Social Media, Cyberstalking and the Hiring Process Sponsored by - - PDF document

social media cyberstalking and
SMART_READER_LITE
LIVE PREVIEW

Social Media, Cyberstalking and the Hiring Process Sponsored by - - PDF document

2/8/2017 Social Media, Cyberstalking and the Hiring Process Sponsored by February 9, 2017 Presenter Maureen De Armond Associate Counsel at Iowa State University 1 2/8/2017 Agenda Learning Objectives Dont Do it! Cyber Stalking Job


slide-1
SLIDE 1

2/8/2017 1

Social Media, Cyberstalking and the Hiring Process

February 9, 2017

Sponsored by

Presenter

Maureen De Armond Associate Counsel at Iowa State University

slide-2
SLIDE 2

2/8/2017 2

Agenda

Learning Objectives Don’t Do it! Cyber Stalking Job Applicants? NO WAY! Do It! Google Happens. Ignoring Online Data Is a Mistake Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

3

Learning Objectives

Don’t Do It: Recognize legal and operational risks to considering online material in assessing job applicants (e.g., protected class status, disparate impact, fairness to applicants and institution) Do It: Recognize potential benefits (e.g., identify unethical and unprofessional conduct, inconsistent information re job experience, publications) If You Do It: Understand best practices and proceed with caution:

4

  • Identify the spectrum of options for addressing searching and assessing
  • nline material
  • Understand the importance of having a solid plan
  • Identify the key aspects of such a plan
slide-3
SLIDE 3

2/8/2017 3

You can find all kinds of information about a person on the internet. This is a free resource, a potential landmine of insight… …all you have to so is Google the name… Why wouldn’t you want to look up an applicant?!??!

5

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

What t cou

  • uld

ld you

  • u lea

learn rn by y goo

  • ogli

ling an applic licant?

Taste good, but seem to give me an upset stomach  My BFF’s new baby. So cute! Can’t wait to have my own!!!

6

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

slide-4
SLIDE 4

2/8/2017 4

“Check

  • ut my

new wheels!” “Prayer Request: Doctor Appt today. Pray the cancer is all GONE!!” “My so-called friends made me this b-day cake…thanks for rubbing it in!!” #40sucks #gettingold Beautiful new prayer rug just arrived!

7

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

So, you learned some “stuff” by cyber-stalking, so what? Unlawful Discrimination Based on Protected Class Status Applies to the Application & Hiring Process…

8

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

slide-5
SLIDE 5

2/8/2017 5

Bosses May Use Social Media to Discriminate Against Job Seekers

Carnegie Mellon University researchers found evidence that sharing personal information via

  • nline social networks can lead to

hiring discrimination. Focus on: Muslim v. Christian; Gay v. Straight; Political Affiliation (Nov. 2013)

“While it appears a relatively small portion

  • f U.S. employers regularly searches for

candidates online, we found robust evidence of discrimination among certain types of employers,” Dr. Fong said.

9

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

Rutgers & Syracuse Study: Employers Discriminate Against Qualified Workers with Disabilities

Employers are more likely to discriminate against highly qualified job applicants who have disabilities than equally qualified candidates who do not. Employers expressed interest 26% less

  • ften in candidates who disclosed

disabilities in cover letters.(Nov. 2015)

“I don’t think we were astounded by the fact that there were fewer expressions of interest for people with disabilities, but I don’t think we were expecting it to be as large,” said Dr. Lisa Schur.

10

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

slide-6
SLIDE 6

2/8/2017 6

Pot

  • tential Di

Disparate Im Impact

  • 27% of
  • f ad

adults living with th dis disabilities ar are significantl tly less ss likely to to go on

  • nline (54% v.

. 81 81%)

  • Latinos less

ss likely to to be be on

  • n Li

LinkedIn (29% v. . 18 18%) (Pew In Internet t Pro roject)

11

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

Sho Should the the abs absence of f onlin nline co conte ntent co coun unt ag against the the can candidate?

Q: What else can an you

  • u lear

earn if f you

  • u goo
  • ogle

le appli licants ts? A: Potentia ially ly, a a who hole lotta stuff!

12

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

slide-7
SLIDE 7

2/8/2017 7

13

Oth ther r con

  • nsid

idera ratio ions: You got

  • t the

the wr wrong gu guy! In Info is inaccurate, mis isle leadin ing, taken out

  • ut of
  • f

context xt Info is dated…. Info does not really help…

“ ”

Don’t Do it! Cyber Stalking Job Applicants? NO WAY!

14

Do It! It! Google Happens. Ign Ignoring Online Data Is Is a Mis istake

slide-8
SLIDE 8

2/8/2017 8

15

  • Comments not reflecting your values: racist, sexist, homophobic
  • Evident links to criminal behavior
  • Evidence of poor work ethic, disclosing confidential info

(FERPA)

  • Bad judgment … maybe even really, really bad judgment
  • Bad-mouthing current/former employers/co-workers
  • Inconsistent information re job history, education, degrees,

publications

  • Ulterior motives
  • Demonstrating really poor communication skills
  • Lying about: qualifications, absences, experience

Do It! It! Google Happens. Ign Ignoring Online Data Is Is a Mis istake

In January 2010, a sociology professor at East Stroudsburg University in Pennsylvania, wrote on Facebook: “Does anyone know where I can find a very discrete hitman? Yes, it's been that kind of day…” In February, she wrote: “had a good day today. DIDN’T want to kill even one student. :-). Now Friday was a different story.” A student then reported her comments to university officials. She was suspended.

16

Do It! It! Google Happens. Ign Ignoring Online Data Is Is a Mis istake

slide-9
SLIDE 9

2/8/2017 9

Google Happens! Without discussion, a plan, guidance, or rules rogue Google searches of applicants will happen.

17

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

CASE STUDY: Steven Salaita vs. the Univ. of Illinois

18

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

slide-10
SLIDE 10

2/8/2017 10

19

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

EE EEOC Gui uidance:

  • Avoid pre and post-hire

discrimination

  • Avoid workplace

harassment

  • Hire 3rd party or designate

reviewer

  • Don’t ask for passwords!
  • Monitor state law

Wild West

Con: No Policy or Guidance Con: No Consistency Con: Greatest Legal Risks Con: Greatest Risk for Unfairness

Everyone

Pro: Guidance or Policy Clear Pro: Consistent Standard Con: Not efficient Con: Overly intrusive In-House or Vendor?

Complete Ban

Pro: Policy Clear Pro: Appearance of Consistency Con: Underground Searches; Legal Risks Con: Risk for Unfairness Con: Will Miss “Stuff”

Select Positions

Pro: Guidance or Policy (Clear?) Pro: Consistent Standard Con: Clarity of Applicability In-House or Vendor?

20

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

slide-11
SLIDE 11

2/8/2017 11

If If you

  • u ar

are goi

  • ing to
  • all

allow for

  • r onl
  • nline sea

earches, , you

  • u

nee eed a a clea clear (an (and defensible) process. Manage pro’s and con’s

21

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

Key y Proc

  • cess Co

Compo mponents:

  • Transparency
  • Policy; Training
  • Consistency (How)
  • Consistency (Who)
  • Rationale for Search (Why)
  • Timing (When)
  • Impact of Findings (What)
  • Monitor State Law
  • Don’t Ask for Passwords!

22

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

slide-12
SLIDE 12

2/8/2017 12

Transparency y Matters: You

  • ur

pr process sho should ld be be cl clear for

  • r

ap appli licants ts (a (as it t is s wit ith cr crim imin inal, cr credit it ba background che checks) an and all all em employees involved in n the he hir hiring pr process. No

  • se

secrets

  • ts. No
  • Sur

Surprises.

23

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

Polic

  • licy; Train

aining: Process should be reduced to writing and easy to find. Train those involved in the hiring process.

Is everyone required to comply with University policy? Are there consequences for those who do not?

24

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

slide-13
SLIDE 13

2/8/2017 13

25

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

Applicant Inquiries and Contact. Refrain from independently conducting any type of background check or inquiry on an applicant including: conducting any type of online search of applicants and asking people who may know an applicant for information or opinions about the applicant. Refrain from accepting/reviewing additional materials, communications, or information from an applicant (or someone who knows the applicant) shared outside of the official vetting process.

How to Manage Scope and Consistency of Searches Where to search? What sites do you review? How exhaustively do you search? Do you conduct identical searches for each candidate?

26

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

slide-14
SLIDE 14

2/8/2017 14

Who do you think would be the most and least appropriate people to (a) conduct the searches and (b) review the data collected:

  • 1. Members of the search committee
  • 2. Future supervisor
  • 3. Future supervisor’s supervisor
  • 4. Future co-workers
  • 5. Administrative assistant in area the where

candidate would work

  • 6. Human Resources
  • 7. Third party vendor

27

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process Ra Rationale for

  • r Se

Search: If If you

  • u ar

are e goi

  • ing to
  • sea

search

  • n
  • nlin

line, you

  • u nee

eed to

  • ar

articulate a a goo

  • od rea

eason (c (curi riosity is is not

  • t a

a goo

  • od

reas ason). .

28

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

slide-15
SLIDE 15

2/8/2017 15

Cou

  • uld you ar

articulate a a goo

  • od rea

eason to

  • con
  • nduct an

an

  • nli
  • nline sea

search for

  • r an

any of

  • f the

he follo

  • llowing:

Lab Technician Assistant Football Coach Chief Diversity Officer Academic Advisor Third Shift Custodian Facilities/Maintenance Adjunct Math Professor Resident Hall Director Director of Marketing Director of Equal Opp. Assist Prof Kinesiology Dean of Students Cook in Student Dining Creative Writing Postdoc President’s Administrative Assistant Vice President of the University Foundation

29

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

When to to dis discuss ss to topic? When do you decide to search or not to search? Halfway through? When do you tell the candidate? Or is it part of the application process (certification)

30

When to co conduct search: : When do you conduct the search… ..before or after you meet the candidate in n pe person? Why is timing important?

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

slide-16
SLIDE 16

2/8/2017 16

Im Impact t of

  • f findings: What do

do you you do do with th the re resu sults? How to assess the information gathered:

  • Information should not add to a candidate’s overall “score”
  • No internet presence should not count against a candidate
  • Impact on overall assessment should be minimal

31

Proceed with Caution: Primary Considerations to Manage Risk and Protect the Integrity of Your Hiring Process

Practice Tip: Use info only to screen out. Want to know more about the candidate? Call more references! Longer interviews!

Take-Aways

32

  • The internet is here to stay…and it can lie, deceive, and distort
  • Unlawful discrimination occurring during the hiring process is a risk
  • At the same time, data available online about candidates may be helpful
  • Each institution should weigh the pro’s and con’s and make a (conscious)

decision on how it wants to deal with the reality of online data.

  • There should be a clear process or ban on conducting online searches of

job applicants. People should not be guessing or “going rogue”

  • Discussing the topic up front with search committees can head off

problems (and surprises) later in the process (re Univ of IL).

  • Human Resources (and Legal) should be prepared to pro-actively help and

re-actively triage

slide-17
SLIDE 17

2/8/2017 17

Take-Aways: Reading Materials

33

Q & A

Don't forget to submit your questions to our presenters. How? Click on the Q & A tab at the top of the presentation and select Ask New Question.

Thank you for joining us today!

slide-18
SLIDE 18

2/8/2017 18

Thank You!

Sponsored by

“Social Media, Cyberstalking and the Hiring Process”

February 9, 2017