the legal complications and ethical dilemmas presented by

advertisement
THE LEGAL COMPLICATIONS AND ETHICAL DILEMMAS PRESENTED BY
CYBERSPACE IN THE WORKPLACE
By Stewart S. Manela
Arent Fox
1050 Connecticut Avenue, NW
Washington, DC 20036-5339
Manelas@arentfox.com
202.857-6364
I.
Electronic Communications: A Pervasive Medium
E-mail has become the preferred way to communicate about American business matters. Tens of
millions of Americans use e-mail in the workplace. Electronic messages arrive at their
destinations almost instantaneously, infinitely faster and cheaper than “snail-mail” or even fax.
E-mails can be forwarded, stored, or replied to with a click of a mouse, and messages can be sent
to one or a thousand recipients with ease.
It is instant, convenient, and apparently private, which promotes spontaneous exchanges. Even
normally prudent, circumspect people cannot resist the temptation to type an immediate response
to an e-mail and hit the send button before reflecting on the contents, communicating more
candidly and informally than they ever would on paper. An illusion pervades cyberspace that
email exchanges are private and will never be scrutinized, and hence e-mail tends to be more
casual, and when revealed, often proves to be embarrassing or intemperate.
It often seems virtually no consideration has been given to the possibility that a confidential
message will be saved, copied, forwarded, or ever seen by anyone other than its designated
recipient. Yet, a record of the message often survives, and may be saved indefinitely, stored
everywhere from desktop computers and workstations to backup tapes and personal Palm Pilots.
Many people refuse to erase old e-mail, and most people do not even understand what is stored
on their computer in the first place: “erased” data is not necessarily gone forever; telephone
systems may preserve voice messages though the recipient has “deleted” the message; messages
originating or terminating in a corporate computer system may persist indefinitely in backup
tapes or disks.
Moreover, there are security concerns relating to e-mail transmissions. E-mail messages pass
through routers where system administrators can read, copy, or tamper with any message.
Although unauthorized interception of e-mail may violate federal law, persons with access to the
servers where messages are stored have the technical capability – if not the legal authority – to
intercept those messages.
Recovering files that were deleted from a computer directory is a trivial process. Computers
create files users do not even know about in the first place. Word processors maintain temporary
files that may remain readable even after originals have been erased. Changes to document do
not eliminate prior versions. Web browsers create history files that keep a record of the Web
sites visited, and cache files may even keep copies of downloaded pictures.
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
II.
Employment Litigation
The careless way e-mail and voice-mail messages are created and the unintentionally long time
they tend to be preserved make electronic communications a favored weapon in litigation. As
documentary evidence, e-mail communication provides a contemporaneous record of what
people were thinking, planning, and saying. Its spontaneity contrasts with prepared oral
testimony.
Courts and juries treat e-mail as a window into real thoughts of executives and the inner
workings of an enterprise. Courts have permitted litigants to use e-mail communications even
though the sender may have expected it to remain private because any expectation of privacy
when using an employer’s e-mail system is not reasonable. See Smyth v. Pillsbury Co., 914 F.
Supp. 97 (E.D. Pa. 1996). But see United States v. Smith, 155 F.3d 1051 (9th Cir., 1998)
(suppressing evidence of unlawful voicemail recording) and Monotype Corp. v. Int’l Typeface
Corp., 43 F.3d 443 (9th Cir. 1994)(e-mail is not a business record under Federal Rule of
Evidence 803(6)).
Sexual harassment and discrimination lawsuits have been based upon obscene or threatening email and voice-mail messages. Transmission of racially insulting voice mail messages,
combined with an employer's failure to take action in response to them has been found to support
a claim of racial harassment. Morgan Stanley & Co. was sued by black employees claiming
retaliation under Title VII after they complained about an e-mail message ridiculing “Ebonics”
and containing racist jokes which was disseminated through the firm's computer system. Owens
v. Morgan Stanley & Co., S.D.N.Y., No. 96-9747 (Dec. 24, 1997), (6 DLR A-1 1/9/98). The
New Jersey Supreme Court ruled the critical and insulting emails posted to a work-related
electronic bulletin board may constitute workplace harassment. Blakey v. Continental Airlines
Inc., 751 A.2d 538 (N.J. 2000). A federal jury in Illinois awarded $454,000 to plaintiff who
alleged she was fired after she filed a sexual harassment charge based on e-mail from a
supervisor that made her uncomfortable. Mercado v. Midwest Computer Inc., N.D. Ill., No. 99 C
1240, (May 5, 2000), (110 DLR A-1, 6/7/00). See also Harley v. McCoach, 928 F. Supp. 533
(E.D. Pa. 1996) (sexual harassment claim based in part on e-mail message sent to the plaintiff
identifying her as "Brown Sugar"); Strauss v. Microsoft Corp., 814 F. Supp. 1186 (S.D.N.Y.
1993) (defendant sent e-mail messages to staff containing advertisement for replacement "moose
balls," news report on Finland's proposal to institute a sex holiday, and play entitled "A Girl's
Guide to Condoms”); Donley v. Ameritech Services, Inc., 1992 U.S. Dist. LEXIS 21281 (E.D.
Mi. Nov. 16, 1992) (reverse discrimination claim based on termination due to e-mail about
African American male client which was offensive and disrespectful to the client). Curran v.
Unemployment Compensation Board of Review, 752 A.2d 938 (Comm.Pa., 2000) (employee
terminated for misconduct and denied unemployment insurance benefits for violating employer’s
internet policy ). But see Schnaars v. Copiague Union Free School District, 713 N.Y.S.2d. 84
(2d. Dept., 2000) (reinstating long-term employee terminated for using school computers to
access pornographic websites ); Bertolini v. Whitehall City School District Board of Education,
2000 WL 1376455(Ohio App.10th.Dist., 2000) (reversing termination of associate
superintendent who sent romantic e-mail messages since policy allowed personal e-mail
messages).
2
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
III.
E-Mail Communication By Counsel.
Model Rule of Professional Conduct 1.6 precludes a lawyer from disclosing “information
relating to representation of a client unless the client consents after consultation,” and likewise,
DR 4-101 of the Code of Professional Responsibility prohibits a lawyer from “knowingly”
revealing information protected by the attorney-client privilege and other information gained in
the professional relationship that might embarrass or be detrimental to the client or that the client
wants to remain secret. Rule 1.6 requires lawyers to take reasonable steps to protect client
confidences from unauthorized disclosure, including use of a transmission mode that is
reasonably expected to remain private.
The American Bar Association, ABA Formal Op. 99-413 (March 10, 1999), has concluded that
“lawyers have a reasonable expectation of privacy in communications made by all forms of email, including unencrypted e-mail sent on the Internet, despite some risk of interception and
disclosure.” The risk of an e-mail being intercepted is not unlike the risk of using a telephone,
fax, or mail, where it is always possible that a transmission will be intercepted, lost, or stolen.
Just as a prudent lawyer dealing with particularly sensitive information should take heightened
measures to preserve confidentiality, the ABA Opinion cautions that for top secret client
information a lawyer should consult the client as to whether a mode of transmission other than email would be preferred.
Most states that have considered the subject have concluded that in the ordinary course of events,
an attorney may communicate with clients using unencrypted e-mail. Alaska Op. 98-2; Arizona
Op. 97-04; Connecticut Op. 99-52; D.C. Bar Op. 281 (1998); Florida Op. 00-4; Illinois Op. 9610; Iowa Op. 1997-1; Kentucky Op. E-403; Minnesota Op. 19 (1999); New York State Bar
Association Op. 709 (1998); Association of the Bar of the City of New York Op. 1998-2; North
Carolina RPC 215 (1995); North Dakota Op. 97-09; Ohio Op. 99-2 and 99-9; Pennsylvania Op.
97-130; South Carolina Op. 97-08; Utah Op. 00-01; and Vermont Op. 97-5.
Other jurisdictions have found that representation of or communication with a client via
electronic channels may violate Rule 1.6 absent an express waiver by the client. See Iowa Ethics
Formal Op. 96-1, finding that attorneys should not use e-mail to communicate with clients unless
they use security measures to protect confidentiality, such as encryption or a protected
password/firewall, or first obtain acknowledgment from the client about the security risks
involved in using e-mail and the Internet; South Carolina Ethics Opinion 94-27 (1995),
explaining that the nature of on-line services makes it possible for system operators to gain
access to all communications that are transmitted through them, and as various jurisdictions have
ruled in regard to communications via cellular phones, a lawyer should not use a cellular
telephone to discuss confidential information with clients –absent informed consent. North
Carolina State Bar Op. 215, 1995 WL 853887 (July 21, 1995), finding that “e-mail is susceptible
to interception by anyone who has access to the computer network to which a lawyer ‘logs on’
and such communications are rarely protected from interception by anything more than a simple
password.” “In using e-mail, or any other technological means of communication that is not
secure, an attorney must exercise precautions to protect client confidentiality.”
See
Massachusetts Ethics Opinion 94-5 (1994); New York City Ethics Opinion 1994-11 (1994); New
Hampshire Ethics Opinion 1991-92/6 (1992) (noting that confidential cellular phone
3
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
conversations may be permissible if scrambler used).
These ethics opinions focus only on exposure to disciplinary action when a lawyer uses e-mail.
Another issue is whether a lawyer and client may breach the requirement of confidentiality
essential to maintain the attorney-client privilege by sending privileged information via e-mail.
For the reasons cited in ABA Opinion 99-413, the privileged nature of e-mail communications
between attorney and client should be assured unless they are not securely stored after they have
been sent or received. Internal limitations on access to e-mail files and password protections
would safeguard the confidentiality of stored e-mail.
Still, waiver of the attorney-client privilege from use of unencrypted e-mail containing
confidential information could be found if a court were to follow the reasoning of Castano v.
American Tobacco Co., 896 F.Supp. 590 (E.D. La. 1995), involving supposedly privileged
documents that were available on the Internet through a public library. Other courts have refused
to recognize a reasonable expectation of privacy in electronic communications that can be
intercepted with more ease than regular land-line telephone calls. See Tyler v. Berodt, 877 F.2d
705 (CA 8 1989) (cordless phone). But see Shubert v. Metrophone Inc., 898 F.2d 401 (CA 3
1990) (transmission over cellular phone not intentional disclosure of content though subject to
interception). A military court has recognized a reasonable expectation of privacy in e-mail
messages for Fourth Amendment search and seizure purposes. United States v. Maxwell, 42 M.J.
568, 576 (US Air Force CtCrimApp 1995) (sender of e-mail messages had an reasonable
expectation of privacy: “[T]here was virtually no risk that . . . computer transmissions would be
received by anyone other than the intended recipients.”).
To enhance the claim of confidentiality and demonstrate the sender’s expectation of
confidentiality, some lawyers include confidentiality notices with the e-mail, such as:
This email contains confidential, privileged information intended only for the
addressee. Do not read, copy, or disseminate it unless you are the addressee. If
you have erroneously received this e-mail, please call us immediately at ___ and
please e-mail the message back to the sender. We appreciate your assistance in
correcting this error.
There may be an ethical duty on a lawyer who inadvertently receives e-mail with such a notice,
to avoid reviewing the contents, notify the lawyer who sent it, and abide by the instructions. See
ABA Formal Ethics Opinion 92-368 (1992) (inadvertent disclosure of confidential materials).
IV.
Monitoring Electronic Communications in the Workplace
Companies monitor their employees to review performance, ensure legal compliance, and
control costs. A 1999 survey of employer monitoring conducted by the American Management
Association of 1,054 AMA-member organizations found that 67 percent of employers conduct
some form of electronic monitoring and surveillance of employees.
Employers that monitor e-mails may assume a duty to take action if an employee is using
company e-mail to communicate threats or engage in other misconduct. A company that
4
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
monitored emails was sued for negligent supervision when an employee sent sexually explicit
messages to a child, and arranged a meeting with the child using the company's e-mail system.
When a company monitors email and learns – or should have learned – that someone is in
danger, the employer may be found to have a duty to act to protect that person.
Monitoring communications in the workplace may violate federal law. The Electronic
Communication Privacy Act of 1986 ("ECPA"), 18 U.S.C. §§ 2510-2711, prohibits the
intentional interception, access, disclosure or use of another person’s wire, oral, or electronic
communication. Section 2510(4) defines "interception" as the aural or other acquisition of the
contents of any wire, electronic, or oral communication through the use of any electronic,
mechanical, or other device. Section 2510(5) defines an "electronic, mechanical, or other
device" as any device or apparatus which can be used to intercept a wire, oral or electronic
communication other than-- (a) any telephone or telegraph instrument, equipment or facility or
other component thereof..." "Electronic communication" is "any transfer or signs, signals,
writing, images, sounds, data or intelligence of any nature transmitted in whole or in part by a
wire, radio, electromagnetic, photoelectric or photo-optical system that affects interstate
commerce, . . ." 18 U.S.C. § 2510(12).
The ECPA imposes criminal and civil liability. In a civil case a plaintiff may recover the greater
of either: (1) actual damages suffered and any profits made by the violator; or (2) statutory
damages (the greater of $100 a day for each day of violation or $10,000). 18 U.S.C. §
2520(c)(2). Attorneys' fees, litigation costs, and other equitable relief is also available. §
2520(a)(3). In a criminal prosecution, the penalty may be up to five years imprisonment and
fines up to $5000. § 2511(4)(a)-(b).
The ECPA only covers interstate commerce. Internal e-mail transmitted exclusively through a
private employer’s system might not be deemed to be in interstate commerce. However, a
network that handles internal e-mail messages, but also permits employees to transmit external email messages would probably be a "system that affects interstate commerce."
Section 2511(2)(a)(i) of the ECPA provides:
It shall not be unlawful under this chapter for an operator of a switchboard, or an officer,
employee, or agent of a provider of wire or electronic communication service, whose
facilities are used in the transmission of a wire or electronic communication, to intercept,
disclose, or use that communication in the normal course of his employment while
engaged in any activity which is a necessary incident to the rendition of his service or to
the protection of the rights or property of the provider of that service, except that a
provider of wire communication service to the public shall not utilize service observing
or random monitoring except for mechanical or service quality control checks.
It is not clear that merely maintaining an internal e-mail system transforms an employer into a
"provider" within the meaning of this statutory exception. For any monitoring activity to be
covered by the exception, the employer must show that the particular interception was in the
ordinary course of business and was necessary to the rendition of the service, or was necessary to
protect its rights or property. See, e.g., Bohach v. City of Reno, 932 F.Supp. 1232 (D.Nev., 1996)
5
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
(no ECPA violation in retrieval of stored communications from Reno Police Department’s
computer system because City was “provider” of electronic communications service and had
right of access to stored communications); Simmons v. Southwestern Bell Tel. Co., 452 F. Supp.
392, 396 (W.D. Okla. 1978), aff'd, 611 F.2d 342 (10th Cir. 1979) (in claim by telephone
company employee under § 2510 based on monitoring phone conversations, court found
company had legitimate reason for monitoring calls relating to service quality and need to
prevent persistent use of telephone for personal calls).
The business extension or ordinary course of business exception, 18 U.S.C. § 2510(5)(a) derives
from the definition of electronic device. A violation under the ECPA requires that an electronic
device be used to intercept the e-mail messages, but § 2510(5)(a) defines electronic device to
exclude any equipment furnished by a provider of electronic communication service in the
ordinary course of its business that is used by the user in the ordinary course of business.
Unlimited monitoring of employees has been held not in the ordinary course of business and not
justified under the Act. Sanders v. Robert Bosch Corp., 38 F.3d 736 (4th Cir. 1994) (employer
recorded employee telephone conversations 24 hours per day; interceptions not in ordinary
course of business despite proffered reason of bomb threat investigation – covert use of a
surveillance device must be justified by a valid business purpose); Watkins v. L.M. Berry & Co.,
704 F.2d 577 (11th Cir. 1983) (employer's interception of phone calls valid only to determine
whether the call was in fact personal; further interception unwarranted); Deal v. Spears, 980 F.2d
1153, 1157 (8th Cir. 1992) (effort to catch thief did not justify employer monitoring of phone
line for twenty-two hours of primarily personal phone calls).
Notice of any monitoring may be required. United States v. Harpel, 493 F.2d 346 (10th Cir.
1974) (telephone monitoring unlawful absent notice); James v. Newspaper Agency Corp., 591
F.2d 579, 581 (10th Cir. 1979) (monitoring lawful where employer provided notice to employees
and was for legitimate purposes of training, instruction and protection against abusive calls).
Courts have determined that an employer may monitor a "business" communication, but not a
"personal" communication. Watkins, 704 F.2d at 583 (monitoring personal calls never in
ordinary course of business unless to prohibit use of telephone or to determine whether call is
personal); Briggs v. American Air Filter Co., 630 F.2d 414, 419 (5th Cir. 1980) (no violation
where employer limited monitoring to portion of call in which employee discussed employer's
business with competitor); Epps v. St. Mary's Hosp. of Athens, Inc., 802 F.2d 412, 416-17 (11th
Cir. 1986) (monitoring conversations between employees concerning "scurrilous remarks" about
supervisors permitted).
Section 2511(d) provides that it is not be unlawful to intercept an electronic communication
when one of the parties to the communication has given prior consent to the interception.
Consent under may be implied or actual. Deal v. Spears, 980 F.2d 1153, 1157 (8th Cir. 1992);
Griggs-Ryan v. Connelly, 904 F.2d 112, 116 (1st Cir. 1990); George v. Carusone, 849 F. Supp.
159, 163 (D. Conn. 1994). Implied consent will not be found if an employee is merely aware
that monitoring may occur, as opposed to being notified that they are being monitored. In
Williams v. Poulos, 11 F.3rd 271(1st Cir., 1993) an employer’s interception of employee phone
calls was found not to be within the consent exception of the law because while a corporate
officer was told that employee calls would be monitored, he was not told that his calls would be
monitored or the manner in which the monitoring would take place. In Deal v. Spears, 980 F.2d
6
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
1153, 1157 (8th Cir., 1992) the court would not endorse employee consent to the tape recording
of phone calls simply because the employee had been warned that calls might be monitored or
because a phone extension was located in the owner’s home.
Several states have statutes protecting against the interception of electronic communications by
private parties: New Jersey Wiretapping and Electronic Surveillance Control Act, N.J.S.A.
2A:156A-1 et seq.; Pennsylvania Wiretapping and Electronic Surveillance Act, 18 Pa. Cons.
Stat. Ann. _ 5702 et seq.; Cal. Penal Code _ 631; Colo. Rev. Stat. Ann. _ 16-15-102; Md. Code
Ann. § 10-4A-01-08; and N.Y. Crim. Proc. Art. 700; Connecticut law protects employee e-mail
privacy rights, requiring employers to give employees notice of all forms of electronic
monitoring. See also California Senate Bill, (S.B. 1822), under which employers would be
required to inform employees of company policies and practices of reading employee e-mail and
tracking the Internet sites they visit.
V.
Invasion of Privacy
Monitoring of electronic communications can expose employers to state law tort claims. The
most likely claim would be the tort of unreasonable intrusion upon the seclusion of another.
Section 652B of the RESTATEMENT (SECOND) ON TORTS provides that Intrusion upon Seclusion
includes intruding upon the private affairs or concerns of another person. Liability does not
require information to be publicized or used by the employer, but the intrusion must be highly
offensive to a reasonable person. Electronic surveillance has been considered an "intrusion"
sufficient to establish that element of the tort. Billings v. Atkinson, 489 S.W.2d 858 (Tex. 1973);
Nader v. General Motors Corp., 255 N.E.2d 765 (N.Y. 1970) (telephone wiretapping). The
degree of intrusion, the context, conduct and circumstances surrounding the intrusion, as well as
the intruder's motives and objectives, the setting into which he intrudes, and the expectations of
those whose privacy is invaded determine the degree of offensiveness. Miller v. National
Broadcasting Co., 232 Cal. Rptr. 668, 679 (Cal. Ct. App. 1986).
The employee must have a subjective expectation of privacy and the expectation be objectively
reasonable. In determining employer liability for monitoring e-mail courts consider: whether
employees had a reasonable expectation of privacy and, if so, was there a legitimate business
justification for the intrusion sufficient to override that privacy expectation. Smyth v. The
Pillsbury Co., 914 F. Supp. 97 (E.D. Pa. 1996) (no reasonable expectation of privacy in e-mail
communications where employee terminated for inappropriate e-mail messages voluntarily sent
to supervisor despite employer’s assurance that e-mail messages would not be intercepted by
management).
At most companies, various passwords are used by employees to access the local network, to
gain entry to individual mail boxes, or to listen to voice-mail messages. Employees often believe
that their communications are private because they have a password which they can select and
change independently. The security provided by a password may be more apparent than real,
however. Electronic messages are preserved in assorted network servers or on back-up tapes,
which can be monitored by managers with a need or desire to know what communications are
being transmitted, or computer hacks who simply know how to gain access to stored data and get
cheap thrills from eavesdropping. If an employee asserts a claim of invasion of privacy based
7
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
upon workplace monitoring of electronic communications, courts will weigh the reasonableness of
the employee's expectation of privacy against the business interest of the employer in monitoring
the communication.
In Restuccia v. Burk Technology, Inc., 1996 WL 1329386 (Mass.Super., August 13, 1996), two
employees were terminated based upon e-mail messages they sent containing unflattering
references to the company’s president, which he accessed and reviewed. The Superior Court of
Massachusetts found a factual question as to whether a reasonable expectation of privacy in email might exist in a computer system that required a password to log in, permitted employees to
maintain individual passwords which they were reminded to change periodically, there was no
policy against using the system for personal e-mail messages, and employees were not told that
the supervisors could access their systems or that their e-mail files were automatically backed up
and that the supervisors had access to the back-up files. McLaren v. Microsoft Corporation,
1999 WL 339015 (Tex.App., May 28, 1999), also presented the issue of whether a cause of
action exists for invasion of privacy where an employer reviews e-mails stored in password
protected folders on the employee’s computer. Noting that during transmission over a network
e-mail exists in unencrypted plain text subject to review by network administrators and that the
communications are initially stored on a server, the court held that there was no reasonable
expectation of privacy even though the data was password protected. See also United States v.
Simons, 206 F.3rd 392 (4th Cir., 2000).
Conclusion
E-mail and electronic communications are a burgeoning field, not only for increased efficiency
and rapid transmission of information, but also of legal and ethical issues in the workplace and
law office. Employment counsel must stay abreast of new developments affecting workplace
privacy, monitoring, and communications, while maintaining appropriate protections for clients
with respect to counsel’s own use of new technologies.
8
© 2001 American Bar Association
http://www.bna.com/bnabooks/ababna/annual/2001/manela.doc
Download