Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Last month, we discussed HIPAA, Security Breach Notification Laws, and Safeguarding Personal Information. We conclude with a brief analysis of electronic privacy issues.
Telephone, E-mail, and Internet Use
Employers have a legitimate interest in knowing how their employees spend their time at work. Inappropriate e-mail can trigger workplace lawsuits and sexual harassment claims. Cyber-slacking and excessive personal telephone calls at work waste employee time, costing employers millions of dollars in lost productivity. Technological advances make it increasingly easy for employers to monitor employees and limit negative behavior. Employers should make certain, however, that they understand employees' legal rights and obligations before conducting such monitoring action.
As mentioned last month, although there is no omnibus U.S. employee privacy law, employers face myriad privacy requirements with respect to the management of employee personal information. Employers should use caution in collecting, using, and disclosing employee personal information, and should aim to comply with all the legal mandates that impact the use of such information.
Conclusion
Employers are well advised to develop and implement comprehensive written information security programs to safeguard employee personal information from misuse or unauthorized acquisition. They should also develop and implement written policies and procedures with respect to monitoring the behavior of their employees. Although U.S. legal requirements affecting workplace privacy are complex, employers should respect and protect the privacy rights of their employees.
Lisa J. Sotto is a partner in the New York office of Hunton & Williams LLP and heads the firm's Privacy and Information Management Practice. She also serves as Acting Chair of the U.S. Department of Homeland Security's Data Privacy and Integrity Advisory Committee. Elisabeth M. McCarthy is counsel in the New York office of Hunton & Williams LLP and advises clients on privacy and information management issues.
Last month, we discussed HIPAA, Security Breach Notification Laws, and Safeguarding Personal Information. We conclude with a brief analysis of electronic privacy issues.
Telephone, E-mail, and Internet Use
Employers have a legitimate interest in knowing how their employees spend their time at work. Inappropriate e-mail can trigger workplace lawsuits and sexual harassment claims. Cyber-slacking and excessive personal telephone calls at work waste employee time, costing employers millions of dollars in lost productivity. Technological advances make it increasingly easy for employers to monitor employees and limit negative behavior. Employers should make certain, however, that they understand employees' legal rights and obligations before conducting such monitoring action.
As mentioned last month, although there is no omnibus U.S. employee privacy law, employers face myriad privacy requirements with respect to the management of employee personal information. Employers should use caution in collecting, using, and disclosing employee personal information, and should aim to comply with all the legal mandates that impact the use of such information.
Conclusion
Employers are well advised to develop and implement comprehensive written information security programs to safeguard employee personal information from misuse or unauthorized acquisition. They should also develop and implement written policies and procedures with respect to monitoring the behavior of their employees. Although U.S. legal requirements affecting workplace privacy are complex, employers should respect and protect the privacy rights of their employees.
Lisa J. Sotto is a partner in the
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.