65

Social networking presentation: eTools Risks and Liabilities

  • Upload
    nhsbdc

  • View
    1.658

  • Download
    0

Embed Size (px)

DESCRIPTION

Social Networking Presentation by Joanne Hanson Pearson, Associate, Pierce Atwood Attorneys at law, Portland, ME.

Citation preview

Page 1: Social networking presentation: eTools Risks and Liabilities
Page 2: Social networking presentation: eTools Risks and Liabilities

Employer Use of Social Networking Employer Use of Social Networking Sites: Sites:

Gold Mines or Land Mines?Gold Mines or Land Mines?

Joanne PearsonJoanne PearsonJune 16, 2010June 16, 2010

Page 3: Social networking presentation: eTools Risks and Liabilities

Social Networking Sites

Most popular social networking sites:– Facebook– Twitter– LinkedIn– MySpace

Page 4: Social networking presentation: eTools Risks and Liabilities

Employers are Using Social Networking Sites to Market

According to a 2010 Burson-Marsteller study, of the Fortune Global 100 companies, 65% have active Twitter accounts, 54% have Facebook fan pages, 50% have YouTube video channels, and 33% have corporate blogs

Page 5: Social networking presentation: eTools Risks and Liabilities

Business Benefits

• Advertise products/services• Communicate news and special events

to a wide audience with little cost• Connect with customers• Monitor customer satisfaction with

products

Page 6: Social networking presentation: eTools Risks and Liabilities

Risk to Companies

• Viruses and Malware• Business reputation – bad news travels

fast• Loss of control over postings –

defamation etc.• Loss of confidential information• Lack of productivity• Customer service expectations• Record retention requirements• Access through mobile devices

Page 7: Social networking presentation: eTools Risks and Liabilities

Employees are Using Social Networking Sites

• Facebook– More than 400 million active users– 50% of active users log onto Facebook in any

given day– People spend 500 billion minutes per month

on Facebook– There are more than 100 million active users

currently accessing Facebook through their mobile devices

• LinkedIn– The number of profiles on LinkedIn has

increased by 300 percent since 2008

Page 8: Social networking presentation: eTools Risks and Liabilities

Employee Use (cont)

• Twitter– Ranked in some studies as the third most

used social network– Studies report that the majority of Twitter

users visit the site while at work

Page 9: Social networking presentation: eTools Risks and Liabilities

Employers are Using Social Networking Sites to Screen/monitor Employees

According to a recent CareerBuilder survey:

• 45% use social networking sites to research job applicants; and

• 35% have decided not to hire based on what they learned

According to a recent Microsoft survey, the numbers of 79% and 70% respectively

Page 10: Social networking presentation: eTools Risks and Liabilities

What Might you Find?

• Provocative / inappropriate photos• Bad-mouthing of current or previous

employer• Discriminatory comments• Sharing of confidential employer

information• Misrepresentations about qualifications.

Page 11: Social networking presentation: eTools Risks and Liabilities

Example . . .

• Kimberley, 16 years old, said on Facebook that her job was boring

• Her employer responded: “Following your comments made on Facebook about your job and the company we feel it is better that, as you are not happy and do not enjoy your work we end you employment with __ with immediate effect”

• She never mentioned the name of her employer

Page 12: Social networking presentation: eTools Risks and Liabilities

Example . . .

• Sociology professor at public university posted on Facebook: “Does anyone know where I can find a very discrete hitman? Yes, its been that kind of day . ..”

• And the next month: “had a good day today, DIDN’T want to kill even one student :-) Now Friday was a different story.”

• The professor had 32 friends on Facebook, none of which were students

• The messages wound up in the provost’s office• She was put on leave, accompanied by a security

guard

Page 13: Social networking presentation: eTools Risks and Liabilities

What Else Might you Find?

Page 14: Social networking presentation: eTools Risks and Liabilities

“Twitter”

A job applicant with the company Cisco tweeted the following:

“Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.”

This tweet caught the attention of Tim Levad, a channel partner advocate for Cisco. To which he responded:

“Who is the hiring manager. I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the web.”

Page 15: Social networking presentation: eTools Risks and Liabilities

Not an Isolated IncidentThe following examples all included photos of the

“tweeter”:Youngcap @GYsoFLYY just got back form this

second interview with Jc peny... i gots the job but they gotta run my background.. soim still f*****d

sapphirefires I have a job interview tomorrow at Target. Fingers crossed. I need a job so I can stay in Bellingham and not move back in w/ my parents.

genii_79 is getting ready for a group interview today... it' s just a promo job for Lindt chocolate... can' t be that hard, can it?

Page 16: Social networking presentation: eTools Risks and Liabilities

Also You Could Find . . .

• What an applicant whom you’ve never seen looks like (e.g. race, age, etc.)

• Material about an employee’s religious beliefs

• Medical information (e.g. disabilities, family members with disabilities)

• Employee’s sexual orientation• Other, less obvious, protected activities

/ characteristics of employees

Page 17: Social networking presentation: eTools Risks and Liabilities

What if you learn . ..

Applicant posts that he was so drunk last night that he slept in his car

Applicant posts that she is recently divorced with two young children

Applicant posts that her cousin is battling cancer

Applicant posts that her husband is stationed overseas

Applicant posts that he smokes

Page 18: Social networking presentation: eTools Risks and Liabilities

What are the legal risks?• Discrimination claims• Whistleblower claims• Claims under the National Labor

Relations Act (NLRA)• Tort claims:

– Invasion of privacy – Defamation– Termination in violation of public policy

• Fair Credit Reporting Act

Page 19: Social networking presentation: eTools Risks and Liabilities

Legal Risks (cont)

• Claims under the Stored Communication Act

• Claims under the Genetic Information Nondiscrimination Act

• State privacy or lawful off-duty conduct laws

Page 20: Social networking presentation: eTools Risks and Liabilities

Other risks: Bad Publicity

• Waitress in a pizza restaurant in Charlotte, NC makes a facebook post after she waited on a couple for 3 hours and was left a $5 tip

• “Thanks for eating at Brixx you cheap piece of s___ camper.”

• Employer found out and terminated her employment

• Violated company policy (1) against speaking disparagingly about customers and (2) casting the restaurant in a negative light on social networks

Page 21: Social networking presentation: eTools Risks and Liabilities

Some Posts When the Story Broke:• “FREEDOM OF SPEECH!! IT’S THE

FIRST FREAKING AMENDMENT!”• “Satan worshippers run this place”• “Your restaurant sucks. Your employee

stayed an hour late to wait on some ignorant table who should have known the place was closing down. The fact that you invaded her privacy by firing her because of her facebook status is reprehensible. I will never eat at your restaurant and I will tell everyone I know to do the same.”

Page 22: Social networking presentation: eTools Risks and Liabilities

General Rule (employment at will)

• Employers can make unfair, stupid, arbitrary, and wrongheaded hiring and termination decisions

UNLESS

• The decision is based on an illegal consideration

Page 23: Social networking presentation: eTools Risks and Liabilities

Legal Framework: Discrimination

• Title VII – Race, color, religion, sex, or national

origin• ADA

– Disability (actual or perceived) • ADEA

– Age• ME law

– All of the above, plus sexual orientation (very broadly defined)

– Applies to ALL employers

Page 24: Social networking presentation: eTools Risks and Liabilities

Legal Framework: Whistleblower / retaliation

• Retaliation prohibited by most discrimination laws.

• Whistleblower protection found in many federal laws (e.g. OSH Act, False Claims Act).

• State Whistleblower Protection Acts

Page 25: Social networking presentation: eTools Risks and Liabilities

Legal Framework: Maine WPA

• Cannot discharge, threaten, or discriminate against employee who:

– In good faith– Reports to the employer an alleged

violation of the law / condition or practice that threatens health or safety

– Participates in an investigation, hearing or inquiry conducted by any governmental entity or court or

– Refuses to execute a directive that violates the law

Page 26: Social networking presentation: eTools Risks and Liabilities

Legal Framework: National Labor Relations Act

“Employees shall have the right to self-organization . . .and to engage in other concerted activities for the purpose of collective bargaining or other mutual aid or protection.”

29 U.S.C. section 157 (“NLRA”)

Page 27: Social networking presentation: eTools Risks and Liabilities

Protected Concerted Activity• Concerted - individual employee action if

employee has intent of initiating group action.

• Protected –some communication not protected, e.g.

Unlawful, violent, vulgar, profane tactics OR disloyal, disruptive of business

Page 28: Social networking presentation: eTools Risks and Liabilities

First Amendment• Does it apply to private

employers?

Page 29: Social networking presentation: eTools Risks and Liabilities

Employee’s Defamatory Speech• Under NLRA, employee protected

even for false or inaccurate allegations unless “deliberately or maliciously false” or made with “reckless disregard of the truth”

• So, may not be able to disciplineemployee for false speech if “protected concerted activity”

Page 30: Social networking presentation: eTools Risks and Liabilities

Monitoring E-mails or Social Networking Sites• Under NLRA, employer surveillance or

impression of surveillance is unlawful

• Do not enforce monitoring policy that results in surveillance or gives impression that monitoring is being used to keep tabs on concerted activity

Page 31: Social networking presentation: eTools Risks and Liabilities

NLRB’s Register Guard Decision

• Held: Employers may maintain a blanket policy prohibiting the use of their electronic communications systems for all non-job-related solicitations even if it allows some personal use of the system as long as the policy is not discriminatorily applied to unions.

Page 32: Social networking presentation: eTools Risks and Liabilities

Register Guard cont.

E-mail Solicitations• E-mails from union president urging

employees to wear green in support of local union and participate in union’s entry in local parade

• Employer consistently prohibited all non-job-related solicitations, so prohibition of these union-related solicitations was okay

Page 33: Social networking presentation: eTools Risks and Liabilities

Register Guard cont.

Personal E-mails• Union president had also sent an e-mail

clarifying certain facts surrounding a previous union rally – did not request any action be taken – “personal e-mail”

• Since employer had history of allowing personal e-mails, it could not prohibit this “personal e-mail” from union president about union matters

Page 34: Social networking presentation: eTools Risks and Liabilities

Legal Framework: Invasion of Privacy

“One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.”

Restatement (Second) of Torts section 652B

Page 35: Social networking presentation: eTools Risks and Liabilities

Intrusion on Seclusion

• Does not require publication• Intrusion upon something secret or

private• No liability if no expectation of privacy,

but social networking sites may be private depending on user settings

• Method of obtaining info must be offensive (e.g. eavesdropping, use of pretext, fake identity)

Page 36: Social networking presentation: eTools Risks and Liabilities

City of Ontario v. Quon

• Supreme Court to consider whether police officer had expectation of privacy in personal text messages on government pager - City of Ontario v. Quon

• Government had policy prohibiting personal use of pagers and for monitoring usage

• Ninth Circuit found the employee had an expectation of privacy because the city had an informal policy of not auditing text messages as long the employee paid any overages on the cost of the messages

Page 37: Social networking presentation: eTools Risks and Liabilities

Defamation

Elements:• False and defamatory statement

concerning another

• Published to a third party

• Fault amounting at least to negligence (unless privileged)

• Special harm (unless defamatory“per se” – e.g. relating to profession)

Page 38: Social networking presentation: eTools Risks and Liabilities

Defamation cont’d

Defenses:• Truth

• Opinion – Unless opinion suggests fact

• Privilege– Absolute (e.g. statements made in court)– Qualified (e.g. intra-corporate communications)

• Lost if know statement is false / reckless disregard of truth or if act out of ill will

Page 39: Social networking presentation: eTools Risks and Liabilities

Invasion of Privacy -Public Disclosure of Private Facts

• Publication of private matters

• In a manner highly offensive to a reasonable person

• Not of public concern

Page 40: Social networking presentation: eTools Risks and Liabilities

Invasion of Privacy –“False Light”• Places another “before the public” in a

false light – “Made public, by communicating to public

at large or to so many persons that . . . certain to become public knowledge”

• False light is highly offensive to a reasonable person

• The actor had knowledge of or acted in reckless disregard as to falsity

Page 41: Social networking presentation: eTools Risks and Liabilities

Legal Framework: Fair Credit Reporting Act

Must comply with FCRA when use a “Consumer Reporting Agency” to perform a background check

FCRA requires advance notice and consent as well as notices if adverse action is taken based on what is learned

May want to obtain consent from all applicants as part of the hire process even if not planning to do a background check

Page 42: Social networking presentation: eTools Risks and Liabilities

FCRA cont.

Do you have to comply with FCRA if the employer performs a search of state criminal database or other public records?

What about if the employer searches face book or other networking sites?

Page 43: Social networking presentation: eTools Risks and Liabilities

Legal Framework: Stored Communications Act

It is a violation to “intentionally access without authorization a facility through which an electronic communication service is provided”There is an exception for conduct that is authorized “by a user of that service with respect to a communication intended for that user”There is another exception if you qualify as a “system provider” and monitor in the ordinary course of business

Page 44: Social networking presentation: eTools Risks and Liabilities

Pietrylo v. Hillstone Restaurant Group, Inc.

• Employee created a group on MySpace called “Spec-Tator”

• Purpose of the group was to “vent about any BS we deal with at work without any outside eyes spying in on us. This group is entirely private, and can only be joined by invitation”

• Karen, a greeter at the restaurant, was invited to join the group.

• Karen accepted and became an authorized member of the group

Page 45: Social networking presentation: eTools Risks and Liabilities

Pietrylo - Management Access

• While dining at her manager’s home, Karen accessed the group through her MySpace profile on her manager’s computer and showed the group to the manager

• Karen then gave her password to other members of management

• She said she gave out her password because she thought she “would have gotten in some sort of trouble” if she had refused

Page 46: Social networking presentation: eTools Risks and Liabilities

Pietrylo - Termination of Employment

• The posts included:– Sexual remarks about management and

customers– Jokes about some of the customer

specifications established by the restaurant

– References to violence and illegal drug use

• The restaurant terminated the employment of the two creators of the group

Page 47: Social networking presentation: eTools Risks and Liabilities

Pietrylo - Employee Claims

• The employees sued, bringing claims under the federal (and state) Wiretap Act, federal (and state) Stored Communications Act, wrongful termination in violation of public policy, and invasion of privacy

• Termination in violation of public policy (based on free speech) – dismissed before trial because the “speech” did not involve an issue of public concern

Page 48: Social networking presentation: eTools Risks and Liabilities

Pietrylo - Jury Verdict

• Stored Communications Act – issue whether or not Karen authorized the access by management

• Jury found in favor of employees—that Karen provided the password under pressure and thus was not authorized

• $3400 in lost pay• Punitive – stipulated to 4 times

compensatory damages• Attorneys’ fees - $120,000

Page 49: Social networking presentation: eTools Risks and Liabilities

Pietrylo - Jury Verdict

• Invasion of privacy and termination in violation of public policy (based on invasion of privacy) – jury found in favor of employer

Page 50: Social networking presentation: eTools Risks and Liabilities

Van Alsyne v. Electronic Scriptorium, Ltd.

• Employer accessed employee’s personal AOL account on at least 258 different occasions

• Not clear what policies the employer had in place

• Did not appear to be any business reason to access the account

• Employee used AOL account on occasion for business purpose

• Jury verdict in favor of employee

Page 51: Social networking presentation: eTools Risks and Liabilities

Pure Power Boot Camp v. Warrier Fitness Boot Camp

• Former employer accessed personal e-mail of former employee directly from the third party provider (Hotmail, Gmail)

• The user name and password information was stored on the company computer (when the Hotmail website was accessed, the user name and password fields were automatically populated)

• Also accessed a Gmail account because the information was stored in the Hotmail account

Page 52: Social networking presentation: eTools Risks and Liabilities

Pure Power Boot Camp (cont)

Company policy was limited to the Company’s system:

“e-mail users have no right of personal privacy in any matter stored in, created on . . . or sent through on or over this system. This includes the use of personal e-mail accounts on Company equipment . . .”

Page 53: Social networking presentation: eTools Risks and Liabilities

Pure Power Boot Camp (cont)

Court found there was no authorization by the employee to view the e-mails:

This is not a situation in which an employer is attempting to use e-mails obtained from the employer’s own computers or systems. Rather, the e-mails at issue here were stored and accessed directly form the accounts maintained by outside electronic communication service providers.

Page 54: Social networking presentation: eTools Risks and Liabilities

Genetic Information Nondiscrimination Act

• Cannot request or disclose “genetic information” and

• Any information obtain must keep the information confidential (and in separate file)

• Genetic information is defined broadly to include not only information about a person’s genetic tests, but any manifestation of a disease or disorder in a family member of the person (up to and including fourth-degree relatives).

• Thus, information about an employee’s family medical history would constitute protected genetic information under GINA.

Page 55: Social networking presentation: eTools Risks and Liabilities

Off-duty Conduct Statues

• Maine law protects tobacco use• Other states protect lawful recreational

conduct

Page 56: Social networking presentation: eTools Risks and Liabilities

Case Study 1:Allison Applicant

• She seems qualified

• Interview went well

• Wonder what’s “out there”

Page 57: Social networking presentation: eTools Risks and Liabilities
Page 58: Social networking presentation: eTools Risks and Liabilities

Case Study 2:Connor Complainer

• Overhear employees talking in the break room about Connor’s blog;

• Connor often the type to stir up trouble;

• Wonder what he’s saying about you and/or the company?

Page 59: Social networking presentation: eTools Risks and Liabilities
Page 60: Social networking presentation: eTools Risks and Liabilities

Case Study 3Damian Disgruntled

• Co-workers are complaining that Damian has been “off” lately;

• Damian shared with an HR rep that he might need stress-related leave of absence

Page 61: Social networking presentation: eTools Risks and Liabilities

Best Practices – Applicant Screening

• Adopt a screening policy: screen everybody, nobody, or something in between?

• Be clear about why you are looking: business-related or curiosity?

• If using as a screening tool, consider using non-decision-maker

• Document each search and what you are basing your decision on

• Be prepared to learn things you wish you didn’t know (and prepared to react or ignore as required by law).

Page 62: Social networking presentation: eTools Risks and Liabilities

Best practices – Applicant Screening / Employee Monitoring

• Never use fake identities to gain access to online profiles.

• Remember that information on the internet may not be factual or reliable.

• Obtain employee / applicant consent.• Make sure you do not go beyond the

consent.

Page 63: Social networking presentation: eTools Risks and Liabilities

Policy Considerations

1. Determine Company view of social media

2. Review other policies and procedures in place (use of computer systems, intellectual property etc.) for consistency

3. Personal v. business use and off-duty conduct

Page 64: Social networking presentation: eTools Risks and Liabilities

Policies Limiting Employees’Personal Use

4. If personal use is permitted, give examples and be specific

– May prohibit harassing / discriminatory content;

– May prohibit employees from attributing views to employer;

– May prohibit disclosure of confidential or proprietary information;

– May prohibit employees from posting false statements of fact about employer / co-workers.

Page 65: Social networking presentation: eTools Risks and Liabilities

Policy Considerations

5. Privacy issues6. Identity as company employees,

company logo