Employee Privacy in the Workplace, When the Workplace is a... Key Policy Considerations By

advertisement
Employee Privacy in the Workplace, When the Workplace is a Sheriff’s Office
Key Policy Considerations
By
Thomas N. Edmonds, J.D.
Sheriff, Kalamazoo County, Retired
MSA Special Counsel
Introduction:
Recent court cases have underscored the importance of addressing several employee
privacy issues by agency policy and enforcing policy in a fair and consistent manner.
This paper will address the following topics:
Departmentally furnished communication devices e.g. cell phones, PDAs,
etc.
Personally owned communication devices
Employer furnished containers in the workplace e.g. desks, lockers, etc.
Personal searches
Policy drafting and implementing considerations
Privacy in the Workplace, page 2
Departmentally Furnished (Governmentally Owned) Communications Devices:
The critical issue for policy consideration with regard to furnished communication
devices is whether or not personal use will be permitted, and if so, under what specific
circumstances. A Federal Court recently considered the issue of a police officer’s right to
expect privacy in the content of personal communications made on a furnished device
and in a somewhat surprising decision, ruled that the officer had a reasonable expectation
of privacy in the content and recipients of personal communications (sexually explicit
text messages) made on duty on a furnished device.
How so? Because the employer’s policy that was intended to prevent misuse of the
device and control personal use was out of date and not consistently enforced. Quon v.
Arch Wireless Op. Co.
The teaching points from Quon are simply that an agency must have a clear, up to date
policy specifically addressing personal use of furnished communications devices and the
policy must be communicated to all employees and consistently enforced. It should be
noted that permitting personal use is a slippery slope, and probably not necessary in
today’s world where everybody has at least a personal cell phone.
Personally Owned Communications Devices:
The issues for consideration with regard to the on duty and/or on premises use of
personally owned or leased devices are: use on duty; use on duty for work related
business; use while operating a motor vehicle.
Practically speaking, it will be virtually impossible to eliminate on duty use of personally
owned devices in today’s world. At best, policy can and should effectively control use in
the following situations: not during departmental meetings, briefings, citizen
contact/interviews, not for official business and not while operating a motor vehicle.
It has become commonplace to see police officers on their cell phones and even texting
while driving marked police vehicles. Many officers circumvent or supplement the use of
official communications channels by using personally owned devices for official or quasi
official communications about police activity. Three problems arise from this activity;
command and control functions are eroded; critical information is not monitored and
recorded, and distracted driving (and the public perception of a dual standard) result.
Privacy in the Workplace, page 3
Use of “unofficial” communications channels to conduct police business is a common but
dangerous practice. It doesn’t provide the monitoring, controlling and recording functions
that automatically occur in official communications systems. It doesn’t provide the record
of actions taken and the circumstances under which those actions were taken that has
become so critical to defending police actions when they are challenged in court, for
example when a pursuit results in a bystander fatality. Officers should be made to
understand the importance of this factor. Officer safety is compromised, as the dispatch
center is not privy to critical information about police activity.
Also of emerging concern is unauthorized employee use of personal e-mails, blog
postings, etc. to discuss or reveal official communications, official activity, or internal
and confidential policies and/or communications.
Agency should establish policy to address these issues.
Employer Furnished Containers:
“Container” in the context of this discussion includes lockers, desks, filing cabinets,
government owned and furnished computers, briefcases, car glove boxes and trunks.
Courts have consistently found that under certain circumstances, the use by employees to
store personal items in such containers my give rise to a constitutionally protected
expectation of privacy, and in some cases mandated the suppression of drugs, stolen
property, etc.
Sometimes critical managerial needs or emergency circumstances can overcome this
expectation of privacy, but it is best addressed by carefully drafted policy. Two
approaches have emerged in policies designed to address this issue. Some take the route
of attempting to extinguish any expectation of privacy by requiring employees to consent
to the search of such containers and acknowledge that they have no expectation of
privacy as a condition of employment. Others have established a protocol under which
such searches are permitted, specifying among other things who may search, where and
who must approve the search in advance.
It is suggested that a combination of both approaches will best suit a police agency.
Employees should be required to acknowledge and agree to the policy in writing at the
time of initial employment and on a periodic basis (perhaps annually) after that.
Special considerations exist with regard to the monitoring of personal electronic
communications by employees. It is not recommended that an employer by policy of
otherwise, attempt to intercept or monitor an employee’s communications on the
employee’s personal e-mail accounts. Public postings that anyone may legitimately
access can be used as a basis for discipline if they otherwise violate a non-disclosure
policy.
Workplace Privacy, page 4
Communications sent over employer provided e-mail systems can and should be
addressed by policy, as they are legitimately subject to monitoring by the employer.
Policy should address and prohibit misuse of the employer provided e-mail and internet
activity. It would appear that an employer may also monitor and discipline misconduct
arising out of e-mail activity on non-employer provided systems such as Yahoo and
Hotmail if access to the account or system was obtained through the employer’s server
and internet access.
Personal Searches:
If a search of the person of an employee (which would include his/her auto and
containers in his/her possession such as a backpack, purse or briefcase) becomes
necessary to seize or preserve evidence of criminal conduct, then the standard rules of 4th
Amendment law apply. It is possible to justify certain random, non probable cause based
search of the person of an employee if a valid need can be established on the part of the
employer and the employer’s policy permitting such searches has been clearly
communicated to the employee.
There would appear to be little justification on the part of most police agencies for such a
policy except in perhaps unique circumstances such as evidence technicians having
access to drugs, etc. or perhaps property custodians in correctional facilities.
Video Surveillance:
Video surveillance of common areas appears to be legally permitted and in car cameras
have recorded police misconduct which has subsequently been admitted in court.
Employees have been successful in attacking video surveillance in areas where they may
reasonably expect privacy (restrooms, locker rooms, etc) when they were not made aware
of the surveillance.
Employees who have been caught in areas where they were not expected to be, or did not
have authority to be by video surveillance intended to record criminal conduct have been
denied recourse by the courts.
Drafting and Implementing Policy
Experts recognize the “Three Es” of policy: Establish Educate and Enforce”. What they
are saying is critical. You must have a policy before you can enforce it and discipline for
a violation. The courts have said you must communicate your policies clearly and
effectively to your employees before you seek to enforce them. Finally, you must
recognize that neglecting to enforce policy or selective enforcement makes the policy
unenforceable, and that “an exception will eat the rule”; that is to say that an exception
for one is an exception for all, and becomes the new rule.
Workplace Privacy, page 5
Sample or model policies are readily available to address each of these topics. For a very
comprehensive discussion of workplace privacy, complete with sample policies, see
Workplace Privacy Policies by Robert D Brownstone, Esq. a copyrighted paper presented
at the National Employment Law Institute, Public Sector EEO and Employment Law
Conference, August 28, 2009 and available by going to Google and entering “28th annual
public sector EEO” and then clicking on “Workplace Privacy Policies by Robert D.
Brownstone.”
Download