SlideShare a Scribd company logo
1 of 41
In-House Counsel Masterclass
Navigating the Social Network

Thursday, 7 March 2013




                                1
Welcome

Emer Gilvarry
Managing Partner
Mason Hayes & Curran




                       2
Philip Nolan
Partner and Head of Commercial
Mason Hayes & Curran




                                 3
Overview

 The “Balancing Act”:
   → Risk v reward
   → Privacy v business interests

 Key Issues
   → Employee pre-screening
   → Optimising SM technology for business
   → Use and misuse

 Implementing a social media policy

 The Horizon
   → Industry trends
   → General Data Protection Regulation




                                             4
Opportunity v. Risk

 Business benefits of social media:

    → Access to information
    → Building contacts
    → Identifying potential leads
    → Engaging with consumers
    → Dealing with complaints
    → Advertising 2.0
    → Information on potential hires




                                       5
Opportunity v. Risk

 Social Media involves “opening up” the business and
  allowing free flow of knowledge. Creates risks:

    → Defamation
    → Confidentiality
    → Harassment
    → Misrepresentation of company position


 Business Challenge = Identify the benefits, measure the
  risks, and create a policy that best balances the two to
  create value




                                                             6
Business Interests v Privacy

 Exercising control over personnel

 Copland v UK (2008)
   → European Court of Human Rights
   → Employees have an expectation of privacy in
      communications from work equipment (Article 8 EHCR)
   → Employer violated this right by monitoring email, phone
      and internet usage

 Risks to company
   → Loss of time
   → Confidential Information
   → Damaging statements




                                                               7
Business Interests v Privacy

 How to resolve?

     → Employee Notice (key in Copland)
     → Proportionality

   Consent is helpful, but not decisive


Business Challenge = Adopt a proportionate approach to
monitoring, reflecting the risks




                                                         8
Key Issues

 Three typical areas where advice is usually required:

    → Can we use social media to screen employees?

    → Can we use social media to build the business?

    → How do we prevent social media misuse?

 Formulating SM policy = forming a view on these issues.

 Remember to seek internal advice




                                                            9
Issue 1: Employee Pre-Screening

 Question = Can we run background checks?

 Online presence → key indicator of suitability for the role

 Key legislation = Data Protection Acts 1988 and 2003

 Public Information: LinkedIn, Twitter etc…
   → Generally permissible (Section 2A)
   → Fair Processing Notice (Section 2D)
   → Separate issue = using the data

 Private Information: e.g. Facebook profile
   → Common in the US
   → Legislative response (at least 28 states)
   → e.g. California Social Media Privacy Act



                                                                10
Issue 1: Employee Pre-Screening

 Can it be done in Ireland?
    Not expressly forbidden, first principles
    Obtain candidate consent (Section 2A Data Protection
      Acts)
    Consent must be specific, freely given, and informed.

 Risks
    Disproportionate processing? (Section 2)
    Likely regulator hostility
    Breach of Contract
    PR / reputational risk




                                                             11
Issue 2: Business use of Social Media

 Question = Can employees use social media to build the
  business

 What social media use are we concerned about?
   → Not all social media created the same
   → LinkedIn vs. Instagram

 Different policies for different staff?
   → Marketing may require work access to Twitter
   → Sales staff could rely on LinkedIn to find leads

   Who is entitled to speak for the company on social media?
     → Marketing?
     → Executive Staff?
     → Internal pre-approvals through Legal?

 These decisions should be reflected in policy document

                                                                12
Issue 3: “Improper” Use of social media

Question = How do we prevent employees from abusing social
media

   What can we actually monitor and control?
     → “Philip Nolan visited Facebook.com”
     → Logs do not generally disclose what an employee said
       on a site.
     → Discuss this with IT

 Are we concerned about timewasting?
   → Limit personal use outside of set times (e.g. lunchtime)

 What issues should be we prohibit altogether?
   → References to business/clients
   → Critical references to fellow employees
   → Defamatory speech
   → Discussion of company operations?

                                                                13
Issue 3: “Improper” Use of Social Media

   Exercise care to ensure that any restrictions on employees
    discussing the company do not inadvertently prevent
    activities that may benefit the firm, e.g. employees
    promoting favourable news stories.




                                                                 14
Implementing the “Social Media Policy”

   Once position adopted on SM use; need to design rules.

   Avoid undue focus on the idea of a “social media policy;”
    what matters is having effective, understandable and
    proportionate rules. Could be contained in:
     → Contracts
     → An existing “acceptable use policy”
     → On an intranet
     → A dedicated social media policy
     → Information updates

   Consequences for non-compliance should be clear




                                                                15
The Horizon: Key Trends


 Employee IT issues will become increasingly more important over
  coming years.

 Sits at the crux of two distinct trends:

       → Technology Developments: Convergence

       → Legal developments: General Data Protection Regulation




                                                                    16
The Horizon: Tech Convergence

 Convergence of “personal” employee computing resources and
  business IT:

       → Consumer IT devices have leapfrogged Enterprise IT
       → Google docs, Dropbox, iPhones, apps etc…
       → Developing “Bring Your Own Device” culture
       → Netflix Audit recently found that employees were using 496
         separate smart phone apps for work

 Key risk = security of company data

 Well meaning employees, but a risk to the business

 Engage with IT department to develop rules




                                                                      17
The Horizon: General Data Protection
Regulation
 Draft Regulation, currently before Parliament and Council

 Greatly strengthens the right to privacy

 Numerous competing drafts

 Key points:

       → High fines, 2% global turnover
       → Possible loss of “legitimate interests” ground for processing
       → Expressly suggests that “consent” will not justify processing in
         the employment context

 Will impact on all aspects of operations, but is likely to make
  employee monitoring more challenging.




                                                                       18
Summary

 Social Media = An issue to be tackled, not something to avoided

 Find the risk v. reward trade-off that best suits your business

 Design a bespoke policy

 Communicate it effectively

 Keep an eye on changing trends




                                                                    19
Jeanne Kelly
Partner
Mason Hayes & Curran




                       20
Overview


•   Ownership and use of content on SM

•   What steps should you take when harmful content is flagged?

•   What defences are available?
Content: Ownership and Use

• Third party? Interns? Safeguards needed

• Ownership of output

    • Responsibility for content

    • Transitioning to new provider?

    • Responsiveness for breach/harmful content?

    • SM Policies and SM own terms of use

    • Need to be familiar with both law and internal systems of
      the SM page.




                                                                  22
Brand Protection issues


•   What can you say about your customer’s experience?

•   What can you say about a competitor’s product?

•   L’Oreal v Bellure

•   Use of UGC?
Who gets notified?


•   In-house counsel expected to be a “helicopter parent”?

•   Managing expectations

•   Have the numbers stored/reporting path agreed

•   External/internal PR/Lawyers/Tech experts/Insurers
Content Case study

•   Content that defames or infringes others rights is flagged to you

•   Should it be taken down at all?

•   Taking down

•   If fails, legal steps

•   Unmasking the culprit (Norwich Pharmacal)
Defence?

•   E-Commerce Regulations Art 18 Defences: Hosting
        - No knowledge

•   Acting expeditiously: different views of urgency?

•   Similar concepts in Copyright Act 2000

•   s27 Defamation Act 2009
Risks inherent in monitoring? - Hilton case UK 2010


“The fact that Mr Hilton on a few occasions removed blog posts
on grounds of bad language, political provocation or
offensiveness falling short of defamation … makes it at least
arguable that the service provided …. consisted of more than
mere storage.”
Takeaways


•   Take ownership of the interaction

•   Be proactive for planning but reactive for incidents

•   Understand the forum

•   Know the SM terms and processes, or outsource

•   SM policies

•   Staff training
Elizabeth Ryan
Partner
Mason Hayes & Curran




                       29
“Will the Highways on the Internet
become more… few?”



- George W. Bush




                                     30
Overview

•   Social media to screen candidates

•   Ownership of social media contacts

•   Disclosure of confidential information

•   Cyber slacking

•   Social media – harassment and bullying

•   Reputational damage

•   Discipline and dismissal




                                             31
Use of Social Media to Screen Candidates

•   Discrimination - nine grounds – candidates protected by
    Employment Equality Acts – age discrimination

•   Gaskell v University of Kentucky – University believed that Mr.
    Gaskell’s “creationist views” conflicted with a job application

•   Flexman v BG Group- upheld constructive dismissal claim
Ownership of Social Media Contacts


•   89.5% of employees use LinkedIn

•   Hayes Specialist Recruitment v Ions - Court ordered
    disclosure of contacts

•   Penwell Publishing v Ornstein and Others – Court found
    contacts to be property of employer




                                                             33
Disclosure of Confidential Information




•   NAMA – court injunctions - employee (and wife) to return
    confidential information to NAMA




                                                               34
Cyber Slacking


•   O’Leary v Eagle Star – no negative impact on work targets




                                                                35
Social Media - Harassment/Sexual
    Harassment/Bullying

•   Employment Equality Acts 1998 - 2011

•   Safety, Health and Welfare at Work Act, 2005

•   Employer vicariously liable for acts of employees

•   Morse v Future Reality - Complaint of sexual harassment
    upheld

•   Chevron Oil - €2.2 settlement of sexual harassment charges




                                                                 36
Reputational Damage



•   Vodafone – video brought to attention of Vodafone by
    Twitter user

•   Dominos Pizza – Fired and faced with felony charges




                                                           37
Discipline and Dismissal for use of Social
    Media
•   Emma Kiernan v A-Wear – dismissal unfair

•   O’Mahony v PGS Insurance - breach of Trust - dismissal fair

•   Preece v JB Weatherspoon - Dismissal fair - freedom of
    expression fettered

•   Crisp v Apple - Dismissal fair - Image




                                                                  38
Take Away - Best Practice Guidelines
•   Put a policy in place

•   Implement a proportional monitoring system

•   Ensure that employment contracts and restrictive covenants
    are customised to deal with confidential information which
    might be disseminated by social media

•   Be careful when using social media to recruit employees

•   Have a plan to deal with employee contacts generated by
    social media on the termination of the employment contract




                                                                 39
Philip Nolan
pnolan@mhc.ie

Jeanne Kelly
jkelly@mhc.ie

Elizabeth Ryan
eryan@mhc.ie




                 40
Thank you




            41

More Related Content

What's hot

Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Tania Mushtaq
 
20101116 deckers
20101116 deckers20101116 deckers
20101116 deckers
CIONET
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Lydia Shepherd
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
Lou Milrad
 

What's hot (20)

Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
 
20101116 deckers
20101116 deckers20101116 deckers
20101116 deckers
 
CIO Magazine - What We're Reading
CIO Magazine - What We're ReadingCIO Magazine - What We're Reading
CIO Magazine - What We're Reading
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
PwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintPwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO Reprint
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
The Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for DummiesThe Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for Dummies
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
 

Viewers also liked

Taking Control of Ecommerce Today
Taking Control of Ecommerce Today Taking Control of Ecommerce Today
Taking Control of Ecommerce Today
Joe Scartz
 
QUESTIONS FOR GENERAL COUNSEL CANDIDATE
QUESTIONS FOR GENERAL COUNSEL CANDIDATEQUESTIONS FOR GENERAL COUNSEL CANDIDATE
QUESTIONS FOR GENERAL COUNSEL CANDIDATE
ANTHONY PALAZZO
 
Preparing for IPO or Acqusition - Best Practices for In-House Counsel
Preparing for IPO or Acqusition - Best Practices for In-House CounselPreparing for IPO or Acqusition - Best Practices for In-House Counsel
Preparing for IPO or Acqusition - Best Practices for In-House Counsel
Todd Alberstone
 

Viewers also liked (11)

Taking Control of Ecommerce Today
Taking Control of Ecommerce Today Taking Control of Ecommerce Today
Taking Control of Ecommerce Today
 
QUESTIONS FOR GENERAL COUNSEL CANDIDATE
QUESTIONS FOR GENERAL COUNSEL CANDIDATEQUESTIONS FOR GENERAL COUNSEL CANDIDATE
QUESTIONS FOR GENERAL COUNSEL CANDIDATE
 
Global General Counsel Academy Brochure
Global General Counsel Academy BrochureGlobal General Counsel Academy Brochure
Global General Counsel Academy Brochure
 
Preparing for IPO or Acqusition - Best Practices for In-House Counsel
Preparing for IPO or Acqusition - Best Practices for In-House CounselPreparing for IPO or Acqusition - Best Practices for In-House Counsel
Preparing for IPO or Acqusition - Best Practices for In-House Counsel
 
The perils of a general counsel
The perils of a general counsel The perils of a general counsel
The perils of a general counsel
 
Trade Secrets and Covenants Not to Compete: A Guide for In-House Counsel
Trade Secrets and Covenants Not to Compete: A Guide for In-House Counsel Trade Secrets and Covenants Not to Compete: A Guide for In-House Counsel
Trade Secrets and Covenants Not to Compete: A Guide for In-House Counsel
 
Digital Marketing: Driving Business Growth With An Eye to In-House Counsel
Digital Marketing: Driving Business Growth With An Eye to In-House CounselDigital Marketing: Driving Business Growth With An Eye to In-House Counsel
Digital Marketing: Driving Business Growth With An Eye to In-House Counsel
 
Kam zardouzian brand protection Price Control Policy & MAP Program
Kam zardouzian brand protection Price Control Policy & MAP ProgramKam zardouzian brand protection Price Control Policy & MAP Program
Kam zardouzian brand protection Price Control Policy & MAP Program
 
Four tax issues general counsel should watch healthcare webinar 2015 11 19
Four tax issues general counsel should watch healthcare webinar 2015 11 19Four tax issues general counsel should watch healthcare webinar 2015 11 19
Four tax issues general counsel should watch healthcare webinar 2015 11 19
 
Practical Legal Advantage General Counsel Services
Practical Legal Advantage General Counsel ServicesPractical Legal Advantage General Counsel Services
Practical Legal Advantage General Counsel Services
 
Developing The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar IiDeveloping The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar Ii
 

Similar to In-house counsel Masterclass: Navigating the Social Network

Impact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance RiskImpact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance Risk
Sam Gibbins 紀俊森
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
briancrawford30935
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
bartholomeocoombs
 

Similar to In-house counsel Masterclass: Navigating the Social Network (20)

Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii market
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA Presentation
 
IRD Social Media Summit: Social Media Policies
IRD Social Media Summit: Social Media PoliciesIRD Social Media Summit: Social Media Policies
IRD Social Media Summit: Social Media Policies
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Impact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance RiskImpact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance Risk
 
Knowing Me, Knowing You - Managing & Using Contact Information
Knowing Me, Knowing You - Managing & Using Contact Information Knowing Me, Knowing You - Managing & Using Contact Information
Knowing Me, Knowing You - Managing & Using Contact Information
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
What Are The Pitfalls Of People Analytics And Data-Driven HR?
What Are The Pitfalls Of People Analytics And Data-Driven HR? What Are The Pitfalls Of People Analytics And Data-Driven HR?
What Are The Pitfalls Of People Analytics And Data-Driven HR?
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Excerpts from: Effective Brand Communications: How to tell the story of your...
Excerpts from:Effective Brand Communications:How to tell the story of your...Excerpts from:Effective Brand Communications:How to tell the story of your...
Excerpts from: Effective Brand Communications: How to tell the story of your...
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
Human resources protecting confidentiality cordell
Human resources protecting confidentiality cordellHuman resources protecting confidentiality cordell
Human resources protecting confidentiality cordell
 
TrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made SimpleTrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made Simple
 
Social Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldSocial Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New World
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 

In-house counsel Masterclass: Navigating the Social Network

  • 1. In-House Counsel Masterclass Navigating the Social Network Thursday, 7 March 2013 1
  • 3. Philip Nolan Partner and Head of Commercial Mason Hayes & Curran 3
  • 4. Overview  The “Balancing Act”: → Risk v reward → Privacy v business interests  Key Issues → Employee pre-screening → Optimising SM technology for business → Use and misuse  Implementing a social media policy  The Horizon → Industry trends → General Data Protection Regulation 4
  • 5. Opportunity v. Risk  Business benefits of social media: → Access to information → Building contacts → Identifying potential leads → Engaging with consumers → Dealing with complaints → Advertising 2.0 → Information on potential hires 5
  • 6. Opportunity v. Risk  Social Media involves “opening up” the business and allowing free flow of knowledge. Creates risks: → Defamation → Confidentiality → Harassment → Misrepresentation of company position  Business Challenge = Identify the benefits, measure the risks, and create a policy that best balances the two to create value 6
  • 7. Business Interests v Privacy  Exercising control over personnel  Copland v UK (2008) → European Court of Human Rights → Employees have an expectation of privacy in communications from work equipment (Article 8 EHCR) → Employer violated this right by monitoring email, phone and internet usage  Risks to company → Loss of time → Confidential Information → Damaging statements 7
  • 8. Business Interests v Privacy  How to resolve? → Employee Notice (key in Copland) → Proportionality  Consent is helpful, but not decisive Business Challenge = Adopt a proportionate approach to monitoring, reflecting the risks 8
  • 9. Key Issues  Three typical areas where advice is usually required: → Can we use social media to screen employees? → Can we use social media to build the business? → How do we prevent social media misuse?  Formulating SM policy = forming a view on these issues.  Remember to seek internal advice 9
  • 10. Issue 1: Employee Pre-Screening  Question = Can we run background checks?  Online presence → key indicator of suitability for the role  Key legislation = Data Protection Acts 1988 and 2003  Public Information: LinkedIn, Twitter etc… → Generally permissible (Section 2A) → Fair Processing Notice (Section 2D) → Separate issue = using the data  Private Information: e.g. Facebook profile → Common in the US → Legislative response (at least 28 states) → e.g. California Social Media Privacy Act 10
  • 11. Issue 1: Employee Pre-Screening  Can it be done in Ireland?  Not expressly forbidden, first principles  Obtain candidate consent (Section 2A Data Protection Acts)  Consent must be specific, freely given, and informed.  Risks  Disproportionate processing? (Section 2)  Likely regulator hostility  Breach of Contract  PR / reputational risk 11
  • 12. Issue 2: Business use of Social Media  Question = Can employees use social media to build the business  What social media use are we concerned about? → Not all social media created the same → LinkedIn vs. Instagram  Different policies for different staff? → Marketing may require work access to Twitter → Sales staff could rely on LinkedIn to find leads  Who is entitled to speak for the company on social media? → Marketing? → Executive Staff? → Internal pre-approvals through Legal?  These decisions should be reflected in policy document 12
  • 13. Issue 3: “Improper” Use of social media Question = How do we prevent employees from abusing social media  What can we actually monitor and control? → “Philip Nolan visited Facebook.com” → Logs do not generally disclose what an employee said on a site. → Discuss this with IT  Are we concerned about timewasting? → Limit personal use outside of set times (e.g. lunchtime)  What issues should be we prohibit altogether? → References to business/clients → Critical references to fellow employees → Defamatory speech → Discussion of company operations? 13
  • 14. Issue 3: “Improper” Use of Social Media  Exercise care to ensure that any restrictions on employees discussing the company do not inadvertently prevent activities that may benefit the firm, e.g. employees promoting favourable news stories. 14
  • 15. Implementing the “Social Media Policy”  Once position adopted on SM use; need to design rules.  Avoid undue focus on the idea of a “social media policy;” what matters is having effective, understandable and proportionate rules. Could be contained in: → Contracts → An existing “acceptable use policy” → On an intranet → A dedicated social media policy → Information updates  Consequences for non-compliance should be clear 15
  • 16. The Horizon: Key Trends  Employee IT issues will become increasingly more important over coming years.  Sits at the crux of two distinct trends: → Technology Developments: Convergence → Legal developments: General Data Protection Regulation 16
  • 17. The Horizon: Tech Convergence  Convergence of “personal” employee computing resources and business IT: → Consumer IT devices have leapfrogged Enterprise IT → Google docs, Dropbox, iPhones, apps etc… → Developing “Bring Your Own Device” culture → Netflix Audit recently found that employees were using 496 separate smart phone apps for work  Key risk = security of company data  Well meaning employees, but a risk to the business  Engage with IT department to develop rules 17
  • 18. The Horizon: General Data Protection Regulation  Draft Regulation, currently before Parliament and Council  Greatly strengthens the right to privacy  Numerous competing drafts  Key points: → High fines, 2% global turnover → Possible loss of “legitimate interests” ground for processing → Expressly suggests that “consent” will not justify processing in the employment context  Will impact on all aspects of operations, but is likely to make employee monitoring more challenging. 18
  • 19. Summary  Social Media = An issue to be tackled, not something to avoided  Find the risk v. reward trade-off that best suits your business  Design a bespoke policy  Communicate it effectively  Keep an eye on changing trends 19
  • 21. Overview • Ownership and use of content on SM • What steps should you take when harmful content is flagged? • What defences are available?
  • 22. Content: Ownership and Use • Third party? Interns? Safeguards needed • Ownership of output • Responsibility for content • Transitioning to new provider? • Responsiveness for breach/harmful content? • SM Policies and SM own terms of use • Need to be familiar with both law and internal systems of the SM page. 22
  • 23. Brand Protection issues • What can you say about your customer’s experience? • What can you say about a competitor’s product? • L’Oreal v Bellure • Use of UGC?
  • 24. Who gets notified? • In-house counsel expected to be a “helicopter parent”? • Managing expectations • Have the numbers stored/reporting path agreed • External/internal PR/Lawyers/Tech experts/Insurers
  • 25. Content Case study • Content that defames or infringes others rights is flagged to you • Should it be taken down at all? • Taking down • If fails, legal steps • Unmasking the culprit (Norwich Pharmacal)
  • 26. Defence? • E-Commerce Regulations Art 18 Defences: Hosting - No knowledge • Acting expeditiously: different views of urgency? • Similar concepts in Copyright Act 2000 • s27 Defamation Act 2009
  • 27. Risks inherent in monitoring? - Hilton case UK 2010 “The fact that Mr Hilton on a few occasions removed blog posts on grounds of bad language, political provocation or offensiveness falling short of defamation … makes it at least arguable that the service provided …. consisted of more than mere storage.”
  • 28. Takeaways • Take ownership of the interaction • Be proactive for planning but reactive for incidents • Understand the forum • Know the SM terms and processes, or outsource • SM policies • Staff training
  • 30. “Will the Highways on the Internet become more… few?” - George W. Bush 30
  • 31. Overview • Social media to screen candidates • Ownership of social media contacts • Disclosure of confidential information • Cyber slacking • Social media – harassment and bullying • Reputational damage • Discipline and dismissal 31
  • 32. Use of Social Media to Screen Candidates • Discrimination - nine grounds – candidates protected by Employment Equality Acts – age discrimination • Gaskell v University of Kentucky – University believed that Mr. Gaskell’s “creationist views” conflicted with a job application • Flexman v BG Group- upheld constructive dismissal claim
  • 33. Ownership of Social Media Contacts • 89.5% of employees use LinkedIn • Hayes Specialist Recruitment v Ions - Court ordered disclosure of contacts • Penwell Publishing v Ornstein and Others – Court found contacts to be property of employer 33
  • 34. Disclosure of Confidential Information • NAMA – court injunctions - employee (and wife) to return confidential information to NAMA 34
  • 35. Cyber Slacking • O’Leary v Eagle Star – no negative impact on work targets 35
  • 36. Social Media - Harassment/Sexual Harassment/Bullying • Employment Equality Acts 1998 - 2011 • Safety, Health and Welfare at Work Act, 2005 • Employer vicariously liable for acts of employees • Morse v Future Reality - Complaint of sexual harassment upheld • Chevron Oil - €2.2 settlement of sexual harassment charges 36
  • 37. Reputational Damage • Vodafone – video brought to attention of Vodafone by Twitter user • Dominos Pizza – Fired and faced with felony charges 37
  • 38. Discipline and Dismissal for use of Social Media • Emma Kiernan v A-Wear – dismissal unfair • O’Mahony v PGS Insurance - breach of Trust - dismissal fair • Preece v JB Weatherspoon - Dismissal fair - freedom of expression fettered • Crisp v Apple - Dismissal fair - Image 38
  • 39. Take Away - Best Practice Guidelines • Put a policy in place • Implement a proportional monitoring system • Ensure that employment contracts and restrictive covenants are customised to deal with confidential information which might be disseminated by social media • Be careful when using social media to recruit employees • Have a plan to deal with employee contacts generated by social media on the termination of the employment contract 39
  • 41. Thank you 41