SlideShare a Scribd company logo
Understanding Privacy in the
Workplace
Presented by Brittany Cullison, PHR
December 1, 2011
Important Notice
• I am not an attorney.
• This is not a substitute for experienced
legal counsel.
• This is not legal advice.
What to expect
• Laws that govern privacy in the workplace
• What employers can monitor-- and the
right way to do it
• Employer’s obligations to protect
employee’s private information—and best
practice guidelines
What governs privacy in the
workplace?
• Fourth Amendment
– Not applicable for private employees, but
offers protection in some cases for public
employees
• Electronic Communications Privacy Act
– Governs the monitoring and recording of
employee electronic communications
What governs privacy in the
workplace?
• FCRA and FACTA
– Promotes confidentiality, accuracy, relevancy,
and proper use of that information
• EPPA
– Prevents use of lie detectors in employment
practices
What governs privacy in the
workplace?
• ADA and FMLA
– Recordkeeping and confidentiality of employee
medical information
• HIPAA
– Privacy of personally identifiable health
information
• GINA
– Restricts employers from acquiring and
disclosing employee genetic information
What governs privacy in the
workplace?
• Identity theft laws
– Federal and state level
• Common Law
• Contractual Privacy Claims
Employer Rights
• Electronic Monitoring
– Computers
– Emails
– Internet Usage- Social Media
– Telephone
• Video Surveillance
• Workplace Searches
Electronic Monitoring:
Computers
• Company issued computers
– Employers can monitor
– Should have clear policy that dissolves any
expectation of privacy
• “Personal” files, password protected documents
• Personal Computer used for Work
– May be subject to discovery in litigation, but
typically only if subpoenaed
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring: Emails
• Stored Communications Act
– Established in 1986
– Title II of the ECPA
– Prohibits unauthorized access to electronic
communications stored on a third party site
Electronic Monitoring: Emails
• Company email
– Property of the company
– Employer can access
• Personal email accessed on company
computer
– Employer cannot access without employee
giving consent
– Stored Communication Act
Electronic Monitoring:
Internet
• Internet usage on company device
– Employers can monitor
– Should have a written policy
• Social Networking
– Public vs. private
– Use caution when disciplining an employee for
disparaging comments found
– Section 7 of NLRA- applies to union and non-
union
Electronic Monitoring:
Internet
• Social Networking
– If someone has access, they can share access
– Should have a written Social Media policy
Electronic Monitoring:
Telephones
• Business telephones
– May be monitored when:
• employee has given consent or
• “Business Extension” exemption
– Personal calls on business phones cannot be
monitored
• Company issued cell phones
– Should have a policy that dissolves expectation
of privacy
– Searches, reviews, and monitoring should be
done only for legitimate, business purposes
Video Surveillance
• Acceptable in open and public work areas
• If recording audio, must comply with ECPA
• Limit access to the recorded material to
designated management
Workplace Searches
• Reasonable expectation of privacy
– Company property vs. Employee Property
– Written policy
• Justified Search
– Reasonable suspicion
– Violation of another company policy
• Drug and Alcohol Policy
• Weapons in the Workplace
• Confidentiality
Workplace Searches
• Reasonableness
– Discretion
– Other investigatory methods exhausted
– Appropriate scope
• Never force an employee to submit to
search
• Have another witness present during a
search
Employer Responsibilities
• Identify Theft Prevention
– Policy, Procedure and Training
• Confidentiality of Medical Information
• Additional confidentiality and
recordkeeping practices
• Clearly communicate workplace
monitoring policies
• Train employees and managers
ID Theft Prevention
• Evaluate information security and disposal
– How easy is it for someone to access your
office during business hours?
– How long documents stay at the printer
before some one retrieves them?
– Are documents that contain personal
information left out unattended?
– Are computer screens being locked every
time someone leaves there desk?
ID Theft Prevention
• Are cabinets and drawers being locked?
• Are emails that contain personal
information being sent securely?
• Are documents properly shredded when
no longer needed?
• Who in the office has access to sensitive
information?
ID Theft Prevention
• Develop a protection plan
– Conduct a “walk through”
– Identify potential risks
– Create easy to follow guidelines and procedures
• Educate your employees
– The importance of protecting personal
information.
– Measure that the company will take to began
this process.
– How the will be enforced.
ID Theft Prevention
• Have a Breach Plan
– Notify employee, law enforcement and possibly
FTC
– Notify credit bureaus
– Conduct internal investigation
– Take steps to minimize or prevent additional
loss
Confidentiality of Medical
Information
• Do not request medical exam or make
inquiry unless employee poses direct
threat or it’s job related and consistent
with business necessity
• Medical information should be kept
confidential and in separate file
– FMLA certifications
– Worker’s Comp reports
– Medical exam results
– HIPAA regulated documents, if applicable
Confidentiality of Medical
Information
• Train supervisors on how to respond
• Educate employees on what is appropriate
to disclose in the workplace
Additional Confidential
Recordkeeping
• Consumer Reports
– Reports must be disposed of properly under
FACTA
• Investigations
– Confidential to protect witnesses and accuser
Policies
• Electronic Monitoring
– Define system covered
– Business-use only
– Discuss prohibited use
– Explain consequences
– Inform of employers’ right to monitor
• Telephone Monitoring
– Define purpose of monitoring
– Discuss calls that appear to be personal
Policies
• Social Media
– Define what social media is
– Apply it to business and personal
– Compare to other policies
• Workplace Searches
– Define purpose and search areas
– Ensure that a search is not an accusation
– Refusal may lead to disciplinary action or termination
Summary
• Privacy in the workplace is a combination
of employer rights and employer
responsibilities
• The key to monitoring employees is to
dissolve the expectation of privacy
• Employee information protection is in the
hands of HR
Questions?
Brittany Cullison, PHR
713-784-1181
bcullison@gnapartners.com
www.gnapartners.com
Resources
www.shrm.com
www.hrlaws.com
www.twc.state.tx.us
www.prospera.com

More Related Content

PPT
Workplace Privacy Presentation
PPTX
ABC SB_ABAC AWARENESS.pptx
PPTX
Data protection ppt
PPTX
Confidentiality in the workplace (1)
PPTX
Cyber law in India: Its need & importance
PDF
Data & Privacy: Striking the Right Balance - Jonny Leroy
PDF
Privacy and Data Security
Workplace Privacy Presentation
ABC SB_ABAC AWARENESS.pptx
Data protection ppt
Confidentiality in the workplace (1)
Cyber law in India: Its need & importance
Data & Privacy: Striking the Right Balance - Jonny Leroy
Privacy and Data Security

What's hot (20)

PPTX
Employee misconduct & disciplinary procedure
PPTX
Lecture 4 confidentiality, disclosure and the law.1
PDF
Misconduct & Disciplinary Action - Charge Sheet & Domestic Enquiry
PPTX
Cyber security and cyber laws
PPT
Data protection in_india
PPT
Bullying & harrassment in the workplace
PDF
IT Act 2000 Penalties, Offences with case studies
PPTX
Human resources security
 
PDF
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
PDF
Overview on data privacy
PDF
Data Processing - data privacy and sensitive data
PPTX
Sexual Harassment of Women at Workplace Act 2013
PDF
Cyber security awareness for students
PDF
Legal Aspect Pertaining to E-commerce
PPTX
Right to privacy on internet and Data Protection
PPTX
Data protection regulation
PDF
Everything you Need to Know about The Data Protection Officer Role
PPT
Data Protection Presentation
PPT
Data Privacy in India and data theft
Employee misconduct & disciplinary procedure
Lecture 4 confidentiality, disclosure and the law.1
Misconduct & Disciplinary Action - Charge Sheet & Domestic Enquiry
Cyber security and cyber laws
Data protection in_india
Bullying & harrassment in the workplace
IT Act 2000 Penalties, Offences with case studies
Human resources security
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Overview on data privacy
Data Processing - data privacy and sensitive data
Sexual Harassment of Women at Workplace Act 2013
Cyber security awareness for students
Legal Aspect Pertaining to E-commerce
Right to privacy on internet and Data Protection
Data protection regulation
Everything you Need to Know about The Data Protection Officer Role
Data Protection Presentation
Data Privacy in India and data theft
Ad

Viewers also liked (20)

PDF
6 Unexpected Strategies to Attract and Retain Top Talent
PPT
Working safely powerpoint_presentation
PPTX
Privacy at workplace
PPTX
IIPC General Assembly 2016 - Tool Development Portfolio
PPTX
TaylorWk1d2assignment
PPTX
PDF
Mock interview training
PPTX
Mba Mock interview
PPTX
Safety quiz
PPT
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
DOC
Memorandum of agreement
PDF
Quiz warehouse safety
PPT
Implementing Rules and regulations of RA 9520
PPTX
10 Principles Every OHS Representative Should Know
PPT
Health and Safety Training Quiz - Qwizdom ppt
DOC
Top 9 mock interview questions answers
PPTX
Mock interview tips
DOC
Memorandum Of Agreement Sample
PPT
General Safety Presentation
PPTX
Portfolio Analysis
6 Unexpected Strategies to Attract and Retain Top Talent
Working safely powerpoint_presentation
Privacy at workplace
IIPC General Assembly 2016 - Tool Development Portfolio
TaylorWk1d2assignment
Mock interview training
Mba Mock interview
Safety quiz
"Don't Come to Class Naked": Immersion, Engagement and Ethos for Freshman Com...
Memorandum of agreement
Quiz warehouse safety
Implementing Rules and regulations of RA 9520
10 Principles Every OHS Representative Should Know
Health and Safety Training Quiz - Qwizdom ppt
Top 9 mock interview questions answers
Mock interview tips
Memorandum Of Agreement Sample
General Safety Presentation
Portfolio Analysis
Ad

Similar to Understanding employee privacy (20)

PDF
Introduction to data protection
PPTX
3A – DATA PROTECTION: ADVICE
 
PDF
An introduction to data protection - Edinburgh
PPTX
An Introduction to Data Protection (London) - June 2015
PDF
New Technologies in the Workplace: Privacy Issues
PDF
Legal and data protection update
PPTX
Introduction to data protection - Edinburgh - 29/04/15
PDF
An introduction to data protection - 26 March 2014
PPTX
GDPR Privacy Introduction
PPTX
An introduction to data protection - Manchester - 24/06/15
PPTX
An introduction to data protection - 2/09/2015
PPTX
Anne Cameron - An Introduction to the Data Protection Act for Researchers
PPTX
Media_644046_smxx (1).pptx
PPTX
Confidentiality Awareness
PPTX
DLP: Monitoring Legal Obligations, Managing The Challenges
PPT
An introduction to data protection - 30 Jan 2014
PDF
Gdpr for business full
PPTX
Multi-faceted Cyber Security v1
PDF
Preparing your Business for the Data Protection Bill
PDF
Data Protection and IDEA
Introduction to data protection
3A – DATA PROTECTION: ADVICE
 
An introduction to data protection - Edinburgh
An Introduction to Data Protection (London) - June 2015
New Technologies in the Workplace: Privacy Issues
Legal and data protection update
Introduction to data protection - Edinburgh - 29/04/15
An introduction to data protection - 26 March 2014
GDPR Privacy Introduction
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - 2/09/2015
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Media_644046_smxx (1).pptx
Confidentiality Awareness
DLP: Monitoring Legal Obligations, Managing The Challenges
An introduction to data protection - 30 Jan 2014
Gdpr for business full
Multi-faceted Cyber Security v1
Preparing your Business for the Data Protection Bill
Data Protection and IDEA

More from G&A Partners (20)

PDF
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
PPTX
What's Going on in Labor and Employment Law: 2016 and Beyond
PDF
How to Respond to Active Shooter Incidents in the Workplace
PDF
Helping Employees Find a Work-Life Balance
PDF
G&A Webinar: Religion in the Workplace: January 2016
PDF
Fundamentals of FMLA
PDF
Breaking Burnout: Understanding & Preventing Employee Burnout
PDF
Preparing For The Affordable Care Act In 2016
PDF
Setting & Discussing Performance Goals
PDF
Best Practices When Issuing Discipline and Terminations
PDF
Building an effective safety culture edits
PDF
Performance Appraisals Webinar
PDF
Recruitment Process Outsourcing Webinar
PDF
Labor and Employment Law 2015
PDF
G&A Partners Webinar - Respect in the workplace
PDF
Professional Employer Organizations: Keeping Turnover Low and Survival High
PDF
Feb 2015 ppaca webinar seth perretta
PDF
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
PDF
Hr audit presentation dec 2014 jll
PDF
Whitepaper: HR Pros & PEOs
G&A Partners Webinar: Legal Pitfalls to Avoid During the Hiring Process
What's Going on in Labor and Employment Law: 2016 and Beyond
How to Respond to Active Shooter Incidents in the Workplace
Helping Employees Find a Work-Life Balance
G&A Webinar: Religion in the Workplace: January 2016
Fundamentals of FMLA
Breaking Burnout: Understanding & Preventing Employee Burnout
Preparing For The Affordable Care Act In 2016
Setting & Discussing Performance Goals
Best Practices When Issuing Discipline and Terminations
Building an effective safety culture edits
Performance Appraisals Webinar
Recruitment Process Outsourcing Webinar
Labor and Employment Law 2015
G&A Partners Webinar - Respect in the workplace
Professional Employer Organizations: Keeping Turnover Low and Survival High
Feb 2015 ppaca webinar seth perretta
Avoiding Unwanted Scrutiny Against Unemployment Insurance Laws
Hr audit presentation dec 2014 jll
Whitepaper: HR Pros & PEOs

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Understanding employee privacy

  • 1. Understanding Privacy in the Workplace Presented by Brittany Cullison, PHR December 1, 2011
  • 2. Important Notice • I am not an attorney. • This is not a substitute for experienced legal counsel. • This is not legal advice.
  • 3. What to expect • Laws that govern privacy in the workplace • What employers can monitor-- and the right way to do it • Employer’s obligations to protect employee’s private information—and best practice guidelines
  • 4. What governs privacy in the workplace? • Fourth Amendment – Not applicable for private employees, but offers protection in some cases for public employees • Electronic Communications Privacy Act – Governs the monitoring and recording of employee electronic communications
  • 5. What governs privacy in the workplace? • FCRA and FACTA – Promotes confidentiality, accuracy, relevancy, and proper use of that information • EPPA – Prevents use of lie detectors in employment practices
  • 6. What governs privacy in the workplace? • ADA and FMLA – Recordkeeping and confidentiality of employee medical information • HIPAA – Privacy of personally identifiable health information • GINA – Restricts employers from acquiring and disclosing employee genetic information
  • 7. What governs privacy in the workplace? • Identity theft laws – Federal and state level • Common Law • Contractual Privacy Claims
  • 8. Employer Rights • Electronic Monitoring – Computers – Emails – Internet Usage- Social Media – Telephone • Video Surveillance • Workplace Searches
  • 9. Electronic Monitoring: Computers • Company issued computers – Employers can monitor – Should have clear policy that dissolves any expectation of privacy • “Personal” files, password protected documents • Personal Computer used for Work – May be subject to discovery in litigation, but typically only if subpoenaed
  • 10. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 11. Electronic Monitoring: Emails • Stored Communications Act – Established in 1986 – Title II of the ECPA – Prohibits unauthorized access to electronic communications stored on a third party site
  • 12. Electronic Monitoring: Emails • Company email – Property of the company – Employer can access • Personal email accessed on company computer – Employer cannot access without employee giving consent – Stored Communication Act
  • 13. Electronic Monitoring: Internet • Internet usage on company device – Employers can monitor – Should have a written policy • Social Networking – Public vs. private – Use caution when disciplining an employee for disparaging comments found – Section 7 of NLRA- applies to union and non- union
  • 14. Electronic Monitoring: Internet • Social Networking – If someone has access, they can share access – Should have a written Social Media policy
  • 15. Electronic Monitoring: Telephones • Business telephones – May be monitored when: • employee has given consent or • “Business Extension” exemption – Personal calls on business phones cannot be monitored • Company issued cell phones – Should have a policy that dissolves expectation of privacy – Searches, reviews, and monitoring should be done only for legitimate, business purposes
  • 16. Video Surveillance • Acceptable in open and public work areas • If recording audio, must comply with ECPA • Limit access to the recorded material to designated management
  • 17. Workplace Searches • Reasonable expectation of privacy – Company property vs. Employee Property – Written policy • Justified Search – Reasonable suspicion – Violation of another company policy • Drug and Alcohol Policy • Weapons in the Workplace • Confidentiality
  • 18. Workplace Searches • Reasonableness – Discretion – Other investigatory methods exhausted – Appropriate scope • Never force an employee to submit to search • Have another witness present during a search
  • 19. Employer Responsibilities • Identify Theft Prevention – Policy, Procedure and Training • Confidentiality of Medical Information • Additional confidentiality and recordkeeping practices • Clearly communicate workplace monitoring policies • Train employees and managers
  • 20. ID Theft Prevention • Evaluate information security and disposal – How easy is it for someone to access your office during business hours? – How long documents stay at the printer before some one retrieves them? – Are documents that contain personal information left out unattended? – Are computer screens being locked every time someone leaves there desk?
  • 21. ID Theft Prevention • Are cabinets and drawers being locked? • Are emails that contain personal information being sent securely? • Are documents properly shredded when no longer needed? • Who in the office has access to sensitive information?
  • 22. ID Theft Prevention • Develop a protection plan – Conduct a “walk through” – Identify potential risks – Create easy to follow guidelines and procedures • Educate your employees – The importance of protecting personal information. – Measure that the company will take to began this process. – How the will be enforced.
  • 23. ID Theft Prevention • Have a Breach Plan – Notify employee, law enforcement and possibly FTC – Notify credit bureaus – Conduct internal investigation – Take steps to minimize or prevent additional loss
  • 24. Confidentiality of Medical Information • Do not request medical exam or make inquiry unless employee poses direct threat or it’s job related and consistent with business necessity • Medical information should be kept confidential and in separate file – FMLA certifications – Worker’s Comp reports – Medical exam results – HIPAA regulated documents, if applicable
  • 25. Confidentiality of Medical Information • Train supervisors on how to respond • Educate employees on what is appropriate to disclose in the workplace
  • 26. Additional Confidential Recordkeeping • Consumer Reports – Reports must be disposed of properly under FACTA • Investigations – Confidential to protect witnesses and accuser
  • 27. Policies • Electronic Monitoring – Define system covered – Business-use only – Discuss prohibited use – Explain consequences – Inform of employers’ right to monitor • Telephone Monitoring – Define purpose of monitoring – Discuss calls that appear to be personal
  • 28. Policies • Social Media – Define what social media is – Apply it to business and personal – Compare to other policies • Workplace Searches – Define purpose and search areas – Ensure that a search is not an accusation – Refusal may lead to disciplinary action or termination
  • 29. Summary • Privacy in the workplace is a combination of employer rights and employer responsibilities • The key to monitoring employees is to dissolve the expectation of privacy • Employee information protection is in the hands of HR