Workplace Email Privacy Concerns

advertisement
Temple Environmental Law & Technology Journal – Fall, 2001
20 Temp. Envtl. L. & Tech. J. 73
Workplace E-mail Privacy Concerns: Balancing the Personal Dignity of Employees with the Proprietary
Interests of Employers
By Peter J. Isajiw1
I.
Introduction
The danger of electronic devices eroding personal privacy that Samuel D. Warren and Louis D. Brandeis warned of
over one hundred years ago threaten the modern employee in ways they could never have imagined. These fathers of
privacy successfully argued for the creation of a common law right to be let alone based on the underlying concept
of the “inviolate personality” expressed in various tort actions.2 They took great care to distinguish this right from
property rights.3 Despite this distinction, courts have largely looked to ownership of property and not the inviolate
personality of employees when ruling on reasonable expectations of privacy in the case of employee privacy in
electronic mail (“e-mail”) correspondence accessed at work. While Warren and Brandeis thought the common law
was the best tool for establishing this right,4 years of precedent, including recent decisions, have construed this right
too narrowly in the context of employer/employee relationships.5 In light of this precedent, statutory intervention
seems the only means to protect individual human dignity and privacy in e-mail accessed at work.
Technology often outpaces the law.6 This complaint is heard frequently when discussing employee privacy in e-mail
communications accessed in the workplace.7 This complaint is of particular importance when discussing a [*75]
reasonable expectation of privacy because the legal system’s inherent slowness is intrinsically tied to the
reasonableness of that expectation.8 For example, after a court ruled in 1996 that there is no expectation of privacy
in workplace e-mail, it was much more difficult to argue in 2001 that such an expectation is reasonable.9 This
1
I would like to thank Professor Kathryn M. Stanchi. This article would not be possible without her mentoring, advice, and patience.
2
See id. at 205 (arguing that the right to privacy underlies torts such as libel and slander, and recognizing the inviolate personality of humans
when the law allows recovery for damage to personal reputation, or emotions as opposed to property damage).
3
Id. at 205.
4
Id. at 220.
5
See Smyth v. Pillsbury, 914 F. Supp. 97, 101 (E.D. Pa. 1996) (finding no expectation of privacy in e-mail despite the company’s assurances that
it would not monitor such communications); O’Conner v. Ortega, 480 U.S. 709, 715 (1987) (finding government employee’s privacy rights
superceded by employer’s need to supervise and control); Epps v. Saint Mary’s Hosp. of Athens, Inc., 802 F.2d 412, 417 (11th Cir. 1986)
(finding conversations over company phones between employees could be monitored to prevent potential contamination of the workplace by
negative remarks about supervisors); Wesley Coll. v. Pitts, 974 F. Supp. 375, 385 (D. Del. 1997), aff’d, 172 F.3d 861 (3d Cir. 1998)(holding
employer not liable for reading employee e-mail).
6
See Star Publ’g Co. v. Pima County Attorney’s Office, 891 P.2d 899, 902 (Ariz. Ct. App. 1994) (Espinosa, J., dissenting) (commenting that a
document production request that encompassed 1,300 computer entries raised “new questions concerning the privacy of electronic mail in the
workplace . . . This may indeed be a case where technology has once again outpaced the law.”); United States v. Maxwell, 45 M.J. 406, 410
(C.A.A.F. 1996) (ruling that an Air Force Colonel had a reasonable, albeit limited, expectation of privacy in e-mail messages he sent or received
using America Online). The Maxwell court said: New technologies create interesting challenges to long established legal concepts. Thus, just as
when the telephone gained nationwide use and acceptance, when automobiles became the established mode of transportation, and when cellular
telephones came into widespread use, now personal computers, hooked up to large networks, are so widely used that the scope of Fourth
Amendment core concepts of “privacy” as applied to them must be reexamined. Consequently, this opinion and the ones surely to follow will
affect each one of us who has logged onto the “information superhighway.” Id. at 410.
7
See Margret Steen, When E-mail Puts You at Risk, Info World, Tuesday July 6, 1999, available at
http://www.pcworld.com/news/article/0,aid,11679,00.asp (last visited March 25, 2002) (noting that the legal issues raised by employee e-mail are
not new, rather the novel issue is determining how old laws apply to e-mail and educating employees on the subject).
8
See infra notes 206-207 and accompanying text for a discussion of how the slow pace of law is tied to the reasonableness of expectations of
privacy.
9
Smyth, 914 F. Supp. at 101 (finding, in an intrusion into seclusion case, no expectation of privacy in e-mail despite the company’s assurances
that such communications would not be monitored where an employee voluntarily e-mailed his supervisor).
Copyright (c) 2001 Temple Environmental Law & Technology Journal
Comment calls for a balance between employer and employee interests in the use of electronic communications at
the workplace.10 It examines the failures of the current law that cause litigation to favor the employer and allows the
employer to control the level of privacy employees can expect.11 Furthermore, because the Internet and e-mail are
interstate mediums, this comment calls for federal legislation designed to protect the privacy rights of employees.12
II.
Overview
American employees work more hours per year than any other industrialized nation.13 A recent United Nations
survey conducted by the International Labor Organization indicates that American employees worked an average of
1,966 hours in 1997, which represents a four percent increase in annual hours at work, up from 1,883 in 1980.14 In
order to manage personal and business affairs more efficiently, many turn to e-mail.15 Over 85 percent of adults
send or receive personal e-mail messages at work.16 Studies also show that most employees believe that their emails are private.17 A smaller [*76] percentage of the American workforce believes that although third parties can
probably access their e-mails, those messages are not being read.18 These figures are disturbing because they
contrast starkly with studies indicating over 73.5 percent of employers monitor some form of employee
communication, and 38.1 percent store and review e-mail messages.19 When employers do monitor, less then 66.2
percent actually inform their employees of monitoring.20 The level of privacy employees can expect in their
workplace e-mail is therefore an important issue in the information age.
Recent events and cases highlight the importance of privacy in workplace e-mail correspondence. E-mail use in the
workplace raises concerns for the employer and employee alike. For the employee, personal privacy and job stability
concerns are at the forefront of the debate. For example, in Clark County, Las Vegas, Nevada, a sexually explicit
photograph originating from a deputy district attorney’s computer was sent to a few recipients and forwarded to a
senior judge, who inadvertently forwarded it to a list of county workers.21 Those county employees involved were
suspended without pay.22 In another example, the New York Times Company’s business office in Norfolk, Virginia,
fired ten percent of its work force (22 employees) when an investigation into employee computer files indicated that
10
See infra Parts II and IV.A for a discussion of employer versus employee interests in the use of electronic communications at work.
11
See infra Part II.A-D for a discussion of failures of current applicable law.
12
See infra Part III for a discussion of proposed requirements of workplace privacy legislation.
13
United Nations International Labor Organization Report on Labor Productivity (1999), available at
http://www.ilo.org/public/english/60empfor/polemp/kilm/index.htm (last visited Jan. 31 2000) (on file with the Temple Environmental Law and
Technology Journal); see also, Stephanie Nebehay, Yankee Rat Race -The American Way: Longer Hours! More Productivity!, Reuters
ABCNews.com, Sept. 6, 1999, available at http://abcnews.go.com/sections/us/DailyNews/ilo<_>americans.html (last visited April 11, 2001)
(on file with the Temple Environmental Law and Technology Journal) (discussing the U.N./I.L.O. survey). Compare the United States annual
average in 1997 with: France 1,656, Germany 1,560, Great Britain 1,731, Norway 1,399, Sweden 1,552, Australia 1,867, New Zealand 1,838, and
Canada 1,732.
14
United Nations International Labor Organization Report on Labor Productivity (1999), available at
http://www.ilo.org/public/english/60empfor/polemp/kilm/index.htm (last visited Jan. 31 2000) (on file with the Temple Journal of Environmental
Law and Technology)
15
Steen, supra note 8.
16
Id.
17
See, e.g., Jennifer J. Griffin, The Monitoring of Electronic Mail in the Private Sector Workplace: an Electronic Assault on Employee Privacy
Rights, 4 Software L.J. 493, 494 (1991) (arguing that most employees consider their e-mail private); Jared D. Beeson, Cyberprivacy on the
Corporate Intranet: Does the Law Allow Private-Sector Employers to Read Their Employees’s E-mail?, 20 U. Haw. L. Rev. 165, 167 (1998)
(noting that the majority of employees feel their e-mail is private).
18
Am. Management Ass’n., 2000 AMA Survey on Workplace Testing: Monitoring and Surveillance 1 (2000).
19
Id.
20
Charles Pillar, Bosses With X-Ray Eyes, Macworld, July 1993, at 118, 123 (chart).
21
Adrienne Packer, Obscene E-mail Traced to Deputy DA, Las Vegas Sun, Feb. 9, 2000, available at
http://www.lasvegassun.com/sunbin/stories/1v-gov/2000/feb/09/509825202.html (last visited April 3, 2001).
22
Id.
-2-
these employees sent or forwarded potentially offensive e-mails to others in the office.23 The company served
warning letters to twenty more employees who received but did not forward offensive e-mails.24 Most of the
employees involved were in good standing before this incident, including one who had been recognized as
“employee of the quarter.”25 In yet another example, Northwest Airlines conducted court-authorized searches of the
home computers of more then 12 flight attendants suspected of organizing a “sick-out” over the holiday travel
season.26
These examples illustrate the drastic effects e-mail monitoring can have on an employee, although the debate on email monitoring also implicates the employer’s interests.
For the employer, employee e-mail use raises issues that include productivity, legal liability, market competition,
efficiency and workplace morale. E-mail can be used as evidence in sexual harassment suits, discrimination suits,
and hostile work environment claims. Monitoring e-mail [*77] use can subject the employer to liability for invasion
of employee privacy or violation of state and federal laws. In fact, “any kind of liability that an employee can create
through communication, they can do through e-mail [sic].”27 For example, employees may send or receive racist
jokes28 or sexually explicit e-mail messages,29 either of which could be grounds for or evidence of discrimination or
harassment actions against the company. Furthermore, market competition and the property rights of an employer
can be affected if an employee who takes a job with a competitor uses a company e-mail account to send her future
employer proprietary documents containing trade secrets.30
In fact, recent studies indicate that of the 85 percent of adults who use workplace e-mail for personal messages, 70
percent have sent or received adult-oriented e-mail messages at work, and 64 percent have sent or received sexist or
racist e-mail messages.31 Moreover, even if no illegal activity is suspected, employers have reasons to monitor their
employee’s e-mail.32 By definition, an employee composing a personal e-mail is not working during its composition
and, therefore, personal e-mail use at work affects productivity. 33 Also, as documents can be transmitted as
attachments to e-mail, an employer may need to search through an employee’s e-mails in an attempt to recover
crucial documents that have been lost.34 For these reasons, determining the level of privacy employees can expect
with regard to their e-mail messages accessed in the workplace is of utmost importance in the modern business
environment.
Understanding the issue of employee expectations of privacy in workplace e-mail correspondence requires
examining the right to privacy in United States constitutional law,35 the codification of federal legislation to extend
23
Ann Carms, Prying Times: Those Bawdy E-Mails Were Good for a Laugh, Wall St. J., Feb. 4, 2000, at A1.
24
Id.
25
Id.
26
Michael J. McCarthy, Data Raid: In Airline’s Suit, PC Becomes Legal Pawn, Raising Privacy Issues, Wall St. J., May 24, 2000, at A1,
available at 2000 WL-WSJ 3030469.
27
Steen, supra note 8 (quoting Jim Bruce, a partner at the law firm of Wiley Rein & Fielding, in Washington D.C.).
28
See Owens v. Morgan Stanley & Co., 1997 U.S. Dist. LEXIS 20493 (S.D.N.Y. 1997) (transferring of racists jokes over e-mail used as
evidence in employment discrimination suit).
29
See Strauss v. Microsoft, 856 F. Supp. 821 (S.D.N.Y. 1994) (transferring of sexually explicit e-mails used as evidence in sex discrimination
suit).
30
See United States v. Hsu, 155 F.3d 189, 192 (3d Cir. 1998) (discussing evidentiary issues under the Economic Espionage Act of 1996 arising
from an employee sending trade secrets to an undercover F.B.I. agent via e-mail).
31
Steen, supra note 8.
32
Id.
33
Id.
34
Id.
35
See infra Part II.A for a discussion of the Constitutional right to privacy.
-3-
this protection to private sector employees,36 the failings of that federal legislation,37 and the state and common law
that may protect employee privacy in the workplace.38 Furthermore, examining the differences in ideology
underlying United States and European conceptions of privacy reveals that [*78] European law treats privacy as a
matter of human dignity while American law treats privacy as a property right. This may explain the difficulties
American employees face in obtaining favorable treatment with respect to privacy in the workplace.
A.
Privacy and the U.S. Constitution
Although the Constitution does not specifically enumerate the right to privacy, the United States Supreme Court has
recognized that the right to privacy flows from the penumbra and emanations of the First, Third, Fourth, and Fifth
Amendments.39 Constitutional prohibitions, however, apply only to government actors, so the privacy protections of
the Fourth Amendment40 against unreasonable searches and seizures cover only public sector employees.41 Two
significant cases shaped the law of privacy in the workplace under constitutional law. The first case, Katz v. United
States,42 led to Congressional enactment of The Federal Wiretapping Act,43 which extended the privacy protections
granted to public sector employees to the private sector. The second, O’Connor v. Ortega,44 defines the scope of
privacy [*79] protection granted to public employees. 45
In Katz, the Supreme Court held that electronic surveillance without a warrant violated the Fourth Amendment’s
prohibition against unreasonable searches and seizures.46 The Court in Katz47 declared that determining whether a
person has a reasonable expectation of privacy under the Fourth Amendment requires examining whether a person
in the given situation has an actual or subjective expectation of privacy and whether that expectation is one that
36
See infra Part II.B for a discussion of the Electronic Communications Privacy Act.
37
See infra Part II.B for a discussion of how the exceptions to the Electronic Communication Privacy Act prevent it from providing adequate
protection to employee e-mail.
38
See infra Part II.C for a discussion of how the tort of intrusion into seclusion may be applied to the issue of employee e-mail privacy.
39
See Griswold v. Connecticut, 381 U.S. 479, 484-85 (1965) (holding a Connecticut law prohibiting married couples from using contraceptives
unconstitutional because it violated the zone of privacy created by the Bill of Rights); Katz v. United States, 389 U.S. 347, 361 (1967) (holding
warrantless electronic surveillance to be in violation of the Fourth Amendment’s protection from unreasonable search and seizures). An in depth
discussion of the right to privacy is beyond the scope of this comment. See also Ken Gormley, One Hundred Years of Privacy, 1992 Wis. L. Rev.
1335 (1992).
40
U.S. Const. amend. IV, 1 (guaranteeing “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures”).
41
See O’Connor v. Ortega, 480 U.S. 709, 716 (1987) (noting Fourth Amendment applies to searches conducted by public employers); Simmons
v. Southwestern Bell Tel. Co., 452 F. Supp. 392, 394-95 (W.D. Okla. 1978), aff’d, 611 F.2d 342 (10th Cir. 1979) (noting constitutional privacy
protection is only as against government intrusions into a person’s privacy).
42
See Katz, 389 U.S. 347 at 361 (holding that F.B.I.’s use of listening device on public telephone without warrant violates Fourth Amendment if
the person monitored exhibits an actual (subjective) expectation of privacy that society would recognize as reasonable). Katz overruled Olmstead
v. United States, which held that so long as the government did not enter the home, interceptions obtained by warrantless taps placed on
telephones were not “searches” and were therefore admissible. Olmstead v. United States, 277 U.S. 438, 465 (1928). In the Olmstead dissent,
Justice Brandeis argued that privacy defined as the “right to be let alone” is a right and therefore it was immaterial where the physical connection
to the telephone wires were made. Brandeis’s dissent foreshadowed the e-mail privacy debate when he observed that: Ways may some day be
developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled
to expose to a jury the most intimate occurrences of the home . . . Can it be that the Constitution affords no protection against such invasions of
individual security? Id. at 474. The Court adopted Brandeis’s reasoning when it overruled Olmstead in Katz stating that “the Fourth Amendment
protects people not places. What a person knowingly exposes to the public . . . is not a subject of Fourth Amendment protection . . . But what he
seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” Id. at 351.
43
Title III of the Omnibus Crime Control and Safe Streets Act (The Federal Wiretapping Act), 18 U.S.C. 2510-2522 (2000)The Senate Report
associated with Title III states “Title III was drafted to . . . conform with Katz . . .” S. Rep. No. 90-1097, at 66 (1968), reprinted in 1968
U.S.C.C.A.N. 2112, 2153.
44
O’Connor, 480 U.S. 709.
45
See infra notes 61-71 and accompanying text for a discussion of the level of privacy that O’Connor extends to public sector employees.
46
Katz, 389 U.S. at 361.
47
Id.
-4-
society recognizes as reasonable.48 At issue in Katz was the government’s warrantless monitoring of a conversation
in a public phone booth.49 The Court devised a two-part test to determine whether the plaintiff exhibited an
“expectation of privacy”50 that “society is prepared to recognize as reasonable.”51 Whether such an expectation
exists is determined by examining a number of factors such as the private nature of the information involved and
whether the individual had “knowingly exposed” the information to the public.52 The first prong of the analysis
looks to whether the individual “exhibited an actual (subjective) expectation of privacy” 53 by showing that she
“seeks to preserve (something) as private.”54 The second prong, which is dispositive55 in most cases, asks whether
the individual’s expectation of privacy is one that society would deem reasonable.56 The principles expressed in
Katz underlie the federal legislation against wiretapping, which will be discussed below.57
At first blush, one would think that secret e-mail monitoring by employers would not pass constitutional muster
under the Katz test considering that most [*80] American employees believe that their e-mails are private.58
However, this does not seem to be the case. Although the United States Supreme Court has not addressed the issue
of employer e-mail monitoring, if an e-mail user knows his employer might intercept his messages courts would
likely consider his use of e-mail a voluntary conveyance of information to the public, thus limiting his subjective
expectation of privacy under Katz.59
The Court’s ruling in O’Connor v. Ortega60 defined the scope of the Fourth Amendment’s privacy protection for
public sector employees. In O’Connor, a psychiatrist claimed that the state hospital in which he worked violated his
Fourth Amendment rights by searching his office and seizing items from his desk and filing cabinets.61 The Court
held that workplace searches must be judged by a “standard of reasonableness”62 and that the Fourth Amendment is
violated only if employees have an “expectation of privacy that society is prepared to consider reasonable.”63
The reasonableness standard allows for an employee’s expectation of privacy to be reduced “by virtue of actual
office practices and procedures . . .”64 The Court balanced the employee’s privacy interests with the employer’s
48
Id.
49
Id. at 348. In Katz, F.B.I. agents monitored defendant’s conversation without a warrant by attaching a listening device to a public phone booth.
50
Id. at 361 (Harlan J., concurring).
51
Id.
52
Id. at 351. Other criteria the Court considered were whether there was a legitimate purpose or “compelling interest” in the disclosure or seizure
of the information; whether there were alternative means of obtaining the information; whether there were property rights implicated in the
seizure of information; and what if any precautions were taken by the government to protect these rights. Id. at 351-354.
53
Id. at 361.
54
Id. at 361.
55
The Katz standard was later adopted in Smith v. Maryland, 442 U.S. 735 (1979). In Smith, police requested a telephone company to use a pen
register to track the numbers dialed from a robbery suspects home. The Court decided that the suspect had no reasonable expectation of privacy
stating that all subscribers realize “that the phone company has facilities for making permanent records of the numbers they dial . . .” Id. at 742.
Further, the Court concluded that any expectation of privacy was unreasonable because Smith knowingly exposed the information about the
numbers dialed when he “voluntarily conveyed numerical information to the telephone company. . . .” Id. at 744.
56
Katz, 389 U.S. at 361.
57
See infra Part II.B for a discussion of Title III.
58
See Caroline M. Cooney & Lisa Arbetter, Who’s Watching the Workplace? The Electronic Monitoring Debate Spreads to Capitol Hill, Sec.
Mgmt., Nov. 1, 1991, at 26, 29 (citing an August 1991 reader survey); Paul E. Hash & Christina M. Ibrahim, E-mail, Electronic Monitoring, and
Employee Privacy, 37 S. Tex. L. Rev. 893, 894 (1996) (arguing that most employees consider their e-mail private).
59
See Smith, 422 U.S. at 744 (noting that the voluntary conveyance of information makes an expectation of privacy unreasonable).
60
480 U.S. 709 (1987).
61
Id. at 714.
62
Id. at 725-26.
63
Id. at 725.
64
Id. at 717.
-5-
interest in workplace supervision and control.65 Therefore, the Court determined that a search of a public
employee’s physical work area is reasonable when the employer has a legitimate business interest that outweighs the
employee’s privacy concerns.66 The Court further declared that non-investigatory, work-related searches carry a
presumption of reasonableness.67 This language, combined with the broad definition of legitimate business interests
found in other cases, in effect leaves the determination of employee expectations of privacy in the hands of the
employer.68 There has been no real test of this standard as applied to the monitoring of e-mail correspondences of
government employees.69 However, [*81] even if this standard would protect such correspondence, the protection is
limited to governmental employment70 and would not apply the vast majority of American employees.
B.
Federal Statutory Regulation of Employee Privacy
No federal statute explicitly addresses the issue of employers monitoring the e-mail correspondence of their
employees in the workplace. However, the Electronic Communications Privacy Act of 1986 (“ECPA”)71 arguably
limits employer interceptions of employee e-mail messages, although the statutory language speaks of “electronic
communications”72 and does not specifically mention electronic mail. The purpose of the ECPA was to update a law
that an explosion of technological advances had outdated.73 The legislative history of the ECPA makes clear that
Congress intended to update The Federal Wiretapping Act,74 originally designed to limit interceptions of telephone
communications, to include within the definition of “electronic communication,”75 new technology such as pagers,
mobile phones, digital information, and e-mail messages.76 Subsequent case law has also made clear that e-mail falls
into the category of communications covered by the ECPA.77 The few courts that have dealt with employee e-mail
privacy under the ECPA narrowly construe what constitutes an “interception”78 under the Act, requiring an illegal
interception of e-mail to occur in the seconds between when a message is sent and when it was received. This
narrow construction, combined with the three major exceptions to the provisions of the Act, tends to shield
employers from liability.79
65
Id. at 721-722.
66
Id. at 725-726.
67
Id. at 726.
68
See infra Part II.B.1 for a discussion of the broad range of acceptable business interests.
69
It appears that the reasoning of O’Connor would be problematic in the context of employee e-mail. O’Connor dealt with the search of an
employee’s physical space whereas e-mail interceptions would involve an invasion of cyberspace. For a more detailed discussion of the
difficulties in applying the O’Connor criteria to e-mail, see Steven B. Winters, Do Not Fold, Spindle or Mutilate: An Examination of Workplace
Privacy in Electronic Mail, 1 S. Cal. Interdisciplinary. L. J. 85, 100-103 (1992) (arguing that the analysis of Ortega which focuses on the original
intent of the Constitutional framers, and the invasion of a physical space, cannot be accurately applied to e-mail).
70
See supra Part II.A for a discussion of the Fourth Amendments applicability to public sector employees.
71
18 U.S.C. 2510-2522 (2000). The ECPA covers the “interception” of any “wire” or “electronic communications”. Id. at 2511.
72
Id. at 2511.
73
See S. Rep. No. 99-541, 99th Cong., at 13-14 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3562-66 (stating that e-mail is one of many “new
telecommunications and computer technologies referred to in the Electronic Communications Privacy Act”).
74
18 U.S.C. 2510-2525 (1968).
75
Id. at 2511.
76
See S. Rep. No. 99-541, 99th Cong., at 13-14 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3562-66 (stating that e-mail is one of many “new
telecommunications and computer technologies referred to in the Electronic Communications Privacy Act”).
77
See, e.g., Steve Jackson Games, Inc. v. United States Secret Serv., 26 F.3d 457, 461 (5th Cir. 1994) (noting that e-mail can be illegally
intercepted and therefore falls in the purview of the ECPA); Wesley Coll. v. Pitts, 974 F. Supp. 375, 385 (D. Del. 1997) (explaining that the term
“electronic communication” in the ECPA includes e-mail).
78
18 U.S.C. 2510(4) (2000).
79
See infra Parts II.B.1-3 for a discussion of the failings of the ECPA in the context of employee e-mail privacy.
-6-
In 1968, Congress enacted Title III of the Omnibus Crime Control and Safe Streets Act80 to conform to the holdings
of the Supreme Court in Katz v. [*82] United States81 and Berger v. New York.82 Title III was originally intended to
regulate the use of hidden microphones and wiretaps on telephone equipment and to extend this protection to private
business and individuals, as well as government.83 Twenty years after the enactment of Title III, Congress realized
that advances in communications technology rendered the act “hopelessly out of date.”84 In 1986, Congress
amended the Act with the ECPA to account for these communications advances.85
The ECPA contains two sections of statutory text relevant to the issue of employee e-mail privacy. One prohibits the
interception of electronic communications; the other prohibits the unauthorized acquisition of electronic
communications in storage. Title I of the Act prohibits the unauthorized and intentional “interception” of “wire” and
“electronic communications” while those communications are in transit from the sender to the receiver.86 Title I
defines an illegal “interception” as the “aural or other” acquisition of the contents of the communication through use
of any “electronic, mechanical, or other device.”87 The Act defines “electronic communication” as “any transfer of
signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire,
radio, electromagnetic, photoelectric or photooptical system that affects interstate or foreign commerce.”88 The
legislative history of the statute indicates that Congress intended this broad language to encompass electronic mail.89
Title II of the ECPA (“The Stored Communications Act”)90 protects against the unauthorized acquisition of
electronic communications in storage.91 [*83] Title II defines “electronic storage” as “(A) any temporary,
intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and (B)
any storage of such communication by an electronic communication service for the purposes of backup protection of
such communication.”92 A person violates Title II whenever he or she “intentionally accesses without authorization
a facility through which an electronic communication service is provided.”93 The Act sets forth criminal penalties,94
as well as civil damages of $ 100 per day for each day the Act is violated or $ 10,000, whichever is greater.95
80
18 U.S.C. 2510-2525 (1968); see also Thomas R. Greenberg, Comment, E-mail & Voicemail: Employee Privacy & the Federal Wiretap
Statute, 44 Am. U. L. Rev. 219, 230-46 (1994) (detailing the history of ECPA).
81
389 U.S. 347 (1967); see supra notes 47-59 and accompanying text for a discussion of the Katz Fourth Amendment Analysis.
82
388 U.S. 41 (1967). In Berger, the United States Supreme Court struck down a New York Statute that allowed government eavesdropping. The
Court held the statute unconstitutional because it failed to meet the minimum standards of particularity that are necessary to ensure that the
government does not have too much discretion in wiretapping or eavesdropping. Id. at 59. The Court held that the Fourth Amendment prevents
government eavesdropping unless there is probable cause to believe that a particular crime “has been or is being committed. . . .”, the government
has provided the court with the specifics of the conversations sought, the interception is for a limited time, and notice is given to the party being
searched. Id. at 58-60. The Court did however state that the notice requirement could be waived under some circumstances. Id.
83
H.R. Rep. No. 90-5037 at 5 (1968), reprinted in 1968 U.S.C.C.A.N. 2112, 2157-63 (legislative history of the Omnibus Crime Control and Safe
Streets Act of 1968).
84
S. Rep. No. 99-541, at 14 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3555-56 (legislative history of the Electronic Communications
Privacy Act of 1986).
85
Id.
86
18 U.S.C. 2511 (2000).
87
18 U.S.C. 2510 (2000).
88
18 U.S.C. 2510(12) (2000).
89
See S. Rep. No. 99-541, at 14 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3562-66 (stating that e-mail is one of many “new
telecommunications and computer technologies referred to in the Electronic Communications Privacy Act”).
90
18 U.S.C. 2701-2711 (2000).
91
Id.
92
18 U.S.C. 2510 (17) (2000).
93
18 U.S.C. 2701(a)(1) (2000).
94
For example, intercepting an electronic communication while in transit is a violation of Title I, carrying a jail sentence of up to five years in
prison. 18 U.S.C. 2511 (1968). Unauthorized access of an electronic communication stored in a computer is a violation of Title II, and carries a
potential prison sentence of up to one year for a first offense. 18 U.S.C. 2701 (2000).
95
18 U.S.C. 2520 (2000).
-7-
Although the ECPA would seem to address employee privacy, courts and lawyers have historically had difficulty
interpreting and applying the Act’s prohibitions.96 The majority of cases involve the issue of employee privacy in
the context of telephone use and monitoring at the workplace. Few cases have arisen in the context of office e-mail
monitoring.97 One such case in Delaware exemplifies the difficulties inherent in the ECPA’s interpretation. In
Wesley College v. Pitts,98 the United States District Court for the District of Delaware held that reading an e-mail
message while it was displayed on a computer screen was not an “interception” under the Act, even if the e-mail had
been retrieved from electronic storage in order to be read.99 The court reasoned that a violation of the ECPA
requires an e-mail to be intercepted while in transit.100
This case illustrates just one of the ECPA’s interpretive difficulties. Although Title I prohibits the use of electronic
devices to intercept an electronic communication such as an e-mail, Title II prohibits the unauthorized acquisition of
a stored e-mail message. While the court may [*84] have correctly reasoned that an e-mail displayed on a screen
was not “intercepted” by an electronic device because a computer monitor is not an intercepting device,101 the fact
that the message was retrieved from storage in order to be viewed would certainly fall under the prohibitions of Title
II.102 Unfortunately, this case was decided on a motion for summary judgment. The lawyers for the plaintiff
interpreted Title II as a lesser, included offense to Title I and, therefore, offered no independent evidence of a Title II
violation by unauthorized or illegal accession of the computer storage facility to retrieve the message in question.103
Without evidence of a Title II violation, the court could not reach this question and, therefore, granted summary
judgment in favor of the defendant.104
Further complicating the ECPA are three statutory exceptions to liability that, in effect, immunize employers from
the penalties of the Act: the Ordinary Course of Business exception,105 the Service Provider exception,106 and the
Consent exception.107 Title II allows for access of stored communication when consent has been given “by a user of
the electronic communication service with respect to a communication of or intended for that user.”108
96
See Deal v. Spears, 980 F.2d 1153, 1158 (8th Cir. 1994) (holding that recording 22 hours of employee conversations based on a suspicion of
theft was illegal because it was not in the ordinary course of business); Sanders v. Robert Bosch Corp., 38 F.3d 736, 741 (4th Cir. 1994) (holding
that even a bomb threat did not justify an employer’s 24 hour recording of employee telephone conversations); but see Watkins v. L.M. Berry &
Co., 704 F.2d 577, 583 (11th Cir. 1983) (finding employers can monitor employee calls only to the extent that they are business related); James v.
Newspaper Agency Corp., 591 F.2d 579, 582 (10th Cir. 1979) (finding that employers may monitor employee calls with equipment provided by
the phone service provider if they are perusing a legitimate business interest); Briggs v. Am. Filter Co., 630 F.2d 414, 420 (5th Cir. 1980)
(holding an employer may monitor employee conversation without consent when it serves a legitimate business interest); Epps v. Saint Mary’s
Hosp. of Athens, Inc., 802 F.2d 412, 417 (11th Cir. 1986) (holding an employer may monitor employee conversations to prevent workplace
contamination by negative remarks about co-workers).
97
See Wesley Coll. v. Pitts, 974 F. Supp. 375, 385 (D. Del. 1997) (ruling on an ECPA claim in the context of workplace e-mail correspondence).
98
974 F. Supp. 375 (D. Del. 1997).
99
Id. at 385.
100
Id.
101
Id. at 384.
102
See supra notes 91-96 and accompanying text for a discussion of the prohibitions of Title II.
103
Wesley Coll. v. Pitts, 974 F. Supp. 375, 389 (D. Del. 1997).
104
Id. at 391.
105
18 U.S.C. 2510(5)(a) (2000). This section is also known as the extension telephone exception or business use exception.
106
18 U.S.C. 2511(2)(a)(i), 2701(c)(1) (2000). Both Title I and Title II have service provider exceptions with different statutory language. Title
I’s service provider exception states, in pertinent part: It shall not be unlawful under this chapter for . . . an officer, employee or agent of a
provider of . . . an electronic communications service, whose facilities are used in the transmission of . . . electronic communication, to intercept,
disclose, or use that communication in the normal course of his employment while engaged in any activity which is a necessary incident to the
rendition of his service or to the protection of the rights or property of the provider of that service. . . . 18 U.S.C. 2511(2)(a)(i) (2000).
107
18 U.S.C. 2511 (2)(d); 2701(c)(1)-(2) (2000). The ECPA has two portions of statutory text that provide exceptions based on consenting to be
monitored. Title I (18 U.S.C. 2511 (2)(d)) states that “it shall not be unlawful under this chapter . . . to intercept a wire, oral, or electronic
communication . . . where one of the parties to the communication has given prior consent to such interception. Id.
108
18 U.S.C. 2701(c)(1)-(2) (2000).
-8-
1.
The Ordinary Course of Business Exception
The Ordinary Course of Business exception shields an employer from liability when she intercepts a communication
in the ordinary course of business through use of equipment provided by a communications carrier as part of the
communications network.109 This exception comes from the Act’s [*85] limited definition of “electronic,
mechanical or other device,” which is necessary to conduct an illegal intercept.110 Under the terms of the statute, an
illegal intercept may be accomplished only by use of an electronic device. However, any device “furnished to the
subscriber or user by a provider of . . . communication service in the ordinary course of its business and being used
by the subscriber or user in the ordinary course of its business . . . or furnished by such subscriber or user for
connection to the facilities of such service and used in the ordinary course of its business” is not an electronic device
under the statute.111
In other words, if the telecommunications or e-mail service provider gives an employer a machine capable of
intercepting the contents of a telephone call or e-mail, or if an employer purchases such a device, interceptions
achieved by this machine are legal because a device “furnished . . . by a provider . . . or user” is not an illegal
intercepting device when used in the ordinary course of an employer’s business. To determine whether an
intercepting device is used in the “ordinary course of business,” courts look to whether an employer has a legitimate
legal interest in monitoring the communications. This exception has been tested in the context of private telephone
communications in the workplace but not in that of e-mail correspondence.112
The Circuits are split on how to interpret this portion of statutory language. Some courts apply the “content
approach” while others follow the “context approach.”113 The content approach looks to the nature of the
conversation being monitored and interprets the exception to allow employers to monitor business-related but not
personal conversations.114
[*86]
1(a).
Content Approach
The content approach focuses on the subject matter of the intercepted communication. Under this approach,
employers may monitor all business related calls but face restrictions in their rights to monitor personal calls. The
general rule under the content approach is that an employer may monitor calls only to the extent necessary to further
a legitimate business interest and must stop monitoring when it discovers that a call is personal.115 For example, in
109
18 U.S.C. 2510(5)(a) (2000). The relevant text of the exception is found in the limiting definition of what constitutes an illegal intercepting
device. Under the terms of that statute, an illegal intercepting device is anything other than: any telephone or telegraph instrument, equipment, or
facility, or component thereof, (i) furnished to the subscriber or user . . . in the ordinary course of its business and being used by the subscriber or
user in the ordinary course of its business or furnished by such subscriber or user for connection to the facilities of such service and used in the
ordinary course of its business. . . . Id.
110
18 U.S.C 2510 (5)(a) (2000).
111
Id.
112
See, e.g., Briggs v. Am. Air Filter Co., 630 F.2d 414, 420 (5th Cir. 1980) (holding an employer was not liable for interceptions that were
limited in duration and scope to that necessary to monitor the portion of the call in which the employee discussed the employer’s business with a
competitor.); Watkins v. L.M. Berry & Co., 704 F.2d 577, 583 (11th Cir. 1983) (finding employers can monitor employee calls only to the extent
they are business related); Epps v. St. Mary’s Hosp. of Athens, Inc., 802 F.2d 412, 415-17 (11th Cir. 1986) (applying the content focused analysis
of the ordinary course of business exception); Sanders v. Robert Bosch Corp., 38 F.3d 736, 741 (4th Cir. 1994) (holding that even a bomb threat
did not justify an employer’s 24 hour recording of employee telephone conversations); Deal v. Spears, 980 F.2d 1153, 1158 (8th Cir. 1992)
(holding that an employer’s attempt to catch a thief did not justify recording 22 hours of and employee’s personal calls).
113
Larry O. Gantt, An Affront to Human Dignity: Electronic Mail Monitoring in the Private Sector Workplace, 8 Harv. J.L. & Tech. 345, 365
(1995) (discussing the difference between content and context analysis); Beeson, supra note 18, at 176-188 (discussing the difference between
content and context analysis).
114
Beeson, supra note 18, at 176 (analyzing the content approach).
115
See, e.g., Briggs v. Am. Air Filter Co., 630 F.2d 414, 420 (5th Cir. 1980) (holding an employer was not liable for interceptions that were
limited in duration and scope to that necessary to monitor the portion of the call in which the employee discussed the employer’s business with a
competitor); Watkins v. L.M. Berry & Co., 704 F.2d 577, 583 (11th Cir. 1983) (finding employers can monitor employee calls only to the extent
-9-
Watkins v. L.M. Berry & Co.,116 the 11th Circuit held an employer liable for illegal intercepts when it monitored an
employee’s personal call involving a discussion about a job interview with a prospective employer, in violation of
its own monitoring policy.117 The court noted that an employer’s monitoring in the ordinary course of business does
not cover portions of private conversations about which the employer is merely curious.118 Furthermore, the court
held that the employer must show that the particular interception was in the ordinary course of business by
demonstrating a “business interest” in the subject matter of the intercepted call.119 The court declared that because
personal calls are never in the ordinary course of business “except to the extent necessary to guard against
unauthorized use of the telephone or to determine whether a call is personal or not,” an employer must stop listening
to a call as soon as it determines the content is personal.120
1(b).
Context Approach
Courts employing the context approach rely more on the workplace environment than on the specific content of the
electronic communication or telephone call. These courts consider whether employees were notified of the potential
for interceptions and whether legitimate business interests existed for monitoring employee communications.121
Courts using the context approach uniformly rule that unlimited monitoring of employee communications violates of
the ECPA. Therefore, the courts look to employers’ motivations for monitoring and tailor the time and scope of
[*87] monitoring to that necessary to achieve these motives.122
Although the approaches the courts take to interpret the exception differ subtly and confusion over the exception’s
meaning still exists, a trend is emerging to interpret the exception to allow the monitoring of telephone
conversations only to the extent necessary to further a legitimate business interest, and only for as long as it takes to
determine that a call is personal and unrelated to a business interest. Examples of legitimate business interests
include preventing abuse of facilities, customers, or employees. Due to the broad category of business interests that
courts are willing to consider legitimate, the Ordinary Course of Business Exception grants employers a great deal
of discretion in determining the level of privacy their employees can expect.
One could argue that the same rules and analysis should apply to employee e-mail monitoring as apply to telephone
monitoring. However, the inherent problem with both the content and context approach as applied to e-mail is that
interceptions would most probably give the employer the entire message at once, unlike voice communication where
those monitoring must listen as the conversation goes. The practical problem becomes a question of how many
words an employer must read before she can distinguish between business and personal e-mail messages. Moreover,
both the content and context approach fundamentally rely on the existence of a legitimate business interest in
monitoring. Courts have not focused on employee privacy when determining whether a legitimate business interest
for monitoring exists.
Courts have favored the employer in their determination of whether a communication is business related. For
example, in Epps v. St. Mary’s Hospital of Athens, Inc,123 a conversation was recorded “during office hours,
they are business related); Epps v. St. Mary’s Hosp. of Athens, Inc., 802 F.2d 412, 415-17 (11th Cir. 1986) (applying the content focused analysis
of the ordinary course of business exception). See also, Beeson, supra note 18, at 177 (describing the content approach); Martha W. Barnett &
Scott D. Makar, In the Ordinary Course of Business: the Legal Limits of Workplace Wiretapping, 10 Hastings Comm. & Ent. L.J. 715, 730
(1988) (discussing the content analysis).
116
704 F.2d 557 (11th Cir. 1983).
117
Id. at 581.
118
Id. at 582-83.
119
Id.
120
Id. at 583.
121
Barnett & Makar, supra note 116, at 727-28 (analyzing the context approach).
122
See, e.g., Sanders v. Robert Bosch Corp., 38 F.3d 736, 741 (4th Cir. 1994) (holding that even a bomb threat did not justify an employer’s 24
hour recording of employee telephone conversations); Deal v. Spears, 980 F.2d 1153, 1158 (8th Cir. 1992) (holding that an employer’s attempt to
catch a thief did not justify recording 22 hours of and employee’s personal calls).
123
802 F.2d 412 (11th Cir. 1986).
-10-
between co-employees, over a specialized extension which connected the principal office to a substation and
concerned scurrilous remarks about supervisory employees in their capacities as supervisors.”124 The court declared
that the employer has a business interest in monitoring conversations to prevent “the potential contamination of a
working environment.”125 Under this reasoning, any e-mail regarding co-employees, especially those over
company-provided intranet services (which may be analogous to the specialized phone line in Epps) would be
readily available for employers to read in their entirety. Backed by this rationale, the Ordinary Course of Business
exception renders the ECPA incapable of affording employees privacy at the workplace.
[*88]
2.
The Service Provider Exception
The ECPA exempts e-mail service providers from liability for all interceptions (Title I Claims) or accessions (Title
II Claims) of e-mail communication in the workplace.126 When service providers are engaged in activities that are
“necessarily incident to the rendition of [his] service or to the protection of the rights or property of the provider of
that service . . .”127 they are immune to liability under the ECPA for any interception or disclosure of electronic
communications. Like its Ordinary Course of Business counterpart, this exception has yet to be tested in the context
of e-mail monitoring, and who qualifies as a service provider is unclear. Some courts128 and commentators believe
the language of the exception is broad enough to encompass any employer who provides employees with e-mail
access. 129
Under Title I of the ECPA, a service provider may intercept and disclose any contents of electronic communications
necessary to render services or to protect the rights or property of the provider.130 In United States v. Mullins,131 an
airline was found to be a “service provider” under the Act.132 In Mullins, an employee noticed discrepancies in the
computer reservation system that lead to the discovery of fraud by an agent.133 The fraud was discovered only after
the airline intercepted the phony reservations. The agent claimed this interception violated the ECPA.134 The Ninth
Circuit rejected the claim and recognized the airline as an exempt “provider of wire or electronic communications
service” under the ECPA.135 Therefore, the employer/provider was, free to intercept and disclose electronic
communications because it was protecting its rights and property.136
The Act itself provides no guidance as to whether the Service Provider Exceptions apply to employee e-mail.
Section 2701(c)(1) of Title II exempts a “person or entity providing a wire or electronic communication service”
124
Id. at 417.
125
Id.
126
See supra notes 87-96 and accompanying text for a discussion of the difference between Title I and Title II claims.
127
18 U.S.C. 2511(2)(a)(i) (2000).
128
Flanagan v. Epson America, No. BC007036, slip op. at 5-6 n.1 (Cal. Super. Ct. Jan. 4, 1991) (asserting that employer-provider monitoring
everything in an intranet system would not violate the ECPA).
129
See Gantt, supra note 114, at 360 n.101 (discussing that ECPA not strictly limit the term “provider” to public entities so some employers may
be deemed service providers under that statute); James Baird et al., Public Employee Privacy: A Legal and Practical Guide to Issues Affecting the
Workplace 60 (1995) (arguing that a broad interpretation of the service provider exception is justified because the company networks are the
employer’s property).
130
18 U.S.C. 2511(2)(a)(i) (2000).
131
992 F.2d 1472 (9th Cir. 1993).
132
Id. at 1478.
133
Id. at 1475.
134
Id. at 1478.
135
Id.
136
Id.
-11-
[*89] from liability for illegally accessing stored communications.137 This section of the statute does not include any
language limiting interceptions to the scope of normal business dealings.138 In addition, section 2702 of Title II
allows public service providers to escape liability when they intercept or disclose the contents of stored
communications necessary to provide their service or when protecting their rights or property.139 The confusion
stems from the fact that Congress never defined the term “public service” in the Act. Therefore, who qualifies for
the Service Provider exception is unclear, but many commentators believe it is broad enough to encompass an
employer that provides e-mail to its employees.140
3.
The Consent Exception
Both Title I and Title II of the ECPA contain a consent exception shielding employers from liability when
employees give permission for monitoring.141 The issue most threatening to the privacy of employees in this context
is implied consent. Fortunately, from an employee perspective, the emerging case law on implied consent requires
actual or “full knowledge or adequate notification” before consent to monitoring can be said to be implied.142
Unfortunately, an employee signature on a company e-mail monitoring policy would constitute “full knowledge or
adequate notification” of monitoring. An employee would thereby sign away her right to sue under the ECPA’s
consent requirement whether or not she had actually read the form before signing. This signature may also bar any
common law claims for intrusion into seclusion or violation of privacy rights.
C.
Common Law
With the confusion over the proper interpretation of the ECPA, its three exceptions, and Constitutional protections
limited to public sector work, the common law may be the employee’s best avenue for redress of workplace e-mail
interceptions. The tort of intrusion into seclusion provides that one who intentionally intrudes, physically or
otherwise, upon the solitude or seclusion of another or his private affairs or concerns is subject to liability to the
other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.143
[*90] The applicability of this tort to e-mail monitoring is limited for three reasons. First, the existence of a written
policy for e-mail monitoring may diminish the likelihood of there being a reasonable expectation of privacy.144
Second, recent court rulings have not recognized a reasonable expectation of privacy in e-mail correspondence, and
these recent decisions are unlikely to be overruled.145 Third, courts have not found employer monitoring of personal
e-mails to be highly offensive to a reasonable person and have distinguished it from such highly offensive acts as
locker searches or mandatory urinalysis.146
137
18 U.S.C. 2701(c)(1) (2000); see also 2511 (2)(a)(i) (2000); see supra note 107 for relevant statutory text.
138
18 U.S.C. 2701(c)(1) (2000).
139
18 U.S.C. 2702(a)(1) (2000).
140
See Gantt, supra note 114 for a discussion of who qualifies as a service provider.
141
18 U.S.C. 2511(2)(d) (2000); 18 U.S.C. 2701(c)(1)-(2) (2000). See supra note 108 for the relevant statutory text.
142
Ali v. Douglas Cable Communications, 929 F. Supp. 1362, 1377 (D. Kan. 1996); see also, Deal v. Spears, 980 F.2d 1153, 1157 (8th Cir.
1994) (holding as a matter of law that the employer failed to show implied consent by merely warning employee that phone calls might be
monitored).
143
Restatement (Second) of Torts 652A (1977).
144
See Kevin P. Kopp, Electronic Communications in the Workplace: E-mail Monitoring and the Right of Privacy, 8 Seton Hall Const. L.J. 861,
885 (discussing Bourke v. Nissan Motor Corp., No. YC003979 (Cal. Super. Ct. App. 1991)).
145
See Bourke v. Nissan Motor Corp., No. YC003979 (Cal. Super. Ct. App. 1991) (ruling that employees had no reasonable expectation of
privacy in e-mail messages because they had signed a form indicating that e-mail was for company business only); Smyth v. Pillsbury Co., 914 F.
Supp. 97, 101 (E.D. Pa. 1996) (holding that an employee could not have a reasonable expectation of privacy in e-mail messages voluntarily made
over the company e-mail system).
146
Smyth v. Pillsbury Co., 914 F. Supp. 97, 101 (E.D. Pa. 1996).
-12-
For example, in Smyth v. Pillsbury Co.,147 the United States District Court for the Eastern District of Pennsylvania
rejected an intrusion into seclusion claim. In Smyth, the plaintiff was fired because of an e-mail he sent to his
supervisor.148 Although the company had assured its employees that e-mails would remain private and that they
would not be intercepted or disclosed, the court found that an employee loses any expectation of privacy he may
have had by using an e-mail system that the entire company used.149 Furthermore, the court did not find the
interception highly offensive to a reasonable person and distinguished it from mandatory urinalysis or locker
searches, in that e-mail monitoring did not invade an employee’s person.150 Finally, the court found that the
company’s interests in preventing illegal use of e-mail systems and the company’s “interest in preventing
inappropriate and unprofessional comments . . . over its e-mail system” outweigh any privacy interest of
employees. 151
D.
State Law
Several states have constitutional provisions guaranteeing a right to privacy.152 Only California, however, has held
that this right extends to both private and public sector employees.153 In California, a private sector [*91] employer
used to be required to show a “compelling interest” in order to justify an intrusion into an employee’s right to
privacy.154 However, in Hill v. National Collegiate Athletic Ass’n.,155 the “compelling interest” standard was
replaced with a balancing test that required the privacy interest in question to be specifically identified and
compared to the countervailing non-privacy interests of the company. The California Supreme Court indicated that
the compelling interest standard would still be applied against private employers when the privacy interest involved
was “fundamental to personal autonomy,” such as the interest implicated in forced sterilization.156 Even though
California has taken a seemingly progressive stance on workplace privacy issues, the Superior Court of the state
refused, in Flanagan v. Epson America,157 to enforce an employee’s right to privacy to e-mail correspondence. In its
ruling, the court suggested that the expansion of constitutional privacy rights was the job of the legislature, not of the
judiciary.158
The majority of states have statutes that prohibit the interception of electronic communications, mirroring the
ECPA.159 Many of these statutes contain the same Consent, Ordinary Course of Business, and Service Provider
exceptions found in the ECPA. However, twenty-two states and the District of Columbia have no Ordinary Course
of Business Exception or restrict the Service Provider Exception to communication common carriers, thereby
147
914 F. Supp. at 97.
148
Id. at 98-99.
149
Id. at 101.
150
Id.
151
Id.
152
The constitutions of ten states expressly protect a right to privacy; Alaska Const. art. I 22; Ariz. Const. art. II, 8; Cal. Const. art. I, 1; Fla.
Const. art. I, 23; Haw. Const. art. I, 6; Ill. Const. art. I, 6, 12; La. Const. art. I, 5; Mont. Const. art. II, 10; S.C. Const. art. 1, 10; Wash. Const. art.
I, 7.
153
See Luck v. S. Pac. Transp. Co., 267 Cal. Rptr. 618, 627-29 (Cal. Ct. App. 1990) (holding that California employers are bound by California
constitutional protections of privacy); Semore v. Pool, 266 Cal. Rptr. 280, 283-284 (Cal. Ct. App. 1990) (finding that the right to privacy in the
California Constitution protects Californians from actions of private employers and government agents); Porten v. Univ. of San Francisco, 134
Cal. Rptr. 839, 843 (1976) (holding a private university liable for disclosing a students grades to the State Scholarship and Loan Commission);
see also Alexander Rodriguez, All Bark, No Byte: Employee E-mail Privacy Rights in the Private Sector Workplace, 47 Emory L.J. 1439, 1447
(1998) (discussing state constitutional laws for protection of employee privacy).
154
See, e.g., Luck, 267 Cal. Rptr. at 631-32 (noting the compelling interest standard); Porten, 134 Cal. Rptr. at 843 (discussing the compelling
interest standard).
155
865 P.2d 633, 655 (Cal. 1994).
156
Id. at 654.
157
No. BC007036, slip op. at 4 (Cal. Super. Ct. Jan. 4 1991).
158
Id.
159
South Carolina and Vermont do not have statutes modeled after the ECPA.
-13-
excluding employer-providers from the exception.160 Furthermore, thirteen state statutes require all parties to give
prior consent in contrast to the ECPA’s provision for one-party consent.161
Although these jurisdictions may seem to provide more protection than does the ECPA for workplace e-mail
monitoring, courts in these states have interpreted their statutes in much the same way as federal courts have the
ECPA. Consequently, these statutes fail to protect employee e-mail monitoring for many of the same reasons the
ECPA does. For example, Illinois courts have interpreted the all-party consent language of their law to [*92] be
consistent with the one-party consent language of the federal exception.162 Also, as each of these states are at-will
employment states, implied consent to monitoring of employee communications is generally assumed. Finally, like
the ECPA, these statutes have been tested only in the context of employee telephone use and not e-mail monitoring,
and the language of these Acts, like the ECPA, only speaks of “wire communications” and not specifically e-mail.
These statutes, therefore, suffer from the same ambiguity as the ECPA, which was their model.
State and federal laws regarding electronic monitoring defer to the employer’s property or proprietary interests in
employee monitoring cases.163 This deference to property owners goes a long way in explaining the United States
courts’ anti-employee stance on workplace monitoring. Therefore, to examine how other democracies view the
issues of privacy and workplace surveillance helps clarify the underlying concepts at play in rulings of the courts.
E.
United States v. European Conceptions of Privacy
American employees have less legal protection against electronic surveillance in the workplace than do their
continental European counterparts.164 While many variables may explain the differences,165 the underlying
difference in the source of privacy rights is common to all these variables. The United States legal system views
privacy as a right closely connected to private property, while European countries view this right as a matter of
human dignity.166 As some commentators have argued, the European conception better represents the origin of the
right to privacy in Warren and Brandeis’ Right to Privacy than does that of the prevailing United States
conception.167
[*93]
160
Alabama, Delaware, the District of Columbia, Georgia, Idaho, Indiana, Iowa, Kentucky, Louisiana, Maine, Minnesota, Mississippi, Missouri,
New Hampshire, New Jersey, New Mexico, North Dakota, Ohio, Oklahoma, Pennsylvania, Rhode Island, South Dakota, and Texas.
161
California, Connecticut, Delaware, Florida, Georgia, Illinois, Maryland, Massachusetts, Michigan, Montana, New Hampshire, Pennsylvania,
and Washington.
162
See, e.g., People v. Beardsley, 503 N.E.2d 346, 350 (Ill. 1986) (noting that the court will interpret the state’s eavesdropping statute consistent
with article III of the Omnibus Crime Control & Safe Streets Act of 1968).
163
See Baird, supra note 130, at 60 (arguing that interpretation of eavesdropping laws should take into consideration the property interests of the
employer).
164
See Colin Bennett, Convergence Revisited: Toward a Global Policy for the Protection of Personal Data?, in Technology and Privacy: The
New Landscape 99, 113-14 (Philip E. Agre & Marc Rotenberg eds., 1997) (comparing privacy protections of European and American
employees); Paul M. Schwartz, European Data Protection Law and Medical Privacy, in Genetic Secrets 392, 397 (Mark A. Rothstein ed., 1997)
(comparing privacy protections of European and American employees).
165
For example, the number and strength of employee labor unions are two such variables that may account for these differences.
166
Lawrence E. Rothstein, Privacy or Dignity?: Electronic Monitoring in the Workplace, 19 N.Y.L. Sch. J. Int’l & Comp. L. 379, 380-81 nn.1314 (2000). Rothstein notes that U.S. cases such as those following Katz turn on determining whether surveillance balances an employer’s
proprietary rights with an employee’s reasonable expectation of privacy while the E.U. decisions are based on a more absolute standard of
inviolable human dignity. This difference is noticeable when comparing the U.S. Constitution’s Fourth Amendment protection against
“unreasonable searches and seizures” with the German Constitution’s Article 1, Section 1, which states “Human dignity is inviolable. To respect
and protect it is the duty of all state authority.”
167
For a discussion of this issue, see infra Part IV.C.
-14-
1.
United States View of Privacy as Linked to Personal Property
Privacy issues in the United States legal system are infused with notions of control over personal property. The legal
system of the United States treats privacy as protecting a sphere of individual space that cannot be trespassed upon
without permission or strong justification. The sphere of control that is privacy is commonly associated with a
person’s home or the marital relationship. The roots of both are tied to property. Privacy can be said to reflect a
sense of “possessive individualism,”168 implying that we own our personhood or reputation. We own this reputation
or personal sphere of intimacy and have the “exclusive right to dispose of access to one’s proper (private)
domain.”169 Therefore, privacy rights mimic property rights in that they are primarily concerned with the ability to
exclude intruders who do not have overriding legal justification to trespass into our sphere of control.170
The relationship between privacy rights and property rights is borne out more clearly in the workplace. An employee
sells her time and labor capacity to an employer, and thereby alienates certain aspects of her personhood by putting
them under the control of the employer.171 For instance, she alienates some aspects of her freedom by subjecting
herself to her employer’s requirements for schedule and location.172 As for those intimate aspects of her personhood
or reputation that are her privacy rights, they are generally superseded by the employer’s property rights.173
Consequently, courts decide that in most cases employees have no legitimate expectation of privacy at work.174 The
employer, by virtue of ownership of the premises and equipment, has the right to oversee the activities of
employees. 175 The employee, it seems, sells her control over her personhood to the employer while she is at work. In
other words, the at-will employee has implicitly consented to being monitored while at work. Therefore, barring
some statutory limitation of the rights of employers, an employee can be monitored for any reason or no reason at
all.
2.
European View of Privacy as Linked to Human Dignity
European communities employ the notion of human dignity in determining the outcome of workplace monitoring
issues.176 Where the American courts [*94] see workplace monitoring as a property issue, European countries see it
as an intrusion into a person’s autonomy or intimacy. Such an intrusion reduces a person’s status as a thinking being
or community member.177 Intrusions into a person’s intimacy or autonomy are, thus, an affront to human dignity as
opposed to an invasion of legally constructed privacy rights.178
The protection of human dignity is a broader concept than protection of personal privacy. It is rooted in the notion
that each person is unique and autonomous and, therefore, should be free from the manipulation and domination of
others, including employers.179 This philosophical framework looks at workplace monitoring generally, and e-mail
monitoring specifically, from a different perspective than that of the United States Courts. From this perspective,
treating an employee as a cog of production or merely as a factor of productivity ignores her individuality and denies
168
C.B. MacPherson, The Political Theory of Possessive Individualism 3 (1970).
169
Ernest Van Den Haag, On Privacy, in Privacy: Nomos XIII 149, 151 (J. Roland Pennock & John W. Chapmann eds., 1971).
170
MacPherson, supra note 169, at 3.
171
See Rothstein, supra note 167.
172
Id.
173
Id.
174
With the rare exceptions of rest rooms and lockers.
175
See Rothstein, supra note 167.
176
See Rothstein, supra note 167 for a more detailed discussion of the European view of workplace monitoring, which is beyond the scope of this
comment,
177
Rothstein, supra note 167, at 383.
178
Id.
179
Rothstein, supra note 167, at 383; see also, Alan F. Westin, Privacy and Freedom 33 (1967) (linking autonomy and dignity to advocate for
attention to privacy protections).
-15-
her dignity. Human dignity is diminished when an employee is treated as “a mechanism transparent to the view of
others . . . and therefore manipulable or disposable without the ability to confront the observer.”180
The European approach severely restricts an employer’s ability to monitor an employee’s e-mail correspondence
and other workplace activities. In France and Italy, for example, any employee monitoring requires notification and
must be directly related to the employee’s work.181 Furthermore, monitoring must be proportional in both nature and
intensity to the importance of the employee’s tasks.182 This approach realizes that employees have private lives that
extend beyond and are bound up with the workplace. As employees spend a majority of their time at work,
inevitably some non-business related activity intrudes in their day, requiring inherently private, personal
communication to take place while at work. Moreover, this view recognizes that while a person subordinates herself
to her employer while at work, this subordination extends only to the performance of work-related activities.183 The
employee sells her services to the employer and nothing more. Her autonomy and intimate personality cannot be
sold.
III.
Proposal for a Statutory Solution
Given the inadequacies of existing federal,184 state,185 and common law186 [*95] discussed above, a new federal
statute should address employee privacy in e-mail. This law should balance the interests of employers and
employees concerning workplace privacy. It should require that employers explain the details of monitoring
practices to their employees and also should require monitoring to be related to and proportional to specific business
interests in both manner and duration.187 Furthermore, employees should be granted access to all e-mails or other
information that is collected under the law. To be effective, it should provide for a reasonable yet significant penalty.
To be fair, it should allow employers to escape liability by showing a compelling business interest or urgency that
requires monitoring outside the provisions of the law. Most importantly, it should eliminate clearly the legal fiction
of implied consent to monitoring.
Laws such as this have been proposed and have failed in the past. Congress voted down the Privacy for Consumers
and Workers Act of 1993 (“PWCA”),188 and the Massachusetts legislature vetoed a similar law in that state.189 The
PWCA would have required all workplace monitoring to be related to work performance and would have guaranteed
employee access to data collected about her work performance.190 It also would have limited the disclosure and use
of this data by the employer and would have prevented employers from collecting data about their employees’
exercise of First Amendment rights.
Currently, Congress is considering the Notice of Electronic Monitoring Act (“NEMA”), a law requiring notification
of monitoring. NEMA would require that employers notify employees annually of monitoring procedures,
frequency, and reasons. NEMA contains an exception for employers who have a reasonable belief that an employee
180
Rothstein, supra note 167, at 384.
181
Id.
182
Id.
183
Id.
184
See supra Part II.B for a discussion of the inadequacies of existing federal law in protecting employee privacy in workplace e-mail.
185
See supra Part II.D for a discussion of the inadequacies of existing state law in protecting employee privacy in workplace e-mail.
186
See supra Part II.C for a discussion of the inadequacies of existing common law in protecting employee privacy in workplace e-mail.
187
U.S. laws regarding electronic monitoring in the workplace might do well to mimic Italian laws that have these requirements. See Rothstein,
supra note 167 at 384 for a discussion of such laws.
188
H.R. 1900, 103d Cong. (1993).
189
Shefali N. Baxi & Alisa A. Nickel, Big Brother or Better Business: Striking a Balance in the Workplace, 4 Kan. J.L. & Pub Pol’y 137, 145
(1994) (discussing the PWCA and similar state laws); Frank C. Morris, Jr. Workplace Privacy Issues: Avoiding Liability, SD52 ALI-ABA 697,
722 (1999) (discussing proposed federal and state legislation of workplace privacy).
190
139 Cong. Rec. E1077-02, E1077 (daily ed. April 28, 1993) (describing the purpose of the Privacy for Consumers and Workers Act of 1993).
-16-
is causing significant harm and violating the legal rights of the employer or another person.191 Furthermore,
Congress is debating The Digital Privacy Act of 2000192 and The Electronic Communications Privacy Act of
2000.193 These would extend the ECPA explicitly to cover e-mail. These legislative proposals are a step in the right
[*96] direction, but fail to balance the interests of employers with the interests of employees. These proposals do
little to address the privacy concerns of employees. Rather, they merely require employers to inform employees that
the company reserves the right to invade its employees’ private lives.
In light of the failings of these proposed statutes, many commentators have suggested alternative means for
addressing employee privacy in e-mail.194 These suggestions range from statutory amendments195 to contractual
negotiations.196 However, for reasons that will be discussed below, these alternatives to legislation fail to protect
employee rights adequately. Consequently, new legislation is required to balance the privacy and proprietary
interests within the employment context. This new legislation must have the requirements set out at the start of this
section.
IV.
Discussion
Employees should not check their right to an inviolate personality at the office door. Privacy is a fundamental right
at the core of an organized free society. Warren and Brandeis aptly pointed out the importance of the right to be left
alone and the danger that new technology poses to that right.197 Although their concerns were raised nearly a
hundred years ago, these concerns are at the forefront of society in the new millennium. Unless decisive steps are
taken, privacy at work, and by extension privacy in general, may be seriously eroded. Reacting to this concern,
scholars and legislatures have proposed several solutions to the e-mail privacy problem. Those that focus on
strengthening existing law fail for the various reasons discussed in this comment. Those that suggest new laws are
on the right track, but need to find new arguments to support them in order to defeat the powerful lobbies of
business interests working against them.
A.
Why Regulate the Employee’s Expectation of Privacy?
An employer has many valid reasons for monitoring employee activity. Ensuring efficiency, security and quality of
service are just a few.198 Nevertheless, as Americans begin to spend more time at their jobs, the need for conducting
personal business while at work becomes more pressing.199 An increasingly common means of doing so is e-mail.200
A balance between employer and employee interests in workplace e-mail, therefore, is critical to today’s information
economy.
These interests are not as diametrically opposed as they may appear to be. [*97] Efficiency and employee privacy
are not mutually exclusive, nor are efficiency and employee ability to conduct personal business while at work. In
fact, respecting employee autonomy and privacy by not monitoring e-mail may be in the employer’s best interest
191
H.R. 4908, 106th Cong. (2000). The Notice of Electronic Monitoring Act (NEMA) was introduced to the senate by Charles Schumer (D-New
York) and in the House by Bob Barr (R-Georgia) and Charles Canady (R-Florida). The legislation is designed to amend the ECPA.
192
H.R. 4987, 106th Cong. (2000). The Digital Privacy Act of 2000 was sponsored by Rep. Bob Barr (D-Georgia) on July 27, 2000 and would
explicitly add e-mail messages and stored computer communications to those communications currently covered by the ECPA.
193
H.R. 5018, 106th Cong. (2000). The Electronic Communications Privacy Act of 2000 was sponsored by Reps. Charles Canady (R-Florida)
and Asa Hutchinson (R-Arkansas) and would explicitly extend the prohibitions of the ECPA to e-mail.
194
See infra Part IV.B for a discussion of various proposals to address employee privacy in workplace e-mail.
195
See infra note 208 and accompanying text for a discussion of suggestions for new statutes.
196
See infra notes 209-212 and accompanying text for a discussion of contractual solutions.
197
Warren & Brandeis, supra note 2, at 195.
198
See supra notes 28-35 for a discussion of reasons for employers to monitor employee e-mail.
199
See supra note 14.
200
Steen, supra note 8.
-17-
because monitoring lowers morale, and low morale sponsors low productivity.201 Employees who feel as if “Big
Brother” is always watching tend to work less.202 On the other hand, employees who feel the company supports
them as autonomous individuals with outside interests and privacy concerns tend to have higher morale and
productivity levels. 203 This view is commonly accepted by C.E.O.s of European corporations.204 Employers should
respect their employees’ personal dignity and autonomy by allowing them to function without the threat of constant
supervision. For these reasons, solving the problem of e-mail privacy is essential to both employer and employee
alike.
B.
Problems with Various Proposed Solutions
A common solution proposed to protect employee privacy in e-mail correspondence at work is strengthening
existing tort law to cover invasions.205 This approach is flawed for two reasons. First, recent precedent-setting
decisions have found no expectation of privacy in e-mail, and these decisions are unlikely to be overturned.206
Second, any solution founded on a subjective reasonableness standard such as those used in tort or Fourth
Amendment cases is destined to fail because of the slow pace of the law. It becomes increasingly more difficult to
argue that a person had a reasonable expectation of privacy in e-mail correspondence at work five or ten years after
the courts [*98] have stated that no such expectation exists. It simply becomes established law, and ignorance of the
law has never been a persuasive argument. In light of recent court rulings, such an expectation of privacy may be
legitimate, but it is certainly unreasonable.
Other commentators support statutes that merely require notice before monitoring can commence.207 As stated
before, this measure will not protect employee privacy. It will merely alert employees that their e-mails may be
monitored. An employer could easily manipulate the language of such a notification or e-mail policy in a way that
destroys any expectation of privacy for the employee. This type of law creates a hoop for the employer to jump
through, but leaves her in control over the level of privacy her employees can expect at work.
Still others have suggested that the best time to deal with employee privacy issues is at the negotiation table.208
Pointing to the inherent contractual nature of the employer-employee relationship, some commentators call for
201
See Gantt, supra note 114, at 420 (citing studies which show that monitored employees experience tension and anxiety, which causes a
decline in productivity); see also, Ronald E. Roel, Injured by Big Brother, Newsday, Oct. 5, 1990, at 49 (discussing study by Communications
Workers of America, which concluded electronic monitoring is linked to increased health problems and psychological stress); Robert B.
Fitzpatrick, Privacy Issues in Surveillance, Search, and Monitoring of Employees, C669 A.L.I.-A.B.A. Course Study 23 at 36 (1991) (noting that
employee monitoring is linked to higher levels of stress, depression, anxiety, fatigue, and anger and employee stress has cost U.S. businesses $ 50
to $ 75 billion annually); Peter Blackman & Barbara Franklin, Blocking Big Brother: Proposed Law Limits Employer’s Right to Snoop, N.Y.
L.J., Aug 19, 1993, at 5 (citing Massachusetts survey reporting that 65% of employees at companies which monitor for efficiency worked
inefficiently because they were required to work too quickly).
202
See Gantt, supra note 114, at 422 (citing studies which indicate increasing employee privacy increases productivity).
203
See Winters, supra note 70, at 106 (arguing that employees who have a clear zone of workplace privacy may work more efficiently then those
scrutinized by employers).
204
See Donald E. Berenbeim, Employee Privacy 2 (Conference Board Research Report No. 945, 1990) (finding that a higher percentage of
Canadian and European C.E.O.s see electronic monitoring as detrimental to employee morale); see also, Rothstein, supra note 167, at 380-81
(arguing more Canadian and European C.E.O.s view electronic monitoring of employees as detrimental to worker morale and productivity based
on the conception of employee privacy rooted in the notion of human dignity as opposed to employer proprietary interests).
205
See, e.g., Beeson, supra note 18, at 218 (arguing that until new legislation is passed, the best method for protecting employee claims would be
to analogize e-mail to lockers under the tort of intrusion into seclusion).
206
See supra Part II.C for a discussion of recent court decisions on the reasonable expectation of privacy.
207
Laura Thomas Lee, Watch Your E-mail! Employee E-mail Monitoring and Privacy Law in the Age of the Electronic Sweatshop, 28 J.
Marshall L. Rev. 139, 170-174 (1994) (arguing, inter alia, that a key requirement of adequate statutory protection of employee e-mail privacy is
notification of monitoring procedures); for similar proposals see Kevin J. Baum, E-mail in the Workplace and the Right to Privacy, 42 Vill. L.
Rev. 1011, 1035-41 (1997) (arguing that notice of monitoring is needed to protect employee privacy); Thomas R. Greenberg, E-mail and Voice
Mail: Employee Privacy and the Federal Wiretap Statute, 44 Am. U. L. Rev. 219, 250 (1994) (recommending that employers alert employees to
monitoring policies).
208
See, Lisa Brunn, Privacy and the Employment Relationship, 24 Hous. L. Rev. 389, 401 (1988) (arguing that employment contracts, employee
hand books, company mission statements, etc. may be considered binding against the employer therefore privacy protections contained therein
could be enforceable); Rodriguez, supra note 155, at 1467 (arguing that legislation dictating a presumption of employee right to privacy in
-18-
employees to take the initiative in defining the extent and purpose of employer monitoring.209 Privacy, therefore,
will become a bargained-for commodity before employment, preventing the need for post-invasion litigation.
Unacceptable e-mail monitoring would constitute a breach of contract. This approach fails because an action for
breach is intended to put the aggrieved party in the same position as it would have been in had the contract been
fully performed.210 In the invasion of privacy context, how does an employer make the employee whole? If sensitive
information is disseminated from an intercepted e-mail, is it possible to undo the harm? Only in limited situations
does contract law allow for consequential or punitive damages.211 Because this contract would not govern the
exchange of goods, the U.C.C. may not apply. Therefore, this solution may be subject to different treatment under
the common law of contracts in various jurisdictions.
[*99] Furthermore, most employees, even in a good economy, do not come to the employment negotiation table
with equal bargaining power. Only the rare professional, expert, artisan or powerful labor union can actually afford
to dictate the terms under which an employer will evaluate it. Therefore, this measure would not significantly affect
the average American employee. This measure further fails to address the fact that a majority of American
employees may not even realize that they have no privacy rights in workplace e-mail and, therefore, would not think
to discuss monitoring policies at hiring.
Drafting a statute with the requirements set out in Part III of this comment, one that requires an employer to show a
compelling business interest in monitoring employee e-mail, is the most feasible and most effective means of
addressing this issue. Courts should interpret the compelling business interest language as mirroring the compelling
governmental interest requirement of any law that addresses a fundamental right.212 If properly interpreted, this
language in a statue would eliminate the pro-employer presumption that an employee waives her right to privacy in
exchange for a salary. It would, therefore, eliminate the defense of implied consent to monitoring. It also would
require the employer to use the least restrictive means to achieve whatever compelling interest she is pursuing and
achieve the goal of limiting e-mail monitoring to work-related tasks, as well as requiring the duration of monitoring
to be proportional to the importance of those tasks.213 The compelling business interest requirement would restore
the notions of human dignity, autonomy, and “inviolate personality”214 that are at the core of privacy, while still
allowing an employer to protect proprietary and security concerns presented by the increased ease of employee
access to, and transfer of, information.
C.
Better Arguments for a Statutory Solution
The most potentially effective and progressive statutory proposals covering workplace e-mail privacy have fallen
victim to the lobbying power of corporate America.215 In order to draft a balanced law regulating employee privacy
in workplace e-mail, the issue of privacy in general must be re-examined. The European model of privacy as related
to human dignity, the Warren and Brandeis article that gave rise to the right of privacy, and a focus on the benefits
conferred on an employer through respect of employee rights should guide this debate.
workplace e-mail would force workplace monitoring policies to be negotiated and agreed upon at hiring and therefore enforceable under contract
law).
209
See Brunn, supra note 209, at 401; Rodriguez supra note 154, at 1467.
210
See, e.g., U.C.C. 1-106 (1977) (stating that remedies for breach of contract should be “liberally administered to the end that the aggrieved
party may be put in as good a position as if the other party had fully performed” but baring consequential and punitive damages unless
specifically provided for in the act). Id.
211
Id.
212
See Gantt, supra note 114, at 416 (arguing that a “compelling business interest” standard should be interpreted as analogous to the
“compelling government interest” standard and require a “least restrictive alternative” analysis).
213
Id.
214
Warren & Brandeis, supra note 2, at 205.
215
Business lobbyists often argue that monitoring allows them to ensure quality and productivity of employees. See, e.g., J.W. Waks & C.R.
Brewster, Privacy Bill Targets Work Site Monitoring, Nat’l L.J., Jan. 18, 1993 at 18-20 (arguing that workplace monitoring is a valuable tool for
management to measure productivity).
-19-
The United States should study the stance of countries like France and Italy [*100] in dealing with workplace
privacy concerns. These countries follow the message of Warren and Brandeis more closely than does the American
notion of privacy, which is bound up with property rights.216 Warren and Brandeis were reacting to the danger that
new technology might expose the intimate details of one’s personal life.217 In response to advanced newspaper
printing and photographic technology, they were calling for recognition of a fundamental right to be let alone that
would, in effect, create a presumption of human dignity and autonomy that would prevent exposure of the details of
one’s intimate life without one’s consent.218 They saw this right to privacy as a fundamental right. Granting
employers carte blanche in e-mail monitoring erodes this right. Since the common law treatment of privacy is
unlikely to change, a statute is necessary. Such a statute will cure the defects in privacy law and restore the
protection of the “inviolate personality”219 that the right was based on. The fact that other countries use such a model
without compromising business efficiency strongly supports the argument.220
Recasting the debate in terms of employer benefit will nullify some of the most persuasive arguments against a
statute designed to guarantee employee privacy in workplace e-mail.221 Statistical data linking productivity to
morale and morale to surveillance makes a strong public policy argument for enacting employee privacy legislation
that protects e-mail and other new forms of communication. If such protection would benefit the employer as well as
the economy, it would be difficult to argue that it should not be enacted.
V.
In the Meantime: Advice for Employers and Employees on Balancing Privacy and Proprietary
Interests in Workplace E-Mail Messages
Given the confusion over what laws, if any, govern the extent to which an employer can monitor employee e-mails,
both parties must limit their exposure to legal action. Employers, must create a detailed e-mail monitoring policy,
and explain it fully to all employees. Employees should know the privacy risks posed by e-mail, and limit the
transmission of sensitive information. The following suggestions are guidelines only and are not intended as legal
advice.
[*101]
A.
Employer Precautionary Measures
A detailed, comprehensive, and clear e-mail use policy is the best way for an employer to limit potential legal
liability while protecting legitimate business interests in e-mail monitoring. An adequate e-mail usage policy must,
at the very least, inform employees that all e-mail, business related or personal, is subject to monitoring.222 This
policy must be in writing and be fully explained to all employees.223 Employees should sign these policies,
indicating that they understand and consent to all measures contained in the writing. Actual, informed consent to
monitoring is a defense to just about any of the potential causes of action discussed above.224
216
Warren & Brandeis, supra note 2, at 205 (arguing that the principle underlying the torts of slander and libel is “in reality not the principle of
private property, but that of an inviolate personality” and this is the principle that supports a right to privacy).
217
Warren & Brandeis, supra note 2, at 196 (reacting to the detrimental effect of tabloids stating that “Gossip . . . has become a trade”).
218
Id.
219
Warren & Brandeis, supra note 2, at 205.
220
See Gantt, supra note 114, at 420 (noting that other countries have recognized surreptitious monitoring lowers productivity); Fitzpatrick, supra
note 198, at 1170 (noting that Japan, Germany, and Sweden impose tight restrictions on employee monitoring and productivity levels have
remained among the best in the world).
221
Waks, supra note 216.
222
See, e.g., Grover J. Brittain, Drafting an E-mail and Internet Usage Policy for Your Firm, 27-Oct Colo. Law. 17, 18 (1998) (suggesting e-mail
usage policies require consent to monitoring as a condition of employment); John C. Yates, E-Compliance: Internet Law and Privacy Issues, 1177
PLI/Corp 195, 205 (2000) (suggesting that corporations establish written standards for review of e-mail); Frank C. Morris, Jr. Workplace Privacy
Issues: Avoiding Liability, ALI-ABA Course of Study June 3-5, 1999, SD52 A.L.I.-A.B.A. 697, 730 (suggesting written polices).
223
See Waks, supra note 216.
224
See supra Part II for a discussion of potential causes of action arising from e-mail monitoring.
-20-
As informed consent is a major factor in workplace monitoring cases, detailed and understandable e-mail usage
policies better insulate employers from legal liability. Employers, therefore, should distribute these policies to
employees through as many channels as possible to ensure employee awareness of their terms. E-mail usage polices
should be explained on hiring, sent to employees in periodic e-mails, be included in employee handbooks, and
possibly displayed on the screens of users while they access e-mail programs.225 Periodically sending employees
consent to monitoring forms and regular reminders of the monitoring policies might also be wise.
Better e-mail usage policies provide the rationale for monitoring and the extent of employee privacy rights in
electronic correspondence. Such policies clearly explain that the company e-mail system is the property of the
company, and is intended for business purposes.226 The company, therefore, reserves the right to monitor the use of
e-mail at its discretion in order to insure against misuse.227
Above all, a policy should make clear that employees have no expectation of privacy in any matter contained in an
e-mail sent or received over the company system.228 The policy should explain that employee accounts which are
password protected or e-mails labeled personal either in transit or in [*102] storage are not granted any additional
privacy protections.229 Furthermore, the policy should limit the use of passwords for employee accounts. If
passwords are used, employees should be required to provide passwords to management, thereby eliminating any
impression of privacy in these accounts.230
Comprehensive policies should define the proper use of company e-mail systems. They should include written
prohibitions expressly forbidding the transmission of threatening, hostile, harassing, offensive or otherwise
inappropriate messages.231 They should also expressly prohibit the transfer of proprietary information, trade secrets,
confidential documents, or any privileged communications to anyone outside the company.232
These policies should describe the methods of monitoring and enforcement to inform employees and guide
management.233 Requiring management to adhere to these policies when monitoring will decrease the likelihood of
employer abuse of monitoring capabilities. Therefore, the policy should advise employees that management can and
may monitor any e-mail, including deleted e-mails, and that deleting does not create privacy rights.234 It should
create clear guidelines governing how long old messages will be kept and who is authorized to read employee
messages.235 It should remind employees that e-mail is easily sent, forwarded or printed and that deleted e-mails
remain accessible for an indefinite time. Finally, all e-mail usage policies should warn that violations can lead to
immediate discipline, termination, and even civil or criminal charges.236
After drafting a detailed e-mail usage policy, the employer should take precautionary measures to ensure
management complies with its terms. E-mail should be monitored only for legitimate business reasons such as
225
See Morris, supra note 223, at 730-735 (advising employers to periodically distribute e-mail policies to employees over diverse channels).
Additionally, if Congress passes NEMA (supra Section III), employers would be required to provide adequate notification of monitoring policies
to employees. What constitutes adequate notification would need to be determined by the courts but an employer’s ability to show a broad and
varied notification scheme would certainly aide in the prevention of liability.
226
See Brittain, supra note 219, at 17 (advising that policies explain a firm’s proprietary interest in e-mail systems and use).
227
Id.
228
Morris, supra note 223, at 730.
229
Id. at 731.
230
Id. This is an important precaution because password protected e-mail accounts are arguably analogous to employee lockers and would
therefore carry an increased expectation of privacy.
231
Id.; Brittain, supra note 223, at 18.
232
Morris, supra note 223, at 731; Yates, supra note 223, at 205.
233
Yates, supra note 223, at 205; Morris, supra note 223, at 731.
234
Yates, supra note 223, at 205; Morris, supra note 223, at 731.
235
Yates, supra note 223, at 205; Morris, supra note 223, at 731.
236
Yates, supra note 223, at 205; Morris, supra note 223, at 731.
-21-
suspicion of illegal activity or corporate espionage.237 Furthermore, monitoring should be conducted only for the
limited time required to achieve the legitimate purpose for which it is undertaken.238 At all times during monitoring,
management should act to limit the intrusions into employee privacy and avoid monitoring any personal
messages.239
[*103]
B.
Employee Precautionary Measures
The only proposed legislation protecting employee privacy in e-mail are statutes that merely require employers to
remind employees periodically that employers can read all e-mail.240 Employees, therefore, should become aware of
privacy risks associated with e-mail and avoid sending or receiving sensitive information.
E-mail is analogous to a post card; anyone can read it while it is in transit, stored, or even after it is thrown out.
Accordingly, employees should limit sensitive personal or business information contained in e-mail messages.
Employees should also understand that e-mail is discoverable for civil or criminal actions against them and that email is not anonymous. 241 Any computer used to send or receive e-mail can be traced and potentially used to identify
an employee. Furthermore, e-mail has an extremely long shelf life. It can be viewed, manipulated, accessed or
forwarded even after a user deletes it.
Simply limiting the use of e-mail is the best way to ensure that an employer does not intercept private information.
However, more technical ways of decreasing the chances of unwanted interception of e-mail messages exist. For
example, software options can reduce one’s susceptibility to surreptitious monitoring.
Employees might consider, to the extent allowed by an employer’s e-mail usage policy, using encryption programs.
Essentially, these programs encode an e-mail, rendering it undecipherable to anyone without the proper decoding
information. Ideally, these programs prevent anyone other than the intended recipient from viewing a specific
message. Some forms of these programs are freely available on the Internet, but they are not without their
problems.242 While encryption programs may allow a greater degree of anonymity and privacy in e-mail messages,
the encryption does not guarantee privacy because the codes can be cracked. Also, some of these programs require
both the sender and the receiver to have the same software, thus making e-mailing less convenient.
Software is also available that shortens the shelf life of e-mail, making it more difficult to discover.243 These
programs cause messages to “self-destruct’ [*104] after a set period of time, decreasing the danger of discovery after
deletion. Nevertheless, system requirements, a changing state of the art, and compatibility issues with various e-mail
237
Limiting e-mail interceptions by management to legitimate business interests would conform with the interpretation of acceptable phone
monitoring under the ECPA and probably limit liability. Furthermore, limiting interceptions to cases where serious infractions are suspected
would conform with legislation such as the recently defeated PWCA or the kind suggested by this comment.
238
Time limitations should conform to those for acceptable phone monitoring.
239
This would ensure that employers comply with the “compelling business interest” standard, including the “least restrictive alternative”
analysis of the legislation proposed by this comment.
240
See supra Part III for a discussion of NEMA and other proposed legislation to protect employee e-mail privacy; see also The Notice of
Electronic Monitoring Act of 2000, H.R. 4908, 146th Cong. (2000).
241
See Morris, supra note 223, at 729 (noting that Rule 34 of the Federal Rules of Civil Procedure provides for discovery of electronic records
such as e-mail).
242
Some forms of these programs, offering free encryption software, are available on the Internet. See http://www.privacy.com;
http://www.zixit.com; https://www.ziplip.com/ps/ZLPlus/home.jsp. For more information on Internet privacy issues and solutions in general, visit
The Privacy Rights Clearinghouse at http://www.privacyrights.org. These examples are offered for informational value only and should not be
viewed as product endorsements or as a guaranty of effectiveness.
243
For instance, Omniva Policy Systems provides software that allows an e-mail to self-destruct after reading limiting the danger of recovery
after deletion. Ominiva Policy Systems, available at http://www.omniva.com. These examples are offered for informational value only and should
not be viewed as product endorsements or as a guaranty of effectiveness.
-22-
service providers and account access programs limit all software protections. The best privacy protection, therefore,
is to remember that third parties could view anything in an e-mail message.
VI.
Conclusion
An employee’s expectation of privacy should not run out when she clocks in. Privacy is a fundamental right at the
core of an organized free society. Warren and Brandeis aptly pointed out the importance of the right to be left alone
and the danger of new technology impinging on that right.244 Although their concerns were raised nearly a hundred
years ago, these concerns are at the forefront of society in the new millennium. Unless decisive steps are taken,
privacy at work, and privacy in general, may be seriously eroded. In the current information economy, Congress
must act quickly to prevent the term “private information”245 from becoming anachronistic. Reacting to this concern,
scholars and legislatures have proposed several solutions to the e-mail privacy problem. However, those that focus
on strengthening existing law fail for various reasons. Those that suggest new laws are on the right track, but need to
find new supporting arguments in order to defeat the powerful business lobbies working against them. Perhaps the
best arguments for such a statute borrow from the political philosophy of the European countries and center on
individual autonomy and dignity as opposed to the proprietary interests of employers. Recasting the argument in this
way finds support in the origins of the right to privacy, Warren and Brandeis’ piece one hundred years ago,246 and
may finally accomplish the goal of achieving “the right to be let alone.”247
244
Warren & Brandeis, supra note 2, at 196 (citing the printing press and photography as new technology which threatens individual privacy).
245
Rodriguez, supra note 154, at 1473.
246
Warren & Brandeis, supra note 2, at 205 (arguing that privacy protects personal dignity not property).
247
Id. at 195.
-23-
Download