American Bar Association Section of Labor and Employment Law 2002 Technology Committee Midyear Meeting ACCESSING EMPLOYEE E-MAIL, VOICE MAIL AND INTERNET: CHECKING YOUR PRIVACY RIGHTS AT THE FRONT DOOR Douglas E. Dexter O’Melveny & Myers Embarcadero Center West 275 Battery Street San Francisco, California 94111-3305 i © 2002 American Bar Association http://www.bnabooks.com/ababna/tech/2002/dexter.doc TABLE OF CONTENTS Page INTRODUCTION: The Ever Growing Problem FEDERAL SOLUTIONS I. THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 A. General Overview and Background......................................................................................2 B. Title I: The Prohibition Against Intercepting Electronic Communication............................3 C. Title II: The Prohibition Against Accessing Stored Electronic Communication..................5 D. The Exceptions for the Interception of and Access to Electronic Communication ..............6 E. Other Limitations.................................................................................................................11 F. Disclosure Under Title I and Title II ...................................................................................12 G. Damages Under the ECPA..................................................................................................13 II. THE FOURTH AMENDMENT A. Public Employers: ...............................................................................................................13 B. Internet and E-mail Case Examples ....................................................................................14 C. Impact for Public Employer ................................................................................................15 STATE SOLUTIONS I. CONSTITUTIONAL RIGHT TO PRIVACY A. State Constitutional Provisions ...........................................................................................16 i © 2002 American Bar Association http://www.bnabooks.com/ababna/tech/2002/dexter.doc II. COMMON LAW RIGHT TO PRIVACY A. State Constitutional Right to Privacy..................................................................................16 B. Case Examples ....................................................................................................................17 C. Summary III. STATE STATUTES A. Summary .............................................................................................................................18 B. Pro Employee ......................................................................................................................19 C. Pro Employer.......................................................................................................................20 D. Case Examples ....................................................................................................................20 THE CURE: A POLICY I. WHY YOU NEED A POLICY A................................................................................................................................................22 B................................................................................................................................................22 C................................................................................................................................................22 II. WHAT YOU SHOULD PUT INTO YOUR POLICY A. Initial Questions ..................................................................................................................22 III. THE WRITTEN PRODUCT .....................................................................................................22 IV. GIVING EMPLOYEES NOTICE OF THE POLICY ....................................................................23 ii © 2002 American Bar Association http://www.bnabooks.com/ababna/tech/2002/dexter.doc 1 Accessing Employee E-Mail, Voice Mail and Internet: Checking Your Privacy Rights at the Front Door Doug Dexter O’Melveny & Myers INTRODUCTION: THE EVER-GROWING PROBLEM With the successful, almost uneventful, advent of the twenty-first century, society is driving full force on the vastly expanding information superhighway. But, as with any expanding venture, many bumps have been encountered along the way. One of the biggest roadblocks has occurred in the realm of employment law. With the increasing number of companies providing their employees with E-mail, voice mail and Internet access, issues have arisen as to what rights an employer has over these resources. Once again we are faced with the age-old problem, employee vs. employer, but now there is an Orwellian twist. On one hand, the employees claim that these mediums of communications are private and Big Brother, the employer, should stay out. On the other hand, the employers argue that they need to monitor these mediums not only to run a successful business, but also to ensure against potential liability that may arise from an employee’s use of these systems. The following scenarios illustrate the issues concerning the monitoring of E-mail, voice mail and employee Internet access: Securities Violations: An employee of a securities firm claimed to have evidence on his voicemail of regulatory violations by a senior company official, and threatened to reveal the information if any adverse personnel action were taken against him. He also refused to disclose his voicemail password and threatened legal action if the company broke into his voicemail to retrieve the information. Hostile Work Environment: Employers have been subject to race discrimination suits based on racial E-mails sent on the companies’ systems around the office by other employees. Employee Relations: In 1995, Michael Huffcut, a manager at a McDonald’s was fired after exchanging impassioned voicemail messages with another employee with whom he was having an extramarital affair. A co-worker retrieved the “steamy” romantic messages and played them for Huffcut’s boss and wife. Huffcut sued McDonald’s and the franchise owner under the Electronic Communications Privacy Act, a state anti-wire tapping statute, and for various intentional torts. Huffcut sought $3 million dollars in damages. Trade Secrets: In 1992, Eugene Wang, a vice-president at Borland International, defected to a rival computer software maker, but not before allegedly forwarding trade secrets via MCI Mail. Borland pressed charges against Wang based on the E-mails it discovered by obtaining his password. Wang was indicted, but defended himself by 1 © 2002 American Bar Association http://www.bnabooks.com/ababna/tech/2002/dexter.doc accusing Borland of violating the Electronic Communications Privacy Act’s ban on tapping messages sent on commercial E-mail lines. While case law on the issue of monitoring employee E-mail, voice mail and Internet access is relatively sparse, the cases that are out there provide some guidance as to how employers should, and can, act in this increasingly sensitive area of electronic monitoring. Undoubtedly, employees and their lawyers are also looking at the various legal avenues available to them in order to combat “Big Brother.” As employer monitoring becomes more prevalent, employees are looking for increased privacy protections under statutory and common law. The following materials will help explain what steps an employer may be able to take, as well as the legal roadblocks that may occur along the way. FEDERAL SOLUTIONS: EXISTING LEGISLATION • The Electronic Communications Privacy Act of 1986 The Electronic Communications Privacy Act of 1986 [the “ECPA”] is the most current and comprehensive piece of federal legislation dealing with the interception of and access to electronic communications such as E-mail and voice mail. 18 U.S.C. §§ 2510-21, 2701-10, 3117, 3121-26 (1994). General Overview and Background Enacted in 1986, the ECPA amended Title III of the Omnibus Crime Control and Safe Streets Act of 1968 [“Crime Control Act”]. The Crime Control Act, in its original form, provided protection for the “old fashion” means of communication, such as the telephone, by placing restrictions on the wiretapping and eavesdropping of these means of communication. The ECPA, in essence, modernized the Crime Control Act to expand the restrictions to all forms of “electronic communication,” including specifically E-mail and voice mail transmissions. See 1986 U.S.C.C.A.N. 3555, 3568; 18 U.S.C. § 2511(1)(a). The ECPA can be broken down into two parts, generally referred to as Title I and Title II. Title I of the ECPA prohibits the interception of electronic communications. See 18 U.S.C. § 2510, et seq. Title II of the ECPA prohibits the unauthorized access of stored communications. See 18 U.S.C. § 2701, et seq. The distinctions between the two sections are critical in determining the damages 2 available to an individual, the admissibility of evidence, and the ability of the government to obtain certain information. See, e.g., United States v. Smith, 155 F.3d 1051, 1056 (9th Cir. 1998) (noting that Title II of the ECPA does not provide an exclusion of evidence remedy), cert. denied, 119 S. Ct. 804 (1999). 3 Title I: The Prohibition Against Intercepting Electronic Communications. (1) Except as otherwise specifically provided in this chapter any person who— (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . . shall be punished . . . or shall be subject to suit . . . . 18 U.S.C. § 2511(1)(a). What constitutes interception? • “Interception” is defined as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.” 18 U.S.C. § 2510(4). • The interception must be “intentional.” 18 U.S.C. § 2511(a). • Limitation on the term “intercept:” Interception must be during transmission Under the dictates of a search warrant, the Secret Service seized the plaintiff’s computer hardware, which contained private Emails, in order to determine whether or not certain files were stolen. The key issue before the court was whether or not the act of seizing the computer with the stored E-mails constituted an interception in violation of the ECPA. The court held that it did not. After struggling with the definitions under the ECPA, the court found that stored Emails could not be “intercepted” by the definition of the term. See Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457, 461-62 (5th Cir. 1994); see also Wesley College v. Pitts, 974 F. Supp. 375, 385-87 (D. Del. 1997) (finding that electronic communications already 4 in storage cannot be intercepted under Title I), aff’d, 172 F.3d 861 (3d. Cir. 1998). Voice Mail v. E-mail Interception A co-worker gained access to another employee’s voice mail system and discovered that the employee may have committed securities fraud. The co-worker recorded the message, which ultimately started an SEC investigation and led to the indictment of the employee. The indicted employee attempted to suppress the voice mail as evidence claiming that it was obtained in violation of the ECPA. The issue before the court was whether or not the retrieval of the voice mail in issue was an interception under Title I of the ECPA. The court found that while the statute did not indicate that a stored electronic communication, such as Email, can be “intercepted,” the language of the statute indicated that wire communications, such as voice mails, could be intercepted even when they were in storage. Thus, the interception of wire communications does not need to be contemporaneous with the transmission. See Smith, 155 F.3d at 1059 (finding that the voice mail message was impermissibly intercepted and subject to exclusion under § 2515 of the ECPA). What does this section mean? This section prohibits an employer from intentionally listening to, or obtaining the contents of, the communications of another individual, such as telephone calls and voice mail messages during the transmission of the message. Thus, this could apply to an employer who intentionally listens to an employee’s telephone calls or voice mails. However, employees have not been successful in applying this provision to E-mail. Both Steve Jackson Games and Wesley College indicate that the interception of an employee’s E-mail will only violate Title I of the ECPA if the employer intercepts the E-mail while the message is “en route.” Emails that are already in “storage” cannot be deemed intercepted under Title I of the ECPA. Therefore, an employee contesting an employer’s accessing of the employee’s stored E-mail must look to Title II of the ECPA for guidance. However, as Smith suggests, an employer can be found liable for accessing an employee’s voice mail when it is in transit 5 and when it is in storage. See Tatsuya Akamine, Proposal for a Fair Statutory Interpretation: E-Mail Stored in a Service Provider Computer is Subject to an Interception under the Federal Wiretap Act, 7 J.L. & POL’Y 519 (1999) (illustrating the various judicial distinctions between the term intercept and recommending a consistent reading of interception for Email and voice mails). (a) Title II: The Prohibition Against Accessing Stored Electronic Communications. Offense.—Except as provided in subsection (c) of this section whoever— (1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access this facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such a system shall be punished . . . . 18 U.S.C. § 2701(a). What is unauthorized access? The courts have found that unauthorized access occurs where an individual gains entry to a stored communications facility and retrieves the stored electronic communication. See Bohach v. City of Reno, 932 F. Supp. 1232, 1236 (D. Nev. 1996); cf. United States v. Smith, 155 F.3d 1051, 1058-59 (9th Cir. 1998) (finding that the mere entry into a stored communications facility constituted unlawful access), cert. denied, 119 S. Ct. 804 (1999). However, the holding of Smith may effectively restrict the use of Title II to E-mails and not voice mails. See id. at 1059 (finding that voice mails, unlike E-mails, already in storage, can be intercepted under Title I). 6 What does this provision mean? Title II prevents employers from accessing stored communications, such as E-mails and voice mails, unless the employer falls under one of the ECPA’s exceptions. Securities Industry: Certain rules and regulations within the securities industry require the retention of outgoing communications, such as E-mails. Exchange Act Rule 17a-4(b)(4) requires brokers to retain all communications sent and received “relating to his [or her] business as such” for three years. See 17 C.F.R. § 240.17a-4 (1999); see also Reporting Requirements for Broker Dealers Under the Securities Exchange Act, Exchange Act Release No. 34-38245, 1997 WL 46859 (Feb. 5, 1997) (finding that the contents of the E-mail should be reviewed in order to determine if it is “business as such”). The NASD requires the retention of correspondence of “registered representatives relating to its investment banking or securities business . . . .” See NASD Manual (Conduct Rules) R. 3010(d)(3). The Exceptions for the Interception of and Access to Electronic Communications: An employer will be held liable under Title I of the ECPA for the interception of the electronic communications of an employee, and Title II of the ECPA for the unauthorized access of stored electronic communications, unless the employer falls within one of three exceptions: • The Consent Exception: An exception allowing interception or access if one of the parties to the communication consents. See 18 U.S.C. §§ 2511(2)(d); 2701(c)(2). • The Business-Extension Exception: An exception allowing interception if done by a device provided by the communications provider or subscriber and done in the interceptor’s ordinary course of business. See 18 U.S.C. § 2510(5)(a)(i). • The Provider Exception: An exception allowing providers of wire or electronic communications services to monitor their lines to ensure adequate service. See 18 U.S.C. §§ 2511(2)(a)(i); 2701(c)(1). 7 The Consent Exception: The ECPA provides that a person will not be liable for intercepting an electronic communication if one of the parties consents to the interception before the communication is made. See 18 U.S.C. § 2511(2)(d). • Notice: Employer notified employees that it would monitor their business telephone calls, and would only monitor the employee’s personal calls to determine whether or not they were business related. Employer monitored a conversation between two employees regarding a job interview one of them had with another company. The employee brought suit under the ECPA. The key issue for the court was whether or not the employer’s notice to the employees that their business calls were monitored fell under the consent exception to the ECPA. The court found that it did not. The court determined that the employer’s policy constituted employee consent only to the monitoring of business calls, but did not extend to personal calls. The court found that “knowledge of the capability of monitoring alone cannot be considered implied consent” and that courts will imply consent only when the employee knew or should have known of a policy of constantly monitoring calls, or importantly, when the employee conducts a personal conversation over a line that is explicitly reserved for business. See Watkins v. L.M. Berry & Co., 704 F.2d 577, 581 (11th Cir. 1983). • 8 Implied Consent: Employee consent can be implied, but the prevailing cases indicate that the employee must receive some type of implicit notice. The courts will look at the surrounding circumstances to determine whether or not the employee knew or should have known that the communications were monitored. See, e.g., Deal v. Spears, 980 F.2d 1153, 1157 (8th Cir. 1992) (noting that an employee obviously did not have notice of the employer’s monitoring because the true purpose behind the monitoring of the employee’s calls was to investigate a burglary); Griggs-Ryan v. Smith, 904 F.2d 112, 118 (1st Cir. 1990) (finding that plaintiff had notice of the monitoring where landlady informed him that she was going to start monitoring phone calls); Bohach v. City of Reno, 932 F. Supp. 1232, 1237 (D. Nev. 1996) (indicating that consent to have stored communications accessed could be implied by an employee’s use of a companyowned computer); Simmons v. Southwestern Bell Tel. Co., 452 F. Supp. 392, 396 (W.D. Okla. 1978) (implying consent where plaintiff made personal calls on phone lines reserved for business that plaintiff knew were monitored for quality control), aff’d, 611 F.2d 342 (10th Cir. 1979). Securities Industry: Implied consent to monitor employee phone calls and E-mails can be found in the monitoring requirements for the various exchanges. For example, the NASD and the NYSE require firms to implement review policies for outgoing correspondence, including electronic communications such as E-mail, with the public. See NASD Manual (Conduct Rules) R. 3010(1)-(2); NYSE Rules of Board (Communications with the Public) R. 472. Under the NASD rules, these communications include: advertisements, sales literature and correspondence, including electronic communications. See R. 2210(a). • 9 Impact for Employers: Employee consent will not easily be found in regard to E-mail and voice mail monitoring unless the employee gives actual consent, or the circumstances illustrate that the employee knew about the monitoring. While implied consent could be found with respect to broker-dealers given the NASD and NYSE regulations, employers can increase the likelihood that implied consent will be found if they place employees on notice of electronic monitoring by adopting a comprehensive electronic communications policy and abiding by the policy’s limits. See Watkins, 704 F.2d at 585 (indicating that implied consent will not be found when monitoring exceeds the terms of the company policy). The Business-Extension Exception: The ECPA prohibits a person from “willfully us[ing] . . . any electronic, mechanical, or other device to intercept oral communication[s].” 18 U.S.C. § 2511(1)(b). However, the ECPA exempts the use of electronic devices to intercept communications by a “subscriber or user” furnished to them by a “provider of wire or electronic communication service” in the ordinary course of business. See 18 U.S.C. § 2510(5)(a). This exception also exempts interceptions made by a “provider of . . . [an] electronic communication service” in the ordinary course of its business. See id. • In order to be eligible for this exception, an employer must first show that the intercepting device it used is an instrument used in the ordinary course of business. See 18 U.S.C. § 2510(5)(a). The most usual example of this is monitoring employee phone calls in the ordinary course of business with telephonic equipment provided by the phone company or other service provider. See, e.g., Sanders v. Robert Bosch Corp., 38 F.3d 736, 740-41 (4th Cir. 1994) (finding that a “voice logger” was not an instrument used by the employer in the ordinary course of business because it did not “further the employer’s communication system”); see also Deal v. Spears, 908 F.2d 1153, 1158 (8th Cir. 1992) (finding that in order to prevail under this exception, “the intercepting equipment must be furnished to the user by the phone company or connected to the phone line, and it must be used in the ordinary course of business”). Assuming that the intercepting device used by the employer to monitor is equipment used within the ordinary course of its business, the courts 10 will analyze whether the actual monitoring itself is in the ordinary course of business. The courts have applied a context or a contentbased analysis to determine if the actual monitoring is being made within the ordinary course of business. If the monitoring is not made within the ordinary course of business, the employer’s actions will not fall under this exception. • Context-Based: Courts applying the context-based analysis have focused on the surrounding circumstances of the actual interception. One key factor that the courts have looked at is whether or not the employee had notice of the monitoring. o Notice of Business-Related Employer Policy: An employer set up a telephone monitoring system to monitor its employees’ business transactions. After providing notice to the employees, and after no employee protested, the telephone company installed the system. Later, an employee brought suit alleging that the employer violated the federal wiretapping law. The court determined that the employer’s action fell squarely within the business-extension exception because the installation was fully disclosed in advance to the employees and was for a legitimate business purpose. See James v. Newspaper Agency Corp., 591 F.2d 579, 582 (10th Cir. 1979). o Scope of Policy: Suspicious that an employee had helped to aid in the robbery of the employer’s store, the employer monitored the employee’s calls at work with a recording device. The employee was terminated when the employer recorded her selling one of its products at a discounted rate. The employee brought suit alleging that 11 the employer violated the federal wiretapping laws. The court found that the interception of these calls did not fall within the business-extension exception, and thus, held the employer liable under the act. The court determined that because the majority of the calls intercepted were personal calls, not business-related calls, the exception did not apply. The court also noted that the employer did not make any effort to ensure the calls recorded were business-related in order to limit the interception of personal calls. See Deal, 980 F.2d at 1158-59. • Content-Based: Courts applying the content-based analysis have focused on whether the intercepted communication is a “business” communication and, thus, lawfully intercepted. As a general rule, an employer can lawfully intercept businessrelated communications; however, the employer is limited to monitoring personal calls to the extent necessary to determine if the content of the calls is business-related. o Personal v. Business Related Monitoring: The monitoring of an employee’s personal calls is in the ordinary course of business when necessary to guard against the unauthorized use of the telephone; however, the employer must cease listening to the call once the personal nature of the call is determined. Therefore, recording of an employee’s phone call concerning the employee’s interview with another company did not fall within the ordinary course of business exception since it was a “personal matter, neither in pursuit nor to the 12 legal detriment of” the business. See Watkins, 704 F.2d at 582-84. o The Fifth Circuit found that a supervisor’s monitoring of a business call where an employee divulged trade secrets was permissible and within the ordinary course of business. The court stressed, however, that its decision would have been different had the supervisor monitored a personal portion of any conversation or had the supervisor engaged in a general practice of surreptitious monitoring. See Briggs v. American Air Filter Co., 455 F. Supp. 179, 181 (N.D. Ga. 1978), aff’d, 630 F.2d 414, 420 (5th Cir. 1980). o The monitoring of telephone conversations between co-employees concerning “scurrilous remarks” about supervisory employees was permissible. The court found that the conversations were not personal because they occurred between coemployees during office hours and they involved remarks about “supervisory employees in their capacities as supervisors.” The court determined that an employer had a legal interest in the “potential contamination of a working environment.” Epps v. St. Mary’s Hosp., Inc., 802 F.2d 412, 416-417 (11th Cir. 1986). • 13 Impact for Employers: The extent to which the business-extension exception applies to employer monitoring of E-mail is unclear. Historically, this exception was used to uphold the monitoring of employee phone calls within the ordinary course of the employer’s business. However, the statute was amended to include language which exempts interceptions made by a provider of an “electronic communications service” made within the ordinary course of business. Arguably, this may include the providers of an E-mail system. However, there is debate over whether or not an employer would qualify as a “provider” of its internal E-mail system, and how the requirement that the intercepting device be a form of telephonic equipment would apply to E-mail. The Provider Exception: The provider exception exempts system providers from the ECPA’s prohibitions on both access to and disclosure of intercepted communications. • The ECPA provides that: [i]t shall not be unlawful under this chapter for an operator of a switchboard, or an officer, employee, or agent of a provider of wire or electronic communication service, whose facilities are used in the transmission of a wire communication, to intercept, disclose, or use that communication in the normal course of his employment while engaged in any activity which is a necessary incident to the rendition of his service or to the protection of the rights or property of that service. 18 U.S.C. § 2511(2)(a)(i). • Providers are also exempted from the ECPA’s prohibition against accessing and disclosing stored communications as well. See 18 U.S.C. § 2701(c)(1). • Impact on Employers: The service provider exception would permit employer monitoring of electronic communications where an employer was found to be a “provider” of its E-mail system, and where the monitoring was within the ordinary course of business. However, there is little law on the subject. While courts most likely would find that public companies such as A.O.L. and Prodigy are service providers, there is debate over whether or not an 14 employer would be a “provider” of its internal e-mail system. However, one court has determined, albeit in dicta, that the ECPA is not violated “‘if the person or entity providing a wire or electronic communication’ intentionally examines everything on the system.” Flanagan v. Epson America, Inc., No. BC007036, 5-6 & n.1 (Cal. Sup. Ct. Jan. 4, 1991). The investigation by a public employer of a police officers’ alleged misuse of the department’s computerized, alphanumeric paging system, which included retrieving messages stored on the system, fell within the provider exception to the ECPA. The court found that the police department, as system provider, “was free to access the stored messages as it pleased.” Bohach v. City of Reno, 932 F. Supp. 1232, 1237 (D. Nev. 1996); see also, United States v. Monroe, No. 99-0536, 2000 WL 276509, *4 (C.A.A.P. Mar. 13, 2000) (noting in dicta that the Government’s actions were permissible under the ECPA because it was “the provider of [an] electronic communications service . . . [and was] specifically exempted from any statutory liability for unlawful access to stored electronic communications.”). Other Limitations: The ECPA protects only electronic communications that “affect[] interstate or foreign commerce.” 18 U.S.C. § 2510(12). Thus, it is questionable as to whether or not the ECPA covers local intra-company E-mail systems at all. Congress has specifically noted, however, that wire communications such as voicemail systems affect interstate or foreign commerce and, therefore, are in the protection of the statute. See 1986 U.S.C.C.A.N. 3555, 3568. Disclosure under Title I and Title II: Title I of the ECPA prohibits a person from intentionally disclosing the contents of an electronic communication that the individual knows was intercepted in violation of the statute. See 18 U.S.C. § 2511(1)(c). • 15 Exclusion: For example, in the United States v. Smith, the court found that information of a securities violation obtained from an illegally intercepted voice mail would have been excluded from evidence had the contents of the voice mail been the only way the SEC had known about the violation. While the court allowed the evidence of the violation into trial, the court excluded the actual voice mail message. See 155 F.3d 1051, 1059 (9th Cir. 1998) (finding that § 2515 of the ECPA requires the exclusion of illegally obtained communications from evidence), cert. denied, 119 S. Ct. 804 (1999). • Application of Smith to E-mail: The holding of Smith states that E-mails cannot be intercepted under Title I of the ECPA once they are in storage. Therefore, the exclusion of evidence remedy under § 2515 of the ECPA would not apply to E-mail. Furthermore, Title II of the ECPA does not have an exclusion of evidence remedy. Title II of the ECPA prohibits a provider of electronic communications services to the public from disclosing the contents of any electronic communication in storage. See 18 U.S.C. § 2702(a)(1). However, one court has found that an internal E-mail system does not qualify as a public provider system and is not subject to the ECPA. See Andersen Consulting LLP v. UOP, 991 F. Supp. 1041, 1043 (N.D. Ill. 1998) (finding that providers of electronic services are not liable under the ECPA for disclosing the contents of an E-mail unless they provide service to the general public and a corporation’s internal E-mail system was not a public electronic system). Exceptions: A public provider can disclose the contents of an intercepted communication or a communication in electronic storage where: o one of the parties to the communication gives consent; o an authorized person needs to review the communication to forward the message to its destination; o disclosure is “necessarily incident to the rendition of the 16 service or to the protections of the rights or property of the provider of that service;” or o the information is disclosed to a law enforcement agency and was “inadvertently obtained” by the provider and appears to “pertain to the commission of a crime.” See 18 U.S.C. §§ 2511(3)(b)(i)-(iv); 2702(b)(1)-(6). Damages under the ECPA • Title I: Interception • Criminal Penalties: A violation of Title I may result in a fine or a prison sentence of no more than five years. See 18 U.S.C. § 2511 (4)(a). • Civil Penalties: A successful plaintiff may receive damages the greater of: (1) the actual damages plus any profits made by the violator; (2) $10,000; or (3) $100 a day for each violation. See 18 U.S.C. § 2520(c). The ECPA further allows a prevailing plaintiff to recover punitive damages, attorneys’ fees and other reasonable litigation costs. See 18 U.S.C. § 2520(b). Title II: Access • Criminal Penalties: A violation of Title II may result in a fine or imprisonment for no more than two years, depending on the malicious nature of the act. See 18 U.S.C. § 2701(b)(1). • Civil Penalties: A successful plaintiff may recover: (1) actual damages, and (2) any profits made by violator, which will be no less than $1000. The plaintiff may also recover compensatory and punitive damages, as well as attorney’s fees. See 18 U.S.C. § 2707. The Fourth Amendment The rights of the people to be secure in their persons, houses, 17 papers, and effects, against unreasonable searches and seizures, shall not be violated . . . . U.S. CONST. amend. IV. Public Employers: For a public employer, the Fourth Amendment may raise additional areas of concern in relation to an employer’s ability to monitor an employee’s E-mail, voice mail or Internet access. The Supreme Court has determined that public employees have, to a certain degree, a reasonable expectation of privacy in the workplace. See O’Conner v. Ortega, 480 U.S. 709, 719-20 (1987). In making the determination as to whether or not an employee has a reasonable expectation of privacy, the Court will weigh the employee’s privacy right with the employer’s legitimate need to control and manage the work environment. See id. However, based upon the Supreme Court’s edicts, courts have generally permitted employee searches under the Fourth Amendment, particularly when the company rules permit the search or when a company policy bans the conduct being investigated. See, e.g., American Postal Workers Union v. United States Postal Serv., 871 F.2d 556, 560 (6th Cir. 1989) (upholding locker searches based on a union contract); Chicago Firefighters Union, Local 2 v. Chicago, 717 F. Supp. 1314, 1319 (N.D. Ill. 1989) (enforcing job regulations that stated employee lockers were subject to search). Internet and E-mail Case Examples: No expectation of privacy in Internet use where known policy: Government office monitored its employees’ Internet connections with a “firewall.” During a routine check on the system, an employee noticed that defendant had made many visits to sexrelated Internet sites. During an investigation on the defendant’s Internet usage, the government employer found that the defendant had accessed several web pages depicting child pornography. At trial for receipt of child pornography, the defendant 18 moved to suppress the evidence under the Fourth Amendment arguing that he had an expectation of privacy in his Internet use. The court disagreed. The court determined that because the government employer had a known office “practice or procedure” allowing it to audit employee Internet use, the defendant could not claim to have a reasonable expectation of privacy in his Internet use. Furthermore, in balancing the employer’s ability to supervise and control the office with the defendant’s expectation of privacy, the court found that the government’s need to conduct the investigation outweighed the defendant’s privacy right. See United States v. Simmons, 29 F. Supp. 2d 324, 327-28 (E.D. Va. 1998), aff’d in part, remanded in part by No. 99-4238, 2000 WL 223332 (4th Cir. Feb. 28, 2000). Expectation of privacy in private service provider: An Air Force Colonel subscribed to America Online [“AOL”] for E-mail services. During an FBI search to uncover the transmission of child pornography on the Internet, it was uncovered that the Colonel may have received these pornographic E-mails. The Air Force searched the Colonel’s quarters and seized his computer. Three computer files were pulled from the Colonel’s computer and admitted into evidence as depicting child pornography. The Colonel was court-marshaled. The court found that the Colonel had a reasonable expectation of privacy in his AOL E-mail system. Applying the Fourth Amendment balancing test, the court determined that it was reasonable for an individual to believe that the police would not intercept E-mails sent through a private E-mail provider such as AOL. The court, however, indicated that this expectation of privacy was limited to E-mails sent from person-to-person, not those sent to public chat rooms. See United States v. Maxwell, 45 M.J. 406, 417-19 (C.A.A.F. 1996). But see, United States v. Monroe, No. 990536, 2000 WL 276509, * 4 (C.A.A.F. Mar. 13, 2000) (finding that an individual did not have a reasonable expectation of privacy in e-mail where Government both owned and operated the system 19 and had a clear policy informing users that their Emails could be monitored). Impact for Public Employers: Simmons indicates that an employee, using the employer’s computer system, does not have a reasonable expectation of privacy in his or her Internet use. This becomes even more compelling where the employee knew that the employer had a policy of monitoring Internet use. This same rationale should apply to employee E-mails as well. If the employer had a policy of checking or monitoring E-mails sent on a companyowned computer, and followed the parameters of the policy, the employee probably would not have a reasonable expectation of privacy in the communication. Maxwell, however, limited this rationale and held that an individual does have a limited expectation of privacy in his or her Emails sent through a private service, such as AOL, on a home computer. 20 STATE SOLUTIONS Not only do employers have to contend with the ECPA and the Fourth Amendment in regard to monitoring employee E-mail, voice mail and Internet access, but employers must also realize that these situations can trigger state statutory and common laws as well. While the ECPA offers some protection to employees, the crucial arena where an employee’s privacy rights are protected is often within state law. I. Constitutional Right to Privacy A. State Constitutional Provisions: Several states have explicitly guaranteed the right to privacy in their constitutions. See ALASKA CONST. art. I, § 22; ARIZ. CONST. art. II, § 8; CAL. CONST. art. I, § 1; FLA. CONST. art. I, § 23; HAW. CONST. art I, § 6; ILL. CONST. art. I, § 6; LA. CONST. art. I, § 5; MONT. CONST. art. II., § 10; S.C. CONST. art. I, § 10; WASH. CONST. art. I, § 7. Illinois: The Illinois Constitution specifically protects “interceptions of communications by eavesdropping devices or other means” within the right to privacy. See ILL. CONST. art. I, § 6. These constitutional protections generally apply to state action only. See, e.g., Luedtke v. Nabors Alaska Drilling, Inc., 768 P.2d 1123 (Alaska 1989). California is a notable exception. See Hill v. NCAA, 865 P.2d 644 (Cal. 1994) (state constitutional right of privacy applies to private actors). The California Constitution guarantees all individuals an “inalienable right to privacy.” Courts have interpreted this state constitutional right to prevent employer conduct such as drug testing and searches of employee lockers. The key issue is whether a “reasonable person” would have an expectation of privacy. If an employee has such a reasonable expectation of privacy, the employee can sue for violation of his or her privacy. To avoid such liability, therefore, employers must take steps to reduce the expectation of privacy. Again, notice and acknowledgment of an electronic monitoring policy probably will be sufficient to establish that, in light of such a policy, no reasonable employee could have an expectation of privacy in electronic or wire communications. II. Common Law Right to Privacy A. State Recognized Common Law Privacy Rights: Some states have recognized that the common law right to privacy extends to the workplace. In the context of E-mail and voice mail interception, this common law right to privacy is the right against “unreasonable intrusion upon the seclusion of another,” which holds that “one who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another, or his private affairs or concerns, is subject to liability to the 21 other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.” Restatement (Second) of Torts § 625B (1977). B. Because an “invasion” can be non-physical, the tort protects an individual against electronic eavesdropping. See id. cmt. 6. Liability may exist even where the invasion is not surreptitious, and the employer need not publicize the improperly obtained information. See id. cmt. 9. Elements for Privacy Claim: An employee must show that the employer committed a highly offensive intentional intrusion into a private matter. In order to demonstrate this, the employee must show that a subjective expectation of privacy existed and that this expectation was reasonable. Often, the reasonableness of the intrusion will depend on the degree of intrusion, the context, conduct and circumstances surrounding the intrusion, as well as the motives and objectives behind the intrusion. See, e.g., Miller v. NBC, 232 Cal. Rptr. 668, 679 (Ct. App. 1986). Generally, the courts have found that an individual has a reasonable expectation of privacy against the “intrusion” of electronic surveillance, such as telephone monitoring. See, e.g., Billings v. Akinson, 489 S.W.2d 858, 861 (Tex. 1973); Nader v. General Motors Corp., 255 N.E.2d 765, 770 (N.Y. 1970). Case Examples: The following cases provide insight as to how state courts have applied the right to privacy to E-mail issues. 1. No privacy in communication on company system: Employer assured employees that its internal E-mail system was privileged and confidential. Employer also informed employees that their E-mails would not be “intercepted,” or used to take an adverse employment action against an employee. When the employer thereafter accessed an employee’s E-mail and terminated the employee for unprofessional comments made in the communication, the employee argued that his termination was in violation of public policy because he had a right to privacy under Pennsylvania law. While the court noted that Pennsylvania did recognize the right to privacy, an employee must demonstrate that the invasion was “highly offensive” to a reasonable person. In the case before it, the court found that “unlike urinalysis and personal property searches, we do not find a reasonable expectation of privacy in e-mail communications voluntarily made by an employee to his supervisor over the company e-mail system 22 notwithstanding any assurances that such communications would not be intercepted by management.” Essentially, an employee using an employer’s E-mail system does not have a reasonable expectation of privacy in the contents of his E-mail messages. Furthermore, the employer’s accessing the employee’s E-mail could not be considered “highly offensive” by a reasonable person. See Symth v. Pillsbury Co., 914 F. Supp. 97, 100-01 (E.D. Pa. 1996). 2. C. III. Password does not equal privacy: Employee was terminated due to a sexual harassment investigation. The employee requested access to his Email in order to disprove the allegations. The employer denied the request. Employee brought suit alleging that his employer had invaded his privacy by accessing his personal computer folders where he stored his Emails, which could only be accessed by a network password and an additional personal password assigned by the employee. The employee argued that he had a reasonable expectation of privacy in these folders because they were “protected” by a personal password. The court determined that an employee did not have a reasonable expectation of privacy in his E-mails, because the “e-mails contained on the company computer were not [his] personal property, but were merely an inherent part of the office environment.” An employee, the court reasoned, should not have a reasonable expectation of privacy in a company-owned computer. Finally, the court determined that even if the employee could show that he had a reasonable expectation of privacy, the employer’s access of his E-mail was not “highly offensive.” See McLaren v. Microsoft Corp., No. 05-97-00824-CV, 1999 WL 339015 (Tex. Ct. App. May 28, 1999). Summary: In general, it appears that an employee will have a difficult time establishing that he or she has a reasonable expectation of privacy in communications made on a company-owned system. However, because there is limited case law on the subject, an employer should be cautious before monitoring employee communications. An employer most likely would not violate an employee’s right to privacy where the employer has a known policy of monitoring the employees’ communications, and restricts the use of these systems for business purposes only. However, an employer should be careful when dealing with computer passwords. While the Pennsylvania and Texas courts did not find that a password was indicative of privacy, some courts might find the use of a personal password reinforces the employee’s argument that a reasonable person would have believed the communications to be private. State Statutes A. In addition to the common law invasion of privacy, forty-eight states and the District of Columbia have enacted statutes similar to the federal Wiretap and 23 Stored Communications Acts.1 (The two exceptions are South Carolina and Vermont). Many of these states have adopted the one party consent, "business extension" and "provider" exceptions found in the federal statute. Thirteen states require that prior consent must be given by all parties to the communication.2 Twenty-two states and Washington, D.C. have not enacted a "business extension" exception or explicitly restrict the "provider" exception to communication common carriers.3 B. Pro-Employee Because the ECPA does not preempt state law that offers more protection to an individual, some states have enacted laws that provide more broad protection. 1. For example, some states require that all parties consent to the interception before the “consent exception” will apply. See, e.g., Cal. Penal Code § 631(a); Fla. Stat. Ann. § 934.03 (2)(d); 720 Ill. Comp. Stat. § 5/14-2 (West 1998), amended by 1999 Ill. Legis. Serv. P.A. 91-657 (H.B. 526) (West 2000). Statutory exceptions and (unpublished) court decisions, however, appear to indicate that employer monitoring of workplace e-mail most likely does not violate either statute. The eavesdropping provision contains a key exception when parties to a communication reasonably expect to be overheard. 2. In several states, an employer must give its employees advance notice of its intention to monitor, such as a written policy, before monitoring an 1 See Ariz. Rev. Stat. § 13-3012 (1993); Cal. Penal Code § 631 (Deerings 1998); Colo. Rev. Stat. Ann. § 18-9-305 (West 1993); Del. Code Ann. tit. 11, §§ 2402, 2422 (1999); Conn. Gen. Stat. Ann. § 31-48d (West 1999); D.C. Code Ann. § 23-542 (1993); Fla. Stat. Ann.§ 934.03 (1996); Ga. Code Ann. § 16-11-66 (Miche 1996); Haw. Rev. Stat. § 803-42 (1993); Idaho Code §§ 18-6702, 18-6720 (West 1997); 720 Ill. Comp. Stat. § 5/14-2 (West 1998), amended by 1999 Ill. Legis. Serv. P.A. 91-657 (H.B. 526) (West 2000); Kan. Stat. Ann. §§ 21-4001, 22-2514 (West 1995); La. Rev. Stat. Ann. § 15:1303 (1992); Md. Code Ann., Cts. & Jud. Proc. § 10-402 (1995); Mass. Gen. Laws ch. 272, § 99 (1999); Minn. Stat. § 626A.02 (1993); Miss. Code Ann. § 41-29-531 (1993); Neb. Rev. Stat. § 86-702 (1999); Nev. Rev. Stat. § 200.620 (1993); N.J. Stat. Ann. § 2A:156A-4 (1994), amended by 1999 N.J. Sess. Law Serv. Ch. 151 (Assembly 3014) (West 1999); N.M. Stat. Ann. § 30-12-1 (Miche 1994); N.Y. Penal Law § 250.00 (McKinney 2000); N.D. Cent. Code § 12.1-15-02 (1993); Ohio Rev. Code Ann. § 2933.52 (Anderson 1994); Okla. Stat. tit. 13, § 176.4 (1993); R.I. Gen. Laws § 11-35-21 (1993), amended by 1999 R.I. Pub. Laws Ch. 99-167 (99-H-5593) (West 1999); Tex. Penal Code Ann. § 16.02 (West 1994); Utah Code Ann. § 77-23a-4 (1994); Va. Code Ann. § 19.2-62 (Miche 1994); W. Va. Code § 62-1D-3 (1994); Wis. Stat. § 968.31 (1993); Wyo. Stat. Ann. § 7-3-602 (Miche 1994) . 2 California, Connecticut, Delaware, Florida, Georgia, Illinois, Maryland, Massachusetts, Michigan, Montana, New Hampshire, Pennsylvania, and Washington all require both parties' consent to the monitoring. See Cal. Penal Code §§ 631(a), 632(a) (West 1996); Conn. Gen. Stat. § 52-570d (1997); Del. Code Ann. tit. 11, § 1336(b) (1995); Fla. Stat. ch. 934.03(2)(d) (1995); Ga. Code Ann. § 16-11-66(a) (1996); 720 Ill. Comp. Stat. § 5/142 (West 1993); Md. Code Ann., Cts. & Jud. Proc. § 10- 402(c)(3) (1995); Mass. Gen. Laws Ann. ch. 272 99(B)(4) (West 1990); Mich. Comp. Laws Ann. § 750.539c (West 1991); Mont. Code Ann. § 45-8- 213(c) (1995); N.H. Rev. Stat. Ann. § 570-A:2 (1986); 18 Pa. Cons. Stat. Ann. § 5703-04 (West 1995); Wash. Rev. Code Ann. § 9.73.030(1)(b) (West 1988). 3 Alabama, Delaware, the District of Columbia, Georgia, Idaho, Indiana, Iowa, Kentucky, Louisiana, Maine, Minnesota, Mississippi, Missouri, New Hampshire, New Jersey, New Mexico, North Dakota, Ohio, Oklahoma, Pennsylvania, Rhode Island, South Dakota, and Texas. 24 employee’s electronic communications. See, e.g., Conn. Gen. Stat. Ann. § 31-48d (requiring an employer to give employees prior written notice of monitoring policy; however, allows monitoring where employee is violating the law); Colo. Rev. Stat. Ann. § 24-72-204.5 (requiring a state employer to detail in a policy the employer’s ability to monitor the employees’ E-mail). C. Pro-Employer Some states have enacted laws that are pro-employer. See, e.g., Neb. Rev. Stat. § 86-702(2)(a) (1999) (allowing employers the right to intercept, disclose and use electronic communication in the ordinary course of business; expressly exempting employers from wiretap statute). Case Examples California enacted its own wiretapping law that provides a private cause of action for illegal interceptions of private wire communications. See Cal. Penal Code § 631. • Two customer service representatives were placed on final warning after their supervisor printed out their E-mail messages, which contained inappropriate jokes and language about the supervisor. The employees complained and were terminated. The employees sued under § 631, but the court dismissed the action. The court determined that the plaintiffs did not have a reasonable expectation of privacy in their E-mail messages, particularly because they signed a computer user registration form which stated company policy that employee and contractor use of companyowned computer software was restricted to company business. Finally, the court determined that the use of a password did not raise a material issue as to whether the employees’ expectation of privacy was reasonable. See Bourke v. Nissan Motor Corp., No. B068705 (Cal. Ct. App. July 26, 1993). • An employee found her supervisor reading all of the employees’ E-mail going, or originating from, outside the company. As the individual in charge of the company’s E- 25 mail system, the employee had assured some 700 employees that their E-mail messages were private. The employee complained to her supervisor and sought an E-mail account number to which her supervisor would not have access. Subsequently, the employee was fired for insubordination. The employee sued her employer under California law. A class of the company’s employees also sued for invasion of privacy. The California court, however, found that the employees did not have a reasonable expectation of privacy in the E-mail messages and dismissed the suit. See Shoars v. Epson America, Inc., No. BC73243 (Cal. Ct. App. 1991); review denied, No. S040065, 1994 Cal. LEXIS 3670 (Cal. June 29, 1994); Flanigan v. Epson America, Inc., No. BC007036, slip op. (Cal. Super. Ct. Jan. 4, 1991). Employer had interoffice E-mail system that required use of a password to access. However, employer’s supervisors could access the E-mail files. Supervisor accessed two employees’ E-mail accounts and found messages referring to the supervisor’s extra-marital affair with another employee. The two employees were terminated for “excessive” use of the E-mail system. The employees sued, alleging a violation of the Massachusetts wire tapping laws and an invasion of privacy. The court found that the employer did not violate the wire tapping law. Specifically, the court found that an employer, or provider of an E-mail system, can utilize the system in the ordinary course of business. The court found that the employer did not unlawfully intercept the employee’s E-mails, but was backing-up the system in the ordinary course of its business. The court did, however, recognize that the employees may have a privacy right in their files and declined to grant summary judgment. See Restuccia v. Burk Techs., Inc., No. 95-2125, 1996 Mass. Super LEXIS 367 (Super. Ct. Aug. 13, 1996). 26 PROPOSED LEGISLATION I. Federal: Presently, the ECPA is the only piece of federal legislation dealing specifically with the subject of protecting electronic communications. While several pieces of federal legislation have been proposed over the past few years, none have been enacted successfully. However, this unsuccessful legislation may offer some guidance as to what the future law on electronic message protection might look like. A. The Privacy for Consumers and Workers Act (“PCWA”) [16 H.R. 1900, 103rd Cong., 1st Sess. (1993)]. The PCWA was introduced in the Senate and in the House, but both versions died in subcommittee at the end of the 103rd Congress. Groups such as the ACLU and the Electronic Frontier Foundation continue to press for legislation. 1. Impact of the PCWA: Although the PCWA was mostly aimed at curtailing video and audio surveillance of employees’ on-the-job activities, it also would have drastically limited an employer’s ability to monitor E-mail and voice mail communications. a. Continuous Monitoring: Although continuous electronic monitoring is permitted, the employer would not be allowed to review the data except in certain limited circumstances, such as when the employer already has reason to believe the data has some bearing on the employee’s work. b. Periodic or Random Monitoring: Random electronic monitoring would be virtually prohibited, except for monitoring of new employees and monitoring “work groups” with prior notice. c. Investigations: Electronic monitoring without prior notice would be permitted in connection with investigations of violations of the law or willful gross misconduct, but only after the employer completed a written statement describing the conduct to be monitored and the reasons for the monitoring. d. Notice Requirements: Any electronic monitoring, other than in connection with an investigation as described above, would require prior notice to employees and even prospective employees of the forms of monitoring, the data to be collected, the days and times of monitoring, and the uses to be made of the information collected. e. Exemptions: Banks, securities firms, and other financial institutions, as well as intelligence contractors, would be exempt from the provisions of the PCWA. In addition, an employer who has an immediate business need for specific data can gain access to 27 it without prior notice, if the employee who maintains it is unavailable. f. B. II. Penalties: Employers could be fined up to $10,000 for each violation. The Telephone Privacy Act of 1993 (“TPA”) [S. 311, 103rd Cong., 1st Sess. (1993)]. The TPA was introduced as an amendment to the ECPA, but died in subcommittee at the end of the 103rd Congress. The TPA would have granted a person the right to intercept a wire or oral communication where all of the parties to the communication have given prior consent, or where such persons are employers engaged in the lawful electronic monitoring of their employees’ communications made in the course of the employees’ duties. State Legislation. State law most likely will begin to dominate the realm of monitoring electronic communications. The most recent example of such state initiative was in California. In 1999, a California bill passed both the Senate and the House that prohibited an employer from “secretly monitoring” an employee’s E-mail without first notifying the employee of the monitoring with a written policy. See S. 1016 (Cal. 1999). The bill, however, was vetoed by the Governor. While the bill was vetoed, the specific provisions of the bill offer an interesting insight to the future restrictions that may be placed on an employer: Prohibiting an employer from “secretly monitoring” an employee’s Email. This “secret monitoring” included inspection, review and retention of the E-mails. Requiring an employer who elected to monitor an employee’s E-mail to give notice to the employees of this practice by “hardcopy or electronic notice.” Furthermore, the bill would have required actual employee consent to the monitoring. 28 THE CURE: A POLICY The statutes and case law indicate that there are ways for an employer to effectively monitor an employee’s E-mail, voice mail and Internet access without violating the law. The most effective way this can be achieved is by enacting a policy detailing your intentions with regard to monitoring your employees’ E-mail, voice mail and Internet access, and following that policy. I. II. Why you need a policy? A. A policy gives employees notice that their electronic communications are not private. This can help to demonstrate consent to the monitoring and can render an employee’s expectation of privacy in their communications unreasonable. B. Fairness. If you choose to monitor your employee’s electronic communications, it is fair that you let them know. This notice may help to curb any type of morale problems that may occur if the employees learn that you are surreptitiously monitoring their communications. C. Some states, including Connecticut, require a written policy. What you should put into your policy? A. III. Initial Questions: First, plan out what you really want to do. In making this determination, take the following questions into consideration: 1. Should E-mail and Internet access be limited to business purposes only? 2. Do you intend to monitor these forms of communication? If so, how, and to what extent? Arguably, you should only monitor for business purposes to stay within the protection of the law. 3. Do you want to give employees passwords? The Written Product Inform employees that their E-mails, voice mails and Internet access are not private, regardless of the use of a password on any of these systems. You should indicate that this consent to access and disclosure of the employees’ messages will be by authorized firm employees for any lawful purpose. An employee should be subject to discipline for retrieving another employee’s Email, voice mail or electronically stored documents for any reason other than specified legitimate business purposes, such as evaluating the effectiveness of electronic mail; providing assistance in performing departmental duties when employees are otherwise unavailable; finding lost messages; conducting an 29 investigation into suspected criminal acts, breaches of security, or violations of corporate policies; complying with subpoenas or other process; and recovering from system failures or other emergencies. IV. Remind employees that the use of company equipment to make offensive or discriminatory comments, vulgarities, obscenities or jokes is prohibited. Remind employees that this prohibition relates to accessing offensive Internet sites as well. Remind employees that the company may store or retain the employees’ E-mail messages for a certain amount of time, and that these messages may be accessed. Describe how and why you intend to monitor the various electronic communications. Make employees aware that use of the company equipment is for business purposes only. Any communications made on these systems are property of the company. Giving employees notice of the policy. Ideally, you should place your policy in your employee handbook and post the policy around the office as well. Use on-screen prompts to remind employees that use of the computer is for business purposes only. It may also be a good idea for you to have your employees acknowledge that they have received notice of the policy. Provide routine training on the permitted use of electronic communications systems. 30
© Copyright 2026 Paperzz