SlideShare una empresa de Scribd logo
1 de 17
EMPLOYEES AND
          INTERNET USE


Darius Whelan, Faculty of Law, University College Cork
Dublin Solicitors Bar Association Seminar, December 2012
BALANCING COMPETING INTERESTS




          Employee’s Privacy           Employer’s Interests




   Employees do not leave their privacy at the front door
    when they come to work

                                                              2
EMPLOYER‟S INTERESTS / DUTIES
 Employers have general right to determine work
  tasks and control contract performance
 Employer has property rights in equipment
 Employers may lay down quality and behaviour
  standards
 Employer must safeguard employees‟ health, safety
  and welfare
 Employer has duty of trust and confidence towards
  employee


                                                      3
PRIVACY
   Halford v UK (1997):
       Assistant Chief Constable – Office phones „tapped‟ – No
        warning
       She had a reasonable expectation of privacy and so art. 8
        had been breached
   Copland v UK (2007):
     Employer (Welsh public college) monitoring internet
      usage, e-mails and telephone traffic of Ms.C (employee)
      without her knowledge
     Content not monitored; instead names of recipients etc.
     Held: Breach of Article 8


                                                                    4
Köpke v Germany (2010)
 Employer had used covert video surveillance for
  two weeks to investigate employee for theft
 Domestic law required proportionality, etc.

 ECtHR held complaint under art. 8 manifestly ill-
  founded




                                                      5
KEY DATA PROTECTION PRINCIPLES
     Data Protection Acts 1988-2003:
         Data must be obtained and processed fairly
         Data subject must be informed of purpose for which data are
          processed
         Legitimate Processing:
             Various categories including
                 Data subject consenting to processing, or
                 processing is for „legitimate interests‟ of controller without unduly
                  prejudicing subject‟s rights/ freedoms / interests
         Data must be kept for specified, explicit and legitimate
          purposes
         There must be appropriate security measures
         Data subject has right of access to data

                                                                                          6
Gresham Hotel (2007)
   Data Protection Commissioner Case Study 6 of 2007
   Covert video surveillance
   Other employees being investigated, not this particular
    employee
   Gardaí were not involved
   Commissioner found data was being processed in a manner
    incompatible with its purpose
   Covert surveillance would require actual involvement of
    Gardaí or intention to involve them
   Amicable resolution reached

                                                              7
   Ali v First Quench (2001)
     Covert video surveillance in off-licence office – thefts of
      stock – Mr A prime suspect
     Mr A was filmed having sexual intercourse in office while
      shop open
     Dismissal fair


   McGowan v Scottish Water (2004)
     Video surveillance of employee‟s house, due to
      suspicion of timesheet irregularities
     Dismissal fair; did not breach privacy


                                                                    8
   Mehigan v Dyflin Publications (Ireland, 2002)
       M received 3 pornographic images by e-mail and forwarded them
        on to someone else
       Tribunal did not accept this was a one-off incident. Evidence of
        other material on computer inc. sexual cartoons
       E-mails can often cause offence
       The EAT will be heavily influenced by the existence of a written
        policy reserving right to dismiss
       Unlikely dismissal permissible otherwise
       Possible exception – downloading obscene pornography
           (Distinction between facts here and „exceptional‟ cases unclear)
       Onus on employer to introduce policy
       Dismissal unfair, but employee contributed substantially
       €2,000 for unfair dismissal plus €2,800 in lieu of notice
                                                                               9
Murray and Rooney v ICS Building Society (2011)
 Two employees allegedly circulated pornography by
  email
 EAT found investigation flawed

 Investigation took place without their knowledge;
  they could not make submissions on terms of
  reference
 Investigation involved only small sample of emails
  and did not include employees who had deleted
  emails
 Dismissal was disproportionate
                                                       10
 €30,000 to one employee; €36,000 to the other
Kiernan v A Wear (2008)
 Employee posted derogatory comments on BEBO

 E.g. Regarding manager “She called me a liar. I
  f**ing hate that c**t”
 Visible to customers

 Fair investigation held. Employee dismissed

 EAT found dismissal disproportionate

 Employee contributed to her dismissal

 €4,000 for unfair dismissal
                                                    11
Walker v Bausch and Lomb (2009)
 Employee wrote on intranet: “500 jobs to be gone at
  Waterford plant before end of first quarter 2008”
 No proof that employee had received intranet policy

 Fair hearing held. Employee dismissed.

 EAT found dismissal disproportionate

 Employee greatly contributed to situation

 €6,500 for unfair dismissal




                                                        12
O’Mahony v PJF Insurances (2011)
 Facebook – Employee called manager a “bitch”

 At first, the page was accidentally seen

 Employee then allowed full access

 A number of disparaging comments

 Suspended pending investigation

 EAT – Significant breach of trust which made
  employment untenable
 Employer acted reasonably. Dismissal fair.



                                                 13
GUIDANCE

    Council of Europe
        Recommendation R (89) 2 on Protection of
         Personal Data Used for Employment
         Purposes 1989
    International Labour Organisation
        Code of Practice on Protection of Workers‟
         Personal Data 1997
   Article 29 Working Party
     Opinion 8/2001 on processing of personal data in the
      employment context
     Opinion 4/2004 on video surveillance
 Data Protection Commissioner (Ireland), Monitoring
  of Staff, Guidance Note, 2004
 Data Protection Commissioner (Ireland), Data
  Protection and CCTV, Guidance Note, 2004




                                                             15
DRAWING UP A POLICY
   Review legislation, guidance and cases
   Clarify purposes of monitoring (if any) – must be
    proportionate
   Notify purposes of monitoring to employees – e.g.
    state if can be used for disciplinary purposes; may
    ultimately lead to dismissal; misconduct v gross
    misconduct
   Clarify ownership of Twitter followers, etc.
   Perhaps permit reasonable personal use of e-mail /
    internet / social media
   Regular reminders of policy
   Other issues – see material cited

                                                          16
   References - See list provided



   Contact Details:
       Dr Darius Whelan, Faculty of Law,
       University College Cork
       http://research.ucc.ie/profiles/B012/dwhelan
       Email d.whelan@ucc.ie
       Twitter: @dariuswirl




                                                       17

Más contenido relacionado

La actualidad más candente

Data recovery power point
Data recovery power pointData recovery power point
Data recovery power pointtutannandi
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
Keyloggers
KeyloggersKeyloggers
Keyloggerskdore
 
Program security
Program securityProgram security
Program securityG Prachi
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganographyXavier Prathap
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecturebdemchak
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 

La actualidad más candente (20)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Secure software design
Secure software designSecure software design
Secure software design
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Program security
Program securityProgram security
Program security
 
Mobile security
Mobile securityMobile security
Mobile security
 
The need for security
The need for securityThe need for security
The need for security
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
information security technology
information security technologyinformation security technology
information security technology
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 

Destacado

Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Dobusch Leonhard
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Sue Barrett
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Darius Whelan
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Managing New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipManaging New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipViktoria Kachaluba
 
Employee Rights
Employee RightsEmployee Rights
Employee Rightssh_neha252
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 

Destacado (9)

Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Managing New Venture Formation and Entrepreneurship
Managing New Venture Formation and EntrepreneurshipManaging New Venture Formation and Entrepreneurship
Managing New Venture Formation and Entrepreneurship
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Employee Rights
Employee RightsEmployee Rights
Employee Rights
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Similar a Employees and Internet Use - Legal Aspects

Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveDarius Whelan
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyCharles Mok
 
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...nuances public affairs
 
Privacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and SurveillancePrivacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and SurveillanceOverholt Law
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Surabhi Jain
 
CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CMSLondon
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringDan Michaluk
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSChad Gilles
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Osborne Clarke
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015CRISP Project
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...FIA2010
 
2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media casesKrishna De
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraintsmrcox
 
Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture  Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture LauraMartin276
 

Similar a Employees and Internet Use - Legal Aspects (20)

Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal Perspective
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
 
Law w23
Law w23Law w23
Law w23
 
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
Data Protection and Public Affairs Workshop, nuances public affairs, Berlin, ...
 
Privacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and SurveillancePrivacy in the Workplace: Employee Monitoring and Surveillance
Privacy in the Workplace: Employee Monitoring and Surveillance
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
 
Abubakar munir iisf2011
Abubakar munir iisf2011Abubakar munir iisf2011
Abubakar munir iisf2011
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture  Laura Martin - Surveillance in Academia & Lecture Capture
Laura Martin - Surveillance in Academia & Lecture Capture
 

Más de Darius Whelan

Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022Darius Whelan
 
Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020Darius Whelan
 
Copyright Law for Digital Learning
Copyright Law for Digital Learning Copyright Law for Digital Learning
Copyright Law for Digital Learning Darius Whelan
 
Copyright Law Update
Copyright Law Update Copyright Law Update
Copyright Law Update Darius Whelan
 
LLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, IrelandLLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, IrelandDarius Whelan
 
Human Rights and Mental Health Tribunals
Human Rights and Mental Health TribunalsHuman Rights and Mental Health Tribunals
Human Rights and Mental Health TribunalsDarius Whelan
 
Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation Darius Whelan
 
Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing Darius Whelan
 
Proposed changes in the law on legal capacity
Proposed changes in the law on legal capacityProposed changes in the law on legal capacity
Proposed changes in the law on legal capacityDarius Whelan
 
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition PerspectiveShari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition PerspectiveDarius Whelan
 
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...Darius Whelan
 
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's PerspectiveMaria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's PerspectiveDarius Whelan
 
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...Darius Whelan
 
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...Darius Whelan
 
Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)Darius Whelan
 
Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK Darius Whelan
 
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Darius Whelan
 
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Darius Whelan
 
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Darius Whelan
 

Más de Darius Whelan (20)

Legal Capacity
Legal CapacityLegal Capacity
Legal Capacity
 
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022Mental Health Act 2001 Toolkit Launch 10 Nov 2022
Mental Health Act 2001 Toolkit Launch 10 Nov 2022
 
Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020Hunger Strikes in Prison: The Legal Issues Oct 2020
Hunger Strikes in Prison: The Legal Issues Oct 2020
 
Copyright Law for Digital Learning
Copyright Law for Digital Learning Copyright Law for Digital Learning
Copyright Law for Digital Learning
 
Copyright Law Update
Copyright Law Update Copyright Law Update
Copyright Law Update
 
LLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, IrelandLLM in Intellectual Property and E Law, University College Cork, Ireland
LLM in Intellectual Property and E Law, University College Cork, Ireland
 
Human Rights and Mental Health Tribunals
Human Rights and Mental Health TribunalsHuman Rights and Mental Health Tribunals
Human Rights and Mental Health Tribunals
 
Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation Recent Mental Health Case-Law and Update on Capacity Legislation
Recent Mental Health Case-Law and Update on Capacity Legislation
 
Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing Redesigning Copyright Law for Creativity and Sharing
Redesigning Copyright Law for Creativity and Sharing
 
Proposed changes in the law on legal capacity
Proposed changes in the law on legal capacityProposed changes in the law on legal capacity
Proposed changes in the law on legal capacity
 
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition PerspectiveShari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
 
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...
 
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's PerspectiveMaria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
Maria Morgan: The Mental Health Act 2001 from a Clinician's Perspective
 
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...
 
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
Mental Health Act 2001: Involuntary, Intermediate and Voluntary Categories: t...
 
Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)Developing Students' E-Literacy (Teaching and Learning)
Developing Students' E-Literacy (Teaching and Learning)
 
Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK Slides by Jason Miles Campbell of JiscLegal UK
Slides by Jason Miles Campbell of JiscLegal UK
 
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
 
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
Slides by Dr Eoin O'Dell at Copyright Law for Digital Teaching and Learning, ...
 
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
Slides Part 02 Copyright Law for Digital teaching and Learning May 2014
 

Employees and Internet Use - Legal Aspects

  • 1. EMPLOYEES AND INTERNET USE Darius Whelan, Faculty of Law, University College Cork Dublin Solicitors Bar Association Seminar, December 2012
  • 2. BALANCING COMPETING INTERESTS Employee’s Privacy Employer’s Interests  Employees do not leave their privacy at the front door when they come to work 2
  • 3. EMPLOYER‟S INTERESTS / DUTIES  Employers have general right to determine work tasks and control contract performance  Employer has property rights in equipment  Employers may lay down quality and behaviour standards  Employer must safeguard employees‟ health, safety and welfare  Employer has duty of trust and confidence towards employee 3
  • 4. PRIVACY  Halford v UK (1997):  Assistant Chief Constable – Office phones „tapped‟ – No warning  She had a reasonable expectation of privacy and so art. 8 had been breached  Copland v UK (2007):  Employer (Welsh public college) monitoring internet usage, e-mails and telephone traffic of Ms.C (employee) without her knowledge  Content not monitored; instead names of recipients etc.  Held: Breach of Article 8 4
  • 5. Köpke v Germany (2010)  Employer had used covert video surveillance for two weeks to investigate employee for theft  Domestic law required proportionality, etc.  ECtHR held complaint under art. 8 manifestly ill- founded 5
  • 6. KEY DATA PROTECTION PRINCIPLES  Data Protection Acts 1988-2003:  Data must be obtained and processed fairly  Data subject must be informed of purpose for which data are processed  Legitimate Processing:  Various categories including  Data subject consenting to processing, or  processing is for „legitimate interests‟ of controller without unduly prejudicing subject‟s rights/ freedoms / interests  Data must be kept for specified, explicit and legitimate purposes  There must be appropriate security measures  Data subject has right of access to data 6
  • 7. Gresham Hotel (2007)  Data Protection Commissioner Case Study 6 of 2007  Covert video surveillance  Other employees being investigated, not this particular employee  Gardaí were not involved  Commissioner found data was being processed in a manner incompatible with its purpose  Covert surveillance would require actual involvement of Gardaí or intention to involve them  Amicable resolution reached 7
  • 8. Ali v First Quench (2001)  Covert video surveillance in off-licence office – thefts of stock – Mr A prime suspect  Mr A was filmed having sexual intercourse in office while shop open  Dismissal fair  McGowan v Scottish Water (2004)  Video surveillance of employee‟s house, due to suspicion of timesheet irregularities  Dismissal fair; did not breach privacy 8
  • 9. Mehigan v Dyflin Publications (Ireland, 2002)  M received 3 pornographic images by e-mail and forwarded them on to someone else  Tribunal did not accept this was a one-off incident. Evidence of other material on computer inc. sexual cartoons  E-mails can often cause offence  The EAT will be heavily influenced by the existence of a written policy reserving right to dismiss  Unlikely dismissal permissible otherwise  Possible exception – downloading obscene pornography  (Distinction between facts here and „exceptional‟ cases unclear)  Onus on employer to introduce policy  Dismissal unfair, but employee contributed substantially  €2,000 for unfair dismissal plus €2,800 in lieu of notice 9
  • 10. Murray and Rooney v ICS Building Society (2011)  Two employees allegedly circulated pornography by email  EAT found investigation flawed  Investigation took place without their knowledge; they could not make submissions on terms of reference  Investigation involved only small sample of emails and did not include employees who had deleted emails  Dismissal was disproportionate 10  €30,000 to one employee; €36,000 to the other
  • 11. Kiernan v A Wear (2008)  Employee posted derogatory comments on BEBO  E.g. Regarding manager “She called me a liar. I f**ing hate that c**t”  Visible to customers  Fair investigation held. Employee dismissed  EAT found dismissal disproportionate  Employee contributed to her dismissal  €4,000 for unfair dismissal 11
  • 12. Walker v Bausch and Lomb (2009)  Employee wrote on intranet: “500 jobs to be gone at Waterford plant before end of first quarter 2008”  No proof that employee had received intranet policy  Fair hearing held. Employee dismissed.  EAT found dismissal disproportionate  Employee greatly contributed to situation  €6,500 for unfair dismissal 12
  • 13. O’Mahony v PJF Insurances (2011)  Facebook – Employee called manager a “bitch”  At first, the page was accidentally seen  Employee then allowed full access  A number of disparaging comments  Suspended pending investigation  EAT – Significant breach of trust which made employment untenable  Employer acted reasonably. Dismissal fair. 13
  • 14. GUIDANCE  Council of Europe  Recommendation R (89) 2 on Protection of Personal Data Used for Employment Purposes 1989  International Labour Organisation  Code of Practice on Protection of Workers‟ Personal Data 1997
  • 15. Article 29 Working Party  Opinion 8/2001 on processing of personal data in the employment context  Opinion 4/2004 on video surveillance  Data Protection Commissioner (Ireland), Monitoring of Staff, Guidance Note, 2004  Data Protection Commissioner (Ireland), Data Protection and CCTV, Guidance Note, 2004 15
  • 16. DRAWING UP A POLICY  Review legislation, guidance and cases  Clarify purposes of monitoring (if any) – must be proportionate  Notify purposes of monitoring to employees – e.g. state if can be used for disciplinary purposes; may ultimately lead to dismissal; misconduct v gross misconduct  Clarify ownership of Twitter followers, etc.  Perhaps permit reasonable personal use of e-mail / internet / social media  Regular reminders of policy  Other issues – see material cited 16
  • 17. References - See list provided  Contact Details:  Dr Darius Whelan, Faculty of Law,  University College Cork  http://research.ucc.ie/profiles/B012/dwhelan  Email d.whelan@ucc.ie  Twitter: @dariuswirl 17