SlideShare a Scribd company logo
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 1 Business     Real Estate     Land Use     Commercial Litigation     Bankruptcy Estate Planning & Taxation     Healthcare     Employment     Family Law TWITTER WHILE YOU WORK:  THE LEGAL IMPACT OF SOCIAL MEDIA, SOCIAL NETWORKING AND CLOUD COMPUTING IN THE WORKPLACE DEIRDRE J. KAMBER, ESQUIRE, CHP DKamber@FLBLaw.com 610.797.9000 ext. 383
[object Object]
Employment
Labor
Information Privacy/Information Access
School Law
Unemployment Compensation, and
Healthcare
Attorney, admitted in Pennsylvania, New York and U.S. Supreme Court
Labor and management representation
From outsourcing HR work, to trainer, to litigation
Work Website: http://www.flblaw.com/attorney_directory/deirdre_kamber.asp
LinkedIn: http://www.linkedin.com/in/deirdrejkamberDEIRDRE KAMBER, ESQ., CHP Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 2
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 3
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 4 SOCIAL MEDIA, NETWORKING, DATA AGGREGATION, ANDCLOUD COMPUTING ,[object Object]
Businesses are responsible for creating policies, procedures and programs to address employee use.
We are responsible for the impact of social media from our client base.
We are using cloud computing for data storage, and we are responsible for how our electronic records are stored.
We need to be AHEAD of the curve.,[object Object]
Social media, networking and our clients
The impact of cloud computing
What does the caselaw say?
What do we need to do?,[object Object]
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 7 ,[object Object]
Where are we now?
Social media is not a fad; it  is a multimillion dollar issue for  organizations. Look at Dirty Dominos, or United Airlines; what did it cost?
It is more important, statistically, to have a virtual office than a real one.  WHERE ARE WE?
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 8 News Articles News Reports Photo Albums Lunch Breaks Watch News Bulletin Boards Filing/ Labeling Coffee Breaks
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 9 Ibibo * Adult FriendFinder * Advogato * Amie Street * ANobii * ASmallWorld * Athlinks * Avatars Last.fm * United * Badoo * Bebo * Bigadda * Big Tent * Biip * Black Planet * Blogster * Broadcaster Yelp, Inc. * Youmeo * Zoo.gr * Buzznet * Café Mom * Cake Financial * Care2 * Classmates.com * Cloob * College Tonight * Couch Surfing * Daily Booth * Daily Strength * Decayenne * Deviant Art * DisABoom * Dol2day * DontStayIn * Draugiem.lv * Elftown * Epernicus * Eons.com * Italki * Experience Project * Exploroo * Facebook * Faceparty * Faces.com * Fetlife * Filmaffinity * Fledgewing * Flixter * Flickr * Fotolog * Friends Reunited * Friendster * Fruhstuckstreff * Fubar * Gaia Online * GamerDNA * Gather.com * Gays.com * Geni.com * Gogyoko *Hi5 * Goodreads * Gossipreport.com * Grono.net * Habbo * Hospitality Club * 	 			        	          Imeem * IRC-Galleria  InterNations * Itsmy * Iwiw * 	   		   		         Jammer Direct * Kaioo Kaixin001 * KIwibox * 						     LibraryThing * LifeKnot LinkedIn * Live Journal * 						       Lunar Storm * MeetIn * Meetup.com * Mobikade * 			                          	    	   MocoSpace * Mouthshut *  Live Mocha * MOG * Mixi * 				                  Jaiku * Multiply * Muxlim *  MyAnimeList * My Church * 				              	My Heritage * My Life *  My LOL * My Opera *				 		  MySpace * My Yearbook *  Masza-klasa.pl * Netlog * Nettby * Nexopia * NGO Post * Ning * Odnoklassniki * OKCupid * One Climate * One World TV * Open Diary * Orkut * OUT Everywhere * Partner Up * Plaxo * Passportstamp * Pingsta * Playahead * Playboy U * Plurk * Present.lv * Qapacity * Quarter- Life * Qzone * Ravelry * Renren * ResearchGate * Reverberation * Ryze * Scispace * Shelfari * Skyrock * Social GO * Social Vibe * Sonico.com * Soundpedia * Stickam * StudiVZ * Super Nova.com * Tagged.com * Talent Trove * Talkbiznow * Taltopedia * TraveBuddy.com * Travel – Lertspoint.com * Tribe.net * Trombi.com * Tuenti.com * Tumblr * Twitter * V Kontakte * Vam- Pirefreaks * Viadeo * Vox * Wakoopa * Wasabi * Wayn * WebBIographies * WeOurFamily * Windows Live Spaces * Wiser Earth * Xanga * Xing * Xt2 * Yammer * Hyves *  WHAT IS SOCIAL NETWORKING?
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 10 WHAT IS SOCIAL NETWORKING ,[object Object]
Photo Sharing – “Publishing of user’s digital photos online”
Video Sharing –  “Video uploading services allowing individuals to upload video clips to an Internet Hosting Website”
Tagging(or “Tag”) – “A non-hierarchical keyword”
Chat Rooms --  “Primarily used by mass media to describe any form of synchronous conferencing”
Message Boards --  “an online discussion site”,[object Object]
WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 12
WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 13
WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 14 http://radaris.com/p/Deirdre/Kamber/
Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 15 ,[object Object]

More Related Content

What's hot

Powerpoint for social media 2
Powerpoint for social media 2Powerpoint for social media 2
Powerpoint for social media 2DeenaBear
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
Hollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearstHollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearstÄĥŸäń Pegason
 
An overview of social networking
An overview of social networkingAn overview of social networking
An overview of social networkingWritingHubUK
 
Social Media For Lawyers Ibj 2009 1
Social Media For Lawyers Ibj 2009 1Social Media For Lawyers Ibj 2009 1
Social Media For Lawyers Ibj 2009 1helengunnar
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesRob Jewitt
 
MARK ZUCKERBERG presentation
MARK ZUCKERBERG presentationMARK ZUCKERBERG presentation
MARK ZUCKERBERG presentationNaitik Patel
 
Submitted by john david rojas agudelo
Submitted by john david rojas agudeloSubmitted by john david rojas agudelo
Submitted by john david rojas agudelohenryojedazuares
 
Mark zukerberg personality
Mark zukerberg   personality Mark zukerberg   personality
Mark zukerberg personality Priyanka Karekar
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintDean Shareski
 
Zambrano Sun Tzu Internet Skills
Zambrano Sun Tzu Internet SkillsZambrano Sun Tzu Internet Skills
Zambrano Sun Tzu Internet SkillsGabriel F. Zambrano
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Tom Daly
 
Ad of Geektrip for Students
Ad of  Geektrip for StudentsAd of  Geektrip for Students
Ad of Geektrip for StudentsPhil Jeudy
 

What's hot (20)

Mark zuckerberg
Mark zuckerbergMark zuckerberg
Mark zuckerberg
 
Powerpoint for social media 2
Powerpoint for social media 2Powerpoint for social media 2
Powerpoint for social media 2
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Hollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearstHollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearst
 
An overview of social networking
An overview of social networkingAn overview of social networking
An overview of social networking
 
Facebook- Women- Smoking
Facebook- Women- SmokingFacebook- Women- Smoking
Facebook- Women- Smoking
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Social Media For Lawyers Ibj 2009 1
Social Media For Lawyers Ibj 2009 1Social Media For Lawyers Ibj 2009 1
Social Media For Lawyers Ibj 2009 1
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
Facebook Project
Facebook ProjectFacebook Project
Facebook Project
 
niklaz y haos
niklaz y haosniklaz y haos
niklaz y haos
 
MARK ZUCKERBERG presentation
MARK ZUCKERBERG presentationMARK ZUCKERBERG presentation
MARK ZUCKERBERG presentation
 
Submitted by john david rojas agudelo
Submitted by john david rojas agudeloSubmitted by john david rojas agudelo
Submitted by john david rojas agudelo
 
Mark zukerberg personality
Mark zukerberg   personality Mark zukerberg   personality
Mark zukerberg personality
 
10209 Region 11
10209 Region 1110209 Region 11
10209 Region 11
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
Zambrano Sun Tzu Internet Skills
Zambrano Sun Tzu Internet SkillsZambrano Sun Tzu Internet Skills
Zambrano Sun Tzu Internet Skills
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Ad of Geektrip for Students
Ad of  Geektrip for StudentsAd of  Geektrip for Students
Ad of Geektrip for Students
 

Similar to Social Networking and Cloud Computing

UC and Social Media - How to Fight the Tough Cases
UC and Social Media - How to Fight the Tough CasesUC and Social Media - How to Fight the Tough Cases
UC and Social Media - How to Fight the Tough CasesDeirdreJ6972
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Subject Matter
Subject MatterSubject Matter
Subject Matteremileeyy
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentationguest09025b
 
Argumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than DogsArgumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than DogsVanessa Perkins
 
18688055 social-networking-1
18688055 social-networking-118688055 social-networking-1
18688055 social-networking-1Anuj Malhotra
 
Buy Essays Online Cheap - The Writin
Buy Essays Online Cheap - The WritinBuy Essays Online Cheap - The Writin
Buy Essays Online Cheap - The WritinPawpaw Tran
 
Privacy Matters
Privacy MattersPrivacy Matters
Privacy MattersJames Kane
 
Write Descriptive Essay. Online assignment writing service.
Write Descriptive Essay. Online assignment writing service.Write Descriptive Essay. Online assignment writing service.
Write Descriptive Essay. Online assignment writing service.Jennifer Watson
 

Similar to Social Networking and Cloud Computing (20)

UC and Social Media - How to Fight the Tough Cases
UC and Social Media - How to Fight the Tough CasesUC and Social Media - How to Fight the Tough Cases
UC and Social Media - How to Fight the Tough Cases
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Internet
InternetInternet
Internet
 
Subject Matter
Subject MatterSubject Matter
Subject Matter
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentation
 
Argumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than DogsArgumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than Dogs
 
Digital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPLDigital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPL
 
Facebook
FacebookFacebook
Facebook
 
Digital tattoo - what's yours?
Digital tattoo - what's yours?Digital tattoo - what's yours?
Digital tattoo - what's yours?
 
18688055 social-networking-1
18688055 social-networking-118688055 social-networking-1
18688055 social-networking-1
 
Buy Essays Online Cheap - The Writin
Buy Essays Online Cheap - The WritinBuy Essays Online Cheap - The Writin
Buy Essays Online Cheap - The Writin
 
Privacy Matters
Privacy MattersPrivacy Matters
Privacy Matters
 
Write Descriptive Essay. Online assignment writing service.
Write Descriptive Essay. Online assignment writing service.Write Descriptive Essay. Online assignment writing service.
Write Descriptive Essay. Online assignment writing service.
 

Social Networking and Cloud Computing

  • 1. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 1 Business Real Estate Land Use Commercial Litigation Bankruptcy Estate Planning & Taxation Healthcare Employment Family Law TWITTER WHILE YOU WORK: THE LEGAL IMPACT OF SOCIAL MEDIA, SOCIAL NETWORKING AND CLOUD COMPUTING IN THE WORKPLACE DEIRDRE J. KAMBER, ESQUIRE, CHP DKamber@FLBLaw.com 610.797.9000 ext. 383
  • 2.
  • 9. Attorney, admitted in Pennsylvania, New York and U.S. Supreme Court
  • 10. Labor and management representation
  • 11. From outsourcing HR work, to trainer, to litigation
  • 13. LinkedIn: http://www.linkedin.com/in/deirdrejkamberDEIRDRE KAMBER, ESQ., CHP Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 2
  • 14. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 3
  • 15.
  • 16. Businesses are responsible for creating policies, procedures and programs to address employee use.
  • 17. We are responsible for the impact of social media from our client base.
  • 18. We are using cloud computing for data storage, and we are responsible for how our electronic records are stored.
  • 19.
  • 20. Social media, networking and our clients
  • 21. The impact of cloud computing
  • 22. What does the caselaw say?
  • 23.
  • 24.
  • 25. Where are we now?
  • 26. Social media is not a fad; it is a multimillion dollar issue for organizations. Look at Dirty Dominos, or United Airlines; what did it cost?
  • 27. It is more important, statistically, to have a virtual office than a real one. WHERE ARE WE?
  • 28. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 8 News Articles News Reports Photo Albums Lunch Breaks Watch News Bulletin Boards Filing/ Labeling Coffee Breaks
  • 29. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 9 Ibibo * Adult FriendFinder * Advogato * Amie Street * ANobii * ASmallWorld * Athlinks * Avatars Last.fm * United * Badoo * Bebo * Bigadda * Big Tent * Biip * Black Planet * Blogster * Broadcaster Yelp, Inc. * Youmeo * Zoo.gr * Buzznet * Café Mom * Cake Financial * Care2 * Classmates.com * Cloob * College Tonight * Couch Surfing * Daily Booth * Daily Strength * Decayenne * Deviant Art * DisABoom * Dol2day * DontStayIn * Draugiem.lv * Elftown * Epernicus * Eons.com * Italki * Experience Project * Exploroo * Facebook * Faceparty * Faces.com * Fetlife * Filmaffinity * Fledgewing * Flixter * Flickr * Fotolog * Friends Reunited * Friendster * Fruhstuckstreff * Fubar * Gaia Online * GamerDNA * Gather.com * Gays.com * Geni.com * Gogyoko *Hi5 * Goodreads * Gossipreport.com * Grono.net * Habbo * Hospitality Club * Imeem * IRC-Galleria InterNations * Itsmy * Iwiw * Jammer Direct * Kaioo Kaixin001 * KIwibox * LibraryThing * LifeKnot LinkedIn * Live Journal * Lunar Storm * MeetIn * Meetup.com * Mobikade * MocoSpace * Mouthshut * Live Mocha * MOG * Mixi * Jaiku * Multiply * Muxlim * MyAnimeList * My Church * My Heritage * My Life * My LOL * My Opera * MySpace * My Yearbook * Masza-klasa.pl * Netlog * Nettby * Nexopia * NGO Post * Ning * Odnoklassniki * OKCupid * One Climate * One World TV * Open Diary * Orkut * OUT Everywhere * Partner Up * Plaxo * Passportstamp * Pingsta * Playahead * Playboy U * Plurk * Present.lv * Qapacity * Quarter- Life * Qzone * Ravelry * Renren * ResearchGate * Reverberation * Ryze * Scispace * Shelfari * Skyrock * Social GO * Social Vibe * Sonico.com * Soundpedia * Stickam * StudiVZ * Super Nova.com * Tagged.com * Talent Trove * Talkbiznow * Taltopedia * TraveBuddy.com * Travel – Lertspoint.com * Tribe.net * Trombi.com * Tuenti.com * Tumblr * Twitter * V Kontakte * Vam- Pirefreaks * Viadeo * Vox * Wakoopa * Wasabi * Wayn * WebBIographies * WeOurFamily * Windows Live Spaces * Wiser Earth * Xanga * Xing * Xt2 * Yammer * Hyves * WHAT IS SOCIAL NETWORKING?
  • 30.
  • 31. Photo Sharing – “Publishing of user’s digital photos online”
  • 32. Video Sharing – “Video uploading services allowing individuals to upload video clips to an Internet Hosting Website”
  • 33. Tagging(or “Tag”) – “A non-hierarchical keyword”
  • 34. Chat Rooms -- “Primarily used by mass media to describe any form of synchronous conferencing”
  • 35.
  • 36. WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 12
  • 37. WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 13
  • 38. WHAT IS DATA AGGREGATION? Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 14 http://radaris.com/p/Deirdre/Kamber/
  • 39.
  • 40. Twine and Radaris, for example, are search engines that aggregate information.WHAT IS DATA AGGREGATION? Employment Law Hospitalization in 1999 Experienced Trainer Lawyer Vacation in Vegas Center Valley Grandfather with cancer Brandeis University Rugby New York June 9, 1972 HIPAA SHRM Mother Awardee: Top Twenty Under Forty Pennsylvania Religious beliefs: Reform Social Media and Networking Law Politics: financial conservative MENSA Diversity Single Parent Adjunct Professor Facebook Fitzpatrick Lentz & Bubba Master’s Degree
  • 41.
  • 42. Online access through a third party to your records, files, training programs, results and other outsourced functions.
  • 43. Pros:
  • 44. It’s not on your server or system
  • 47. Cons:
  • 48. It’s not on your server or system
  • 49. You now have a third party to deal with
  • 50.
  • 51.
  • 52. TMI
  • 54. 24-7 access to the Internet
  • 55.
  • 56. 35% of employers reported having refused to hire candidates based on content found on those sites. 
  • 57.
  • 58. Employees should not have an expectation of privacy in Social Networking sites, such as Facebook.
  • 59.
  • 60. Research via the Web will give you TMI.
  • 61. Even if you don’t know that it’s out there, if you have a policy that says you look up Facebook pages, if your employee’s Facebook page includes her breast cancer treatments, you are deemed to have that information.TMI
  • 62.
  • 63. Now, add in: inequal workplace relationships,“defriending,” “posts,” and a lack of control over Internet documents.
  • 64.
  • 65. Don’t play favorites.Don’t favor certain employees in the workplace.
  • 66. Keep topics off confidential information. No matter how close you are to pals in the office, you have to resist the temptation to give them the inside scoop.
  • 67. Face the firing line.Sometimes an employee is not performing up to par. You must be this person’s employer first and friend second. ONLINE BUSINESS RELATIONSHIPS
  • 68. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 24 24-7 ACCESS TO THE INTERNET BE ABLE TO USE YOUR ACCEPT-“ABLE” USE POLICIES
  • 69.
  • 70. Consider what might be relevant for work -- Give your employees the tools that they need to maximize their talents.
  • 71. Are You Working with IT?You should be working with your IT person to check allowing, blockingandmonitoring….what do you want to know about?
  • 72. Is your ban effective? Does everyone have smart-phones? 24-7 ACCESS TO THE INTERNET AND ACCEPTABLE USE POLICIES
  • 73. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 26 LITIGATION ANDPITFALLS
  • 74.
  • 75. Defamation, false light, IIED, Stored Communications Act violations, etc.
  • 76. An apology (like Dominos or American Airlines)
  • 77.
  • 78. NO. In Pietrylo v. Hlllstone Restaurant Group, d/b/a Houston's, management discovered that two waiters posted on their MySpace page sexual remarks about management and customers, jokes about the company and references to violence and illegal drug use. After viewing the site, management found the postings offensive and fired the waiters.  
  • 79. Ironically, the company's efforts to avoidliability actually resulted in a jury verdict against it.LITIGATION
  • 80.
  • 81. The offensive postings were located in a private chat room, access to which was restricted only to users who first received and accepted an electronic invitation;
  • 82. Management had not received an invitation from the waiters, but rather usedanother employee's password(who had been invited) to access the chat room; and
  • 83. There was a dispute as to permissive access. Although management argued it was "authorized" to access the chat room by the employee who provided her ID and password, that employee testified she felt she "probably would have gotten in trouble" if she did not cooperate.  LITIGATION
  • 84.
  • 85. Morse v. Mer- exotic dancers advertised their personal talents on Facebook and challenged their employer’s determination that they were independent contractors under the FLSA. Were they?
  • 86. TekSystems v. Hammernick- an employer sued its former employee for breach of restrictive covenants due to LinkedIn communications. Was it a breach?LITIGATION
  • 87.
  • 88. Steingart v. Loving Care – N.J. Supreme Court said e-mails on a personal web-based e-mail account accessed from an employer’s computer were private. The decision was contingent on the fact that use of such an account was not clearly covered by the company’s policy, and the e-mails in question contained a standard warning that the communications were personal, confidential, attorney-client communications.Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 31 LITIGATION
  • 89.
  • 90. Boulder Valley School District – BVSD searched several students’ cell phones after sexting was discovered. The ACLU stepped in, and the District agreed to revamp its access policy to student phones.Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 32 LITIGATION
  • 91.
  • 92. There may be Fair Credit Reporting Actissues with internet investigations.
  • 93. Most webposts are protected if they are anonymous as First Amendment speech.
  • 94. Subpoenas can be effectuated, but are frequently fruitless.LITIGATION
  • 95. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 34 BEST PRACTICES
  • 96.
  • 103.
  • 104. TMI can be used against you.
  • 105. Coercion does NOT give consent
  • 106. Be aware of unionizing/organizing language
  • 107. Data breaches are a risk for any computer system. Problems are compounded with a third party. BESTPRACTICES: BEWARE!
  • 108.
  • 109. Employees’ expectation of privacy changes with the amount of notice and authorization as to monitoring
  • 110. Expectations should be balanced between employee and employer
  • 111. Get yourself trained and make sure that someone is helping you out.
  • 112. Security threats don't just occur in cyberspace. Protect the physical environment of stored data.
  • 113. Don’t sign on for more than you are willing to ACTUALLY DOCopyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 37
  • 114.
  • 115. You need a clear sense of access, policy, procedure and chain of command in cases of breach.
  • 116. You need to know which laws apply to you, and what happens in cases of breach.
  • 117. You also may want levels of access to information. BEST PRACTICES: THIRD PARTIES Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 38
  • 118. Copyright 2010 (c) Deirdre J. Kamber, All Rights Reserved 39 Questions? Comments? Deirdre J. Kamber, Esq., CHP DKamber@FLBlaw.com Fitzpatrick Lentz & Bubba, P.C.