SlideShare a Scribd company logo
1 of 47
Chapter 14
The Employee’s
Right to Privacy, and
Management of
Personal
Information
©2019 McGraw-Hill Education. All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without
the prior written consent of McGraw-Hill Education.
14-2
©2019 McGraw-Hill Education.
Learning Objectives 1
• Describe the nature of privacy as a fundamental
right.
• Explain the three general ways in which privacy is
legally protected in the United States.
• Define the legal concept of a “reasonable expectation
of privacy” and its application to the workplace.
• Identify and apply the standard for unreasonable
searches and seizures under the Fourth Amendment.
14-3
©2019 McGraw-Hill Education.
Learning Objectives 2
• Explain the distinctions between the protections for
public- and private-sector privacy protections.
• Describe the legal framework that applies to private-
sector privacy cases.
• Identify and differentiate the prima facie cases for
common-law claims of privacy invasions (intrusion
into seclusion, public disclosure of private facts,
publication in a false light, and breach of
contract/defamation).
14-4
©2019 McGraw-Hill Education.
Learning Objectives 3
• Explain the extent to which an employer can legally
dictate the off-work acts of its employees.
• Discuss how advances in technology have impacted
employee privacy.
• State the key business justifications for employee
monitoring.
14-5
©2019 McGraw-Hill Education.
Learning Objectives 4
• Explain the most effective means by which to design
and to implement a technology use policy.
• Describe the legal environment that surrounds
employee use of social media technologies.
14-6
©2019 McGraw-Hill Education.
Are There Guarantees in Life?
• Recent inventions and business methods call
attention to the need for what is called the right “to
be let alone.”
• European employees generally enjoy a wider range of
freedom from employer intrusion in the workplace
than do U.S. employees.
• It is the employer’s responsibility to protect
employees’ and customers’ personal information.
14-7
©2019 McGraw-Hill Education.
Background
Privacy may be protected by.
• Constitution (federal or state).
• federal and/or state statutes.
• common law principles.
Fundamental rights: Right guaranteed by the Constitution,
whether stated or not.
• Required disclosure of certain types of personal information
should be considered an unreasonable search.
14-8
©2019 McGraw-Hill Education.
Realities about Employee Privacy Rights 1
• Employees do not have an absolute right to privacy in
their workplace.
• It is not a breach of an employee’s right to privacy for
an employer to ask with whom the employee lives.
• In the private sector, the Constitution does not protect
employees’ right to be free from unreasonable
searches and seizures.
14-9
©2019 McGraw-Hill Education.
Realities about Employee Privacy Rights 2
• Without constitutional protection, employees are
safeguarded to some extent by common law protections
against invasions of privacy.
• Though an employee may give information to an
employer, the employer is still bound to use that
information only for the purpose for which it was
collected.
14-10
©2019 McGraw-Hill Education.
Workplace Privacy, Generally
No broad rights to personal workplace privacy.
• No comprehensive federal workplace privacy legislation exists.
In almost every state, employees may be hired and
fired at will (provided it is not for illegal reasons).
14-11
©2019 McGraw-Hill Education.
Zones of Workplace Privacy
“Reasonable” areas in which to expect
privacy in the workplace.
• One’s body and physical space; one has a reasonable expectation to be
free from a pat-down or body search.
• Normally private locations, such as a purse or briefcase.
• Personal information, accessed without permission.
14-12
©2019 McGraw-Hill Education.
Public-Sector Employee Privacy1
Constitution protects individuals from wrongful
invasions by the state or by anyone acting on behalf of
the government.
Fourth Amendment: Protection against unreasonable
searches and seizures.
• Supreme Court has liberally interpreted “search” to
include a wide variety of activities.
• Retrieval of blood samples and other bodily invasions, including
urinalyses and collection of other personal information.
14-13
©2019 McGraw-Hill Education.
Public Sector Employee Privacy2
For the search to violate the Fourth Amendment, it
must be deemed unreasonable, unjustified at its
inception, and impermissible in scope.
• Case: O’Connor v. Ortega.
All searches that are conducted without a judicially
issued warrant based on a finding of reasonable cause
are generally held to be unreasonable.
14-14
©2019 McGraw-Hill Education.
Public Sector Employee Privacy3
Search of employer-owned property: Consent should
be obtained prior to the search, and employees should
be made well aware of the procedures involved.
• E.g., desks or lockers.
Employee may have a claim for false imprisonment
when being detained during a search.
14-15
©2019 McGraw-Hill Education.
Public Sector Employee Privacy4
Fifth and Fourteenth Amendments tests.
• Strict scrutiny of fundamental rights requires compelling state
interest justification.
• State may impose any restrictions that can be shown to be
rationally related to a valid state interest.
• Is the right fundamental?
• Implicit in the concept of ordered liberty.
• Deeply rooted in this Nation’s history and tradition.
• No general right of the individual to be left alone.
14-16
©2019 McGraw-Hill Education.
The Privacy Act of 1974 1
Regulates the release of personal information about
federal employees by federal agencies.
Basic principles.
• To restrict disclosure of personally identifiable records
maintained by agencies.
• To grant individuals increased rights of access to agency
records maintained on themselves.
14-17
©2019 McGraw-Hill Education.
The Privacy Act of 1974 2
• To grant individuals the right to seek amendment of agency
records maintained on themselves that are inaccurate.
• To establish a code of “fair information practices.”
Right to privacy is not absolute.
• Extent of protection varies with the extent of the intrusion.
• Interests of the employee are balanced against the interests of
the employer.
14-18
©2019 McGraw-Hill Education.
Privacy Protection Study Commission 1
Purpose.
• Studying the possibility of extending the Privacy Act to the
private sector.
Recommended that:
• Use of polygraph tests in employment-related issues be
prohibited.
• Pretext interviews be prohibited.
14-19
©2019 McGraw-Hill Education.
Privacy Protection Study Commission 2
• Use of arrest or criminal records in employment decisions be
prohibited except where otherwise allowed or required by
law.
• Employers be required to use reasonable care in selection of
their investigating agencies.
• Federal Fair Credit Reporting Act provisions be strengthened.
Recommendations have yet to be implemented by
Congress.
14-20
©2019 McGraw-Hill Education.
Wiretapping
Title III of the Federal Wiretap Act.
• Governs the interception of oral, wire, and electronic
communications related to serious criminal offenses.
• Basis for statutes in all states.
• Wiretapping is increasing.
• 17 percent rise in 2015.
• No state applications have been denied.
14-21
©2019 McGraw-Hill Education.
Electronic Communications Privacy Act
(ECPA)
Covers all forms of digital communication.
• Includes transmissions of text and digitalized images, in
addition to voice communications on the telephone.
• Prohibits unauthorized eavesdropping, by all persons and
businesses, not only by the government.
• “Interception” applies only to messages in transit and not to
messages that have actually reached company computers.
14-22
©2019 McGraw-Hill Education.
Private Sector Employee Privacy
In private-sector employment environment:
• Privacy rights in the private sector of employment are
limited.
• No constitutional protection is triggered.
Difference between public- and private-sector privacy
protections is compliance-related costs for private
employers.
14-23
©2019 McGraw-Hill Education.
Legal Framework for Employee Rights in
the Private Sector 1
Employment-at-will.
• Employers are free to fire an employee, and employees are
free to leave the position, at any time and for any reason.
Protection for private-sector employees.
• Federal and state statutory protections, such as anti-
discrimination laws.
• Employment contracts, where they exist.
14-24
©2019 McGraw-Hill Education.
Legal Framework for Employee Rights in
the Private Sector 2
• Collective bargaining agreements, where applicable.
• State law exceptions to employment-at-will.
• Violations of public policy.
• Breaches of implied contracts.
• Other statutory exceptions.
14-25
©2019 McGraw-Hill Education.
Bases for Right to Privacy in the Private
Sector 1
Statutory Claims.
• Enacting legislation mirroring federal law regarding the
compilation and dissemination of information.
• Recognizing a constitutional right to privacy under their state
constitutions.
• Protecting employees only in certain areas of employment.
• E.g., personnel records or the use of credit information.
• Federal laws and the Constitution affording protection only to
federal employees and those subject to state action.
14-26
©2019 McGraw-Hill Education.
Bases for Right to Privacy in the Private
Sector 2
Tort Law Protections/Common Law.
• Tort is a private (civil) wrong against a person or her or his
property.
• Publication as used in these torts means “bringing it to light”
or disseminating the information.
Privacy Protections at common law.
• Intrusion into Seclusion.
• Wrongful invasion that is objectionable to a reasonable person.
• Scenario 1.
14-27
©2019 McGraw-Hill Education.
Bases for Right to Privacy in the Private
Sector 3
Public disclosure of private facts.
• Intentional or negligent public disclosure of private matters.
• Such disclosure would be objectionable to a reasonable person of ordinary
sensitivities.
• Case: Pemberton v. Bethlehem Steel Corp.
• Publication in a false light.
• Public disclosure of facts that place the employee in a false light.
14-28
©2019 McGraw-Hill Education.
Bases for Right to Privacy in the Private
Sector 4
• Breach of contract.
• May be contested as an invasion of privacy by one’s employer.
• Defamation.
• Libel - Defamation in a written document.
• Slander - Defamation in an oral statement.
14-29
©2019 McGraw-Hill Education.
Regulation of Employee’s Off-Work
Activities
Generally, private activities may be regulated if off-
work conduct affects employee performance.
• State legislations limit an employer’s reach.
Attitudes on workplace dating have the greatest
impact.
• Case: McCavitt v. Swiss Reinsurance America Corp.
14-30
©2019 McGraw-Hill Education.
Employer’s Information-Gathering Process/Justified
Use/Disclosure of Information 1
Risks in process of information gathering.
• Harassment.
• Improper use of information.
• Improper data management.
Function creep: May begin with the voluntary
transmission of information by an individual for one
purpose for which the individual consents.
14-31
©2019 McGraw-Hill Education.
Employee Monitoring: Old Practice, New
Face
• New technologies have dramatically increased the
range and power of the ways by which to gather the
information to which familiar ethical concerns
pertain.
• Boundary-less workplace: Lines between personal
and professional time, space, and equipment are
blurred.
14-32
©2019 McGraw-Hill Education.
How Monitoring Works: Practice and
Prevalence
Employee theft has led both public and private
employers to increase monitoring of employees.
• “Retail shrinkage.”
Use of technology such as:
• Global Positioning System (GPS.)
• Radio frequency identification devices (RFIDs.)
• Biometric technology.
• Big Data collection.
14-33
©2019 McGraw-Hill Education.
Evolving Legal Environment 1
Statutes and cases beginning to address employer
monitoring issues.
• Case: City of Ontario v. Quon.
• Balance of reasonable expectation of privacy and good business-related
justification of interest.
• Business justification for monitoring employees’ technology
use.
• Employers are particularly concerned about productivity loss due to
time spent online.
• Protection against liability.
14-34
©2019 McGraw-Hill Education.
Evolving Legal Environment 2
• Inappropriate use of Web software - Danger of exposing the firm to
potentially significant copyright infringement liability.
• Obscenity - Poses both legal and reputational risks when employees
download pornographic images while at work.
Employers should develop a formal policy or program
regulating employee usage of the Internet.
14-35
©2019 McGraw-Hill Education.
Case of Employee Email
Employers must ensure that the email system is not
being used in ways that offend others or harm morale.
• Review emails in connection with a reasonable investigation of
possible employee misconduct.
Employers should provide notification when emails are
being monitored.
• Notice of Electronic Monitoring Act.
14-36
©2019 McGraw-Hill Education.
Percent of U.S. Companies Monitor Their
Employees’ Internet Use
Source: “The Rise of Workplace Spying,” The Week (July 5, 2015),
http://theweek.com/articles/564263/rise-workplace-spying.
Access the long description slide.
14-37
©2019 McGraw-Hill Education.
Developing Computer Use Policies 1
Employers should develop concise written policies and
procedures regarding the use of company computers.
Suggested guidelines.
• No monitoring in highly private areas.
• Monitoring should be limited to the workplace.
• Full access to any information gathered through monitoring.
• Continuous monitoring should be banned.
14-38
©2019 McGraw-Hill Education.
Developing Computer Use Policies 2
• All forms of secret monitoring should be banned.
• Advance notice should be given.
• Only information relevant to the job should be collected.
• Monitoring should result in the attainment of some business
interest.
14-39
©2019 McGraw-Hill Education.
Bring Your Own Device (BYOD)
Employees increasingly use their personal
smartphones, tablets, or laptops for business purposes.
• Decreases company costs for devices, data, and IT support.
• Poses a number of practical and legal risks.
Challenges:
• Data stored on devices.
• Networks that the devices access.
• Secure approach – Virtualization.
14-40
©2019 McGraw-Hill Education.
Blogging and Other Social Media
(“Web 2.0”)
Employer Social Media policy recommendations:
• Defined objectives that do not overreach.
• Reminder that company policies apply.
• Personal comment rules.
• Disclosure, monitoring, and copyright reminders.
14-41
©2019 McGraw-Hill Education.
Waivers of Privacy Rights
Search: Physical invasion of a person’s space,
belongings, or body.
Waiver: Intentional relinquishment of a known right.
• Exists at all stages of employment.
14-42
©2019 McGraw-Hill Education.
Privacy Rights Since September 11, 2001
USA Patriot Act.
• Expanded states’ rights with regard to Internet surveillance
technology.
• Grants access to sensitive data with only a court order rather
than a judicial warrant.
Government is now allowed to monitor anyone on the
Internet simply by contending that the information is
“relevant” to an ongoing criminal investigation.
14-43
©2019 McGraw-Hill Education.
Management Tips 1
• Develop and publish policies that reserve your right
to monitor, gain access to, or disclose all emails in
your system.
• Ensure that any policy that applies to emails also
applies to instant messaging (IM).
• Ensure that the privacy policy accounts for these
social media technologies and strikes the right
balance between appropriate and inappropriate uses.
14-44
©2019 McGraw-Hill Education.
Management Tips 2
• Privacy policy should be clear that employees have
no expectation of privacy in all employer-provided
equipment.
• Monitoring policies should be clearly stated.
• Avoid content-based and real-time monitoring.
• Be sure to investigate the specific protections for
which you are responsible in the states in which you
do business.
14-45
©2019 McGraw-Hill Education.
Management Tips 3
• Your privacy policy should be targeted to protect your
business interests.
• Be wary of overrestricting since courts do not look on
these regulations positively.
• Consider focusing the policy of regulating the off-
work activities on the possible negative impact of off-
duty conduct on the employer’s business interests
and on the public’s perception of the employer.
14-46
©2019 McGraw-Hill Education.
Management Tips 4
Less likely to find problems with a waiver of privacy
rights where the waiver is accompanied by an offer of
employment.
Ensure that you comply with all privacy rules required
by HIPAA.
Regulate access to information.
• Unwarranted disclosure might constitute an invasion of
privacy even where the original collection of information is
allowed.
Keep abreast of current developments.
14-47
©2019 McGraw-Hill Education.
Percent of U.S. Companies Monitor Their
Employees’ Internet Use Long Description
Measured are three sets of data: tracking employee
emails (at about 42%); logging keystrokes (about 45%);
and monitoring employees' Internet usage (65%).
Return to slide containing original image.

More Related Content

What's hot

Data Retention in the UK
Data Retention in the UKData Retention in the UK
Data Retention in the UK
blogzilla
 
The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...
The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...
The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...
Kinfe Micheal Yilma
 

What's hot (20)

Werksmans presentations on popi
Werksmans presentations on popiWerksmans presentations on popi
Werksmans presentations on popi
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A Presentation
 
The Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCMThe Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCM
 
Popi act presentation
Popi act presentationPopi act presentation
Popi act presentation
 
Data Retention in the UK
Data Retention in the UKData Retention in the UK
Data Retention in the UK
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinar
 
Legislation
LegislationLegislation
Legislation
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
POPI Update 2013
POPI Update 2013POPI Update 2013
POPI Update 2013
 
The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...
The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...
The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of ...
 
POPI
POPI POPI
POPI
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
Ben soltane on Access to Information
Ben soltane on Access to InformationBen soltane on Access to Information
Ben soltane on Access to Information
 
Hashim haswira
Hashim haswiraHashim haswira
Hashim haswira
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 

Similar to HR 210 Bennett9e ppt ch14

Chapter 13Employees Rights and DisciplineCopyrig
Chapter 13Employees Rights and DisciplineCopyrigChapter 13Employees Rights and DisciplineCopyrig
Chapter 13Employees Rights and DisciplineCopyrig
EstelaJeffery653
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse
Wendi Lazar
 
UNIT-4 PART -3 UNFAIR COM.pptx
UNIT-4 PART -3 UNFAIR COM.pptxUNIT-4 PART -3 UNFAIR COM.pptx
UNIT-4 PART -3 UNFAIR COM.pptx
GovadaDhana
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
Altacit Global
 
FINAL Employers Guide to Best Practices 2013 (1)
FINAL Employers Guide to Best Practices 2013 (1)FINAL Employers Guide to Best Practices 2013 (1)
FINAL Employers Guide to Best Practices 2013 (1)
Julie Sweeney
 
Foley v. Interactive Data Corp. (1988) 47 C3d 654 [After .docx
Foley v. Interactive Data Corp. (1988) 47 C3d 654  [After .docxFoley v. Interactive Data Corp. (1988) 47 C3d 654  [After .docx
Foley v. Interactive Data Corp. (1988) 47 C3d 654 [After .docx
budbarber38650
 

Similar to HR 210 Bennett9e ppt ch14 (20)

HR 210 Bennett9e ppt ch02
HR 210 Bennett9e ppt ch02HR 210 Bennett9e ppt ch02
HR 210 Bennett9e ppt ch02
 
HR 210 Bennett9e ppt ch03
HR 210 Bennett9e ppt ch03HR 210 Bennett9e ppt ch03
HR 210 Bennett9e ppt ch03
 
HR 210 Bennett9e ppt ch07
HR 210 Bennett9e ppt ch07HR 210 Bennett9e ppt ch07
HR 210 Bennett9e ppt ch07
 
HR 210 Bennett9e ppt ch04
HR 210 Bennett9e ppt ch04HR 210 Bennett9e ppt ch04
HR 210 Bennett9e ppt ch04
 
HR 210 Bennett9e ppt ch01
HR 210 Bennett9e ppt ch01 HR 210 Bennett9e ppt ch01
HR 210 Bennett9e ppt ch01
 
Chapter 13Employees Rights and DisciplineCopyrig
Chapter 13Employees Rights and DisciplineCopyrigChapter 13Employees Rights and DisciplineCopyrig
Chapter 13Employees Rights and DisciplineCopyrig
 
Defend Trade Secrets Act: What You Need to Know
Defend Trade Secrets Act: What You Need to KnowDefend Trade Secrets Act: What You Need to Know
Defend Trade Secrets Act: What You Need to Know
 
HR 210 Bennett9e ppt ch13
HR 210 Bennett9e ppt ch13HR 210 Bennett9e ppt ch13
HR 210 Bennett9e ppt ch13
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse
 
UNIT-4 PART -3 UNFAIR COM.pptx
UNIT-4 PART -3 UNFAIR COM.pptxUNIT-4 PART -3 UNFAIR COM.pptx
UNIT-4 PART -3 UNFAIR COM.pptx
 
Hey that's my client! Protecting client lists and confidential information wh...
Hey that's my client! Protecting client lists and confidential information wh...Hey that's my client! Protecting client lists and confidential information wh...
Hey that's my client! Protecting client lists and confidential information wh...
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
 
FINAL Employers Guide to Best Practices 2013 (1)
FINAL Employers Guide to Best Practices 2013 (1)FINAL Employers Guide to Best Practices 2013 (1)
FINAL Employers Guide to Best Practices 2013 (1)
 
HR 210 Bennett9e ppt ch16
HR 210 Bennett9e ppt ch16HR 210 Bennett9e ppt ch16
HR 210 Bennett9e ppt ch16
 
HR 210 Bennett9e ppt ch16
HR 210 Bennett9e ppt ch16HR 210 Bennett9e ppt ch16
HR 210 Bennett9e ppt ch16
 
Employee Rights
Employee RightsEmployee Rights
Employee Rights
 
Determination of trade secret status
Determination of trade secret statusDetermination of trade secret status
Determination of trade secret status
 
Foley v. Interactive Data Corp. (1988) 47 C3d 654 [After .docx
Foley v. Interactive Data Corp. (1988) 47 C3d 654  [After .docxFoley v. Interactive Data Corp. (1988) 47 C3d 654  [After .docx
Foley v. Interactive Data Corp. (1988) 47 C3d 654 [After .docx
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 

More from BealCollegeOnline (20)

BA650 Week 3 Chapter 3 "Why Change? contemporary drivers and pressures
BA650 Week 3 Chapter 3 "Why Change? contemporary drivers and pressuresBA650 Week 3 Chapter 3 "Why Change? contemporary drivers and pressures
BA650 Week 3 Chapter 3 "Why Change? contemporary drivers and pressures
 
BIO420 Chapter 25
BIO420 Chapter 25BIO420 Chapter 25
BIO420 Chapter 25
 
BIO420 Chapter 24
BIO420 Chapter 24BIO420 Chapter 24
BIO420 Chapter 24
 
BIO420 Chapter 23
BIO420 Chapter 23BIO420 Chapter 23
BIO420 Chapter 23
 
BIO420 Chapter 20
BIO420 Chapter 20BIO420 Chapter 20
BIO420 Chapter 20
 
BIO420 Chapter 18
BIO420 Chapter 18BIO420 Chapter 18
BIO420 Chapter 18
 
BIO420 Chapter 17
BIO420 Chapter 17BIO420 Chapter 17
BIO420 Chapter 17
 
BIO420 Chapter 16
BIO420 Chapter 16BIO420 Chapter 16
BIO420 Chapter 16
 
BIO420 Chapter 13
BIO420 Chapter 13BIO420 Chapter 13
BIO420 Chapter 13
 
BIO420 Chapter 12
BIO420 Chapter 12BIO420 Chapter 12
BIO420 Chapter 12
 
BIO420 Chapter 09
BIO420 Chapter 09BIO420 Chapter 09
BIO420 Chapter 09
 
BIO420 Chapter 08
BIO420 Chapter 08BIO420 Chapter 08
BIO420 Chapter 08
 
BIO420 Chapter 06
BIO420 Chapter 06BIO420 Chapter 06
BIO420 Chapter 06
 
BIO420 Chapter 05
BIO420 Chapter 05BIO420 Chapter 05
BIO420 Chapter 05
 
BIO420 Chapter 04
BIO420 Chapter 04BIO420 Chapter 04
BIO420 Chapter 04
 
BIO420 Chapter 03
BIO420 Chapter 03BIO420 Chapter 03
BIO420 Chapter 03
 
BIO420 Chapter 01
BIO420 Chapter 01BIO420 Chapter 01
BIO420 Chapter 01
 
BA350 Katz esb 6e_chap018_ppt
BA350 Katz esb 6e_chap018_pptBA350 Katz esb 6e_chap018_ppt
BA350 Katz esb 6e_chap018_ppt
 
BA350 Katz esb 6e_chap017_ppt
BA350 Katz esb 6e_chap017_pptBA350 Katz esb 6e_chap017_ppt
BA350 Katz esb 6e_chap017_ppt
 
BA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_pptBA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_ppt
 

Recently uploaded

Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 

HR 210 Bennett9e ppt ch14

  • 1. Chapter 14 The Employee’s Right to Privacy, and Management of Personal Information ©2019 McGraw-Hill Education. All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without the prior written consent of McGraw-Hill Education.
  • 2. 14-2 ©2019 McGraw-Hill Education. Learning Objectives 1 • Describe the nature of privacy as a fundamental right. • Explain the three general ways in which privacy is legally protected in the United States. • Define the legal concept of a “reasonable expectation of privacy” and its application to the workplace. • Identify and apply the standard for unreasonable searches and seizures under the Fourth Amendment.
  • 3. 14-3 ©2019 McGraw-Hill Education. Learning Objectives 2 • Explain the distinctions between the protections for public- and private-sector privacy protections. • Describe the legal framework that applies to private- sector privacy cases. • Identify and differentiate the prima facie cases for common-law claims of privacy invasions (intrusion into seclusion, public disclosure of private facts, publication in a false light, and breach of contract/defamation).
  • 4. 14-4 ©2019 McGraw-Hill Education. Learning Objectives 3 • Explain the extent to which an employer can legally dictate the off-work acts of its employees. • Discuss how advances in technology have impacted employee privacy. • State the key business justifications for employee monitoring.
  • 5. 14-5 ©2019 McGraw-Hill Education. Learning Objectives 4 • Explain the most effective means by which to design and to implement a technology use policy. • Describe the legal environment that surrounds employee use of social media technologies.
  • 6. 14-6 ©2019 McGraw-Hill Education. Are There Guarantees in Life? • Recent inventions and business methods call attention to the need for what is called the right “to be let alone.” • European employees generally enjoy a wider range of freedom from employer intrusion in the workplace than do U.S. employees. • It is the employer’s responsibility to protect employees’ and customers’ personal information.
  • 7. 14-7 ©2019 McGraw-Hill Education. Background Privacy may be protected by. • Constitution (federal or state). • federal and/or state statutes. • common law principles. Fundamental rights: Right guaranteed by the Constitution, whether stated or not. • Required disclosure of certain types of personal information should be considered an unreasonable search.
  • 8. 14-8 ©2019 McGraw-Hill Education. Realities about Employee Privacy Rights 1 • Employees do not have an absolute right to privacy in their workplace. • It is not a breach of an employee’s right to privacy for an employer to ask with whom the employee lives. • In the private sector, the Constitution does not protect employees’ right to be free from unreasonable searches and seizures.
  • 9. 14-9 ©2019 McGraw-Hill Education. Realities about Employee Privacy Rights 2 • Without constitutional protection, employees are safeguarded to some extent by common law protections against invasions of privacy. • Though an employee may give information to an employer, the employer is still bound to use that information only for the purpose for which it was collected.
  • 10. 14-10 ©2019 McGraw-Hill Education. Workplace Privacy, Generally No broad rights to personal workplace privacy. • No comprehensive federal workplace privacy legislation exists. In almost every state, employees may be hired and fired at will (provided it is not for illegal reasons).
  • 11. 14-11 ©2019 McGraw-Hill Education. Zones of Workplace Privacy “Reasonable” areas in which to expect privacy in the workplace. • One’s body and physical space; one has a reasonable expectation to be free from a pat-down or body search. • Normally private locations, such as a purse or briefcase. • Personal information, accessed without permission.
  • 12. 14-12 ©2019 McGraw-Hill Education. Public-Sector Employee Privacy1 Constitution protects individuals from wrongful invasions by the state or by anyone acting on behalf of the government. Fourth Amendment: Protection against unreasonable searches and seizures. • Supreme Court has liberally interpreted “search” to include a wide variety of activities. • Retrieval of blood samples and other bodily invasions, including urinalyses and collection of other personal information.
  • 13. 14-13 ©2019 McGraw-Hill Education. Public Sector Employee Privacy2 For the search to violate the Fourth Amendment, it must be deemed unreasonable, unjustified at its inception, and impermissible in scope. • Case: O’Connor v. Ortega. All searches that are conducted without a judicially issued warrant based on a finding of reasonable cause are generally held to be unreasonable.
  • 14. 14-14 ©2019 McGraw-Hill Education. Public Sector Employee Privacy3 Search of employer-owned property: Consent should be obtained prior to the search, and employees should be made well aware of the procedures involved. • E.g., desks or lockers. Employee may have a claim for false imprisonment when being detained during a search.
  • 15. 14-15 ©2019 McGraw-Hill Education. Public Sector Employee Privacy4 Fifth and Fourteenth Amendments tests. • Strict scrutiny of fundamental rights requires compelling state interest justification. • State may impose any restrictions that can be shown to be rationally related to a valid state interest. • Is the right fundamental? • Implicit in the concept of ordered liberty. • Deeply rooted in this Nation’s history and tradition. • No general right of the individual to be left alone.
  • 16. 14-16 ©2019 McGraw-Hill Education. The Privacy Act of 1974 1 Regulates the release of personal information about federal employees by federal agencies. Basic principles. • To restrict disclosure of personally identifiable records maintained by agencies. • To grant individuals increased rights of access to agency records maintained on themselves.
  • 17. 14-17 ©2019 McGraw-Hill Education. The Privacy Act of 1974 2 • To grant individuals the right to seek amendment of agency records maintained on themselves that are inaccurate. • To establish a code of “fair information practices.” Right to privacy is not absolute. • Extent of protection varies with the extent of the intrusion. • Interests of the employee are balanced against the interests of the employer.
  • 18. 14-18 ©2019 McGraw-Hill Education. Privacy Protection Study Commission 1 Purpose. • Studying the possibility of extending the Privacy Act to the private sector. Recommended that: • Use of polygraph tests in employment-related issues be prohibited. • Pretext interviews be prohibited.
  • 19. 14-19 ©2019 McGraw-Hill Education. Privacy Protection Study Commission 2 • Use of arrest or criminal records in employment decisions be prohibited except where otherwise allowed or required by law. • Employers be required to use reasonable care in selection of their investigating agencies. • Federal Fair Credit Reporting Act provisions be strengthened. Recommendations have yet to be implemented by Congress.
  • 20. 14-20 ©2019 McGraw-Hill Education. Wiretapping Title III of the Federal Wiretap Act. • Governs the interception of oral, wire, and electronic communications related to serious criminal offenses. • Basis for statutes in all states. • Wiretapping is increasing. • 17 percent rise in 2015. • No state applications have been denied.
  • 21. 14-21 ©2019 McGraw-Hill Education. Electronic Communications Privacy Act (ECPA) Covers all forms of digital communication. • Includes transmissions of text and digitalized images, in addition to voice communications on the telephone. • Prohibits unauthorized eavesdropping, by all persons and businesses, not only by the government. • “Interception” applies only to messages in transit and not to messages that have actually reached company computers.
  • 22. 14-22 ©2019 McGraw-Hill Education. Private Sector Employee Privacy In private-sector employment environment: • Privacy rights in the private sector of employment are limited. • No constitutional protection is triggered. Difference between public- and private-sector privacy protections is compliance-related costs for private employers.
  • 23. 14-23 ©2019 McGraw-Hill Education. Legal Framework for Employee Rights in the Private Sector 1 Employment-at-will. • Employers are free to fire an employee, and employees are free to leave the position, at any time and for any reason. Protection for private-sector employees. • Federal and state statutory protections, such as anti- discrimination laws. • Employment contracts, where they exist.
  • 24. 14-24 ©2019 McGraw-Hill Education. Legal Framework for Employee Rights in the Private Sector 2 • Collective bargaining agreements, where applicable. • State law exceptions to employment-at-will. • Violations of public policy. • Breaches of implied contracts. • Other statutory exceptions.
  • 25. 14-25 ©2019 McGraw-Hill Education. Bases for Right to Privacy in the Private Sector 1 Statutory Claims. • Enacting legislation mirroring federal law regarding the compilation and dissemination of information. • Recognizing a constitutional right to privacy under their state constitutions. • Protecting employees only in certain areas of employment. • E.g., personnel records or the use of credit information. • Federal laws and the Constitution affording protection only to federal employees and those subject to state action.
  • 26. 14-26 ©2019 McGraw-Hill Education. Bases for Right to Privacy in the Private Sector 2 Tort Law Protections/Common Law. • Tort is a private (civil) wrong against a person or her or his property. • Publication as used in these torts means “bringing it to light” or disseminating the information. Privacy Protections at common law. • Intrusion into Seclusion. • Wrongful invasion that is objectionable to a reasonable person. • Scenario 1.
  • 27. 14-27 ©2019 McGraw-Hill Education. Bases for Right to Privacy in the Private Sector 3 Public disclosure of private facts. • Intentional or negligent public disclosure of private matters. • Such disclosure would be objectionable to a reasonable person of ordinary sensitivities. • Case: Pemberton v. Bethlehem Steel Corp. • Publication in a false light. • Public disclosure of facts that place the employee in a false light.
  • 28. 14-28 ©2019 McGraw-Hill Education. Bases for Right to Privacy in the Private Sector 4 • Breach of contract. • May be contested as an invasion of privacy by one’s employer. • Defamation. • Libel - Defamation in a written document. • Slander - Defamation in an oral statement.
  • 29. 14-29 ©2019 McGraw-Hill Education. Regulation of Employee’s Off-Work Activities Generally, private activities may be regulated if off- work conduct affects employee performance. • State legislations limit an employer’s reach. Attitudes on workplace dating have the greatest impact. • Case: McCavitt v. Swiss Reinsurance America Corp.
  • 30. 14-30 ©2019 McGraw-Hill Education. Employer’s Information-Gathering Process/Justified Use/Disclosure of Information 1 Risks in process of information gathering. • Harassment. • Improper use of information. • Improper data management. Function creep: May begin with the voluntary transmission of information by an individual for one purpose for which the individual consents.
  • 31. 14-31 ©2019 McGraw-Hill Education. Employee Monitoring: Old Practice, New Face • New technologies have dramatically increased the range and power of the ways by which to gather the information to which familiar ethical concerns pertain. • Boundary-less workplace: Lines between personal and professional time, space, and equipment are blurred.
  • 32. 14-32 ©2019 McGraw-Hill Education. How Monitoring Works: Practice and Prevalence Employee theft has led both public and private employers to increase monitoring of employees. • “Retail shrinkage.” Use of technology such as: • Global Positioning System (GPS.) • Radio frequency identification devices (RFIDs.) • Biometric technology. • Big Data collection.
  • 33. 14-33 ©2019 McGraw-Hill Education. Evolving Legal Environment 1 Statutes and cases beginning to address employer monitoring issues. • Case: City of Ontario v. Quon. • Balance of reasonable expectation of privacy and good business-related justification of interest. • Business justification for monitoring employees’ technology use. • Employers are particularly concerned about productivity loss due to time spent online. • Protection against liability.
  • 34. 14-34 ©2019 McGraw-Hill Education. Evolving Legal Environment 2 • Inappropriate use of Web software - Danger of exposing the firm to potentially significant copyright infringement liability. • Obscenity - Poses both legal and reputational risks when employees download pornographic images while at work. Employers should develop a formal policy or program regulating employee usage of the Internet.
  • 35. 14-35 ©2019 McGraw-Hill Education. Case of Employee Email Employers must ensure that the email system is not being used in ways that offend others or harm morale. • Review emails in connection with a reasonable investigation of possible employee misconduct. Employers should provide notification when emails are being monitored. • Notice of Electronic Monitoring Act.
  • 36. 14-36 ©2019 McGraw-Hill Education. Percent of U.S. Companies Monitor Their Employees’ Internet Use Source: “The Rise of Workplace Spying,” The Week (July 5, 2015), http://theweek.com/articles/564263/rise-workplace-spying. Access the long description slide.
  • 37. 14-37 ©2019 McGraw-Hill Education. Developing Computer Use Policies 1 Employers should develop concise written policies and procedures regarding the use of company computers. Suggested guidelines. • No monitoring in highly private areas. • Monitoring should be limited to the workplace. • Full access to any information gathered through monitoring. • Continuous monitoring should be banned.
  • 38. 14-38 ©2019 McGraw-Hill Education. Developing Computer Use Policies 2 • All forms of secret monitoring should be banned. • Advance notice should be given. • Only information relevant to the job should be collected. • Monitoring should result in the attainment of some business interest.
  • 39. 14-39 ©2019 McGraw-Hill Education. Bring Your Own Device (BYOD) Employees increasingly use their personal smartphones, tablets, or laptops for business purposes. • Decreases company costs for devices, data, and IT support. • Poses a number of practical and legal risks. Challenges: • Data stored on devices. • Networks that the devices access. • Secure approach – Virtualization.
  • 40. 14-40 ©2019 McGraw-Hill Education. Blogging and Other Social Media (“Web 2.0”) Employer Social Media policy recommendations: • Defined objectives that do not overreach. • Reminder that company policies apply. • Personal comment rules. • Disclosure, monitoring, and copyright reminders.
  • 41. 14-41 ©2019 McGraw-Hill Education. Waivers of Privacy Rights Search: Physical invasion of a person’s space, belongings, or body. Waiver: Intentional relinquishment of a known right. • Exists at all stages of employment.
  • 42. 14-42 ©2019 McGraw-Hill Education. Privacy Rights Since September 11, 2001 USA Patriot Act. • Expanded states’ rights with regard to Internet surveillance technology. • Grants access to sensitive data with only a court order rather than a judicial warrant. Government is now allowed to monitor anyone on the Internet simply by contending that the information is “relevant” to an ongoing criminal investigation.
  • 43. 14-43 ©2019 McGraw-Hill Education. Management Tips 1 • Develop and publish policies that reserve your right to monitor, gain access to, or disclose all emails in your system. • Ensure that any policy that applies to emails also applies to instant messaging (IM). • Ensure that the privacy policy accounts for these social media technologies and strikes the right balance between appropriate and inappropriate uses.
  • 44. 14-44 ©2019 McGraw-Hill Education. Management Tips 2 • Privacy policy should be clear that employees have no expectation of privacy in all employer-provided equipment. • Monitoring policies should be clearly stated. • Avoid content-based and real-time monitoring. • Be sure to investigate the specific protections for which you are responsible in the states in which you do business.
  • 45. 14-45 ©2019 McGraw-Hill Education. Management Tips 3 • Your privacy policy should be targeted to protect your business interests. • Be wary of overrestricting since courts do not look on these regulations positively. • Consider focusing the policy of regulating the off- work activities on the possible negative impact of off- duty conduct on the employer’s business interests and on the public’s perception of the employer.
  • 46. 14-46 ©2019 McGraw-Hill Education. Management Tips 4 Less likely to find problems with a waiver of privacy rights where the waiver is accompanied by an offer of employment. Ensure that you comply with all privacy rules required by HIPAA. Regulate access to information. • Unwarranted disclosure might constitute an invasion of privacy even where the original collection of information is allowed. Keep abreast of current developments.
  • 47. 14-47 ©2019 McGraw-Hill Education. Percent of U.S. Companies Monitor Their Employees’ Internet Use Long Description Measured are three sets of data: tracking employee emails (at about 42%); logging keystrokes (about 45%); and monitoring employees' Internet usage (65%). Return to slide containing original image.