SlideShare a Scribd company logo
EMPLOYEES AND
          INTERNET USE


Darius Whelan, Faculty of Law, University College Cork
Dublin Solicitors Bar Association Seminar, December 2012
BALANCING COMPETING INTERESTS




          Employee’s Privacy           Employer’s Interests




   Employees do not leave their privacy at the front door
    when they come to work

                                                              2
EMPLOYER‟S INTERESTS / DUTIES
 Employers have general right to determine work
  tasks and control contract performance
 Employer has property rights in equipment
 Employers may lay down quality and behaviour
  standards
 Employer must safeguard employees‟ health, safety
  and welfare
 Employer has duty of trust and confidence towards
  employee


                                                      3
PRIVACY
   Halford v UK (1997):
       Assistant Chief Constable – Office phones „tapped‟ – No
        warning
       She had a reasonable expectation of privacy and so art. 8
        had been breached
   Copland v UK (2007):
     Employer (Welsh public college) monitoring internet
      usage, e-mails and telephone traffic of Ms.C (employee)
      without her knowledge
     Content not monitored; instead names of recipients etc.
     Held: Breach of Article 8


                                                                    4
Köpke v Germany (2010)
 Employer had used covert video surveillance for
  two weeks to investigate employee for theft
 Domestic law required proportionality, etc.

 ECtHR held complaint under art. 8 manifestly ill-
  founded




                                                      5
KEY DATA PROTECTION PRINCIPLES
     Data Protection Acts 1988-2003:
         Data must be obtained and processed fairly
         Data subject must be informed of purpose for which data are
          processed
         Legitimate Processing:
             Various categories including
                 Data subject consenting to processing, or
                 processing is for „legitimate interests‟ of controller without unduly
                  prejudicing subject‟s rights/ freedoms / interests
         Data must be kept for specified, explicit and legitimate
          purposes
         There must be appropriate security measures
         Data subject has right of access to data

                                                                                          6
Gresham Hotel (2007)
   Data Protection Commissioner Case Study 6 of 2007
   Covert video surveillance
   Other employees being investigated, not this particular
    employee
   Gardaí were not involved
   Commissioner found data was being processed in a manner
    incompatible with its purpose
   Covert surveillance would require actual involvement of
    Gardaí or intention to involve them
   Amicable resolution reached

                                                              7
   Ali v First Quench (2001)
     Covert video surveillance in off-licence office – thefts of
      stock – Mr A prime suspect
     Mr A was filmed having sexual intercourse in office while
      shop open
     Dismissal fair


   McGowan v Scottish Water (2004)
     Video surveillance of employee‟s house, due to
      suspicion of timesheet irregularities
     Dismissal fair; did not breach privacy


                                                                    8
   Mehigan v Dyflin Publications (Ireland, 2002)
       M received 3 pornographic images by e-mail and forwarded them
        on to someone else
       Tribunal did not accept this was a one-off incident. Evidence of
        other material on computer inc. sexual cartoons
       E-mails can often cause offence
       The EAT will be heavily influenced by the existence of a written
        policy reserving right to dismiss
       Unlikely dismissal permissible otherwise
       Possible exception – downloading obscene pornography
           (Distinction between facts here and „exceptional‟ cases unclear)
       Onus on employer to introduce policy
       Dismissal unfair, but employee contributed substantially
       €2,000 for unfair dismissal plus €2,800 in lieu of notice
                                                                               9
Murray and Rooney v ICS Building Society (2011)
 Two employees allegedly circulated pornography by
  email
 EAT found investigation flawed

 Investigation took place without their knowledge;
  they could not make submissions on terms of
  reference
 Investigation involved only small sample of emails
  and did not include employees who had deleted
  emails
 Dismissal was disproportionate
                                                       10
 €30,000 to one employee; €36,000 to the other
Kiernan v A Wear (2008)
 Employee posted derogatory comments on BEBO

 E.g. Regarding manager “She called me a liar. I
  f**ing hate that c**t”
 Visible to customers

 Fair investigation held. Employee dismissed

 EAT found dismissal disproportionate

 Employee contributed to her dismissal

 €4,000 for unfair dismissal
                                                    11
Walker v Bausch and Lomb (2009)
 Employee wrote on intranet: “500 jobs to be gone at
  Waterford plant before end of first quarter 2008”
 No proof that employee had received intranet policy

 Fair hearing held. Employee dismissed.

 EAT found dismissal disproportionate

 Employee greatly contributed to situation

 €6,500 for unfair dismissal




                                                        12
O’Mahony v PJF Insurances (2011)
 Facebook – Employee called manager a “bitch”

 At first, the page was accidentally seen

 Employee then allowed full access

 A number of disparaging comments

 Suspended pending investigation

 EAT – Significant breach of trust which made
  employment untenable
 Employer acted reasonably. Dismissal fair.



                                                 13
GUIDANCE

    Council of Europe
        Recommendation R (89) 2 on Protection of
         Personal Data Used for Employment
         Purposes 1989
    International Labour Organisation
        Code of Practice on Protection of Workers‟
         Personal Data 1997
   Article 29 Working Party
     Opinion 8/2001 on processing of personal data in the
      employment context
     Opinion 4/2004 on video surveillance
 Data Protection Commissioner (Ireland), Monitoring
  of Staff, Guidance Note, 2004
 Data Protection Commissioner (Ireland), Data
  Protection and CCTV, Guidance Note, 2004




                                                             15
DRAWING UP A POLICY
   Review legislation, guidance and cases
   Clarify purposes of monitoring (if any) – must be
    proportionate
   Notify purposes of monitoring to employees – e.g.
    state if can be used for disciplinary purposes; may
    ultimately lead to dismissal; misconduct v gross
    misconduct
   Clarify ownership of Twitter followers, etc.
   Perhaps permit reasonable personal use of e-mail /
    internet / social media
   Regular reminders of policy
   Other issues – see material cited

                                                          16
   References - See list provided



   Contact Details:
       Dr Darius Whelan, Faculty of Law,
       University College Cork
       http://research.ucc.ie/profiles/B012/dwhelan
       Email d.whelan@ucc.ie
       Twitter: @dariuswirl




                                                       17

More Related Content

What's hot

NIS.docx
NIS.docxNIS.docx
NIS.docx
PremBorse1
 
DNS
DNSDNS
DNSFTC
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
SRIMCA
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
Khokan Sardar
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
Sachin Darekar
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
BioEnable
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
Intrader Amit
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and Communications
Charlie Pownall
 
Fundamental Cloud Security
Fundamental Cloud SecurityFundamental Cloud Security
Fundamental Cloud Security
Mohammed Sajjad Ali
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
Assistant Professor
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
waseem ahmad
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
Prakriti Dubey
 

What's hot (20)

NIS.docx
NIS.docxNIS.docx
NIS.docx
 
DNS
DNSDNS
DNS
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Classless subnetting
Classless subnettingClassless subnetting
Classless subnetting
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and Communications
 
Fundamental Cloud Security
Fundamental Cloud SecurityFundamental Cloud Security
Fundamental Cloud Security
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
 

Viewers also liked

Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

Dobusch Leonhard
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
Sue Barrett
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Darius Whelan
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
gfair3
 
Managing New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipManaging New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipViktoria Kachaluba
 
Employee Rights
Employee RightsEmployee Rights
Employee Rights
sh_neha252
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
guest9e3d59
 

Viewers also liked (9)

Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Managing New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipManaging New Venture Formation and Entrepreneurship
Managing New Venture Formation and Entrepreneurship
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Employee Rights
Employee RightsEmployee Rights
Employee Rights
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Similar to Employees and Internet Use - Legal Aspects

Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal Perspective
Darius Whelan
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
Charles Mok
 
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
nuances public affairs
 
Privacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and SurveillancePrivacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and Surveillance
Overholt Law
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018
Surabhi Jain
 
CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2
CMSLondon
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringDan Michaluk
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Chad Gilles
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Osborne Clarke
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015
CRISP Project
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
FIA2010
 
2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases
Krishna De
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
mrcox
 
Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture  Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture
LauraMartin276
 

Similar to Employees and Internet Use - Legal Aspects (20)

Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal Perspective
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
 
Law w23
Law w23Law w23
Law w23
 
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
 
Privacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and SurveillancePrivacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and Surveillance
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
 
Abubakar munir iisf2011
Abubakar munir iisf2011Abubakar munir iisf2011
Abubakar munir iisf2011
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture  Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture
 

More from Darius Whelan

Legal Capacity
Legal CapacityLegal Capacity
Legal Capacity
Darius Whelan
 
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Darius Whelan
 
Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020
Darius Whelan
 
Copyright Law for Digital Learning
Copyright Law for Digital Learning Copyright Law for Digital Learning
Copyright Law for Digital Learning
Darius Whelan
 
Copyright Law Update
Copyright Law Update Copyright Law Update
Copyright Law Update
Darius Whelan
 
LLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, IrelandLLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, Ireland
Darius Whelan
 
Human Rights and Mental Health Tribunals
Human Rights and Mental Health TribunalsHuman Rights and Mental Health Tribunals
Human Rights and Mental Health Tribunals
Darius Whelan
 
Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation
Darius Whelan
 
Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing
Darius Whelan
 
Proposed changes in the law on legal capacity
Proposed changes in the law on legal capacityProposed changes in the law on legal capacity
Proposed changes in the law on legal capacity
Darius Whelan
 
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition PerspectiveShari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Darius Whelan
 
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Darius Whelan
 
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's PerspectiveMaria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Darius Whelan
 
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Darius Whelan
 
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Darius Whelan
 
Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)
Darius Whelan
 
Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK
Darius Whelan
 
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Darius Whelan
 
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Darius Whelan
 
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Darius Whelan
 

More from Darius Whelan (20)

Legal Capacity
Legal CapacityLegal Capacity
Legal Capacity
 
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
 
Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020
 
Copyright Law for Digital Learning
Copyright Law for Digital Learning Copyright Law for Digital Learning
Copyright Law for Digital Learning
 
Copyright Law Update
Copyright Law Update Copyright Law Update
Copyright Law Update
 
LLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, IrelandLLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, Ireland
 
Human Rights and Mental Health Tribunals
Human Rights and Mental Health TribunalsHuman Rights and Mental Health Tribunals
Human Rights and Mental Health Tribunals
 
Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation
 
Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing
 
Proposed changes in the law on legal capacity
Proposed changes in the law on legal capacityProposed changes in the law on legal capacity
Proposed changes in the law on legal capacity
 
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition PerspectiveShari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
 
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
 
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's PerspectiveMaria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
 
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
 
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
 
Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)
 
Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK
 
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
 
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
 
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
 

Employees and Internet Use - Legal Aspects

  • 1. EMPLOYEES AND INTERNET USE Darius Whelan, Faculty of Law, University College Cork Dublin Solicitors Bar Association Seminar, December 2012
  • 2. BALANCING COMPETING INTERESTS Employee’s Privacy Employer’s Interests  Employees do not leave their privacy at the front door when they come to work 2
  • 3. EMPLOYER‟S INTERESTS / DUTIES  Employers have general right to determine work tasks and control contract performance  Employer has property rights in equipment  Employers may lay down quality and behaviour standards  Employer must safeguard employees‟ health, safety and welfare  Employer has duty of trust and confidence towards employee 3
  • 4. PRIVACY  Halford v UK (1997):  Assistant Chief Constable – Office phones „tapped‟ – No warning  She had a reasonable expectation of privacy and so art. 8 had been breached  Copland v UK (2007):  Employer (Welsh public college) monitoring internet usage, e-mails and telephone traffic of Ms.C (employee) without her knowledge  Content not monitored; instead names of recipients etc.  Held: Breach of Article 8 4
  • 5. Köpke v Germany (2010)  Employer had used covert video surveillance for two weeks to investigate employee for theft  Domestic law required proportionality, etc.  ECtHR held complaint under art. 8 manifestly ill- founded 5
  • 6. KEY DATA PROTECTION PRINCIPLES  Data Protection Acts 1988-2003:  Data must be obtained and processed fairly  Data subject must be informed of purpose for which data are processed  Legitimate Processing:  Various categories including  Data subject consenting to processing, or  processing is for „legitimate interests‟ of controller without unduly prejudicing subject‟s rights/ freedoms / interests  Data must be kept for specified, explicit and legitimate purposes  There must be appropriate security measures  Data subject has right of access to data 6
  • 7. Gresham Hotel (2007)  Data Protection Commissioner Case Study 6 of 2007  Covert video surveillance  Other employees being investigated, not this particular employee  Gardaí were not involved  Commissioner found data was being processed in a manner incompatible with its purpose  Covert surveillance would require actual involvement of Gardaí or intention to involve them  Amicable resolution reached 7
  • 8. Ali v First Quench (2001)  Covert video surveillance in off-licence office – thefts of stock – Mr A prime suspect  Mr A was filmed having sexual intercourse in office while shop open  Dismissal fair  McGowan v Scottish Water (2004)  Video surveillance of employee‟s house, due to suspicion of timesheet irregularities  Dismissal fair; did not breach privacy 8
  • 9. Mehigan v Dyflin Publications (Ireland, 2002)  M received 3 pornographic images by e-mail and forwarded them on to someone else  Tribunal did not accept this was a one-off incident. Evidence of other material on computer inc. sexual cartoons  E-mails can often cause offence  The EAT will be heavily influenced by the existence of a written policy reserving right to dismiss  Unlikely dismissal permissible otherwise  Possible exception – downloading obscene pornography  (Distinction between facts here and „exceptional‟ cases unclear)  Onus on employer to introduce policy  Dismissal unfair, but employee contributed substantially  €2,000 for unfair dismissal plus €2,800 in lieu of notice 9
  • 10. Murray and Rooney v ICS Building Society (2011)  Two employees allegedly circulated pornography by email  EAT found investigation flawed  Investigation took place without their knowledge; they could not make submissions on terms of reference  Investigation involved only small sample of emails and did not include employees who had deleted emails  Dismissal was disproportionate 10  €30,000 to one employee; €36,000 to the other
  • 11. Kiernan v A Wear (2008)  Employee posted derogatory comments on BEBO  E.g. Regarding manager “She called me a liar. I f**ing hate that c**t”  Visible to customers  Fair investigation held. Employee dismissed  EAT found dismissal disproportionate  Employee contributed to her dismissal  €4,000 for unfair dismissal 11
  • 12. Walker v Bausch and Lomb (2009)  Employee wrote on intranet: “500 jobs to be gone at Waterford plant before end of first quarter 2008”  No proof that employee had received intranet policy  Fair hearing held. Employee dismissed.  EAT found dismissal disproportionate  Employee greatly contributed to situation  €6,500 for unfair dismissal 12
  • 13. O’Mahony v PJF Insurances (2011)  Facebook – Employee called manager a “bitch”  At first, the page was accidentally seen  Employee then allowed full access  A number of disparaging comments  Suspended pending investigation  EAT – Significant breach of trust which made employment untenable  Employer acted reasonably. Dismissal fair. 13
  • 14. GUIDANCE  Council of Europe  Recommendation R (89) 2 on Protection of Personal Data Used for Employment Purposes 1989  International Labour Organisation  Code of Practice on Protection of Workers‟ Personal Data 1997
  • 15. Article 29 Working Party  Opinion 8/2001 on processing of personal data in the employment context  Opinion 4/2004 on video surveillance  Data Protection Commissioner (Ireland), Monitoring of Staff, Guidance Note, 2004  Data Protection Commissioner (Ireland), Data Protection and CCTV, Guidance Note, 2004 15
  • 16. DRAWING UP A POLICY  Review legislation, guidance and cases  Clarify purposes of monitoring (if any) – must be proportionate  Notify purposes of monitoring to employees – e.g. state if can be used for disciplinary purposes; may ultimately lead to dismissal; misconduct v gross misconduct  Clarify ownership of Twitter followers, etc.  Perhaps permit reasonable personal use of e-mail / internet / social media  Regular reminders of policy  Other issues – see material cited 16
  • 17. References - See list provided  Contact Details:  Dr Darius Whelan, Faculty of Law,  University College Cork  http://research.ucc.ie/profiles/B012/dwhelan  Email d.whelan@ucc.ie  Twitter: @dariuswirl 17