SlideShare a Scribd company logo
1 of 12
Social media in the
workplace

5th December 2013

Rajiv Joshi
Associate
© 2013 Morgan Cole LLP

Expertise

|

Experience

|

Efficiency

|

Contribution
Types of social media
•
•
•
•
•
•

Facebook
Twitter
LinkedIn
YouTube
Internet forums
Blogs

2

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Common problems
• Derogatory or defamatory statements made by employees
about their employer, customers, suppliers or products /
services
• Derogatory or defamatory statements made by employees
about co-workers




3

Harassment
Victimisation
Discrimination
Vicarious liability
Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Common problems
• Inappropriate levels of usage during working hours
• Damage to legitimate business interests
• Inadequate post-termination confidentiality obligations

4

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Misconduct
• Derogatory or defamatory statements made by employees
about their employer, customers, suppliers or products /
services
 Implied term of mutual trust and confidence
 Implied duty of fidelity
 Express obligations
• Staff handbook / company policies

5

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Misconduct
• Derogatory or defamatory statements made by employees
about co-workers
 Disciplinary offences
• Beware vicarious liability

 Social media policy
• Training






6

Disciplinary policy
Anti-harassment / bullying policy
Internet / email usage policy
Code of conduct policy / staff conduct policy

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Misconduct
• Disciplinary considerations:
 Clarity of the social media policy
 The nature / significance of the employees role within the
organisation
 The severity of their offence / misconduct
• Mildly offensive comments may mean any resultant dismissal would fall
outside the band of reasonable responses

 Singh v London Country Bus Services (EAT 1976)
• What can constitute a disciplinary offence

 Mitigating factors; privacy settings and the employees work history

7

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Misconduct
• Inappropriate levels of usage during working hours
 Limited usage or blanket ban?

• Acceptable usage:
 Recommended by ACAS but ultimately employer discretion
 Employee is under an implied duty not to misuse its employers
property
 Monitoring policy
 Employee expectation of privacy and Article 8, right to respect for
family and private life

8

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Confidentiality
• Implied duty of confidentiality during employment
• Implied duty of good faith during employment
• No implied duty of confidentiality after employment (for
information other than trade secrets) unless explicitly dealt
with under contract

9

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Confidentiality
• Contract of employment
 Restrictive covenants

• Garden leave
 NB, garden leave will usually reduce the restricted period in any
restrictive covenants

• PILON
 Restricts access to confidential information

10

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Confidentiality
• Ownership of groups



Privacy settings
Whitmar Publications Ltd v Gamage and others [2013]

• Who owns the contacts?



Hays Specialist Recruitment (Holdings) Ltd v Ions (High Court 2008)
Contacts gained during the course of employment (Laura Kuenssberg)

• Other contact information


Copyright and Rights in Databases Regulations 1997
• Cause of action if contacts could amount to a ‘database’
• Penwell Publishing (UK) Ltd v Ornstein (2007)

• Social media policy


11

Define what is meant by confidential information
Deals with contacts gained during the course of employment
Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP
Conclusions
• Have a clearly defined social media policy
 Ensure it is linked appropriately to other company policies

• Provide adequate training
• Consider post-termination restrictions

12

Expertise

|

Experience

|

Efficiency

|

Contribution

© 2013 Morgan Cole LLP

More Related Content

Similar to Social media in the workplace

Globalization and Society
Globalization and SocietyGlobalization and Society
Globalization and SocietyM. Merve Gül
 
The Post-Election National Labor Relations Board
The Post-Election National Labor Relations Board The Post-Election National Labor Relations Board
The Post-Election National Labor Relations Board Armstrong Teasdale
 
Five Strategies for Coping with Unannounced Audits
Five Strategies for Coping with Unannounced AuditsFive Strategies for Coping with Unannounced Audits
Five Strategies for Coping with Unannounced AuditsJim Flynn
 
Small Business Essentials
Small Business EssentialsSmall Business Essentials
Small Business Essentialsbobweil
 
The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...
The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...
The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...Winston & Strawn LLP
 
BADM 2133 UNIT 8
BADM 2133 UNIT 8BADM 2133 UNIT 8
BADM 2133 UNIT 8jarana00
 
Business Law & Order - March 18, 2013
Business Law & Order - March 18, 2013Business Law & Order - March 18, 2013
Business Law & Order - March 18, 2013AnnArborSPARK
 
Presenting Test Results w/ Clarity and Confidence - STAR East 2013
Presenting Test Results w/ Clarity and Confidence - STAR East 2013Presenting Test Results w/ Clarity and Confidence - STAR East 2013
Presenting Test Results w/ Clarity and Confidence - STAR East 2013Griffin Jones
 
The Alphabet Soup of Leave Administration in the Workplace
The Alphabet Soup of Leave Administration in the WorkplaceThe Alphabet Soup of Leave Administration in the Workplace
The Alphabet Soup of Leave Administration in the WorkplaceAlcott HR
 
Geelong Business Bootcamp 2016 - Essential HR Policies
Geelong Business Bootcamp 2016 - Essential HR PoliciesGeelong Business Bootcamp 2016 - Essential HR Policies
Geelong Business Bootcamp 2016 - Essential HR PoliciesCarli Saw
 
Privacy reform and compliance: privacy policies for social networks June2013
Privacy reform and compliance: privacy policies for social networks June2013Privacy reform and compliance: privacy policies for social networks June2013
Privacy reform and compliance: privacy policies for social networks June2013IAB Australia
 
Risk Management Best Practices for Non-Profits
Risk Management Best Practices for Non-ProfitsRisk Management Best Practices for Non-Profits
Risk Management Best Practices for Non-ProfitsPSA_Insurance
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaNiki Avraam
 
Recent NLRB Rulings and Their Impact on Non-Union Employers
Recent NLRB Rulings and Their Impact on Non-Union EmployersRecent NLRB Rulings and Their Impact on Non-Union Employers
Recent NLRB Rulings and Their Impact on Non-Union EmployersAlphaStaff
 

Similar to Social media in the workplace (20)

Globalization and Society
Globalization and SocietyGlobalization and Society
Globalization and Society
 
The Post-Election National Labor Relations Board
The Post-Election National Labor Relations Board The Post-Election National Labor Relations Board
The Post-Election National Labor Relations Board
 
Ethics {Business Integrity} Briefing
Ethics {Business Integrity} BriefingEthics {Business Integrity} Briefing
Ethics {Business Integrity} Briefing
 
Ethics Briefing
Ethics BriefingEthics Briefing
Ethics Briefing
 
Five Strategies for Coping with Unannounced Audits
Five Strategies for Coping with Unannounced AuditsFive Strategies for Coping with Unannounced Audits
Five Strategies for Coping with Unannounced Audits
 
Small Business Essentials
Small Business EssentialsSmall Business Essentials
Small Business Essentials
 
Employment Presentation
Employment PresentationEmployment Presentation
Employment Presentation
 
The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...
The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...
The NLRB's New Joint-Employer Test: What You Need to Know Regarding its Likel...
 
BADM 2133 UNIT 8
BADM 2133 UNIT 8BADM 2133 UNIT 8
BADM 2133 UNIT 8
 
Business Law & Order - March 18, 2013
Business Law & Order - March 18, 2013Business Law & Order - March 18, 2013
Business Law & Order - March 18, 2013
 
Presenting Test Results w/ Clarity and Confidence - STAR East 2013
Presenting Test Results w/ Clarity and Confidence - STAR East 2013Presenting Test Results w/ Clarity and Confidence - STAR East 2013
Presenting Test Results w/ Clarity and Confidence - STAR East 2013
 
The Alphabet Soup of Leave Administration in the Workplace
The Alphabet Soup of Leave Administration in the WorkplaceThe Alphabet Soup of Leave Administration in the Workplace
The Alphabet Soup of Leave Administration in the Workplace
 
Geelong Business Bootcamp 2016 - Essential HR Policies
Geelong Business Bootcamp 2016 - Essential HR PoliciesGeelong Business Bootcamp 2016 - Essential HR Policies
Geelong Business Bootcamp 2016 - Essential HR Policies
 
Privacy reform and compliance: privacy policies for social networks June2013
Privacy reform and compliance: privacy policies for social networks June2013Privacy reform and compliance: privacy policies for social networks June2013
Privacy reform and compliance: privacy policies for social networks June2013
 
Risk Management Best Practices for Non-Profits
Risk Management Best Practices for Non-ProfitsRisk Management Best Practices for Non-Profits
Risk Management Best Practices for Non-Profits
 
Employee Handbook
Employee HandbookEmployee Handbook
Employee Handbook
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social Media
 
Covering your assets russell
Covering your assets russellCovering your assets russell
Covering your assets russell
 
Chap003
Chap003Chap003
Chap003
 
Recent NLRB Rulings and Their Impact on Non-Union Employers
Recent NLRB Rulings and Their Impact on Non-Union EmployersRecent NLRB Rulings and Their Impact on Non-Union Employers
Recent NLRB Rulings and Their Impact on Non-Union Employers
 

Recently uploaded

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Social media in the workplace

  • 1. Social media in the workplace 5th December 2013 Rajiv Joshi Associate © 2013 Morgan Cole LLP Expertise | Experience | Efficiency | Contribution
  • 2. Types of social media • • • • • • Facebook Twitter LinkedIn YouTube Internet forums Blogs 2 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 3. Common problems • Derogatory or defamatory statements made by employees about their employer, customers, suppliers or products / services • Derogatory or defamatory statements made by employees about co-workers     3 Harassment Victimisation Discrimination Vicarious liability Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 4. Common problems • Inappropriate levels of usage during working hours • Damage to legitimate business interests • Inadequate post-termination confidentiality obligations 4 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 5. Misconduct • Derogatory or defamatory statements made by employees about their employer, customers, suppliers or products / services  Implied term of mutual trust and confidence  Implied duty of fidelity  Express obligations • Staff handbook / company policies 5 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 6. Misconduct • Derogatory or defamatory statements made by employees about co-workers  Disciplinary offences • Beware vicarious liability  Social media policy • Training     6 Disciplinary policy Anti-harassment / bullying policy Internet / email usage policy Code of conduct policy / staff conduct policy Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 7. Misconduct • Disciplinary considerations:  Clarity of the social media policy  The nature / significance of the employees role within the organisation  The severity of their offence / misconduct • Mildly offensive comments may mean any resultant dismissal would fall outside the band of reasonable responses  Singh v London Country Bus Services (EAT 1976) • What can constitute a disciplinary offence  Mitigating factors; privacy settings and the employees work history 7 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 8. Misconduct • Inappropriate levels of usage during working hours  Limited usage or blanket ban? • Acceptable usage:  Recommended by ACAS but ultimately employer discretion  Employee is under an implied duty not to misuse its employers property  Monitoring policy  Employee expectation of privacy and Article 8, right to respect for family and private life 8 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 9. Confidentiality • Implied duty of confidentiality during employment • Implied duty of good faith during employment • No implied duty of confidentiality after employment (for information other than trade secrets) unless explicitly dealt with under contract 9 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 10. Confidentiality • Contract of employment  Restrictive covenants • Garden leave  NB, garden leave will usually reduce the restricted period in any restrictive covenants • PILON  Restricts access to confidential information 10 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 11. Confidentiality • Ownership of groups   Privacy settings Whitmar Publications Ltd v Gamage and others [2013] • Who owns the contacts?   Hays Specialist Recruitment (Holdings) Ltd v Ions (High Court 2008) Contacts gained during the course of employment (Laura Kuenssberg) • Other contact information  Copyright and Rights in Databases Regulations 1997 • Cause of action if contacts could amount to a ‘database’ • Penwell Publishing (UK) Ltd v Ornstein (2007) • Social media policy   11 Define what is meant by confidential information Deals with contacts gained during the course of employment Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP
  • 12. Conclusions • Have a clearly defined social media policy  Ensure it is linked appropriately to other company policies • Provide adequate training • Consider post-termination restrictions 12 Expertise | Experience | Efficiency | Contribution © 2013 Morgan Cole LLP

Editor's Notes

  1. Derogatory or defamatory statements made by employees about their employer, customers, suppliers or products / services Implied term of mutual trust and confidence Implied duty of fidelity Express obligations Staff handbook / company policies – these documents should clearly set out the standards of behaviour expected of employees
  2. Derogatory or defamatory statements made by employees about co-workers Disciplinary offences Beware vicarious liability – acts committed by an employee during the course of their employment, whether or not the acts were done with the employers’ approval. Ensure the test for the statutory defence is met (reasonably practicable steps.) Social media policy – ensure the policy is clear and widely available Training – ensure all staff know what is expected / not expected of them in relation to social media Ensure all of the following policies are linked so that any misconduct via social media is actionable; anti-harassment / bullying policy, disciplinary policy, social media policy, internet / email usage policy, code of conduct policy, staff conduct policy etc
  3. Clarity of the social media policy Cases have been won and lost on the clarity of the employer’s social media policy – it needs to be sufficiently clear in order to ensure that misconduct is safely actionable. Crisp v Apple Retail plc (ET 2010) – Apple Retail plc was able successfully to defend an unfair dismissal claim after they dismissed an employee who had posted derogatory statements about the company’s products on Facebook. Apple demonstrated that it had given employees detailed training on protecting its brand including exercising caution when posting online. Apple’s policies also expressly stated that inappropriate usage may result in disciplinary action. Grant and Ross v Mitie Property Services UK Ltd (unreported) - two sisters were successful in their unfair dismissal claim against Mitie Property Services UK Limited. Mitie dismissed the sisters due to their internet usage, relying on its policy. The only information in the policy was that access was permitted outside core working hours. The Employment Tribunal considered the wording in Mitie’s policy was too vague. The nature / significance of the employees role within the organisation The nature and significance of the employees’ role will be significant in establishing whether there is damage to the organisations reputation – Pay v UK (ECHR 2009). In this case a probation officer was also a Director of a company supplying products relating to bondage and sadomasochism – the two roles were not compatible. The severity of their offence / misconduct Mildly derogatory comments may mean any resultant dismissal would fall outside the band of reasonable responses – Whitman v Club 24 Ltd t/a Ventura (ET 2010) Singh v London Country Bus Services (EAT 1976) The disciplinary offence does not have to occur in the course of work, at the place of work, or even be connected with the work, as long as in some respect it affects the employee when he is doing his work. The Complainant in the case was convicted of five criminal charges; theft of a building society book and four offences in relation to the obtaining of money by issuing forged documents, or attempting to do so, so as to get money from the building society. Singh was sentenced to twelve months imprisonment, suspended for two years. Singh was a driver of a one-man bus and part of this role involved the handling of money. Due to concerns over his trustworthiness and a ‘duty to the public,’ Singh was dismissed. The EAT upheld the decision to dismiss, stating that the employer was within their right to take into account Singh’s out of work conduct. Mitigating factors; privacy settings and the employees work history Consider how widely available / how many views the comments have received (privacy settings) It is not reasonable to ignore the fact that the Claimant had an exemplary record previously - Whitman v Club 24 Ltd t/a Ventura (ET 2010)
  4. Inappropriate levels of usage during working hours Limited usage or blanket ban? Acceptable usage: ACAS suggest that a blanket ban may not be realistic This will be fact specific dependent on the work of each employer Consider the impact limited permitted usage would have on productivity Do not just rely on implied duties, codify express duties into employment contracts, policies / employee handbooks Set clear parameters for monitoring under a monitoring policy – be careful to be proportionate Ensure training is provided on the policy Ensure the internet / email policy is linked to the social media policy
  5. Contract of employment Restrictive covenants – what express, post-termination contractual terms will the employees be subject to? Has confidential information been clearly defined? Garden leave Removes the employee from continuing contact with clients / customers and stops them accessing confidential information If no post-termination restrictions are in place, employees remain under implied contract terms during their notice period If they are subject to post-termination restrictions, garden leave will usually reduce the restricted period in any restrictive covenants PILON Immediately restricts access to confidential information If no post-termination restrictions in place, PILON may not always be the best idea PILON is generally more useful if post-termination restrictions are in place
  6. Ownership of accounts Privacy settings – if the employee’s account privacy settings are not closed, it may be difficult for an employer to maintain that the contacts are confidential. Whitmar Publications Ltd v Gamage and others [2013] – the High Court held that the former employer could exert some control over an employees LinkedIn account after employment had ended. The employee had been guilty of breach of implied duty of good faith during her employment. Who owns the contacts? Hays Specialist Recruitment (Holdings) Ltd v Ions (High Court 2008) – a former employee was alleged to have uploaded client / candidate contact details from Hays’ database to his LinkedIn account. Hays was granted pre-action disclosure in relation to the Defendant’s LinkedIn contacts / emails. Can employers force ex-employees to delete contacts acquired during the course of their employment? This principle remains untested in case law. Employers have shown reluctance to take legal action to force such action, e.g., Laura Kuenssberg moving from the BBC to ITV and taking 60,000 Twitter followers with her. Other contact information Copyright and Rights in Databases Regulations 1997 Cause of action if contacts could amount to a ‘database’ - a database is legally defined in section 3A(1) of the Copyright, Designs and Patents Act 1988 (CDPA) as: "a collection of independent works, data or other materials which (a) are arranged in a systematic or methodical way, and (b) are individually accessible by electronic or other means." Penwell Publishing (UK) Ltd v Ornstein (2007) – where an address list from Outlook (or similar software), backed up by the employer’s system, that ‘database’ / list belongs to the employer. Social media policy Define what is meant by ‘confidential information’ The policy should state that contacts gained during the course of employment are owned by the company and should be deleted upon termination of employment The enforceability of such a policy may depend on its reasonableness and certainty and currently remains untested in case law.