SlideShare a Scribd company logo
1 of 20
Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010
Overview What I’ll discuss Monitoring business systems for misconduct Employee publication and “off duty” conduct Related issues others will discuss Corporate policy – Burns Enforcement and non-employees – Kratz/O’Keefe
Monitoring business systems Why? To engage in maintenance, repair and management To meet a legal requirement to produce To ensure continuity of business practice To improve business processes To maintain internal control (including preventing misconduct and ensuring legal compliance)
Monitoring business systems How businesses maintain internal control Conduct routine audits* Investigate suspicions of misconduct* Respond to what they find Keep a good record of the same
Monitoring business systems The traditional law Notification does count The employer owns the medium and has lots of good reasons to look E-mail communication is too insecure to expect privacy No balancing of interests at all
Monitoring business systems Challenge #1 – Decision-maker value shift LethbridgeCommunity College (2007) MS Hotmail e-mails retrieved through forensic analysis First case to impose a reasonable grounds requirement for investigation Value shift may also be gleaned from Cole and Tfaily (two very recent and hot Ontario cases)
Monitoring business systems Challenge #2 – Supervisor value shift Quontext message case heard by SCOTUS in April 2010 Will your supervisors enforce policies they deem to be intrusive?
Monitoring business systems Change #3 – Privacy legislation Imposes an “objective reasonableness” requirement At play in UBC spyware case But, notably, Johnson case suggests PIPEDA does not apply to “personal” e-mails
Monitoring business systems Option #1 – Try harder to control expectation Personal use does not come with privacy! Routine acknowledgements Audit and communicate audit results to employees
Monitoring business systems Option #2 – Go with a purpose-based policy List purposes and stick with purposes Give the same expectation of privacy warning re personal use Set a evidence-based standard for investigation Set a protocol or procedure for audits
Publication and “off duty” conduct Bob and Sue had a long day. They go to the Dirty Dog Pub after work and, over the course of four hours, take jabs at their supervisor, Phil.
Publication and “off duty” conduct Jack had a long day. He goes home, cracks open a beer, and boots up his home computer.  Using a picture of his supervisor taken from the company intranet and some internet based software, he alters the picture so the manager looks ridiculous.  Jack posts it to his Facebook page. He feels good.
Publication and “off duty” conduct Nexus commonly derived from Impact on other employees rights Impact on job responsibilities Impact on reputation
Publication and “off duty” conduct Duty of fidelity applies when employee expression  is likely to significantly affect a legitimate employer interest All other activity is “private”
Publication and “off duty” conduct Subject to a narrow whistleblower exception Serious and imminent threat to health and safety Illegality
Publication and “off duty” conduct Measuring gravity of offence Job responsibilities Nature and content of expression Visibility of expression Sensitivity of issue Truth of statements Steps taken to determine facts before speaking
Publication and “off duty” conduct Measuring gravity of offence Efforts made to raise matters internally Extent of reputational damage Impact on employer’s ability to conduct business
Publication and “off duty” conduct Review of and non-culpable employee expression Duty to maintain a violence free workplace Bill 168 promotes threat assessment based on fulsome information about threats Assess all relevant and available information, including information published online Takes steps to manage reasonably perceived threats based on sound assessment practice
Dan Michaluk daniel-michaluk@hicksmorley.com http://danmichaluk.wordpress.com http://twitter.com/danmichaluk http://ca.linkedin.com/in/danmichaluk
Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010

More Related Content

What's hot

Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Rob Levey
 
Osgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesOsgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesDan Michaluk
 
Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette caseMichael Perez
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the WorkplaceAllisha Anderson
 
Social Media In the Workplace
Social Media In the WorkplaceSocial Media In the Workplace
Social Media In the WorkplaceRosenthalLurie
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesThomas Benjamin Huggett
 
Employee issues and privacy
Employee issues and privacyEmployee issues and privacy
Employee issues and privacyDan Michaluk
 
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"Employers Association of New Jersey
 
The New Normal
The New NormalThe New Normal
The New Normalwychepa
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2Damo Ward
 
Sapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmSapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmEddie Cogan
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and LitigationDan Michaluk
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2Dan Michaluk
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Jason Haislmaier
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 

What's hot (20)

Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Osgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesOsgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slides
 
Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette case
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the Workplace
 
Social Media In the Workplace
Social Media In the WorkplaceSocial Media In the Workplace
Social Media In the Workplace
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer Responses
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Employee issues and privacy
Employee issues and privacyEmployee issues and privacy
Employee issues and privacy
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
 
The New Normal
The New NormalThe New Normal
The New Normal
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2
 
Sapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmSapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory Paradigm
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and Litigation
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 

Viewers also liked

Social Media Powerpoint Final
Social Media Powerpoint   FinalSocial Media Powerpoint   Final
Social Media Powerpoint FinalDommermuth
 
Social Media Employee Policies
Social Media Employee PoliciesSocial Media Employee Policies
Social Media Employee PoliciesAnvil Media, Inc.
 
Indonesia digital landscape groupon indonesia
Indonesia digital landscape   groupon indonesia Indonesia digital landscape   groupon indonesia
Indonesia digital landscape groupon indonesia startupbisnis
 
Teradata Social Media Guidelines
Teradata Social Media GuidelinesTeradata Social Media Guidelines
Teradata Social Media GuidelinesTeradata
 
Visual Brand Guidelines to Manage Social Media Accounts
Visual Brand Guidelines to Manage Social Media AccountsVisual Brand Guidelines to Manage Social Media Accounts
Visual Brand Guidelines to Manage Social Media AccountsOrigzo
 
Manajemen Media Sosial untuk Instansi Pemerintah
Manajemen Media Sosial untuk Instansi PemerintahManajemen Media Sosial untuk Instansi Pemerintah
Manajemen Media Sosial untuk Instansi PemerintahCatur PW
 

Viewers also liked (6)

Social Media Powerpoint Final
Social Media Powerpoint   FinalSocial Media Powerpoint   Final
Social Media Powerpoint Final
 
Social Media Employee Policies
Social Media Employee PoliciesSocial Media Employee Policies
Social Media Employee Policies
 
Indonesia digital landscape groupon indonesia
Indonesia digital landscape   groupon indonesia Indonesia digital landscape   groupon indonesia
Indonesia digital landscape groupon indonesia
 
Teradata Social Media Guidelines
Teradata Social Media GuidelinesTeradata Social Media Guidelines
Teradata Social Media Guidelines
 
Visual Brand Guidelines to Manage Social Media Accounts
Visual Brand Guidelines to Manage Social Media AccountsVisual Brand Guidelines to Manage Social Media Accounts
Visual Brand Guidelines to Manage Social Media Accounts
 
Manajemen Media Sosial untuk Instansi Pemerintah
Manajemen Media Sosial untuk Instansi PemerintahManajemen Media Sosial untuk Instansi Pemerintah
Manajemen Media Sosial untuk Instansi Pemerintah
 

Similar to Social Media and Employee Privacy

Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsAmy Shriner
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Dave Shannon
 
Developing your social media policies amcto presentation
Developing your social media policies amcto presentationDeveloping your social media policies amcto presentation
Developing your social media policies amcto presentationDan Michaluk
 
Workplace privacy here and now
Workplace privacy here and nowWorkplace privacy here and now
Workplace privacy here and nowDan Michaluk
 
Hbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individualsHbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individualsLeslielibantosaligumba
 
Social media background checks policy development
Social media background checks policy developmentSocial media background checks policy development
Social media background checks policy developmentMike McCarty
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringDan Michaluk
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Morgan
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring processDan Michaluk
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and techwtidwell
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...Kelly Hart & Hallman LLP
 
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdfA Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdfLisa Bell
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and BeyondAlexNemiroff
 
ethics and justice in HRM
ethics and justice in HRMethics and justice in HRM
ethics and justice in HRMmaddy16692
 
Internal Investigations Workshop for HR Practitioners
Internal Investigations Workshop for HR PractitionersInternal Investigations Workshop for HR Practitioners
Internal Investigations Workshop for HR PractitionersPaul Falcone
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
Business law & ethics project
Business law & ethics projectBusiness law & ethics project
Business law & ethics projectMAITRIPATEL92
 

Similar to Social Media and Employee Privacy (20)

Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Developing your social media policies amcto presentation
Developing your social media policies amcto presentationDeveloping your social media policies amcto presentation
Developing your social media policies amcto presentation
 
Workplace privacy here and now
Workplace privacy here and nowWorkplace privacy here and now
Workplace privacy here and now
 
Hbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individualsHbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individuals
 
Social media background checks policy development
Social media background checks policy developmentSocial media background checks policy development
Social media background checks policy development
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring process
 
Case study 7
Case study 7Case study 7
Case study 7
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 
Digital Literacy Fundamentals Part 2.pptx
Digital Literacy Fundamentals Part 2.pptxDigital Literacy Fundamentals Part 2.pptx
Digital Literacy Fundamentals Part 2.pptx
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdfA Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdf
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
ethics and justice in HRM
ethics and justice in HRMethics and justice in HRM
ethics and justice in HRM
 
Internal Investigations Workshop for HR Practitioners
Internal Investigations Workshop for HR PractitionersInternal Investigations Workshop for HR Practitioners
Internal Investigations Workshop for HR Practitioners
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Business law & ethics project
Business law & ethics projectBusiness law & ethics project
Business law & ethics project
 

More from Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationDan Michaluk
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacyDan Michaluk
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public bodyDan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 

More from Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Recently uploaded

Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 

Recently uploaded (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 

Social Media and Employee Privacy

  • 1. Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010
  • 2. Overview What I’ll discuss Monitoring business systems for misconduct Employee publication and “off duty” conduct Related issues others will discuss Corporate policy – Burns Enforcement and non-employees – Kratz/O’Keefe
  • 3. Monitoring business systems Why? To engage in maintenance, repair and management To meet a legal requirement to produce To ensure continuity of business practice To improve business processes To maintain internal control (including preventing misconduct and ensuring legal compliance)
  • 4. Monitoring business systems How businesses maintain internal control Conduct routine audits* Investigate suspicions of misconduct* Respond to what they find Keep a good record of the same
  • 5. Monitoring business systems The traditional law Notification does count The employer owns the medium and has lots of good reasons to look E-mail communication is too insecure to expect privacy No balancing of interests at all
  • 6. Monitoring business systems Challenge #1 – Decision-maker value shift LethbridgeCommunity College (2007) MS Hotmail e-mails retrieved through forensic analysis First case to impose a reasonable grounds requirement for investigation Value shift may also be gleaned from Cole and Tfaily (two very recent and hot Ontario cases)
  • 7. Monitoring business systems Challenge #2 – Supervisor value shift Quontext message case heard by SCOTUS in April 2010 Will your supervisors enforce policies they deem to be intrusive?
  • 8. Monitoring business systems Change #3 – Privacy legislation Imposes an “objective reasonableness” requirement At play in UBC spyware case But, notably, Johnson case suggests PIPEDA does not apply to “personal” e-mails
  • 9. Monitoring business systems Option #1 – Try harder to control expectation Personal use does not come with privacy! Routine acknowledgements Audit and communicate audit results to employees
  • 10. Monitoring business systems Option #2 – Go with a purpose-based policy List purposes and stick with purposes Give the same expectation of privacy warning re personal use Set a evidence-based standard for investigation Set a protocol or procedure for audits
  • 11. Publication and “off duty” conduct Bob and Sue had a long day. They go to the Dirty Dog Pub after work and, over the course of four hours, take jabs at their supervisor, Phil.
  • 12. Publication and “off duty” conduct Jack had a long day. He goes home, cracks open a beer, and boots up his home computer. Using a picture of his supervisor taken from the company intranet and some internet based software, he alters the picture so the manager looks ridiculous. Jack posts it to his Facebook page. He feels good.
  • 13. Publication and “off duty” conduct Nexus commonly derived from Impact on other employees rights Impact on job responsibilities Impact on reputation
  • 14. Publication and “off duty” conduct Duty of fidelity applies when employee expression is likely to significantly affect a legitimate employer interest All other activity is “private”
  • 15. Publication and “off duty” conduct Subject to a narrow whistleblower exception Serious and imminent threat to health and safety Illegality
  • 16. Publication and “off duty” conduct Measuring gravity of offence Job responsibilities Nature and content of expression Visibility of expression Sensitivity of issue Truth of statements Steps taken to determine facts before speaking
  • 17. Publication and “off duty” conduct Measuring gravity of offence Efforts made to raise matters internally Extent of reputational damage Impact on employer’s ability to conduct business
  • 18. Publication and “off duty” conduct Review of and non-culpable employee expression Duty to maintain a violence free workplace Bill 168 promotes threat assessment based on fulsome information about threats Assess all relevant and available information, including information published online Takes steps to manage reasonably perceived threats based on sound assessment practice
  • 19. Dan Michaluk daniel-michaluk@hicksmorley.com http://danmichaluk.wordpress.com http://twitter.com/danmichaluk http://ca.linkedin.com/in/danmichaluk
  • 20. Social Media Risks & Rewards - Employee Privacy v. Employer Monitoring Dan Michaluk May 11, 2010

Editor's Notes

  1. Employment lawyer with strong focus on information and management and privacy law issuesTwo issues in which privacy law touches on use of social media by employeesMonitoring law… tied very loosely to social media use… but time theft issue is important and topic is timely… cautionary message to employers… law is in fluxDiscipline law… when can employer sanction employees for publishing things online? cautionary message to employees… more than you thinkNot going to talk about other aspects of managing employee use of social mediaBuilt in time for questions so ask away
  2. Let’s start with the basicsOur privacy law is based strongly on proportionality and balancing…The challenge is for management to deal with a claimed privacy interestBut what interests is management protecting?Employers have an unquestionable legitimate interest in looking at the information flowing through their systemsHere are the most common purposes[Briefly explain one to four. Turn over slide for five.]
  3. Internal control is importantLet’s look at context – era of accountability… both public and private sector -post Enron-post Westray -post Gomrey -post Bill 168 (expanded regulation of interaction between people)Quote from National Post last week. .. “The role of investigative journalism has expanded over the years to help fill what has been described as a democratic deficit in the transparency and accountability of our public institutions.”Looking at communications is a key means of maintaining internal control – 90% of communication is electronic… picture of all activity within your businessTwo kinds of looking -audits (risk based, proactive) -investigations (targeted, reactive)Take corrective action based on what’s found -change in process or technology -change in people – terminations or lesser sanctionsAnd keep a record of diligenceSimple right? And then comes personal privacy.
  4. Traditional law has been very permissiveRemember our purposesThose are usually reinforced by an acceptable use or computer use policy that says in one paragraph “YOU HAVE NO EXPECTATION OF PRIVACY”Some employers use annual acknowledgements… some use login dialog boxesBeen effective…Most law is in unionized workplaces… arbitrators have said, “I’m not even balancing interests here. An employer can look for lots of reasons it’s not reasonable for an employee to make any privacy claim.”Lakehead University case in 2009 re Google Apps outsourcing – e-mail is no more secure than a postcard
  5. Watch out for shifting valuesPremised on change in permissibility of personal useTen years ago employees worked at work and went home and watched TVPolicies said “no personal use”Now employees work at work and work at home on the same devicePolicies now say “reasonable personal use”When employees are banking on your computers is it reasonable to capture their keystrokes?When employees are sending legitimate personal communications to loved ones about medical conditions… is it legitimate review their communications?Identify Lethbridge, Cole and Tfaily as showing that decision makers are struggling
  6. Even if your decision-makers are okay, managers can interfere with policy enforcementIn Quon a supervisor said something like, “If you pay the overages we won’t look.”If supervisors or others in authority think that your monitoring policy is not reasonable they may undermine it
  7. That was about the reasoning applied by arbitrators and courtsIn Canada we have employee privacy legislation in three provinces and for federal worksIf it applies, there is a regulatory requirement to balance interestsCollection of personal information must be reasonably necessary to meet a legitimate purposeCall this an “objective reasonableness requirement”At play in UBC spyware case of 2007 – all you needed to do to investigate time theft was look at traffic logs… you didn’t need to install spyware to capture screen imagesWrinkle from Johnson under PIPEDA… about access to personal e-mails sent about an employee… said personal e-mails are not regulated by PIPEDA because they are not sufficiently related to the commercial enterprise… like “bycatch”Perverse (though possibly correct) ruling… saying employers have very limited domain over employee e-mails, but in doing so rules out protection of privacy legislation
  8. So what do employers do?Put an express condition on personal useUse routine acknowledgementsCommunicate audit results… use a newsletter… prove to employees you are lookingOne sided solution… focuses on employer right… doesn’t control to protect employee privacy
  9. You create policy to address the privacy interestEspecially appropriate where regulatedList the purposes from my earlier slideWarn them still… give good notice stillSet an evidence-based standard for investigationTell them how you will go about auditsExamples-internal audit staff conduct an investigation at direction of VP-VP directs audits based on a bona fide security risk-should line manager need to find work product, e-mails will be pulled by internal audit where possibleThese will kill your no expectation argument but should still enable everything you need to do at a lower risk
  10. Let’s move on to a different privacy issue – an employee’s right to live a private existence without employment-related consequenceSupported by Joseph Cohen-Lyons paper in materialsHere’s a scenarioNot so oddAnyone think this interferes with an employer’s interest?Nah. It’s blowing off steam. It’s “private” off duty conduct. Outside the workplace – no physical nexus. No intangible nexus to legitimate interests.
  11. This is (sadly) what happens today.Same question. Is it private?Would it make a difference if Jack has only ten friends? What if none of them are employees?Happens all the time. This is how people blow off steam now. There’s a perception that this is somehow analogous to a barroom chat with a close friend.But let’s look at the difference. It’s clearly a publication. Often to other employees. Even if not there’s no legal or practical restriction on what recipients can do with the communication. Jack’s picture of his supervisor can be copied and mailed around.So there’s a good argument that this is about as public as it gets. Consistent with a traditional privacy law principle – a disclosure to one is a disclosure to all.
  12. Now Jack’s supervisor has a beef. But why can an employer discipline that conduct.Well, there’s a nexus back to employment interests isn’t there? -impact on other employee’s rights -right to work in a safe and harassment free work environment -reasonably likely to interfere with that right-employer’s burden but…-… decision-maker may presume harm (arguable issue) -evidence of actual harm helps (give example)-Nexus is commonly derived from these three things-no case law, but these are in order of moral weight-we’re balancing again here-example tough case – employee a professional adviser… goes out and does a beer mile… better have a pretty good case for reputational harm
  13. This is an issue of loyalty and fidelity, which is implicit in every employment relationshipDon’t need special status… not like a fiduciaryThis is my expression of the test that defines the scope of the dutyVery, very contextual casesNo black and whiteThere will be some easy cases, but many are hard to predictExample… student speech cases out of U.S. Third Circuit (in materials)Many employment cases will settle
  14. There is developed case lawBased in public sector but theory applies to private sector employmentRecognizes a whistleblower exception to the duty of fidelityIdentify cases - Fraser of SCC 1985, Haydon of FC 2005, Read of FC 2005Employers protect themselves by having internal systems to receive reports of wrongdoingAn employee may have a duty to report internally firstEndorsed in Read and by our Supreme Court of Canada in a case called Merk – 2004Thrown somewhat into question by our broadly worded Criminal Code anti-reprisal provision – section 425.1But only provides immunity from reporting to law enforcement, not blogging, not passing things to the media, not passing things to a bloggerOf course, whistleblowing unusually means point to the pressCase from Supreme Court of Canada last week that says a court will assess whether it will honour a journalist’s promise of confidentiality on a case-by-case basisNo reason why a whistleblower couldn’t tweet it to the world anonymously… will be investigations…
  15. In assessing any case there is two questionsIs there a nexus?How culpable is it?Here is a list of factors. Speak for themselves.
  16. And here are some more.
  17. This is a different issue, but it relates to privacy and social media use by employees.Employers have a duty to maintain a violence free workplace. Done through something called threat assessment. For an assessment to be proper it must be based on all relevant and available information.Remember Virginia Tech. Representative of common problem. Not having a complete picture. Same as Columbine. In Columbine two shooters had posted a number of violent writings online.Information on social media sites is probative. Employer’s shouldn’t discount it in conducting threat assessments.Exceptions in privacy legislation allow for this, but each piece of legislation is slightly different.