Stacy Robin - The Degania Group - Technology and the Law


Published on

Stacy Robin - The Degania Group - Technology and the Law

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Stacy Robin - The Degania Group - Technology and the Law

  1. 1. Technology and the Law<br />Stacy Robin, The Degania Group<br />
  2. 2. Technology and the Law….or<br />How you can get into a lot of trouble <br />without even trying<br />How do you identify your risk?<br />What are key areas of growing legal concern?<br />How do you stay current?<br />
  3. 3. Identifying Risk: Your Current State<br />What policies and procedures do you have in place?<br />In what areas might you be exposed?<br />Did you write your own policies?<br />Did you plagiarize someone else’s policy?<br />Do you have an attorney?<br />Does that attorney have a specialty in technology?<br />When did you last have your company reviewed and your policies updated?<br />Are you comfortable with your current risk?<br />
  4. 4. Employees and Technology<br />Computers<br />Employee surveillance<br />Data <br />Monitoring<br />Discovery<br />Privacy<br />Social media<br />
  5. 5. Employer Technology for Employee Use<br />Need definition<br />Employment Contract<br />Employee Handbook<br />Signed Understanding<br />I don’t have employees. I have contractors!<br /> Do they use your technology?<br />Are guidelines in your contract?<br />Does a company have the right to the data on an employee’s work computer? <br />
  6. 6. Recent cases<br />2010: Steingartv. Loving Care Agency, Inc. (NJ)<br />2011: Holmes v. Petrovich Development Company, LLC (CA)<br />At issue:<br />Use of company computers<br />Monitoring/storing user data (emails)<br />Company policy<br />Client-Attorney privilege<br /> What should you learn from these cases?<br />
  7. 7. Using Technology to Monitor Employees<br />Why?<br />Are you violating privacy? Did you:<br />Intrude upon seclusion<br />Appropriate an employee’s likeness for commercial purposes<br />Publish of private employee matters<br />Disclose medical records <br />Limit to visual images<br />
  8. 8. Social Media<br />Assume posts are not private; can be used as evidence<br />Industry regulations<br />Hiring practices: protected classes<br />Potential conflict: “Views are strictly my own”<br />NLRB: Employee protection<br />Complaints about working conditions; especially those that affect co-workers as well what an employee<br />Employees organizing (unions)<br />Company protection<br />What an employee accesses at work<br />What an employee is allowed to post about proprietary company (or client) information <br />CFAA:Is it criminal to access social media sites?<br />
  9. 9. Data and E-Discovery<br />E-discovery refers to "electronically stored information” (ESI)<br />Emails, electronic documents, social media, all online activity <br />It does not matter how brief the storage period<br />Federal Rules: term was "intended to be read expansively to include all current and future electronic storage mediums”<br />“Clouds” <br />Social networking sites<br />How do you stay in compliance?<br />Stay informed: general best practices, industry policies<br />Update company retention policies as appropriate<br />Use verified/audited vendors to back up data <br />Consider holding period, access, ownership of data, security1<br />1<br />
  10. 10. E-Discovery: Making it complicated<br />Federal vs. state laws<br />Many states have adopted a statute/rules governing e-discovery statute<br />Differing standards across states - document preservation, production of electronically stored information<br />Conflict: companies must dispose of certain records<br />Data privacy laws<br />Failing to comply with e-discovery rules is a serious offense<br />Study of 401 cases prior to 2010; more than half received sanctions1<br />Sanctions included<br />Case dismissals<br />Adverse jury instructions<br />Large monetary sanctions<br />1 and<br />
  11. 11. Online Sites<br /><ul><li>Privacy, Terms of Use “TOU”
  12. 12. Defamatory Content and False Statements
  13. 13. COPPA
  14. 14. Promotions and Sweepstakes
  15. 15. Content (Intellectual Property)</li></li></ul><li>Common IP Violations<br />Don’t use “free” or subscription images (or other content) without checking terms of use<br />Do ensure you understand contracts<br />Don’t copy or use third party marks on your website without permission<br />Don’t cut and paste third party content<br />Don’t “deep link” to third party content<br />Don’t frame third party content<br />Don’t forward subscription-based content<br />Don’t share software without proper license<br />Do enforce your rights: give notice, monitor for misuse<br />
  16. 16. CAN-SPAM: What is it?<br />Protects consumers from unwanted solicitations<br />All messages with promotion as a primary purpose<br />Not limited to unsolicited messages<br />No exception for emails to recipients with whom sender has a pre-existing relationship<br />Additional application: Facebook, MySpace, Twitter<br />Act has a broad definition of an email address<br />Facebook, Inc. v. MaxBounty, Inc.<br />Penalties (listed on FTC site)<br />Each separate email in violation: up to $16,000<br />More than one person may be held responsible for violations.<br />Aggravated violations: additional fines, criminal penalties – including imprisonment<br />
  17. 17. CAN-SPAM: The Do and Don’t List<br />Don’t use false/misleading headers<br />Don’t use deceptive subject lines<br />Do identify the message as an advertisement<br />Do tell recipients where you are located (must be a valid, physical postal address)<br />Do clearly explain to recipients how to “opt out”<br />Do honor “opt out” requests promptly (within 10 business days)<br />Do monitor your vendors; you can’t contract away your liability<br />Do make recipients aware of sexually explicit material<br />Do not “preview” sexually explicit material<br /><br />
  18. 18. Stay Current: Changes Coming!<br />Data Privacy<br />PII <br />Third party vendors<br />Employee theft (CFAA), negligence<br />Online advertising <br />FTC revamping guidelines; comment period closes July 11<br />Paid endorsements<br />New apps and new ways to enforce the law<br />DOL Timekeeping app <br />
  19. 19. Creating and identifying opportunities for you to<br />save money, find money and make money<br />Stacy Robin<br /><br />@stacyrobin<br /><br />1.877.334.2642<br />