-
1
-
-
36048991499
-
-
Matthew W. Finkin, Information Technology and Workers ' Privacy: The United States Law, 23 COMP. LAB. L. & POL'Y J. 471, 474 (2002) [hereinafter Finkin, Information Technology].
-
Matthew W. Finkin, Information Technology and Workers ' Privacy: The United States Law, 23 COMP. LAB. L. & POL'Y J. 471, 474 (2002) [hereinafter Finkin, Information Technology].
-
-
-
-
2
-
-
36048933991
-
-
Id
-
Id.
-
-
-
-
3
-
-
36048932701
-
WORKPLACE MONITORING & SURVEILLANCE, SUMMARY OF KEY
-
citing AMA, SURVEY
-
(citing AMA, SURVEY: WORKPLACE MONITORING & SURVEILLANCE, SUMMARY OF KEY FINDINGS 1 (2001)).
-
(2001)
FINDINGS
, vol.1
-
-
-
4
-
-
36048933352
-
-
Id
-
Id.
-
-
-
-
6
-
-
0142123338
-
-
Id. (citing Surf Watch (June 4, 1999)). The situation facing employers has grown increasingly complex as modem advances in information technology have revolutionized the workplace, introducing a plethora of new opportunities for employee misbehavior. See, e.g., Vivien K. G. Lim, The IT way of Loafing on the Job: Cyberloafing, Neutralizing, and Organizational Justice, 23 J. ORGANIZATIONAL BEHAV. 675 (2002).
-
Id. (citing Surf Watch (June 4, 1999)). The situation facing employers has grown increasingly complex as modem advances in information technology have revolutionized the workplace, introducing a plethora of new opportunities for employee misbehavior. See, e.g., Vivien K. G. Lim, The IT way of Loafing on the Job: Cyberloafing, Neutralizing, and Organizational Justice, 23 J. ORGANIZATIONAL BEHAV. 675 (2002).
-
-
-
-
7
-
-
84888491658
-
-
§§2510-2521 (2006, Such a privilege is currently available both as a common law defense and under the ECPA, and would likely be available under other proposed legislation. See, e.g, Garrity v. John Hancock Mut. Life Ins. Co, 2002 U.S. Dist. LEXIS 8343, at *3-6 (D. Mass. May 7, 2002, Fischer v. Mt. Olive Lutheran Church, 207 F. Supp. 2d 914, 922-923 W.D. Wis. 2002
-
18 U.S.C. §§2510-2521 (2006). Such a privilege is currently available both as a common law defense and under the ECPA, and would likely be available under other proposed legislation. See, e.g., Garrity v. John Hancock Mut. Life Ins. Co., 2002 U.S. Dist. LEXIS 8343, at *3-6 (D. Mass. May 7, 2002); Fischer v. Mt. Olive Lutheran Church, 207 F. Supp. 2d 914, 922-923 (W.D. Wis. 2002).
-
18 U.S.C
-
-
-
8
-
-
36048951766
-
-
These Standards come from the Data Protection Act, 1998, c. 29, sched. 1, part I (Eng.): Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless (a) at least one of the conditions in Schedule 2 is met, and (b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. 6. Personal data shall be processed in accordance with the rights of data subjects under this Act. 7.
-
These Standards come from the Data Protection Act, 1998, c. 29, sched. 1, part I (Eng.): "Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless (a) at least one of the conditions in Schedule 2 is met, and (b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. 6. Personal data shall be processed in accordance with the rights of data subjects under this Act. 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data." See infra Part II.A.2 for a full discussion.
-
-
-
-
9
-
-
36049018638
-
-
For further discussion of technology-related threats to employee privacy, see Michael Baroni, Employee Privacy in the High-tech World, 48 ORANGE COUNTY LAWYER 18 (May 2006) (discussing, for example, spy-cams and bugging).
-
For further discussion of technology-related threats to employee privacy, see Michael Baroni, Employee Privacy in the High-tech World, 48 ORANGE COUNTY LAWYER 18 (May 2006) (discussing, for example, "spy-cams" and bugging).
-
-
-
-
10
-
-
36048946995
-
-
See note 26, at
-
See Reidenberg, infra note 26, at 1320.
-
infra
, pp. 1320
-
-
Reidenberg1
-
11
-
-
36049050370
-
-
Id
-
Id.
-
-
-
-
12
-
-
36048951069
-
-
Id. at 1322
-
Id. at 1322.
-
-
-
-
13
-
-
36048956902
-
-
Id. at 1323
-
Id. at 1323.
-
-
-
-
14
-
-
36048951767
-
-
Ben Chamy, Big Boss is Watching, CNET NEWS.COM, Sept. 24, 2004, http://news.com.com/Big+boss+is+watching/2100-1036_3-5379953. html.
-
Ben Chamy, Big Boss is Watching, CNET NEWS.COM, Sept. 24, 2004, http://news.com.com/Big+boss+is+watching/2100-1036_3-5379953. html.
-
-
-
-
15
-
-
36048975369
-
-
See, e.g., STEVEN L. WILLBORN ET AL., EMPLOYMENT LAW: CASES AND MATERIALS 343 (3d ed. 2002) (discussing reluctance of employers to give references); Elizabeth Millard, Online Background Checks, 93 A.B.A. J. 37, 37 (2007) (discussing how employers search profiles, blogs, and visible chat sessions as part of employee background checks).
-
See, e.g., STEVEN L. WILLBORN ET AL., EMPLOYMENT LAW: CASES AND MATERIALS 343 (3d ed. 2002) (discussing reluctance of employers to give references); Elizabeth Millard, Online Background Checks, 93 A.B.A. J. 37, 37 (2007) (discussing how employers search "profiles, blogs, and visible chat sessions" as part of employee background checks).
-
-
-
-
16
-
-
36048942341
-
-
See note 53, at
-
See Bologna, infra note 53, at 186-87.
-
infra
, pp. 186-187
-
-
Bologna1
-
17
-
-
36048972318
-
-
Id. at 187
-
Id. at 187.
-
-
-
-
18
-
-
36048957541
-
-
See, e.g., Erin Binns, What Does the Web Say About You?, 35 STUDENT LAW. 16, 16 (2007) (In a recent poll conducted by the National Association for Law Placement, 85 percent of respondent employers admitted to using search engines and social networking sites like MySpace and Facebook to research candidates.).
-
See, e.g., Erin Binns, What Does the Web Say About You?, 35 STUDENT LAW. 16, 16 (2007) ("In a recent poll conducted by the National Association for Law Placement, 85 percent of respondent employers admitted to using search engines and social networking sites like MySpace and Facebook to research candidates.").
-
-
-
-
19
-
-
36049015770
-
-
For a more complete discussion of the potential employer concerns and employee privacy issues with blogs, see William H. Floyd III & James T. Hedgepath, The Electronic Workplace: Blogs, Cybersmears, and Similar Challenges, 17 S. CAROLINA LAWYER 36, May, 2006, Rafael Gely & Leonard Bierman Summer, Workplace Blogs and Workers, Privacy, 66 LA. L. REV. 1079 (2006);
-
For a more complete discussion of the potential employer concerns and employee privacy issues with blogs, see William H. Floyd III & James T. Hedgepath, The Electronic Workplace: Blogs, Cybersmears, and Similar Challenges, 17 S. CAROLINA LAWYER 36, (May, 2006); Rafael Gely & Leonard Bierman Summer, Workplace Blogs and Workers ' Privacy, 66 LA. L. REV. 1079 (2006);
-
-
-
-
20
-
-
36048962968
-
-
and Henry Hoang Pham, Note & Comment: Bloggers and the Workplace: The Search for a Legal Solution to the Conflict Between Employee Blogging and Employers, 26 LOY. L.A. ENT. L. REV. 207 (2005/2006). For a discussion of employees breaching the duty of loyalty to employers,
-
and Henry Hoang Pham, Note & Comment: Bloggers and the Workplace: The Search for a Legal Solution to the Conflict Between Employee Blogging and Employers, 26 LOY. L.A. ENT. L. REV. 207 (2005/2006). For a discussion of employees breaching the duty of loyalty to employers,
-
-
-
-
21
-
-
36049015771
-
-
see Konrad Lee, Anti-Employer Blogging: Employee Breach of the Duty of Loyalty and the Procedure for Allowing Discovery of a Blogger's Identity before Service of Process is Effected, DUKE L. & TECH. REV. 2, 9714 (2006).
-
see Konrad Lee, Anti-Employer Blogging: Employee Breach of the Duty of Loyalty and the Procedure for Allowing Discovery of a Blogger's Identity before Service of Process is Effected, DUKE L. & TECH. REV. 2, 9714 (2006).
-
-
-
-
22
-
-
2642572012
-
Property, Privacy, and Personal Data, 117
-
Paul M. Schwartz, Property, Privacy, and Personal Data, 117 HARV. L. REV. 2055, 2056-57 (2004).
-
(2004)
HARV. L. REV. 2055
, pp. 2056-2057
-
-
Schwartz, P.M.1
-
23
-
-
36048942341
-
-
See note 53, at
-
See Bologna, infra note 53, at 191.
-
infra
, pp. 191
-
-
Bologna1
-
25
-
-
33644675117
-
-
See, e.g., Nancy J. King et al, Workplace Privacy and Discrimination Issues Related to Genetic Data A Comparative Law Study of the European Union and the United States, A3 AM. BUS. L.J. 79 (2006);
-
See, e.g., Nancy J. King et al, Workplace Privacy and Discrimination Issues Related to Genetic Data A Comparative Law Study of the European Union and the United States, A3 AM. BUS. L.J. 79 (2006);
-
-
-
-
26
-
-
36049025244
-
-
Tara L. Rachinsky, Comment, Genetic Testing: Toward a Comprehensive Policy to Prevent Genetic Discrimination in the Workplace, 2 U. PA. J. LAB. & EMP. L. 575 (2000);
-
Tara L. Rachinsky, Comment, Genetic Testing: Toward a Comprehensive Policy to Prevent Genetic Discrimination in the Workplace, 2 U. PA. J. LAB. & EMP. L. 575 (2000);
-
-
-
-
27
-
-
36049019959
-
-
Lauren J. Sismondo, Note, GINA, What Could You Do for Me One Day?: The Potential of the Genetic Information Nondiscrimination Act to Protect the American Public, 21 WASH. U. J.L. & POL'Y 459 (2006);
-
Lauren J. Sismondo, Note, GINA, What Could You Do for Me One Day?: The Potential of the Genetic Information Nondiscrimination Act to Protect the American Public, 21 WASH. U. J.L. & POL'Y 459 (2006);
-
-
-
-
28
-
-
0038823679
-
-
Kimberly A. Steinforth, Note, Bringing Your DNA to Work: Employers ' Use of Genetic Testing Under the Americans with Disabilities Act, 43 ARIZ. L. REV. 965 (2001);
-
Kimberly A. Steinforth, Note, Bringing Your DNA to Work: Employers ' Use of Genetic Testing Under the Americans with Disabilities Act, 43 ARIZ. L. REV. 965 (2001);
-
-
-
-
29
-
-
36048944275
-
-
Maureen E. Mulvihill, Note, Karraker v. Rent-A-Center: Testing the Limits of the ADA, Personality Tests, and Employer Preemployment Screening, 37 LOY. U. CHI. L.J. 865 (2006);
-
Maureen E. Mulvihill, Note, Karraker v. Rent-A-Center: Testing the Limits of the ADA, Personality Tests, and Employer Preemployment Screening, 37 LOY. U. CHI. L.J. 865 (2006);
-
-
-
-
30
-
-
36048952397
-
-
Eva Lorenz, Comment, Predictive Testing in the Workplace-Could the German Model Serve As a Blueprint for Uniform Legislation in the United States?, 7 N.C J.L. & TECH. 487 (2006).
-
Eva Lorenz, Comment, Predictive Testing in the Workplace-Could the German Model Serve As a Blueprint for Uniform Legislation in the United States?, 7 N.C J.L. & TECH. 487 (2006).
-
-
-
-
31
-
-
36049051657
-
Looking out for Your Employees: Employers' Surreptitious Physical Surveillance of Employees and the Tort of Invasion of Privacy, 85
-
See, e.g
-
See, e.g., Daniel P. O'Gorman, Looking out for Your Employees: Employers' Surreptitious Physical Surveillance of Employees and the Tort of Invasion of Privacy, 85 NEB. L. REV. 212 (2006);
-
(2006)
NEB. L. REV
, vol.212
-
-
O'Gorman, D.P.1
-
32
-
-
33750561081
-
-
Kelly Gallagher, Note, Rethinking the Fair Credit Reporting Act: When Requesting Credit Reports for Employment Purposes Goes Too Far, 91 IOWA L. REV. 1593 (July, 2006);
-
Kelly Gallagher, Note, Rethinking the Fair Credit Reporting Act: When Requesting Credit Reports for "Employment Purposes" Goes Too Far, 91 IOWA L. REV. 1593 (July, 2006);
-
-
-
-
33
-
-
33748304176
-
-
Pauline T. Kim, Collective and Individual Approaches to Protecting Employee Privacy: The Experience with Workplace Drug Testing, 66 LA. L. REV. 1009 (2006).
-
Pauline T. Kim, Collective and Individual Approaches to Protecting Employee Privacy: The Experience with Workplace Drug Testing, 66 LA. L. REV. 1009 (2006).
-
-
-
-
34
-
-
36048979001
-
-
See, e.g., King et al, supra note 21; Mulvihill, supra note 21;
-
See, e.g., King et al, supra note 21; Mulvihill, supra note 21;
-
-
-
-
35
-
-
36049003988
-
-
Steinforth, supra note 21;
-
Steinforth, supra note 21;
-
-
-
-
36
-
-
36048944274
-
-
Rachinsky, supra note 21;
-
Rachinsky, supra note 21;
-
-
-
-
37
-
-
36049044145
-
-
Lorenz, supra note 21;
-
Lorenz, supra note 21;
-
-
-
-
38
-
-
36048937280
-
-
Sismondo, supra note 21;
-
Sismondo, supra note 21;
-
-
-
-
39
-
-
36048981839
-
-
O'Gorman, supra note 22;
-
O'Gorman, supra note 22;
-
-
-
-
40
-
-
36049043460
-
-
Gallagher, supra note 22;
-
Gallagher, supra note 22;
-
-
-
-
41
-
-
36048944440
-
-
Kim, supra note 22
-
Kim, supra note 22.
-
-
-
-
42
-
-
36049015321
-
-
Paul Schwartz, Privacy, Participation, and Cyberspace: An American Perspective, in ZUR AUTONOMIE DES INDIVIDUUMS 337-38 (Dieter Simon & Manfred Weiss eds., 2000).
-
Paul Schwartz, Privacy, Participation, and Cyberspace: An American Perspective, in ZUR AUTONOMIE DES INDIVIDUUMS 337-38 (Dieter Simon & Manfred Weiss eds., 2000).
-
-
-
-
44
-
-
0345792363
-
-
See Joel R. Reidenberg, Resolving Conflicting International Data Privacy Rules in Cyberspace, 52 STAN. L. REV. 1315, 1331 (2000) (arguing that [1]egal rules are relegated to narrowly targeted sectoral protections, and providing an example of privacy protections in video rental but not in online streaming video) [hereinafter Reidenberg, Resolving Conflicting International Data].
-
See Joel R. Reidenberg, Resolving Conflicting International Data Privacy Rules in Cyberspace, 52 STAN. L. REV. 1315, 1331 (2000) (arguing that "[1]egal rules are relegated to narrowly targeted sectoral protections," and providing an example of privacy protections in video rental but not in online streaming video) [hereinafter Reidenberg, Resolving Conflicting International Data].
-
-
-
-
46
-
-
36048962444
-
-
RICHARD A. EPSTEIN, CASES AND MATERIALS ON TORTS 1045 (8th ed. 2004).
-
RICHARD A. EPSTEIN, CASES AND MATERIALS ON TORTS 1045 (8th ed. 2004).
-
-
-
-
47
-
-
84858467191
-
-
RESTATEMENT (SECOND) OF TORTS §652B ( 1977).
-
RESTATEMENT (SECOND) OF TORTS §652B ( 1977).
-
-
-
-
48
-
-
36048947970
-
-
914 F. Supp, 97, 98 (E.D. Pa. 1996).
-
914 F. Supp, 97, 98 (E.D. Pa. 1996).
-
-
-
-
49
-
-
36048958876
-
-
Id. at 101
-
Id. at 101.
-
-
-
-
50
-
-
36048941742
-
-
Id
-
Id.
-
-
-
-
51
-
-
36049052312
-
-
Garrity v. John Hancock Mut. Life Ins. Co., 2002 U.S. Dist. LEXIS 8343, at *1 (D. Mass. May 7, 2002).
-
Garrity v. John Hancock Mut. Life Ins. Co., 2002 U.S. Dist. LEXIS 8343, at *1 (D. Mass. May 7, 2002).
-
-
-
-
52
-
-
36048934658
-
-
Id. at 3-6
-
Id. at "3-6.
-
-
-
-
53
-
-
36049034627
-
-
Id
-
Id.
-
-
-
-
54
-
-
36049051658
-
-
440 N.W.2d 548, 549-550 (Wis. 1989).
-
440 N.W.2d 548, 549-550 (Wis. 1989).
-
-
-
-
55
-
-
36048954166
-
-
Id. at 550
-
Id. at 550.
-
-
-
-
56
-
-
36048984396
-
-
at
-
Id. at 550-551.
-
-
-
-
57
-
-
36048959549
-
-
Id. at 555 (The employee asserted that this was [publicity given to a matter concerning the private life of another, of a kind highly offensive to a reasonable person.).
-
Id. at 555 (The employee asserted that this was "[publicity given to a matter concerning the private life of another, of a kind highly offensive to a reasonable person.").
-
-
-
-
58
-
-
36048990327
-
-
Id. at 553-54
-
Id. at 553-54.
-
-
-
-
59
-
-
36049002813
-
-
613 So.2d 646, 648-49 (La. Ct. App. 1993).
-
613 So.2d 646, 648-49 (La. Ct. App. 1993).
-
-
-
-
60
-
-
36049010347
-
-
Id. at 649
-
Id. at 649.
-
-
-
-
61
-
-
36049000211
-
-
Id. at 658
-
Id. at 658.
-
-
-
-
62
-
-
84888491658
-
-
§2710 2006
-
18 U.S.C. §2710 (2006).
-
18 U.S.C
-
-
-
63
-
-
84888491658
-
-
§2710b, C, 2006
-
18 U.S.C. §2710(b)-(C) (2006).
-
18 U.S.C
-
-
-
64
-
-
84894689913
-
-
§1320d-6 2006
-
42 U.S.C. §1320d-6 (2006).
-
42 U.S.C
-
-
-
65
-
-
34547965200
-
-
§1232g(b)2006
-
20 U.S.C. §1232g(b)(2006).
-
20 U.S.C
-
-
-
66
-
-
84894689913
-
-
§12112d, 2006
-
42 U.S.C. §12112(d) (2006).
-
42 U.S.C
-
-
-
67
-
-
84858462840
-
-
15 U.S.C. §1681(a)-(b) (2006).
-
15 U.S.C. §1681(a)-(b) (2006).
-
-
-
-
69
-
-
36048985346
-
-
See id. ([T]he FTC ... claim[ed] that the alleged lack of security constituted an unfair business practice under the FTC Act, which in turn led to the FTC seeking significant sanctions against the company).
-
See id. ("[T]he FTC ... claim[ed] that the alleged lack of security constituted an unfair business practice under the FTC Act, which in turn led to the FTC seeking significant sanctions against the company").
-
-
-
-
70
-
-
36048963580
-
-
No. CV-S-04-0963-RLH-PAL (D. Nev. settlement filed July 13, 2004).
-
No. CV-S-04-0963-RLH-PAL (D. Nev. settlement filed July 13, 2004).
-
-
-
-
71
-
-
36048976626
-
-
178 LAB. REL. REP
-
Michael Bologna, Pre-Employment Background Screenings Are Prevalent, Exhaustive, Likely Here to Stay, 178 LAB. REL. REP. 186, 188 (2005).
-
(2005)
Pre-Employment Background Screenings Are Prevalent, Exhaustive, Likely Here to Stay
, vol.186
, Issue.188
-
-
Bologna, M.1
-
72
-
-
6744224366
-
Wiretap Act
-
§§2510-2521 (2006, Stored Communications Act, 18 U.S.C. §2701-2711 2006
-
Wiretap Act, 18 U.S.C. §§2510-2521 (2006); Stored Communications Act, 18 U.S.C. §2701-2711 (2006).
-
18 U.S.C
-
-
-
73
-
-
84888491658
-
-
§2511 (2006, One exception exists where a person gives or has given consent to the interception. 18 U.S.C. §2511d, 2006
-
18 U.S.C. §2511 (2006). One exception exists where a person gives or has given consent to the interception. 18 U.S.C. §2511(d) (2006).
-
18 U.S.C
-
-
-
74
-
-
84888491658
-
-
§2701 2006
-
18 U.S.C. §2701 (2006).
-
18 U.S.C
-
-
-
76
-
-
36049006825
-
-
38 F.3d 736, 738, 740 (4th Cir. 1994) (finding that to meet the business-use exception of the EPCA, the business should have had the telephone line installed in the ordinary course of business and have used the line in the ordinary course of business).
-
38 F.3d 736, 738, 740 (4th Cir. 1994) (finding that to meet the business-use exception of the EPCA, the business should have had the telephone line installed in the ordinary course of business and have used the line in the ordinary course of business).
-
-
-
-
77
-
-
36048994303
-
-
250 F.3d 980, 984 (6th Cir. 2001).
-
250 F.3d 980, 984 (6th Cir. 2001).
-
-
-
-
78
-
-
36048999776
-
-
See, e.g., Berry v. Funk, 146 F.3d 1003 (D.C. Cir. 1998) (allowing a State Department employee to avoid summary judgment for factual development on the business-extension exception and other exceptions); Arias v. Mut. Cent. Alarm Serv., Inc., 202 F.3d 553, 559 (2d Cir. 2000) (finding legitimate business reason for interception because of industry custom of recording all telephone calls to and from business).
-
See, e.g., Berry v. Funk, 146 F.3d 1003 (D.C. Cir. 1998) (allowing a State Department employee to avoid summary judgment for factual development on the business-extension exception and other exceptions); Arias v. Mut. Cent. Alarm Serv., Inc., 202 F.3d 553, 559 (2d Cir. 2000) (finding legitimate business reason for interception because of industry custom of recording all telephone calls to and from business).
-
-
-
-
80
-
-
36049006826
-
-
207 F. Supp. 2d 914, 922-923 (W.D. Wis. 2002).
-
207 F. Supp. 2d 914, 922-923 (W.D. Wis. 2002).
-
-
-
-
81
-
-
36048959550
-
-
Id
-
Id.
-
-
-
-
82
-
-
36049049777
-
-
at
-
Id. at 925-926.
-
-
-
-
83
-
-
36049017064
-
-
Id. at 930-31
-
Id. at 930-31.
-
-
-
-
84
-
-
36048946340
-
-
302 F.3d 868 (9th Cir. 2002).
-
302 F.3d 868 (9th Cir. 2002).
-
-
-
-
85
-
-
36049051659
-
-
Id. at 872
-
Id. at 872.
-
-
-
-
86
-
-
36048974838
-
-
at
-
Id. at 878, 880.
-
-
-
-
87
-
-
36049028023
-
-
2004 U.S. Dist. LEXIS 18863, at *2, 10 (D. Or. Sept. 15, 2004).
-
2004 U.S. Dist. LEXIS 18863, at *2, 10 (D. Or. Sept. 15, 2004).
-
-
-
-
88
-
-
36048937281
-
-
Id. at 72-73
-
Id. at 72-73.
-
-
-
-
89
-
-
36048969441
-
-
Id. at 74-75
-
Id. at 74-75.
-
-
-
-
90
-
-
36049050978
-
-
This is not the case elsewhere. For example, in contrast, in England, notice may not suffice if an employer's practices do not reflect written policy. See Mark Jeffery, Information Technology and Workers' Privacy: The English Law, 23 COMP. LAB. L. & POL'Y J. 301, 333 2002, E]ven where employees have been clearly notified that computer monitoring may occur, if the employer does not carry out such monitoring in practice then the employees will have been led to believe that their privacy will be respected and so a further warning will be necessary before the employer may lawfully start monitoring
-
This is not the case elsewhere. For example, in contrast, in England, notice may not suffice if an employer's practices do not reflect written policy. See Mark Jeffery, Information Technology and Workers' Privacy: The English Law, 23 COMP. LAB. L. & POL'Y J. 301, 333 (2002) ("[E]ven where employees have been clearly notified that computer monitoring may occur, if the employer does not carry out such monitoring in practice then the employees will have been led to believe that their privacy will be respected and so a further warning will be necessary before the employer may lawfully start monitoring.").
-
-
-
-
91
-
-
84858472012
-
-
CAL. CONST, art. I, §1 (All people are by nature free and independent and have inalienable rights. Among these are ... privacy.). For cases interpreting the article, see, e.g., TBG Ins. Servs. Corp. v. Superior Court, 117 Cal. Rptr. 2d 155 (Ct. App. 2002), where the court allowed employer to use evidence of employees' access of pom sites on work computer used at home in wrongful termination suit, and Barbee v. Household Auto. Fin. Corp., 6 Cal. Rptr. 3d (Ct. App. 2003), where the court found an employee did not have a privacy interest with regard to romantic relationships.
-
CAL. CONST, art. I, §1 ("All people are by nature free and independent and have inalienable rights. Among these are ... privacy."). For cases interpreting the article, see, e.g., TBG Ins. Servs. Corp. v. Superior Court, 117 Cal. Rptr. 2d 155 (Ct. App. 2002), where the court allowed employer to use evidence of employees' access of pom sites on work computer used at home in wrongful termination suit, and Barbee v. Household Auto. Fin. Corp., 6 Cal. Rptr. 3d (Ct. App. 2003), where the court found an employee did not have a privacy interest with regard to romantic relationships.
-
-
-
-
93
-
-
84858467188
-
-
MASS. GEN. LAWS ch. 214, §IB (2005).
-
MASS. GEN. LAWS ch. 214, §IB (2005).
-
-
-
-
94
-
-
84858471471
-
-
CONN. GEN. STAT. §31 -48d(b) (2006).
-
CONN. GEN. STAT. §31 -48d(b) (2006).
-
-
-
-
95
-
-
84858466599
-
-
CONN. GEN. STAT. §31-48d(c)-(d) (2006).
-
CONN. GEN. STAT. §31-48d(c)-(d) (2006).
-
-
-
-
96
-
-
84858471469
-
-
DEL. CODE ANN. tit. 19, §705(b) (2006).
-
DEL. CODE ANN. tit. 19, §705(b) (2006).
-
-
-
-
97
-
-
84858471470
-
-
Security of Communications Act, FLA. STAT. §934.03 (2007).
-
Security of Communications Act, FLA. STAT. §934.03 (2007).
-
-
-
-
99
-
-
84858471462
-
-
MICH. COMP. LAWS §423.508 (2001).
-
MICH. COMP. LAWS §423.508 (2001).
-
-
-
-
100
-
-
36048992777
-
-
820
-
820 ILL. COMP. STAT. 40/9 (2005).
-
(2005)
COMP. STAT
, vol.40
, Issue.9
-
-
-
101
-
-
36048967235
-
-
Id
-
Id.
-
-
-
-
102
-
-
36048935317
-
-
A March of 2006 shepardization of the statutes revealed numerous cases interpreting the Massachusetts statute and to a certain extent the Florida statute, but none interpreting the Connecticut, Delaware, Illinois, or Michigan statutes, for example.
-
A March of 2006 shepardization of the statutes revealed numerous cases interpreting the Massachusetts statute and to a certain extent the Florida statute, but none interpreting the Connecticut, Delaware, Illinois, or Michigan statutes, for example.
-
-
-
-
104
-
-
36049041636
-
-
See Jeffery, supra note 72, at 335-37
-
See Jeffery, supra note 72, at 335-37.
-
-
-
-
105
-
-
36049017688
-
-
See id
-
See id.
-
-
-
-
106
-
-
36048966603
-
-
Christophe Vigneau, Information Technology and Workers' Privacy: Regulatory Techniques, 23 COMP. LAB. L. & POL'Y J. 505, 506 (2002).
-
Christophe Vigneau, Information Technology and Workers' Privacy: Regulatory Techniques, 23 COMP. LAB. L. & POL'Y J. 505, 506 (2002).
-
-
-
-
107
-
-
36048993452
-
-
England is discussed rather than Great Britain because Scottish law is not purely common law
-
England is discussed rather than Great Britain because Scottish law is not purely common law.
-
-
-
-
108
-
-
36048976627
-
-
Kaye v. Robertson, [1991] F.S.R. 62 (Eng. CA. 1990) (stating that there was no tort of privacy).
-
Kaye v. Robertson, [1991] F.S.R. 62 (Eng. CA. 1990) (stating that there was no tort of privacy).
-
-
-
-
109
-
-
36048946996
-
-
Jeffery, supra note 72, at 302 n.3 (citing BASIL MARKESINUS & SIMON DEAKIN, TORT LAW 648 (4th ed. 1999)).
-
Jeffery, supra note 72, at 302 n.3 (citing BASIL MARKESINUS & SIMON DEAKIN, TORT LAW 648 (4th ed. 1999)).
-
-
-
|