AUSTIN, Texas — A divided House vote provides momentum for Texas employees who wish to shield personal text messages, email passwords under a bill backed by Democratic State Rep. Hellen Giddings and given preliminary approval Thursday.
Proponents say Texas workers need the same social media protections provided in several other states. The bill prohibits employers from asking job applicants or employees for passwords to access their Facebook, Twitter or other personal accounts. Opponents argue it will provide “safe harbor” for employees to steal proprietary information at the workplace through their personal accounts.
No specific penalties are spelled out for employers who would violate the law.
The Texas law is another reminder of the ongoing evolution of Social Media law and regulation as legislators and private businesses struggle to understand how these technologies affect everyone’s rights, obligations and remedies.
If you or your business is concerned about social media legal and regulatory compliance, contact David Adler at Leavens, Strand, Glover & Adler. 866-734-2568 firstname.lastname@example.org.
Tagged: email, employe, employer, Facebook, Privacy, security, Social media, Texas, Twitter, Workplace
December 23, 2012
As a result of the rapid shift in marketing from unilateral one-to-many communications, to the multilateral, many-to-many or many-to-one conversations enabled by Social Media, employees and employers are struggling to manage accounts that are used for both work and personal purposes.
This new phenomenon has benefits, but it also creates a number of legal challenges. For employees, it may result in greater efficiency, more opportunities for authentic customers engagement and the ability to stay on top of the most current grands and business issues. For employers, it presents opportunity to reap substantial benefits from lower communications and customer support costs. For in-house counsel, it raises a host of legal and practical issues with few easy solutions and significant liability and regulatory risks.
First, there are hardware issues. Smartphones, tablets and other personal electronics often have social networking capabilities built in. in addition, they contain contain both personal and business data. Because these devices are always on and always connected, they are more than just personal property. They have become essential business tools. For both sides of the workplace equation, employers and employees must understand where the privacy lines fall between personal versus work-related information.
Second, there are data issues. Employers must balance their needs to monitor employee usage, employees’ privacy concerns, and the risk of liability for theft or exposure of data if a device is lost or stolen, or from lack of proper safeguards on account usage. For in-house counsel tasked with drafting policies to address these risks, , Prior to implementation of any policy, the legal team needs to educate front line employees and management on reasonable expectations of privacy and security and the harms that the organization seeks to prevent.
Lastly, recent cases such as the Cristou v. Beatport litigation, highlight the struggle to define and control the beginning and end of employee social media accounts, ownership and protection of intellectual property and the post termination risks that arise from the absence of appropriate policies.
As we prepare to start a new year, the time is ripe to establish security and privacy policies governing creation, maintenance and use of employees’ social media accounts for work functions. In-house counsel must lead the charge to educate, inform and train employees about privacy, security and evidence-recovery implications associated with use of social media.
Tagged: accounts, attorney, Business, BYOD, Communications, counsel, employee, employer, in-house, infosec, Law, Lawyer, Legal, Marketing, media, Mobile, policies, policy, Privacy, regulation, security, social, Workplace
May 30, 2012
New technologies and services are enabling the growth in employee monitoring, but companies will need to closely manage their monitoring efforts for ethical and legal issues, Andrew Walls, research vice president at Gartner, wrote in the report.
The Legal Ambiguities of Social Media
Human Resource Executive Online
Employers continue to look for guidance on issues related to the evolving use of social media by employees. Creating an appropriate policy remains difficult, but the authors offer some expert advice that may help.
Social Media Changing the Face of Criminal Justice
The Virginia State Bar tracks ethical issues concerning how attorneys communicate by and glean evidence from social media, said James McCauley, ethics counsel for the state bar.
This year, law students will be challenged to address the question of “Under what standard should a court subject an employee’s non-business personal computing activities (eg, social media, documents stored on a personal computer, and/or personal email)?
The Case for Facebook
Consider this a skeptic’s guide to the bull case for the social network. Facebook just had modern history’s worst IPO and it’s down again today by some percentage that will be quoted endlessly. Yet Facebook is still the world’s largest social media platform.
Religious freedom issues at heart of HHS lawsuits, legal scholars say
Catholic News Service
(CNS) — The mass media have done the public a disservice by consistently referring to health reform law regulations so narrowly as the “contraceptive mandate,” because it leads people to think the regulations are a matter of interest only to Catholics.
Firms expected to cyberstalk for security
The research and advisory organisation recently published a report into conducting digital surveillance ethically and legally, and found that 60 per cent of corporations will be monitoring social media channels for security breaches and incidents.
Most Corporations Will Spy On Employees By 2015: Research
The majority of corporations are expected to monitor their employees’ social media interaction by 2015, suggests research by Gartner, published today. This practice could be increasingly adopted to prevent security breaches and incidents.
By John Bowker | MOSCOW (Reuters) – Russian social network VKontakte says it won’t risk going ahead with its planned initial public offering fearing a repeat of the botched Facebook float which left US regulators red-faced.
Got a story? A Question? Please comment. Please follow me on Twitter here: @adlerlaw
Tagged: accounts, breaches, channels, email, employee, employer, incidents, Law, Legal, media, monitoring, News, personal computer, policy, Privacy, security, social, social media policies, World
Early in my law school career, one phrase stuck with me right away: “tough cases make bad law.” This, of course, begs the question, what makes a “tough” case. Usually it’s a unique fact pattern that has limited applicability to a broader spectrum of cases. In the nascent and growing area of Social Media law, there is no shortage of quirky cases.
My hat is off to Eric Goldman who recently blogged about a social media case that is “tough” because of the way that the lawyers framed the issue. On its face, the case of Christou v. Betaport is an unfair competition case between a night club owner and one of his former partners. The case, being tried in a federal court in Denver, Colorado, involves trade secret theft and antitrust allegations and alleged misuse of MySpace “friends.” Essentially, the complaint alleges that Roulier, a principle of Beatport and former associate of Christou, used a MySpace account to promote his club at the expense of Christou.
Goldman gets to the heart of why this case is tough: “the plaintiffs allege that they “secured the profiles through web profile login and passwords.” This is a garbled allegation.” Put another way, the lawyers whose job it is to supply the facts that frame the issues, probably meant to say something else. According to Goldman the plaintiffs probably meant that the defendants accessed an account impermissibly and in so doing accessed information they did not have a right to access. In terms of a claim for trade secret misappropriation, the harm came when defendants used that information.
I like Goldman’s article because he takes the time to break down both the confused framing of the issue, but also the court’s apparent confusion with how to address it. It’s a short article and definitely worth the few minutes it takes to read.
From my perspective the key take-away is a perspective on the trade secret implications of Social Media accounts. Business and their lawyers are constantly trying to evaluate the legal risks of Social Media and provide guidance on how best to mitigate those risks.
Protecting a Social Media account as a trade secret seems a tricky proposition. Ostensibly, the primary “value” of an account is the list of “followers.” A list that is publicly available is, therefore, not a secret. A better approach is to treat the login credentials themselves as the trade secret since this control’s ones ability to access the account and to communicate with those followers.
Please feel free to comment and follow me here: @adlerlaw
Tagged: Beatport, Confidential Information, Confidentiality, employee, employer, Law, lawsuit, Legal, litigation, Misappropriation, MySpace, Social media, Trade Secret