employee privacy - what can employers monitor
Can you spy on your employees?  Is it spying if they consent?  Does an employer have to give notice before monitoring employee phone and computer use?  Well, it depends on who owns the accounts and equipment and what the employer’s policies are.

Here’s a breakdown.

Overview by Device/System

Employer Phones:  Employers generally can monitor, listen in and record employee phone calls on employer owned phones and phone systems.  This includes cell phones, voice mail and text messages provided to employees.

For example, in City of Ontario v. Quon (2010), the US Supreme Court found that a police officer’s personal text messages on a government owned pager were not private and the employer/police department had the right to view the messages—even though public employees (unlike private employees) have 4th Amendment rights against unreasonable search and seizure since their employer is the government.

Personal Phones:  Employers generally cannot monitor or obtain texts and voicemails on an employee’s personal cell phone.  But if you’re spending a lot of time at work loudly talking about your weekend plans, there is a good argument that it wasn’t private and you can be disciplined for not working.

Employer Computers- Again, if the employer owns the computers and runs the network, the employer is generally entitled to look at whatever it wants on the system, including emails.

Personal Accounts:  It depends on the circumstances—whether the use is at work and on employer equipment.  The employer should not look at private emails on a private email account that is password protected by the employee because the employee has a reasonable expectation of privacy, the account is the employee’s, and computer hacking laws provide protection against viewing personal emails without consent.

However, employees should be careful about using those accounts and passwords on employer owned equipment, because that information can be stored in backups, is visible to monitoring software and may not really be private at all.

Several cases involving private emails on employer time and equipment have gone against the employee and determined that the employer’s interception or use of an employee’s personal emails was permitted because of policies that allowed it and implied consent and because the employee was using employer owned computers or sending the emails from work.

Even cases of employees contacting their attorney have gone both ways.   In Stengart v. Loving Care Agency, Inc.  (New Jersey 2010) an employee emailed her lawyer on a company laptop, but through her personal password protected Yahoo account.  The court held the emails were protected by the attorney client privilege, but did not really address the privacy issue.

In Holmes v. Petrovich Development Company LLC (California 2011) an employee contacted her attorney on a company computer with a company email account.  The court found the emails were not protected by either a right of privacy or the attorney client privilege.  Using the company account and system waived the privilege, and company policies precluded any expectation of privacy. The employer had issued policies that company machines could only be used for business and gave notice that employees had no rights of privacy in their use of company equipment.

In Sitton v. Print Direction, Inc. (Georgia, September 2011), an employer did not violate an employee’s privacy rights by accessing an employee’s personal laptop to print out personal email messages.  The employee had been using his personal laptop at work to help his wife run their printing business.  The boss came into the employee’s office and saw the computer screen that had a non-work email open.  Both the trial court and the court of appeal found that the employer had a legitimate interest in investigating whether or not the employee was running another business from the employer’s worksite on the employer’s time and found that printing out the emails was proper.  The employee had to pay the employer damages for breach of the duty of loyalty.

I am not familiar with Georgia law and the duty of loyalty there. But I anticipate there might be a different result in right to work states and states like California, where there is also a Constitutional Right to Privacy.

Surveillance Cameras & Video Monitoring:  An employer can monitor its property with surveillance cameras, especially in public and common areas.  However, certain areas such as locker rooms, changing areas and bathrooms are generally considered private and not subject to monitoring.  Private offices may or  may not be protected depending on the circumstances. (See tomorrow’s piece on Common Law Privacy Rights.) Some states, such as Connecticut, have specific laws restricting how and for what purpose employers can videotape employees.  And state laws on recording conversations apply to video surveillance.

Laws on Phone and Computer Surveillance: 

1.  Electronic Communications Privacy Act of 1986  (part of the Omnibus Crime Control and Safe Streets Act, 18 USC sec. 2510 et seq.). This federal law generally prohibits unauthorized “interception” or access to electronic communications and would include telephone, email and computer use.  However, there are several huge exceptions that basically allow an employer to monitor anything on its own systems.

  • Business Exception:  There is a business exception that allows an employer to monitor employee use of its own systems for “legitimate business needs.”  This includes improving customer service, preventing harassment and making sure that people are actually working.
  • Consent to Monitoring: If one party to the communication consents to the monitoring, then monitoring is permitted even if the business exception does not apply.  “Consent” requires the employer to give advance notice of its policy to monitor—it does not require the employees to agree.  Consent is implied from the fact that they learned about the policy and decided to keep working there.
  • Employer Owned Systems: The owner of the email, IM and phone message systems is also allowed to access the communications even if they are personal.
  • Limitations on Employer Monitoring:  No continuous monitoring.  If the call is obviously personal, the employer has to stop listening.  However, the employee can still be disciplined for making personal calls on company time.

2.  Computer Hacking Laws. Using employee passwords to sign-in to their personal or social media accounts can violate state and federal computer hacking laws and constitute identity theft.  All 50 states have laws that prohibit someone from unauthorized access to another person’s computer and online accounts, especially if the intent is to change or modify access or content.   This would include deleting an inappropriate post.

In Pietrylo v. Hillstone Restaurant Group (New Jersey 2009), two employees set up a password protected MySpace account where employees could vent about working at the restaurant.  A manger got a hold of the password and logged into the site to discover disparaging and sexual remarks about management and references to illegal drugs.  The restaurant fired the employees who sued under the computer hacking laws.  The court found for the employees because the restaurant’s employee monitoring policy did not extent to private online communications on a social network outside of work.

3. State Laws on Recording Conversations—States are permitted to make more restrictive laws that protect employees and the public from monitoring, even if the federal law would allow it.  In Maryland, everyone in the conversation must consent before the conversation can be recorded.  California requires that any monitored phone conversation have a beep at certain intervals or there must be a message informing the caller that the conversation may be recorded.  Other states, including Connecticut, New York, Pennsylvania, Colorado and New Jersey, also have laws relating to when a conversation may be recorded.

Take-Away

If the employer owns the system, hardware or both, the employer can monitor employees’ use of it, including personal files and communications.

If the employee owns the system and hardware, the employer’s ability to view and obtain personal files depends on the whether the employee is using it at work, whether the employer has a legitimate interest in viewing the communication, what the state’s laws and employer’s policies are, and what the employee’s objective expectations of privacy are.

With the blending of work and personal lives on social media and through initiatives to improve employee engagement and create a friendlier, more personal culture at work, it’s essential that employers look this issue. Just because you can legally monitor something doesn’t mean that you should or that it is good management practice.  If you want a relaxed work environment where employees are trusted and treated as grown-ups, monitoring and discipline over personal phone and computer use will not promote your cause.  But if you are dealing with sensitive information that requires higher levels of security, then you may need to monitor to protect the business. But you can’t have it both ways.

Tomorrow-Common Law and Off Duty Privacy.

 
  • stephinie

    i have used this hackers service, he was able to hack my husbands phone and email , he also fixed my bad credit score. he is very good and reliable.

  • Vera

    i have also used gontarbradford@gmail.com he is very good and reliable.

  • Norris Mantooth

    It’s invasion of privacy. But, it’s your responsibility to secure your notebook.

  • Norris Mantooth

    Congratulations! What’s your point?

  • Norris Mantooth

    It’s none of his business.

  • Norris Mantooth

    Nope. “Without your permission” means there is not consent. They have no right to touch the phone.

  • Norris Mantooth

    They can’t touch you. If you leave to start your own business, excellent — as long as there’s no binding agreement you signed when you started with them that you’ll not compete for a period of X months.

  • Norris Mantooth

    Change your password to your email account and lock them out.

  • Norris Mantooth

    Yes.

  • Norris Mantooth

    Yes. This phone number is a tracking number for analytics. Widely used practice. In most states, as long as ONE party knows about the recordings, it is considered legal.

  • Norris Mantooth

    There’s some allowance for disturbances, but consider changing your environment if your dog is a distraction.

  • Norris Mantooth

    It’s their tablet. Yes. Did you even read the article?

  • Norris Mantooth

    Not unless they have a policy that says personal devices can be used for work and will be monitored.

  • Norris Mantooth

    If its on company property, and the higher-ups did this, then yes. It’s legal. They are spying on the manager with a plan to fire him for certain behaviors. Perfectly legal.

  • Norris Mantooth

    Depends on the location of the camera and the type of work you’re doing.

  • Norris Mantooth

    Up to them. If the business continues to flow through your account, it’s their business now. They maintain whatever needs necessary to operate, and if information is there, it’s theirs. You could write to them asking them to close it, but what difference does it make? Just move on. You’ll be fine.

  • Mark Jamson

    If you have any problem that may require the services of a genuine and trusted hacker I strongly recommend that you contact hovahack@gmail.com. His services includes Hacking,tracking,spying,cloning. Retrieving of deleted text, pictures and videos. Upgrading results. Adding your name to guest invitation list .Provision of information and evidence,Can help to prevent you from being hacked or tracked.

  • my290753

    I have a colleague that suspects her employee is monitoring her emails. The laptop she uses for business purposes belongs to her as the company do not supply them, however it is a company network that she uses on this laptop but only for business, not personal. Personal email is a totally different address and service provider. There is no company ‘terms/conditions/regulations manual, and neither is there any mention of email snooping in her employment contract. Does she have a case against the employer, they know about work issues and clients before she even tells them – how can they be caught and/or enforced to stop.

  • Marcus Wealth

    I wish to kindly introduce pavelnovakbreach@gmail.com
    now read carefully; on no account should you seek for a hackers service who you can’t have direct contact with, make sure you are able to call/chat with him/her on Whatsapp or a phone call.
    Pavel has worked for me on several occasions, he hacked a friends computer system who wanted to ruin my life, again, he helped mop some articles on some websites and recently he hacked a Facebook and an email account and provided the key loggers for me.
    I feel so pained that people always fall into the wrong hands when seeking for a hacker services and felt the need to fill you guys in on this one, when you mail him ask for a direct contact with him and he will provide his cell phone number.
    He hacks everything;
    WhatsApp
    Facebook
    Imo
    kik
    emails
    websites
    CAIVRS database
    cell phone taps…

  • Hellokitty

    Question can a cell phone company access information in their employees account even if the employee pays the bill? and could they use as an excuse that they can do so because they provide the cell phone services at an employee discounted rate?

  • Denise Lamb-Small

    Can an employer obtain a text message from your personal phone to use against another employee? I had this happen to me was asked for me cell phone so they could review the text that was sent to me by another employee was scared if I did not hand it over I would be in trouble. Now it appears this was not legal and an invasion of my privacy is this correct? Again only gave to them because I felt blind sided and I would be in trouble if I didnt

  • Jessica Bornemeier Whitehead

    My supervisor installed Mighty Text on my computer at work so I could text information to our technicians by typing out messages using the computer keyboard instead of typing out texts on my phone. (This is my personal cell phone that my employer has me use). While I was out of the office, she got on the computer and read through all my personal text messages by opening up Mighty Text on the computer. She is now telling coworkers info she retrieved about my personal text messages. I did not leave Mighty text open on the computer. She had to open it to get to it. It’s my personal call phone, but the company’s computer. Do I have any rights, any recourse?

  • Fiona Spade

    I was in search for a legit hacker last month, I came across plutomasde9900@tutanota.com with a lot of recommendations on him as a valid one. I ended up hiring him to hack my ex husbands device in which eh was totally successfully. He was totally worth every penny spent.

  • florence danny

    Excellent and professional investigative services. I hired him wizard!!! for a very private and difficult matter of hacking my spouse phone, and he far exceeded my expectations. He helped me get the info(whatsapp, facebook, text messages, call logs etc) I needed faster and cheaper than I had imagined. The first time we spoke on whatsapp, we had a very long phone consultation in which he gave me all my options that he could think of to resolve my case, and he even recommended I try other options before hiring him, which shows that he is honest. I decided to hire him and I am glad I did. He is a kk investigator and a great person and if you have a dishonest partner don’t hesitate to send HIM A MESSAGE. He’s the only hacker that dropped his whatsapp number here .

    CONTACT hotcyberclown@gmail.com or text or call him on his Whatsapp number ; +16282043672 . You can thank me later .

  • Annie Stonebridge

    For any professional hacking service of any such i would recommend you use their service, they are the best there, at some point i thought i was loosing custody of my children to my drug addict and abusive husband, but after i contact them they assisted me in obtaining evidences against her which i produced in court, i am so happy with their service and i can recommend them to anybody in need of such service or any other form of hacking exploits.CYBERINTELLIGENT13@GMAIL.COM

Page 1 of 11
Read previous post:
Workforce analytics: What is there to get?

Many organizations are making incremental advances with workforce analytics to solve specific challenges, but they may not have the resources...

Close