SlideShare a Scribd company logo
1 of 31
Understanding Privacy in the
Workplace
Presented by Brittany Cullison, PHR
December 1, 2011
Important Notice
• I am not an attorney.
• This is not a substitute for experienced
legal counsel.
• This is not legal advice.
What to expect
• Laws that govern privacy in the workplace
• What employers can monitor-- and the
right way to do it
• Employer’s obligations to protect
employee’s private information—and best
practice guidelines
What governs privacy in the
workplace?
• Fourth Amendment
– Not applicable for private employees, but
offers protection in some cases for public
employees
• Electronic Communications Privacy Act
– Governs the monitoring and recording of
employee electronic communications
What governs privacy in the
workplace?
• FCRA and FACTA
– Promotes confidentiality, accuracy, relevancy,
and proper use of that information
• EPPA
– Prevents use of lie detectors in employment
practices
What governs privacy in the
workplace?
• ADA and FMLA
– Recordkeeping and confidentiality of employee
medical information
• HIPAA
– Privacy of personally identifiable health
information
• GINA
– Restricts employers from acquiring and
disclosing employee genetic information
What governs privacy in the
workplace?
• Identity theft laws
– Federal and state level
• Common Law
• Contractual Privacy Claims
Employer Rights
• Electronic Monitoring
– Computers
– Emails
– Internet Usage- Social Media
– Telephone
• Video Surveillance
• Workplace Searches
Electronic Monitoring:
Computers
• Company issued computers
– Employers can monitor
– Should have clear policy that dissolves any
expectation of privacy
• “Personal” files, password protected documents
• Personal Computer used for Work
– May be subject to discovery in litigation, but
typically only if subpoenaed
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring: Emails
• Stored Communications Act
– Established in 1986
– Title II of the ECPA
– Prohibits unauthorized access to electronic
communications stored on a third party site
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring:
Internet
• Internet usage on company device
– Employers can monitor
– Should have a written policy
• Social Networking
– Public vs. private
– Use caution when disciplining an employee for
disparaging comments found
– Section 7 of NLRA- applies to union and non-
union
Electronic Monitoring:
Internet
• Social Networking
– If someone has access, they can share access
– Should have a written Social Media policy
Electronic Monitoring:
Telephones
• Business telephones
– May be monitored when:
• employee has given consent or
• “Business Extension” exemption
– Personal calls on business phones cannot be
monitored
• Company issued cell phones
– Should have a policy that dissolves expectation
of privacy
– Searches, reviews, and monitoring should be
done only for legitimate, business purposes
Video Surveillance
• Acceptable in open and public work areas
• If recording audio, must comply with ECPA
• Limit access to the recorded material to
designated management
Workplace Searches
• Reasonable expectation of privacy
– Company property vs. Employee Property
– Written policy
• Justified Search
– Reasonable suspicion
– Violation of another company policy
• Drug and Alcohol Policy
• Weapons in the Workplace
• Confidentiality
Workplace Searches
• Reasonableness
– Discretion
– Other investigatory methods exhausted
– Appropriate scope
• Never force an employee to submit to
search
• Have another witness present during a
search
Employer Responsibilities
• Identify Theft Prevention
– Policy, Procedure and Training
• Confidentiality of Medical Information
• Additional confidentiality and
recordkeeping practices
• Clearly communicate workplace
monitoring policies
• Train employees and managers
ID Theft Prevention
• Evaluate information security and disposal
– How easy is it for someone to access your
office during business hours?
– How long documents stay at the printer
before some one retrieves them?
– Are documents that contain personal
information left out unattended?
– Are computer screens being locked every
time someone leaves there desk?
ID Theft Prevention
• Are cabinets and drawers being locked?
• Are emails that contain personal
information being sent securely?
• Are documents properly shredded when
no longer needed?
• Who in the office has access to sensitive
information?
ID Theft Prevention
• Develop a protection plan
– Conduct a “walk through”
– Identify potential risks
– Create easy to follow guidelines and procedures
• Educate your employees
– The importance of protecting personal
information.
– Measure that the company will take to began
this process.
– How the will be enforced.
ID Theft Prevention
• Have a Breach Plan
– Notify employee, law enforcement and possibly
FTC
– Notify credit bureaus
– Conduct internal investigation
– Take steps to minimize or prevent additional
loss
Confidentiality of Medical
Information
• Do not request medical exam or make
inquiry unless employee poses direct
threat or it’s job related and consistent
with business necessity
• Medical information should be kept
confidential and in separate file
– FMLA certifications
– Worker’s Comp reports
– Medical exam results
– HIPAA regulated documents, if applicable
Confidentiality of Medical
Information
• Train supervisors on how to respond
• Educate employees on what is appropriate
to disclose in the workplace
Additional Confidential
Recordkeeping
• Consumer Reports
– Reports must be disposed of properly under
FACTA
• Investigations
– Confidential to protect witnesses and accuser
Policies
• Electronic Monitoring
– Define system covered
– Business-use only
– Discuss prohibited use
– Explain consequences
– Inform of employers’ right to monitor
• Telephone Monitoring
– Define purpose of monitoring
– Discuss calls that appear to be personal
Policies
• Social Media
– Define what social media is
– Apply it to business and personal
– Compare to other policies
• Workplace Searches
– Define purpose and search areas
– Ensure that a search is not an accusation
– Refusal may lead to disciplinary action or termination
Summary
• Privacy in the workplace is a combination
of employer rights and employer
responsibilities
• The key to monitoring employees is to
dissolve the expectation of privacy
• Employee information protection is in the
hands of HR
Questions?
Brittany Cullison, PHR
713-784-1181
bcullison@gnapartners.com
www.gnapartners.com
Resources
www.shrm.com
www.hrlaws.com
www.twc.state.tx.us
www.prospera.com

More Related Content

What's hot

What's hot (20)

Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
Privacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and SurveillancePrivacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and Surveillance
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
Privacy in cyberspace
Privacy in cyberspacePrivacy in cyberspace
Privacy in cyberspace
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
Data protection
Data protectionData protection
Data protection
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Fraud embezzlement
Fraud embezzlementFraud embezzlement
Fraud embezzlement
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and Communications
 
Hippa
HippaHippa
Hippa
 

Viewers also liked

Mock interview training
Mock interview trainingMock interview training
Mock interview training
Nikita Pande
 
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com..."Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
Sarah Robbins
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreement
ruelcdogma
 
Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520
jo bitonio
 
Top 9 mock interview questions answers
Top 9 mock interview questions answersTop 9 mock interview questions answers
Top 9 mock interview questions answers
hudsons168
 

Viewers also liked (20)

6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent
 
Working safely powerpoint_presentation
Working safely powerpoint_presentationWorking safely powerpoint_presentation
Working safely powerpoint_presentation
 
Privacy at workplace
Privacy at workplacePrivacy at workplace
Privacy at workplace
 
IIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development PortfolioIIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development Portfolio
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
HIPAA
HIPAAHIPAA
HIPAA
 
Mock interview training
Mock interview trainingMock interview training
Mock interview training
 
Mba Mock interview
Mba  Mock interviewMba  Mock interview
Mba Mock interview
 
Safety quiz
Safety quizSafety quiz
Safety quiz
 
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com..."Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreement
 
Quiz warehouse safety
Quiz warehouse safetyQuiz warehouse safety
Quiz warehouse safety
 
Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520
 
10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know
 
Health and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom pptHealth and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom ppt
 
Top 9 mock interview questions answers
Top 9 mock interview questions answersTop 9 mock interview questions answers
Top 9 mock interview questions answers
 
Mock interview tips
Mock interview tipsMock interview tips
Mock interview tips
 
Memorandum Of Agreement Sample
Memorandum Of Agreement SampleMemorandum Of Agreement Sample
Memorandum Of Agreement Sample
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentation
 
Portfolio Analysis
Portfolio AnalysisPortfolio Analysis
Portfolio Analysis
 

Similar to Understanding employee privacy

3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
CFG
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014
Rachel Aldighieri
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
kclcompbio
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awareness
itchomecare
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014
Rachel Aldighieri
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
Asad Zaman
 

Similar to Understanding employee privacy (20)

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awareness
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Data Protection and IDEA
Data Protection and IDEAData Protection and IDEA
Data Protection and IDEA
 

More from G&A Partners

More from G&A Partners (20)

G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring ProcessG&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
 
What's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and BeyondWhat's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and Beyond
 
How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace
 
Helping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life BalanceHelping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life Balance
 
G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016 G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016
 
Fundamentals of FMLA
Fundamentals of FMLAFundamentals of FMLA
Fundamentals of FMLA
 
Breaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee BurnoutBreaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee Burnout
 
Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016
 
Setting & Discussing Performance Goals
Setting & Discussing Performance GoalsSetting & Discussing Performance Goals
Setting & Discussing Performance Goals
 
Best Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and TerminationsBest Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and Terminations
 
Building an effective safety culture edits
Building an effective safety culture editsBuilding an effective safety culture edits
Building an effective safety culture edits
 
Performance Appraisals Webinar
Performance Appraisals WebinarPerformance Appraisals Webinar
Performance Appraisals Webinar
 
Recruitment Process Outsourcing Webinar
Recruitment Process Outsourcing WebinarRecruitment Process Outsourcing Webinar
Recruitment Process Outsourcing Webinar
 
Labor and Employment Law 2015
Labor and Employment Law 2015Labor and Employment Law 2015
Labor and Employment Law 2015
 
G&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplaceG&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplace
 
Professional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival HighProfessional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival High
 
Feb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perrettaFeb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perretta
 
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance LawsAvoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
 
Hr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jllHr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jll
 
Whitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOsWhitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOs
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Understanding employee privacy

  • 1. Understanding Privacy in the Workplace Presented by Brittany Cullison, PHR December 1, 2011
  • 2. Important Notice • I am not an attorney. • This is not a substitute for experienced legal counsel. • This is not legal advice.
  • 3. What to expect • Laws that govern privacy in the workplace • What employers can monitor-- and the right way to do it • Employer’s obligations to protect employee’s private information—and best practice guidelines
  • 4. What governs privacy in the workplace? • Fourth Amendment – Not applicable for private employees, but offers protection in some cases for public employees • Electronic Communications Privacy Act – Governs the monitoring and recording of employee electronic communications
  • 5. What governs privacy in the workplace? • FCRA and FACTA – Promotes confidentiality, accuracy, relevancy, and proper use of that information • EPPA – Prevents use of lie detectors in employment practices
  • 6. What governs privacy in the workplace? • ADA and FMLA – Recordkeeping and confidentiality of employee medical information • HIPAA – Privacy of personally identifiable health information • GINA – Restricts employers from acquiring and disclosing employee genetic information
  • 7. What governs privacy in the workplace? • Identity theft laws – Federal and state level • Common Law • Contractual Privacy Claims
  • 8. Employer Rights • Electronic Monitoring – Computers – Emails – Internet Usage- Social Media – Telephone • Video Surveillance • Workplace Searches
  • 9. Electronic Monitoring: Computers • Company issued computers – Employers can monitor – Should have clear policy that dissolves any expectation of privacy • “Personal” files, password protected documents • Personal Computer used for Work – May be subject to discovery in litigation, but typically only if subpoenaed
  • 10. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 11. Electronic Monitoring: Emails • Stored Communications Act – Established in 1986 – Title II of the ECPA – Prohibits unauthorized access to electronic communications stored on a third party site
  • 12. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 13. Electronic Monitoring: Internet • Internet usage on company device – Employers can monitor – Should have a written policy • Social Networking – Public vs. private – Use caution when disciplining an employee for disparaging comments found – Section 7 of NLRA- applies to union and non- union
  • 14. Electronic Monitoring: Internet • Social Networking – If someone has access, they can share access – Should have a written Social Media policy
  • 15. Electronic Monitoring: Telephones • Business telephones – May be monitored when: • employee has given consent or • “Business Extension” exemption – Personal calls on business phones cannot be monitored • Company issued cell phones – Should have a policy that dissolves expectation of privacy – Searches, reviews, and monitoring should be done only for legitimate, business purposes
  • 16. Video Surveillance • Acceptable in open and public work areas • If recording audio, must comply with ECPA • Limit access to the recorded material to designated management
  • 17. Workplace Searches • Reasonable expectation of privacy – Company property vs. Employee Property – Written policy • Justified Search – Reasonable suspicion – Violation of another company policy • Drug and Alcohol Policy • Weapons in the Workplace • Confidentiality
  • 18. Workplace Searches • Reasonableness – Discretion – Other investigatory methods exhausted – Appropriate scope • Never force an employee to submit to search • Have another witness present during a search
  • 19. Employer Responsibilities • Identify Theft Prevention – Policy, Procedure and Training • Confidentiality of Medical Information • Additional confidentiality and recordkeeping practices • Clearly communicate workplace monitoring policies • Train employees and managers
  • 20. ID Theft Prevention • Evaluate information security and disposal – How easy is it for someone to access your office during business hours? – How long documents stay at the printer before some one retrieves them? – Are documents that contain personal information left out unattended? – Are computer screens being locked every time someone leaves there desk?
  • 21. ID Theft Prevention • Are cabinets and drawers being locked? • Are emails that contain personal information being sent securely? • Are documents properly shredded when no longer needed? • Who in the office has access to sensitive information?
  • 22. ID Theft Prevention • Develop a protection plan – Conduct a “walk through” – Identify potential risks – Create easy to follow guidelines and procedures • Educate your employees – The importance of protecting personal information. – Measure that the company will take to began this process. – How the will be enforced.
  • 23. ID Theft Prevention • Have a Breach Plan – Notify employee, law enforcement and possibly FTC – Notify credit bureaus – Conduct internal investigation – Take steps to minimize or prevent additional loss
  • 24. Confidentiality of Medical Information • Do not request medical exam or make inquiry unless employee poses direct threat or it’s job related and consistent with business necessity • Medical information should be kept confidential and in separate file – FMLA certifications – Worker’s Comp reports – Medical exam results – HIPAA regulated documents, if applicable
  • 25. Confidentiality of Medical Information • Train supervisors on how to respond • Educate employees on what is appropriate to disclose in the workplace
  • 26. Additional Confidential Recordkeeping • Consumer Reports – Reports must be disposed of properly under FACTA • Investigations – Confidential to protect witnesses and accuser
  • 27. Policies • Electronic Monitoring – Define system covered – Business-use only – Discuss prohibited use – Explain consequences – Inform of employers’ right to monitor • Telephone Monitoring – Define purpose of monitoring – Discuss calls that appear to be personal
  • 28. Policies • Social Media – Define what social media is – Apply it to business and personal – Compare to other policies • Workplace Searches – Define purpose and search areas – Ensure that a search is not an accusation – Refusal may lead to disciplinary action or termination
  • 29. Summary • Privacy in the workplace is a combination of employer rights and employer responsibilities • The key to monitoring employees is to dissolve the expectation of privacy • Employee information protection is in the hands of HR