Practitioner’s Perspective Employee Use of Email and the Internet— Considerations for Every Business

advertisement
Guide to Computer Law—Number 274
Practitioner’s Perspective
by Holly K. Towle, J.D.
Employee Use of Email
and the Internet—
Considerations for Every Business
Holly K. Towle is a
partner with Kirpatrick &
Lockhart Preston Gates
Ellis LLP (K&L Gates), an international law firm,
and chair of the firm’s E-merging Commerce
group. Holly is located in the firm’s Seattle
office and is the coauthor of The Law of
Electronic Commercial Transactions (2003,
A.S. Pratt & Sons). Holly.Towle@KLgates.com,
206-623-7580.
You’ve heard it before, and it’s still true: millions of employees begin the
work day by turning on a computer and accessing their employer’s network
and the Internet. Employers should take steps to protect themselves from
liabilities associated with employee use of such systems. If protections are
already in place, it might be time to update them. And when employers
use email systems to disseminate important information, they may wish to
track case law or other developments regarding how that is best done.
This article deals with five basic points:
1.
Email is simple to produce and alter. It can be widely and repeatedly
distributed with a few clicks or key strokes. Further, due to email’s
informal style and the widespread (but erroneous) belief that emails
or chat room comments are temporary, many computer messages are
composed and treated casually.
2.
Practitioner’s Perspective appears periodically
in the monthly ReportLetter of the CCH Guide to
Computer Law. Various practitioners provideindepth analyses of significant issues and trends.
Email differs from other methods of communication
Risks from employee activities
Employee use—or abuse—of electronic communication can create
liability to the employer under a range of theories. These include:
• Respondeat superior liability. Employee bad acts, including misuse of email and the Internet, can create liability for the employer
if the bad acts are within the employee’s scope of employment.
• Negligent hiring or supervision. Employee misuse of electronic
communication could expose the employer to liability for negligent hiring or supervision. Unsupervised use of the employer’s
email system to harass or otherwise harm someone could lead
to liability under either theory, although federal protections for
interactive computer services may supersede some state or federal law claims. Moreover, many employers have software that
maintains a record of Internet sites visited by employees—these
employers find such software beneficial in detecting improper
conduct. However, it can also provide damaging evidence that
the employer failed to address obvious employee misconduct.
• Sexual and other harassment. The courts have held employers
responsible for workplace harassment caused by misuse of electronic communication. They may find a “hostile work environment”
when employees are exposed to sexually explicit or suggestive
CCH GUIDE TO COMPUTER LAW
•
•
•
3.
emails, computer images or other downloads. Even
employee exposure to Internet sites not controlled
by the employer can lead to a hostile workplace. In
addition, employers may find themselves named as
defendants in lawsuits asserting that employees faced
racial, ethnic, religious, or other harassment through
use of email or the Internet.
Defamation. An employer could be sued for defamation if an employee makes a false assertion of
fact within the scope of employment. The Internet
provides an easy mechanism for transmission of
defamatory statements. Where the employer qualifies as an interactive computer service, however,
this state law cause of action may be preempted by
federal law.
Intellectual property infringement. Copyright,
trademark, and trade secret infringement threaten
employers in several ways. For example, employees
could appropriate the employer’s property using
electronic communications (consider a cell phone
with a camera and Internet access). Also, employers can become defendants when their employees
improperly copy the protected intellectual property
of others using the employer’s systems. In selected
circumstances, the Digital Millennium Copyright
Act may protect employers against liability for
infringement. Even if so, employers will not want
their systems to be misused, and some protections
are unavailable if the employer has knowledge of
and ability to prevent the infringement.
Criminal liability. Certain kinds of prosecutions—for example, employee use of the
employer’s computer equipment to traffic in
child pornography—could result in seizure of the
employer’s equipment.
Litigation risks
Email as evidence. While unique in some ways, email
is the same as a letter or memo in at least one important
way: it is an evidentiary record, discoverable and
potentially binding on an employer as an admission.
This also affects the employee, who may become the
subject of a subpoena for workplace emails in, for
example, a divorce or child custody action.
Special issues with privileged communication.
Communications with lawyers regarding legal advice
ordinarily are protected from disclosure in litigation,
but this protection can be waived by a company.
Otherwise protected email communications can
be waived if an intended recipient intentionally
discloses the communication to someone who
should not see it (like a non-employee or lower-level
employee), or if outsiders obtain a copy due to a
failure of security measures. Employers who believe
they can solve these problems with “logos” or other
NUMBER 274
routine notices on emails, are likely unaware of the
limitations of such measures.
4.
Potential employee rights
Privacy. Employee privacy rights can be violated when
the employer obtains a message despite the employee’s
reasonable expectation of privacy. In order to limit
exposure, employers should adopt computer usage
policies clearly notifying employees that email will be
monitored or intercepted. Additionally, some states
have statutes requiring particular forms of notice or
consent. In any case, the policy should deal with actual
practices. For example, does your policy forestall privacy
claims by former employees whose email addresses are
maintained in order to receive business emails sent by
customers unaware that the employee has left?
Some statutes may restrict employer access to data that
would not be protected by traditional privacy laws.
For example, laws increasingly restrict the collection
or transfer of personally identifying information data,
private or otherwise.
Union rights. Under federal labor law, employees have
a number of rights with respect to the formation and
joining of unions or cooperating to address workplace
concerns. An employer interfering with these rights
may commit an unfair labor practice. Restrictions on
employee use of email for these protected activities
could violate the law.
5.
Reducing the risks
Adopt a policy. Elements will vary by employer,
but most include at least the following (assuming
applicable law will allow):
• Employer ownership and control of all equipment
and messages; no employee right to email or Internet access.
• Email and Internet are provided principally for
business use. Personal use can be permitted within
stated parameters.
• No employee privacy in email, Internet and computer contents. The employer has the absolute right
to monitor, intercept and reproduce anything on
the employee’s computer.
• No improper use, including specific prohibitions
against listed behaviors.
• Specific steps to protect employer’s intellectual
property and trade secrets, as well as data of customers.
• Email/computer protocol, including common requirements that employees carefully prepare messages; avoid viruses; limit downloads; not modify
or misuse equipment; store or dispose of email; and
maintain confidentiality.
CCH GUIDE TO COMPUTER LAW
Train. Training lets employees know the proper
behavior and protocol for email and Internet use.
Training also should cover the impact of employee
emails under contract law: employees are potential
contract “waiver/amender” machines who can
disrupt an employer’s otherwise careful contracting
procedures. While some employees will break rules
intentionally, training can prevent problems or abuses
that result from ignorance or inadvertence.
Track Developments. In a recent case, an employer
learned that not all emails are equal. In Campbell
v. General Dynamics Gov’t Systems Corporation,2 a
Massachusetts district court concluded that the format
used in an employer’s email notice was insufficient to
count as notice of a change in employment policy to
include mandatory arbitration. Notably, the change
deprived an employee with a discrimination claim
under the American With Disabilities Act, of “rights
guaranteed to him by federal law.” The court said:
“[S]ending a mass email message, without more, fails
to constitute the minimal level of notice required by
the First Circuit under Rosenberg and other decisions”
regarding the Federal Arbitration Act.3
The court’s analysis should have focused solely on
the content of the notice itself, i.e., did it provide
notice as required by law? Instead, it also focused
NUMBER 274
on the medium of email itself as a possible reason for
inadequate notice. For example, the court correctly
noted that individuals receive many emails during the
day and that it is sometimes difficult to discern critical
ones. Although that is true, it is also true of postal
mail arriving with junk mail, or of intra-office physical
mail which is composed of both routine and critical
memos, as well as myriad other critical and mundane
communications. The court also lumped receipt of an
email showing the “sender” as the company president
and the topic as “New Dispute Resolution Policy,” with
emails about birthdays. It is not credible to assume that
an employee does not know the difference.
Nevertheless, the case correctly reflects principles that
when a contract or notice is required to meet certain
requirements, use of email to meet those requirements
needs to be measured against the requirements and one
should not assume that all communications are equal.
Thus, if a requirement is that a particular communication
be conspicuous, then the communication needs to be
conspicuous whether that is done electronically or nonelectronically. The basic rules still apply!
ENDNOTES
1
Campbell v. General Dynamics Gov’t Systems Corporation,
321 F. Supp. 2d 142 (D.MA 2004).
2
Id. at 150.
Download