SlideShare a Scribd company logo
1 of 29
Chapter 14
The Employee’s Right to Privacy and Management of Personal
Information
©joakimbkk/Getty Images RF
Learning Objectives
When you finish this chapter, you should be able to:
1. LO1Describe the nature of privacy as a fundamental right.
2. LO2Explain the three general ways in which privacy is
legally protected in the United States.
3. LO3Define the legal concept of a “reasonable expectation of
privacy” and its application to the workplace.
4. LO4Identify and apply the standard for unreasonable searches
and seizures under the Fourth Amendment.
5. LO5Explain the distinctions between the protections for
public- and private-sector privacy.
6. LO6Describe the legal framework that applies to private-
sector privacy cases.
7. LO7Identify and differentiate the prima facie cases for
common-law claims of privacy invasions (intrusion
into seclusion, public disclosure of private facts, publication in
a false light, and breach of
contract/defamation).
8. LO8Explain the extent to which an employer can legally
dictate the off-work acts of its employees.
9. LO9Discuss how advances in technology have impacted
employee privacy.
10. LO10State the key business justifications for employee
monitoring.
11. LO11Explain the most effective means by which to design
and implement a technology use policy.
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-5
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-6
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-8
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-9
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-10
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-11
12. LO12Describe the legal environment that surrounds
employee use of social media technologies.
page 711
Opening Scenarios
SCENARIO 1
Cherita runs a small family medical practice in rural Montana
and is concerned about the skyrocketing costs
of medical malpractice insurance, which her office provides for
all of its full-time physicians. She worries that her
five-physician medical group would suffer a financial disaster if
one of its workers inadvertently transferred the
disease to one of their patients. Therefore, she wants to conduct
a confidential HIV test of each of her present
employees and also all future applicants. Cherita has several
questions. First, what if a physician refuses to take
the test claiming an invasion of privacy? Second, if someone’s
test returns a positive result, can Cherita refuse
to hire that individual or can she discharge an employee without
violating federal laws protecting employees with
disabilities? Third, if an employee’s tests return with a negative
result, but Cherita decides to terminate the
employee anyway, is she liable for the appearance that the
employee is HIV positive and that Cherita terminated
her or him as a consequence of the test results? Fourth, what is
the most effective way for Cherita to ensure that
the test results are kept confidential?
SCENARIO 2
Abraham, a real estate agent, has three children, two of whom
are in college. In order to earn extra money
to help with college tuition payments, Abraham (who studied
modern dance during his college career) finds a job
dancing in a club that caters specifically to women. While not
exactly erotic dancing (he keeps all of his clothes
on), it is not ballroom dancing either. Celebrating during a
bachelorette party, one of the partners of the real
estate firm for which Abraham works catches sight of him
dancing. When he arrives at the office the next day,
she calls him into her office and orders him to quit his night
job. She claims that both clients and potential clients
might see him there and he would lose all credibility as a real
estate agent. Does she have a right to require
Abraham to do this as a condition of future employment?
(Presume that he is an employee and not an
independent contractor.)
SCENARIO 3
Kanani receives what appears to be a legitimate email asking
her to click on an embedded link to learn
more about new solar technologies. Though she does not
recognize the name of the sender, she clicks on the
link because she works at a solar panel installation company
and is always excited to learn about the latest
technology. She is also on several listservs so it is not
uncommon for her to receive emails such as this one.
Kanani finds herself looking at a website with photos of
Leonardo DiCaprio that are “not safe/suitable for work”
(NSFW), which may have been Photoshopped images. She is so
annoyed by this occurrence that she spends a
few moments looking around the website trying to figure out
how to unsubscribe from its list. After searching for
several minutes with no luck, she leaves the website and goes
back to reading her email. She responds quickly
to a question from her intern and then sends an email to her
teenage daughter reminding her to pick up the dog
from puppy day care on her way home from school. She then
returns to preparing for her upcoming presentation.
A few days later, she receives a warning from her manager for
using employer-owned computer equipment
for personal use, including looking at NSFW materials online
and emailing her daughter. She learns that her
manager was using a program that alerted him any time an
employee viewed certain inappropriate websites. He
also was monitoring her work email account for key words and
her puppy day care was flagged. Kanani is furious
at the invasion of her privacy posed by this computer
monitoring. Does her employer have a right to monitor her
computer use in this way, and how might you suggest she
respond? If you were her manager, how might you
distinguish in your monitoring between appropriate technology
use (if you consider this to be appropriate) and
inappropriate use?
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-12
Are There Guarantees in Life?
Privacy is a surprisingly vague and disputed value in
contemporary society. With the tremendous
increase in computer technology in recent decades, calls for
greater protection of privacy have
increased. Yet, there is widespread confusion page
712concerning the nature, extent, and value
of privacy. Philosophers have argued that our society cannot
maintain its core values without
simultaneously guaranteeing the privacy of the individual.
Edward Bloustein writes that “an
individual deprived of privacy merges with the mass. His
opinions, being public, tend never to be
different; his aspirations, being known, tend always to be
conventionally accepted ones; his
feelings, being openly exhibited, tend to lose their quality of
unique personal warmth and to
become the feelings of every man. Such a being, although
sentient, is fungible; he is not an
individual.”1
Recent inventions and business methods call attention to the
next step that must be taken for
the protection of the person and for securing to the individual
what Judge Cooley calls the right
“to be let alone.” Instantaneous photographs and newspaper
enterprises have invaded the sacred
precincts of private and domestic life, and numerous mechanical
devices threaten to make good
the prediction that “what is whispered in the closet shall be
proclaimed from the house-tops.”2
Philosopher Chris MacDonald explains that privacy is about
having a realm of personal control
from which others can be excluded at will. In other words, it
has to do with freedom of action,
freedom from the prying eyes of neighbors, governments, or
employers. The more such freedom
we have, the more privacy we have.3
Europeans generally view employee rights using a different
perspective from that in the United
States. While Americans view rights of employees in terms of
the protection of their privacy,
Europeans are more likely to perceive their protection with
regard to human dignity, the
employee’s right to be free from embarrassment and
humiliation.4 The result of this distinction is
that European employees generally enjoy a wider range of
freedom from employer intrusion in
the workplace than do U.S. employees. Indeed, some U.S. firms
that engage in business
internationally have found themselves in violation of EU
standards, and subject to hefty fines,
when they applied their privacy rules to employees who were
located in the European Union.
LO1
The concept of privacy as a fundamental right certainly is not
limited to the United States and
Europe. Islamic thought recognizes a fundamental right to
privacy based in the Qur’an, which
instructs: “Do not spy on one another” (49:12); and “Do not
enter any houses except your own
homes unless you are sure of their occupants’ consent” (24:27).
Hadiths (recorded sayings of the
Prophet Mohammed) report that he instructed his followers that
a man should not even enter his
own house suddenly or surreptitiously.5 Ancient Greece already
had laws protecting privacy, and
the Jewish Talmud considers privacy an aspect of one’s
sanctity, providing rules for protecting
one’s home. In fact, the Talmud contains reference to “harm
caused by seeing” (hezeq re’iyyah)
when one intrudes upon another.
But do employees actually have a “fundamental right to
privacy” as many believe? The answer
to this question is not as easy as one might presume, given the
wide recognition of employee
rights in the workplace. The right to privacy may not be as
fundamental as employees generally
believe it to be, which makes it all the more important in these
days of advancing information
technology. Computer technology, though largely beneficial,
can have a negative effect on
employees if the easily obtained information is misused,
incorrect, or misleading. Employers now
have a greater capacity to invade an employee’s privacy than
ever before. Among other devices,
there are chairs that can sense and record the time an employee
spends page 713at his or her
desk, computer programs that measure employees’ computer
keystrokes to ensure they are as
productive as they should be, phones that monitor employees’
phone calls, and policies related
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn5
to workplace communication to make sure all communications
are work-related. Monitoring is
only increasing in power, ability, and frequency. Worldwide
security and computer monitoring
software revenue totaled $22.1 billion in 2015, a 3.7 percent
increase from 2014.6 But perhaps
there is a greater employer need to monitor employees in the
workplace: according to a study by
the National Retail Federation, in 2014, employee theft cost
retailers nearly $15.2 billion,
accounting for around 34.5 percent of total “retail shrinkage”
(loss of inventory due to employee
theft, shoplifting, paperwork errors, or supplier fraud),
compared with 33.8 percent from
shoplifting.7 Employers may even have good reasons for
seeking seemingly private information
about employees and their activities outside of work: in 2013
there were 22.4 million illicit drug
users aged 18 or older in the United States. The rate of illicit
drug use among those who were
employed ranged from almost 10 percent (those employed on a
full-time basis) to almost 14
percent (those employed on a part time basis).8 Drug use in
American industry costs employers
approximately $250 billion per year in lost productivity,
absenteeism, attrition, safety issues,
workers’ compensation claims, and hidden health care
expenditures.9 and failure to perform an
intensive reference and background check of an applicant may
cost the employer enormous
amounts in litigation fees defending claims of negligent hiring,
easily outweighing the cost of a
drug test, usually less than $50. In this time of increased
competition in the global marketplace,
each employee becomes all the more crucial to the workings of
the company. An employer has a
justified basis for attempting to choose the most appropriate and
qualified person for the job; the
means by which the employer obtains that information,
however, may be suspect.
The right to privacy is not only balanced with the arguably
legitimate interests of the employer
but also with the employer’s responsibility to protect
employees’ and customers’ personal
information. Theft of computerized customer and employee
records has increased dramatically
over the last decade; and the costs associated can be enormous.
The hacking of Sony’s
PlayStation Network in 2011 cost the company more than $71
million in direct clean-up costs;
and analysts estimate that the cumulative costs of
investigations, compensation, additional data
security investments, and lost business could exceed a billion
dollars. By one estimate, in 2011,
there were 1,037 publicly reported incidents of the loss, theft,
or exposure of personally
identifiable information, a 30 percent increase on the previous
year, and up from only 21 in
2003.10 Yet, the fact that only the largest and most audacious
data breaches are reported in the
media means that publicly reported breaches greatly
underestimate the extent of the problem. A
2012 survey of over 1,200 U.S. small businesses (with annual
revenues of less than $10 million)
found that 55 percent had experienced a data breach, and of
those only 33 percent notified the
people affected, although 46 states require that individuals are
notified when their private
information is exposed.11 As of 2015, there were 34,529 known
computer security incidents per
day in the United States, with each breach costing around
$690,000 in legal fees.12
Whereas erosion of at-will employment was the dominant issue
of the 1980s, scholars
predicted that privacy would be the main theme for the 1990s
and beyond. This chapter will
address the employee’s rights regarding personal information
page 714and the employer’s
responsibilities regarding that information, as well as the
employer’s right to find out both job-
related and nonrelated personal information about its
employees. Chapter 4 previously
addressed other issues regarding the legality of information
gathering through testing procedures.
This chapter will not address issues relating to consumer
privacy since they fall outside the scope
of the chapter’s and the text’s primary focus.
Background
LO2
There are three ways in which privacy may be legally protected:
by the Constitution (federal or
state), by federal and/or state statutes, and by the common law.
The U.S. Constitution does not
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn6
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn8
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn9
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn10
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn11
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn12
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter04.xhtml
actually mention privacy, but privacy has been inferred as a
necessary adjunct of other
constitutional rights we hold. The right to privacy was first
recognized by the Supreme Court
in Griswold v. Connecticut,13 when the Court held that a
Connecticut statute restricting a married
couple’s use of birth control devices unconstitutionally
infringed on the right to marital privacy.
The Court held a constitutional guarantee of various zones of
privacy as a part of
the fundamental rights guaranteed by the Constitution, such as
the right to free speech and the
right to be free from unreasonable searches and seizures. The
latter right is that on which many
claims for privacy rights are based; the Court has held that
under certain circumstances the
required disclosure of certain types of personal information
should be considered an
unreasonable search. It has protected against the mandatory
disclosure of personal papers, and
it decided in favor of the right to make procreation decisions
privately.
fundamental right
A right that is guaranteed by the Constitution, whether stated or
not.
While baseless or unjustified intrusions, at first blush, may
appear to be completely abhorrent
in our society, proponents of the argument that employers can
ask whatever they please argue
that if an employee does not want to offer a piece of
information, there is something the employee
is trying to hide. For example, why would an employee refuse to
submit to a drug test if that
employee is not abusing drugs? Do private-sector employers
have the right to ask their
employees any question they choose and take adverse
employment actions against the employee
if she or he refuses to answer since they are not necessarily
constrained by constitutional
protections? (See Exhibit 14.1, “Realities about Employee
Privacy Rights.”)
private sector
That segment of the workforce represented by private
companies (companies that are not owned or managed
by the government or one of its agencies).
Exhibit 14.1 Realities about Employee Privacy Rights
1. Employees do not have an absolute right to privacy in their
workplace.
2. It is not a breach of an employee’s right to privacy for an
employer to ask with whom the employee lives.
3. In the private sector, the Constitution does not protect
employees’ right to be free from unreasonable searches and
seizures.
4. Without constitutional protection, employees are safeguarded
to some extent by common-law protections against
invasions of privacy.
5. Though an employee may give information to an employer,
the employer is still bound to use that information only for
the purpose for which it was collected.
page 715Additionally, employees are concerned about the type
of information gathered in the
course of applying for and holding a job. Who has access to that
information? What information
may be deemed “confidential,” and what does that mean to the
employee? Evidently, employers
perceive challenging issues among these and others with regard
to privacy. According to a 2016
survey, 54 percent of firms now report that they have appointed
a chief data officer. This figure
represents an increase from just 12 percent in 2012; and the
International Society of Chief Data
Officers launched their inaugural kickoff in January 2016, with
a strong commitment to carry this
momentum forward on a global basis.14
Workplace Privacy, Generally
LO3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn13
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#rch14_key1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#exh14-1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#rch14_key2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn14
Privacy protections in the workplace are a completely different
animal than other types of
workplace protections, such as those against discrimination on
the basis of gender, disability, and
age. Simply put, employees in the private-sector workplace do
not have broad rights to personal
privacy. Why? To begin, unlike the other areas, no
comprehensive federal workplace privacy
legislation exists. The protections that do exist, as discussed
previously, arise from a motley
collection of inferences from the Constitution, limited-purpose
federal laws, assorted state laws,
and some common law (court-created through case law).
common law
Law made and applied by judges, based on precedent (prior case
law).
Second, in almost every state, employees are hired at will,
which means that employers can
fire them for good reasons, for bad reasons, or for no reason at
all (but not for an illegal reason),
as we shall discuss in more detail later. If an employer
legitimately can fire an employee for “bad
reasons,” you can see quite clearly why an employee is not
going to be successful in stating a
case against the employer for violating the employee’s privacy
unless the employee can fit his or
her complaint specifically into one of the protections
guaranteed by the federal, state, and
common laws, thus turning a “bad reason” into an “illegal
reason.”
Perhaps the most effective way to understand workplace privacy
protections is to examine
where the protections do exist. Courts have recognized an
employee’s right to privacy in the
workplace where there is a “reasonable expectation of
privacy.”15 However, they have also held
that a work area, unlike, for instance, a bedroom, is not a place
of solitude or seclusion; so, there
is no expectation of privacy in that environment.16 In addition,
anything that the employer provides
to employees—a telephone, computer, desk, chair, or other
business-related instrument—
contains no expectation of privacy because it belongs to the
employer, not to the employees.
Thus, the content of emails, telephone calls, and computer
activity conducted on employer-
provided equipment is not private.
Is there any reasonable expectation of privacy in the workplace?
(See Exhibit 14.2,
“‘Reasonable’ Areas in Which to Expect Privacy in the
Workplace, Subject to Exceptions.”) Yes,
employees have an expectation of privacy with regard to their
body, including what they carry in
their pockets. Their employer generally does not have the right
to frisk them or to require them to
disclose what they are carrying in their pockets; although, as we
shall see later, there are
situations in which such as invasion of privacy would be
appropriate. This expectation
extends page 716to company-provided bathrooms, changing
rooms, and showers. But, should this
expectation cover drug testing? We will explore that question
later in this chapter.
Exhibit 14.2 “Reasonable” Areas in Which to Expect Privacy in
the Workplace, Subject
to Exceptions
Second, employees have an expectation of privacy in connection
with items that are contained
in other normally private locations, such as a purse or briefcase;
however, these locations, also,
are subject to exceptions under certain circumstances. For
example, if an employee puts a purse
in a company-provided desk drawer, the employer generally has
the right to examine the desk
drawer but likely not the contents of their purse. Similarly,
employees have an expectation of
privacy in the contents of their car that sits in the company
parking lot, assuming that it is not a
company car or that they are not using the car for company
purposes other than to go to and from
work. Their employer generally cannot go and search their car,
with some exceptions.
Third, employees have an expectation of privacy in their
personal (not personnel) records and
information. For example, they have the right to assume that
their employer has no right to access
their credit history, their driving record, or their family’s
medical records without their permission;
but, we can all imagine situations in which that rule may not
apply or may be excepted. Their
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#rch14_key3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn15
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn16
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#exh14-2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#exh14-2
employer, for example, could reasonably expect to access their
driving history if they were
applying for a job operating a company vehicle, although the
employer needs their permission to
do so.
Finally, workers have an expectation of privacy in what they
choose to do in their free time,
when they are away from work. However, this expectation is not
quite as extensive as one might
anticipate. Plenty of employers have tried to restrict what
employees do in their free time, some
successfully.
While the list may seem broad, the scope of workplace privacy
rights is actually quite limited.
The vast majority of the time during which employees are
present at their employers’ offices, they
are subject to monitoring and other intrusions. Employers are
free to monitor their movements,
the keystrokes they make on their employer-provided
computers, and the time they spend
communicating with co-workers. Technological improvements
have not only made their task that
much easier but have also generated new ideas for intruding on
employee privacy never before
imagined (iris scans, voice prints, and face geometry, to name
three).
page 717Now we shall examine the specifics, first exploring
public-sector employee privacy,
then continuing to private-sector employee privacy.
Public-Sector Employee Privacy
With regard to the public sector, the Constitution protects
individuals from wrongful invasions by
the state or by anyone acting on behalf of the government. The
personal privacy of federal, state,
and local employees is therefore protected from governmental
intrusion and excess. As we will
see later in this chapter, private-sector employees are subject to
different—and often fewer—
protections.
public sector
That segment of the workforce represented by governmental
employers and governmental agency employers.
In some situations, this term may include federal contractors.
Constitutional Protection
The Fourth Amendment and Its Exceptions
For the Fourth Amendment’s protection against unreasonable
search and seizure to be applicable
to a given situation, there must first exist a “search or seizure.”
The Supreme Court has liberally
interpreted “search” to include a wide variety of activities such
as the retrieval of blood samples
and other bodily invasions, including urinalyses, as well as the
collection of other personal
information. One might imagine how this umbrella gets wider as
technology advances.
LO4
For the search to violate the Fourth Amendment, that search
must be deemed unreasonable,
unjustified at its inception, and impermissible in scope. You
will read in the seminal Supreme
Court case, O’Connor v. Ortega,17 included at the end of the
chapter, that a search is justified “at
its inception” where the employer has reasonable grounds for
suspecting that the search will turn
up evidence that the employee is guilty of work-related
misconduct, or where the search is
necessary for a noninvestigatory work-related purpose such as
to retrieve a file.
It is critical to review the O’Connor case at the end of the
chapter to understand both the
fundamental basis of public-sector search and seizure law as it
applies to the workplace as well
as much of current case law today. The Court held that a search
is permissible in scope where
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#rch14_key4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn17
“the measures adopted are reasonably related to the objectives
of the search and not excessively …
ITS 833 – INFORMATION GOVERNANCE
Chapter 1 – The Onslaught of Big Data and Information
Governance Imperative
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Define or identify what is meant by “Big Data”
What is the practical effects and problems associated with Big
Data
Solution
to the Big Data problem
Defining Information Governance (“IG”)
Why we do not incorporate IG into everyday business
Advantage of IG
Effects of not incorporating IG
General approach to implementing IG
Copyright Omar Mohamed 2019
2
2
What is “Big Data”?
It is a business asset capable of being leveraged.
“High-volume, high-velocity and high-variety information that
demands cost-effective innovative forms of information
processing for enhanced insight and decision making”
A combination of both structured and unstructured data that is
so massive that it cannot be processed using today’s database
tools and analytical software techniques.
Copyright Omar Mohamed 2019
3
3
What is the practical effect of “Big Data”?
Whether or not a business enterprise will be able to sustain a
competitive advantage will depend on the business’ ability to
manipulate the large amount of data in a way that it to
differentiate itself.
Estimates are that 90% of the data existing today was created
over the pat two years.
Big Data and related technology and services are projected to
grow at a compound annual rate of approximately 27% - leading
to new opportunities for data mining and business intelligence.
Copyright Omar Mohamed 2019
4
4
Issues Related to Big Data
Expense –Only about 25% of data stored has real business
value, 5% more is required to be maintained for legal reasons,
1% retained due to litigation hold, leaving about 69% with no
real value.
A great deal of irrelevant information
Increased storage costs
System failures
Legal costs
Conversion costs
Copyright Omar Mohamed 2019
5
5
SOLUTION TO BIG DATA PROBLEMS?
Information Governance
Rigid
Enforced
Creates a smaller “information footprint”
Allows business to more easily find what they need and derive
business value from it
Copyright Omar Mohamed 2019
6
6
So…What is “Information Governance”?
It is discipline that emerged out of necessity…
Subset of corporate governance
Merged from records management, content management,
information technology, data governance, information security,
data privacy, risk management, litigation readiness, regulatory
compliance, data preservation and business intelligence
It is the way by which an organization manages the totality of
its information
A strategic framework composed of standards, processes, roles,
and metrics that hold organizations and individuals accountable
to create, organize, secure, maintain, use and dispose of
information in ways that align with and contribute to the
organizations goals. (Association of Records Management and
Administrators)Glossary of Records and Information
Management Terms, 4th Ed., 2012, TR 22-2012)
Copyright Omar Mohamed 2019
7
7
WHY INCORPORATE “IG”?
We can’t keep everything forever
We can’t throw everything away
E-discovery
Employees want it
It improves information delivery and improves productivity
It does not get easier to do over time
Legal requirements
Helps mitigate information management risk
E-mail
Copyright Omar Mohamed 2019
8
8
WHY DON’T WE INCORPORATE “IG”?
Cost
Lack of understanding
Lack of support from top
Copyright Omar Mohamed 2019
9
9
FAILURES OF INFORMATION GOVERNANCE?
Theft of valuable information
Inability to protect personal, private information
Breaches in legal requirements
Loss of trade secrets
Public reputation damage
Copyright Omar Mohamed 2019
10
10
Approaches to Implementing IG
Form proper IG policies first
Review existing policy…if any
Implement an awareness policy
Develop an approach
Project approach vs. Strategic program
Identify governance body or steering committee
Apply appropriate technologies for enforcement
Copyright Omar Mohamed 2019
11
11
Thank You
Copyright Omar Mohamed 2019
12
12
ITS 833 – INFORMATION GOVERNANCE
Chapter 1 – The Onslaught of Big Data and Information
Governance Imperative
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Define or identify what is meant by “Big Data”
What is the practical effects and problems associated with Big
Data

More Related Content

Similar to Chapter 14 The Employee’s Right to Privacy and Management of.docx

Social Media: What's Not to Like About Social Media in the Workplace?
 Social Media: What's Not to Like About Social Media in the Workplace? Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?Parsons Behle & Latimer
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsCEL Public Relations
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whTanaMaeskm
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTXAttention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTXKathryn Winn
 
Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?Parsons Behle & Latimer
 
Fall Leaves Printable Stationery Paper, Autumn
Fall Leaves Printable Stationery Paper, AutumnFall Leaves Printable Stationery Paper, Autumn
Fall Leaves Printable Stationery Paper, AutumnMandy Love
 

Similar to Chapter 14 The Employee’s Right to Privacy and Management of.docx (10)

Social Media: What's Not to Like About Social Media in the Workplace?
 Social Media: What's Not to Like About Social Media in the Workplace? Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR Implications
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTXAttention all Units.  Social Media PowerPoint(00527617_xAF7F5)).PPTX
Attention all Units. Social Media PowerPoint(00527617_xAF7F5)).PPTX
 
Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?
 
Fall Leaves Printable Stationery Paper, Autumn
Fall Leaves Printable Stationery Paper, AutumnFall Leaves Printable Stationery Paper, Autumn
Fall Leaves Printable Stationery Paper, Autumn
 

More from bartholomeocoombs

CompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docxCompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docxbartholomeocoombs
 
CompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docxCompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docxbartholomeocoombs
 
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docxCompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docxbartholomeocoombs
 
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docxCompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docxbartholomeocoombs
 
CompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docxCompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docxbartholomeocoombs
 
Competency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docxCompetency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docxbartholomeocoombs
 
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docxCompetency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docxbartholomeocoombs
 
Competency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docxCompetency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docxbartholomeocoombs
 
CompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docxCompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docxbartholomeocoombs
 
CompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docxCompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docxbartholomeocoombs
 
CompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docxCompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docxbartholomeocoombs
 
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4  Healthcare Utilization and Finance.docxCOMPETENCIES734.3.4  Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docxbartholomeocoombs
 
Competencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docxCompetencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docxbartholomeocoombs
 
Competencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docxCompetencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docxbartholomeocoombs
 
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docxCompetencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docxbartholomeocoombs
 
Competences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docxCompetences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docxbartholomeocoombs
 
Compensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docxCompensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docxbartholomeocoombs
 
Compensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docxCompensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docxbartholomeocoombs
 
Compete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docxCompete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 

More from bartholomeocoombs (20)

CompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docxCompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docx
 
CompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docxCompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docx
 
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docxCompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
 
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docxCompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
 
CompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docxCompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docx
 
Competency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docxCompetency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docx
 
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docxCompetency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
 
Competency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docxCompetency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docx
 
CompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docxCompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docx
 
CompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docxCompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docx
 
CompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docxCompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docx
 
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4  Healthcare Utilization and Finance.docxCOMPETENCIES734.3.4  Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
 
Competencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docxCompetencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docx
 
Competencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docxCompetencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docx
 
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docxCompetencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
 
Competences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docxCompetences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docx
 
Compensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docxCompensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docx
 
Compensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docxCompensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docx
 
Compete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docxCompete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

Chapter 14 The Employee’s Right to Privacy and Management of.docx

  • 1. Chapter 14 The Employee’s Right to Privacy and Management of Personal Information ©joakimbkk/Getty Images RF Learning Objectives When you finish this chapter, you should be able to: 1. LO1Describe the nature of privacy as a fundamental right. 2. LO2Explain the three general ways in which privacy is legally protected in the United States. 3. LO3Define the legal concept of a “reasonable expectation of privacy” and its application to the workplace. 4. LO4Identify and apply the standard for unreasonable searches and seizures under the Fourth Amendment. 5. LO5Explain the distinctions between the protections for public- and private-sector privacy. 6. LO6Describe the legal framework that applies to private- sector privacy cases. 7. LO7Identify and differentiate the prima facie cases for common-law claims of privacy invasions (intrusion
  • 2. into seclusion, public disclosure of private facts, publication in a false light, and breach of contract/defamation). 8. LO8Explain the extent to which an employer can legally dictate the off-work acts of its employees. 9. LO9Discuss how advances in technology have impacted employee privacy. 10. LO10State the key business justifications for employee monitoring. 11. LO11Explain the most effective means by which to design and implement a technology use policy. https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-1 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-2 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-3 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-4 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-5 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-6 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-7 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-7 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-7 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-8
  • 3. https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-9 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-10 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-11 12. LO12Describe the legal environment that surrounds employee use of social media technologies. page 711 Opening Scenarios SCENARIO 1 Cherita runs a small family medical practice in rural Montana and is concerned about the skyrocketing costs of medical malpractice insurance, which her office provides for all of its full-time physicians. She worries that her five-physician medical group would suffer a financial disaster if one of its workers inadvertently transferred the disease to one of their patients. Therefore, she wants to conduct a confidential HIV test of each of her present employees and also all future applicants. Cherita has several questions. First, what if a physician refuses to take the test claiming an invasion of privacy? Second, if someone’s test returns a positive result, can Cherita refuse to hire that individual or can she discharge an employee without violating federal laws protecting employees with disabilities? Third, if an employee’s tests return with a negative result, but Cherita decides to terminate the employee anyway, is she liable for the appearance that the employee is HIV positive and that Cherita terminated her or him as a consequence of the test results? Fourth, what is
  • 4. the most effective way for Cherita to ensure that the test results are kept confidential? SCENARIO 2 Abraham, a real estate agent, has three children, two of whom are in college. In order to earn extra money to help with college tuition payments, Abraham (who studied modern dance during his college career) finds a job dancing in a club that caters specifically to women. While not exactly erotic dancing (he keeps all of his clothes on), it is not ballroom dancing either. Celebrating during a bachelorette party, one of the partners of the real estate firm for which Abraham works catches sight of him dancing. When he arrives at the office the next day, she calls him into her office and orders him to quit his night job. She claims that both clients and potential clients might see him there and he would lose all credibility as a real estate agent. Does she have a right to require Abraham to do this as a condition of future employment? (Presume that he is an employee and not an independent contractor.) SCENARIO 3 Kanani receives what appears to be a legitimate email asking her to click on an embedded link to learn more about new solar technologies. Though she does not recognize the name of the sender, she clicks on the link because she works at a solar panel installation company and is always excited to learn about the latest technology. She is also on several listservs so it is not uncommon for her to receive emails such as this one. Kanani finds herself looking at a website with photos of Leonardo DiCaprio that are “not safe/suitable for work” (NSFW), which may have been Photoshopped images. She is so
  • 5. annoyed by this occurrence that she spends a few moments looking around the website trying to figure out how to unsubscribe from its list. After searching for several minutes with no luck, she leaves the website and goes back to reading her email. She responds quickly to a question from her intern and then sends an email to her teenage daughter reminding her to pick up the dog from puppy day care on her way home from school. She then returns to preparing for her upcoming presentation. A few days later, she receives a warning from her manager for using employer-owned computer equipment for personal use, including looking at NSFW materials online and emailing her daughter. She learns that her manager was using a program that alerted him any time an employee viewed certain inappropriate websites. He also was monitoring her work email account for key words and her puppy day care was flagged. Kanani is furious at the invasion of her privacy posed by this computer monitoring. Does her employer have a right to monitor her computer use in this way, and how might you suggest she respond? If you were her manager, how might you distinguish in your monitoring between appropriate technology use (if you consider this to be appropriate) and inappropriate use? https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#lo14-12 Are There Guarantees in Life? Privacy is a surprisingly vague and disputed value in contemporary society. With the tremendous increase in computer technology in recent decades, calls for greater protection of privacy have increased. Yet, there is widespread confusion page
  • 6. 712concerning the nature, extent, and value of privacy. Philosophers have argued that our society cannot maintain its core values without simultaneously guaranteeing the privacy of the individual. Edward Bloustein writes that “an individual deprived of privacy merges with the mass. His opinions, being public, tend never to be different; his aspirations, being known, tend always to be conventionally accepted ones; his feelings, being openly exhibited, tend to lose their quality of unique personal warmth and to become the feelings of every man. Such a being, although sentient, is fungible; he is not an individual.”1 Recent inventions and business methods call attention to the next step that must be taken for the protection of the person and for securing to the individual what Judge Cooley calls the right “to be let alone.” Instantaneous photographs and newspaper enterprises have invaded the sacred precincts of private and domestic life, and numerous mechanical devices threaten to make good the prediction that “what is whispered in the closet shall be proclaimed from the house-tops.”2 Philosopher Chris MacDonald explains that privacy is about having a realm of personal control from which others can be excluded at will. In other words, it has to do with freedom of action, freedom from the prying eyes of neighbors, governments, or employers. The more such freedom we have, the more privacy we have.3 Europeans generally view employee rights using a different
  • 7. perspective from that in the United States. While Americans view rights of employees in terms of the protection of their privacy, Europeans are more likely to perceive their protection with regard to human dignity, the employee’s right to be free from embarrassment and humiliation.4 The result of this distinction is that European employees generally enjoy a wider range of freedom from employer intrusion in the workplace than do U.S. employees. Indeed, some U.S. firms that engage in business internationally have found themselves in violation of EU standards, and subject to hefty fines, when they applied their privacy rules to employees who were located in the European Union. LO1 The concept of privacy as a fundamental right certainly is not limited to the United States and Europe. Islamic thought recognizes a fundamental right to privacy based in the Qur’an, which instructs: “Do not spy on one another” (49:12); and “Do not enter any houses except your own homes unless you are sure of their occupants’ consent” (24:27). Hadiths (recorded sayings of the Prophet Mohammed) report that he instructed his followers that a man should not even enter his own house suddenly or surreptitiously.5 Ancient Greece already had laws protecting privacy, and the Jewish Talmud considers privacy an aspect of one’s sanctity, providing rules for protecting one’s home. In fact, the Talmud contains reference to “harm caused by seeing” (hezeq re’iyyah) when one intrudes upon another.
  • 8. But do employees actually have a “fundamental right to privacy” as many believe? The answer to this question is not as easy as one might presume, given the wide recognition of employee rights in the workplace. The right to privacy may not be as fundamental as employees generally believe it to be, which makes it all the more important in these days of advancing information technology. Computer technology, though largely beneficial, can have a negative effect on employees if the easily obtained information is misused, incorrect, or misleading. Employers now have a greater capacity to invade an employee’s privacy than ever before. Among other devices, there are chairs that can sense and record the time an employee spends page 713at his or her desk, computer programs that measure employees’ computer keystrokes to ensure they are as productive as they should be, phones that monitor employees’ phone calls, and policies related https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn1 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn2 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn3 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn4 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn5 to workplace communication to make sure all communications are work-related. Monitoring is
  • 9. only increasing in power, ability, and frequency. Worldwide security and computer monitoring software revenue totaled $22.1 billion in 2015, a 3.7 percent increase from 2014.6 But perhaps there is a greater employer need to monitor employees in the workplace: according to a study by the National Retail Federation, in 2014, employee theft cost retailers nearly $15.2 billion, accounting for around 34.5 percent of total “retail shrinkage” (loss of inventory due to employee theft, shoplifting, paperwork errors, or supplier fraud), compared with 33.8 percent from shoplifting.7 Employers may even have good reasons for seeking seemingly private information about employees and their activities outside of work: in 2013 there were 22.4 million illicit drug users aged 18 or older in the United States. The rate of illicit drug use among those who were employed ranged from almost 10 percent (those employed on a full-time basis) to almost 14 percent (those employed on a part time basis).8 Drug use in American industry costs employers approximately $250 billion per year in lost productivity, absenteeism, attrition, safety issues, workers’ compensation claims, and hidden health care expenditures.9 and failure to perform an intensive reference and background check of an applicant may cost the employer enormous amounts in litigation fees defending claims of negligent hiring, easily outweighing the cost of a drug test, usually less than $50. In this time of increased competition in the global marketplace, each employee becomes all the more crucial to the workings of the company. An employer has a justified basis for attempting to choose the most appropriate and qualified person for the job; the
  • 10. means by which the employer obtains that information, however, may be suspect. The right to privacy is not only balanced with the arguably legitimate interests of the employer but also with the employer’s responsibility to protect employees’ and customers’ personal information. Theft of computerized customer and employee records has increased dramatically over the last decade; and the costs associated can be enormous. The hacking of Sony’s PlayStation Network in 2011 cost the company more than $71 million in direct clean-up costs; and analysts estimate that the cumulative costs of investigations, compensation, additional data security investments, and lost business could exceed a billion dollars. By one estimate, in 2011, there were 1,037 publicly reported incidents of the loss, theft, or exposure of personally identifiable information, a 30 percent increase on the previous year, and up from only 21 in 2003.10 Yet, the fact that only the largest and most audacious data breaches are reported in the media means that publicly reported breaches greatly underestimate the extent of the problem. A 2012 survey of over 1,200 U.S. small businesses (with annual revenues of less than $10 million) found that 55 percent had experienced a data breach, and of those only 33 percent notified the people affected, although 46 states require that individuals are notified when their private information is exposed.11 As of 2015, there were 34,529 known computer security incidents per day in the United States, with each breach costing around $690,000 in legal fees.12
  • 11. Whereas erosion of at-will employment was the dominant issue of the 1980s, scholars predicted that privacy would be the main theme for the 1990s and beyond. This chapter will address the employee’s rights regarding personal information page 714and the employer’s responsibilities regarding that information, as well as the employer’s right to find out both job- related and nonrelated personal information about its employees. Chapter 4 previously addressed other issues regarding the legality of information gathering through testing procedures. This chapter will not address issues relating to consumer privacy since they fall outside the scope of the chapter’s and the text’s primary focus. Background LO2 There are three ways in which privacy may be legally protected: by the Constitution (federal or state), by federal and/or state statutes, and by the common law. The U.S. Constitution does not https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn6 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn7 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn8 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn9 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn10
  • 12. https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn11 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn12 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter04.xhtml actually mention privacy, but privacy has been inferred as a necessary adjunct of other constitutional rights we hold. The right to privacy was first recognized by the Supreme Court in Griswold v. Connecticut,13 when the Court held that a Connecticut statute restricting a married couple’s use of birth control devices unconstitutionally infringed on the right to marital privacy. The Court held a constitutional guarantee of various zones of privacy as a part of the fundamental rights guaranteed by the Constitution, such as the right to free speech and the right to be free from unreasonable searches and seizures. The latter right is that on which many claims for privacy rights are based; the Court has held that under certain circumstances the required disclosure of certain types of personal information should be considered an unreasonable search. It has protected against the mandatory disclosure of personal papers, and it decided in favor of the right to make procreation decisions privately. fundamental right A right that is guaranteed by the Constitution, whether stated or not. While baseless or unjustified intrusions, at first blush, may
  • 13. appear to be completely abhorrent in our society, proponents of the argument that employers can ask whatever they please argue that if an employee does not want to offer a piece of information, there is something the employee is trying to hide. For example, why would an employee refuse to submit to a drug test if that employee is not abusing drugs? Do private-sector employers have the right to ask their employees any question they choose and take adverse employment actions against the employee if she or he refuses to answer since they are not necessarily constrained by constitutional protections? (See Exhibit 14.1, “Realities about Employee Privacy Rights.”) private sector That segment of the workforce represented by private companies (companies that are not owned or managed by the government or one of its agencies). Exhibit 14.1 Realities about Employee Privacy Rights 1. Employees do not have an absolute right to privacy in their workplace. 2. It is not a breach of an employee’s right to privacy for an employer to ask with whom the employee lives. 3. In the private sector, the Constitution does not protect employees’ right to be free from unreasonable searches and seizures. 4. Without constitutional protection, employees are safeguarded to some extent by common-law protections against invasions of privacy.
  • 14. 5. Though an employee may give information to an employer, the employer is still bound to use that information only for the purpose for which it was collected. page 715Additionally, employees are concerned about the type of information gathered in the course of applying for and holding a job. Who has access to that information? What information may be deemed “confidential,” and what does that mean to the employee? Evidently, employers perceive challenging issues among these and others with regard to privacy. According to a 2016 survey, 54 percent of firms now report that they have appointed a chief data officer. This figure represents an increase from just 12 percent in 2012; and the International Society of Chief Data Officers launched their inaugural kickoff in January 2016, with a strong commitment to carry this momentum forward on a global basis.14 Workplace Privacy, Generally LO3 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn13 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_key1 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#rch14_key1 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_key2 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#exh14-1 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
  • 15. PS/chapter14.xhtml?favre=brett#rch14_key2 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn14 Privacy protections in the workplace are a completely different animal than other types of workplace protections, such as those against discrimination on the basis of gender, disability, and age. Simply put, employees in the private-sector workplace do not have broad rights to personal privacy. Why? To begin, unlike the other areas, no comprehensive federal workplace privacy legislation exists. The protections that do exist, as discussed previously, arise from a motley collection of inferences from the Constitution, limited-purpose federal laws, assorted state laws, and some common law (court-created through case law). common law Law made and applied by judges, based on precedent (prior case law). Second, in almost every state, employees are hired at will, which means that employers can fire them for good reasons, for bad reasons, or for no reason at all (but not for an illegal reason), as we shall discuss in more detail later. If an employer legitimately can fire an employee for “bad reasons,” you can see quite clearly why an employee is not going to be successful in stating a case against the employer for violating the employee’s privacy unless the employee can fit his or her complaint specifically into one of the protections guaranteed by the federal, state, and common laws, thus turning a “bad reason” into an “illegal reason.”
  • 16. Perhaps the most effective way to understand workplace privacy protections is to examine where the protections do exist. Courts have recognized an employee’s right to privacy in the workplace where there is a “reasonable expectation of privacy.”15 However, they have also held that a work area, unlike, for instance, a bedroom, is not a place of solitude or seclusion; so, there is no expectation of privacy in that environment.16 In addition, anything that the employer provides to employees—a telephone, computer, desk, chair, or other business-related instrument— contains no expectation of privacy because it belongs to the employer, not to the employees. Thus, the content of emails, telephone calls, and computer activity conducted on employer- provided equipment is not private. Is there any reasonable expectation of privacy in the workplace? (See Exhibit 14.2, “‘Reasonable’ Areas in Which to Expect Privacy in the Workplace, Subject to Exceptions.”) Yes, employees have an expectation of privacy with regard to their body, including what they carry in their pockets. Their employer generally does not have the right to frisk them or to require them to disclose what they are carrying in their pockets; although, as we shall see later, there are situations in which such as invasion of privacy would be appropriate. This expectation extends page 716to company-provided bathrooms, changing rooms, and showers. But, should this expectation cover drug testing? We will explore that question later in this chapter.
  • 17. Exhibit 14.2 “Reasonable” Areas in Which to Expect Privacy in the Workplace, Subject to Exceptions Second, employees have an expectation of privacy in connection with items that are contained in other normally private locations, such as a purse or briefcase; however, these locations, also, are subject to exceptions under certain circumstances. For example, if an employee puts a purse in a company-provided desk drawer, the employer generally has the right to examine the desk drawer but likely not the contents of their purse. Similarly, employees have an expectation of privacy in the contents of their car that sits in the company parking lot, assuming that it is not a company car or that they are not using the car for company purposes other than to go to and from work. Their employer generally cannot go and search their car, with some exceptions. Third, employees have an expectation of privacy in their personal (not personnel) records and information. For example, they have the right to assume that their employer has no right to access their credit history, their driving record, or their family’s medical records without their permission; but, we can all imagine situations in which that rule may not apply or may be excepted. Their https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_key3 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
  • 18. PS/chapter14.xhtml?favre=brett#rch14_key3 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn15 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn16 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#exh14-2 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#exh14-2 employer, for example, could reasonably expect to access their driving history if they were applying for a job operating a company vehicle, although the employer needs their permission to do so. Finally, workers have an expectation of privacy in what they choose to do in their free time, when they are away from work. However, this expectation is not quite as extensive as one might anticipate. Plenty of employers have tried to restrict what employees do in their free time, some successfully. While the list may seem broad, the scope of workplace privacy rights is actually quite limited. The vast majority of the time during which employees are present at their employers’ offices, they are subject to monitoring and other intrusions. Employers are free to monitor their movements, the keystrokes they make on their employer-provided computers, and the time they spend communicating with co-workers. Technological improvements have not only made their task that much easier but have also generated new ideas for intruding on
  • 19. employee privacy never before imagined (iris scans, voice prints, and face geometry, to name three). page 717Now we shall examine the specifics, first exploring public-sector employee privacy, then continuing to private-sector employee privacy. Public-Sector Employee Privacy With regard to the public sector, the Constitution protects individuals from wrongful invasions by the state or by anyone acting on behalf of the government. The personal privacy of federal, state, and local employees is therefore protected from governmental intrusion and excess. As we will see later in this chapter, private-sector employees are subject to different—and often fewer— protections. public sector That segment of the workforce represented by governmental employers and governmental agency employers. In some situations, this term may include federal contractors. Constitutional Protection The Fourth Amendment and Its Exceptions For the Fourth Amendment’s protection against unreasonable search and seizure to be applicable to a given situation, there must first exist a “search or seizure.” The Supreme Court has liberally interpreted “search” to include a wide variety of activities such as the retrieval of blood samples and other bodily invasions, including urinalyses, as well as the collection of other personal information. One might imagine how this umbrella gets wider as
  • 20. technology advances. LO4 For the search to violate the Fourth Amendment, that search must be deemed unreasonable, unjustified at its inception, and impermissible in scope. You will read in the seminal Supreme Court case, O’Connor v. Ortega,17 included at the end of the chapter, that a search is justified “at its inception” where the employer has reasonable grounds for suspecting that the search will turn up evidence that the employee is guilty of work-related misconduct, or where the search is necessary for a noninvestigatory work-related purpose such as to retrieve a file. It is critical to review the O’Connor case at the end of the chapter to understand both the fundamental basis of public-sector search and seizure law as it applies to the workplace as well as much of current case law today. The Court held that a search is permissible in scope where https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_key4 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#rch14_key4 https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB PS/chapter14.xhtml?favre=brett#ch14_fn17 “the measures adopted are reasonably related to the objectives of the search and not excessively …
  • 21. ITS 833 – INFORMATION GOVERNANCE Chapter 1 – The Onslaught of Big Data and Information Governance Imperative Dr. Omar Mohamed Copyright Omar Mohamed 2019 1 1 CHAPTER GOALS AND OBJECTIVES Define or identify what is meant by “Big Data” What is the practical effects and problems associated with Big Data Solution to the Big Data problem Defining Information Governance (“IG”) Why we do not incorporate IG into everyday business Advantage of IG Effects of not incorporating IG General approach to implementing IG
  • 22. Copyright Omar Mohamed 2019 2 2 What is “Big Data”? It is a business asset capable of being leveraged. “High-volume, high-velocity and high-variety information that demands cost-effective innovative forms of information processing for enhanced insight and decision making” A combination of both structured and unstructured data that is so massive that it cannot be processed using today’s database tools and analytical software techniques. Copyright Omar Mohamed 2019 3 3
  • 23. What is the practical effect of “Big Data”? Whether or not a business enterprise will be able to sustain a competitive advantage will depend on the business’ ability to manipulate the large amount of data in a way that it to differentiate itself. Estimates are that 90% of the data existing today was created over the pat two years. Big Data and related technology and services are projected to grow at a compound annual rate of approximately 27% - leading to new opportunities for data mining and business intelligence. Copyright Omar Mohamed 2019 4 4 Issues Related to Big Data Expense –Only about 25% of data stored has real business value, 5% more is required to be maintained for legal reasons, 1% retained due to litigation hold, leaving about 69% with no real value. A great deal of irrelevant information
  • 24. Increased storage costs System failures Legal costs Conversion costs Copyright Omar Mohamed 2019 5 5 SOLUTION TO BIG DATA PROBLEMS? Information Governance Rigid Enforced Creates a smaller “information footprint” Allows business to more easily find what they need and derive business value from it Copyright Omar Mohamed 2019 6
  • 25. 6 So…What is “Information Governance”? It is discipline that emerged out of necessity… Subset of corporate governance Merged from records management, content management, information technology, data governance, information security, data privacy, risk management, litigation readiness, regulatory compliance, data preservation and business intelligence It is the way by which an organization manages the totality of its information A strategic framework composed of standards, processes, roles, and metrics that hold organizations and individuals accountable to create, organize, secure, maintain, use and dispose of information in ways that align with and contribute to the organizations goals. (Association of Records Management and Administrators)Glossary of Records and Information Management Terms, 4th Ed., 2012, TR 22-2012) Copyright Omar Mohamed 2019 7
  • 26. 7 WHY INCORPORATE “IG”? We can’t keep everything forever We can’t throw everything away E-discovery Employees want it It improves information delivery and improves productivity It does not get easier to do over time Legal requirements Helps mitigate information management risk E-mail Copyright Omar Mohamed 2019 8 8 WHY DON’T WE INCORPORATE “IG”? Cost Lack of understanding
  • 27. Lack of support from top Copyright Omar Mohamed 2019 9 9 FAILURES OF INFORMATION GOVERNANCE? Theft of valuable information Inability to protect personal, private information Breaches in legal requirements Loss of trade secrets Public reputation damage Copyright Omar Mohamed 2019 10 10 Approaches to Implementing IG
  • 28. Form proper IG policies first Review existing policy…if any Implement an awareness policy Develop an approach Project approach vs. Strategic program Identify governance body or steering committee Apply appropriate technologies for enforcement Copyright Omar Mohamed 2019 11 11 Thank You Copyright Omar Mohamed 2019 12 12
  • 29. ITS 833 – INFORMATION GOVERNANCE Chapter 1 – The Onslaught of Big Data and Information Governance Imperative Dr. Omar Mohamed Copyright Omar Mohamed 2019 1 1 CHAPTER GOALS AND OBJECTIVES Define or identify what is meant by “Big Data” What is the practical effects and problems associated with Big Data