Case One: Your Career Matters: Disaster Raises New Legal Issues In the Workplace Wall Street Journal November 20, 2001 Can a company fire employees who refuse to get on an airplane? Is it legal for a business to remove pictures of employees of Middle Eastern background from a marketing brochure? America's war with terrorists is provoking a host of questions in the workplace, and employmentlaw attorneys say they are being peppered with inquiries from businesses seeking guidance on how to respond. Many of the questions raise classic issues of privacy, discrimination or compliance with labor laws. Others, however, are leading attorneys into uncharted terrain. "I think lawyers don't have a clue about how to advise their clients on some of these things," says Robert D. Lipman, an attorney in Jericho, N.Y. "A lot of these problems don't have a legal remedy because nobody contemplated something like this." New problems can elicit conflicting opinions. For example, an executive who was killed while attending a meeting at the World Trade Center on Sept. 11 had stock options that were due to vest on Oct. 1. No death certificate had been issued by that date. Should the options vest? No, says Michael Lotito, a partner in the San Francisco office of Jackson Lewis, an employment law firm that got such an inquiry from a client it declines to name. Since the executive had ceased working for the company on Sept. 11, he didn't qualify for vesting, Mr. Lotito says. Mr. Lipman, whose four-lawyer firm represents both management and employees, isn't so sure, since the executive hadn't officially been declared dead as of the vesting date. Far from ground zero, employers are coping with workers unnerved by the terrorist attacks. Mr. Lotito says one California client had employees who were resisting flying, even after the company arranged for them to travel on private jets. A group of workers at another company didn't want to return to work on the 52nd and 53rd floors of a New York office building. Can these employees be fired? Mr. Lotito and other employment attorneys emphasize that the initial response of most companies has been to cut back on travel or allow telecommuting for anxious workers. At some point, though, Mr. Lotito notes, "the company has a right to pursue its business," and if getting on an airplane – or working on a high floor -- is necessary to a job, and an employee refuses to do it, he or she can be fired. There are, however, some caveats. A little-known provision of the National Labor Relations Act protects "concerted activity" of even nonunion employees. Thus, if anthrax fears lead two or more employees to object to mail-handling procedures, they cannot be fired or disciplined for agitating for better protection. Also, if a worker claims he or she can't perform certain functions because of posttraumatic stress disorder or another diagnosed condition, an employer may have to make accommodations under the Americans with Disabilities Act. Companies could also be at legal risk if they aren't complying with guidelines issued by authorities for dealing with current threats. Terri M. Solomon, an attorney at Littler Mendelson in 1 New York, says she was contacted by a client who told her that a mailroom worker's insistence on wearing gloves to deliver company mail was creating fear among other employees. "To which I said, `Too bad,' " says Ms. Solomon, who notes that a number of federal agencies have suggested precisely that precaution. Efforts by companies to improve security since Sept. 11 have spurred numerous legal questions. Tom Finkbiner, chief executive of Quality Distribution Inc. in Tampa, Fla., which operates the largest chemical tank-truck fleet in the country, says some chemical makers have asked Quality to provide them with names, addresses and other background information on its 3,350 drivers. After consulting with in-house counsel, Mr. Finkbiner concluded that "a lot of the things they're requesting are invasions of privacy." Quality is providing names and photo IDs but not employment histories and home addresses. Managers of office buildings trying to prepare evacuation plans have asked tenants to supply lists of employees with disabilities that might hinder their escape in an emergency, raising privacy concerns. But in a recent bulletin, the Equal Employment Opportunity Commission said employers may ask employees if they will need assistance, as long as answering is voluntary. The EEOC also said companies can provide this information to building security officers and others responsible under any emergency evacuation plan. There are few limits on companies conducting security checks of employees' bags or work areas, attorneys say, provided the company clearly informs its workers of the inspection policy. In presentations for employers, Ms. Solomon's firm advises them to maintain broad rights to conduct searches, suggesting, for example, that they "expressly reserve the right to enter all lockers, desks, and vehicles at any time." Newfound security concerns have sent many employers rushing to perform background checks on workers. Here, too, there are certain legal requirements to navigate. The Fair Credit Reporting Act, for example, requires job applicants and employees to consent to checks of their credit history and, in certain circumstances, to employers obtaining drug-test reports, driving records and interviews with friends or associates. And while companies are free to inquire about past convictions, many states forbid inquiry into arrests, notes Ms. Solomon. Because background checks can be expensive, the question was raised at a Nov. 12 meeting of human-resource officials in Pittsburgh whether it would be possible to conduct them just for foreign nationals. That, says John Hill, a Jackson Lewis attorney who attended the meeting, would be a bad idea. To avoid potential discrimination claims, he says, "if you do it for one person, do it for everybody." David Ross, an attorney for Seyfarth Shaw in New York, says his firm gave similar advice to the company that inquired about removing pictures of workers of Middle Eastern background from its marketing materials. Although it's not illegal, he says, "we cautioned them that that could come back to haunt them in other contexts" such as discrimination lawsuits because it shows separate treatment of people based on their heritage. Credit: Staff Reporter of The Wall Street Journal Reproduced with permission of the copyright owner. Further reproduction or distribution is prohibited without permission. 2 Case Two: Source: Training, August 2000 v37 i8 p50. Title: They're Watching YOU WORKPLACE PRIVACY IS GOING...GOING... Author: SARAH BOEHLE With the proliferation of Internet and e-mail monitoring, the boss's eyes are everywhere. Is this any way to run a business? I visited a pornographic Web site at work, and Gordon Alexander knows it. Thing is, I never told Alexander about my visit to the Internet's underbelly, nor did he pass by my cubicle when risque photographs were splashed across my monitor. So is he some sort of clairvoyant? Nope. He's the MIS manager at the Minnesota office of Bill Communications (which owns TRAINING Magazine), and he's using the latest in employee surveillance aids: Internet monitoring software. From his desktop, Alexander has a bird's-eye view into the Internet surfing habits of the 100 or so employees here in Minneapolis. And the software he uses is so advanced that not only can he track and record which Web sites workers visit, he can also determine how much time they spend at each site. Welcome to the 21st century workplace, where such tactics are no longer the exception but the norm. According to a survey this year by the American Management Association (AMA), nearly three-quarters of major U.S. firms now record and review some form of their employees' communications—either telephone calls, email, Internet connections or computer files. That's more than double the number of just two years ago. Of all surveillance methods, Internet and email monitoring have seen the most explosive growth recently, with 54.1 percent of companies now monitoring their employees' Internet connections and 38.1 percent reviewing e-mail messages. What's behind this rush to Orwellian oversight? Employers cite lost productivity, decreased bandwidth, corporate espionage and legal liability as some of the reasons, fearing that employee abuse of e-mail and the Internet will damage their bottom lines. All this, coupled with the fact that monitoring software is now faster, cheaper and more flexible than ever before, has made it tough for employers to resist. Ray Boelig, CEO of Elron Software in Burlington, MA, a leading purveyor of Internet and email surveillance tools, believes that the rise in monitoring isn't a sign that companies are overly paranoid. "Monitoring is essential," Boelig says. "Organizations need to look at the proper use of their assets. They have a responsibility to make sure that their workplace is a nonhostile environment." In fact, employers don't just have a moral obligation to maintain a nonhostile working environment, they're legally required to do so. The Communications Decency Act of 1996 says that an employer can be held liable for the activities of its employees. Logging on to playboy.com over the lunch hour, for example, might seem fairly harmless to one employee, but if a co-worker who doesn't share that viewpoint sees those lewd images, she might construe them as sexual harassment and sue the employer for allowing a hostile work environment to exist. 3 E-mail is even more nettlesome. Under federal law, sending and receiving e-mail via an employer's computer is no different than writing a memo on company letterhead--meaning that any off-color e-mails circulating around the office can set employers back millions of dollars. Chevron Corp. learned this lesson the hard way when it settled a sexual-harassment lawsuit for $2.2 million over offensive e-mail postings such as "25 reasons why beer is better than women." Corporate behemoths like Citigroup and Morgan Stanley Dean Witter have also been taken to court by employees who allegedly received email at work containing racist jokes. But do a few isolated lawsuits really warrant a bandwagon approach to prying into the doings of millions of U.S. employees? Privacy watchdogs would answer with an emphatic no. But employers point to statistics that show some cause for concern. Last year, Elron Software commissioned a study by market research firm NFO Interactive in Northwood, OH, that revealed some chilling trends. According to the survey, the number of employees who admitted to sharing confidential business information via e-mail with other companies weighed in at 20.6 percent. The poll also found that nearly three-quarters of respondents sent or received adult-oriented e-mail at work, and 64.4 percent admitted to sending or receiving sexist or racist e-mail. And according to a 1998 Internet-abuse study conducted by NFO and Elron, 62 percent of organizations reported catching employees accessing sexually explicit Web sites on company computers. While the Elron/NFO surveys undoubtedly raised red flags among corporate management types, Lewis Maltby, who is president of The National Workrights Institute in Princeton, NJ, takes a more skeptical view. "I would be suspicious," he says of such studies. "There's a lot of junk data that has come out from advocates who are more interested in pushing their agenda than in being straight with the [research]." Nevertheless, Maltby admits that employers have legitimate concerns. "The Web is seductive," he says. "The risk that employees will spend all day surfing the Web instead of working is vastly greater than the risk that they'll goof off in some other, less entertaining way." The Gray Zone In 1890, in one of the most seminal essays on privacy ever written, Louis Brandeis and Samuel Warren proclaimed that the right most valued by the American people was "the right to be left alone." Brandeis and Warren were worried that then-modern-day technology such as photography and the tabloid press were invading "the sacred precincts of private and domestic lives," and they warned that "[n]umerous mechanical devices threaten to make good the prediction that what is whispered in the closet shall be proclaimed from the housetops." If Brandeis and Warren could see the wired world of today, they'd likely turn over in their graves. Thanks to the expeditious advance of technology and the advent of the World Wide Web, the most minute details of our everyday lives are now on display for the world to see--often without our knowledge. Each time we swipe our frequent-buyer savings card at the local supermarket, our grocer surreptitiously tracks what food we eat, even how much dog food or kitty litter we buy. "Cookies," which are pieces of computer code dropped from Web sites onto users' hard drives, record where we travel on the Net, what purchases we make, which passwords we create, and any personal information we disclose. This data is then used for marketing purposes or sold to third parties. Public outcry against such intrusions has reached a boiling point in recent months, leading consumer rights advocates to lobby Congress to enact legislation that would limit the types of 4 information companies are allowed to collect on the Web. Should such legislation pass, however, it is doubtful that any protections will extend to the millions of Americans subjected to monitoring on the job. Not that monitoring is anything new to the business world. In the manufacturing industry, it has been used for decades to track employee productivity and to record inventory. Cyclometers (which measure typing output) were in place by 1913, and employers began monitoring employee telephone calls for "quality assurance purposes" in the 1920s. What has changed is the sophistication of surveillance software and the types of information it allows employers to gather--which is precisely what disturbs privacy advocates. Although most concur that employers have valid reasons for watching their employees, the fear that these methods are becoming too meddlesome is nonetheless blossoming. Maltby and many other privacy advocates argue that those employers who routinely read their employees' e-mail and compile individualized lists of all Web sites workers visit are creating a nightmare for themselves as well as their employees. "If someone has a problem today, they don't write to 'Dear Abby.' They go to the Web with their darkest, most personal secrets," says Maltby. "Do employers really want to know one of their employees is HIV-positive or just got divorced? These are not things employers have any right to know or even want to know, but they're going to routinely find out if they keep going down the road they're on." Not surprisingly, fallout from such spying can be ugly. In fact, this year more than half of employers reported reprimanding employees--ranging from a formal warning to termination--for abusing company telecommunications equipment. Yet at its most insidious, the result of snooping is not termination or some draconian penalty; it is loss of privacy. Although multimillion-dollar e-mail- and Internet-oriented lawsuits make for juicy headlines, it is spying of a more mundane ilk that threatens to hit workers the hardest. The latest software, for example, can monitor employees' every keystroke, even allowing managers to view workers' desktops in real time-- i.e., what they're working on minute by minute--on the sly. Extrapolate a bit, and it is not hard to imagine the machinations running through some pointyhaired boss's brain. "Hmm...Smith didn't log on to the company network until 8:30 a.m. even though work was scheduled to begin at 8." (Never mind that Smith has been in the office since 6:30 this morning working from hard copy; the boss has no record of that.) Or, "Interesting. Julie spent two hours reading The Wall Street Journal online this afternoon. I'll make a note of that on her next performance review." (So what if Julie was doing research pertinent to her job.) Holy Grail? Then there's online learning. The latest generation of training management software can monitor and record every moment of a student's progress through an online course. To be sure, there are tangible benefits. Dave Mandelkern, executive vice president and chief technology officer for elearning provider Docent Inc. in Mountain View, CA, calls reporting software the "Holy Grail" of the training industry. "Traditionally, getting data back on what students thought and what they learned was extraordinarily difficult," says Mandelkern. "Now, for the first time, we've got this built-in two-way communications mechanism that allows us to capture that data." Reporting software is also invaluable in helping employers to improve their e-learning programs, allowing them to determine the effectiveness of specific test questions or course modules by gauging student performance. 5 For all its attractiveness, though, tracking software sometimes borders on the intrusive, going so far as to monitor students' activity down to the mouse click and to record what they say in course chat rooms and asynchronous forums. Ostensibly, these features are for students' own good; yet they raise some concerns, especially when studies show that many people are more open with their thoughts on the Web, revealing personal information online that they otherwise wouldn't share in face-to-face environments. So why aren't employees asking questions about it? Although there are no hard numbers as to how many companies inform their workers that online classrooms are monitored, it appears that most employees are currently unaware they're being watched. Dave Evangelisti, vice president of marketing for e-learning management software provider Pathlore in Columbus, OH, estimates that less than half of Pathlore's customers tell their students that monitoring is in place. "A lot of companies are not prone to abusing this cache of information," notes Evangelisti. "But anytime you have employees interact with software and ask them to put in comments and give their feedback and then capture that information, the potential for abuse is definitely there." The Electronic Boss Evangelisti also points out that it is important for employers to use such information in the right way, and to refrain from determining employee performance based on limited data gleaned from monitoring, such as test scores and time spent completing specific assignments. This opens up a larger debate, which is that electronic surveillance, in its sundry forms, not only has the potential to encroach upon worker privacy, it also could change the way in which employee job performance is assessed. Indeed, with continuing corporate downsizing leaving fewer and fewer middle managers to supervise employees in person, the likelihood that monitoring software will soon play a larger role in the performance-assessment process is increasing--and many pundits doubt its effectiveness. MIT professor and Fortune columnist Michael Schrage attacked this phenomenon recently in a column decrying the best-practices databases that have spread like wildfire in world-class organizations such as General Electric and Asea Brown Boveri. Likening them to "databasedriven blackmail," Schrage argued that such knowledge management systems are poised to squash innovation because they define, in set terms, the best way to go about doing things without giving employees rein to think up new, and possibly better, practices of their own. Schrage also lambasted the tracking features of such systems, citing their sometimes arbitrary determination of "good" performance as a detriment to all. "You ignore checking in with these databases at your peril," he wrote. "Dis [them], and you may lose your promotion, your job, or your employment lawsuit--whether you're suing because you've been fired, or being sued for firing....And if your performance evaluation isn't based in part on how well you draw upon these best-practice resources, then what's the point of having them?" Which begs the question: Do employers actually realize any of the gains in productivity they trumpet as a reason for turning to monitoring software in the first place? "This kind of piecework keeping track of everything people do is really not the way to get people to do their best jobs and feel best about companies. It makes employees feel like children or potential miscreants," says Richard Sobel, a political scientist at Harvard University who works 6 on privacy policy and who opposes workplace monitoring. "The environments that respect people and their privacy tend to see results in productivity, good ideas, and in people giving their best efforts." Unfortunately, there is virtually no research on the effects of monitoring on employees whose work is more complicated than data entry or customer service. But several studies of telecommunications and clerical workers suggest that electronically monitored workers experience higher levels of depression, tension and anxiety, lower levels of productivity, and more health problems than unmonitored employees. Studies also indicate that the most creative thought takes place during periods of seclusion or daydreaming, meaning that if workers know or suspect they are being watched, there's a good chance their ability to think freely and creatively will suffer. Your Privacy Ends at the Office Door While federal, state and local government employees benefit from some degree of legal protection of their privacy, private businesses (particularly those whose employees are not unionized) are free to monitor their workers' every move with near total impunity. "You don't have a right to privacy at work," says Maltby. "You don't have a right to free speech. You don't have a right to due process. You don't have any Constitutional rights at work because the Constitution only applies to the government, not to the private sector." There are, however, a few exceptions. The Federal Electronic Communications Privacy Act prohibits employers from deliberately eavesdropping on purely personal conversations that an employee may have at work. Yet while this legislation includes telephone calls and audioequipped video devices, it does not protect purely personal communications that occur through means other than the spoken word, such as e-mail or other Web-based forms of communication. And here's something most workers don't know. Even when employers promise not to monitor their employees, courts are supporting companies' right to break such promises without notice. In 1994, a Pennsylvania case between Michael A. Smyth and the Pillsbury Co. helped to establish this precedent. According to court documents, Smyth, an at-will employee, was fired based on an indiscreet private e-mail message that he sent from his home computer to a supervisor at work. The message, which referred to the company's sales management and made threats to "kill the back-stabbing bastards," was later read by company executives who terminated Smyth for "inappropriate and unprofessional comments" made over the company's e-mail system. Smyth filed a wrongful-discharge action against Pillsbury, alleging that the company had repeatedly promised its employees that all email would remain confidential and that no employee would be fired based on intercepted e-mail. Yet the court dismissed Smyth's claim, saying that because Pillsbury owned the computer system to which the message was sent, it could intercept the e-mail without invading its workers' legitimate expectations of privacy. In some instances, employers have even nosed into their employees' company-owned home computers. Consider the case of Ronald F. Thiemann, the respected dean of the Harvard Divinity School who was forced to resign in 1998 after pornographic images were discovered on a university-owned computer located in his home. Reportedly, none of the pornography found was illegal. Yet in Harvard's and many other employers' view, the very fact that Thiemann accessed the images via his employer's computer was grounds for dismissal. 7 What's the Solution? In 1993, in one of the most sweeping federal actions governing workers' privacy to date, Sen. Paul Simon of Illinois and Rep. Pat Williams of Montana made a failed attempt to enact legislation that would have required employers to more clearly define their privacy policies and to refrain from monitoring employees' personal communication. Jim Bruce, outside counsel to EMA, The E-Business Forum in Arlington, VA--which represents the e-business and messaging industries and is a staunch supporter of employers' right to monitor workers--opposed the legislation because of the way in which it was drafted. "The problem was that nobody in Congress or anyone else could forecast all the types of electronic monitoring that could be done in the workplace," says Bruce. The good news is that even in the absence of government intervention, a majority of employers are beginning to institute monitoring policies of their own accord. This year's AMA survey, for instance, revealed that 88 percent of companies now have established Internet and email usage policies and also inform their employees of them. That's real progress, considering that a 1993 Mac-world poll determined that less than one-third of companies that monitored their workers gave advance warning, and only 18 percent had established a written policy. Yet the privacy problem is far from solved. The reason, experts say, is that most companies' electronic monitoring policies and training programs are woefully inadequate. "The standard notice form employers use today communicates virtually nothing," says Maltby. "It basically says, 'We reserve the right to monitor any form of electronic communications for any reason at any time in the future.' What does that tell employees? How? When? Is it going to be e-mail monitoring? Voice mail? Web site monitoring? Is it going to happen all the time or on certain, specified occasions? And is it going to include everything or just things that are work-related?" Indeed, the 1999 Elron study offers some evidence that few employees understand the scope of their company's monitoring practices. It found that nearly two-thirds of workers are unaware that a policy exists--despite the fact that, as the AMA points out, 88 percent of employers claim that they have such a policy and inform their employees of it. The key to bridging this divide, experts say, is better communication. Even some of those who support an employer's right to monitor are urging companies to improve their policies and to take more proactive measures with their educational initiatives. The EMA recently released an updated version of its Privacy Toolkit booklet, which provides guidelines for writing effective electronic monitoring policies. Next fall, the EMA also intends to debut a set of interactive training tools that will help employers to better communicate both their policies and the ramifications of Internet and email abuse to workers. "I believe that the next stage is going to be education and employee understanding of what company policies are," says Lauren Haywood, the EMA's acting president and CEO. These are hopeful trends. However, barring the unlikely event that federal legislation sets clear guidelines as to what's fair game for employee monitoring and what's not, Kevin Conlon, district counsel for the Communication Workers of America, urges workers to take responsibility for protecting themselves. "Like it or not, the presumption should be that there is no such thing as privacy in the workplace," he says. "Everything is subject to scrutiny, and employees need to start living their work lives accordingly." How to Create an Effective Monitoring Policy 8 The American Management Association recently called on employers to raise the level of dialogue with workers over the use of electronic monitoring in the workplace. "...[M]onitoring is such a new area filled with so many misconceptions of what is proper, appropriate and legal, that employees and employers need to have a clear, mutual understanding of what each may and may not do," says Ellen Bayer, the AMA's global practice leader on human resources issues. In an effort to ensure fair and effective surveillance practices, Bayer recommends that company policies be: * Clearly defined and disseminated to all employees through all communication channels from paper to electronic media. * Addressed in recruitment, orientation and training. * Discussed in face-to-face meetings between managers and employees, allowing for questions to be answered and concerns aired. * Illustrated through specific examples of misuse, accompanied by a consistent explanation regarding the application of standards. Privacy 101 Eric Schmidt knows the value of education. Before he landed a job as chief information officer at Bricker & Eckler LLP in Columbus, OH, six-and-a-half years ago, he spent a large portion of his career as director of information services at Ohio State University. So when Bricker & Eckler decided to install Elron Software's Internet Manager and E-Mail Inspector, he rallied hard for a first-rate policy and training program to be put in place before the software hit the firm's computer network. "Education can solve 90 percent of your problems," says Schmidt, who claims that a number of companies he's talked to have installed monitoring technology without telling anyone. "If you don't let [employees] know up front, it's not playing fair. You've first got to tell folks what your expectations are." So Schmidt put together a monitoring policy that was quite explicit. It stated that office computers were the law firm's property and that there was no expectation of privacy. It detailed how, when, and to what extent monitoring would take place. And it provided employees with several examples of inappropriate usage. From the outset, Schmidt wanted to avoid creating what he calls a "Stalinesque" working atmosphere. Rather than relying on human nature or attempting to create "block lists" of inappropriate sites--a Sisyphean task, considering the amount of pornographic material currently on the Net--the firm uses Elron's SmartList technology, which screens the language of Web sites before they're visited and blocks users from those deemed unacceptable. Bricker & Eckler refrains from monitoring the content of text-based e-mail messages--a tactic it believes infringes on employee privacy. Instead, Schmidt gathers a random sampling of e-mail attachments every few months and reviews them to make certain that employees are not downloading software illegally or sending classified information or inappropriate pictures and jokes over the company network 9 The next step was education. Coordinating with Bricker & Eckler educational specialist Rick Anderson, Schmidt put together a training program for new and existing employees that explained the reasons behind the firm's decision to install monitoring software, set the ground rules, and gave staffers an opportunity to ask questions. And education doesn't stop there; every six to eight weeks, Schmidt sends out "gentle reminders" of the monitoring policy. He also includes links to the policy on every page of the firm's intranet, which is the mandatory home page for all attorneys and support staff. Thus far, the approach seems to be working. According to Schmidt, only one employee has been reprimanded for excessive personal Internet surfing, and that person is still employed by the company. Morale hasn't plummeted either--though Schmidt admits to receiving his fair share of ribbing from staffers. "Yeah," he chuckles. "I sometimes get stuff like, 'How's Big Brother doing today?'" Case Three: Source: Newsweek, Sept 17, 2001 p56. Title: Spyware: Taking On Office Snoopers: A colorful federal judge scores a win for workplace privacy Full Text COPYRIGHT 2001 Newsweek, Inc. Alex Kozinski hardly fits the mold of the digital rebel. At 51, the Romanian-born federal judge, a conservative appointed by Ronald Reagan, still drafts his opinions on an IBM Selectric typewriter. But that didn't stop him from marching into the server room of the Ninth Circuit Court of Appeals' San Francisco headquarters last May and shutting down a server programmed to detect unauthorized Internet use by the 30,000 employees of the federal court system. The monitoring software was installed by an obscure division of the judicial branch called the Administrative Office. The system was supposed to detect whether workers in the nation's courthouses were wasting government time and taxpayer dollars by visiting porn sites or downloading songs and video clips. But by treating court workers who must uphold the nation's electronic surveillance laws "like a bunch of 12-year-old kids," says Kozinski, the AO may also have been violating their civil rights. "I saw myself as preventing an illegal act. Isn't that what you would expect of a federal judge?" Last week the AO finally surrendered to Kozinski's loud public campaign, which included a barrage of memos, media interviews and an op-ed piece in The Wall Street Journal. With a 27judge policymaking panel led by Chief Justice William H. Rehnquist set to decide this week whether to resurrect the monitoring program, the AO conceded in a letter that "the need for privacy appears to have, at least temporarily, taken precedence." Citing "misunderstanding" and "worry among judges," the AO rescinded a recommendation that court employees be notified that they have no "expectation of privacy" while using government computers. It was a big win for Kozinski, and for privacy advocates who have watched as courts repeatedly sided with companies against employees in these kinds of disputes over the past few years. "This is a victory for privacy," says Stanford law professor Lawrence Lessig. "The real thing is balance. It's signaling that the courts are thinking about a balanced way of dealing with this complicated issue." Kozinski may have accomplished what employees elsewhere probably wish they could do--throw a dark blanket over the watchful eyes of Big Brother. The Denver-based Privacy Foundation 10 estimates that one out of every three employees who accesses the Internet from the office is subject to some kind of Internet surveillance by his boss. As corporations see it, the Internet is a productivity tool--but can also be a vast arena of sports chat rooms, gambling halls and porn sites that distract workers. Companies worry, too, that they can be sued for fostering a hostile work environment if an employee sends a harassing e-mail or leaves a pornographic Web site up on his computer. In several cases where workers were fired for sending inappropriate e-mail and then sued the company for violating their privacy, judges have mostly sided with the employer. In one 1996 case, Smyth v. Pillsbury, the court found that the company had rightfully terminated a worker for dispatching threatening e-mail, even though it had promised all messages would be kept confidential and privileged. "The company's interest in preventing inappropriate and unprofessional comments or even illegal activity over its e-mail system outweighs any privacy interest the employee may have," the Philadelphia judge wrote. In the clubby confines of the federal judiciary, staging a public protest is hardly the norm. Not that Kozinski is the typical judge. The son of Romanian Jews who fled Bucharest when he was a boy, he is also a freelance writer whose articles range from snowboarding to the death penalty. He may be the only federal judge to have appeared on "The Dating Game"--twice. Kozinski's gamble, openly criticizing his own institution as only someone with lifetime tenure would dare, appears to have paid off. By backing down, court watchers say, the AO spared Rehnquist the potential embarrassment of endorsing a controversial Big Brother policy for the nation's courthouses. Kozinski's victory could turn the tide on the larger issue of Internet monitoring in the private sector. Business interests have so far defeated previous efforts by lawmakers to limit monitoring, but last week the AFL-CIO said it would start lobbying Congress on the issue, partly because of the attention brought by the Ninth Circuit dispute. And last week liberal members of the House Judiciary Committee threatened to limit the use of federal funds for monitoring in government offices. Office workers who combine a little personal Internet surfing with their daily diet of Powerpoint presentations may owe Judge Kozinski a thank-you e-mail. Case Four: Judges' Ire Stirs Debate on Web Monitoring Wall Street Journal WASHINGTON -- Privacy advocates hope a simmering dispute within the federal judiciary over Internet use will spark changes to federal laws on employer monitoring of company networks. A group of senior West Coast judges, angry that their online activity is monitored by a federal agency here that administers the court system, have suggested the scrutiny may be illegal and for one week earlier this year disabled the monitoring system in protest. Judge Alex Kozinski of San Francisco's U.S. Court of Appeals for the Ninth Circuit -- where the disabling took place -- has claimed in a memorandum that such oversight violates the federal wiretap statute. But experts in workplace law say the legality of such monitoring is widely accepted. Broad surveillance by system administrators is explicitly permitted under the 1986 Electronic 11 Communications Privacy Act and has been upheld by several courts, and Congress has rejected attempts to craft a new policy. "This sounds like the judge had no clue how intrusive modern monitoring security is," said Stewart Baker of the Washington law firm Steptoe & Johnson, an expert on wiretap law. Calls to Judge Kozinski and the Ninth Circuit's media representative weren't returned. The dispute could spur lawmakers to re-evaluate federal policy on monitoring, privacy advocates said. "We may need to have people in a position of power affected by electronic monitoring before there is going to be an honest legislative evaluation of the current situation in the American workplace," said Jeremy Gruber, legal director at the National Workrights Institute in Princeton, N.J. Under the 1986 law, a network operator can intercept or disclose a user's messages "in the normal course of his employment" to protect the rights and property of the network's owner -- even without giving a warning, though experts frequently advise companies to do so. It isn't unusual for companies to monitor the online behavior of employees; a survey in July of 435 large U.S. companies by the American Management Association found more than 60% watched Internet connections. Most indicated they are worried about lawsuits, especially stemming from workers visiting pornographic Web sites or distributing sexually suggestive material, but many said they also check to detect network attacks by hackers. Sen. Charles Schumer (D., N.Y.) and Rep. Bob Barr (R., Ga.) are expected to introduce legislation later this year that would limit employer surveillance. A similar bill sponsored by the two was voted down last year. The judiciary dispute was reported July 5 by the Houston Chronicle and was also the subject of an article yesterday in the New York Times. For the judges, the issue will be decided when the United States Judicial Conference meets on Sept. 11. The conference, which makes policy for the judiciary, "is actively studying the issue," conference spokesman David Sellers said. "There's really nothing to be said until the conference meets." Credit: Staff Reporters of The Wall Street Journal Reproduced with permission of the copyright owner. Further reproduction or distribution is prohibited without permission Case five: Privacy on Trial: Wall Street Journal An open letter to federal judges: The U.S. Bureau of Prisons maintains the following sign next to all telephones used by inmates: 12 "The Bureau of Prisons reserves the authority to monitor conversations on the telephone. Your use of institutional telephones constitutes consent to this monitoring. . . ." I'm planning to put signs like these next to the telephones, computers, fax machines and other equipment used in my chambers because, according to a policy that is up for a vote by the U.S. Judicial Conference, we may soon start treating the 30,000 employees of the judiciary pretty much the way we treat prison inmates. Exaggeration? Not in the least. According to the proposed policy, all judiciary employees -including judges and their personal staff – must waive all privacy in communications made using "office equipment," broadly defined to include "personal computers . . . library resources, telephones, facsimile machines, photocopiers, office supplies." There is a vague promise that the policy may be narrowed in the future, but it is the quoted language the Judicial Conference is being asked to approve on Sept. 11. Not surprisingly, the proposed policy has raised a public furor. This has so worried the policy's proponents that Judge Edwin Nelson, chairman of the Judicial Conference's Automation and Technology Committee, took the unprecedented step of writing to all federal judges to reassure them that the proposed policy is no big deal. I asked that my response to Judge Nelson be distributed to federal judges on the same basis as his memo, but my request was rejected. I must therefore take this avenue for addressing my judicial colleagues on a matter of vital importance to the judiciary and the public at large. The policy Judge Nelson seeks to defend as benign and innocuous would radically transform how the federal courts operate. At the heart of the policy is a warning -- very much like that given to federal prisoners -- that every employee must surrender privacy as a condition of using common office equipment. Like prisoners, judicial employees must acknowledge that, by using this equipment, their "consent to monitoring and recording is implied with or without cause." Judicial opinions, memoranda to colleagues, phone calls to your proctologist, faxes to your bank, e-mails to your law clerks, prescriptions you fill online -- you must agree that bureaucrats are entitled to monitor and record them all. This is not how the federal judiciary conducts its business. For us, confidentiality is inviolable. No one else -- not even a higher court -- has access to internal case communications, drafts or votes. Like most judges, I had assumed that keeping case deliberations confidential was a bedrock principle of our judicial system. But under the proposed policy, every federal judge will have to agree that court communications can be monitored and recorded, if some court administrator thinks he has a good enough reason for doing so. Another one of our bedrock principles has been trust in our employees. I take pride in saying that we have the finest work force of any organization in the country; our employees show loyalty and dedication seldom seen in private enterprise, much less in a government agency. It is with their help -- and only because of their help -- that we are able to keep abreast of crushing caseloads that at times threaten to overwhelm us. But loyalty and dedication wilt in the face of mistrust. The proposed policy tells our 30,000 dedicated employees that we trust them so little that we must monitor all their communications just to make sure they are not wasting their work day cruising the Internet. How did we get to the point of even considering such a draconian policy? Is there evidence that judicial employees massively abuse Internet access? Judge Nelson's memo suggests there is, but if you read the fine print you will see that this is not the case. 13 Even accepting the dubious worst-case statistics, only about 3% to 7% of Internet traffic is nonwork related. However, the proposed policy acknowledges that employees are entitled to use their telephone and computer for personal errands during lunchtime and on breaks. Because lunches and breaks take up considerably more than 3% to 7% of the workday, we're already coming out ahead. Moreover, after employees were alerted last March that downloading of certain files put too much strain on the system, bandwidth use dropped dramatically. Our employees have shown they can be trusted to follow directions. What, then, prompted this bizarre proposal? The answer has nothing to do with bandwidth or any of the other technical reasons articulated by Judge Nelson. Rather, the policy became necessary because Leonidas Ralph Mecham, director of the Administrative Office of the U.S. Courts, was caught monitoring employee communications, even though the Judicial Conference had never authorized him to do so. Unbeknownst to the vast majority of judges and judicial employees, Mr. Mecham secretly started gathering data on employee Internet use. When the Web sites accessed from a particular computer affronted his sensibilities, Mr. Mecham had his deputy send a letter suggesting that the employee using that computer be sanctioned, and offering help in accomplishing this. Dozens of such letters went out, and one can only guess how many judicial employees lost their jobs or were otherwise sanctioned or humiliated as a consequence. When judges of our circuit discovered this surreptitious monitoring, we were shocked and dismayed. We were worried that the practice was of dubious morality and probably illegal. We asked Mr. Mecham to discontinue the monitoring. Rather than admitting fault and apologizing, Mr. Mecham dug in his heels. The monitoring continued for most of the country until Mr. Mecham was ordered to stop by the Judicial Conference Executive Committee. Hell hath no fury like a bureaucrat unturfed. In a fit of magisterial petulance, Mr. Mecham demanded that his authority to monitor employee communications be reinstated without delay. A compliant Automation Committee hastily met in secret session to draft the proposed policy, pointedly rejecting all input from those who might oppose it. In their hurry to vindicate Mr. Mecham's unauthorized snooping, the committee short-circuited the normal collegial process of deliberation and consultation. Salving Mr. Mecham's bureaucratic ego, and protecting him from the consequences of his misconduct, is hardly a basis for adopting a policy that treats our employees as if they live in a gulag. Important principles are at stake here, principles that deserve discussion, deliberation and informed debate. As Chief Judge James Rosenbaum of Minnesota has stated, "giving employers a near-Orwellian power to spy and snoop into the lives of their employees, is not tenable." If we succumb to bureaucratic pressure and adopt the proposed policy, we will betray ourselves, our employees and all those who look to the federal courts for guidance in adopting policies that are both lawful and enlightened. I therefore suggest that all federal judges reading these words – indeed all concerned citizens -write or call their Judicial Conference representatives and urge them to vote against the proposed policy. In addition, we must undo the harm we have done to judicial employees who were victims of Mr. Mecham's secret, and probably illegal, snooping. The Judicial Conference must pass a resolution that offers these employees an apology and expungement of their records. Moreover, we should appoint an independent investigator to determine whether any civil or criminal violations of the Electronic Communications Privacy Act were committed during the months when 30,000 judicial employees were subjected to surreptitious monitoring. If we in the 14 judiciary are not vigilant in acknowledging and correcting mistakes made by those acting on our behalf, we will surely lose the moral authority to pass judgment on the misconduct of others. --Mr. Kozinski is a judge on the Ninth U.S. Circuit Court of Appeals in California. His unmonitored e-mail address is kozinski@usc.edu. Case six: Data Raid: In Airline's Suit, PC Becomes Legal Pawn, Raising Privacy Issues --- Northwest Mines Hard Drives Of Employees Wall Street Journal May 24, 2000 NORTH HOLLYWOOD, Calif. -- Each day, Ted Reeve pours his life into his home computer. He spends hours reading news online, and dutifully records monthly payments for his Visa card and Toyota Camry, along with ATM withdrawals at Ralphs grocery store. He regularly types up notes -- from talks with his doctor, and one day wrote up an offer to his landlady to buy his apartment building from her. It never occurred to him that such personal data could be extracted and shared among strangers. But that's what happened when his computer's hard drive was copied by two investigators retained for his employer, Northwest Airlines. Working right in his living room with a program called EnCase, they excavated every last bit and byte from his desktop hard drive. As part of a court-approved search, the man and woman arrived at 11 in the morning on Feb. 3, tugging a dolly carrying tool boxes and diagnostic equipment that banged at each step up to the second floor of his duplex. They moved Mr. Reeve's PC from its usual place in his bedroom -near a red, cross-stitched sign that says "Home Sweet Apartment" -- and, with cover unscrewed, spent three hours copying everything on the hard drive. Northwest suspected that its flight-attendant union had used the Internet to run an illegal call-insick campaign to disrupt the airline, the country's fourth-largest. So the airline won a court order to search 20 or so hard drives at flight attendants' homes and union offices. "I didn't know your company could wholeheartedly ransack your computer," says Mr. Reeve, who celebrated his 42nd birthday and 10th anniversary as a Northwest flight attendant last week. The Northwest case shows how hard it is to protect privacy when hard drives become pawns in litigation -- and how hard it is to handle the flood of data that can emerge. As people commit an ever-growing pile of information to computers, their hard drives are becoming a digital mother lode for lawyers. The issue moved into the spotlight when Kenneth Starr's prosecutors scavenged Monica Lewinsky's computers and published what they found, including e-mails to friends and unsent drafts of letters. Now more federal courts are approving searches of home PCs for evidence in civil cases. But it isn't easy drawing limits around a vast digital pool of data, and even safeguards put in place by a federal judge can fall apart as a legal battle speeds up or heats up. 15 Swamped by the files unearthed from just the first few computers in its search, Northwest complained to one judge that printing each document found inside the workers' PCs would amass a paper pile five times as tall as the Washington Monument, which stands 555 feet. In the unresolved dispute, both sides have been caught off-guard by the magnitude of the data haul. And so, apparently, were the two presiding judges and Northwest's investigative consultant, Ernst & Young, whose cutting-edge computer -- forensics lab is run by the former chief of computer-crime investigations for the U.S. Air Force. The latest technology makes it easy to extract most deleted files, fragments of Web searches and a host of other data from a PC. Deep in the recesses of the hard drive -- the massive repository sometimes heard groaning as a computer starts up are untold numbers of documents and records of digital actions that many computer owners believe had long since vanished into the ether: forgotten drafts of notes never sent, deleted e-mails, Web pages visited by the owner or anyone who happened to tap the keys. Almost everything is kept somewhere on the hard drive. Not until there is no nook or cranny left on it do the deleted files typically get overwritten. And many computers never reach that point. The "C" drive of Mr. Reeve's four-year-old computer had 4.36 gigabytes of memory, capable of storing more than a dozen sets of the 32-volume Encyclopedia Britannica. He believes the drive wasn't full. Mr. Reeve and Kevin Griffin, a Honolulu-based flight attendant, accuse Northwest in documents filed with the court of launching a "fishing expedition" that violated their privacy. Trying to wade through an ocean of documents under a fast-track discovery order, their lawyers say in a statement that they were forced to turn over "hundreds or even thousands of pages" that were irrelevant to the order. Northwest says it had no interest in the personal correspondence and files of its workers, but it was entitled to any evidence related to a sick-out conspiracy. The story of Mr. Reeve and his disemboweled desktop began as the past century closed. The final weekend of 1999 was brutal for Northwest schedulers. Between Dec. 30 and Jan. 2, anywhere from 932 to 1,042 flight attendants called in sick every day, nearly double the number of the same weekend in 1998, according to the suit Northwest filed in U.S. District Court in St. Paul, Minn., in early January. The airline and its 11,000 flight attendants have been locked in a contract dispute stretching back to 1996. Even by scrambling to shift crews around, and calling on a pool of reserves, Northwest still couldn't get 317 planes in the air. Northwest was convinced that the sharp increase in absenteeism was an orchestrated protest campaign by the flight attendants' union, the Teamsters Local 2000. For weeks leading up to the weekend, Northwest had been watching anonymous postings on the local's own Web pages and elsewhere. Messrs. Griffin and Reeve each ran personal Web sites concerned with union matters. In Northwest's suit, it cited one anonymous message that appeared on Mr. Griffin's site Dec. 8. "While not sanctioned by the union," the message said, "a sick-out en masse is one way the company will be convinced that we are serious about an industry-leading contract." Northwest asked the court to grant a restraining order to prevent the union from future disruption of flight operations. Weighing the interests of the flying public, the court complied. The flight attendants named in the suit denied fomenting any illegal work disruption. "Trust me, I thought about calling in," Mr. Reeve says. "I think a lot of people were frustrated and took matters into their own hands." 16 The airline negotiated an agreement on discovery guidelines with attorneys representing the union officials, but not with Messrs. Reeve and Griffin, who are rank-and-file members. The parties agreed to allow Ernst & Young to make copies of the hard drives and search for any correspondence related to numerous specific subjects or groups, including Local 2000, "calling in sick" and the Contract Action Team, or CAT. The period involved was limited to April 1, 1999, to Feb. 8, 2000. Ernst & Young was supposed to comb the drives using unspecified keywords, and hand over to Northwest anything it turned up. At its National Computer Forensics Lab in Vienna, Va., Ernst & Young routinely makes "mirror image" copies of hard drives. The drive itself, a stack of magnetically coated platters spinning at blinding speeds, stores data on a microscopic scale. Using sophisticated software, computer detectives can exhume even data nestled in remote, hardto-access areas, such as the "slack space" or "unallocated" parts of the thin disks. David Morrow, who heads the lab, joined Ernst & Young in 1998 from the Air Force Office of Special Investigations, where he directed the operation that processed computer evidence for counterintelligence, and criminal and fraud cases. Using the court-approved guidelines, Mr. Morrow, who led the Northwest project, said his team alone devised the keywords, and wouldn't share them with Northwest or the flight attendants, according to a statement he filed with the court. Concerned about free-speech issues and the Internet, Paul Levy, an attorney for the Public Citizen Litigation Group in Washington, agreed to represent Messrs. Griffin and Reeve. At a February hearing in St. Paul, he argued that the keywords, to the extent he could learn them, were overly broad. After learning that one was "flu," he argued that the tiny word would also snatch any innocent or irrelevant file in which "the letters `f' `l' `u' happened to appear together in another word, such as `influential' or `influx.'" The search of just Mr. Griffin's and Mr. Reeve's computers proved formidable. "The responsive data identified would consume 75,200 pages of paper," Mr. Morrow said in his court statement, much of it nothing more than "unintelligible computer code." By discarding the documents with gibberish, Ernst & Young cut the number to 22,500. The discovery process was further aggravated because Northwest's attorneys were trying to amass evidence quickly for a Feb. 15 hearing, at which they would seek a more substantial ruling against the union, a preliminary injunction. Fighting erupted before the drives were even copied. When the parties met in the St. Paul court on Feb. 1, Mr. Levy said Messrs. Griffin and Reeve hadn't been involved in negotiating the search guidelines, and objected to them. Mr. Levy said the two had reviewed their own hard drives "and because the computers had been used mostly for private and not work-related purposes, they contained a vast array of personal material that should not be subject to inspection by strangers." He later argued that Ernst & Young couldn't operate neutrally. Aside from already being Northwest's accounting firm, Ernst & Young also was retained by some of Northwest's lawyers to do the computer analysis. Mr. Morrow, in his statement, responded that Ernst & Young acted professionally in complying with the court's orders. "The Teamsters union negotiated extensively on the procedures, and then agreed to Ernst & Young," says John Gallagher, an attorney for Northwest with Paul, Hastings, Janofsky & Walker. "Everybody was on board except" Messrs. Griffin and Reeve, he adds. 17 Magistrate Judge Arthur Boylan agreed that the computer-search procedure -- even though agreed to by the other flight attendants -- didn't offer adequate protection. He suggested that Ernst & Young proceed with determining which documents were responsive to the discovery request, but then send them to lawyers for the defendants. They, in turn, could pluck out anything they objected to, noting the specific reasons. Only then would the remainder go to Northwest. The judge gave Ernst & Young 24 hours to search computers and produce the documents. Defendants' attorneys got 24 hours to review them. The schedule proved impractical immediately. On Feb. 3, the day Mr. Reeve's hard drive was copied in North Hollywood, two Ernst & Young staffers flown in to Honolulu copied Mr. Griffin's computer files. Others descended on the Local 2000 office near the airport in Minneapolis. Days passed before Ernst & Young delivered the first paper documents. The two sides bickered about who was to blame for the delay, but in the end, the attorneys for Messrs. Griffin and Reeve say they received their first batch on Friday morning Feb. 11, eight days after their computer drives were copied. Over the weekend, boxes of documents arrived day and night. "I got through the Friday morning delivery -- extremely rushed examination -- and basically what I did was anything that might be discoverable I tried to turn over," Mr. Levy said at a hearing. "Where a privilege wasn't involved, I just gave. They got much more because of the rushed schedule they put me under." (At least one file related to Mr. Reeve's bid for his apartment building, for instance, was apparently cleared for release to Northwest.) At the same hearing, noting that the airline's attorneys had just been hit with an avalanche of more than 6,000 documents from Ernst & Young, Northwest attorney Timothy Thornton pleaded for more time to review them. "I think everybody was a little naive when we felt we could just dive into these computers and make it simple," he said. Anyway, he told the judge, rather than pursue the injunction immediately, the airline wanted to devote its energy to new contract negotiations with the flight attendants. Mr. Levy suspects something else. Noting that Northwest's legal team had been given several thousand pages mined from the two flight attendant's computers to comb through, he concludes, "The problem was there was no smoking gun." Emboldened, lawyers for Messrs. Griffin and Reeve asked the court in March to reverse the computer-search order, arguing a fresh angle: It had erred by not allowing the defendants to search their own files and turn over relevant documents to the other side. That's normal discovery procedure, and penalties are high if it is later proved that evidence was withheld. The only exception, they said, was when a court was presented with evidence that documents had been destroyed or the computer owner couldn't otherwise be trusted to do the search himself. In one case they cited, a federal judge in Illinois last year allowed a computer expert hired by a machinery company to inspect the PC of an ex-employee it was suing -- but only after he sought to excuse the disappearance of certain electronic files by claiming his computer had "fallen off my desktop on at least four to five occasions." In their appeal, the two Northwest flight attendants argued that "because deleted materials can be retrieved from computer storage, unlike conventional paper files, the material stored on personal computers may be uniquely private, including thoughts never communicated to another soul." 18 For instance, among the documents Mr. Levy objected to was one called "rebuttal for court.doc," dated Jan. 8, 2000. His reason: "Griffin prepared it shortly after the lawsuit was filed . . . to assemble his thoughts; it was intended for eventual communication to his attorneys. "Although it was never sent to his attorneys, it is withheld because an invasion of his personal computer and seizure of a memorialization of his thoughts about how to mount his legal defense would violate his right of free speech under the First Amendment, his right of privacy under the Fourth Amendment, and the attorney-client privilege." "Everybody has a private side with a computer," Mr. Reeve says. "It's like putting part of your brain in a box." He says he thinks the airline really wanted to frighten employees, to prevent the Internet from becoming a powerful organizing tool. "They have yet to turn up any evidence of conspiracy," he adds. "Our intention was to stop illegal activity," says Jon Austin, a Northwest spokesman. "We are pleased that that activity did stop." As for evidence on the drives, Mr. Gallagher, the Northwest attorney, notes that the airline agreed to halt searches weeks ago to focus on contract negotiations with the union. Northwest's suit may be dismissed if a vote on the resulting new contract, currently being tallied, is passed. If that happens, he adds, "we'll never know what we might have discovered." While Andrea Todd and Vincent King, the Ernst & Young computer team in Los Angeles, copied his computer hard drives three months ago, Mr. Reeve, who earns about $35,000 a year, videotaped them for legal protection. At one point, he cleared his coffee table, removing his white "Ted" mug, to make room for the Ernst & Young equipment. Soon, on the firm's monitor, the EnCase drive-copying software was displaying a series of commands that sound like missileguidance lingo, including "Locking" and "Acquire." "I felt pretty damned violated. I couldn't figure out what crime I committed," he says. He adds, "What I did is run a Web site, and got a very large company mad at me." A hearing is set for next month on a request by Messrs. Griffin and Reeve to reverse the computer-search order and immediately destroy the CD replicas of their hard drives. "Maintenance of such copies perpetuates the potent chilling and intimidating effect of the harddrive discovery," they said. When considering that request, the airline's reply said, the court shouldn't be swayed by "defendants' hyperventilated accusations about `Big Brother' and Northwest's `intrusion' into their private lives." Credit: Staff Reporter of The Wall Street Journal Case seven: Hands Off My Genes Wall Street Journal 19 February 15, 2000 Authors: By Matt Ridley Last week President Clinton signed an executive order forbidding discrimination on genetic grounds by the federal government, a probable step toward prohibiting genetic discrimination in the private sector, too. He is responding to an understandable public unease at the way our genes are being gradually exposed, for anybody to see, by efforts to map the human genome. Various forms of genetic discrimination are already illegal. Sexual and racial discrimination amount to genetic discrimination, since it is genes that differentiate sex and race. Given strong evidence for the moderate heritability of homosexuality, even discrimination on the grounds of sexual orientation could be seen as genetic discrimination. A ban would simply move the prohibition deeper, from the visible surface expression of genes, to the genes themselves. Though better genetic understanding will increasingly throw into question our traditional ideas of meritocracy, a discrimination ban is necessary if we are to guarantee privacy and avoid potential employer misuses of genetic information. In one sense, the ban is only logical. It reinforces an important principle: Genes are private, not public, property. A potential employer asking whether you have a genetic predisposition to heart disease, cancer or mental illness would be invading your privacy. It is already theoretically possible for an employer to ask candidates to take a genetic test for breast-cancer susceptibility (the BRCA1 gene on chromosome 17) or for an elevated probability of Alzheimer's disease (APOE-4 on chromosome 19). A lunatic employer could even ask to check whether the employee has the version of the IGF2R gene on chromosome 6, which has recently been linked to high IQ. In each case, the discrimination would be idiotic. The increased probability of cancer, Alzheimer's or high IQ caused by these genes is very marginal and not the kind of thing that would make a practical difference to job performance. Moreover, most such genes have their effect only if an environmental factor is also pushing in the same direction. A genetic predisposition toward alcoholism is meaningless, for example, in a person who does not drink. This last point is perhaps the best reason for a law. The ordinary employer may have a grossly exaggerated view of the power of genes, thinking of them as implacable masters of fate. Geneticists have been trying to correct this misunderstanding by stressing that the effects of genes are just as complicated, contingent and partial as the effects of social factors. As James Watson, first head of the Human Genome Project, remarked: "We talk about gene therapy as if it can change someone's fate, but you can also change someone's fate if you pay off their credit card." In fact, we can overcome the effects of genes. Dyslexia is probably an innate condition with a strong genetic component, but that does not make it incurable. Ironically, it is the polemicists who rail against genetic determinism who have done most to propagate the myth of genetic fatalism. "To the biological determinists, the old credo `You can't change human nature' is the alpha and omega of the human condition," wrote Steven Rose, Leon Kamin and Richard Lewontin in their 1984 book, "Not In Our Genes." So, to prevent people with unrealistic ideas about the power and irreversibility of genes from discriminating on genetic grounds is sensible, liberal and tolerant. But it is not an easy path, for it trespasses on the whole idea of meritocracy -- a concept that is fundamentally genetic. Employing somebody is almost always a discriminatory act. If the employer interviews the candidates and 20 chooses the one who shows the best ability, or the most cheerful personality, or the clearest understanding, he is discriminating -- perhaps even discriminating genetically. Suppose an employer is faced with two equally qualified candidates. One comes from a privileged background, the other from a poor and illiterate family. Suppose the employer argues to himself that the poor candidate deserves the job because he must have greater innate ability to have gotten so far with such disadvantages. The employer is being admirably meritocratic, but he is also being genetically discriminatory. That is the basis of meritocracy: Innate (i.e., genetic) ability should overrule environmental factors like class privilege. Nonetheless, it is fanciful to imagine a time, even decades hence, when an employer could learn more about your abilities from a genetic test than from an interview. There are a few legitimate reasons for asking to see a candidate's genes, and they could easily be dealt with by exemptions from the discrimination law. A lifeguard, for instance, should not be employed in the open air if he has a predisposition to skin cancer. Presumably, even today, lifeguard employers discriminate against people with especially fair skin. Despite these reservations, Mr. Clinton's instinct is right. As the contents of the genome unfold, a vital principle must remain sacrosanct: Your genes belong to you. Your employer cannot ask to see them without your permission, nor can your insurer, nor the government. Genetic privacy is as vital a principle as other forms of private property. Unless people have confidence in the privacy of their genes, they will not take genetic tests, and they will thus forgo the benefits of new predictions, diagnoses and therapies. If we are allowed to keep our genetic test results secret, we will indeed create major problems for the insurance industry, as we rush out to buy policies for only the afflictions we are likely to get. But that is the industry's problem, not ours. It is a problem we can deal with while still protecting private genetic property. --Mr. Ridley is author, most recently, of "Genome: The Autobiography of a Species in 23 Chapters" (HarperCollins, 2000). Case eight: U.S. Seeks to Halt Employee DNA Tests Wall Street Journal February 12, 2001 WASHINGTON -- The U.S. Equal Employment Opportunity Commission is seeking to halt genetic testing of employees by Burlington Northern Santa Fe Railroad in a landmark lawsuit that could establish a precedent concerning the nascent but controversial practice. The suit, filed Friday in U.S. District Court for the Northern District of Iowa in Sioux City, seeks to halt what it described as a nationwide policy of requiring employees who have submitted claims of work-related carpal-tunnel syndrome, a repetitive-stress injury of the wrist, to provide blood samples for DNA tests. The suit alleges that the company's program violates employees' privacy rights and runs afoul of laws that prohibit discrimination against the disabled insofar as it links employment decisions with DNA testing. 21 The commission's action against the railroad, a unit of Burlington Northern Santa Fe Corp., of Fort Worth, Texas, is its first involving genetic testing. The suit alleges that employees weren't told of the DNA test or asked to consent to it, and that at least one individual who refused to provide a blood sample had been threatened with imminent discharge. The samples were used for a DNA test for Chromosome 17 deletion, which some claim predicts some forms of the disease, the agency said. The EEOC also asked the court to order the company to halt any disciplinary action or termination of the employee who refused to submit a blood sample. Burlington Northern spokesman Richard Russack said the company in some instances requested employees to undergo genetic tests "because there could be a predisposition within the body chemistry of the individual" to get carpal-tunnel syndrome "that had nothing to do with work." But he added that such tests aren't required, and there has been no disciplinary action or threat of such action against any worker who refused the tests. It's not clear how many employers are using genetic information when making hiring and firing decisions. But with progress in mapping the human genome and the development of genetic tests to determine predispositions for hundreds of diseases and disorders, concern is mounting that employers, to cut health-care costs, could seek to get rid of employees with predispositions for certain conditions. Reliance on such tests is controversial, and the law governing their use is unsettled. There are worries that workers subjected to such tests will face illegal discrimination and invasions of privacy. Moreover, "We don't know how accurate genetic tests are for predicting genetic conditions," said Vicky Whittemore, associate director of the Genetic Alliance, a Washingtonbased coalition of support groups for people with genetic disorders. The Clinton administration issued an executive order last February prohibiting federal agencies from discriminating against employees based on genetic information, and some two dozen states have passed similar measures. Congress hasn't taken action on genetic testing, though it's looking into the matter. The EEOC case could influence policy nationwide. "This is the first time the EEOC is assertively coming forward in the legal realm to challenge genetic testing," EEOC Chairwoman Ida Castro said. "It hopefully will begin to clarify this field and send an important message to the employer community as to what type of genetic testing and applications are unacceptable" under laws protecting against discrimination of disabled workers. The EEOC is looking into a handful of genetic-testing cases. While it doesn't comment on active cases unless they end up in litigation, the Genetic Alliance said the agency recently ruled against an employer in one mediation effort. In that case, Ms Whittemore said, a company fired an employee after learning that the employee had been diagnosed with Alpha-1, a genetic condition affecting the lungs, even though she hadn't developed any disabling symptoms. The EEOC has yet to mediate a settlement in the case, she said. In a survey by the American Management Association of more than 2,000 U.S. companies in March 2000, only seven said they performed genetic testing. But about 16% said they tested for "susceptibility to workplace hazards" -- testing that might not involve genetic tests -- and 18% said they asked about family medical history. 22 Credit: Staff Reporter of The Wall Street Journal Case nine: EEOC Settles Genetics Suit With Burlington Northern Wall Street Journal, April 19, 2001 WASHINGTON -- Burlington Northern Santa Fe Railroad settled the federal government's first lawsuit against workplace genetic testing, agreeing that it wouldn't conduct any more genetic tests on employees. Burlington Northern, Fort Worth, Texas, also agreed that it wouldn't analyze blood it had previously obtained; nor would it retaliate against employees who opposed the testing, the Equal Employment Opportunity Commission said. The commission filed the suit in February, alleging the railroad violated the Americans with Disabilities Act when it secretly tested 18 workers who had filed claims for carpal-tunnel syndrome. "Our swift action in this case allows Burlington Northern employees subjected to genetic testing to continue to work free of retaliation and future invasions of privacy," EEOC Chairwoman Ida Castro said in a statement. Burlington Northern had agreed in February to suspend testing. The commission must still resolve several charges of discrimination filed against the company, and said it may seek damages totaling as much as $300,000 per individual for more than two dozen workers who either were tested or penalized for refusing. Case ten: Burlington Northern Is Locked in Privacy Fight Wall Street Journal Copyright Dow Jones & Company Inc May 17, 2000 Full Text: Do you have a right of privacy for your Social Security number? How about your salary? A pair of lawsuits has put Burlington Northern Santa Fe Corp. uncomfortably at the center of a debate on these questions. In one case, the railroad giant is suing a company gadfly over his threat to post on his Web site the salaries and Social Security numbers of hundreds of its white-collar employees, including top executives. Publicizing salaries would damage employee morale, the railroad contends, and disseminating Social Security numbers could lead to credit-card fraud. But in a people-who-live-in-glass-houses twist, Burlington Northern itself faces a suit alleging that as part of an effort to crack down on overtime pay, the company publicized the salaries and Social Security numbers of about 300 blue-collar track workers. 23 The two suits highlight the dual character of Social Security numbers, which many Americans carry on their driver's licenses and write on their checks, but which also serve as a key piece of information that institutions require to unlock reams of personal information. Burlington Northern's problems began with an errant company e-mail. It landed on the screen of William Purdy, a former Burlington Northern locomotive engineer fired for insubordination in 1990. For much of the past decade, he has afflicted his ex-employer, criticizing its safety procedures and executive salaries. Mr. Purdy's main platform has been his Web site, BNSF.org. On March 12, an outside consultant to Burlington Northern mistakenly directed an e-mail to BNSF.org, instead of the company's official site, BNSF.com. The message had an attached file containing the names, salaries and Social Security numbers of about 800 railroad employees, all of which fell into the hands of an amazed Mr. Purdy. After learning that Mr. Purdy planned to put the information on the Internet, a number of employees and the railroad itself rushed to federal district court in St. Paul, Minn., to seek a judicial order stopping him. Paul Hoferer, general counsel of Burlington Northern's railroad operating unit, said in an affidavit filed with the suit that publicizing salaries "is likely to be detrimental to employee morale" and could "decrease productivity by distracting employees." Mr. Hoferer also cited concerns about identity theft if Social Security numbers were posted on the Internet. Relying on Minnesota tort law, under which individuals can be found liable for "publication of private facts," U.S. District Judge Donovan Frank issued a temporary restraining order prohibiting Mr. Purdy from posting the Social Security numbers. The ruling allowed Mr. Purdy to publish salaries, but only if they weren't linked to individual names. But on May 5, the Eighth U.S. Circuit Court of Appeals, without explaining its reasoning, set aside that ruling. Yesterday, Mr. Purdy posted what he said is the first digit of the Social Security number of Robert Krebs, Burlington Northern's chief executive. Additional digits will follow, he said, noting that his aim is to express his outrage at what he considers inappropriate company actions following train accidents. Burlington Northern, meanwhile, finds itself faced with allegations that it violated track workers' privacy rights by disseminating salaries and Social Security numbers. A suit filed in U.S. district court in Minneapolis on May 9 says the railroad distributed lists of the top 300 salaried workers in the track department as part of an effort to crack down on excess overtime. Gary Marquart, a longtime track worker for the railroad, says his overtime work in 1997 helped him earn just over $100,000 that year, landing him the No. 3 spot on the list. The information spread both inside and outside the company, including to his ex-wife, Mr. Marquart says. Steve Forsberg, a company spokesman, denies violating workers' privacy. The overtime list, he says, "was not meant to go outside the company." Credit: Staff Reporter of The Wall Street Journal 24 Case eleven: Source: The Business Review (Albany, NY), Oct 8, 2001 v28 i27 p19(1). Title: Workplace privacy: Balancing priorities. Author: Robin Wood Full Text COPYRIGHT 2001 Albany Business Journal, Inc. Earlier this year, the town of Colonie planned to install a video surveillance system at its landfill on Route 9. Joseph Stockbridge, the town's director of environmental services, said the cameras would be used to improve the waste screening process, fiscal management of the facility and site security. The 120-acre landfill is difficult to monitor, he said. Camera eyes could substitute for human eyes under certain circumstances. It seemed like a good plan. But many of the people working at the landfill thought otherwise. The plan "raised a lot of ire on the part of employees," Stockbridge said. Employees had questions about the camera system's purpose and who would have access to the tapes, he said. The system was not designed to check up on employees, Stockbridge said. But if people were caught doing something inappropriate, we weren't going to look away because a camera caught them rather than a supervisor, he said. Camera surveillance currently is on hold as the town reconsiders the program. But the main problem wasn't employee resistance; the bid for the project came back much higher than expected. Stockbridge said the town had estimated the nine-camera system would cost around $25,000, but the contractor said it would cost $130,000. Stockbridge still thinks the town can come up with a workable surveillance system, but wants employees to be on board. "We have good, trustworthy employees, I don't want to make this adversarial, he said. Increasingly, employers are having to make tough decisions balancing workplace security and privacy, said Joseph Masciocco, owner of Security Integrations Inc. in Albany. When companies consider video surveillance systems, employees often are concerned about privacy. But usually the systems are designed to protect workers, customers and property, he said. Cameras and other security measures, such as card-controlled doors, are becoming more common in many kinds of workplace environments, he said. People don't like the sense of being watched all the time, but many are increasingly willing to trade some privacy for a greater sense of security. "It is almost never the case that we are hearing that we have to keep an eye on people because they are not doing their jobs," Masciocco said. But the Internet and e-mail have created new workplace distractions and new privacy concerns for companies and workers. 25 Misuse of the Internet and e-mail can cost a business through reduced employee productivity, can facilitate the theft of trade secrets and proprietary information, and potentially expose the company to liability in sexual harassment cases, said Mike Popolizio, fraud division manager for Camelot Computer Forensics in Albany, which specializes in recreating how computers have been used, including recovering deleted or transferred files. Many companies don't put technology-use policies into place until there is a problem, Popolizio said. In some cases, companies would be "rudely surprised" to discover how much time employees are spending surfing the Internet or playing games. The technology exists to allow employers to track employee computer use very closely, Popolizo said. It is even possible to capture individual keystrokes. But in most cases, that kind of approach would be very expensive overkill. Simply having policies that restrict the use of company property to company business and letting employees know the company reserves the right to monitor computer use is an effective deterrent to misuse in many cases, he said. Privacy laws are still catching up to technological advances, said Andrew Rose, an attorney with the Albany office of Nixon Peabody LLP. For example, the courts are still working out how wiretap rules apply to e-mail, he said. But in New York state, employers have pretty broad rights to control and monitor their own property, including computer systems, Rose said. Effectively, when people go to work, they give up some of their privacy rights, he said. 26