1 / 44

Social Networking & Professional Liability

Social Networking & Professional Liability. May 13, 2010 Speakers: Gary Basham, Basham Parker Rebecca Pearson, AmWINS Insurance Brokerage of California Michelle Kley, Beazley Moderator: Randall J. Krause. Rebecca S. Pearson, Esq.

andres
Download Presentation

Social Networking & Professional Liability

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Networking &Professional Liability • May 13, 2010 • Speakers: • Gary Basham, Basham Parker • Rebecca Pearson, AmWINS Insurance Brokerage of California • Michelle Kley, Beazley • Moderator: Randall J. Krause

  2. Rebecca S. Pearson, Esq. Assistant VP in the Financial Risk Solutions Group of AmWINS Insurance Brokerage, San Francisco. Focus is E&O, D&O, EPL and other professional and management liability insurance placements. Expertise in cyber liability, technology, privacy, architects and engineers, lawyers professional, real estate professionals and miscellaneous consultants. Before engaging in insurance brokerage in 2006, Becky practiced law in San Francisco. Practice included insurance coverage litigation representing policyholders in coverage disputes. Stanford University (B.A. Communications) University of San Francisco School of Law (J.D. 2000)

  3. Michelle Kley, Esq. Legal counsel to Beazley’s Technology, Media and Business Solutions team Focus is technology E&O, network security, privacy and media coverage. Prior to joining Beazley in 2009, she was an associate at Wilson Sonsini Goodrich & Rosati specializing in mergers and acquisitions. UC Berkeley School of Law (Boalt Hall) (J.D. 2003) Sonoma State University (B.A. psychology)

  4. Gary R. Basham, Esq. Founding partner, Basham Parker LLP, with exclusive employment law practice. Focus is defending employers against claims for breach of contract, discrimination, retaliation, harassment, wrongful termination, unfair business practices, violation of wage and hour laws. Expertise in Age Discrimination and Employment Act, ADA, Title VII, Equal Pay Act, FMLA & CFRA, California’s FEHA, California Workplace Violence Safety Act, and workplace privacy laws. Member of the Labor and Employment Section of the State Bar of California, Sacramento County Bar Association, Sacramento Human Resource Management Association, Central Valley Human Resource Management Association. Mediator for the United States District Court for the Eastern District of California’s Voluntary Dispute Resolution Program. In addition to his law practice, Mr. Basham also is actively engaged in various community service activities. From December 2003 through May 2009, Mr. Basham was the Vice President of the Board of Directors for the Sacramento Union Gospel Mission, an organization dedicated to helping the homeless. Mr. Basham continues to volunteer his time to the Union Gospel Mission, as well as other organizations which feed the hungry and house the homeless. University of Michigan Law School, cum laude (J.D. 1987) Michigan State University, with honors (B.A. 1984).

  5. Social Media Defined • Social media is conversation and interaction online using highly accessible and scalable publishing techniques. Social media transforms people from content consumers to content producers.

  6. Social Media Users • Social media now appealing to big and small businesses. • Companies are utilizing social media to reach customers and to build or maintain reputation.

  7. Social Media – A Business Tool • Examples: Facebook, Twitter, LinkIn, Ning, YouTube • Social media have become the new "tool" for effective business marketing and sales.

  8. Small Social Media • Ziggs—a professional connection portal. • Ecademy—networking for business, offline networking events and global networking groups. • Fast Pitch—Social Network for Business Networking Professionals to market their business, press, blogs, events and networks. • Yelp—a local business review and talk networking site, including user reviews and recommendations.

  9. Social Media Statistics • Social networking now accounts for 11 percent of all time spent online in the US • In December 2009, 248 million unique monthly users on the top eight social networking sites in the US, an increase of 41% from January 2009 • One in four (25%) US Internet page views occurred at one of the top social networking sites in December 2009, up 83% from 13.8% in December 2008

  10. Social Media Statistics • In December 2009, Twitter handled over 1 Billiontweets per month. • Next month (January 2010), handled over 1.2 billion • Average 40 million tweets per day • Mobile User Stats as of March 4, 2010: • Twitter had 347% jump since 2009 in access via mobile browser. • Over 30% of smartphone users access social networks using a mobile browser, up from 22% a year ago. • Facebook uses w/mobile browser up 112%.  • In one month (January 2010): Facebook had 25.1 million users; MySpace had 11.4 million; Twitter had 4.7million

  11. Facebook Statistics (as of May 12, 2010)

  12. Last Week • ePlace Solutions employees discovered major data breach • Social networking site involved: Friendster.com

  13. KNBCPublished: May 5, 2010 Over the past few months thousands of Facebook users report receiving messages or friend requests from people they don’t know. Researchers at VeriSign, an internet security company say they’ve tracked a growing trend of bogus or stolen Facebook accounts that are now up for sale in high volume on the black market. VeriSign says 1.5 million Facebook accounts appear to be for sale. Criminals apparently steal login data for accounts, typically with phishing techniques that trick users into disclosing their password. They use the accounts to send out spam or malicious programs or steal a person’s identity. Here’s an example from my email account!

  14. Social engineering attacks on the rise!

  15. Social Networking--EPL Liability Gary Basham, Basham Parker

  16. Facebook Firing

  17. SCREENING AND BACKGROUND CHECKS • CareerBuilder.com reports that a survey of 3100 employers revealed that 22% of hiring managers said they use the Internet and social networking sites to research job candidates • An additional 9% said they don't currently use the Internet and social networking sites to screen potential employees, but plan to start

  18. SCREENING AND BACKGROUND CHECKS • Twenty-four percent of hiring managers who researched job candidates via the Internet and social networking sites said they found content that helped to solidify their decision to hire the candidate; top factors that influenced their hiring decision included: • 48% of candidates background supported their qualifications for the job • 43% of candidates had great communication skills • 40% of candidates was a good fit for the company's culture • 36% of candidates site conveyed a professional image • 31% of candidates had great references posted about them by others • 30% of candidates showed a wide range of interests • 29% of candidates received awards and accolades • 24% of candidates profile was creative

  19. SCREENING AND BACKGROUND CHECKS • Of those hiring managers who have screened job candidates via the Internet and social networking profiles, one-third reported they found content which caused them to dismiss the candidate from consideration; top areas for concern among these hiring managers included: • 41% of candidates posted information about them drinking or using drugs • 40% of candidates posted provocative or inappropriate photographs or information (potential sexual harassment or gender discrimination claims) • 29% of candidates had poor communication skills • 28% of candidates bad-mouthed their previous company or fellow employee • 27% of candidates lied about qualifications • 22% of candidates used discriminatory remarks related to race, gender, religion, etc. • 21% of candidates were linked to criminal behavior • 19% of candidates shared confidential information from previous employers

  20. MONITORING EMPLOYEES

  21. EMPLOYEE PRODUCTIVITY Nucleus Research July 2009 Survey237 Randomly Selected Office Workers • Employers are losing 1.5 workers per 100 in employee productivity to social networking • Nearly two-thirds of those who have Internet access visit social networking sites during working hours • Those who visit these sites at work do so for an average of 15 minutes each day • Of those who visit social networking sites at work, 87% could not define a clear business reason for it • Of those who visit social networking sites at work, 6% never use it anywhere else, meaning one in every 33 workers do all of their social networking during work hours

  22. RECOMMENDATIONS “It may look harmless, but it's a legal land mine for employers.” The National Law Journal July 6, 2009 • The California Supreme Court has ruled a former employer providing a recommendation owes a duty to protect employers and third parities and cannot misrepresent the qualifications and character of an ex-employee where there is a substantial risk of physical injury. • (Randi W. v. Muroc Jt. Unified School District (1997) 14 Cal.4th 1066.) • The law arguably places employers who give recommendations in a Catch-22, which ultimately raises the risks to the insurers – if an employer fails to disclose an accusation because of insufficient credible evidence, then the employer risks being sued by third party victims; however, if the employer does mention an accusation, the ex-employee can arguably sue for defamation.

  23. POTENTIAL RISKSINVASION OF PRIVACY CLAIMS • Generally, under federal and California state law, employers may utilize social networking sites to conduct background checks on employees if: • The employer conducts the background check itself • The site is readily accessible to the public • The employer does not need to create a false alias to access the site • The employer does not have to provide any false information to gain access to the site • The employer does not use the information learned from the site in a discriminatory manner or otherwise prohibited by law

  24. DISPARATE IMPACT DISCRIMINATION CLAIMS • Even where an employer is not motivated by discriminatory intent, employers are prohibited from using a facially neutral employment practice that has an unjustified adverse impact on protected classes • According to the latest data collected from Quantcast, users of social networking sites are primarily Caucasians age 20-40 (on LinkedIn, only 4% of users are African-American, 8% are Asian, and just 2% are Hispanic) • Recruiting on social networking can result in disparate impact on groups without a large social networking presence

  25. DISPARATE TREATMENT DISCRIMINATIONA PICTURE I$ WORTHA THOU$AND WORD$ AND MORE If you are not careful, a picture may be worth a claim of employment discrimination. Take a look at the following slide and photographs which have been uploaded to, and freely obtained from various FaceBook, MySpace, and blog sites. What information can you gain from these photos which would otherwise be “off-limits” when making employment decisions?

  26. UNLAWFUL DISCRIMINATIONWHAT CHARACTERISTICS ARE PROTECTED? • Age (40 years or older) • Association/affiliation (including political) • Disability/medical condition (physical or mental) • Marital status • National origin/ancestry (including language use restrictions) • Race/color • Religion • Retaliation for engaging in protected activity or requesting a protected leave of absence • Sex/gender (including gender identity) • Sexual orientation • Veteran status

  27. ON-DUTY CONDUCT Imagine you are the manager of a Burger King restaurant and you have just discovered how to use MySpace. You decide to check the profiles of the employees who work the midnight shift. While perusing one employee's profile, you notice a link to a video. As you click on the link, you are immediately faced with the employee, possibly in his birthday suit, taking a bath in one of the restaurant's utility sinks. You instantly imagine every horrible situation that may result from this incident: health violations, customers getting sick, bad public relations. This situation is no fabrication. It actually occurred at a Burger King in Xenia, Ohio.

  28. WORKPLACE TWITTERWHAT WOULD YOU DO?

  29. MANAGING RISKS OF MONITORING EMPLOYEE SOCIAL NETWORKING • Employers have the right to monitor employees’ social networking activity if it occurs during work hours and as it relates to the employer’s business • Employers can reduce the potential of claims for invasion of privacy and discrimination by: • Ensuring employees are aware their computer usage may be monitored (policy, policy, policy) • Monitor everyone – and equally • Use reliable monitoring techniques

  30. LOSS CONTROL RECOMMENDATIONSConstruct Clear Policies onEmployee and Applicant Screening Processes • When screening applicants and researching employees on social networking and blog sites, employers should create strict policies concerning which company representatives may research individuals, what they may research, and what methods of research they may use • In order to guard against discrimination suits, employers should designate a neutral party who is not an employment decision-maker to research the applicant or employee’s social networking profiles and blogs • Employers should instruct that neutral party to withhold any and all information pertaining to an individual’s protected class or characteristics when reporting back to the decision-maker • The neutral party should not unnecessarily delve into research that would focus on any of these protected traits

  31. LOSS CONTROL RECOMMENDATIONSConstruct Clear Policies onEmployee and Applicant Screening Processes • When researching employees or screening applicants on social networking and blog sites, individuals conducting research should not employ questionable tactics to gain access to profiles, blogs, and other information • Employers should not try to “friend” an applicant or employee for the primary purpose of investigation • Employers should also not attempt to obtain passwords or access to the profile from other employees, as the other employees may feel compelled or obligated to provide the employer such information

  32. LOSS CONTROL RECOMMENDATIONSConstruct Clear Policies on Employee Use • The policy should be designed to implement clear rules regarding the extent of allowable usage and whether it is permissible for employees to affiliate themselves with the company • Social media policies should be developed along the same guidelines as electronic communication policies and incorporated into existing confidentiality and technology policies whenever possible • The policy should be disbursed in a manner that will provide confirmation that the employees have read and understood the policy • Employers should also take care to ensure the policy is effectively communicated to the workforce and should consider providing training sessions or include the content of the policy in orientation seminars

  33. LOSS CONTROL RECOMMENDATIONSWhat Should Be Included In the Policy(Include a specific statement of what is prohibited.) • Disclosing confidential or proprietary information • Disclosing the name of the business in personal websites or purely social networking sites except professional networking sites (e.g., LinkedIn) • Revealing the name of the company on a site with sexual or violent content • Using the company's intellectual property (e.g., trademarks) • Infringing on the intellectual property rights of others

  34. LOSS CONTROL RECOMMENDATIONSWhat Should Be Included In the Policy(Include a specific statement of what is prohibited.) • Making statements adversely affecting the company's interests or reputation • Criticizing customers or other important business partners • Making statements supporting competitors • Issuing defamatory, harassing, or disparaging language • Issuing content that violates the law (e.g., obscenity) • Writing or commenting on content that would constitute a violation of any other policies, rules, standards of conduct, or requirements applicable to employees

  35. Social Networking &Data Security (Cyber) Issues

  36. Thank You!

More Related