Category: 该律师

在这里你可以阅读最新的文章出来的律师的观点,在那里你可以阅读有关监测的最新法律新闻在美国和国外的

  • 监控员工智能手机的GPS位置

    employee-gps-law2

    市场上出售各类GPS跟踪设备。您身为雇主,完全可以在公司的汽车上安装GPS跟踪设备。您也可以在员工的ID证件上安装跟踪设备。甚至在员工的私家车上安装跟踪设备……也是可行的。在某些情况下,您可以在员工外勤时使用的私家车上安装GPS跟踪设备,以此对他们的行踪进行有限的追踪

    但是,安装GPS跟踪设备有很大的局限。这只能让您跟踪员工的汽车行踪,而不是他们自身的行动轨迹。
    您如何才能跟踪员工的位置?您如何才能知道员工真的参加了您已为其支付高额费用的工作研讨会,而不是擅自跑去赛场作乐呢?

    一种方法就是将员工的ID证件用作跟踪器。但这只限于工作场所,员工取下ID证件后就不起作用了。

    智能手机是令人惊叹的设备,因为手机能够像安装好的GPS设备那样,准确地跟踪和传输目标人物的位置信息。由于需要准确定位911呼叫者,GPS发射器几乎成了手机的一项标准配置—事实上,许多州都要求待出售的手机要配有发射器。更令人惊奇的是,虽然GPS发射装置和手机提供类似的数据,在这两种设备在法律上却受到不同的监管。

    员工GPS跟踪法

    如今,利用GPS跟踪技术锁定员工在工作场所的位置已经变得相当普遍。超过53%的雇主都通过GPS技术来跟踪员工及其车辆。即使是手下只有8名员工的雇主,利用某种技术来跟踪员工也可获取一定的经济效益。

    通过研究纽约州最近两次的上诉判决,我们可以了解法院为何采用不同的标准来确定雇主进行GPS跟踪是否合法,具体取决于跟踪操作否是通过安装在车内的设备或是智能手机来进行。

    要想了解使用GPS跟踪设备的合法性,首先必须注意是否存在涉及隐私问题的使用限制。

    首先,没有任何联邦法规禁止雇主通过手机GPS跟踪来锁定员工的位置。其次,只有康涅狄格州要求雇主对手机进行GPS跟踪时需要发出通知。加利福尼亚州和得克萨斯州最近通过立法,要求雇主在汽车上安装跟踪设备需要发出通知。

    因此,没有法律规定限制雇主使用GPS跟踪设备对员工进行跟踪。

    我们建议所有雇主都对该项政策发出相关通知,并使员工以书面形式表示已经了解该项政策。

    现在有三个州要求雇主利用GPS跟踪技术监控员工在工作时间的行踪时,必须向员工发出通知。这并非主要的限制条件。事实上,我们建议所有雇主都对该项政策发出相关通知,并使员工以书面形式表示已经了解该项政策。

    虽然没有法定的隐私法规显著地限制在工作场所使用GPS定位跟踪技术,但法院已经开始考虑这个问题,并可能根据此类监控的州法律,对限制条件确立了一些指导原则。

    法院历来发现在工作场所监控方面,无法期待高度的隐私保护。除非侵犯隐私会达到高度涉及员工个人信息的不合理程度,否则此类监控行为不会被视为侵犯员工的隐私权

    在进行GPS跟踪之前,法院在确定此举是否侵犯隐私时,需审查是否存在相关人员合理期待隐私的曝光区域,以及入侵者的动机和目标是否侵权。(参见Miller v. NBC, 187 Cal.App.3d 1463, 232 Cal.Rptr. 668 1986)和Shulman v. Group W Productions, 18 Cal.4th 200, 955 P.2d 469, 74 Cal.Rptr.2d 843 1998。

    监控员工GPS位置—第一案例

    第一个员工GPS监控案例发生在纽约。在纽约上诉法院审理的Cunningham v. New York State Dept. of Labor(纽约州劳工部)(2013 NY Slip Op 04838)案例中,通过私家车上安装的GPS跟踪设备取证,最终判定员工Cunningham应该受到法律制裁。

    Michael Cunningham曾在州劳工部担任管理职位。他在该部门的工作时间长达20年,其中多数工作任务都在现场或远程地点完成。

    雇主怀疑他提交虚假的工作时间报告,并且擅自缺勤。他们认为Cunningham虽然声称商务出差延时,但实际上早于工作表中记录的时间回家。

    雇主聘请调查人员跟踪Cunningham的汽车,以证实他们的怀疑。Cunningham多次成功地躲避了调查人员的跟踪。此后,雇主在Cunningham不知情的前提下,在他私家车的轴距上安装了GPS跟踪设备。

    雇主在长达一个月的时间内,一直跟踪Cunningham私家车的行踪。期间,GPS跟踪设备更换了两次。雇主使用跟踪设备取得的证据,向Cunningham提出违纪指控,最终与后者终止雇佣关系。

    复审法院表明,雇主通过使用GPS跟踪设备,确认对Cunningham缺勤和工作记录的怀疑合情合理。此外,跟踪Cunningham私家车的时间长达一个月,这也是合理的跟踪时长。

    然而,法院也判定搜查工作侵扰过度。因为雇主24/7不间断跟踪Cunningham私家车的行踪,其中的大量时间段都并非Cunningham的工作时间,因此搜查工作超过了允许的范围。雇主在监管过程中两次更换了GPS装置,期间可以轻易地在Cunningham休假期间将装置移除。法院认为,雇主没有做出合理的努力,避免在Cunningham的工作时间之外进行跟踪。

    几个月后,美国最高法院在一个刑事案例中遇到麻烦,但已对于在汽车上安装GPS设备的行为造成了冲击。在United States v. Jones 132 S. Ct. 949, 565 U.S. ___ (2012)案件中,Scalia法官认为,需要在汽车上安装GPS设备的侵入行为已经侵犯了个人隐私。此外,协同意见书表明,任何长期的GPS跟踪都会侵犯个人隐私,因为这会泄露出大量的个人信息,包括家庭、政治、宗教和两性关系等。

    然而,手机并未在法院受到平等的待遇。在United States v. Skinner 690 F.3d 772 (6th Cir. 2012)案例中,法院认为手机的位置发射信号并没有合理地牵涉到个人隐私。如果其中牵涉到个人隐私,那么利用嗅觉灵敏的狗来追查嫌疑人也会构成侵犯隐私。在Skinner案件中,法院对Jones案件中将GPS设备置于私家车内的行为,以及使用个人手机信号来跟踪定位的行为明确区分开来。前者涉及非法侵入,后者则没有。

    相比在私家车内放置GPS设备,利用手机进行跟踪能够得到优先的隐私待遇。因此,雇主似乎应该更合乎逻辑地采用手机中的GPS跟踪技术,而不是在员工的私家车内放置跟踪设备。虽然用GPS跟踪公司配发的车辆在商业方面仍然具有充分的理由,但跟踪员工的行踪可能更重要,在家庭办公和远程办公的条件下更是如此。一项针对美国各地专业人士的调查显示,56%受调查专业人士拥有的智能手机都是由雇主付费的 因此,雇主可以配发安装GPS跟踪软件的手机,以便于监控员工的行踪。我们再次建议雇主监控员工时应该发出通知,特别是可能在非工作时间进行监控的情况下。对于 Cunningham案件中最终失败的隐身监控示例,这是一个有吸引力的替代方案。Cunningham案件中的监控范围过于宽泛,最终导致侵犯了员工合理期望的私隐权。

  • 我可以监控孩子的手机吗?

    38percentofyoungpeoplehavebeenaffectedbycyberbullying

    您是否在担心自己的孩子?

    他们和谁在一起?他们放学后都做些什么?是否有人在欺负我的孩子?我的孩子是否在吸毒?

    身为父母,为孩子担心这些问题是很正常又合理的。

    您可能为孩子买了一部手机—外形靓丽的iPhone或是高技术含量的安卓智能手机。

    如果您知道孩子手机上的所有信息,那就不必再担心很多问题了。您也可以在必要时予以干涉,以便保护您的孩子。

    监控孩子的手机会带来怎样的法律后果?您的孩子会对您提起诉讼吗?

    父母-子女免责:长久以来,父母侵权豁免原则禁止子女对父母提出索赔。父母侵权豁免原则起源于美国的Hewellette v. George判决,编号为68 Miss. 703,9 So. 885(1891)。在本案中,未成年的女儿被母亲送进精神病院时间长达11天,因此使其遭受了精神痛苦和性格创伤。但判决结果阻止女儿针对已故母亲的财产提出损害赔偿。理由如下:

    “‘社会及组成社会的家庭之安宁以及健全的公共政策,旨在维护家庭稳定和社会的最佳利益,禁止未成年子女出庭针对父母造成的人身伤害提出索赔。本州通过刑法保护未成年子女,使其不受父母所施暴力和不法行为的侵害,这是子女应有的权利。’

    Hewellette法令规定如下,“只要父母有义务照顾、指导和监控子女,子女就该相应地接受帮助、安慰并服从,不得做出诸如针对父母提出赔偿等行为。”

    美国50个州都在立法或司法(由州级最高法院裁定)方面采用本原则。加利福尼亚州采用司法豁免权原则(Trudell v. Leatherby (1931) 212 Cal. 678 [300 P. 7],行动受限的未成年子女不得针对父母的疏忽提起诉讼,因为子女起诉父母将“给家庭带来纷争,破坏家庭的安宁与和谐”)。

    父母-子女免责终止:现在,几乎所有州都摒弃了绝对的父母-子女免责原则,特别是考虑到父母针对子女的故意侵权行为(即侵扰和虐待儿童)。许多州已经废除了疏忽索偿原则,并使父母对疏忽行为投保,这就确保子女投诉父母不会破坏家庭和睦,因为索赔针对的对象是父母选择的保险公司(即允许存在汽车疏忽诉讼—现在的保单普遍排除这一项保险内容)。

    • Goller判决—一般父母疏忽免责

    一些司法管辖区意识到有必要继续保护亲权及家庭和睦,因此尝试将免责原则仅限于因“行使亲权……[或]行使与提供食物、衣服、住宿、医疗/牙医服务及其它服务等一般父母裁量权”而引起的疏忽行为。Goller v. White,20 Wis. 2d 402,122 N.W.2d 193 (1963)。

    其依据是,父母有权按照自己的意愿抚养子女,法院不得进行不当干预。父母应可自由决定子女的身体、精神、情感和智力成长情况。每一位父母都有着独特的育儿理念,父母监管涉及到这些考虑因素。法院或陪审团在不取代父母个人理念的前提下,无法对此类高度主观的因素进行评估。

    多数州都遵循从Goller判决演变而成的Wisconsin判决,具体如下:父母免责原则应被废除,但以下两种情况除外:(1)被指控的疏忽行为涉及对子女行使亲权;(2)在被指控的疏忽行为涉及行使一般的父母裁量权,相关方面包括提供食物、衣服、住宿、医疗/牙医服务及其它服务。

    • Gibson判决—合理父母标准

    加利福尼亚州已经率先完全废除了父母免责原则,许多州也在尽力采用加利福尼亚州在Gibson v. Gibson (1971) 3 Cal.3d 914案例中施行的“合理父母”规则。Gibson判决在Goller判决之后确立,认为“父母可对未成年子女行使某些权力,但对他人行使这些权力时将会构成侵权行为。例如,父母可以体罚举止不当的子女但无需在法律上对殴打行为承担责任,或者可将子女暂时关在房内作为惩罚,但不会在法律上对非法监禁行为承担责任。”

    Gibson采用称为“合理父母”标准的下述规则:“法律授权父母抚养和管教子女,并使其有权做出相应的合理行为,因此父母在行使职能方面具有广泛的裁量权,但其中并不包括在超出合理的管教范围外,故意造成人身伤害的权利。虽然父母有特权和责任对未成年子女行使亲权,但必须在合理范围内行使这种特权。适用的标准是从父母的角度考虑的合理传统标准。因此,我们认为应以下述准则适当地测试父母的行为:一般合理并且审慎的父母在类似情况下会怎么做?”

    法定监管必不可少:俄勒冈州儿童监管法

    对于有过犯罪行为的子女,父母有时须对其通信情况和行踪进行监管。例如在俄勒冈州,子女若是违反烟酒、逃学和宵禁等法律规定,父母将受到刑事处罚(仅罚款100美元)。父母为了逃避刑事责任,必须向警察报告此类行为,或者采取合理措施来监管子女。(《俄勒冈州修订法令》,133.07项(监管子女失责))。

    父母侵扰子女的责任: 不要侵入子女的Facebook账户 尽管目前还没有子女因为父母监控他们的手机和互联网通讯活动,而提出侵犯隐私的诉讼案件,但在近期的一个案例中,一位家长显然对子女监管过度。

    阿肯色州的一位17岁男孩没有关闭自己电脑上的Facebook页面。他的母亲在该页面上读取了他输入的信息,并且不安地发现儿子表明自己遭到了母亲的家暴。于是,这位母亲更改了儿子的账户密码,并在数周内假冒儿子的身份,开始向他的Facebook好友发布大量的虚假信息和诽谤言论。她还通过短信和Facebook向儿子发送粗俗不堪的通讯内容。

    这个男孩向警察举报。他的母亲被逮捕,经过审判后被判定了侵扰罪行。她被判处1年缓刑,罚款435美元并参加愤怒管理班。

    父母须知:您有权也有责任监管子女的手机和互联网通讯情况。虽然针对子女的监督和监管行为都处于法律规定的范围内,但父母在超越亲权范围之外故意侵害子女,将被追究民事和刑事责任。而在某些情况下,当事人公开披露个人通讯信息,可能会因诽谤、侵扰或侵犯他人隐私权而被追究民事或刑事法律责任。

     

     

  • Scammed by Spyphone Software? Here’s What To Do

    Scammed by Spyphone Software? Here’s What To Do

    At Flexispy, we are always trying to get consumers the best value for their money. As part of achieving that goal, we actually buy and test all Spyphone software on the market. That way, we can tell customers what they can expect when they purchase any brand of Spyphone software.

    One thing we abhor is companies that sell Spyphone apps that plain just don’t work. This makes the entire industry look bad. We want customers to come to us because our products are the best on the market. When customers spend their hard-earned money on something that doesn’t work, that often means they give up, reasoning all Spyphone software is a scam.

    With that in mind, we would like to share our experience with one particular brand.

    We purchased the software, Cell Spy Stealth, on February 6, 2014 from the website, www.iphone-spy-app.com. The cost was $27.00. When we clicked the button to make the purchase, we were redirected to http://www.cellspymonitoringsoftware.com.

    We were intrigued by their website, because they advertise that you can install the software on a target phone, without having physical access to that phone and then intercept any call made or received on the target phone.

    Cellspymonitoring screenshot

    After purchasing the software, we downloaded it as instructed, we tried installing it on the android platform, the iOS platform and the Blackberry platform. The installation was unsuccessful on all three.  Our company has technicians with years of experience installing Spyphone software onto phones. And, even they couldn’t get this app to work.

    As instructed by their website, we submitted a ticket to their support team. We asked for a refund, because the software wouldn’t install. On their website, they guarantee customer satisfaction with the product and promise a full refund if dissatisfied with the product within 30 days of the purchase, no questions asked.

    Really an iron clad guarantee?

    biglinebreak

    After submitting our ticket for a refund, we received this email from [email protected]

    Here's their repsonse to our request

    biglinebreak

    We never heard from them again. Yep, $27 down the drain. What a rip-off! But, you don’t have to kiss your money goodbye. At Flexispy, we’re going to help you get your money back.

    How to raise a dispute, and do a chargeback on your credit card

    When you purchase any software, take the time to read the legal disclaimer and the terms and conditions of the purchase. It will save you a lot of headaches and disappointment down the road. Here’s the relevant legal disclaimer for our purchase:

    Software Download Return Policy:  All sales final. In-store credit only.

    If there is a problem with the download, please contact us via email for a quick resolution.

    Ummmm . . . what happened to my iron-clad 100% money back guarantee?

    Never fear. With a credit card purchase, you can always get your money back. It may take a little time, but don’t let the scammers win.

    But didn’t the company’s email say that it is illegal to file false and fraudulent chargebacks and disputes with my credit card company?

    LOL, the scammers who sold you worthless software and took your hard-earned money are threatening you with legal action if you file a chargeback?

    It is your right as a credit card customer to file a chargeback or dispute, if the product you purchased does not conform to your reasonable expectations as a consumer based on the marketing information provided by the seller.

    So, here’s what we did to get our money back.

    We first contacted our credit card company and informed them that we want to file a chargeback for this purchase. We told them the date and amount of charge. They emailed us a form to complete, which identifies the seller, the charge and the reason for the chargeback. We emailed it back with a copy of our emails with the seller. Our credit card company investigates, tries to get a response from the seller, and then reverses the charge. Simple as that.

    But we didn’t stop there.

    How to file a complaint with the payment gateway provider

    When you purchase something on a website, usually your purchase goes into a shopping cart, and when you checkout to pay, you are taken to a different website, called the Payment Gateway.  The payment gateway is the lifeblood of the ecommerce seller, because it processes all its credit card transactions.

    Payment gateways carefully watch the number of chargebacks and refunds for credit card transactions that they process, as there can be a risk if the amounts are particularly large. They may close their payment gateway service to the seller, or charge higher transaction fees, if they detect a pattern suggesting potential consumer fraud. Payment gateway providers are particularly interested in refund policies and whether the seller is living up to the refund policy as it is presented to the customer on the seller’s website.

    CellSpyMonitoringSoftware uses Plimus as its payment gateway provider.  Plimus is a very reputable company, and handles a lot of ecommerce software credit card transactions.  Plimus has its own support system for handling complaints that cannot be resolved with the seller.

    We submitted our ticket to Plimus’ service center so that we could escalate our request for refund. We do not expect Plimus will be able to get our refund, as that usually has to be obtained through a credit card chargeback. However, we are certain that our email has created a red flag about this seller and that Plimus may take some action as a result of this.

    So, don’t accept that the Spyphone software you purchased is just a scam and that you threw away your money. Get your money back through a credit card chargeback and take the seller to task.

    Or, why don’t you try Spyphone software that works? Flexispy will discount your purchase of our product in exchange for turning over your current Spyphone license key to us. Get the results you want, and trade in that worthless app. Go with the first and proven leader in Spyphone technology. 

  • GPS Tracking – How Far Can the Employer Go?

    GPS Tracking – How Far Can the Employer Go?

    There are many reasons an employer may want to use GPS location tracking technology to monitor the whereabouts of its employees.

    These are some examples of where GPS tracking might provide some degree of help in the workplace:

    • You suspect an employee of misusing company time to conduct personal business;
    • You suspect an employee is engaged in illegal behavior, such as pilferage or drug use;
    • You suspect an employee is misusing company paid sick leave;
    • You suspect an employee of misappropriating company secrets or colluding with a competitor;
    • You are concerned about whether an employee is on a personal diversion rather than his appointed task when using his personal vehicle.

    These however,  are only a few examples of where an employer may consider engaging in Geo-location to confirm reasonable suspicions about a particular employee.

    The question then arises, what can the employer legally do to obtain some evidence to confirm these suspicions?

    For company-owned vehicles, the law is clear that an employer may put a GPS tracking device on the vehicle. The company-owned vehicle is the employer’s property, and its use for a business purpose is an extension of the workplace.

    Car Capture
     

    In O’Connor v. Ortega  480 US709 (1987), the US Supreme Court held that workplace searches never require a warrant. Also see,  Matter of Caruso v. Ward72 NY2d 432 (1988)(applying New York law, random workplace drug testing does not require a warrant).

    But what about placing a GPS tracking device on an employee’s personal car? Is this ever legal?  What restrictions and limitations apply?

    Employers now have guidance in this matter.

    In Cunningham v. New York State Dept. of Labor (2013 NY Slip Op 04838), New York’s Appellate Division heard a case in which the employee was subjected to discipline based on evidence obtained through the use of a GPS tracking device installed on his personal car.

    Michael Cunningham worked in the state’s department of labor in a management position. He was a 20-year veteran of the department and much of his work was performed either in the field or in remote locations.

    His employer suspected that he was submitting false time reports and taking unauthorized absences. They believed he was claiming he was on extended business trips, when he had actually returned home much earlier than his timesheets showed.

    The employer hired an investigator to follow his car to confirm their suspicions. Cunningham was successfully able to elude the tailing investigator several times. Thereafter, the employer attached a GPS tracking device to the wheelbase of Cunningham’s personal car, without Cunningham’s knowledge.

    The employer tracked the movements of Cunningham’s car for one month. During that time period, the GPS tracking device required two replacements. Through the evidence obtained by the tracking device, the employer brought disciplinary charges against Cunningham which resulted in termination of his employment.

    handwithgps

    The reviewing court found that the use of GPS tracking device to confirm suspicions about Cunningham’s absences and timekeeping records was reasonable.  It further held that tracking the car’s movements for one month was a reasonable length of time.

    However, the court also ruled that the search was excessively intrusive. Because the employer was tracking the movements of Cunningham’s car 24/7, and this would include considerable time periods when Cunningham made no claim that he was working, the search exceeded its permissible scope.  The employer, who replaced the GPS device twice during the surveillance, could easily have removed it when Cunningham took a personal vacation.  The court found that the employer failed to make a reasonable effort to avoid tracking Cunningham when he was outside of business hours.

    Generally, New York’s privacy protection with respect to GPS tracking is stated broadly in its State Constitution. The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.  NY State Constitution, Article I, Section 12

    In Cunningham, New York’s appellate division concluded that the placement of a GPS tracking device on an employee’s personal car is not subject to the constitutional warrant requirement, because a personal car which is used in any way for a business purpose is an extension of the workplace.

    Thus, the court has distinguished the employment setting from the police investigation setting.  Cf People v. Weaver, 12 NY3d 433, 447(2009)(holding the attachment of a GPS tracking device to a suspect’s car always requires a court-issued warrant supported by probable cause).  United States v. Jones  132 S.Ct. 945 (2012)(holding attachment of GPS tracking device to a suspect’s car is a trespass and requires a warrant.)  Interestingly, that distinction means the case is inapplicable to other GPS tracking technology, such as mobile phone GPS tracking applications.

    Yet, an employer who has reasonable grounds to use location tracking technology on the employee’s car, must monitor with reasonable care.  Constant tracking of an employee’s car is liable to violate the employee’s right of privacy.
     

    Don't spend too much time monitoring their gps

    Security companies that manufacture GPS tracking devices would be wise to design the device so as to allow employers to turn the monitoring function off during non-working hours and weekends. This would avoid the Cunningham situation, where the employer’s reasonable use of the GPS tracking device was made unreasonable by being overly intrusive into the employee’s private life – the employee’s off-work hours.

    As an employer, if you are going to use GPS tracking devices, you should make sure that the device has a scheduler and that your HR department creates a policy that the employer will reasonably refrain from using GPS tracking during off-work hours.

    You should also make sure that your HR department thoroughly documents any targeted GPS location tracking of an employee’s personal car. They should detail the suspicion that surrounds the employee’s conduct, why less intrusive means of investigation would not be effective, and the proposed limits of the surveillance that will be used during the investigation of the employee.

  • Keyloggers In The Workplace – Is It Legal And Should it be Mandatory?

    Keyloggers in the workplace

    The use of Keyloggers by employers is becoming commonplace. As an employer, you should be asking, what is a Keylogger? Is it legal to monitor my workforce, and, should I be monitoring my employees?

    A Keylogger is a computer program designed to record every action on a personal computer. This not only includes every keystroke, but also every website visited, every email read or sent, every password entered, and any applications or programs run on the PC.

    In examining U.S. law in this area, it has been noted that there is no federal statutory framework which covers the use of Keyloggers by employers. The Electronic Communication Privacy Act (ECPA), the Federal Wiretap Act (FWA) and the Stored Communication Act (SCA), all of which could reach Keylogger activity, have never been extended to protect computer privacy in the workplace, or even in the home.

    So, while judicial interpretation of the ECPA has broadened its scope, it still does not reach Keylogger technology. As a result of that legislative gap, state courts have searched their own legislative schemes in an attempt to protect the privacy of computer operators.

    For instance, a federal court in Indiana heard a case in which a woman was authorized by her employer to access her personal checking and email accounts from her work computer. The employer failed to notify her that they had installed Keylogger software on her work computer. Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011)

    The employer used the password discovered through the Keylogger software, and reviewed both her personal email and checking account history. There were several emails between company management, discussing the contents of those histories.

    Importantly for employers, the federal court ruled that the FWA was inapplicable, because the keystrokes recorded by the Keylogger software remained on the PC, and were never transmitted through interstate commerce.

    The court, however, went on to review whether the employer’s conduct violated the state of Indiana’s wiretap act. The court noted that the Indiana statute does not include the requirement that the communication be intercepted through interstate commerce, and, therefore, held that the state wiretap law was applicable to Rene’s claim.

    Additionally, the federal court ruled that the Stored Communications Act, was also applicable to Rene’s claim. The Keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.  However, the employer’s conduct in using the passwords to review Rene’s histories (stored communications) would be covered by the SCA.

    Other states have held that the use of a Keylogger violates state privacy laws. In a New Hampshire decision, a court held that obtaining a password through use of a Keylogger, and then using the password to access the computer user’s email history does violate the state’s wiretap act. In State of New Hampshire v. Walters, the court excluded any evidence related to emails which were uncovered by the former housemate of the defendant, because the emails were obtained in violation of the wiretap act which protects privacy from illegal interception of wire communications.

    The WPA is a criminal wiretapping law, so it is no surprise that the use of a Keylogger by an employer can be prosecuted. In Ropp v. United States, 347 F.Supp.2d 831 (CD Cal. 2004), a California federal court considered whether an employer’s use of a Keylogger could violate the criminal provisions of the WPA.

    Ropp, worked as a manager for an insurance company and installed a Keylogger on the computer of one of his subordinates. The court began its inquiry by noting that the WPA affords greater privacy protection to wire and oral communications as opposed to electronic communications.

    The federal court dismissed the indictment against Ropp, finding the Keylogger only intercepted internal communications between the keyboard and the CPU, as opposed to the signal being intercepted on transmission to the company’s network, which was attached to interstate commerce.

    The Ropp decision, however, did not put the issue to rest in California. In Brahmana v. Lembo(N.D. Cal. 2011), the federal court questioned Ropp’s restrictive interpretation of the definition of electronic communications found in the WPA.

    Brahmana was a sales manager for a VOIP company located in Silicon Valley. Brahmana discovered that emails he had sent on his work computer had been read by the company president through a Keylogger which was installed on Brahmana’s computer. In light of the fact that the keystrokes had been read over the company’s network, the court concluded that there were sufficient facts to allow the case to proceed through discovery as the network might have affected interstate commerce.

    We started this discussion by asking what a Keylogger is. The Keylogger in Ropp was actually a machine which recorded the keystrokes of a PC’s keyboard as they were traveling from the keyboard to the PC. In Brahmana, the Keylogger was a network analyzer, which records all the activity of a PC through a network connection to a server.  The advancement of Keylogger technology probably puts it squarely within the prohibitions of the ECPA and WPA.

    The second question was whether the use of a Keylogger by an employer is illegal. Here’s a list of points to ensure that the employer’s use of a Keylogger stays within both state and federal law:

    • As the workplace PC is the employer’s property, the employer may install a Keylogger on an employee’s PC without concern for trespass.
    • Use of a networked Keylogger probably violates federal and state privacy and wiretap laws and requires the consent of the monitored employee. An employer should disseminate a policy stating that all employee work stations are monitored and have the employee acknowledge receipt of that policy. This will satisfy the consent requirement to take the monitoring outside of the wiretap laws.
    • An employer should not allow anyone access to passwords for an employee’s private accounts which are recovered through use of the Keylogger. Under no circumstances should an employer use the passwords to browse the employee’s private account history. To do so risks a serious civil damage recovery under the Stored Communications Act.

    This takes us to the last question, should you, as an employer, be monitoring your employees through use of a Keylogger.

    This question is answered with a resounding, “YES”.

    In the risk management arena, there are too many potential liabilities carried by providing employees with unlimited network and internet access. These liabilities include:

    •   Damage to Business – making sure communications with persons outside your company are correct, polite and consistent with your business goals

    •   Risk Management – monitoring for potentially abusive behavior, such as sexual harassment, bullying or racial hate speech

    •   Trade Secret or Data Theft – keeping watch for the loss of important  company secrets and data

    •   Illegal Behavior – such as workplace theft, embezzlement and drug abuse

    •   Productivity – the internet and computers can be time-wasters.  Even if you block Facebook, there are other time-wasting websites, games and other forms of entertainment which can seriously impact on productivity.

    •   Loyalty – is one of your key staff members loyal, or plotting to knife you in the back?

    In light of these liabilities, it almost seems like use of Keyloggers in the workplace by should be mandatory. Just make sure to keep within the law, by publicizing and receiving acknowledgement of your monitoring policy, keeping the persons with access to the Keylogger data to an absolute minimum, and never using any private passwords obtained from the Keylogger to access the employee’s private accounts.

  • How to Comply With Business Call Monitoring And Recording Regulations In The UK

    How to Comply with Business Call Monitoring and Recording Regulations in the UK

    Technology now makes it possible for employers to keep track of virtually all workplace communications by any employee, on the phone and in cyberspace, whether at their desk, on their mobile, or even outside the office. Many employers take advantage of these tracking devices: A survey of more than 700 companies by the Society for Human Resource Management (SHRM) found that more than half of all employers are monitoring their employees’ telephone calls.

    There are a number of reasons that employers would want to monitor or even record the phone calls of their employees, such as quality assurance, customer relations and training. Employers may also want to take steps to make sure employees are not giving trade secrets to competitors, engaging in illegal conduct at work, or using company communications equipment to harass or bully their coworkers.

    In the UK, prior to 1985, there was no statutory regulation of interception of phone calls, whether it be for personal or business reasons. With respect to governmental surveillance, it was carried out under the Royal Prerogative, with the only oversight being the informal “judges rules.”

    Moreover, for private citizens, under British common law, there is no right of privacy.  This means that individuals cannot bring claims for invasion of privacy unless there is a specific tort, legislation or regulation that has been violated.

    Early attempts to enact legislation to fill the gap in British call interception law ran afoul of the EU’s Declaration on Human Rights and were voided by decisions of the Strasbourg Court.

    The Regulation of Investigatory Powers Act 2000 changed that, and now provides most of the framework for call interception, and monitoring or recording of phone calls.  However, it soon became apparent after its enactment, that businesses which had a need to monitor and record their employee calls were not covered by this legislation.

    Accordingly, the Telecommunications (Lawful Business Practice)(Interception of Communication) Regulations 2000 were also enacted. Commonly referred to as the LBP, the regulations were designed to maximize the ability of companies to monitor employee communications while providing some protection for privacy.

    Under the LBP Regulations, monitoring or recording communications is legal if it is done for these reasons:

    •  to establish the existence of facts;

    •  to ascertain compliance with regulatory practices or procedures;

    •  to demonstrate standards which should be achieved (quality control and training);

    •  to prevent or detect crime;

    •  to detect unauthorized use of a telecommunications system;

    •  to secure effective system operation;

    •  to determine whether communications have a business or personal purpose; or,

    •  to monitor customer support lines.

    Most importantly, the business must make reasonable efforts to notify persons using the telecommunications system, that interceptions may be made. This can be accomplished through dissemination of a company policy statement, or through a recorded announcement at the start of a call.

    Under the LBP, employers in the UK are free to monitor any phone calls made by its employees. Technically, the regulations require that once an employer determines that the call is personal, and, not business-related, the monitoring should cease.  However, there could be a number of reasons for continuing the monitoring of the call, including the following:  to detect improper use of company equipment; to reduce time-wasting activities which adversely affect productivity, to prevent or detect crime, and also to determine adherence with other company policies (ie, harassment, bullying or gambling).

    If the employer records the phone calls of its employees, the use and storage of those recordings is regulated by The Data Protection Act 1998. The DPA was enacted to protect the privacy of the data contained within the recordings. The act requires obtaining the consent of the call participants if the contents of the call are disclosed to third parties. It also requires companies to develop systems and procedures for maintaining the confidentiality and security of the data.

    Below are the basic guidelines of the DPA, as it applies to companies that are recording employee phone calls for internal purposes only (marketing, quality assurance, training, customer care, detection of illegal or prohibited behavior):

    • Data can only be used for the explicit purpose for which it was gathered.
    • Data cannot be released to a third party without the consent of the individual it refers to, unless there is a lawful reason to do so – for instance, the prevention or detection of criminal activity.
    • Personal data cannot be kept for longer than is necessary and must be kept up to date.

    Tips for Staying Within the Law

    Employers in the UK currently have a lot of leeway in monitoring their employees’ communications, as mentioned in the Eavesdropping in the UK article. However, the law in this field is evolving rapidly, as technological change and increasing concerns about privacy pressure Parliament, regulators, and the courts to take action. If you decide to monitor employees, consider these tips:

    Adopt a policy. Tell your workers that they will be monitored, and under what circumstances. If you indicate that you will respect the privacy of personal phone calls or email messages, make sure that you live up to your promise. The safest course is to ask employees to sign a consent form, as part of their first-day paperwork, acknowledging that they understand and agree to the company’s monitoring policies.

    Monitor only for legitimate reasons. You will be on safest legal ground — and waste less time and money — if you monitor only for sound, business-related reasons. If you have a reasonable suspicion that a particular employee is engaging in unauthorized use of your equipment, that would certainly qualify as legitimate cause for monitoring.  Equally sound reasons include keeping track of productivity or monitoring the quality of customer service.

    Be reasonable. Employees will not perform their best work if they are in constant fear of eavesdropping. Overreaching monitoring – or unnecessarily Draconian policies about personal use of communications equipment – will only result in employee resentment and attrition.  It is reasonable to prohibit workers from spending hours on the phone wooing a lover or catching up on gossip with an old friend.  But it is unreasonable to prohibit brief personal calls of the “I’ll be home late” or “where shall we meet tonight” variety.

  • Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Every employer understands that there is sometimes a need to do some investigative work. You might be checking out a new hire, or be suspicious of one of your employees who is entrusted with confidential or sensitive information.

    Employers should be monitoring the use of company computers and company phones by their staff. In the course of monitoring, an employer might obtain an employee’s login details or password for personal accounts – Facebook, email, bank accounts.

    What is the law if the employer logs in to the employee’s account? Is it illegal? Can the employee sue the employer?

    This is a relatively new area of privacy law in the US, and it touches both on federal and state regulatory schemes.

    On the federal level, the Stored Communications Act, 18 U.S.C.§2701, was enacted as part of the Electronic Communications Privacy Act.  It protects electronic communications that are kept online.  Recognizing that the reasonable expectation   of privacy of these records and the interpretations of the 4th amendment’s prohibition against unreasonable search and seizure which offer protection for physical locations, Congress established stiff criminal penalties for unlawful access or changes to these online records.

    This law famously came into play in a case of internet snooping, dubbed “WebcamGate”.  The case arose when a school district issued laptops to students which gave the school control over the laptops’ webcam.  The school district administrators did activate the webcams without knowledge of the students or their parents.

    A class action lawsuit ensued, which was eventually settled with the school district.  In that action, a claim was made under the SCA for civil damages for unauthorized access of the records which would be maintained on the laptops, namely the photo files. The case was quickly settled, so the Court never ruled on the SCA claim.

    Subsequently, another federal court did find that the unauthorized accessing an employee’s personal accounts through use of a password captured from a keylogger was a violation of the SCA.  In Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011), a woman was authorized by her employer to access her personal checking and email accounts from her work computer.

    The employer failed to notify her that keylogger software was installed on her work computer.  Her passwords were discovered through keylogger software.  Her employer reviewed both her personal email and checking account history using the captured passwords.

    There were several emails by and between company management, discussing the contents of her personal account histories.  The court reviewed whether the employer’s conduct violated the Stored Communications Act.

    The keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.  However, the employer’s conduct in using the passwords to review Rene’s histories (stored communications) would be covered by the SCA.

    With respect to social media networking sites, the SCA first came into play in Pietrylo v. Hillstone Restaurant Group (NJ, 2009).  Pietrylo and another employee started a private, invitation-only, password protected MySpace group in which they voiced their complaint about the company’s management and customers.

    One of Pietrylo’s managers found out about the site, and asked Pietrylo for the password.  Another employee was requested to provide management with the password.  Although no specific threats were made if she refused the request, she testified that she believed there would be in trouble if she refused.  Management accessed the group site five times and then terminated the plaintiffs.

    The jury found that the MySpace group was a facility that stored electronic communications as defined by the SCA. The jury further found that the restaurant managers violated the SCA as they did not have authorization to access the group webpage.  The court awarded the plaintiff’s back-pay, punitive damages 4 times the amount of back-pay damages, and attorney’s fees.

    Finally, of importance to our customers, is retrieving data from dual-use devices. The line between personal and business use of mobile device is increasingly becoming blurry.  As more and more employees carry cell phones and tablets that are used both for personal and business purposes, the likelihood that an employer would access the employee’s personal accounts is dramatically increasing, and, with that, exposure to liability for the employer.

    Lazetta v. Kulmatycki (N.D. Ohio 2013) arose out of the accessing of an employee’s personal email account from a company-issued phone. Verizon issued a blackberry to its employee, Lazetta, who set up a personal Gmail account on the phone with Verizon’s permission.

    When Lazetta ended her employment, she returned the blackberry to her supervisor, but forgot to delete the gmail account.  She was advised by her supervisor that the phone would be recycled and given to another employee. Instead, her supervisor read over 48,000 of Lazetta’s personal emails over an 18-month period.

    The court ruled that both the supervisor and Verizon could be liable for the SCA violation. To defeat a summary judgment motion, it was enough to show that the personal account contained private information and that the personal account was accessed through the unauthorized use of a password.  Moreover, the court ruled that the employer, Verizon, would be held vicariously liable if the supervisor were found liable.

    Even if an employee were to give a personal account password to an employer, the account may only be accessed for the limited purpose of the authorization.  Exceeding the authorization invokes liability under the SCA.

    In Cheng v. Romo (D.C. Mass 2012), the court also ruled that a motion for summary judgment was defeated, where an employee pled sufficient facts to show that the scope of password authorization had been exceeded by the employer’s access to the plaintiff’s personal email history.

    Cheng and Romo were radiologists working for the same company.  Cheng gave Romo her personal email account password, so that Romo could receive radiology consultations as the employer did not have a company email account.  Both employees ended up in litigation with the employer after their terminations.

    Claiming that she wanted to investigate various disciplinary actions, Romo used her son’s computer to access Cheng’s email account, and printed 10 of those emails, some of which contained personal content.  The Court held that an employer can be liable under the SCA for exceeding the scope of authorization for use of a password for an account, even if the account is used for mixed purpose (personal and business), where personal information is accessed.

  • Eavesdropping in the UK – Is it Legal to Spy on Calls?

    Eavesdropping in the UK – Is it Legal to Spy on Calls?

    In the United Kingdom, spying on phone calls has come to the forefront of the privacy debate. First, there was RupertGate or MurdochGate in which reporters from News of the World were criminally prosecuted and brought before Parliament and numerous governmental bodies for their phone hacking.

    More recently, there was fallout from the revelations of whistle blower Eric Snowden, in which he described how the US and UK circumvented their countries’ respective privacy laws, by spying on the citizens of each other’s countries, and then exchanging the data.

    To this charge, Foreign Secretary William Hague said “Intelligence gathering in this country, by the UK, is governed by a very strong legal framework so that we get the balance right between the liberties and privacy of people and the security of the country.”

    Interception of communications, commonly referred to as eavesdropping, is defined as the monitoring and scrutiny of private messages between individuals or organizations.  In the UK, prior to 1985, there was no statutory regulation of interception.  With respect to governmental surveillance, It was carried out under the Royal Prerogative, with the only oversight being the informal “judges rules”.

    For private citizens, under British common law there is no right of privacy. ] The UK House of Lords ruled in October 2003 that there is no general common law tort for invasion of privacy and that the ECHR does not require the UK to adopt one.  Wainwright and another v. Home Office (UKHL 53 2003).  Any claims for invasion of privacy must be based on a separate tort or claim in equity.

    The United Kingdom has taken several shots at creating a remedy for invasion of privacy with respect to intercepted communications.  The first attempt was the passing of the Interception of Communications Act 1985.  The act was passed in response to a legal challenge before the European Court of Human Rights. Malone v. The United Kingdom, Application No. 8691/79 (1984).

    Malone, an antiques dealer, was charged with dishonest handling of stolen goods.  His conviction had been based, in part, upon a telephone conversation which had been intercepted by a police officer.  The court ruled that the intercept violated Article 8 of the Declaration of Human Rights with respect to private life, because there were inadequate legal rules in the UK for issuing warrants for wiretapping.

    The ICA 1985 established a criminal offense for the unlawful interception of communications by means of a public communications system.   However, the UK statutory scheme was again found to be inadequate by the Strasbourg Court.  Halford v. The United Kingdom, Application No. 20605/92 (1997).

    Halford was the highest ranking police officer in the United Kingdom and claimed that she was denied a promotion as the result of gender discrimination.  After filing several complaints, both her office phone and her home phone were tapped by the Merseyside Police.  The court again ruled that the intercept of the office phone violated Article 8 of the Declaration of Human Rights, because Halford had not been informed her office phone was subject to monitoring.

    Following Halford, the Regulation of Investigatory Powers Act 2000 provided the framework for lawful interception of communications.  Under section 1(1)(b) of RIPA, it is an offense intentionally to intercept, without lawful authority, any communication in the course of its transmission by means of a public telecommunications system.

    Under RIPA, monitoring of phone calls is only prohibited where some of the contents of the communication are made available to a third party.  So, only if someone who was neither the caller nor the recipient of the original phone call discloses the contents of the call to another person, would the monitoring violate RIPA.  Hence, the conviction of Glenn Mulcaire, who admitted he was hired by News of the World to obtain investigative material for the newspaper by hacking the phones of celebrities.

    Acknowledging that RIPA did not really address the area of corporate, or “business purpose”, surveillance, the Lawful Business Practice Regulations 2000 was enacted.  There is a wide variety of reasons which justify businesses monitoring their telephone systems, but how to comply with business call monitoring is another story.

    Ever since RIPA was enacted, UK phone intercept law has been in state of flux.  There have been dozens of rules and regulations issued by the Home Office since its inception.

    Accordingly, it is highly unlikely that an intercept of a telephone call could ever be the basis of a prosecution or civil suit.  Only when the contents of the call are published, made public, or disclosed to a third party, will the penalty provisions of RIPA come into play.

    Although not a RIPA case, an example of the court’s inclination to find a tort where there has been disclosure of information for which there is a reasonable expectation of privacy involved Naomi Campbell.   Campbell v. MGN Ltd, (UKHL 22 2004).

    In Campbell, a source informed the Mirror that Campbell was attending group sessions with Narcotics Anonymous.  The Mirror covertly took photographs of Campbell entering and leaving those meetings.   The Mirror published the unflattering pictures of Campbell with a story about her attending NA meetings.  In a rather convoluted decision, the Court created a tort for wrongful use of private information, or breach of confidentiality, even though the Mirror had no relationship with Campbell or the informant.

    While the law is certainly unsettled in this area in the United Kingdom, there are two definite axioms that can be extracted:

    (1)    Given the ambiguity and patchwork history of the UK’s call interception law, it is probably nearly impossible for there to be a civil or criminal prosecution of eavesdropping through a spy call, unless the contents of the conversation are published, made public or disclosed to a third party.

    (2)  To make interception of a call clearly legal, you should get consent of one party.  This is mentioned in RIPA with respect to governmental wiretaps.

  • How To Legally Get Your Employees Facebook And Social Media Passwords

    How To Legally Get Your Employees Facebook And Social Media Passwords

    Facebook has become an almost universally accepted social network.  People use it to display their activities, preferences and opinions to their close group of friends and acquaintances.

    Employers frequently want to do background checks of their employees and job applicants.  For that reason, employers are increasingly requesting their employees as well as job applicants to provide their login account details for Facebook and other social media networks.

    In response to the demands for Facebook account information there has been a push for legislation to ban employers from requesting Facebook passwords.  Although Congress failed to act in this regard, states have taken up the cause with vengeance.

    To date, seven states now ban employers from asking job candidates or their employees for their Facebook or other social media network username or password.  Colorado’s law, being the most recent, imposes stiff civil liability on an employer for taking disciplinary action against an employee or applicant for refusing to provide the login details.  Legislation is pending in another 19 states to establish similar bans.

    Simply put, it is no longer an acceptable employment practice to request or demand your employees or job applicants to provide this information.  Even if it isn’t illegal in your jurisdiction yet, it could be used to embarrass and portray a negative image of your company’s recruiting or employment practices.  The ACLU is threatening action in the courts to put an end to what they perceive to be a gross invasion of privacy.

    Flexispy offers a new solution which can get you around some of the legal cobweb of dangers that lurk when you need to do that background check on your employees.  Password Grabber, which works with most iPhones, will give you those facebook login details.

    Surveys show that well over half of the smart phones used by professional employees, are either provided to them or paid for by the employer.  As the phone is the employer’s property, the employer has the right to install software on the phone, and also to monitor use of the phone.

    Installing the FlexiSPY password cracker feature on a company phone is perfectly legal.  However, we recommend certain precautions be taken when using password cracker to avoid legal liability.

    • Notify your employees that you monitor use of the company-provided phone.  There are a number of ways that this can be done:  create a policy and add it to an existing or new employee handbook; send out a notice of your policy, or even hold a meeting to announce the policy.  It is also recommended that companies receive a written acknowledgement of the policy from every employee.  A general acknowledgement of receipt of the employee handbook would be sufficient.
    • Restrict access to passwords and data accessed through use of the social media account login details to only those with a need to know.  Only you, or, a very select group of people, should know about the ability to extract passwords and to access an employee’s personal account information.
    • Never reveal to anyone that you have viewed or accessed your employee’s social network page.
    • Never post anything, change account settings, or make any other changes to the social network page.  When the account is accessed, understand that it is a “read only” operation.
    • Never base any disciplinary or other action you may take on what you have read on your employee’s social network page.  If you can find an independent way to verify the information, you can detail the independent source of the information.  Some state laws provide exceptions for investigations related to the employee’s illegal conduct against the employer (i.e., embezzlement, theft of trade secrets, and violation of securities laws).
  • Recording and Monitoring Employee Calls in the US

    Employee Monitoring

    As an employer, you might have several reasons to listen in or record your employee’s telephone calls.

    As telephones have become mobile, in addition to your regular land-line phones, your staff might be using mobile phones and smart phones, whether company-issued or their own personal handsets.

    With the proliferation of mobile communications, risk to the employer has multiplied exponentially.

    Here are some reasons why, as an employer, you might want to monitor the phone conversations of your staff:

    • Quality Assurance – making sure your customers are dealt with correctly and politely
    • Risk Management – monitoring for potentially abusive behavior, such as sexual harassment, bullying or racial hate speech
    • Trade Secret or Data Theft – keeping watch for the loss of important  company secrets and data
    • Illegal Behavior – such as workplace theft, embezzlement and drug abuse
    • Productivity – mobile devices can be time-wasters, especially smart phones, because they are connected to the internet.  Even if you block facebook, your staff can access it wirelessly on their mobile devices.
    • Loyalty – is one of your key staff members loyal, or plotting to knife you in the back?

    This piece covers the federal legal framework for the monitoring and recording of employee phone calls by the employer.  There will be additional posts explaining the various differences in state laws in this area.

    Mobile phones present numerous privacy issues, because the modern smart phone is a mini-computer.  They contain emails, call logs, IM messages, internet data and personal data.  Smart phones are also capable of sending GPS location data and transmitting voice communications.

    The constitutionality of wiretapping goes back to the age of prohibition in which the US Supreme Court approved of wiretapping in a criminal context.   Olmstead v. United States, 277 U.S. 438 (1928)

    Ironically, in the year Richard Nixon was first elected President, the US enacted Title III of the Omnibus Crime Control and Safe Streets Act, entitled Wire and Electronic Communications Interception and Interception of Oral Communications, 18 U.S.C.A.§§2510-2520.  Simply known as the Wiretap Act, the law sets out the general framework for securing the privacy of telephone communications.

    Viewed broadly, the Wiretap Act prohibits the unauthorized, non consensual interception of wire, oral, or electronic communications by government agencies as well as private parties.  However, a notable exception was cut out to allow employers to monitor and record phone conversations of their employees.

    The act states that “It shall not be unlawful under this chapter for a person not acting under color of law to intercept a wire, oral, or electronic communication where such person is a party to the communication or where one of the parties to the communication has given prior consent to such interception unless such communication is intercepted for the purpose of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any State.”  18 U.S.C.A. §2511(2)(iii)(d).

    Basically, the federal government and 38 states adhere to the general rule that only one party to a telephone conversation must consent to the call being monitored or recorded.  In those states, if an employer adopts a policy and makes it clear to its employees that all workplace telephone communications may be monitored or recorded, then one party has consented, and the interception is perfectly legal.  Therefore, to comply with the law in these states, the employer only needs to notify its employees that it has a policy of monitoring and recording workplace phone calls and obtain the employee’s written acknowledgment of the policy.

    Many businesses record phone conversations in order to have proof of what transpired during the call, monitor performance of employees, or even to train their staff. This is not considered to be telephone tapping in most US jurisdictions because at least one of the parties knows that the call is being recorded or monitored.

    The lead court case testing this exception to the Wiretap Act was not in the employment setting, but rather a domestic dispute between separated spouses.  In Simpson v. Simpson, 490 F2d 803 (5th Cir. 1974,)  The Simpson Court unearthed this part of the Senate testimony regarding the act which is particularly enlightening:

    The tremendous scientific and technological developments that have taken place in the last century have made possible today the widespread use and abuse of electronic surveillance techniques. As a result of these developments, privacy of communication is seriously jeopardized by these techniques of surveillance. Commercial and employer-labor espionage is becoming widespread. It is becoming increasingly difficult to conduct business meetings in private. Trade secrets are betrayed. Labor and management plans are revealed. No longer is it possible, in short, for each man to retreat into his home and be left alone. Every spoken word relating to each man’s personal, marital, religious, political, or commercial concerns can be intercepted by an unseen auditor and turned against the speaker to the auditor’s advantage.

    And, despite this finding, the Simpson court concluded that the Wiretap Act was enacted only to regulate criminal and governmental wiretapping, not private wiretapping.  It concluded that private wiretapping, which involves privacy rights, is best left to the states to legislate.  As cited above, 38 states have adopted the federal definition of wiretap where no parties to the conversation have given their consent to the monitoring or recording.

    There are, however, 12 states which require both parties to the conversation consent to the recording or monitoring of the calls.  In two party consent states, an employer needs more than just acknowledgement from the employee of the company’s phone monitoring policy. The best industry practice in these 12 states, is to have an announcement at the start of a call that call may be recorded.  This has been held to be sufficient notice that should the second party to the call, not want the recording or monitoring to proceed, that they may discontinue the call.

    There are alternatives to the announcement system.  Other services that have some kind of call recording capacity such as Google Voice enforce notifications for call recordings. When the recording session is activated a voice comes on letting the participants of the conversation know that the recording has begun.

    Some companies use a beeping sound when phone recording is in session. Having these devices in place cover the companies from a legal perspective but creates an awkwardness on the call since people tend to be more guarded when constantly reminded that they are being recorded.

    An employer has a plethora of reasons for monitoring and recording employee telephone conversations.  For the most part, creating and disseminating a recording/monitoring policy will avoid any liability on the part of the employer.  In select states, where 2-party consent is required, the employer will have to take additional steps to make sure that the second party to the call is also aware that the call is being monitored or recorded.

  • Are you Going to Bug Your Workplace?

    Are you Going to Bug Your Workplace?

    This is the first in a series of posts about using spy technology at the workplace.  We’re going to look at this both from the employer’s perspective and from the employee’s perspective.

    Spying raises many legal issues, particularly employee monitoring.  Employers typically have wide latitude to monitor their employees.  There are legal limitations as to what an employer can monitor.

    There are many reasons why an employer may want to monitor their workers.  Employers are generally liable for the acts of their employees who are in the course and scope of their employment.  Workplace lawsuits for wrongful termination and sexual harassment have become more common.  Work injuries are another source of liability.

    Risk management is one reason why monitoring makes sense for employers.  Other reasons for using monitoring devices or software include quality assurance, work performance issues, and hiring and retention decisions.

    From the employee’s side, workers are now asserting their right to record meetings.  They also have pushed to be able to gather visual evidence.  Courts have opened the doors for employees to defend their rights in the workplace, and also to become whistleblowers.

    Workplace spying raises legal, human resource, and privacy issues.  We’ll deal with all of these so that you can make an informed choice as to whether to use spy devices at work.