SlideShare une entreprise Scribd logo
1  sur  31
Understanding Privacy in the
Workplace
Presented by Brittany Cullison, PHR
December 1, 2011
Important Notice
• I am not an attorney.
• This is not a substitute for experienced
legal counsel.
• This is not legal advice.
What to expect
• Laws that govern privacy in the workplace
• What employers can monitor-- and the
right way to do it
• Employer’s obligations to protect
employee’s private information—and best
practice guidelines
What governs privacy in the
workplace?
• Fourth Amendment
– Not applicable for private employees, but
offers protection in some cases for public
employees
• Electronic Communications Privacy Act
– Governs the monitoring and recording of
employee electronic communications
What governs privacy in the
workplace?
• FCRA and FACTA
– Promotes confidentiality, accuracy, relevancy,
and proper use of that information
• EPPA
– Prevents use of lie detectors in employment
practices
What governs privacy in the
workplace?
• ADA and FMLA
– Recordkeeping and confidentiality of employee
medical information
• HIPAA
– Privacy of personally identifiable health
information
• GINA
– Restricts employers from acquiring and
disclosing employee genetic information
What governs privacy in the
workplace?
• Identity theft laws
– Federal and state level
• Common Law
• Contractual Privacy Claims
Employer Rights
• Electronic Monitoring
– Computers
– Emails
– Internet Usage- Social Media
– Telephone
• Video Surveillance
• Workplace Searches
Electronic Monitoring:
Computers
• Company issued computers
– Employers can monitor
– Should have clear policy that dissolves any
expectation of privacy
• “Personal” files, password protected documents
• Personal Computer used for Work
– May be subject to discovery in litigation, but
typically only if subpoenaed
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring: Emails
• Stored Communications Act
– Established in 1986
– Title II of the ECPA
– Prohibits unauthorized access to electronic
communications stored on a third party site
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring:
Internet
• Internet usage on company device
– Employers can monitor
– Should have a written policy
• Social Networking
– Public vs. private
– Use caution when disciplining an employee for
disparaging comments found
– Section 7 of NLRA- applies to union and non-
union
Electronic Monitoring:
Internet
• Social Networking
– If someone has access, they can share access
– Should have a written Social Media policy
Electronic Monitoring:
Telephones
• Business telephones
– May be monitored when:
• employee has given consent or
• “Business Extension” exemption
– Personal calls on business phones cannot be
monitored
• Company issued cell phones
– Should have a policy that dissolves expectation
of privacy
– Searches, reviews, and monitoring should be
done only for legitimate, business purposes
Video Surveillance
• Acceptable in open and public work areas
• If recording audio, must comply with ECPA
• Limit access to the recorded material to
designated management
Workplace Searches
• Reasonable expectation of privacy
– Company property vs. Employee Property
– Written policy
• Justified Search
– Reasonable suspicion
– Violation of another company policy
• Drug and Alcohol Policy
• Weapons in the Workplace
• Confidentiality
Workplace Searches
• Reasonableness
– Discretion
– Other investigatory methods exhausted
– Appropriate scope
• Never force an employee to submit to
search
• Have another witness present during a
search
Employer Responsibilities
• Identify Theft Prevention
– Policy, Procedure and Training
• Confidentiality of Medical Information
• Additional confidentiality and
recordkeeping practices
• Clearly communicate workplace
monitoring policies
• Train employees and managers
ID Theft Prevention
• Evaluate information security and disposal
– How easy is it for someone to access your
office during business hours?
– How long documents stay at the printer
before some one retrieves them?
– Are documents that contain personal
information left out unattended?
– Are computer screens being locked every
time someone leaves there desk?
ID Theft Prevention
• Are cabinets and drawers being locked?
• Are emails that contain personal
information being sent securely?
• Are documents properly shredded when
no longer needed?
• Who in the office has access to sensitive
information?
ID Theft Prevention
• Develop a protection plan
– Conduct a “walk through”
– Identify potential risks
– Create easy to follow guidelines and procedures
• Educate your employees
– The importance of protecting personal
information.
– Measure that the company will take to began
this process.
– How the will be enforced.
ID Theft Prevention
• Have a Breach Plan
– Notify employee, law enforcement and possibly
FTC
– Notify credit bureaus
– Conduct internal investigation
– Take steps to minimize or prevent additional
loss
Confidentiality of Medical
Information
• Do not request medical exam or make
inquiry unless employee poses direct
threat or it’s job related and consistent
with business necessity
• Medical information should be kept
confidential and in separate file
– FMLA certifications
– Worker’s Comp reports
– Medical exam results
– HIPAA regulated documents, if applicable
Confidentiality of Medical
Information
• Train supervisors on how to respond
• Educate employees on what is appropriate
to disclose in the workplace
Additional Confidential
Recordkeeping
• Consumer Reports
– Reports must be disposed of properly under
FACTA
• Investigations
– Confidential to protect witnesses and accuser
Policies
• Electronic Monitoring
– Define system covered
– Business-use only
– Discuss prohibited use
– Explain consequences
– Inform of employers’ right to monitor
• Telephone Monitoring
– Define purpose of monitoring
– Discuss calls that appear to be personal
Policies
• Social Media
– Define what social media is
– Apply it to business and personal
– Compare to other policies
• Workplace Searches
– Define purpose and search areas
– Ensure that a search is not an accusation
– Refusal may lead to disciplinary action or termination
Summary
• Privacy in the workplace is a combination
of employer rights and employer
responsibilities
• The key to monitoring employees is to
dissolve the expectation of privacy
• Employee information protection is in the
hands of HR
Questions?
Brittany Cullison, PHR
713-784-1181
bcullison@gnapartners.com
www.gnapartners.com
Resources
www.shrm.com
www.hrlaws.com
www.twc.state.tx.us
www.prospera.com

Contenu connexe

Tendances

Data protection regulations in Nigeria
Data protection regulations in NigeriaData protection regulations in Nigeria
Data protection regulations in NigeriaMercy Akinseinde
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRRotary International
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysiakhenghoe
 
Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018amirhannan
 

Tendances (20)

GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Data protection regulations in Nigeria
Data protection regulations in NigeriaData protection regulations in Nigeria
Data protection regulations in Nigeria
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
DATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLDDATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLD
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 

En vedette

6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top TalentFocal Upright
 
Working safely powerpoint_presentation
Working safely powerpoint_presentationWorking safely powerpoint_presentation
Working safely powerpoint_presentationHaseeb Butt
 
IIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development PortfolioIIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development PortfolioTom-Cramer
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
Mock interview training
Mock interview trainingMock interview training
Mock interview trainingNikita Pande
 
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com..."Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...Sarah Robbins
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreementruelcdogma
 
Quiz warehouse safety
Quiz warehouse safetyQuiz warehouse safety
Quiz warehouse safetyMark Bennett
 
Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520jo bitonio
 
10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should KnowOxbridge Academy
 
Health and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom pptHealth and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom pptQwizdom UK
 
Top 9 mock interview questions answers
Top 9 mock interview questions answersTop 9 mock interview questions answers
Top 9 mock interview questions answershudsons168
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentationgtwaddell
 

En vedette (20)

6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent6 Unexpected Strategies to Attract and Retain Top Talent
6 Unexpected Strategies to Attract and Retain Top Talent
 
Working safely powerpoint_presentation
Working safely powerpoint_presentationWorking safely powerpoint_presentation
Working safely powerpoint_presentation
 
Privacy at workplace
Privacy at workplacePrivacy at workplace
Privacy at workplace
 
IIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development PortfolioIIPC General Assembly 2016 - Tool Development Portfolio
IIPC General Assembly 2016 - Tool Development Portfolio
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
HIPAA
HIPAAHIPAA
HIPAA
 
Mock interview training
Mock interview trainingMock interview training
Mock interview training
 
Mba Mock interview
Mba  Mock interviewMba  Mock interview
Mba Mock interview
 
Safety quiz
Safety quizSafety quiz
Safety quiz
 
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com..."Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreement
 
Quiz warehouse safety
Quiz warehouse safetyQuiz warehouse safety
Quiz warehouse safety
 
Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520Implementing Rules and regulations of RA 9520
Implementing Rules and regulations of RA 9520
 
10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know10 Principles Every OHS Representative Should Know
10 Principles Every OHS Representative Should Know
 
Health and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom pptHealth and Safety Training Quiz - Qwizdom ppt
Health and Safety Training Quiz - Qwizdom ppt
 
Top 9 mock interview questions answers
Top 9 mock interview questions answersTop 9 mock interview questions answers
Top 9 mock interview questions answers
 
Mock interview tips
Mock interview tipsMock interview tips
Mock interview tips
 
Memorandum Of Agreement Sample
Memorandum Of Agreement SampleMemorandum Of Agreement Sample
Memorandum Of Agreement Sample
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentation
 
Portfolio Analysis
Portfolio AnalysisPortfolio Analysis
Portfolio Analysis
 

Similaire à Understanding employee privacy

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protectionRachel Aldighieri
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - EdinburghRachel Aldighieri
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015Rachel Aldighieri
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection updateRachel Aldighieri
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Rachel Aldighieri
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014Rachel Aldighieri
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015Rachel Aldighieri
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researcherskclcompbio
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMichelleSaver
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awarenessitchomecare
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014Rachel Aldighieri
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillSymptai Consulting Limited
 

Similaire à Understanding employee privacy (20)

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awareness
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Data Protection and IDEA
Data Protection and IDEAData Protection and IDEA
Data Protection and IDEA
 

Plus de G&A Partners

G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring ProcessG&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring ProcessG&A Partners
 
What's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and BeyondWhat's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and BeyondG&A Partners
 
How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace G&A Partners
 
Helping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life BalanceHelping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life BalanceG&A Partners
 
G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016 G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016 G&A Partners
 
Fundamentals of FMLA
Fundamentals of FMLAFundamentals of FMLA
Fundamentals of FMLAG&A Partners
 
Breaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee BurnoutBreaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee BurnoutG&A Partners
 
Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016G&A Partners
 
Setting & Discussing Performance Goals
Setting & Discussing Performance GoalsSetting & Discussing Performance Goals
Setting & Discussing Performance GoalsG&A Partners
 
Best Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and TerminationsBest Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and TerminationsG&A Partners
 
Building an effective safety culture edits
Building an effective safety culture editsBuilding an effective safety culture edits
Building an effective safety culture editsG&A Partners
 
Performance Appraisals Webinar
Performance Appraisals WebinarPerformance Appraisals Webinar
Performance Appraisals WebinarG&A Partners
 
Recruitment Process Outsourcing Webinar
Recruitment Process Outsourcing WebinarRecruitment Process Outsourcing Webinar
Recruitment Process Outsourcing WebinarG&A Partners
 
Labor and Employment Law 2015
Labor and Employment Law 2015Labor and Employment Law 2015
Labor and Employment Law 2015G&A Partners
 
G&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplaceG&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplaceG&A Partners
 
Professional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival HighProfessional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival HighG&A Partners
 
Feb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perrettaFeb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perrettaG&A Partners
 
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance LawsAvoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance LawsG&A Partners
 
Hr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jllHr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jllG&A Partners
 
Whitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOsWhitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOsG&A Partners
 

Plus de G&A Partners (20)

G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring ProcessG&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
 
What's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and BeyondWhat's Going on in Labor and Employment Law: 2016 and Beyond
What's Going on in Labor and Employment Law: 2016 and Beyond
 
How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace How to Respond to Active Shooter Incidents in the Workplace
How to Respond to Active Shooter Incidents in the Workplace
 
Helping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life BalanceHelping Employees Find a Work-Life Balance
Helping Employees Find a Work-Life Balance
 
G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016 G&A Webinar: Religion in the Workplace: January 2016
G&A Webinar: Religion in the Workplace: January 2016
 
Fundamentals of FMLA
Fundamentals of FMLAFundamentals of FMLA
Fundamentals of FMLA
 
Breaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee BurnoutBreaking Burnout: Understanding & Preventing Employee Burnout
Breaking Burnout: Understanding & Preventing Employee Burnout
 
Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016Preparing For The Affordable Care Act In 2016
Preparing For The Affordable Care Act In 2016
 
Setting & Discussing Performance Goals
Setting & Discussing Performance GoalsSetting & Discussing Performance Goals
Setting & Discussing Performance Goals
 
Best Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and TerminationsBest Practices When Issuing Discipline and Terminations
Best Practices When Issuing Discipline and Terminations
 
Building an effective safety culture edits
Building an effective safety culture editsBuilding an effective safety culture edits
Building an effective safety culture edits
 
Performance Appraisals Webinar
Performance Appraisals WebinarPerformance Appraisals Webinar
Performance Appraisals Webinar
 
Recruitment Process Outsourcing Webinar
Recruitment Process Outsourcing WebinarRecruitment Process Outsourcing Webinar
Recruitment Process Outsourcing Webinar
 
Labor and Employment Law 2015
Labor and Employment Law 2015Labor and Employment Law 2015
Labor and Employment Law 2015
 
G&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplaceG&A Partners Webinar - Respect in the workplace
G&A Partners Webinar - Respect in the workplace
 
Professional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival HighProfessional Employer Organizations: Keeping Turnover Low and Survival High
Professional Employer Organizations: Keeping Turnover Low and Survival High
 
Feb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perrettaFeb 2015 ppaca webinar seth perretta
Feb 2015 ppaca webinar seth perretta
 
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance LawsAvoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
 
Hr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jllHr audit presentation dec 2014 jll
Hr audit presentation dec 2014 jll
 
Whitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOsWhitepaper: HR Pros & PEOs
Whitepaper: HR Pros & PEOs
 

Dernier

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Understanding employee privacy

  • 1. Understanding Privacy in the Workplace Presented by Brittany Cullison, PHR December 1, 2011
  • 2. Important Notice • I am not an attorney. • This is not a substitute for experienced legal counsel. • This is not legal advice.
  • 3. What to expect • Laws that govern privacy in the workplace • What employers can monitor-- and the right way to do it • Employer’s obligations to protect employee’s private information—and best practice guidelines
  • 4. What governs privacy in the workplace? • Fourth Amendment – Not applicable for private employees, but offers protection in some cases for public employees • Electronic Communications Privacy Act – Governs the monitoring and recording of employee electronic communications
  • 5. What governs privacy in the workplace? • FCRA and FACTA – Promotes confidentiality, accuracy, relevancy, and proper use of that information • EPPA – Prevents use of lie detectors in employment practices
  • 6. What governs privacy in the workplace? • ADA and FMLA – Recordkeeping and confidentiality of employee medical information • HIPAA – Privacy of personally identifiable health information • GINA – Restricts employers from acquiring and disclosing employee genetic information
  • 7. What governs privacy in the workplace? • Identity theft laws – Federal and state level • Common Law • Contractual Privacy Claims
  • 8. Employer Rights • Electronic Monitoring – Computers – Emails – Internet Usage- Social Media – Telephone • Video Surveillance • Workplace Searches
  • 9. Electronic Monitoring: Computers • Company issued computers – Employers can monitor – Should have clear policy that dissolves any expectation of privacy • “Personal” files, password protected documents • Personal Computer used for Work – May be subject to discovery in litigation, but typically only if subpoenaed
  • 10. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 11. Electronic Monitoring: Emails • Stored Communications Act – Established in 1986 – Title II of the ECPA – Prohibits unauthorized access to electronic communications stored on a third party site
  • 12. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 13. Electronic Monitoring: Internet • Internet usage on company device – Employers can monitor – Should have a written policy • Social Networking – Public vs. private – Use caution when disciplining an employee for disparaging comments found – Section 7 of NLRA- applies to union and non- union
  • 14. Electronic Monitoring: Internet • Social Networking – If someone has access, they can share access – Should have a written Social Media policy
  • 15. Electronic Monitoring: Telephones • Business telephones – May be monitored when: • employee has given consent or • “Business Extension” exemption – Personal calls on business phones cannot be monitored • Company issued cell phones – Should have a policy that dissolves expectation of privacy – Searches, reviews, and monitoring should be done only for legitimate, business purposes
  • 16. Video Surveillance • Acceptable in open and public work areas • If recording audio, must comply with ECPA • Limit access to the recorded material to designated management
  • 17. Workplace Searches • Reasonable expectation of privacy – Company property vs. Employee Property – Written policy • Justified Search – Reasonable suspicion – Violation of another company policy • Drug and Alcohol Policy • Weapons in the Workplace • Confidentiality
  • 18. Workplace Searches • Reasonableness – Discretion – Other investigatory methods exhausted – Appropriate scope • Never force an employee to submit to search • Have another witness present during a search
  • 19. Employer Responsibilities • Identify Theft Prevention – Policy, Procedure and Training • Confidentiality of Medical Information • Additional confidentiality and recordkeeping practices • Clearly communicate workplace monitoring policies • Train employees and managers
  • 20. ID Theft Prevention • Evaluate information security and disposal – How easy is it for someone to access your office during business hours? – How long documents stay at the printer before some one retrieves them? – Are documents that contain personal information left out unattended? – Are computer screens being locked every time someone leaves there desk?
  • 21. ID Theft Prevention • Are cabinets and drawers being locked? • Are emails that contain personal information being sent securely? • Are documents properly shredded when no longer needed? • Who in the office has access to sensitive information?
  • 22. ID Theft Prevention • Develop a protection plan – Conduct a “walk through” – Identify potential risks – Create easy to follow guidelines and procedures • Educate your employees – The importance of protecting personal information. – Measure that the company will take to began this process. – How the will be enforced.
  • 23. ID Theft Prevention • Have a Breach Plan – Notify employee, law enforcement and possibly FTC – Notify credit bureaus – Conduct internal investigation – Take steps to minimize or prevent additional loss
  • 24. Confidentiality of Medical Information • Do not request medical exam or make inquiry unless employee poses direct threat or it’s job related and consistent with business necessity • Medical information should be kept confidential and in separate file – FMLA certifications – Worker’s Comp reports – Medical exam results – HIPAA regulated documents, if applicable
  • 25. Confidentiality of Medical Information • Train supervisors on how to respond • Educate employees on what is appropriate to disclose in the workplace
  • 26. Additional Confidential Recordkeeping • Consumer Reports – Reports must be disposed of properly under FACTA • Investigations – Confidential to protect witnesses and accuser
  • 27. Policies • Electronic Monitoring – Define system covered – Business-use only – Discuss prohibited use – Explain consequences – Inform of employers’ right to monitor • Telephone Monitoring – Define purpose of monitoring – Discuss calls that appear to be personal
  • 28. Policies • Social Media – Define what social media is – Apply it to business and personal – Compare to other policies • Workplace Searches – Define purpose and search areas – Ensure that a search is not an accusation – Refusal may lead to disciplinary action or termination
  • 29. Summary • Privacy in the workplace is a combination of employer rights and employer responsibilities • The key to monitoring employees is to dissolve the expectation of privacy • Employee information protection is in the hands of HR