You may have been reading about how “Big Data” technologies are being used for a variety of purposes, such as making purchase suggestions based on prior buying patterns or staging law enforcement resources based on predictions for where and when crimes are likely to occur. But these technologies also are being used in the human resources context,… Continue Reading
The National Labor Relations Board has found that another employer (a non-union employer) violated its employees’ protected concerted activity rights under the National Labor Relations Act (NLRA) when it disciplined and fired them for certain social media activity. Our Labor Group provides an extensive analysis of this decision in Triple Play Sports Bar and Grille, 361 NLRB No. 31… Continue Reading
Effective September 30, 2014, New Hampshire joins sixteen other states (Arkansas, California, Colorado, Illinois, Louisiana, Maryland, Michigan, New Jersey, New Mexico, Nevada, Oklahoma, Oregon, Tennessee, Utah, Washington, and Wisconsin) in prohibiting employers from requiring employees or job applicants to disclose their login information for accessing any “personal account” or service through an electronic communication device. Similar… Continue Reading
On August 5, 2014, Missouri voters approved Amendment 9 to the Missouri Constitution making Missouri the first state in the nation to offer explicit constitutional protection to electronic communications and data from unreasonable serches and seizures. The official ballot title asked: “Shall the Missouri Constitution be amended so that the people shall be secure in their… Continue Reading
When the United States Supreme Court handed down its decision Riley v. California, a Fourth Amendment criminal case, we suspected it would not be long before the rationale in that case concerning the privacy interests individuals have in cellphones would be more broadly applied. In late June, a federal district court in Connecticut denied a request by two… Continue Reading
Developed by Knightscope, the K5 Autonomous Data Machine is a 5 foot tall, 300 pound robotic device designed to be “a safety and security tool for corporations, as well as for schools and neighborhoods,” as reported by the New York Times. While K5 may not yet be ready for prime time, its developers are hoping to lure early adopters… Continue Reading
The 11th Circuit Court of Appeals has rejected the appeal of a former City of Daytona Beach Fire Inspector who argued that the City improperly used her “personal health information” to defend itself against her lawsuit for interference under the Family Medical Leave Act. In Bailey v. City of Daytona Beach Shores, the City of… Continue Reading
Written by Ian A. Wright If the intersection of social networking and workplace privacy laws piques your attention, you may find an article written by my colleague Michael Frankel particularly interesting. He writes about a recent case, Pecile v. Titan Capital Group, LLC out of New York, where the court refused to grant the defendants’ request… Continue Reading
Jackson Lewis Special Report on Social Media in the Workplace.
Hospital employee’s discrimination claims were unsuccessful where termination resulted from HIPAA breach
Colorado joins eight other states in restricting employers’ use of credit information in making employment decisions
More states pass laws limiting access by employers to the social media accounts of applicants and employees
Add New Mexico to the list of states with social medica privacy laws
Top 13 data privacy and security issues for 2013
Michigan becomes fourth state to enact law banning employers from requiring access to employees’/applicants’ social media accounts
Are emails saved in one’s Yahoo! account stored for backup protection under the Stored Communications Act?
Florida has joined 20 other states have enacted legislation addressing teen sexting. Because employees frequently transmit these materials using their employer’s networks, retail, entertainment, hospitality and other industries that traditionally employ large numbers of younger workers may soon get dragged into criminal proceedings because of “sexting” by their younger workers.
What is a company’s recourse when a former employee deletes e-mails and other company electronic information before he leaves? A case from Indiana provides a lesson. When Meridian Financial Advisors began serving as Receiver for bankrupted OCMC, Inc., it took possession of a number of OCMC computers, including one belonging to Joseph A. Pence, OCMC’s President… Continue Reading
Co-author: Joseph J. Lazzarotti The New Jersey’s highest Court has concluded that an employee, Marina Stengart, could reasonably expect that e-mail communication with her lawyer through her personal, password-protected, web-based e-mail account would remain private, and that sending and receiving them using a company laptop did not eliminate the attorney-client privilege that protected them. The Court… Continue Reading
As reported by Ameet Sachdev, of the Chicago Tribune, a jury found an employer responsible for the actions of its investigators who obtained a former employee’s phone records through “pretexting.” Of the $1.8 million awarded to the former employee for breaches of her privacy, the jury awarded $1.75 million in punitive damages. Regardless of whether… Continue Reading