At our Annual Employment Law Seminar last week, I spoke about the “Facebook Privacy” bill that was then pending in Delaware’s House of Representatives. The bill passed the House on later that day and is now headed to the Senate. For those of you who weren’t in attendance last week, here’s a brief recap of the proposed law. Continue reading
Employers, do you know what apps your employees are using? That’s the question posed by a recent article in the WSJ. (See Companies Don’t Know What Apps Their Employees Are Using). My guess is that the answer to this important question is, “No.” Here are my top tips for how not to be the employer discussed in the WSJ article.
First, have a policy about employees’ use of cloud-based apps to save work-related documents. Consider prohibiting employees from saving work documents to cloud-based storage accounts such as Dropbox, SkyDrive, and Box.net. Also consider prohibiting employees from backing up the contents of their work laptops to cloud-based back-up accounts, such as Mozy and Carbonite. Continue reading
Employers face a serious challenge when trying to prevent employees from taking confidential and proprietary information with them when they leave to join a new employer-particularly when the new employer is a competitor. When an employer becomes suspicious about an ex-employee’s activities prior to his or her last day of work, there are a limited number of safe avenues for the employer to pursue.
Generally, an employer should not review the employee’s personal emails or text messages if they were sent or received outside the employer’s network. But what if the employee turns over his personal emails or text messages without realizing it? The answer is, as always, “it depends.” A recent case from a federal court in California addresses the issue in a limited context. Continue reading
Delaware’s Governor has signed legislation related to the safe destruction of documents containing personal identifying information. The bill is effective January 1, 2015, and requires that commercial entities take all reasonable steps to destroy a consumer’s personal identifying information within the business’s custody and control, when the information is no longer to be retained. Destruction includes shredding, erasing, or otherwise destroying or modifying the personal identifying information to make it entirely unreadable or indecipherable through any means. Continue reading
During the 2007-2008 school year, Ms. Kimble was employed as a cook and cheerleading coach at a high school. In December 2007, she took the cheerleaders on an overnight Christmas party held in a cabin located outside the county. The trip was not approved as was required by district policy. When administration learned about the trip, Ms. Kimble was instructed that all future out-of-county trips must have prior approval. Continue reading
The Heartbleed Internet-security flaw has compromised the security of an unknown number of web servers. This is just one story in a string of recent headlines involving the vulnerability of the Internet sites. But consumers aren’t the only ones affected. The companies whose websites have been attacked are employers, after all.
Although data security has become increasingly impossible to ensure, it has also become increasingly critical to employers’ viability. So employers are looking for ways to mitigate the exponentially increasing risks associated with the Internet. Continue reading