Compliance Risks – Social Media – Sweeny Legal

SweenyLegal-Logo copy

 

1. Social Media: Managing Risk and Balancing Employee Privacy

The world of social media – be it Facebook, Twitter, Instagram or countless others – is complicated because it’s a mix of the personal (“here is a photo of my daughter at camp”), commercial (“Jim likes Visa”), and often, something in between (“I can’t believe what my employer, XYZ Corp., is doing – it’s so unfair…”).

But its use by employees can also be downright unacceptable. Employees have used social media to sexually harass other employees. Hospital workers have used it to post patient pictures and protected health information. At other times, employees have revealed confidential financial information about their companies through their social media accounts. Such conduct exposes employers to serious legal and compliance risks. As a result, internal auditors are being asked to develop safeguards around legitimate uses of social media in the workplace and to actively defend against its misuse.

This task, however, presents a formidable challenge, and auditing compliance with corporate social media policies has recently been made more difficult by the need to also comply with the laws that limit an employer’s ability to examine an employee’s or  a job applicant’s social media postings.  These laws have already been passed by 12 states and similar legislation is pending in over 30 more.[1]

http://www.corporatecomplianceinsights.com/avoid-the-curses-of-technology-five-high-tech-compliance-challenges-every-auditor-needs-to-understand/?utm_source=buffer&utm_campaign=Buffer&utm_content=buffer9bca1&utm_medium=twitter

At first blush, these laws champion a new level of e-privacy by prohibiting employers from requiring employees to provide them with their user names and passwords for their personal social media accounts – a step most of us would welcome as a good idea. The reality, however, is much more complex because these laws may also – inadvertently, in some cases – limit an employer’s ability to access employee accounts when conducting legitimate and necessary internal investigations. An additional obstacle is that each statute provides different definitions and scopes of privacy protection. For example, while some laws have exceptions for employee misconduct, other statutes have no such exceptions.

For the foreseeable future, we can expect more regulation in this area. As auditors and compliance professionals, we must make sure we are on the right side of the law even as we work to ensure other regulations and laws haven’t been broken.  Before you begin your audits or investigations, make sure you know whether any of these laws apply and exactly what you are permitted to do.

http://www.corporatecomplianceinsights.com/avoid-the-curses-of-technology-five-high-tech-compliance-challenges-every-auditor-needs-to-understand/?utm_source=buffer&utm_campaign=Buffer&utm_content=buffer9bca1&utm_medium=twitter

SweenyLegal-Reversed

How can we work together? Please contact me if you have any Compliance issues, Trade Mark services, Licensing, Intellectual Property (IP) or Commercial Law needs.

Sweeny Legal announces its IP Dashboard available now, in Wollongong and beyond. Tomorrow’s Lawyer Today.

This Service saves you time, it is convenient, and saves on costs. Alternatively I can come and visit your Office and review your needs

Contact me if you need commercial assistance or  if you need commercial agreement drafting of any kind or IP advice, for example,

Commercial and IP Agreements, Business Relationship Agreements or License Agreements.

Please contact Sweeny Legal  or Brandsworth Licensing should you require any assistance with any Intellectual Property (IP) rights, Commercial Agreements of any type, or IP Business Strategies.

Phone: 02 4228 1864

Mobile: 0417 699 645

eFax: 02 4204 1684 – comes to my email – perfectly secure 

Email: info@sweenylegal.com.au

Skype: SweenyLegal

FaceTime: info@sweenylegal.com.au

Contact Sweeny Legal

sweeny-sidebarcontact

Leave a comment

Filed under Commercial Law, Confidential Information, Cyberspace law, Intellectual Property Law, Risk Management

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s