Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices © 2010 Mudd Law Offices Overview Trends in Workplace Surveillance Highlights of Applicable Law More Common Surveillance Issues Arbitration - Lessons Learned Policy Guidelines Novel Circumstances © 2010 Mudd Law Offices Trends in Workplace Surveillance 1997 13.7% of employers monitored computer files 14.9% of employers monitored e-mail Data obtained from the American Management Association © 2010 Mudd Law Offices Trends in Workplace Surveillance (cont’d) 2007 43% of employers monitored computer files 43% of employers monitored e-mail Data obtained from the American Management Association © 2010 Mudd Law Offices Trends in Workplace Surveillance (cont’d) ADDITIONAL STATISTICS 66% of employers monitor Internet connections 12% of employers monitor blogs for comments on company 10% monitor social networking sites 8% use GPS to track company vehicles American Management Association DATA © 2010 Mudd Law Offices Trends in Workplace Surveillance (cont’d) The Privacy Foundation reports that of those employees "who regularly use e-mail or Internet access at work," fourteen million "are under 'continuous' surveillance ... for their Internet access or e-mail usage." © 2010 Mudd Law Offices Trends in Workplace Surveillance (cont’d) For a myriad of reasons… the monitoring of employee activity and conduct by employers through electronic surveillance in the workplace …will continue to increase. © 2010 Mudd Law Offices Protecting Employers … and Employees With increasing prevalence of workplace surveillance Employers Must Be Advised Properly… … in Advance of Implementation © 2010 Mudd Law Offices Highlights of Applicable Law United States Supreme Court Federal Statutes State Statutes Common Law © 2010 Mudd Law Offices United States Supreme Court O'Connor v. Ortega 480 U.S. 709, 107 S. Ct. 1492 (1987) While investigating alleged impropriety, public employers broke into employee’s office, desk, and file cabinet Court determined neither party entitled to summary judgment and affirmed in part and reversed in part ….HOWEVER…. © 2010 Mudd Law Offices Supreme Court (cont’d) Ortega helped establish: Analytical Process in Workplace Privacy: Expectation of privacy? Reasonableness of search at inception? Reasonableness of search in scope? © 2010 Mudd Law Offices Supreme Court (cont’d) For legitimate work-related, non-investigatory intrusions as well as investigations of work-related misconduct, a standard of reasonableness is used. © 2010 Mudd Law Offices Supreme Court (cont’d) City of Ontario v. Quon 177 L. Ed. 2d 216 (U.S. 2010) The review of transcripts of employee text messages held to be reasonable given that legitimate non-investigatory reasons prompted the review. (to determine whether the character limit on the city's contract was sufficient to meet the city's needs) © 2010 Mudd Law Offices Supreme Court (cont’d) Principles arising from and reaffirmed in Quon: 1. special needs of workplace is an exception to Fourth Amendment warrant requirement 2. “the extent of an expectation [of privacy] is relevant to assessing whether the search was too intrusive” © 2010 Mudd Law Offices Supreme Court (cont’d) Note: Utah equivalent of Fourth Amendment Utah Constitution, Art I., § 14 © 2010 Mudd Law Offices Federal Statutes Primarily…. Electronic Communications Privacy Act Stored Communications Act Computer Fraud and Abuse Act © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. § 2511, criminalizes Intentional interception of oral, wire or electronic communication Discloses Uses © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. Question: What is interception (……still debated…..) Question: What is electronic communication? United States v. Councilman, 418 F.3d 67 (1st Cir. Mass. 2005) United States v. Szymuszkiewicz, 2009 U.S. Dist. LEXIS 60755 (E.D. Wis. June 30, 2009) © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. Civil Remedies generally any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. Relief Preliminary, declaratory and other equitable reasonable attorney’s fee and costs Damages, either (a) actual plus profits OR (b) statutory ($100/day or $10,000) 18 U.S.C. § 2520 © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. Employers cannot: use any devices to intercept wire, oral, or electronic communication. Use or disclose any information obtained through these methods Disclose or obtain unauthorized access to stored communications. Three Exceptions….. © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. Employers cannot: use any devices to intercept wire, oral, or electronic communication. Use or disclose any information obtained through these methods Disclose or obtain unauthorized access to stored communications. Three Exceptions….. © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. THREE EXCEPTIONS If one party has given prior consent. Business extension exception – Certain interceptions are OK in the ordinary course of business. Provider exceptions – Certain interceptions OK on internal communications systems. © 2010 Mudd Law Offices Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. Consent: requires only that one party to the communication consent to its interception and access (but be wary of stricter statutes) Providers: employers who own and provide their own e-mail or instant message systems are exempt Not applicable if the interception occurs in the “ordinary course of business.” © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) whoever-(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; AND….. © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished . . . © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) (REMEMBER - CRIMINAL STATUTES) Civil Remedy Very similar to ECPA except minimum statutory of $1,000 Punitive if willful determination 18 U.S.C. § 2707 © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) 18 U.S.C. § 2702 Providers generally cannot disclose contents of communications except in certain instances © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) General Thoughts Harsher penalties when done for malicious purposes or commercial advantage Certain permission creates exceptions © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) General Thoughts Provides exception for “the person or entity providing a wire or electronic communications service.” Thus, courts have been favorable to employers when emails occur on employer-created e-mail servers. BUT BE WARY…..MISPERCEPTION © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) City of Ontario, California v. Quon, et al. SCA Question: In storing texts, was Arch Wireless acting as a “remote computing service” or an “electronic communication service”? If remote computing service, it could disclose, as subscriber was the City employer. © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) City of Ontario, California v. Quon, et al. SCA Question: If electronic communication service, it could not disclose because the City was not an “originator or an addressee or intended recipient of such communication.” This is what Ninth Circuit concluded. © 2010 Mudd Law Offices Stored Communications Act (18 U.S.C. § 2701) Impact of Quon on Use of Employer Devices by Employees will continue…. © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) Prevents Unauthorized Access or Exceeding Authorized Access to Computers in Variety Contexts - National Security Financial Information Information from Government Protected Computer © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) Protected Computer Financial Institution or related Interstate or Foreign Commerce 18 U.S.C. § 1030(e)(2) © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) Protected Computer …… and Causes Damage © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) Civil Remedy provision 18 U.S.C. § 1030(g) Anyone harmed BUT…. © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) One of five types of damage Most Common (I) loss to 1 or more persons during any 1-year period (and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers) aggregating at least $5,000 in value; © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) Also: affecting medical examination, diagnosis, treatment, or care physical injury to any person; a threat to public health or safety; damage affecting a computer used by or for an entity of US © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) Must be Unauthorized Access Exceeding Authorized Access Key Question…. © 2010 Mudd Law Offices Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) Snap-on Business Solutions Inc. v. O'Neil & Assocs., Inc. (N.D. Ohio April 16, 2010) (Examined Agreements, question of fact denied MSJ) LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009) (access not automatically unauthorized if disloyal) International Airport Centers, LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006) (employee who violates duty of loyalty, no authorization) US v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009) (violation of TOS not enough) © 2010 Mudd Law Offices State Statutes Utah Offenses Against Privacy 76-9-403 Privacy Abuse 76-9-403 Communications Abuse Interception of Communications Act 77-23a-1, et seq. Access to Electronic Communications 77-23b-1, et seq. © 2010 Mudd Law Offices Utah 76-9-402. Privacy Violation (1)A person is guilty of privacy violation if, except as authorized by law, he: (a)Trespasses on property with intent to subject anyone to eavesdropping or other surveillance in a private place; or © 2010 Mudd Law Offices Utah 76-9-402. Privacy Violation (1)A person is guilty of privacy violation if, except as authorized by law, he: (b) Installs in any private place, without the consent of the person or persons entitled to privacy there, any device for observing, photographing, recording, amplifying, or broadcasting sounds or events in the place or uses any such unauthorized installation; or © 2010 Mudd Law Offices Utah 76-9-402. Privacy Violation (1)A person is guilty of privacy violation if, except as authorized by law, he: (c) Installs or uses outside of a private place any device for hearing, recording, amplifying, or broadcasting sounds originating in the place which would not ordinarily be audible or comprehensible outside, without the consent of the person or persons entitled to privacy there. © 2010 Mudd Law Offices Utah 76-9-403. Communication abuse (1) A person commits communication abuse if, except as authorized by law, he: (a) Intercepts, without the consent of the sender or receiver, a message by telephone, telegraph, letter, or other means of communicating privately; [Illinois legislation] © 2010 Mudd Law Offices Utah 76-9-403. Communication abuse [the foregoing paragraph] does not extend to: (i) Overhearing of messages through a regularly installed instrument on a telephone party line or on an extension; or (ii) Interception by the telephone company or subscriber incident to enforcement of regulations limiting use of the facilities or to other normal operation and use; or © 2010 Mudd Law Offices Utah 76-9-403. Communication abuse (b) Divulges without consent of the sender or receiver the existence or contents of any such message if the actor knows that the message was illegally intercepted or if he learned of the message in the course of employment with an agency engaged in transmitting it. (2)Communication abuse is a class B misdemeanor. © 2010 Mudd Law Offices Utah 76-9-401. Definitions (1) "Private place" means a place where one may reasonably expect to be safe from casual or hostile intrusion or surveillance. (2) "Eavesdrop" means to overhear, record, amplify, or transmit any part of a wire or oral communication of others without the consent of at least one party thereto by means of any electronic, mechanical, or other device. (3) "Public" includes any professional or social group of which the victim of a defamation is a member. © 2010 Mudd Law Offices Utah 76-9-401. Definitions (1) "Private place" means a place where one may reasonably expect to be safe from casual or hostile intrusion or surveillance. (2) "Eavesdrop" means to overhear, record, amplify, or transmit any part of a wire or oral communication of others without the consent of at least one party thereto by means of any electronic, mechanical, or other device. (3) "Public" includes any professional or social group of which the victim of a defamation is a member. © 2010 Mudd Law Offices Interception of Communications Act 77-23a-1, et seq. Akin to the ECPA © 2010 Mudd Law Offices Access to Electronic Communications 77-23b-1, et seq. Akin to the SCA © 2010 Mudd Law Offices Common Law Privacy Torts Utah Intrusion Upon Seclusion Public Disclosure of Embarrassing Private Facts Misappropriation of Name or Likeness False Light in Public Eye © 2010 Mudd Law Offices Common Law Utah Intrusion Upon Seclusion (1) 'an intentional substantial intrusion upon the solitude or seclusion of the complaining party,’ (2) the intrusion 'would be highly offensive to the reasonable person.'" © 2010 Mudd Law Offices Common Law Utah - Intrusion Upon Seclusion Physical intrusion not required “As the Utah courts explained, although a physical intrusion may not always be necessary, ‘there must be something in the nature of prying or intrusion.’” Barker v. Manti Tel. Co., 2009 U.S. Dist. LEXIS 819 (D. Utah Jan. 6, 2009) © 2010 Mudd Law Offices Common Law Utah - Intrusion Upon Seclusion Publicity Not Required “Thus, it is that affirmative physical intrusion, eavesdropping, investigation, examination or prying that constitutes the tort, not any subsequent sharing of the information learned in an intrusion.” Barker v. Manti Tel. Co., 2009 U.S. Dist. LEXIS 819 (D. Utah Jan. 6, 2009) © 2010 Mudd Law Offices Common Law Intrusion Upon Seclusion requires that the complainant have a reasonable expectation of privacy and that any violation of that expectation be highly offensive. Typically, courts find that employees meet neither requirement. © 2010 Mudd Law Offices Common Law Intrusion Upon Seclusion - General Observations Any employer policy that notifies an employee that there is no expectation of privacy is likely to be sufficient. Judges rarely find that systematic measures taken by a business to protect its interests to be offensive. Courts rarely find that the degree of intrusion outweighs the interest of an employer. © 2010 Mudd Law Offices More Common Surveillance Issues © 2010 Mudd Law Offices Email Monitoring - ECPA Emails considered “communications” by the ECPA Steve Jackson Games, Inc. v. United States Secret Service 816 F. Supp. 432 (W.D.Tex. 1993), aff'd, 36 F.3d 457 (5th Cir. 1994) Reading and deleting messages stored on employee’s computer was not an interception under the Wiretap Act. Generally, for an employee to sue under the ECPA, the email must be intercepted while being transferred © 2010 Mudd Law Offices Email Monitoring - SCA Provides exception for “the person or entity providing a wire or electronic communications service.” A court has held that employers whose computer terminals and software were integral in the communications systems fell under this exception Many other cases have also allowed access under this theory © 2010 Mudd Law Offices Email Monitoring - Common Law One MA case allowed invasion of privacy claim to go forward where Employees could choose own passwords, no policy against personal emails, and the supervisor spent 8 hours reading through emails Most challenges have not been successful © 2010 Mudd Law Offices Email Monitoring - Cases Thygeson v. Bancorp The court denied claim holding that "when, as here, an employer accesses its own computer network and has an explicit policy banning personal use of office computers and permitting monitoring, an employee has no reasonable expectation of privacy.” 2004 U.S. Dist. LEXIS 18863, 2004 WL 2066746 at *21 (D. Or. Sept. 15, 2004) © 2010 Mudd Law Offices Email Monitoring - Cases Recently cited in Idaho case Alamar Ranch, LLC v. County of Boise, 2009 U.S. Dist. LEXIS 101866 (D. Idaho Nov. 2, 2009) In discussion of attorney-client privilege, also citing Kaufman v. SunGard Invest. Sys., 2006 U.S. Dist. LEXIS 28149 (D.N.J. May 9, 2006) Where attorney-client privilege lost . . . © 2010 Mudd Law Offices Email Monitoring - Cases Where attorney-client privilege lost . . . because the company policy clearly informed employees that emails would be "subject to monitoring, search or interception at any time . . . ." © 2010 Mudd Law Offices Email Monitoring - Cases Smyth v. Pillsbury Co., 914 F. Supp. 97, 101 (E.D. Pa. 1996) The Court concluded that an employee did not have a reasonable expectation of privacy in a company's email system despite company assurances that e-mails would "remain confidential and privileged.” © 2010 Mudd Law Offices Email Monitoring - Cases Smyth v. Pillsbury Co., 914 F. Supp. 97, 101 (E.D. Pa. 1996) “Once plaintiff communicated the alleged unprofessional comments to a second person (his supervisor) over an e-mail system which was apparently utilized by the entire company, any reasonable expectation of privacy was lost.” © 2010 Mudd Law Offices Email Monitoring - Email Cases Cole v. Zavaras, 349 Fed. Appx. 328 (10th Cir. Colo. 2009) (approving conclusion by district court that no legal authority exists for the proposition that there is a reasonable expectation of privacy in e-mails sent to a stranger over the Internet, or that the person to whom the e-mails are directed may not disclose them) © 2010 Mudd Law Offices Email Monitoring - Email Cases United States v. Perrine 518 F.3d 1196 (10th Cir. Kan. 2008) citing a number of cases regarding privacy of subscriber information and… United States v. Lifshitz, 369 F.3d 173, 190 (2d Cir. 2004) ("Individuals generally possess a reasonable expectation of privacy in their home computers. . . . They may not, however, enjoy such an expectation of privacy in transmissions over the Internet or e-mail that have already arrived at the recipient."). © 2010 Mudd Law Offices Email Monitoring - Other Considerations Can be used as evidence in cases Inappropriate emails could be harassment in and of themselves. National Labor Review Board If employees are unionized, the bargaining agreement may restrict an employer’s ability to monitor email. © 2010 Mudd Law Offices Instant Messaging Same basic legal rules apply as apply to e-mails. Especially if the IM service is provided by the employer. Difference if using AOL, Google, or MSN programs: Higher expectation of privacy, but this can be reduced through policies © 2010 Mudd Law Offices Instant Messaging Best option is to address IMs within policy that discusses email and other communications How/when/why IM-ing is allowed Clearly notify employees if there is a policy of storing or reviewing instant messages. © 2010 Mudd Law Offices Monitoring Web Usage Not a “communication” under ECPA, making it easy to regulate. If an employee wants to challenge monitoring of Internet usage, it must be done under common law Likely “intrusion upon seclusion” invasion of privacy. Not much case law on this. Typically hard to claim, especially if logged on to an employer’s network or if an employer’s written policy is in use. © 2010 Mudd Law Offices Monitoring Web Usage Still grounds that have not fully been covered Logging in from a remote location (home computer, for example) One search was ok in CA appeals because the computer was issued by work and employee signed an electronic equipment policy establishing no expectation of privacy. © 2010 Mudd Law Offices Monitoring Web Usage Still grounds that have not fully been covered Obligation to third parties to monitor and stop inappropriate online action that could harm third parties? © 2010 Mudd Law Offices Blogging Statutory concerns Blog-related discipline may not be used to retaliate against the employee’s statutory rights. If an employer's behavior has a disparate impact upon a protected class of employees, or employees are treated differently, i.e. subjected to disparate treatment, Title VII of the Civil Rights Act is applicable © 2010 Mudd Law Offices Blogging Statutory concerns Whistle blowing or discussing terms of employment are protected. Blogs advocating employee activity to improve terms and conditions of employment might also be protected under the National Labor Relations Act. © 2010 Mudd Law Offices Blogging Common solution: Have an employee blogging policy May not be able to limit off-duty blogging Limit blogging on company equipment If employees note themselves as employees on the blog, require a disclaimer Prohibit mentioning clients, customers, etc without their consent Notify of any practice of monitoring blogs. © 2010 Mudd Law Offices Blogging It is difficult to prevail under a tort theory of privacy since blogs are posted online for anyone to view. Thus absent any federal or state statutory protections, employers can terminate, at will, employees whose blogs they dislike. © 2010 Mudd Law Offices Blogging Termination Examples A former Delta Airlines flight attendant says she was terminated for her blog, Diary of A Flight Attendant. Posing in her Delta uniform in an empty plane, Ellen Simonetti says she was terminated for placing "inappropriate" pictures on the Web. © 2010 Mudd Law Offices Blogging Termination Examples Michael Hanscom, a temporary Microsoft employee, was fired in 2003 by Microsoft for photos posted on his blog, eclecticism. At the site, Hanscom took a picture of several Apple G5 notebooks being unloaded on a loading dock © 2010 Mudd Law Offices Blogging Termination Examples A high profile Washington, D.C. blogging termination involved Jessica Cutler, then a staff assistant to Senator Mike DeWine. Cutler was terminated after blogging about her sexual exploits with various Washington politicians. Jessica was terminated for "misusing an office computer. © 2010 Mudd Law Offices Arbitration - Lessons Learned © 2010 Mudd Law Offices Arbitration Development Union guidelines brought arbitration into the field of employee surveillance. Present day labor arbitrators have confronted issues with employee surveillance and technological developments. This method is being relied on more heavily as the disputes become more frequent. © 2010 Mudd Law Offices Arbitration - Lessons Learned Suggested Guidelines Right to affirmatively refuse monitoring; Notice of monitoring; Notice of the particulars of the monitoring; Notice of infractions related to the use of new technology; © 2010 Mudd Law Offices Arbitration - Lessons Learned Suggested Guidelines Notice of resulting discipline for those infractions; Consistent enforcement of policies relating to technology; Confidential review of information discovered through monitoring; © 2010 Mudd Law Offices Arbitration - Lessons Learned Suggested Guidelines Limited collection of information through technological monitoring; Reasonable suspicion of an infraction before monitoring; © 2010 Mudd Law Offices Arbitration - Lessons Learned Suggested Guidelines Assessment of the accuracy and reliability of the information produced by the monitoring; Compensation for a violation of privacy; and Restrictions on discipline imposed based on information gathered as a result of monitoring. © 2010 Mudd Law Offices Arbitration - Lessons Learned Monitoring Personal Use of Computers Forbidding personal use is out of sync with modern workplace reality © 2010 Mudd Law Offices Arbitration - Lessons Learned Monitoring Personal Use of Computers Right to Privacy When Using Computer for Personal Reasons Some arbitrators - employees have a right to privacy in their computer usage. Others - e-mails are not private unless employer policy explicitly says so. Many employees believe their communications will be private and if viewed, they would not be disciplined for their contents. © 2010 Mudd Law Offices Arbitration - Lessons Learned Monitoring Personal Use of Company Computers Nonetheless…..Some Uses Can Be Prohibited An employer has a legitimate business interest in prohibiting certain computer uses that are likely to negatively impact the business or workplace. © 2010 Mudd Law Offices Arbitration - Lessons Learned Monitoring Personal Use of Company Computers Nonetheless…..Some Uses Can Be Permitted Illegal conduct…. downloading images of child pornography © 2010 Mudd Law Offices Arbitration - Lessons Learned Monitoring Personal Use of Company Computers Nonetheless…..Some Uses Can Be Permitted Illegal conduct…. defamatory communication © 2010 Mudd Law Offices Arbitration - Lessons Learned Monitoring Personal Use of Company Computers Nonetheless…..Some Uses Can Be Permitted Illegal conduct…. offensive images of a racial or sexual nature, or that result in racial or sexual harassment © 2010 Mudd Law Offices Arbitration - Lessons Learned Notice of Use Provides an important safeguard for employees' right to privacy Does Not Interfere With Ability to Monitor © 2010 Mudd Law Offices Arbitration - Lessons Learned Surreptitious Surveillance, when is it appropriate? Documentary evidence obtained through a nonconsensual search is appropriate "so long as the methods employed are not excessively shocking to the conscience of a reasonable person....” Another case suggests that surreptitious monitoring is appropriate when there is a known violation but no knowledge of who has engaged in the violation. © 2010 Mudd Law Offices Arbitration - Lessons Learned Surreptitious Surveillance, when is it appropriate? When there is a reasonable suspicion that a violation of company policy has taken place. © 2010 Mudd Law Offices Arbitration - Lessons Learned Surreptitious Surveillance, when is it appropriate? Employers should give notice: Type of conduct that will constitute an infraction and the level of discipline for each infraction. Monitoring will take place when the employer has a reasonable suspicion of an infraction. Monitoring system that will be used. © 2010 Mudd Law Offices Policy Guidelines We have discussed various items for a policy…. ….presumes the need for a policy. © 2010 Mudd Law Offices Novel Issues © 2010 Mudd Law Offices Novel Issues - Text Messages/Smart Phones City of Ontario v. Quon United States Supreme Court (2010) © 2010 Mudd Law Offices Novel Issues - Video Surveillance Hernandez v. Hillsides, Inc., Supreme Court of California (2009) Secret camera placed in an office shared by 2 female employees without notice to them. Intended to find identity of person using their office after closing to view pornographic materials. The camera was not operated during business hours and plaintiffs' activities were not viewed or recorded © 2010 Mudd Law Offices Novel Issues - Video Surveillance Hernandez v. Hillsides, Inc., Supreme Court of California (2009) Reasoning Expectation of privacy? Yes. Less because the office is shared. Reasonableness in inception and in scope? Actual surveillance was drastically limited in nature and scope, exempting plaintiffs from its reach, and defendants were motivated by strong countervailing concerns. © 2010 Mudd Law Offices Novel Issues - Phone Surveillance Narducci v. Moore (7th Cir. 2009) Defendants worried about threats from residents to finance officials (calls usually due to residents not paying utility bills) and about employees making personal calls on village time and using village phones. No calls were ever actually reviewed © 2010 Mudd Law Offices Novel Issues - Phone Surveillance (cont’d) Narducci v. Moore (7th Cir. 2009) Rule for justifiable at inception: When there are reasonable grounds for suspecting that the search will turn up evidence that the employee is guilty of work-related misconduct, or that the search is necessary for a non-investigatory work-related purpose. Rule for justifiable in scope: So long as "the measures taken by the employer are reasonably related to the search's objective and they are not overly intrusive in light of the nature of the alleged misconduct." © 2010 Mudd Law Offices Novel Issues - Drug Free Workplace Act 41 USC § 701 Only applied to employers who meet qualifications Must provide notice that drugs are not allowed. Also must note counseling, rehab, etc. for recovery options. © 2010 Mudd Law Offices Novel Issues - Title VI of Civil Rights Act No-dating policies have been challenged as sex discrimination. Dress codes may result in religious discrimination. © 2010 Mudd Law Offices Novel Issues - Smoker’s Rights Most states have laws that prohibit employers from making employment decisions based on lawful, out of work activities (marital status, lifestyle, appearance) Approximately thirty states protect against discipline for smoking off-duty and away from the employer's premises © 2010 Mudd Law Offices Novel Issues - Pen Registers/Trap & Trace 18 USCS § 3121 Need a court issued warrant. Exceptions: relating to the operation, maintenance, and testing of a wire or electronic communication service or to the protection of the rights or property of such provider, or to the protection of users of that service from abuse of service or unlawful use of service; or © 2010 Mudd Law Offices Novel Issues - Pen Registers/Trap & Trace 18 USCS § 3121 Need a court issued warrant. Exceptions: to record the fact that a wire or electronic communication was initiated or completed in order to protect such provider, another provider furnishing service toward the completion of the wire communication, or a user of that service, from fraudulent, unlawful or abusive use of service; or © 2010 Mudd Law Offices Novel Issues - Pen Registers/Trap & Trace 18 USCS § 3121 Need a court issued warrant. Exceptions: where the consent of the user of that service has been obtained © 2010 Mudd Law Offices Charles Lee Mudd Jr. Mudd Law Offices Park City Office Chicago Office 311 Main Street Second Floor P.O. Box 483 Park City, Utah 84060 435.640.1786 Telephone 435.603.1035 Facsimile cmudd@muddlawoffices.com 3114 West Irving Park Road Suite 1W Chicago, Illinois 60618 773.588.5410 Telephone 773.588.5440 Facsimile cmudd@muddlawoffices.com © 2010 Mudd Law Offices