Skip to content

Menu

Jackson Lewis P.C.  logo
HomeAboutServicesContactSubscribe
Search
Close

Workplace Privacy, Data Management & Security Report

Keyloggers Beware–Companies Risk Being Sued By Employees

By Jason C. Gavejian on September 27, 2011
Posted in Workplace Privacy

A U.S. District Court in Indiana has ruled that a company’s use of keylogger software to access an employee’s personal e-mail account may have violated the Stored Communications Act (“SCA”).  

Keylogging or keystroke logging is the tracking of the keys struck on a keyboard, typically in a covert manner.  

In Rene v. G.F. Fishers, Inc.,the company utilized keylogger software and was sued by one of its employees for violations of the SCA, the Indiana Wiretap Act (“IWA”), and the Federal Wiretap Act.  The company generally prohibited personal use of its computers, however, it permitted the employee to access her personal checking account and personal e-mail account from the company computer.  The employee was later notified that the company had installed keylogger software on the computer.  Utilizing the keylogger software, the company accessed the employee’s personal e-mail account and personal checking account (acquiring the passwords utilizing the keylogger software), and reviewed and discussed the messages and contents. 

The employee was fired for “poor performance” after complaining about the access. She sued her former employer, alleging the company violated the SCA, IWA, and the Federal Wiretap Act.  While the court did not address certain factual issues under the SCA (e.g., whether the company accessed the employee’s e-mail messages before the employee opened them), it held that by alleging that the employer accessed her e-mail messages the employee had satisfied the burden of asserting a violation of the SCA.  The court also denied the company’s motion to dismiss the former employee’s IWA claim, but it did dismiss the Federal Wiretap Act claim. 

As we have previously discussed, jurisdictions are at odds over the use of keylogger software in the employment context.  Employers should carefully consider their use of keylogger or monitoring technology and consult counsel as to best practices for the jurisdiction in which you are located.   

Tags: access, business, court, decisions, email, employee, employee personal email, employer, employment, former employee, Indiana, Indiana Wiretap Act, interception, keylogger, keylogging, keystroke logging, litigation, personal email account, policies, privacy, private, Stored Communications Act, Wiretap Act, Workplace Privacy
Print:
Email this postTweet this postLike this postShare this post on LinkedIn
Photo of Jason C. Gavejian Jason C. Gavejian

Jason C. Gavejian is the office managing principal of the Berkeley Heights, New Jersey, office of Jackson Lewis P.C. and a member of the firm’s Board of Directors. He is also a Certified Information Privacy Professional (CIPP/US) with the International Association of Privacy…

Jason C. Gavejian is the office managing principal of the Berkeley Heights, New Jersey, office of Jackson Lewis P.C. and a member of the firm’s Board of Directors. He is also a Certified Information Privacy Professional (CIPP/US) with the International Association of Privacy Professionals.

As a Certified Information Privacy Professional (CIPP/US), Jason focuses on the matrix of laws governing privacy, security, and management of data. Jason is co-editor of, and a regular contributor to, the firm’s Privacy blog.

Jason’s work in the area of privacy and data security includes counseling international, national, and regional companies on the vast array of privacy and security mandates, preventive measures, policies, procedures, and best practices. This includes, but is not limited to, the privacy and security requirements under state, federal, and international law (e.g., HIPAA/HITECH, GDPR, California Consumer Privacy Act (CCPA), FTC Act, ECPA, SCA, GLBA etc.). Jason helps companies in all industries to assess information risk and security as part of the development and implementation of comprehensive data security safeguards including written information security programs (WISP). Additionally, Jason assists companies in analyzing issues related to: electronic communications, social media, electronic signatures (ESIGN/UETA), monitoring and recording (GPS, video, audio, etc.), biometrics, and bring your own device (BYOD) and company owned personally enabled device (COPE) programs, including policies and procedures to address same. He regularly advises clients on compliance issues under the Telephone Consumer Protection Act (TCPA) and has represented clients in suits, including class actions, brought in various jurisdictions throughout the country under the TCPA.

Read more about Jason C. Gavejian
Show more Show less
Related Posts
Colorado Expands Protections for Biometric Information under the Colorado Privacy Act
June 4, 2024
Virginia Passes Legislation Prohibiting the Use of Employees’ Social Security Numbers as Identifiers
April 19, 2023
NLRB General Counsel Memo on Electronic Monitoring of Employees
November 2, 2022
Jackson Lewis JacksonLewis.com

Stay Connected

Subscribe to this blog via RSS Follow Us on Twitter Add us on Facebook View Our LinkedIn Profile

Topics

Archives

Editors

  • Jason C. Gavejian
  • Joseph J. Lazzarotti

Contributors

  • Christopher E. Hoyme
  • Damon W. Silver
  • Michael R. Bertoncini
  • Marlo Johnson Roebuck
  • Nathan W. Austin
  • Nicky Jatana
  • Jeffrey M. Schlossberg

Blog Authors Show/Hide

  • Joseph J. Lazzarotti
  • Jason C. Gavejian
  • Maya Atrakchi
  • Jackson Lewis P.C.
  • Mary T. Costigan
  • Damon W. Silver
  • Jeffrey M. Schlossberg
  • Michael R. Bertoncini
  • Robert Yang
  • Christopher E. Hoyme
  • Eric J. Felsberg
  • Rachel E. Ehlers
  • Sean Paisan
  • Melissa Pascualini
  • Jody Kahn Mason
  • Frank J. Fanshawe
  • Gregory C. Brown Jr.
  • Delonie A. Plummer
  • Richard I. Greenberg
  • Michelle L. Duncan
  • Jerel Pacis Agatep
  • Cecilie E. Read
  • Catherine R. Tucciarello
  • Todd R. Dobry
  • Susan M. Corcoran
  • Phillip A. Baggett
  • Dorothy Parson McDermott
  • Ryan J. Soscia
  • Ronald V. Sgambati
  • Nathan W. Austin
  • Joshua D. Allen
  • Jason Selvey
  • Michelle T. Hackim
  • Daniel J. Moses
  • Amanda A. Simpson
  • Yvonne Arvanitis Fossati
  • Teri Wilford Wood
  • Shannon Bettis Nakabayashi
  • Paul A. Friedman
  • Nikolas S. Dean
  • Marlo Johnson Roebuck
  • Melissa Ostrower
  • Michael H. Neifach
  • Joseph J. Lynett
  • Kevin B. Hambly
  • Jennifer Shoaf Richardson
  • Jackson Biesecker
  • Francis P. Alvarez
  • Christopher T. Patrick
  • Cheyna Galloway
  • Amy L. Peck
  • Zachary A. Ahonen
  • John A. Snyder
  • Sierra Vierra
  • Stephanie L. Adler-Paindiris
  • Richard F. Vitarelli
  • Kathryn J. Russo
  • Rachel A. Jacob
  • Philip M. Duclos
  • Laura A. Mitchell
  • Michael D. Ridenour
  • Michael A. Giarratano
  • Maryam Shokry
  • Leo P. Norton
  • Kevin D. Holden
  • Kelly E. Eisenlohr-Moul
  • Julia Bover
  • Joshua M. Henderson
  • Jonathan J. Spitz
  • Jamie L. Levitt
  • Valerie K. Jackson
  • Howard M. Bloom
  • Greg Alvarez
  • Erik J. Winton
  • Ena T. Diaz
  • Elizabeth S. Walsh
  • David R. Golder
  • Craig W. Wiley
  • Clifford R. Atlas
  • Cindy Y. Huang
  • Chai Williams
  • Chad P. Richter
  • Brian L. McDermott
  • Ashley Solowan
  • Angelika Avagian
  • Alec Nealon
  • Theron Velazquez
  • Terri Bowman
  • Robert Pfeifer
  • Regan Harrison
  • Paige
  • Nicky Jatana
  • Nicole A. Trotta
  • Mei Fung So
  • Mariama Keita
  • lbarksdale
  • Lara Hamm
  • Kourtney Goebel
  • Kendall Melidosian
  • Gayla Kirkland
  • Kelly Heber
  • Katharine C. Weber
  • Joanne Marsh
  • Jessica Poot
  • Jenifer M. Bologna
  • Jen Starken
  • Jonathan L. Crook
  • Haley Nystrom
  • Camille​​​​ Garcia‑Mendoza
  • Ann Albertson

Recent Upates

  • Top 10 Privacy, AI & Cybersecurity Issues for 2026
  • Florida’s Digital Wiretapping Surge: What Businesses Need to Know About FSCA Litigation
  • New CCPA Regulations Go Into Effect, Updated FAQs Summarize Key Compliance Requirements
  • The Hidden Legal Minefield: Compliance Concerns with AI Smart Glasses, Part 4: Data Security, Breach Notification, and Third-Party AI Processing Risks
  • The Hidden Legal Minefield: Compliance Concerns with AI Smart Glasses, Part 3 –Privacy, Surveillance, and Labor Law Violations

Jackson Lewis

Subscribe to this blog via RSS Follow Us on Twitter Add us on Facebook View Our LinkedIn Profile
Privacy PolicyDisclaimer

About Jackson Lewis

Focused on employment and labor law since 1958, Jackson Lewis P.C.’s 1,100+ attorneys located in major cities nationwide consistently identify and respond to new ways workplace law intersects business. We help employers develop proactive strategies, strong policies and business-oriented solutions to cultivate high-functioning workforces that are engaged and stable, and share our clients’ goals to emphasize belonging and respect for the contributions of every employee.

Read More...
Copyright © 2026, Jackson Lewis P.C. All Rights Reserved.
Law blog design & platform by LexBlog LexBlog Logo