What is the role of social media and networking in the workplace? What can you do to protect yourself as an employer from improper usage? Do you have a strategy for using social media. This Power Point will explore all of these themes.
1. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 1 Business Real Estate Land Use Commercial Litigation Bankruptcy Estate Planning & Taxation Healthcare Employment Family Law TWITTER WHILE YOU WORK: THE LEGAL IMPACT OF SOCIAL MEDIA, SOCIAL NETWORKING AND CLOUD COMPUTING IN THE WORKPLACE DEIRDRE J. KAMBER, ESQUIRE, CHP DKamber@FLBLaw.com 610.797.9000 ext. 383
34. Chat Rooms -- “Primarily used by mass media to describe any form of synchronous conferencing”
35.
36. WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 12
37. WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 13
38. WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 14 http://radaris.com/p/Deirdre/Kamber/
39.
40. Twine and Radaris, for example, are search engines that aggregate information.WHAT IS DATA AGGREGATION? Employment Law Hospitalization in 1999 Experienced Trainer Lawyer Vacation in Vegas Center Valley Grandfather with cancer Brandeis University Rugby New York June 9, 1972 HIPAA SHRM Mother Awardee: Top Twenty Under Forty Pennsylvania Religious beliefs: Reform Social Media and Networking Law Politics: financial conservative MENSA Diversity Single Parent Adjunct Professor Facebook Fitzpatrick Lentz & Bubba Master’s Degree
41.
42. Online access through a third party to your records, files, training programs, results and other outsourced functions.
61. Even if you don’t know that it’s out there, if you have a policy that says you look up Facebook pages, if your employee’s Facebook page includes her breast cancer treatments, you are deemed to have that information.TMI
62.
63. Now, add in: inequal workplace relationships,“defriending,” “posts,” and a lack of control over Internet documents.
66. Keep topics off confidential information. No matter how close you are to pals in the office, you have to resist the temptation to give them the inside scoop.
67. Face the firing line.Sometimes an employee is not performing up to par. You must be this person’s employer first and friend second. ONLINE BUSINESS RELATIONSHIPS
68. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 24 24-7 ACCESS TO THE INTERNET BE ABLE TO USE YOUR ACCEPT-“ABLE” USE POLICIES
69.
70. Consider what might be relevant for work -- Give your employees the tools that they need to maximize their talents.
71. Are You Working with IT?You should be working with your IT person to check allowing, blockingandmonitoring….what do you want to know about?
72. Is your ban effective? Does everyone have smart-phones? 24-7 ACCESS TO THE INTERNET AND ACCEPTABLE USE POLICIES
73. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 26 LITIGATION ANDPITFALLS
78. NO. In Pietrylo v. Hlllstone Restaurant Group, d/b/a Houston's, management discovered that two waiters posted on their MySpace page sexual remarks about management and customers, jokes about the company and references to violence and illegal drug use. After viewing the site, management found the postings offensive and fired the waiters.
79. Ironically, the company's efforts to avoidliability actually resulted in a jury verdict against it.LITIGATION
80.
81. The offensive postings were located in a private chat room, access to which was restricted only to users who first received and accepted an electronic invitation;
82. Management had not received an invitation from the waiters, but rather usedanother employee's password(who had been invited) to access the chat room; and
83. There was a dispute as to permissive access. Although management argued it was "authorized" to access the chat room by the employee who provided her ID and password, that employee testified she felt she "probably would have gotten in trouble" if she did not cooperate. LITIGATION
84.
85. Morse v. Mer- exotic dancers advertised their personal talents on Facebook and challenged their employer’s determination that they were independent contractors under the FLSA. Were they?
86. TekSystems v. Hammernick- an employer sued its former employee for breach of restrictive covenants due to LinkedIn communications. Was it a breach?LITIGATION
87.
88. Steingart v. Loving Care – N.J. Supreme Court said e-mails on a personal web-based e-mail account accessed from an employer’s computer were private. The decision was contingent on the fact that use of such an account was not clearly covered by the company’s policy, and the e-mails in question contained a standard warning that the communications were personal, confidential, attorney-client communications.Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 31 LITIGATION
89.
90. Boulder Valley School District – BVSD searched several students’ cell phones after sexting was discovered. The ACLU stepped in, and the District agreed to revamp its access policy to student phones.Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 32 LITIGATION
91.
92. There may be Fair Credit Reporting Actissues with internet investigations.
93. Most webposts are protected if they are anonymous as First Amendment speech.
94. Subpoenas can be effectuated, but are frequently fruitless.LITIGATION
95. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 34 BEST PRACTICES