Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />1<br />Business     Real Estate     Land Use     Commercial...
<ul><li>Areas of Practice:
Employment
Labor
Information Privacy/Information Access
School Law
Unemployment Compensation, and
Healthcare
Attorney, admitted in Pennsylvania, New York and U.S. Supreme Court
Labor and management representation
From outsourcing HR work, to trainer, to litigation
Work Website: http://www.flblaw.com/attorney_directory/deirdre_kamber.asp
LinkedIn: http://www.linkedin.com/in/deirdrejkamber</li></ul>DEIRDRE KAMBER, ESQ., CHP<br />Copyright 2010 (c) Deirdre J. ...
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />3<br />
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />4<br />SOCIAL MEDIA, NETWORKING, DATA AGGREGATION, ANDCLOUD...
Businesses are responsible for creating policies, procedures and programs to address employee use.
We are responsible for the impact of social media from our client base.
We are using cloud computing for data storage, and we are responsible for how our electronic records are stored.
We need to be AHEAD of the curve.</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />5<br />...
Social media, networking and our clients
The impact of cloud computing
What does the caselaw say?
What do we need to do?</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />6<br />How he feel...
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />7<br /><ul><li>Where have we been?
Where are we now?
Social media is not a fad; it  is a multimillion dollar issue for  organizations. Look at Dirty Dominos, or United Airline...
It is more important, statistically, to have a virtual office than a real one.  </li></ul>WHERE ARE WE?<br />
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />8<br />News<br />Articles<br />News Reports<br />Photo<br /...
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />9<br />Ibibo * Adult FriendFinder * Advogato * Amie Street ...
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />10<br />WHAT IS SOCIAL NETWORKING<br /><ul><li>Blogs  --  “...
Photo Sharing – “Publishing of user’s digital photos online”
Video Sharing –  “Video uploading services allowing individuals to upload video clips to an Internet Hosting Website”
Tagging(or “Tag”) – “A non-hierarchical keyword”
Chat Rooms --  “Primarily used by mass media to describe any form of synchronous conferencing”
Message Boards --  “an online discussion site”</li></li></ul><li>WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre...
WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />12<br />
WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />13<br />
WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />14<br />http://radaris.com/p...
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />15<br /><ul><li>Data aggregation allows for ease of access ...
Upcoming SlideShare
Loading in …5
×

Social Networking and Cloud Computing

1,079 views

Published on

What is the role of social media and networking in the workplace? What can you do to protect yourself as an employer from improper usage? Do you have a strategy for using social media. This Power Point will explore all of these themes.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,079
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Social Networking and Cloud Computing

  1. 1. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />1<br />Business Real Estate Land Use Commercial Litigation Bankruptcy<br />Estate Planning & Taxation Healthcare Employment Family Law<br />TWITTER WHILE YOU WORK: THE LEGAL IMPACT OF SOCIAL MEDIA, SOCIAL NETWORKING AND CLOUD COMPUTING IN THE WORKPLACE<br />DEIRDRE J. KAMBER, ESQUIRE, CHP<br />DKamber@FLBLaw.com<br />610.797.9000 ext. 383<br />
  2. 2. <ul><li>Areas of Practice:
  3. 3. Employment
  4. 4. Labor
  5. 5. Information Privacy/Information Access
  6. 6. School Law
  7. 7. Unemployment Compensation, and
  8. 8. Healthcare
  9. 9. Attorney, admitted in Pennsylvania, New York and U.S. Supreme Court
  10. 10. Labor and management representation
  11. 11. From outsourcing HR work, to trainer, to litigation
  12. 12. Work Website: http://www.flblaw.com/attorney_directory/deirdre_kamber.asp
  13. 13. LinkedIn: http://www.linkedin.com/in/deirdrejkamber</li></ul>DEIRDRE KAMBER, ESQ., CHP<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />2<br />
  14. 14. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />3<br />
  15. 15. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />4<br />SOCIAL MEDIA, NETWORKING, DATA AGGREGATION, ANDCLOUD COMPUTING<br /><ul><li>The workforce faces challenges in technology unlike those we have ever experienced.
  16. 16. Businesses are responsible for creating policies, procedures and programs to address employee use.
  17. 17. We are responsible for the impact of social media from our client base.
  18. 18. We are using cloud computing for data storage, and we are responsible for how our electronic records are stored.
  19. 19. We need to be AHEAD of the curve.</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />5<br />OUR AGENDA FOR TODAY<br /><ul><li>Social media, networking and our employees
  20. 20. Social media, networking and our clients
  21. 21. The impact of cloud computing
  22. 22. What does the caselaw say?
  23. 23. What do we need to do?</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />6<br />How he feels about friending his BOSS:<br />“HELL NO!”<br />The average person’s most embarrassing snafu:<br />Incriminating photos<br />Discovered by a FAMILY member<br />Average number of “tweets” per second:<br />600<br />Number of people who consider themselves addicted to social media:<br />64%<br />Number of Facebook Friends Most People Have:<br />Between 100 <br />and 300<br />Number of people <br />He’d or she’d actually call on the telephone:<br />10 -20<br />Number of people creating unique content on the web:<br />85%<br />Percentage of people who have snooped using Facebook:<br />1 in 4<br />FAVORITE SITE:<br />FACEBOOK<br />Exerpted from “Women’s Health”, 9/2010<br />
  24. 24. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />7<br /><ul><li>Where have we been?
  25. 25. Where are we now?
  26. 26. Social media is not a fad; it is a multimillion dollar issue for organizations. Look at Dirty Dominos, or United Airlines; what did it cost?
  27. 27. It is more important, statistically, to have a virtual office than a real one. </li></ul>WHERE ARE WE?<br />
  28. 28. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />8<br />News<br />Articles<br />News Reports<br />Photo<br />Albums<br />Lunch<br />Breaks<br />Watch<br />News<br />Bulletin<br />Boards<br />Filing/ Labeling<br />Coffee<br />Breaks<br />
  29. 29. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />9<br />Ibibo * Adult FriendFinder * Advogato * Amie Street * ANobii * ASmallWorld * Athlinks * Avatars<br />Last.fm * United * Badoo * Bebo * Bigadda * Big Tent * Biip * Black Planet * Blogster * Broadcaster<br />Yelp, Inc. * Youmeo * Zoo.gr * Buzznet * Café Mom * Cake Financial * Care2 * Classmates.com * Cloob * College Tonight * Couch Surfing * Daily Booth * Daily Strength * Decayenne * Deviant Art * DisABoom * Dol2day * DontStayIn * Draugiem.lv * Elftown * Epernicus * Eons.com * Italki * Experience Project * Exploroo * Facebook * Faceparty * Faces.com * Fetlife * Filmaffinity * Fledgewing * Flixter * Flickr * Fotolog * Friends Reunited * Friendster * Fruhstuckstreff * Fubar * Gaia Online * GamerDNA * Gather.com * Gays.com * Geni.com * Gogyoko *Hi5 * Goodreads * Gossipreport.com * Grono.net * Habbo * Hospitality Club * Imeem * IRC-Galleria <br />InterNations * Itsmy * Iwiw * Jammer Direct * Kaioo<br />Kaixin001 * KIwibox * LibraryThing * LifeKnot<br />LinkedIn * Live Journal * Lunar Storm * MeetIn * Meetup.com * Mobikade * MocoSpace * Mouthshut * <br />Live Mocha * MOG * Mixi * Jaiku * Multiply * Muxlim * <br />MyAnimeList * My Church * My Heritage * My Life * <br />My LOL * My Opera * MySpace * My Yearbook * <br />Masza-klasa.pl * Netlog * Nettby * Nexopia * NGO Post * Ning * Odnoklassniki * OKCupid *<br />One Climate * One World TV * Open Diary * Orkut * OUT Everywhere * Partner Up * Plaxo *<br />Passportstamp * Pingsta * Playahead * Playboy U * Plurk * Present.lv * Qapacity * Quarter-<br />Life * Qzone * Ravelry * Renren * ResearchGate * Reverberation * Ryze * Scispace * Shelfari *<br />Skyrock * Social GO * Social Vibe * Sonico.com * Soundpedia * Stickam * StudiVZ * Super<br />Nova.com * Tagged.com * Talent Trove * Talkbiznow * Taltopedia * TraveBuddy.com * Travel –<br />Lertspoint.com * Tribe.net * Trombi.com * Tuenti.com * Tumblr * Twitter * V Kontakte * Vam-<br />Pirefreaks * Viadeo * Vox * Wakoopa * Wasabi * Wayn * WebBIographies * WeOurFamily *<br />Windows Live Spaces * Wiser Earth * Xanga * Xing * Xt2 * Yammer * Hyves * <br />WHAT IS SOCIAL NETWORKING?<br />
  30. 30. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />10<br />WHAT IS SOCIAL NETWORKING<br /><ul><li>Blogs -- “Entries of commentary on websites”
  31. 31. Photo Sharing – “Publishing of user’s digital photos online”
  32. 32. Video Sharing – “Video uploading services allowing individuals to upload video clips to an Internet Hosting Website”
  33. 33. Tagging(or “Tag”) – “A non-hierarchical keyword”
  34. 34. Chat Rooms -- “Primarily used by mass media to describe any form of synchronous conferencing”
  35. 35. Message Boards -- “an online discussion site”</li></li></ul><li>WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />11<br />
  36. 36. WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />12<br />
  37. 37. WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />13<br />
  38. 38. WHAT IS DATA AGGREGATION?<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />14<br />http://radaris.com/p/Deirdre/Kamber/ <br />
  39. 39. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />15<br /><ul><li>Data aggregation allows for ease of access to information.
  40. 40. Twine and Radaris, for example, are search engines that aggregate information.</li></ul>WHAT IS DATA AGGREGATION?<br />Employment Law<br />Hospitalization in 1999<br />Experienced Trainer<br />Lawyer<br />Vacation in Vegas<br />Center Valley<br />Grandfather with cancer<br />Brandeis University<br />Rugby<br />New York<br />June 9, 1972<br />HIPAA<br />SHRM<br />Mother<br />Awardee: Top Twenty Under Forty<br />Pennsylvania<br />Religious beliefs: Reform<br />Social Media and Networking Law<br />Politics: financial conservative<br />MENSA<br />Diversity<br />Single Parent<br />Adjunct Professor<br />Facebook<br />Fitzpatrick Lentz & Bubba<br />Master’s Degree<br />
  41. 41. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />16<br />WHAT IS CLOUD COMPUTING?<br /><ul><li>Computing in the cloud
  42. 42. Online access through a third party to your records, files, training programs, results and other outsourced functions.
  43. 43. Pros:
  44. 44. It’s not on your server or system
  45. 45. Saves space
  46. 46. Reduces employee access
  47. 47. Cons:
  48. 48. It’s not on your server or system
  49. 49. You now have a third party to deal with
  50. 50. You now have contracts to address and laws to consider (i.e. retention, breach)</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />17<br />EMPLOYEE ISSUES <br />AND <br />TECHNOLOGY<br />
  51. 51. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />18<br />EMPLOYEEISSUES WITH TECHNOLOGY<br /><ul><li>Expectations of Privacy
  52. 52. TMI
  53. 53. Online Business Relationships
  54. 54. 24-7 access to the Internet
  55. 55. Third Party Management (Cloud Computing)</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />19<br />EMPLOYEEISSUES WITH TECHNOLOGY<br /><ul><li>45% of employers use social networking sites such as Facebook, MySpace, or Twitter to research job candidates, according to a CareerBuilder.com survey. 
  56. 56. 35% of employers reported having refused to hire candidates based on content found on those sites. 
  57. 57. Even the Florida Board of Bar Examiners  suggested that bar applicants' web postings may reflect an “applicant's character and fitness not readily observable through the formal interview and application process.”</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />20<br />EMPLOYER MONITORING AND EXPECTATIONS OF PRIVACY<br /><ul><li>Employees should not expect privacy in their emails or Internet use at the office, or even at home where the workplace is implicated.
  58. 58. Employees should not have an expectation of privacy in Social Networking sites, such as Facebook.
  59. 59. For example,Social Sentrycan automaticallymonitoremployees’ Facebook and Twitter accounts. The cost is between $2 and $8 per employee. </li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />21<br />YOU DON’T WANT THE INFORMATION!!!!!<br /><ul><li>Employers need to be aware with the antidiscrimination laws, now including GINA and other proposed laws (such as GLBT), you want ONLY job-related information.
  60. 60. Research via the Web will give you TMI.
  61. 61. Even if you don’t know that it’s out there, if you have a policy that says you look up Facebook pages, if your employee’s Facebook page includes her breast cancer treatments, you are deemed to have that information.</li></ul>TMI<br />
  62. 62. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />22<br />ONLINE BUSINESS RELATIONSHIPS<br /><ul><li>Just as traditional friendships between boss and employee can be problematic, so too can online relationships.
  63. 63. Now, add in: inequal workplace relationships,“defriending,” “posts,” and a lack of control over Internet documents.
  64. 64. Clarify the relationship. You must be direct about the nature of your business relationship. </li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />23<br /><ul><li>Be social — to a degree.In most offices, there's usually somesocial mingling. The same goes for online friendships.
  65. 65. Don’t play favorites.Don’t favor certain employees in the workplace.
  66. 66. Keep topics off confidential information. No matter how close you are to pals in the office, you have to resist the temptation to give them the inside scoop.
  67. 67. Face the firing line.Sometimes an employee is not performing up to par. You must be this person’s employer first and friend second. </li></ul>ONLINE BUSINESS RELATIONSHIPS<br />
  68. 68. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />24<br />24-7 ACCESS TO THE INTERNET <br />BE ABLE TO USE YOUR <br />ACCEPT-“ABLE” USE POLICIES<br />
  69. 69. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />25<br /><ul><li>Some internet access is important -- You will lose productivity if you ban everything.
  70. 70. Consider what might be relevant for work -- Give your employees the tools that they need to maximize their talents.
  71. 71. Are You Working with IT?You should be working with your IT person to check allowing, blockingandmonitoring….what do you want to know about?
  72. 72. Is your ban effective? Does everyone have smart-phones? </li></ul>24-7 ACCESS TO THE INTERNET AND ACCEPTABLE USE POLICIES<br />
  73. 73. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />26<br />LITIGATION <br />ANDPITFALLS<br />
  74. 74. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />27<br />WHAT HAPPENS WHEN THERE’S A DISPUTE?<br /><ul><li>A lawsuit, which has been a huge trend upward for:
  75. 75. Defamation, false light, IIED, Stored Communications Act violations, etc.
  76. 76. An apology (like Dominos or American Airlines)
  77. 77. Or an “To H^&* with You” answer ….</li></li></ul><li>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />28<br /><ul><li>Is privacy dead?
  78. 78. NO. In Pietrylo v. Hlllstone Restaurant Group, d/b/a Houston's, management discovered that two waiters posted on their MySpace page sexual remarks about management and customers, jokes about the company and references to violence and illegal drug use. After viewing the site, management found the postings offensive and fired the waiters.  
  79. 79. Ironically, the company's efforts to avoidliability actually resulted in a jury verdict against it.</li></ul>LITIGATION<br />
  80. 80. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />29<br /><ul><li>The Court found: 
  81. 81. The offensive postings were located in a private chat room, access to which was restricted only to users who first received and accepted an electronic invitation;
  82. 82. Management had not received an invitation from the waiters, but rather usedanother employee's password(who had been invited) to access the chat room; and
  83. 83. There was a dispute as to permissive access. Although management argued it was "authorized" to access the chat room by the employee who provided her ID and password, that employee testified she felt she "probably would have gotten in trouble" if she did not cooperate.  </li></ul>LITIGATION<br />
  84. 84. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />30<br /><ul><li>Quon v. City of Ontario- the U.S. Supreme Court was faced with the question as to whether an employer can review work-phone text messages where the purpose is not to invade the employee’s privacy. Yes or no?
  85. 85. Morse v. Mer- exotic dancers advertised their personal talents on Facebook and challenged their employer’s determination that they were independent contractors under the FLSA. Were they?
  86. 86. TekSystems v. Hammernick- an employer sued its former employee for breach of restrictive covenants due to LinkedIn communications. Was it a breach?</li></ul>LITIGATION<br />
  87. 87. <ul><li>Petrovitch Development -- E-mails between a client and attorney are not considered  privileged and confidential, if the client writes the messages from a work e-mail account. (SO, if you intend to sue your employer, don’t discuss the suit with an attorney using company e-mai.)
  88. 88. Steingart v. Loving Care – N.J. Supreme Court said e-mails on a personal web-based e-mail account accessed from an employer’s computer were private. The decision was contingent on the fact that use of such an account was not clearly covered by the company’s policy, and the e-mails in question contained a standard warning that the communications were personal, confidential, attorney-client communications.</li></ul>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />31<br />LITIGATION<br />
  89. 89. <ul><li>Sousa v. American Medical -- The NLRB says the Company enforced an "overly broad blogging and Internet posting policy" and illegally denied Dawnmarie Souza, an investigatory interview. The company said it canned Souza "based on multiple, serious complaints about her behavior.“ According to the NLRB, Souza "posted a negative remark about a supervisor"after being threatened with disciplinary action when she requested union help. The case was settled.
  90. 90. Boulder Valley School District – BVSD searched several students’ cell phones after sexting was discovered. The ACLU stepped in, and the District agreed to revamp its access policy to student phones.</li></ul>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />32<br />LITIGATION<br />
  91. 91. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />33<br /><ul><li>The EEOC is now deciding the impact of incidental information under the GENETIC INFORMATION NON-DISCRIMINATION ACT (GINA) through social media.
  92. 92. There may be Fair Credit Reporting Actissues with internet investigations.
  93. 93. Most webposts are protected if they are anonymous as First Amendment speech.
  94. 94. Subpoenas can be effectuated, but are frequently fruitless.</li></ul>LITIGATION<br />
  95. 95. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />34<br />BEST <br />PRACTICES<br />
  96. 96. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />35<br /><ul><li>Virtual branding
  97. 97. Strategy
  98. 98. Proactivity
  99. 99. Policies
  100. 100. Communication
  101. 101. Practices
  102. 102. Training</li></ul>BESTPRACTICES:STRATEGIC APPROACH<br />
  103. 103. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />36<br /><ul><li>If you trust your information to third party vendors, you have less control over your data.
  104. 104. TMI can be used against you.
  105. 105. Coercion does NOT give consent
  106. 106. Be aware of unionizing/organizing language
  107. 107. Data breaches are a risk for any computer system. Problems are compounded with a third party. </li></ul>BESTPRACTICES:<br />BEWARE!<br />
  108. 108. BESTPRACTICES:<br />YOUR CHECKLIST<br /><ul><li>YOUR AUP IS PROBABLY ALREADY OUT OF DATE
  109. 109. Employees’ expectation of privacy changes with the amount of notice and authorization as to monitoring
  110. 110. Expectations should be balanced between employee and employer
  111. 111. Get yourself trained and make sure that someone is helping you out.
  112. 112. Security threats don't just occur in cyberspace. Protect the physical environment of stored data.
  113. 113. Don’t sign on for more than you are willing to ACTUALLY DO</li></ul>Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />37<br />
  114. 114. <ul><li>Have a clear understanding of vendors' procedures to safeguard data, seal leaks and prevent mishaps.
  115. 115. You need a clear sense of access, policy, procedure and chain of command in cases of breach.
  116. 116. You need to know which laws apply to you, and what happens in cases of breach.
  117. 117. You also may want levels of access to information. </li></ul>BEST<br />PRACTICES:<br />THIRD PARTIES<br />Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />38<br />
  118. 118. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved<br />39<br />Questions?<br />Comments?<br />Deirdre J. Kamber, Esq., CHP<br />DKamber@FLBlaw.com<br />Fitzpatrick Lentz & Bubba, P.C.<br />

×