disclaimer is this your organization s data is this your
play

DISCLAIMER Is this your Organizations Data Is this your - PowerPoint PPT Presentation

DISCLAIMER Is this your Organizations Data Is this your Organization s Data Privacy Strategy? Is this your Organizations Social Is this your Organization s Social Media Policy? Mitigating the Social Media and Data Mitigating the Social


  1. DISCLAIMER

  2. Is this your Organization’s Data Is this your Organization s Data Privacy Strategy?

  3. Is this your Organization’s Social Is this your Organization s Social Media Policy?

  4. Mitigating the Social Media and Data Mitigating the Social Media and Data Privacy Exposures Facing Employers

  5. Social Media and data privacy issues are still at a very early stage

  6. Social Media Explained i l di l i d I need to go to the bathroom I went to the bathroom I went to the bathroom This is where I am going to the bathroom Why am I going to the bathroom Look at me going to the bathroom I’m good at going to the bathroom

  7. Two interns discussing Social Media ROI

  8. Where Data Privacy and Social Media Collide

  9. The Severity Index looks at the magnitude of breaches in the last 90 days- Severe (Red) signifies over 10,000,000 records have been breached. (9/12/2011) breached. (9/12/2011)

  10. What is Private Data h i i • Can come in many forms, but State and FTC typically have jurisdiction • In Washington Personal Identifiable Information I W hi P l Id ifi bl I f i (PII) is defined as: – An individual s first name (or initial) and last name An individual’s first name (or initial) and last name combined with one of the following: • Social Security Number y • Driver’s License Number • State ID Card Number • Bank Account/Credit Card/Debit Card Number k / di d/ bi d b

  11. Privacy & Security Defined by Bureau Privacy & Security Defined by Bureau of Consumer Protection/FTC • Behavioral Advertising • Children's Online Privacy • Credit Reports • Data Security Data Security • Gramm-Leach-Bliley Act • Health Privacy • Health Privacy • Red Flag Rules

  12. Behavioral Advertising h i l d i i

  13. Children’s Online Privacy hild ’ li i The Children’s Online Privacy Protection Act (COPPA) gives parents control over what (COPPA) gives parents control over what information websites can collect from their children. children.

  14. Credit Reports di • Does your business use credit reports to evaluate customer’s credit worthiness? Do you consult credit reports when considering evaluating applications for jobs, leases, and insurance?

  15. Data Security i • Many companies keep sensitive personal information about customers or employees in information about customers or employees in their files. • 46 States have “Security Breach” Legislation • 46 States have Security Breach Legislation (Including WA and CA).

  16. Gramm-Leach-Bliley Act h lil

  17. Health Privacy l h i • Does your business or organization have a website that allows people to maintain their medical information online? medical information online? • If you are a Health Care Provider, a Health Plan or a Health Care Clearinghouse you must be aware a Health Care Clearinghouse, you must be aware of HIPAA

  18. Red Flag Rules d l l • The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the Theft Prevention Program designed to detect the warning signs – or red flags – of identity theft in their day-to-day operations. y y p

  19. Recent Privacy Study Results i d l • Verizon 2010 Data Breach Investigations Report in cooperation with the United States Secret Service • Ponemon Institute 2010 Annual Study • Ponemon June 2011 Perceptions About Network p Security

  20. Survey Results l • Small To Mid-Size businesses are increasingly at risk. – 50% of reported breaches occurred at organizations with less than 1000 employees – 27% of breaches were experienced by organizations 2 % f b h i d b i i with less than 100 – Cost and number of malicious attacks are increasing Cost and number of malicious attacks are increasing

  21. Number of Successful Network Number of Successful Network Security Breaches over 12 Months

  22. Cost of a Security Breach f i h

  23. What is the Source of a Security What is the Source of a Security Breach

  24. Data Privacy Best Practices i i Understand the Federal and State laws that apply to your organization; • Perkins Coie provides a fantastic resource. Understand what personal information you have in your files and on your • computers. Consider using a 3 rd party resource. p g p y Keep only what is necessary for your business operations. • Properly protect the information you keep. Consider a 3 rd party network • security audit. Properly dispose of what you no longer need including paper files, l d f h l d l d f l • electronic files, computer hard drives, etc. Plan ahead by creating a plan to respond to security incidents. • Consider a comprehensive data privacy/media liability insurance policy to Consider a comprehensive data privacy/media liability insurance policy to • transfer the risk. Here is an article that may be of interest: http://www.psfinc.com/press/data-liability-challenges-facing-employers FTC Guide: Protecting Personal Information FTC Guide: Protecting Personal Information – A Guide for Business A Guide for Business

  25. Social Media in the Workplace i l di i h k l

  26. What is Social Media? h i i l di ?

  27. “Web sites and other online means of communication that are used by large groups of people to share information and to develop social and professional contacts”

  28. “Social media introduce substantial and pervasive p changes to communication between organizations, communities, and individuals enabled by ubiquitously accessible and ubiquitously accessible and scalable communication techniques” techniques - Jan Kietzmann, et al Jan Kiet mann, et al

  29. Cases “A women lost a job offer at Cisco because of something A women lost a job offer at Cisco because of something she said on Twitter” -MSNBC, March 27, 2009 “An office worker was fired after her employer discovered her sex blog.” -Inc., May 4, 2010 Inc., May 4, 2010 “ A waitress was fired for venting about a customer on Facebook” -Inc., May 25, 2010 I M 25 2010 “Labor Panel to press Reuters over reaction to Twitter post” p -New York Times, April 6, 2011

  30. Facebook 5 Online Office Gossip

  31. Employer: Hispanics United of Buffalo • An employee posted on Facebook comments a co • An employee posted on Facebook comments a co- worker had made about other employees. • Other employees responded, and included p y p , comments about working conditions. It happens all the time, right?

  32. Employer Terminates employees for harassment Employer Terminates employees for harassment based on Facebook postings.

  33. “It doesn’t take much to establish the concerted It doesn t take much to establish the concerted nature of the discussion, so long as it involved or touched upon a term or condition of touched upon a term or condition of employment” - NLRB Hartford Regional Director NLRB Hartford Regional Director

  34. Conclusion l i September 2, 2011 Unlawful Termination Mandatory Reinstatement Payment of Back Wages

  35. Broader Conversation d i NLRB filed complaints against Register Guard (2007) case NLRB filed complaints against Register Guard (2007) case • “Employer can lawfully impose a broad ban on employee’s use of corporate e-mail system for solicitations and other non-business reasons as long as the policy on its face does non-business reasons as long as the policy on its face does not discriminate against union activity and is enforced in a non-discriminatory manner” – Littler May 2 2011 Littler, May 2, 2011 • “Could severely restrict employers ability to regulate social media activity while using corporate electronic resources.” – Littler May 2 2011 Littler, May 2, 2011 • “Court of Appeals overturned Board’s determination, status uncertain.” – NLRB Website July 26 2011 NLRB Website, July 26, 2011

  36. Employees Representing Your Employees Representing Your Company in Social Media

  37. • Include Social Media Policy in Employment Agreement • Incl de Social Media Polic in Emplo ee Handbook • Include Social Media Policy in Employee Handbook • Create an online disclosure • Educate employees about Common Sense! • Post it! • Refresh it!

  38. • Transparency • Disclaimer • Outline Disciplinary Actions

  39. • Have a support level H t l l employee review online presence of applicants presence of applicants • Insulate hiring managers from obtaining protected from obtaining protected class information • Review candidates for comments or activities contradictory to corporate policies -David Black, Jackson Lewis

  40. Additional Resources ddi i l SHRM – 1070 hits on “social media” search Insurance Companies and Brokers- Risk Management 101 HR Consultants Attorneys NLRB- www.nlrb.gov g Social Media! Upcoming Seminar- October 27 th 4-6:30 WAC Upcoming Seminar October 27 , 4 6:30 WAC

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend