-workrelated websites or blogs. Bear in mind that, although a user may view his or her posting to a website or blog as a personal project and a medium of personal expression, some readers may nonetheless view the user as a de facto spokesperson for the Company. In light of this possibility, especially if a user identifies him/herself as associated with the Company on a non-work-related blog or website, the user must observe the following guidelines: • Be Professional. The same rules that apply to other Company-related communications apply to blogging, texting, twittering and all forms of social networking. • Be Accurate. Make it clear to readers that the views expressed are the user’s alone and that they do not necessarily reflect the views of the Company or its clients. • Maintain Confidences. Do not disclose any trade secrets, customer confidences and information that is confidential or proprietary to the Company, its clients, attorneys, employers or to any third party that has disclosed information to the Company. Consult with practice group leaders or supervisors for guidance about what constitutes confidential information. • Be Conscientious. Do not use Company Technology to develop, design or maintain personal blogs or social networking unless they are being used for Company-related purposes (such as occasionally updating on-line profiles used for marketing purposes). 42 8901858.1 2/22/2010 • Be Discreet. Activities that occur at Company facilities or while on Company business should not be shared on public blogs or social media. Do not post pictures of Company events or the interior of the Company facilities, coworkers, customers, suppliers or vendors without express authorization. • Be Respectful. Do not disparage the Company and its clients, attorneys, employees, competitors or colleagues. Do not engage in impolite dialogues on public blogs and websites. • Be Courteous. Do not use a personal blog or posting to violate the rights of anyone connected with the Company by harassing, defaming, invading the privacy, publishing private facts or misusing the intellectual property of others. Just as the Company does not tolerate racial and other prohibited slurs, threats of violence, or harassment, discrimination and retaliation in the workplace, such conduct in cyber-space will not be tolerated and is grounds for termination. • Be Judicious. Do not “friend,” connect with, or post to inappropriate persons or entities (such as opposing parties represented by counsel). Be careful when “friending” or “connecting with” subordinates, supervisors, judges, witnesses and others with whom communications must be professional and discrete. Do not “spam” about the Company (i.e., inappropriately sending mass postings to persons who have not indicated that they want to receive such communications). • Be Circumspect. Recommending, endorsing, or providing testimonials about vendors, former colleagues, suppliers, consultants, opposing parties and their counsel, judges and other third-parties requiring circumspect communications should be done only when appropriate and in accordance with applicable rules. • Be Truthful. Do not deceive readers, write false endorsements or engage in other deceptive acts in connection with any blog or public posting, and do not ask anyone else to do so. • Be Careful. Users must take care not to inadvertently create attorney-client relationships, provide legal advice, engage in improper solicitations, advertising or the unauthorized practice of law, or provide false or misleading information about the Company, its attorneys or their services. • Be Transparent. If you blog or post anonymously, we would prefer that you do not discuss matters that might adversely effect the Company or its clients, attorneys, or employees. If Company-related topics are mentioned, you should disclose your identity and affiliation with the Company. 43 8901858.1 2/22/2010 • Be Responsible. Make sure that your blogging and social networking activity do not violate applicable laws, ethical rules or Company policies or interfere with work commitments. The Company may, from time to time, request that users temporarily confine their website activity, social networking or blog commentary to topics unrelated to the Company (or, in rare cases, that users temporarily suspend their website, blogging or posting activity altogether) if the Company decides that the Company decides that this is necessary or advisable to do so for confidentiality or legal compliance reasons. User may be requested to provide access to personal blogs and networking sites in such cases. Failure to cooperate with such requests may result in discipline up to and including termination. Twitter, Texting and Other Modes of Electronic Communication. Twitter and texting have become very prevalent. A major concern when it comes to Twitter is not only the time it takes to create a post, but the time and distraction caused by trying to follow numerous conversations. Twitter postings and the use of Twitter monitoring tools (Twhirl, Twitterific, TweetDeck, etc.) during working hours should be work-related. Social Videos, Online Shopping and Other Non-Work-Related Internet Activity. Users are expected to refrain from viewing pornographic sites, watching videos on YouTube and similar sites, shopping online and reading/posting to personal blogs while at work, during working hours or if Company Technology is used in any way. We don’t want to ban or block such activities, but Company Technology is for work purposes only. Non-work-related Internet activity may not interfere with your work commitments. All aspects of the Company’s Technology and Electronic Communications Policy and this Addendum applies to all non-work related Internet activities that affects the Company, including all forms of electronic communication not specifically mentioned here. Company-Sponsored Blogs and Blogging for Business Reasons. When posting on a Company-sponsored blog or on personal/third party blogs or other websites (including twittering and texting) for business purposes or other Company-related reasons, the Company’s other policies apply as well as this Technology and Electronic Communications Policy. Users should confirm the nature and scope of their authority before posting on a Company-sponsored blog or representing the Company on a thirdparty blog or website. All such posts must be courteous, professional and consistent with Company standards and policies as well as those of the blog or website. Users should disclose who they are and their role with the Company from the first communication. Users must take care not to disclose confidential information or trade secrets. Users are responsible for what they post on Company-sponsored blogs as well as what they post about the Company on personal/third-party blogs and websites. 44 8901858.1 2/22/2010 SAMPLE POLICY ON MONITORING OFF-DUTY INTERNET USAGE AND SOCIAL NETWORKING Policy from ePolicy Sample Web Acceptable Usage Policy The Company is pleased to offer associates access to the organization’s computer Network and the Internet. This Policy applies to employees granted Network and Internet access by the Company. For the Company to continue making Network and Internet access available, employees must behave appropriately and lawfully. Upon acceptance of your account information and agreement to follow this Policy, you will be granted Network and Internet access in your office. If you have any questions about the provisions of this Policy, you should contact the Chief Information Officer. If you or anyone you allow to access your account (itself a violation of this Policy) violates this Policy, your access will be denied or withdrawn. In addition, you may be subject to disciplinary action, up to and including termination. 1. Personal Responsibility By accepting your account password and related information, and accessing the Company’s Network or Internet system, you agree to adhere to this Policy. You also agree to report any Network or Internet misuse to the Chief Information Officer. Misuse includes Policy violations that harm another person or another individual’s property. 2. Term of Permitted Use Network and Internet access extends throughout the term of your employment, provided you do not violate the organization’s Computer Network and Internet Acceptable Usage Policy. Note: The Company may suspend access at any time for technical reasons, Policy violations, or other concerns. 3. Purpose and Use The Company offers access to its Network and Internet system for business purposes only. If you are unsure whether an activity constitutes appropriate business use, consult the Chief Information Officer. 4. Netiquette Rules Employees must adhere to the rules of Network etiquette, or Netiquette. In other words, you must be polite, comply with the Company’s ethics policy and code of conduct, adhere to the organization’s electronic writing and content guidelines, and use the Network and Internet appropriately and legally. The Company will determine what materials, files, information, software, communications, and other content and activity are permitted or prohibited, as outlined below. 45 8901858.1 2/22/2010 5. Banned Activity The following activities violate the Company’s Computer Network and Internet Acceptable Usage Policy: (A) Using, transmitting, receiving, or seeking inappropriate, offensive, vulgar, suggestive, obscene, abusive, harassing, belligerent, threatening, defamatory (harming another person’s reputation by lies), or misleading language or materials. (B) Revealing personal information, such as the home address, telephone number, or financial data of another person or yourself. (C) Making ethnic, sexual-preference, or gender-related slurs or jokes. (D) Engaging in illegal activities, violating the Employee Handbook, or encouraging others to do so. Examples: 1. Selling or providing substances prohibited by the Company’s employment policy or the Employee Handbook. 2. Accessing, transmitting, receiving, or seeking unauthorized, confidential information about clients or colleagues. 3. Conducting unauthorized business. 4. Viewing, transmitting, downloading, pornographic, or illegal materials. 5. Accessing others’ folders, files, work, networks, or computers. Intercepting communications intended for others. 6. Downloading or transmitting the organization’s confidential information or trade secrets. (E) Causing harm or damaging others’ property. Examples: 1. Downloading or transmitting copyrighted materials without permission from the copyright holder. Even when materials on the Network or the Internet are not marked with the copyright symbol, ©, employees should assume all materials are protected under copyright laws––unless explicit permission to use the materials is granted. 2. Using another employee’s password to trick recipients into believing someone other than you is communicating or accessing the Network or Internet. 46 8901858.1 2/22/2010 or searching for obscene, 3. Uploading a virus, harmful component, or corrupted data. Vandalizing the Network. 4. Using software that is not licensed or approved by the Company. (F) Jeopardizing the security of access, the Network, or other Internet Networks by disclosing or sharing passwords and/or impersonating others. (G) Accessing or attempting to access controversial or offensive materials. Network and Internet access may expose employees to illegal, defamatory, inaccurate, or offensive materials. Employees must avoid these sites. If you know of employees who are visiting offensive or harmful sites, report that use to the Company’s Chief Information Officer. (H) Engaging in commercial activity. Employees may not sell or buy anything over the Internet. Employees may not solicit or advertise the sale of any goods or services. Employees may not divulge private information––including credit card numbers and Social Security numbers—about themselves or others. (I) Wasting the Company’s computer resources. Specifically, do not waste printer toner or paper. Do not send electronic chain letters. Do not send email copies to nonessential readers. Do not send email to group lists unless it is appropriate for everyone on a list to receive the email. Do not send organization-wide emails without your supervisor’s permission. (J) Encouraging associates to view, download, or search for materials, files, information, software, or other offensive, defamatory, misleading, infringing, or illegal content. 6. Confidential Information Employees may have access to confidential information about the Company, our employees, and clients. With the approval of management, employees may use email to communicate confidential information internally to those with a need to know. Such email must be marked “Confidential.” When in doubt, do not use email to communicate confidential material. When a matter is personal, it may be more appropriate to send a hard copy, place a phone call, or meet in person. 7. Privacy Network and Internet access is provided as a tool for our organization’s business. The computer system is the property of the Company. The Company has the legal right to monitor usage of the Network and the Internet. Employees have no reasonable expectation of privacy when using the Company’s computer system, Network, or Internet. 47 8901858.1 2/22/2010 8. Noncompliance Your use of the Network and the Internet is a privilege, not a right. Violate this policy and, at minimum, your access to the Network and the Internet will be terminated, perhaps for the duration of your tenure with the Company. Policy breaches include violating the above provisions, and failing to report violations by other users. Permitting another person to use your account or password to access the Network or the Internet– –including but not limited to someone whose access has been denied or terminated—is a violation of Policy. Should another user violate this Policy while using your account, you will be held responsible, and both of you will be subject to disciplinary action. Employee Acknowledgment Note: If you have questions or concerns about this ePolicy, contact the Company’s Chief Information Officer before signing this agreement. I have read the Company’s Computer Network and Internet Acceptable Usage Policy and agree to abide by it. I understand violation of any of the above terms may result in discipline, up to and including my termination. _______________________ _________________ ______________ Employee Name (Printed) Employee Signature Date © 2006, 2007, Nancy Flynn, The ePolicy Institute, www.epolicyinstitute.com. 48 8901858.1 2/22/2010
© Copyright 2026 Paperzz