Week 7 – Assignment 1: Develop a Plan to Manage Change
Bottom of Form
Managing change is the process of planning, implementing and sustaining change in organizations. Individuals all have their own unique “depiction” of what change represents, and from this, they formulate their attitude and reactions to the change. Some actively resist the change, but many also use more passive resistance, which is the most difficult. It is not always obvious that the person resists change because they do nothing observable that shows their resistance the change. Change offers organization new realities that are only successful if employees accept and try to meaningfully interpret it.
Image Source:
Like the cartoon above, imagine that as a manager you are announcing an organizational change to your team. Although the team members aren’t openly expressing any feelings about the change they have various positive and negative thoughts. Now select three thoughts, at least one that could be assumed resistant or, at least, not supportive of the change displayed by different team members. Then decide the best strategies to address those team members concerns to help them get on board and support the change.
Develop a plan explaining what approaches, methodologies or tools you might use to address resistant team members. Determine which areas team members are targeting regarding their resistance to the change: the planning and implementation; the proposed change, or the individuals leading the change efforts.
Length: 1-2 pages, not including title and reference pages
Include a minimum of three (3) scholarly references, with appropriate APA formatting applied to citations and paraphrasing.
Assignment 2: Analyze SC Johnson A Family Company’s Social Media Policies
The saying “an ounce of prevention” is certainly worth much more than “a pound of cure” has been around for ages but it has never been more appropriate than when a company needs to manage the use of technology and social media specifically in the workplace. A good company social networking policy generally defines “social networking” and establishes clear purposes for the policy along with expected behavioral norms; provides guidance regarding use of social media associated with the organization, employees or customers; refers to proprietary and confidential information at risk; and outlines disciplinary measures for violating the social media policy. Some companies have effective social media networking policies that have been utilized as best practices across industries.
Begin this assignment by obtaining a copy of SC Johnson A Family Company’s social media policy. You can find examples using the Internet. Know that in some cases the social media policy might not be a separate policy, but is either included in an overall technology policy or the employee policy manual. (I will be comparing this information with my company’s social media guidelines)
- Is there a clear purpose underpinning for SC Johnson’s social media policy?
- What image of social media is portrayed from the overall policy?
- What concepts of social media and employee functions are identified?
- What social media challenges are identified?
- What policy strategies have been selected to address these challenges?
Now, review the Social Media Guidelines from SC Johnson A Family Company organization and summarize the information you learned in a white paper for a new company ready to write their first social media policy. Be sure to include your recommendations.
Length: 1-2 pages, not including title and reference pages
Include a minimum of three (3) scholarly references, with appropriate APA formatting applied to citations and paraphrasing.
ARCH
N U M B E R S , FA C T S A N D T R E N D S S H A P I N G Y O U R W O R L D A B O U T F O L L O W D O N AT E
Internet & Technology
M E N U R E S E A R C H A R E A S
J U N E 2 2 , 2 0
1
6
Social Media and the Workplace
New platform can e tool for connection with colleague and outide expert,
ut can alo erve a ditraction while on the jo
BY KENNETH OLMSTEAD (HTTP://WWW.PEWINTERNET.ORG/AUTHOR/KOLMSTEAD/) , CLIFF LAMPE
(HTTP://WWW.PEWINTERNET.ORG/AUTHOR/CLAMPE2/) AND NICOLE B. ELLISON (HTTP://WWW.PEWINTERNET.ORG/AUTHOR/NELLISON/)
M Y A C C O U N T
http://www.pewresearch.org/follow-us
https://pewresearch.networkforgood.com/?utm_source=PewInternet&utm_medium=InternalPromo&utm_campaign=TopDonateButton
http://www.pewresearch.org/
javascript:void(0)
javascript:void(0)
http://www.pewinternet.org/author/kolmstead/
http://www.pewinternet.org/author/clampe2/
http://www.pewinternet.org/author/nellison/
http://www.pewinternet.org/2016/06/22/social-media-and-the-workplace/pi_2016-06-22_social-media-and-work_0-01/
(http://www.pewinternet.org/2016/06/22/social-media-and-the-workplace/pi_2016-06-22_social-media-and-work_0-01/) Social
media influences and permeates many aspects of daily life for Americans today, and the workforce is no exception.
These digital platforms offer the potential to enhance worker productivity by fostering connections with colleagues and
resources around the globe. At the same time, employers might worry that employees are using these tools for non-
work purposes while on the job or engaging in speech in public venues that might reflect poorly on their organization.
A Pew Research Center survey of 2,003 American adults (including 795 who are currently employed on a full- or part-
time basis) conducted Sept. 11-14 and 18-21, 2014, finds that social media plays some role in the lives of many
American workers – but that role is not always clear-cut or entirely positive.
Workers turn to social media for a range of reasons while at work, with taking a mental break being among
the most common
Today’s workers incorporate social media into a wide range of activities while on the job. Some of these activities are
explicitly professional or job-related, while others are more personal in nature. The survey asked Americans who are
employed full- or part-time about eight different ways they might use social media while on the job and found that:
34% ever use social media while at work to take a mental break from their job
27% to connect with friends and family while at work
24% to make or support professional connections
20% to get information that helps them solve problems at work
17% to build or strengthen personal relationships with coworkers
17% to learn about someone they work with
12% to ask work-related questions of people outside their organization
12% to ask such questions of people inside their organization
As noted above, 17% of workers say they use social media to build or strengthen personal relationships at work – but
the transparency that social media facilitates comes with costs as well as benefits. Some 14% of workers have found
information on social media that has improved their professional opinion of a colleague; at the same time, a similar
share (16%) have found information on social media that has lowered their professional opinion of a colleague.
1
http://www.pewinternet.org/2016/06/22/social-media-and-the-workplace/pi_2016-06-22_social-media-and-work_0-01/
(http://www.pewinternet.org/2016/06/22/social-media-and-the-workplace/pi_2016-06-22_social-media-and-work_0-02/)
Younger workers are more likely than their older counterparts to say they have discovered information about a
colleague on social media that lowered their professional opinion of them – but also are more likely than older workers
to have found information that improved their professional opinion of a colleague.
Some 23% of workers ages 18 to 29 report that they have discovered information on social media that improved their
professional opinion of a colleague. By comparison, just 12% of workers ages 30 to 49 and 9% of workers ages 50 to 64
have experienced this. Similarly, 29% of these younger workers have discovered information that lowered their
professional opinion of a colleague: 16% of those ages 30 to 49 and 6% of those ages 50 to 64 indicate that this has
happened to them.
Many employers have rules for how employees use social media at work
Many workers report that their employers have policies about social media use on the job, or about how employees may
present themselves in various online spaces. Half of all full-time and part-time workers (51%) say their workplace has
rules about using social media while at work (45% say their employer does not have these policies), while 32% report
that their employer has policies about how employees may present themselves on the internet in general (63% say their
employer does not have these policies).
http://www.pewinternet.org/2016/06/22/social-media-and-the-workplace/pi_2016-06-22_social-media-and-work_0-02/
(http://www.pewinternet.org/2016/06/22/social-media-and-the-workplace/pi_2016-06-22_social-media-and-work_0-03/)
Policies that regulate how employers present themselves online outside of work may be expected to influence whether
these workers use social media at all. However, this does not seem to be the case: Fully 77% of workers report using
social media regardless of whether their employer has such a policy in place.
At the same time, there is some evidence that workplace policies concerning social media use while on the job may have
an effect. Workers whose companies have policies regulating social media use at work are less likely to use social media
in certain ways:
30% of workers whose companies have an at-work social media policy say they use social media while on the job
to take a break from work, compared with 40% of workers whose employers do not have such policies.
20% of workers whose employers have at-work social media policies say they use social media to stay connected
to family and friends while on the job, compared with 35% of workers whose social media use is not regulated at
work.
Only 16% of workers whose companies regulate social media at work say they use social media while working to
get information that’s helpful to their job, compared with 25% of those whose workplaces have no such
regulations.
On the other hand, workers are equally likely to say they use social media for a range of purposes regardless of their
workplace policy, including:
Making or supporting professional contacts that help them do their job
Learning more about someone they work with
http://www.pewinternet.org/2016/06/22/social-media-and-the-workplace/pi_2016-06-22_social-media-and-work_0-03/
Building or strengthening personal relationships with coworkers
Asking work-related questions of people outside their organization
Asking work-related questions of people inside their organization
Relatively few workers use specific social media platforms for work-related purposes, and the impact of that
use is not always clear-cut
A relatively modest share of workers say they have incorporated specific social media platforms into their day-to-day
work lives:
19% of workers say they ever use Facebook for work-related purposes.
14% ever use LinkedIn for work-related purposes.
3% ever use Twitter for work-related purposes.
9% use a social media tool provided by their employer for work-related purposes.
5% use social media platforms other than the ones listed above for work-related purposes.
But among the group that answered yes to at least one of the items above – that is, the subset of workers who use at
least one social media tool for job-related purposes – large shares see certain positive or beneficial impacts on their job
performance:
78% of workers who use social media platforms for work-related purposes say social media is useful for
networking or finding new job opportunities.
71% of these workers say social media is useful for staying in touch with others in their field.
56% say it is useful for connecting with experts.
51% say it is useful for getting to know their co-workers on a personal basis.
46% say it is useful for finding information they need to do their job.
On the other hand, these workers are divided on the utility of social media in other respects, especially when it comes to
the impact of social media use on their own job performance:
56% of workers who use social media platforms for work-related purposes agree that social media distracts from
the work they need to do, with 30% agreeing strongly. Some 42% of these workers disagree that social media is a
distraction.
54% of these workers agree that social media breaks help them recharge at work. A statistically similar
proportion (46%) disagree that social media breaks help them recharge while on the job.
51% of these workers agree that social media use at work lets them see too much information about their
coworkers; 47% disagree with this statement.
Helping workers understand and follow social
media policies
Kimberly W. O’Connor a, Gordon B. Schmidt a,*, Michelle Drouin b
a Division of Organizational Leadership & Supervision, Indiana University-Purdue University Fort Wayne,
2101 E. Coliseum Boulevard, Fort Wayne, IN 46805, U.S.A.
b Department of Psychology, Indiana University-Purdue University Fort Wayne, 2101 E. Coliseum Boulevard,
Fort Wayne, IN 46805, U.S.A.
Business Horizons (2016) 59, 205—211
Available online at www.sciencedirect.com
ScienceDirect
www.elsevier.com/locate/bushor
KEYWORDS
Social media policies;
Social media;
Facebook;
Young adults;
Social networking
Abstract While social media can have significant benefits for organizations, the
social media presences and postings of employees can be problematic for organiza-
tions. This is especially true when employees have connections to co-workers and
managers. Workers posting content deemed inappropriate or detrimental to the
organization has led to a significant number of workers being fired for their social
media behavior. To avoid such situations, organizations should create social media
policies to guide employee content. Organizational implementation of social media
policy is on the rise, but serious questions remain as to how to make it effective. One
crucial question is how well employees know and understand their employer’s policy.
In this article, we discuss how to communicate social media policies to workers and
help their understanding. To inform our recommendations, we draw on exploratory
data from a sample of young adult workers regarding their knowledge of their own
company’s social media policies.
# 2015 Kelley School of Business, Indiana University. Published by Elsevier Inc. All
rights reserved.
1. The impact of social media behavior
on employment status
When factory worker Ashley Heffran learned she had
received a $100 holiday bonus from her company,
she turned to Facebook to praise her employer. She
posted: ‘‘I was wowed by this today. Feels great to
* Corresponding author
E-mail addresses: oconnok@ipfw.edu (K.W. O’Connor),
schmidtg@ipfw.edu (G.B. Schmidt), drouinm@ipfw.edu
(M. Drouin)
0007-6813/$ — see front matter # 2015 Kelley School of Business, I
http://dx.doi.org/10.1016/j.bushor.2015.11.005
be appreciated by your job.’’ Before her shift end-
ed, Heffran’s supervisor informed her that she had
been fired for violating the company’s zero-toler-
ance policy for work-related social media posts
(Galli, 2014).
Similarly, when journalist Kristopher Brooks re-
ceived a job offer from the Wilmington News Jour-
nal, he announced it on his personal Tumblr blog.
Soon after, Brooks was notified that his job offer had
been rescinded because he quoted his offer letter
and used the company’s logo when making his
announcement (Giang, 2012).
ndiana University. Published by Elsevier Inc. All rights reserved.
http://crossmark.crossref.org/dialog/?doi=10.1016/j.bushor.2015.11.005&domain=pdf
http://crossmark.crossref.org/dialog/?doi=10.1016/j.bushor.2015.11.005&domain=pdf
http://dx.doi.org/10.1016/j.bushor.2015.11.005
http://www.sciencedirect.com/science/journal/00076813
mailto:oconnok@ipfw.edu
mailto:schmidtg@ipfw.edu
mailto:drouinm@ipfw.edu
http://dx.doi.org/10.1016/j.bushor.2015.11.005
206 K.W. O’Connor et al.
In another example, Cheryl James had an emo-
tionally charged shift at Oakwood Hospital in Dear-
born, Michigan, when she was asked to treat an
alleged shooter of police. After work she went to
Facebook to blow off some steam. She posted that
she had come face-to-face with evil, and hoped the
cop killer would rot in hell. The post did not contain
any direct information about the suspect’s name,
medical condition, or even the treatment hospital.
Despite this, James was fired for her post because it
was considered a violation of HIPPA privacy protec-
tions for patients and contained unprofessional con-
tent (Katarsky, 2010).
These cases, along with many others, illustrate
situations in which employees were fired for un-
knowingly and unintentionally violating their com-
panies’ social media policies. Examples such as
these highlight some of the practical problems em-
ployers encounter when dealing with employees’
personal social media usage. Specifically, for the
growing number of companies that choose to imple-
ment social media policies, questions arise as to
whether policies are (1) properly drafted and/or (2)
effectively communicated to workers. Oftentimes,
the lack of effective social media policy communi-
cation and training is the root cause of termination
cases.
In this article we offer advice to organizations on
how best to communicate social media policies to
workers. We draw on an exploratory study we con-
ducted with young adult workers as to their knowl-
edge–—or more often, lack of knowledge–—about
their own organization’s social media policy and
its components. We discuss provisions organizations
should include when drafting social media policies
and the importance of enforcement so that workers
better understand and appreciate such policies. In
addition, we discuss how social media policies can
be communicated through training programs and
elements that can help these programs be effective.
Finally, we conclude by suggesting future needs for
research, theory, and guidance for organizations on
the use of social media policies.
2. Why is there a need for social media
policies in organizations?
Social media usage has grown exponentially in
recent years. Approximately 73% of Americans en-
gage in social networking, with sites like Facebook,
Twitter, Instagram, and LinkedIn dominating the
landscape (Duggan & Smith, 2013). Not surprisingly,
personal social media usage has consequently
become connected to the workplace (Schmidt &
O’Connor, 2015). Weidner, Wynne, and O’Brien
(2012) found that 60% of employees were connected
with a colleague through social media and 40% were
connected with their supervisor. Meanwhile, Hawley
(2014) found that approximately 50% of employees
posted pictures, videos, or messages involving their
employer, which equates to approximately 60 mil-
lion U.S. workers using social media to discuss em-
ployment issues.
These behaviors may not be problematic in and of
themselves, as organizations may permit or even
encourage social media connections and posts, de-
pending upon the industry. However, problems can
arise when unprofessional or negative social media
conduct is viewed by recruiters, colleagues, super-
visors, or the public–—such as in the case of Cheryl
James. In addition, positive content posted by em-
ployees–—like Ashley Heffran and Kristopher Brooks–—
may be problematic because the dissemination of
company information may be at issue. Cases such as
these have spurred the development and implemen-
tation of social media policies, principally so that
companies can protect their professional reputations
and proprietary information from exposure.
Proskauer Rose LLP recently found that 80% of the
companies it surveyed currently have a social media
policy in place (Rubenstein, 2014). However, there is
no known applied research and little guidance for
organizations regarding whether or not employees
of companies with a social media policy are aware of
its existence or understand its specifics. Previous
research by Schmidt and O’Connor (2015), Whitfield
(2013), and others has highlighted the many legal
issues and cases involving worker discipline, as well
as the impact various laws have had on workers who
engage in personal social media usage.
Building on calls for research in the areas of
employee perceptions and understanding of social
media policy language, we conducted an explorato-
ry study. Our findings suggest that employers need to
do a better job in helping employees understand and
apply their social media policies. We found that
simply having a social media policy is not enough
to influence or change worker social media behavior.
These results inform many of the practical sugges-
tions for organizations we put forth in this article.
3. The exploratory study
3.1. Nature of the study
The study participants were 166 employed under-
graduates (60 men, 106 women) from a Midwestern
United States university. They answered questions
on their social media connections to co-workers,
their behaviors related to talking about work
Table 1. Percentages of employed exploratory participants who engage in work-related social media behaviors
Percent
yes/agree
Mean SD
Any number of work friends on SM 86% 9.45 13.44
Talk about job on SM tends to be about co-workers 19% 1.60 0.79
Talk about job on SM tends to be about job itself 41% 2.06 0.87
Talk about job on SM tends to be about customers 22% 1.68 0.81
SM co-worker talk tends to be negative 9% 3.52 0.96
SM job itself talk tends to be negative 13% 3.39 0.97
SM customer talk tends to be negative 16% 3.28 1.01
Access SM during workday 77% 2.44 1.09
Permitted to access SM at work 36% — —
Use work-provided device to access SM 14% — —
Note: SM = Social Media. Talk about job scales = 1 (disagree) —3 (agree). SM work talk negative scales = 1 (very negative) —5 (totally
positive).
207
through social media, and their knowledge of their
own company’s social media policy and its elements.
The results for the first two categories are presented
in Table 1, and the answers directly related to social
media policies are presented in Table 2.
3.2. Work-related social media behaviors
The majority of participants were connected on
social media with work friends, with 86% suggesting
they had at least one co-worker connection on social
media (see Table 1). Most participants used social
media at work (77%); however, only 36% reported
they have permission to do so, suggesting that some
workers are ignoring work-policy bans on such be-
haviors.
We also found that employees are making work-
related comments on social media. With regard to
the types of job-related talk they posted to social
media, more participants reported talking about
the job itself than co-workers or customers, and
comments were mainly positive, fitting with the
results of Hawley (2014). However, a fair number
of participants (9%—16%) indicated that their social
media comments about work tended to be negative,
Table 2. Employees’ understanding of their company’s s
has a social media policy
Know what violates company’s SM policy
Company gives practical advice for employee SM use
Company has ‘use common sense’ provision
Company requires protection of trade secrets
Company prohibits online discussion related to work
Note: n = 118.
especially about customers. Those who indicated
that their company had a social media policy posted
more negative content than those who said their
company did not have a policy or were unsure
whether their company had a policy.
3.3. Knowledge of work-related social
media policies
Only 31% of participants indicated their company
had a social media policy; 34% indicated that their
company did not have a social media policy; and 35%
reported that they did not know if their company
had a social media policy. As Table 2 shows, for those
who knew their company had a social media policy,
only half knew what violated the policy. When asked
about specific policy details, many participants in-
dicated that their company either did not have, or
the participant did not know about, common social
media use policy provisions.
In terms of demographic and social media policy
knowledge, the only significant difference was ten-
ure with the company: those who indicated their
company had a social media policy had been with
their company longer than those in the other groups,
ocial media policy for those who knew their company
Yes No I don’t know
50% 50% —
42% 18% 41%
54% 10% 36%
42% 11% 47%
30% 23% 48%
208 K.W. O’Connor et al.
and significantly longer than those who indicated
they did not know if their company had a social
media policy. However, it is notable that for those
who indicated they did not know if their company
had a policy, their mean term of employment was
nearly a year (10.98 months). These findings suggest
that social media policies were not introduced dur-
ing initial training, and that they are perhaps com-
municated in a less formal way through cumulative
experiences with the company. Interestingly, even
those who knew their company had a policy did not
know many details about the policy, which suggests
that more explicit social media policy training is
necessary.
4. Practical considerations for
employers
What we know from our data–—as well as from prior
studies of worker online behavior–—is that employ-
ees are regularly talking about work, about custom-
ers, and to co-workers on social media sites (Hawley,
2014). As discussed, a noteworthy take-away from
our study is that 86% of participants were connected
with co-worker colleagues. This is higher than previ-
ous examinations of co-worker connections, which
found it to be in the 60% range (Duggan & Smith, 2013;
Weidner, Wynne, & O’Brien, 2012). This could be due
in part to the younger age of our sample and more
widespread use of social media among young adults.
With regard to the content of such social media
posts, organizations can be heartened that our study
indicates most content across all three types was
not negative. However, the fact that posts about
customers was the most endorsed category for neg-
ative content is obviously troubling. Negative con-
tent on social media may hurt the reputation of an
organization in the eyes of the public and potential
customers. Important legal issues may arise in
these circumstances, and employers may find that
having a social media policy in place helps avoid
litigation or aids their defense in court (Schmidt &
O’Connor, 2015).
Our study points to two major areas employers
need to consider regarding worker social media
behaviors and social media policies. First, social
media policies need to be well drafted and
clear–—and consistently enforced–—so workers un-
derstand the policy and the organization can protect
itself legally. Second, organizations need to clearly
communicate their social media policies to workers.
This can be accomplished by implementing various
communication mediums and training methods,
which should include multiple exposures to social
media policy language and meaning.
4.1. Social media policies need to be well
drafted, clear, and consistently enforced
As shown by our data, many workers do not know the
elements of their company’s social media policy.
This may be in part because the existing policy is
obtuse or lacking specifics of how workers should
behave. To make policies clear, organizations need
to carefully consider how policy provisions can be
written so they are well defined and understandable
to workers.
First and foremost, when creating such policies,
private sector organizations need to make sure they
are not infringing on the legally protected rights of
their employees. As outlined in Section 7 of the
National Labor Relations Act (NLRA), employers
cannot restrict employees’ right to communicate
with co-workers about working terms and condi-
tions. Depending upon what type of work-related
matters the employees discuss via social media,
their communications may be considered protected
concerted activity and within their right to debate
(Schmidt & O’Connor, 2015). Many companies
choose to include non-disparagement clauses,
which can range from requiring employees not to
say bad things about the company to not identifying
their employment with the company; in extreme
cases, this may go so far as completely banning
employees from posting anything about the compa-
ny (Gordon & Argento, 2014). However, it is impor-
tant to note that private-sector companies that
place heavy restrictions and all-out bans on their
employees run the risk of violating Section 7 of the
NLRA (Schmidt & O’Connor, 2015). Consulting an
attorney to help make a determination of whether
an organization’s policy language could violate
federal law would likely be good practice.
Furthermore, the National Labor Relations Board
(NLRB) suggests that the language of social media
policies should give employees clear examples
of permitted and banned behaviors, as well
as how the organization’s policy will be applied
(Purcell, 2012; Schmidt & O’Connor, 2015). Notably,
when examining various policies–—such as those on
the website http://socialmediagovernance.com/
policies/, a database that includes hundreds of
examples of social media policies from many major
U.S. and international employers–—the policy lan-
guage can vary tremendously among industries and
between organizations (Boudreaux, 2009). Howev-
er, common social media policy elements include
protection of company trade secrets and potential
violations of anti-discrimination or anti-harassment
laws (Breakenridge, 2012; Schmidt & O’Connor,
2015). HR professionals may want to use the social
media governance website to find examples of
http://socialmediagovernance.com/policies/
http://socialmediagovernance.com/policies/
1 https://www.youtube.com/watch?v=QKW9xkX0uIE
Helping workers understand and follow social media policies 209
language they desire in their own policies, but they
will need to consider their own work context when
drafting a policy.
Equally important is the enforcement of social
media policies that exist in an organization. Even if
workers understand the existing policy language, if
they do not see it consistently enforced, they may
assume it can effectively be ignored. Inconsistent
enforcement by the organization can lead to dis-
crimination lawsuits (Dexter, 2008). Therefore, pol-
icy language should clearly define the consequences
of policy violations. This could include language on
elements such as progressive discipline (i.e., more
violations over time leads to more stringent punish-
ment) or the types of violations that are considered
severe enough for termination on the first offense.
Although consistent and systematic enforcement
is crucial for a successful policy, there are indica-
tions that organizations are failing in this regard. In
many extant termination cases (such as the K-12
teacher cases discussed in O’Connor & Schmidt,
2015), the offending worker’s social media content
was not discovered via routine organizational pro-
cesses but rather by particular individuals reporting
the worker to the organization. This is concerning,
as negative social media content could potentially
be posted but go unreported to an organization, or
be discovered much later, after damage has been
done to the organization’s image.
Due to the importance of enforcement, we rec-
ommend that organizations create policies and pro-
cedures for the collection of data and enforcement
of social media policies. Organizations could set
procedures consisting of real-time, daily, or weekly
data collections. Organizations should consider hav-
ing dedicated staff for or staff time devoted toward
monitoring and discovering social media content, as
well as staff for viewing flagged content and deter-
mining if it violates the social media policy. Tech-
nology could help with this process by creating an
automatic search utilizing programs or applications;
in fact, these applications already exist. The Orange
County School District in Orlando, Florida, uses a
software program offered by Snaptrends for the
routine monitoring of social media posts by both
students and staff (Postal, 2015). Another such
software, Socialite by Actiance, monitors social
media for key words, phrases, and patterns. It
can give organizational compliance teams real-time
updates when concerns are detected. These tools
could help organizations in the detection and en-
forcement of policy provisions.
In terms of enforcement and the general nature
of policies, it is nonetheless important to consider
how workers and employees may respond. Policies
may be legally defensible but result in situations
that the public deems unjust (Drouin, O’Connor,
Schmidt, & Miller, 2015), or that alienate workers
who feel their privacy is being violated. When craft-
ing policies and punishments, organizations may
want to consider the values and perceptions of their
own workforce and the customer base. Organiza-
tions may also want to create mechanisms by which
workers can appeal organizational decisions and
punishments, so as to be heard and explain the
intent behind the social media post in question.
4.2. Organizations need to clearly
communicate social media policies and
provide training to workers
The results of our exploratory study and the recom-
mendations of those with expertise in this area
(Breakenridge, 2012; Schmidt & O’Connor, 2015)
suggest that organizations need to do significantly
more to inform workers about social media policies
if they want the policies to have an appropriate
impact. To accomplish this, there are various ave-
nues organizations might consider. For example,
written forms of policy communication may include
a social media section in the employee handbook,
signed policy acknowledgments by employees, or
social media policy memorandums to employees.
Breakenridge (2012) suggests that organizations
could make short summary documents for easy
worker reference, especially in the case of more
expansive social media policies. However, the most
basic way to better communicate such information
might be to train workers directly on policies, as
suggested by both Schmidt and O’Connor (2015) and
Breakenridge (2012). Well-designed training pro-
grams may help workers not only understand the
words of the policy, but also how those words apply
in everyday organizational life.
The training could proceed in a number of differ-
ent ways; the best method may vary depending on
the actual elements of the organizational policy.
One method of social media training entails online
videos that workers are required to view. Idaho’s
St. Luke’s Health System provides its employees
with a video defining social media, discussing types
of issues that can arise, and listing the criteria
people should consider when posting.1 Video links
can be emailed to employees, or supervisors can run
meetings where such videos are shown. Schmidt and
O’Connor (2015) offer other examples of video-
based training.
In addition, organizations might want to imple-
ment face-to-face training, which allows participants
210 K.W. O’Connor et al.
to ask questions and receive answers; or, they could
offer a combined set of methods. A number of con-
sulting organizations develop and run programs on
social media policy training (e.g., Xcelus). It would
likely benefit employees to have exposure to more
than one method of social media policy training
(Miller-Merrell, 2011).
Organizations need to consider when employees
should get training. It makes sense to build at least
one social media policy training session into an
orientation program so that new employees gain
an understanding of such policies upon entry. As
our study revealed, lower-tenure employees are
particularly in need. If the organization has a zero
tolerance type of social media policy, or has a policy
against using the company name on social media–—as
exemplified by the Ashley Heffran, Kristopher
Brooks, and Cheryl James examples–—a good prac-
tice would be to notify a new hire in the offer letter.
It is important to make sure that existing employ-
ees and managers also receive training. Though
longer-tenured employees may know the company
has a social media policy in place, their reported
negative online postings in our study suggest either a
lack of understanding or mere complacency. Man-
agers should be comprehensively trained, as they
may be tasked with handling employee discipline
when social media—related issues arise.
It should be stressed that one training session for
the duration of a worker’s employment with the
organization is certainly not enough. Information
can become outdated and social media policies will
change significantly as new technology creates dif-
ferent concerns and potential issues. The social
media sites that are used most frequently by work-
ers will change over time, and any training needs to
keep up-to-date with such changes; organizations
will want to have refresher courses to help workers
understand current sites and social media policy
language. Yearly social media refresher courses
could remind workers of policy elements that have
remained the same, yet concurrently introduce
them to any changes or updates that will be made
and subsequently enforced.
5. Conclusion
In light of our arguments, the extant relevant liter-
ature, and the results of our exploratory study, we
suggest–—for all organizations–—the development of
comprehensive policies regarding social media use
and online conduct. Newer workers may or may not
be aware of their employer’s social media policy;
longer-tenured employees may not understand the
policy; and senior employees may have started
before such policies were adopted. We therefore
suggest ample training on social media policies
across all levels of the organization. Moreover,
future research is needed in this area, specifically
in regard to the effectiveness of various training
methods. This research could help organizations
determine how social media policies are best com-
municated to and understood by employees.
In many of the legal cases surrounding workers
terminated for social media posts, the terminated
worker seemingly had little awareness of the po-
tential consequences his or her behavior might
provoke (O’Connor & Schmidt, 2015; Schmidt &
O’Connor, 2015). This lack of awareness could, in
part, be due to policies that lack clear descriptions
of how the policies are enforced and how workers
who violate them will be punished. Social media
policies can help workers understand their legal
rights, what content is and is not appropriate, and
what content may have negative consequences.
Well-drafted policies that are crafted in line with
existing legal standards may also help an organiza-
tion avoid or defend itself from litigation. Providing
examples of prohibited conduct–—as recommended
by the NLRB–—will help employees to better under-
stand the policy and possibly reduce the likelihood
that they will later sue the organization (Purcell,
2012; Schmidt & O’Connor, 2015). If litigation
does arise, a clearly articulated policy can provide
direction for the court when deciding the matter
at hand.
In conclusion, we know for certain from our
exploratory study that employees are posting com-
ments about their co-workers, jobs, and customers.
Some of these comments, especially those about
customers, are negative. Most distressingly, this
negative talk only increases with tenure. To avoid
potential legal issues, employers should educate
their employees about company social media poli-
cies early and often, with training a potentially
fruitful way of doing so. Work life and online life
are intertwined, and organizations need to create
and communicate policies that help workers under-
stand what behaviors are appropriate.
References
Boudreaux, C. (2009). Social media governance: Empowerment
with accountability. Retrieved from http://socialmedia
governance.com/policies/
Breakenridge, D. K. (2012). Social media and public relations.
Upper Saddle River, NJ: FT Press.
Dexter, D. (2008). Social media policies for the new digital age:
New issues for employers. American Bar Association. Retrieved
from http://www.americanbar.org/content/dam/aba/
administrative/labor_law/meetings/2011/annualmeeting/
028.authcheckdam
http://socialmediagovernance.com/policies/
http://socialmediagovernance.com/policies/
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0010
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0010
http://www.americanbar.org/content/dam/aba/administrative/labor_law/meetings/2011/annualmeeting/028.authcheckdam
http://www.americanbar.org/content/dam/aba/administrative/labor_law/meetings/2011/annualmeeting/028.authcheckdam
http://www.americanbar.org/content/dam/aba/administrative/labor_law/meetings/2011/annualmeeting/028.authcheckdam
Helping workers understand and follow social media policies 211
Drouin, M., O’Connor, K., Schmidt, G., & Miller, D. (2015). Face-
book fired: Legal perspectives and young adults’ opinions on
the use of social media in hiring and firing decisions. Compu-
ters in Human Behavior, 46, 123—128.
Duggan, M., & Smith, A. (2013, December 30). Social media
update 2013. Pew Research Center. Retrieved from http://
pewinternet.org/Reports/2013/Social-Media-Update.aspx
Galli, T. (2014, December 19). Fired worker’s fate focuses atten-
tion on social media policies. Retrieved from http://www.
wkow.com/story/27674626/2014/12/19/fired-workers-
fate-focuses-attention-on-social-media-policies
Giang, V. (2012, April 13). This is how you get fired before your
first day on the job. Business Insider. Retrieved from http://
www.businessinsider.com/this-is-how-you-get-fired-before-
your-first-day-on-the-job-2012-4
Gordon, P., & Argento, Z. (2014). NLRB’s recent 729 Triple Play
decision tackles two critical social media issues for
730 employers. San Francisco: Littler Mendelson.
Hawley, D. (2014, November 12). Why 60 million employees use
social media to advocate for their companies. Advertising
Age. Retrieved from http://adage.com/article/digitalnext/
60-million-employees-social-media-advocate/295823/
Katarsky, C. (2010, August 24). Nurse fired for HIPAA violation
after discussing cop-killer patient: Was it fair? Healthcare
Business & Technology. Retrieved from http://www.
healthcarebusinesstech.com/nurse-fired-for-hipaa-violation-
after-discussing-cop-killer-patient/
Miller-Merrell, J. (2011, May 17). How to use social media poli-
cies: Communicating and training your employees. Blogging
4 Jobs. Retrieved from http://www.blogging4jobs.com/
social-media/part-4-how-to-write-social-media-policies/
#fZOSAGGkh1EiSY1z.97
O’Connor, K. W., & Schmidt, G. B. (2015). ‘‘Facebook fired’’:
Legal standards for social media-based terminations of K-12
public school teachers. Journal of Workplace Rights, 5(1),
1—11. Accessible via Sage Open at http://sgo.sagepub.com/
content/5/1/2158244015575636
Postal, L. (2015, May 28). Orange schools to monitor social media
posts of students, staff. Orlando Sentinel. Retrieved from
http://www.orlandosentinel.com/features/education/
school-zone/os-orange-schools-to-monitor-social-media-
posts-of-students-staff-20150528-post.html
Purcell, A. (2012, May 30). Memorandum OM 12-59. Available
at http://www.nlrb.gov/reports-guidance/operations
management-memos
Rubenstein, A. (2014, April 29). Employee misuse of social media
on the rise, survey says. Law 360. Retrieved from http://www.
law360.com/articles/532775/employee-misuse-of-social-
media-on-the-rise-survey-says
Schmidt, G., & O’Connor, K. (2015). Fired for Facebook: Using
NLRB guidance to craft appropriate social media policies.
Business Horizons, 58(5), 571—579.
Weidner, N., Wynne, K., & O’Brien, K. (2012, April). Individual
differences in workplace-related use of Internet-based social
networking sites. Paper presented at the Annual Conference of
the Society for Industrial and Organizational Psychology, San
Diego, California.
Whitfield, B. (2013). Social media @ work: #policyneeded*.
Arkansas Law Review, 66, 843—878.
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0020
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0020
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0020
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0020
http://pewinternet.org/Reports/2013/Social-Media-Update.aspx
http://pewinternet.org/Reports/2013/Social-Media-Update.aspx
http://www.wkow.com/story/27674626/2014/12/19/fired-workers-fate-focuses-attention-on-social-media-policies
http://www.wkow.com/story/27674626/2014/12/19/fired-workers-fate-focuses-attention-on-social-media-policies
http://www.wkow.com/story/27674626/2014/12/19/fired-workers-fate-focuses-attention-on-social-media-policies
http://www.businessinsider.com/this-is-how-you-get-fired-before-your-first-day-on-the-job-2012-4
http://www.businessinsider.com/this-is-how-you-get-fired-before-your-first-day-on-the-job-2012-4
http://www.businessinsider.com/this-is-how-you-get-fired-before-your-first-day-on-the-job-2012-4
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0040
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0040
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0040
http://adage.com/article/digitalnext/60-million-employees-social-media-advocate/295823/
http://adage.com/article/digitalnext/60-million-employees-social-media-advocate/295823/
http://www.healthcarebusinesstech.com/nurse-fired-for-hipaa-violation-after-discussing-cop-killer-patient/
http://www.healthcarebusinesstech.com/nurse-fired-for-hipaa-violation-after-discussing-cop-killer-patient/
http://www.healthcarebusinesstech.com/nurse-fired-for-hipaa-violation-after-discussing-cop-killer-patient/
http://www.blogging4jobs.com/social-media/part-4-how-to-write-social-media-policies/#fZOSAGGkh1EiSY1z.97
http://www.blogging4jobs.com/social-media/part-4-how-to-write-social-media-policies/#fZOSAGGkh1EiSY1z.97
http://www.blogging4jobs.com/social-media/part-4-how-to-write-social-media-policies/#fZOSAGGkh1EiSY1z.97
http://sgo.sagepub.com/content/5/1/2158244015575636
http://sgo.sagepub.com/content/5/1/2158244015575636
http://www.orlandosentinel.com/features/education/school-zone/os-orange-schools-to-monitor-social-media-posts-of-students-staff-20150528-post.html
http://www.orlandosentinel.com/features/education/school-zone/os-orange-schools-to-monitor-social-media-posts-of-students-staff-20150528-post.html
http://www.orlandosentinel.com/features/education/school-zone/os-orange-schools-to-monitor-social-media-posts-of-students-staff-20150528-post.html
http://www.nlrb.gov/reports-guidance/operationsmanagement-memos
http://www.nlrb.gov/reports-guidance/operationsmanagement-memos
http://www.law360.com/articles/532775/employee-misuse-of-social-media-on-the-rise-survey-says
http://www.law360.com/articles/532775/employee-misuse-of-social-media-on-the-rise-survey-says
http://www.law360.com/articles/532775/employee-misuse-of-social-media-on-the-rise-survey-says
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0080
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0080
http://refhub.elsevier.com/S0007-6813(15)00147-0/sbref0080
- Helping workers understand and follow social media policies
1 The impact of social media behavior on employment status
2 Why is there a need for social media policies in organizations?
3 The exploratory study
3.1 Nature of the study
3.2 Work-related social media behaviors
3.3 Knowledge of work-related social media policies
4 Practical considerations for employers
4.1 Social media policies need to be well drafted, clear, and consistently enforced
4.2 Organizations need to clearly communicate social media policies and provide training to workers
5 Conclusion
References
NEW CONCERNS IN ELECTRONIC EMPLOYEE
MONITORING: HAVE YOU CHECKED YOUR
POLICIES LATELY?
Janet Ford, Western Carolina University
Lorrie Willey, Western Carolina University
Barbara Jo White, Western Carolina University
Theresa Domagalski, Western Carolina University
ABSTRACT
Employee monitoring is a significant component of employers’ efforts to maintain
employee productivity and, to a great extent, the means by which to avoid legal liabilities and
business injuries which stem from employee misconduct. From sexual harassment to
commercial disparagement, employers must guard against employee injury to third parties,
inside or outside of the workplace. Moreover, disgruntled employees can expose valuable
business trade secrets or engage in corporate espionage or sabotage.
Developing technologies allow for extensive monitoring with video, phones, internet,
social media and other devices with which employee behaviors can be tracked. If an employer
goes too far, or not far enough, to identify and prevent employee misconduct, the legal
consequences that could befall the employer are costly to both revenue and reputation. This
balancing act, and the dilemma it creates, demonstrates the need for businesses to develop
effective electronic monitoring policies. However, policies, once developed, need to be
periodically reviewed to ensure compliance with evolving legal changes. For example, recent
legal decisions from the National Labor Relations Board and emerging trends in state legislation
regarding employee monitoring necessitate review of employee monitoring policies.
INTRODUCTION
Employers have long had compelling reasons to monitor employees. For example,
management at Los Angeles California City Hall discovered that employees were streaming the
2012 Summer Olympics over the corporate network while at work. Management’s response:
“Stop watching the Olympics at work!” (Winton, 2012). Events like the Olympics or the annual
March Madness basketball tournament impact corporate networks during very specific times, but
imagine an employer monitoring its network and discovering that every day employees are
watching over 50,000 YouTube videos, streaming over 4,000 hours of music over the internet, or
streaming movies from Netflix. This discovery, in fact, prompted Proctor & Gamble to shut
down access to movies from Netflix and music from Pandora for its 129,000 employees
(Schwartz, 2012).
Ensuring employee productivity is a major consideration to support the monitoring
processes. But employers have also long been aware of the risk of legal liability or loss to which
their organizations may be exposed as a result of inappropriate employee activities online (Papa
& Bass, 2004). Lawsuits based on online harassment are typically cited as a concern that justifies
employee monitoring, but these are by no means the only legal claims that can arise from
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
51
employee activity online. In recent years, employee activity on social media outlets, along with
employer responses to such activity, have increasingly exposed organizations to liability for
unlawful discrimination (Gaskell v. University of Kentucky, 2010), violation of labor laws
(Hispanics United of Buffalo, Inc., 2012), and even violation of securities laws (Bondi &
Lofchie, 2011). In addition to legal liability for employee misconduct, employers are concerned
about threats to their organization’s intellectual property as vital data and information are
increasingly stored in digital format that is easy for employees to access and distribute outside of
the organization’s protocols (Willey, Ford, White & Clapper, 2011). To support and justify
employee monitoring, employers have adopted policies that attempt to define the limits of
permissible employee online activity and identify forms of impermissible online activity that
might expose the organization to legal liability or loss. As with all best business practices, it is
not enough to simply develop an employee monitoring policy. Successful organizations regularly
review and update their policies and review the enforcement of those policies to ensure that they
are addressing current concerns in a way that complies with state and federal laws (Rozwell,
2012).
The monitoring of employees’ emails, internet usage, telephone communications and
social media gives rise to confusing legal responses. While some law supports the necessity of
monitoring, other law exists to limit the electronic monitoring of employees to protect employee
privacy, leaving employers between a rock and hard place. On top of these concerns, recent
rulings by the National Labor Relations Board confound the problem for organizations by strictly
interpreting monitoring policies that could impact employees’ rights under the National Labor
Relations Act. Additionally, numerous states have either enacted or are considering legislation
that would limit the use of social media as a monitoring tool. It’s time to take out those
monitoring policies, dust them off, and be sure the organization’s policies comply with law.
AN HISTORICAL LOOK AT ELECTRONIC MONITORING AND A LOOK AT
RECENT TRENDS
Business organizations are able to use hardware and software to electronically monitor a
wide variety of employee behaviors both in and out of the workplace. Attendance and facility use
can be monitored using video surveillance and through employee badges where entry and time
spent in various access areas is logged. In addition, new applications for physical access cards
provide authentication and access to digital systems which may ultimately lead to the
convergence of Information Technology (IT) security and physical security (Walls, 2012a). Not
only can employee access cards provide a digital record of their physical whereabouts, but also
global positioning system (GPS) chips and radio frequency identification (RFID) chips have
been used to monitor the location of assets, such as laptops, phones, and vehicles, used by
employees (Ciocchetti, 2011). Beyond monitoring the physical location of assets or employees,
organizations also monitor employee productivity (Mujtaba, 2003) including the use of
communication equipment and computer equipment that their employees use daily: activity on
the desktop personal computers, keystroke logs, email communications, text-messages; use of
social network sites, use of the internet and search engines; and telephone use, including
voicemail monitoring (Ciocchetti, 2011).
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
52
A Decade of Electronic Monitoring: 1997 – 2007
Monitoring techniques differ in both their usage in the workplace and in their usage over
time. Surveys of member and client companies of the American Management Association
(AMA) specifically examined workplace monitoring over the ten-year period from 1997 to 2007,
though not all technologies were measured for all years (AMA, 2000; AMA, 2001; AMA, 2008;
Anonymous, 2005). For example, monitoring using technologies such as social network sites and
blogs were not measured prior to 2007. The surveys revealed that, for the period from 1997-
2005, some monitoring techniques, such as the recording and review of telephone conversations
or voicemail messages and the review and video recording of employees to assess job
performance were used by less than 21% of the businesses surveyed (AMA, 2000; AMA, 2001;
Anonymous, 2005). Video recordings of employee job performance grew at the very low rate of
.2% per year (AMA, 2000; AMA, 2005). Although voicemail storage and review grew at a fairly
high rate of nearly 14% per year during the period, its use is not widespread, at l5% of the
surveyed companies (AMA, 2005).
Other employee monitoring techniques showed more widespread usage with several of
those monitoring techniques showing higher rates of growth over time (see Figure 1).
Figure 1: Monitoring methods and usage percentages over time
For example, from 1997-2007, monitoring email messages grew at the highest annual rate
(17% per year) while storing and reviewing computer files and computer use show very high
growth rates of 12% and 11% per year respectively. Telephone use monitoring was fairly
sizeable at 45% while monitoring internet connections was quite common at
66
%. Both of those
techniques showed low growth rates of 3% per year with telephone use being measured for the
ten-year period from 1997-2007, and monitoring internet connections as measured for the eight-
year period from 2000-2007 (AMA, 2000; AMA, 2001; AMA, 2008; Anonymous, 2005).
Monitoring employees on social networking sites and on the blogosphere were first measured in
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
53
2007 and show rates of usage of 10% and 12% respectively (AMA 2008). New technologies and
applications will continue to affect electronic monitoring.
Recent Trends in Electronic Monitoring
A recent trend is the use of social media by employees or potential employees. Gartner
Inc., an IT research firm, conducted a survey that showed widespread adoption of social
networking sites across a variety of U.S. industries including the media industry (77%),
education and telecom industries (
58
%), and the retail industry (52%) among others (Rozwell,
2012). Organizations monitor social media use of both employees and potential employees
(Willey, White, Domagalski, & Ford, 2012). Surveys of employers over the last seven years
show that in 2013, 39% of employers screened potential employees using social network sites
(Grasz, 2013) up from 12% (Grasz, 2006), which represents a growth rate of 225%. Information
on social network sites can both help a potential employee get hired as well as hinder a potential
employee from getting hired. Current employees are also monitored as to their social media use,
and Gartner recommends that organizations develop social media policies, rules and training for
organization employees who might be forbidden from, encouraged to use or even asked to use
and track social media sites as part of their job assignments (Mann, 2012). The social network
sites that organizations are monitoring fall into four major categories: public sites such as
Facebook, Twitter and LinkedIn; public sites that are not based on advertising, like MyCube;
semiprivate social network sites like Yammer; and private social networks such as Mumsnet
(Casper, 2011). Software such as SocialLogix is able to detect multiple social media sites
employees use and uncover their user profiles. While it is not uncommon to monitor social media
for employee postings, particularly in the major sites such as Facebook and LinkedIn and
Twitter, recent technology capabilities make it possible to monitor other social networks even if
the employee posts in multiple languages. To prevent posts that are inappropriate, organizations
must first monitor and intercept them using a variety of tools including network infrastructure
tools, services that integrate with social media platforms and social media management software
(Walls, 2012b).
A REVIEW OF THE LEGAL PRESSURES SUPPORTING EMPLOYEE MONITORING
To a significant and increasing extent, organizations monitor employee activity to reduce
potential exposure to legal liability to third parties and also to minimize the risk of harm resulting
from employee misconduct. Not only must an organization take reasonable measures to protect
third parties from the wrongful conduct of employees, it must also take measures to protect itself
from employee acts that might undermine the organization’s business interests. Although these
concerns over employee misconduct are not new, technological developments have provided
employees with increased opportunities to divert themselves from their work obligations and
engage in conduct that can be detrimental to the organization. Technology has also provided
expanded tools with which organizations may monitor employee activity. The legal system,
however, generally lags behind the needs of the workplace in terms of determining rights and
responsibilities in the face of new technology. Courts often attempt to graft new applications of
technology onto traditional legal doctrine and precedents whenever sufficient parallels exist
(Ciocchetti, 2011). Occasionally, however, courts must fashion new remedies to address new
harms, or await legislative action, and the results are seldom uniform.
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
54
The availability of expanded technological tools raises multiple issues, such as concerns
over employee privacy, discussed below, on the one hand and the reasonableness of monitoring
efforts on the other hand. If reasonable means of monitoring employee activity are available,
employers may be found negligent if they fail to use those means. (Papa & Bass, 2004)
Similarly, where an organization does not take advantage of available technology to protect its
business interests, it may be left with no remedy in the face of employee (or ex-employee) theft
of intellectual property or other harmful acts directed at the business (Willey, Ford, White &
Clapper, 2011).
Injury to Third Parties
U.S. law often places liability on employers when employee conduct results in injury to
third parties, either to those outside the organization or to other employees within the
organization. Because employees are hired to act on the behalf of their employer and advance the
employer’s interest, they are considered agents of the employer. Under agency principles, the
organization, as the principal, has the right to control the agent-employee (Restatement Agency,
§ 1.01). This agency relationship therefore exposes the organization to vicarious liability, under
the theory of respondeat superior, for the wrongful acts of its employees committed in the scope
of employment (Restatement Agency, § 2.04). Where the wrongful acts of an employee are
outside the scope of employment, the organization may still be liable for harm to a third party
under tort theory if the employee is on the premises of the employer or using the property of the
employer or if the employer knew or had reason to know of the employee’s propensity to engage
in wrongful acts (Restatement Torts, § 317).
Under the theory of respondeat superior, employees are generally considered to be acting
within the scope of employment if they engage in work assigned by the employer or are subject
to the employer’s control (Restatement Agency, §7.07). Under respondeat superior, employees
are engaged in activities they were hired to do to advance the organization’s interest, but perform
those activities in a manner that inflicts harm on a third party (Papa & Bass, 2004).
If the employee’s conduct is not directed by the employer and is not intended to benefit
the organization, then the employee is acting outside of the scope of employment (Restatement
Agency, § 7.07). This exposes an organization to liability for employee misconduct under the
tort theory of negligent retention. Organizations have a duty to prevent intentional harm or an
unreasonable risk of bodily harm to third parties resulting from an employee’s misconduct, either
on the employer’s premises or while using the equipment, tools, or other resources of the
employer (Restatement Torts, § 317). A negligent retention theory is also available under agency
law. Negligent retention under agency theory holds the employer responsible for the employee’s
conduct that causes harm to a third party if the employer is negligent “in selecting, training,
retaining, supervising, or otherwise controlling the agent” (Restatement Agency, § 7.05). Unlike
respondeat superior, it is not necessary for the employee to be acting in the scope of
employment for liability to arise. Thus, in a situation where an employee uses workplace email
to threaten or harass another, the injured third party may not be able to pursue the employer
under a respondeat superior theory but might be able to assert a claim against the employer
under a negligent retention theory. To avoid liability under a negligent retention theory,
organizations often seek to prevent employee misconduct by monitoring their activities (Papa &
Bass, 2004).
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
55
The use of workplace email systems for harassment is a phenomenon with which many
organizations and courts are familiar. E-harassment often involves using email to send
inappropriate messages to fellow employees or other third parties, distribute pornographic or
obscene material, or otherwise humiliate or intimidate others. Failure to prevent such abusive e-
mail practices has led to employer liability, which in turn has given employers a strong incentive
to monitor employees’ use of the company email (Papa & Bass, 2004).
Organizations may also incur liability when employee misconduct results in economic
harm to third parties under a common law tort known as commercial disparagement (sometimes
also referred to as trade libel or injurious falsehood). When a party makes a false statement that
is harmful to the economic interests of another, that party may be liable for the economic harm if
(1) he intended for the falsehood to cause harm or recognized or should have recognized the
potential of the falsehood to cause harm, and (2) he knew that the statement was false or acted
“in reckless disregard of its truth or falsity” (Restatement Torts, §
62
3A).
In addition to the common law tort claim for commercial disparagement, an injured party
may also assert a claim for violation of the federal Lanham Act. Section 1125(a) of the Lanham
Act creates civil liability for the use of a “false or misleading description of fact, or false or
misleading representation of fact,” including commercial advertising that “misrepresents the
nature, characteristics, qualities, or geographic origin of his or her or another person’s goods,
services, or commercial activities” (Lanham Act, §1125(a)). Under this theory of liability, an
employer may be liable for the actions of employees who carelessly or deliberately misrepresent
either the employer’s products or services or a competitor’s products or services.
In a case involving common law and Lanham Act claims, a human resources software
provider found itself fending off a lawsuit when an anonymous individual sent a forty-three page
PowerPoint presentation denigrating a competitor’s products and services to current and
prospective customers of that competitor. The question before the court was whether a
preliminary injunction should be issued forbidding the continued use of the presentation. In
granting the plaintiff’s request for a preliminary injunction, a federal District Court in California
found that the competitor was likely to succeed on the merits of its multiple claims. Although the
defendant acknowledged that the presentation originated internally, it denied authorizing its
widespread anonymous release. Nevertheless, the defendant was exposed to liability for this act
under a variety of legal theories, including trade libel and violation of the Lanham Act
(SuccessFactors, Inc. v. Softscape, Inc., 2008). Once the court entered an injunction, the
defendant organization would face contempt sanctions if an employee disregarded the terms of
the injunction.
Business Injury from Employee Misconduct
Employers must also be on guard for employee misconduct that could result in injury to
the organization. Most organizations are well aware of the business risks presented by employees
who do not have the employer’s interests at heart. By virtue of their access to critical business
information and resources, employees have the potential to wreak havoc by misappropriating
such information or resources, by publicizing confidential information, or by leaving the
employment relationship and taking with them valuable information and resources. Whether
such employees are motivated by greed, spite, loyalty to another, or some other impetus, the
damage done to an employer’s business interests can be devastating.
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
56
Intellectual property may be one of the most valuable assets in the portfolio of an
organization. Federal copyright and patent laws protect the two forms of intellectual property
with which most businesspeople are familiar, and provide remedies where the rights of a
copyright or patent holder are infringed (Ford, White, & Willey, 2010). However, copyrights and
patents are by no means the exclusive forms of intellectual property or confidential information
that need protecting. Trade secrets consist of information, in a wide variety of forms, that carries
economic value as a result of not being generally known and which an organization seeks to
protect from becoming known (Uniform Trade Secrets Act, §1(4)). Technology has played and
will continue to play a role in the development and protection of trade secrets, but it also presents
a threat to those secrets. Trade secret information is increasingly stored in digital form, which
allows it to be easily accessed and shared. This becomes a disadvantage when the trade secret is
accessed and then shared with someone outside of the organization. The portability of electronic
devices and the popularity of cloud computing make it easy for an employee to copy trade secret
information and forward or store it in locations beyond the organization’s control. Even well-
meaning employees may inadvertently leave trade secret information unguarded on a laptop,
smartphone, or other mobile device that may be accessed by third parties. Disgruntled employees
can have an even more destructive impact by copying or forwarding trade secret information to
competitors or future employers before leaving their current employment. To combat the
potential impact of employees’ disclosure of trade secrets, monitoring the access to, use of,
modifications or other manipulations of trade secret information is but one of many protective
measures that employers take (Willey, et al., 2011).
Civil remedies for violations of the Uniform Trade Secrets Act, which has been adopted
in all but a few states, include injunctions against actual or threatened misappropriation,
monetary damages reflecting the plaintiff’s actual loss or the defendant’s unjust enrichment, and
in cases where the misappropriation of a trade secret is willful and malicious, the plaintiff may
recover double the amount of calculated damages (Uniform Trade Secrets Act §§ 2-3). However,
to prevail on a civil misappropriation of trade secrets claim, the organization must establish that
it took reasonable measures to protect the secrecy of the proprietary information that was taken.
Courts often balance the economic value of the trade secret against the costs of protecting that
secret to determine if the steps taken were reasonable. Use of automated monitoring programs to
log employee access to proprietary information may be viewed as a cost effective protective
measure (Willey, et al., 2011).
The criminal side of corporate espionage is best reflected in two federal laws that seek to
protect trade secrets by criminalizing their theft. When proprietary business information falls into
the hands of foreign interests, national security may be implicated. Accordingly, Congress has
addressed both domestic and foreign corporate espionage in a pair of laws that seek to protect
trade secrets. In what is frequently referred to as the Economic Espionage Act, federal law
forbids the misappropriation of trade secrets through any number of means, high-tech or low-
tech, if those trade secrets could benefit a foreign entity (Economic Espionage Act § 1831). The
Economic Espionage Act also contains a provision that addresses theft of trade secrets without
regard to whether there is a foreign entity involved (Economic Espionage Act § 1832). These
provisions impose criminal sanctions on anyone who violate their terms, including business
entities. The Federal Bureau of Investigation (FBI) specifically recommends that businesses
protect themselves from the theft of trade secrets by “monitor[ing] computer networks for
suspicious activities.” (FBI, para. 3, n.d.).
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
57
In addition to trade secrets, organizations routinely compile and store other types of
confidential information, such as personnel records, financial data, litigation materials, and other
sensitive data. A patchwork of federal and state laws imposes a duty on businesses in a wide
variety of industries to maintain confidentiality of certain data, and imposes sanctions on
businesses who fail to prevent improper disclosures. Anyone who has sought medical care in the
U.S. in recent months has probably received a Health Insurance Portability and Accountability
Act (“HIPAA”) statement addressing the confidentiality of patient information (42 U.S.C.
§1320d-6, (2012)). Educational institutions that receive federal funds must guard the educational
records of students under the Family Educational Rights and Privacy Act (20 U.S.C. § 1232g
(2012)). Attorneys are obligated to maintain the confidentiality of their client’s information
(Model Rules 1.6). Under the Graham-Leach-Bliley Act, financial institutions must protect the
personal information of customers (15 U.S.C. §§
68
01-6803 (2012)). These are but a few
examples of privacy laws to which organizations are subject. Given the widespread importance
of confidentiality across numerous fields, employers must implement measures to prevent
employees from disclosing sensitive information (Matwyshyn, 2005).
LEGAL RESTRICTIONS ON ELECTRONIC EMPLOYEE MONITORING
In spite of the clear need for employee monitoring to prevent harm to third parties or to
the organization itself, monitoring policies and practices have faced numerous legal challenges
from employees and government agencies responsible for regulating the workplace. These
challenges often are based on common law privacy rights, federal privacy laws, labor relations
statutes, and state laws limiting employer access to employees’ personal online accounts.
Privacy Rights of Employees
While employers face a wide range of legal liability for not monitoring employees, some
scholars argue that “…the American legal system has failed to: (1) keep up with today’s
powerful monitoring technology and (2) provide the necessary privacy protection for employees”
(Ciocchetti, 2011, p. 289). Attempts to address this failure and to protect both employer and
employee rights have been inconsistent. To the extent that employee privacy concerns are
implicated in an organization’s monitoring policy, the outcome often hinges on whether an
employee has a reasonable expectation of privacy as to the activity being monitored. This
inquiry, in turn, requires a distinction between a public employee and a private employee.
Private employees will find little in the United States Constitution to define or protect workplace
privacy. While the United States Constitution does not specifically address a right of privacy, the
courts have determined that public employees do have some protection from unreasonable
searches and seizures from governmental employers (City of Ontario v. Quon, 2010). The Fourth
Amendment puts some limits on monitoring government workers but only when the employee
has a reasonable expectation of privacy. However, the Fourth Amendment protections do not
translate to the private sector (Levinson, 2012). Even when a reasonable expectation of privacy
exists for a public employee, the employer’s actions will be deemed lawful if the reasons for the
monitoring are deemed legitimate (City of Ontario v. Quon, 2010).
State law addresses privacy disputes with a variety of privacy principles that are
generally referred to as “invasion of privacy” torts. All privacy torts require the party claiming
injury to have a reasonable expectation of privacy violated by the conduct of another. The
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
58
standard is not subjective; the expectation of privacy must be one that is considered by society to
be reasonable (Katz v. United States, 19
67
). While several torts can be categorized under the
umbrella of “invasion of privacy,” two widely recognized privacy torts are intrusion upon
seclusion and publicity of private facts. Both of these torts require the plaintiff to establish that
the privacy violation be extreme and unreasonable. Intrusion upon seclusion occurs when a
person “. . . intentionally intrudes, physically or otherwise, upon the solitude or seclusion of
another or his private affairs or concerns … if the intrusion would be highly offensive to a
reasonable person” (Restatement Torts §
65
2B). The tort of publicity of private facts involves “.
. . giving publicity to a matter concerning the private life of another . . . if the matter publicized is
of a kind that (a) would be highly offensive to a reasonable person, and (b) is not of legitimate
concern to the public” (Restatement Torts § 652E). The expectation of privacy, however, is
greatly reduced in employment settings. This is particularly true where employers provide
resources such as computers, email, phones, or internet access to facilitate employee productivity
and where employers have notified employees that activity on company-provided resources will
be monitored. Questions of unreasonableness, private affairs or offensiveness are resolved by
courts on a case-by-case basis, but the workplace is not often viewed by courts as an area where
a reasonable expectation of privacy is likely to exist.
Electronic Communications Privacy Act of 1986
The federal Electronic Communications Privacy Act of 1986 (ECPA) consists of two
titles on which lawsuits regarding employee monitoring have been based, the Wiretap Act and
the Stored Communications Act (SCA) (Electronic Communications Privacy Act). Since privacy
is the intent of the law, certain applications of the ECPA support privacy in the workplace,
especially for personal email accounts and social media postings. The problem is that the law is
complex and courts have different views on how the law should be interpreted. The ECPA
provides a civil remedy to the individual against a person or entity who intentionally intercepts
an electronic communication or who obtains unauthorized access to stored electronic
communications. While the statute appears to be on point when discussing workplace privacy,
the interpretation of the law and its exceptions are unsettled as applied to electronic monitoring
in the workplace.
The Wiretap Act prohibits interception, use and disclosure of contents of electronic
communications and an interception is defined as “the aural or other acquisition of the contents
of any wire, electronic, or oral communication through the use of any electronic, mechanical or
other device” while the communication is in transit (Electronic Communications Privacy Act, §
2510 (4)). The “interception in transit” requirement is often discussed in monitoring cases
(Global Policy Partners v. Yessin, 2010).
The second title of the ECPA, the Stored Communications Act defines “electronic
storage” as “(A) any temporary, intermediate storage of a wire or electronic communication
incidental to the electronic transmission thereof; and (B) any storage of such communication by
an electronic communication service for purposes of backup protection of such communication”
(Electronic Communications Privacy Act, § 2510(17)). Overall, court opinions generally hold
that when employer’s access and monitor stored emails on work computers, employees have no
reasonable expectation of privacy even when using an employer’s computer for personal reasons.
Use of workplace computers “…carries with it social norms that effectively diminish the
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
59
employee’s reasonable expectation of privacy with regard to his use of his employer’s computers”
(Sporer v. UAL Corp., 2009 WL 27
61
329 at *5).
ECPA is not applicable to systems for electronic communications that are “configured so
that such electronic communication is readily accessible to the general public” (Electronic
Communications Privacy Act, § 2511(2)(g)(i)). Therefore, organizations are free to monitor and
intercept communications employees make when those communications are available to the
public, regardless of whether the communication is work related or not (Abril, 2012). Some
courts have interpreted “readily accessible to the general public” as a broad exception that
provides no protection for employee privacy. Therefore, organizations that provide electronic
communications service or Internet access to employees for work-related purposes may access
all communications (Abril, 2012).
Consent, authorization and the ordinary course of business are exceptions under the
ECPA that are often raised by employers in ECPA litigation. In the employment area, consent is
the exception to the Wiretap Act that most limits employees’ rights regarding organizational
monitoring and interception of electronic communications. Courts do look at the facts of a case
to determine whether the employees knew they were being monitored and whether they
voluntarily consented to the monitoring (Levinson, 2011). In making these determinations, courts
often refer to organizational policies. Consent cases most often involve telephone rather than
email interception but the analogy is similar. Employees can authorize employers to access
stored emails under the SCA through workplace policies but that authorization generally does
not extend to personal and password protected email accounts stored on outside servers (Pure
Boot Camp v. Warrior Fitness Boot Camp, 2008). Employer monitoring of employee electronic
communications under the Wiretap Act is permitted when such monitoring is carried out in the
ordinary course of business, another exception to the ECPA. Ordinary course of business
consists of “a routine activity of the business in furtherance of a legitimate business interest”
(Arias v. Mutual Central Alarm Services, Inc., 1998, p. 416).
Employers routinely request job candidates’ usernames and passwords to access social
networking sites when considering candidates for employment (Willey, et al., 2012), but
employer monitoring of social networking sites sometimes continues even after the initial hire.
Accessing and monitoring social networking sites without employee authorization raises legal
concerns under the ECPA. What steps the account user takes to maintain privacy on a social
networking site and what posted content is meant to be private and what is meant to be public are
considerations when courts review alleged ECPA violations. Use of social networking sites as
the means to communicate among employees regarding work-related matters also muddies the
distinction between personal content and work-related content. In most states, with proper
authorization, the employer can access and monitor social networking sites, but the question of
how authorization was obtained has been raised in the courts. Moreover, the public debate over
the use of social media monitoring in the workplace has resulted in legislative prohibitions to its
use in some states and in similar pending legislation in many other states (Employer Access,
2013).
The National Labor Relations Act (NLRA)
Further complicating the balancing act between protecting an organization’s interest in
monitoring employee electronic activities and protecting employees’ rights in the workplace is
the National Labor Relations Act of 1935 (NLRA). Generally thought of as the law that protects
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
60
employees’ rights to organize, the NLRA includes provisions that apply to unionized and non-
unionized employees. Importantly, the NLRA protects the right of employees to engage in
concerted and collective activity in an effort to improve the terms and conditions of their
employment. Employees have the right to discuss terms and conditions of employment with
other co-workers and third parties and to take action to improve working conditions either
individually or with other co-workers without retaliation by employers (National Labor Relations
Act § 7). Employee conversations and expressions involving working conditions, wages, job
performance issues, and problems with supervisors, for example, are protected. Such
conversations are deemed lawful concerted activities.
The National Labor Relations Board (NLRB) is the administrative agency responsible for
implementing and enforcing the NLRA. The NLRB has dispute resolution as well as regulatory
functions (National Labor Relations Act § 3). In recent decisions, the NLRB has made it clear
that while employers may monitor employees’ electronic expressions, adverse action against
employees for protected concerted activities or policies infringing on or chilling employees’
ability to exercise their rights are unlawful. (OM 2011). Determinations as to whether employee
posts are protected by the NLRA are made by the NLRB based on whether there was concerted
activity, meaning that the employee actions are taken with or on the authority of co-workers and
not solely on the employee’s own behalf (Meyers Industries 1984).
At the outset of this discussion, it should be noted that the validity of some of the NLRB
decisions mentioned below is in question as a result of legal challenges to several of President
Obama’s appointments of NLRB members. The President is entitled to make recess
appointments of federal officers when the Senate is in recess, and the current challenges revolve
around whether the Senate was actually in recess or was technically in session when President
Obama made the appointments. The United States Supreme Court heard oral arguments on the
question of these appointments in January 2014, and a decision has not yet been announced. A
determination by the high court that the appointments were invalid could, in turn, invalidate
NLRB decisions made when there were not enough legally appointed members to constitute a
quorum (NLRB v. Noel Canning, 2013). Beyond this immediate question, NLRB policies and
practices may also be subject to court challenges. With these limitations in mind, a review of the
NLRB’s current philosophy regarding social media and employee monitoring is instructive to
employers who are developing or reviewing their social media policies.
In recent decisions, the NLRB found several employee-Facebook postings to be
concerted activity and, therefore, protected under the NLRA. In one case an employee posted
comments that her non-profit employer did not help clients sufficiently and that a co-workers’
job performance was lacking. Those postings were made in anticipation of a meeting with a
supervisor and the employee solicited responses from her co-workers regarding her complaints
thus her postings were protected (Hispanics United of Buffalo, Inc., 2012). Another case of
social media postings falling within the protection of concerted activity involved comments and
photographs derogatory of an employer event and the impact the disappointing event would have
on sales and commissions. The Facebook postings were made after employees discussed their
concerns among themselves and with a sales manager (Karl Knauz BMW, Knauz Auto Group,
2012). In addition, Facebook discussions between employees and a former employer expressing
upset and concern over the employer’s failure to withhold sufficient state taxes and its inability
to complete paperwork properly was also protected when one employee stated that the issue was
to be discussed with management at a staff meeting (OM 2011).
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
61
However, not all employee conversations or expressions meet the concerted activity
standard. Statements that are defamatory and maliciously false, disrupt business operations, or
undermine supervisory authority may not be protected although that determination is dependent
on the place where the discussion took place, its subject matter, the contents of an employee’s
outburst and whether the expression was provoked by an unfair labor practice (Atlantic Steel
1979). In a case involving a reporter who “tweeted” offensive comments that the employer found
to be unprofessional and inappropriate, the discipline imposed was lawful since the “tweets” did
not involve conversations with other employees and did not relate to the terms and conditions of
his employment. Moreover, disparaging comments made by an employee about her employers
posted on the “wall” of her senator’s Facebook page were not protected. The employee did not
discuss the issues with co-workers at any time before or after the posts were made, nor did she
raise any of the issues to management (OM 2011).
Employers who have drafted well-intentioned electronic communication policies have
found themselves attempting to persuade the NLRB, often unsuccessfully, that their policies do
not discourage protected concerted activity. To offer guidance in this often challenging area of
law, the General Counsel office of the NLRB issued an Operations Management Memo on May
30, 2012. This OM Memo reviewed several social media policies that were found to have
provisions that could be interpreted as unlawfully restricting protected collective activity. The
OM Memo concluded with an acceptable social media policy that General Counsel found to be
lawful (OM 2012).
The policies found to be flawed by General Counsel typically included language that was
considered overbroad in that it could be interpreted as discouraging protected concerted activity.
One employer’s social media policy instructed employees “[not to] release confidential guest,
team member, or company information” (OM 2012, p. 4). Although this language may seem like
a reasonable attempt to protect proprietary employer information as well as the confidentiality of
the organization’s guests and workers, General Counsel determined that it could be interpreted as
forbidding employees from discussing the terms and conditions of their employment, rendering
the policy provision unlawful.
A second policy advised employees that anything employment-related that they post must
be “completely accurate and not misleading” (OM 2012, p. 6). While this provision may be an
attempt by the employer to avoid charges of commercial disparagement or defamation, General
Counsel objected to this language because it could be interpreted to forbid discussions of the
terms and conditions of employment or criticism of the employer’s policies and practices. This
same policy also instructed employees to make certain that they did not post non-public
information on a public site. This provision, while a seemingly reasonable attempt to address the
employer’s confidentiality obligations as well as protect its proprietary information, suffered a
fatal flaw in that it specifically included information about employees’ terms and conditions of
employment in the definition of “non-public information.” Yet another flaw in this same policy
involved a prohibition on the use of the employer’s logo in employee postings, which General
Counsel determined could unlawfully prohibit employees from posting photographs of workers
engaged in protected concerted activities, such as picketing with signs containing an image of the
company’s logo. General Counsel did, however, find prohibitions on the posting of safety
performance of its products and attorney-client privileged material to be lawful, since these did
not mention employees or any potential concerted activity (OM 2012).
This same employer was also apparently concerned about the potential for workplace
harassment or discrimination claims, as it included a provision in its social media policy
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
62
instructing employees to avoid posting material that is “offensive, demeaning, abusive, or
inappropriate” (OM 2012, p. 8). Employees were also cautioned against “friending” co-workers
on outside social media sites if communication with those co-workers would be inappropriate in
the workplace. The policy concluded with a “savings clause” asserting that the policy would “be
administered in compliance with applicable laws and regulations (including Section 7 of the
National Labor Relations Act)” (OM 2012, p. 8). General Counsel determined that the
prohibition against “offensive, demeaning, abusive, or inappropriate” comments was overbroad
in that it could be interpreted to include criticisms or complaints about the terms and conditions
of employment. The failure of the employer to identify which communications with co-workers
would be inappropriate rendered the “friending” caution ambiguous and thus an unlawful
discouragement of communication among co-workers. A provision directing employees to
“report any unusual or inappropriate internal social media activity was found unlawful in that it
would likely discourage employees from engaging in protected concerted activity. The
employer’s “savings clause” was insufficient to overcome the ambiguities and overbreadth of the
objectionable policy provisions (OM 2012).
Confidentiality concerns over “personal information” that were reflected in another
employer’s social media policy were also found to be overbroad by General Counsel because
“personal information” could be interpreted to include the employees’ “terms and conditions” of
employment. A provision prohibiting employees from commenting on legal matters or disputes
was also found unlawful. Unlike a more narrow provision that forbids disclosure only of
attorney-client privileged information, a prohibition against commenting on legal matters or
disputes could be interpreted as forbidding the protected discussion of employee concerns. The
employer advised employees to adopt a professional and courteous tone in their online postings,
but General Counsel found this provision to be unlawful because it might discourage discussion
of controversial subjects, such as protected concerted activity (OM 2012). A provision
encouraging employees to address workplace concerns directly with co-workers and supervisors,
rather than airing them on social media, was also found to be unlawful, as it might discourage
employees from initiating or taking part in protected concerted activity. As with the previous
employer’s policy, a savings clause was determined to be insufficient to cure the flaws identified
by General Counsel (OM 2012).
The fourth policy reviewed by General Counsel contained an overbroad prohibition on
the posting of non-public information, which could be interpreted to include information on the
terms and conditions of employment. A prohibition on the posting of confidential or proprietary
information was ruled to be overbroad for the same reason, as was a prohibition on postings that
might harm the image or reputation of the employer. However, the employer’s prohibition on the
posting of “harassment, bullying, discrimination, or retaliation” was deemed lawful, as it could
not reasonably be interpreted as including protected concerted activity. A provision allowing
internal concerted activity and discussions about the terms and conditions of employment while
forbidding the same activity and discussions on a public forum was deemed unlawful and could
not be salvaged by a savings clause (OM 2012).
The fifth policy contained a requirement that employees report unsolicited or
inappropriate postings to a designated company official. This was deemed unlawful because
employees could interpret this provision as requiring them to report concerted action, thus
chilling such protected action. General Counsel also invalidated a provision forbidding postings
that disparage or defame the employer, as this could discourage criticisms of the employer’s
policies or practices. A provision forbidding certain postings on company time were found
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
63
unlawful because the NLRA grants workers the right to engage in concerted activity on the
employer’s premises during non-work times such as breaks (OM 2012).
In the sixth policy reviewed by General Counsel, restrictions on employee contact with
the media and with government agencies absent prior approval by or notice to the employer were
found to be unlawful limitations on concerted activity, which includes the right to communicate
with third parties concerning the terms and conditions of employment (OM 2012).
The OM Memo concluded with a seventh policy that had been revised from an earlier
version and which apparently cured flaws identified in the earlier version. It should be noted that
the policy found to be acceptable in its entirety, attached below as Appendix A, addresses social
media only and not other forms of electronic activity, and that it also references documents and
policies that are not included in the OM Memo. Nevertheless, it provides useful guidance for
organizations seeking to draft and implement a policy that does not inadvertently chill protected
employee activity. General Counsel noted with approval that the seventh policy included
examples of activity that was clearly not protected, thus clarifying and removing any potential
ambiguities. The policy carefully identifies and narrowly defines prohibited communications to
include only those that may properly be forbidden, such as disclosure of trade secrets or
communications that would constitute unlawful harassment or create a hostile work environment.
The approved policy thus strikes an appropriate balance between serving the employer’s interest
in avoiding inappropriate employee online communications and also protecting the rights of
employees to freely discuss the terms and conditions of their employment. (OM 2012; App. A).
State Restrictions on Use of Social Media to Monitor
The increasing popularity of social media in both personal and business applications has
naturally led some employers to seek access to their employees’ social media accounts, whether
private or workplace-related. It has become common for an employer to ask applicants for access
information, such as usernames and passwords, to social media accounts. Once the applicant is
employed is it also common for an employer to continue monitoring her or his social media
accounts. This clearly places applicants and employees in an uncomfortable dilemma: either
grant access to what one intended and wished to keep restricted to a narrow audience or refuse
access, which would likely be viewed negatively by an employer or potential employer. In
response to the privacy concerns of prospective and current employees, a number of states have
either passed or are considering legislation forbidding employers from even inquiring as to
whether these individuals have social media accounts as well as from requesting access to those
accounts (Employee Access, 2013). In many of the states with current or pending legislation
limiting employer access to employees’ social media accounts, there are exceptions that allow
access when necessary to investigate allegations of work-related misconduct or the disclosure of
proprietary information. Some states may also allow employers to monitor employee activity that
takes place using employer-provided resources, such as the employer’s email system or internet
server (See, e.g., Cal. Lab.Code §980).
REVISITING MONITORING POLICIES
Clearly, the legal impacts associated with the failure to monitor are considerable and
compel an organization to monitor employees to mitigate the reputational and financial
consequences of potential unlawful and wrongful conduct. On the other hand, the operation of an
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
64
organization is dependent on its employees and their perception of trust regarding the
organization for which they work. A mix of federal and state laws and court decisions, recent
NLRB decisions, and state legislative actions regarding social media and monitoring mandate
that the organization’s existing monitoring policies be reviewed and revisited.
A logical starting point would be to review the organization’s existing policies to see
whether or to what extent they address concerns about an employee’s electronic activities. Where
employee monitoring policies already exist, they may be updated or modified to reflect current
conditions or workplace needs. It may be helpful to include specific examples of what type of
employee activities are permitted and what type of employee activities are forbidden. Critical
concerns such as the importance of protecting proprietary or other confidential information
should be identified and explained to employees. Ideally, a policy should provide employees
with the contact information of a person or persons within the organization who can answer
questions or address concerns that an employee might have concerning the policy (Mann, 2011).
Employees should be made aware of the monitoring policy prior to its implementation, and
should be periodically reminded of the policy. While in most cases notice of monitoring
activities by an organization are not required by law unless applicable state law exists, consent of
the employee to the monitoring provides the broadest protection for the organization. Implied
consent such as computer screen warnings also provide consent when the employee uses the
device after the warning banner is viewed (United States v. Greiner, 2007). Organizations may
be successful in defending against invasion of privacy lawsuits when the monitoring policy
includes a form for the employee to sign acknowledging her or his awareness of the policy
and/or consenting to its provisions. Clear notice of monitoring activities and consent by the
employee reduces the employee’s expectation of privacy, the basis of privacy violation claims.
Notifying employees of the employer’s monitoring policies also serves an additional
purpose. Should a legal dispute arise regarding wrongful employee conduct and injury to others,
a monitoring policy will allow the organization to document attempts to restrict unlawful
employee conduct, potentially limiting a business’s liability exposure. (Ciocchetti, 2011). Given
this benefit, it might be tempting to establish a complete ban on use of electronic devices for
non-work-related activities. However, such a policy may not pass legal muster due the
problematic nature of enforcing such a strict policy. The lack of enforcement might prove to
hinder the organization’s efforts to protect third parties from employee misconduct and also to
protect the business’s own interests. A lack of enforcement might also send an unintended
message to employees that the organization does not seriously enforce the policy and lacks
commitment to the policy (Stengart v. Loving Care Agency, 2009). Consistent enforcement of a
monitoring policy is needed to convince employees, and courts, of the seriousness of policy
violations (Huth, 2013).
The objective of any policy is to allow the employee to conform her or his behavior to
that established within the policy. To that end, clear enforcement policies, indicating the
justifications necessitating monitoring, will help avoid the uncertainty and concern employees
experience in the monitored workplace environment and allow employees to align behaviors
with policy (Huth, 2013). Emphasizing the importance of monitoring for the organization and the
reasons supporting monitoring provide a foundation on which employees can base their
workplace conduct (Henle, Kohut & Booth, 2009).
Once developed or revised, any monitoring policy should be carefully reviewed, prior to
its implementation, by an attorney knowledgeable of both the federal laws and the law of the
states in which the business operates. An organization operating in more than one state may be
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
65
subjected to a variety of state laws concerning employee monitoring that can result in different
outcomes from one state to the next, so attention to variations in state laws is crucial.
Importantly, employee monitoring policies, like all employment policies, should be reviewed on
a regular basis to determine their effectiveness and continued legality in the ever-changing
landscape of employment law.
CONCLUSION
Employers face a wide array of legal consequences for failing to reasonably track
employee behavior and conduct that result in injuries to others. The competitive marketplace also
makes an employer wary of employees who may injure the business by exposing trade secrets or
revealing business processes to the competition. Technology has greatly expanded the means by
which employers can protect themselves and others but that technology comes at a price.
Overzealous monitoring of employees can result in claims of invasion of privacy or other legal
violations and more recently claims of violations of the NLRA or newly created state statutes.
The line between legal and illegal employee monitoring can be a fine one and it serves to place
employers in a difficult and potentially costly position. In light of new legal developments,
revisiting existing monitoring policies can serve to reduce potential violations of employees’
rights while maintaining the level of monitoring necessary to achieve organizational goals.
APPENDIX A: SAMPLE SOCIAL MEDIA POLICY APPROVED BY THE NLRB
The following example of a Social Media Policy was reprinted in its entirety (OM 2012, pp. 22-24).
Social Media Policy
Updated: May 4, 2012
At [Employer], we understand that social media can be a fun and rewarding way to share your life and
opinions with family, friends and co-workers around the world. However, use of social media also presents
certain risks and carries with it certain responsibilities. To assist you in making responsible decisions about
your use of social media, we have established these guidelines for appropriate use of social media.
This policy applies to all associates who work for [Employer], or one of its subsidiary companies in the
United States ([Employer]).
Managers and supervisors should use the supplemental Social Media Management Guidelines for
additional guidance in administering the policy.
GUIDELINES
In the rapidly expanding world of electronic communication, social media can mean many things. Social
media includes all means of communicating or posting information or content of any sort on the Internet,
including to your own or someone else’s web log or blog, journal or diary, personal web site, social
networking or affinity web site, web bulletin board or a chat room, whether or not associated or affiliated
with [Employer], as well as any other form of electronic communication.
The same principles and guidelines found in [Employer] policies and three basic beliefs apply to your
activities online. Ultimately, you are solely responsible for what you post online. Before creating online
content, consider some of the risks and rewards that are involved. Keep in mind that any of your conduct
that adversely affects your job performance, the performance of fellow associates or otherwise adversely
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
66
affects members, customers, suppliers, people who work on behalf of [Employer] or [Employer’s]
legitimate business interests may result in disciplinary action up to and including termination.
Know and follow the rules
Carefully read these guidelines, the [Employer] Statement of Ethics Policy, the [Employer] Information
Policy and the Discrimination & Harassment Prevention Policy, and ensure your postings are consistent
with these policies. Inappropriate postings that may include discriminatory remarks, harassment, and
threats of violence or similar inappropriate or unlawful conduct will not be tolerated and may subject you to
disciplinary action up to and including termination.
Be respectful
Always be fair and courteous to fellow associates, customers, members, suppliers or people who work on
behalf of [Employer]. Also, keep in mind that you are more likely to resolve work-related complaints by
speaking directly with your co-workers or by utilizing our Open Door Policy than by posting complaints to
a social media outlet. Nevertheless, if you decide to post complaints or criticism, avoid using statements,
photographs, video or audio that reasonably could be viewed as malicious, obscene, threatening or
intimidating, that disparage customers, members, associates or suppliers, or that might constitute
harassment or bullying. Examples of such conduct might include offensive posts meant to intentionally
harm someone’s reputation or posts that could contribute to a hostile work environment on the basis of
race, sex, disability, religion or any other status protected by law or company policy.
Be honest and accurate
Make sure you are always honest and accurate when posting information or news, and if you make a
mistake, correct it quickly. Be open about any previous posts you have altered. Remember that the Internet
archives almost everything; therefore, even deleted postings can be searched. Never post any information
or rumors that you know to be false about [Employer], fellow associates, members, customers, suppliers,
people working on behalf of [Employer] or competitors.
Post only appropriate and respectful content
Maintain the confidentiality of [Employer} trade secrets and private or confidential information. Trade
secrets may include information regarding the development of systems, processes, products,
know-how and technology. Do not post internal reports, policies, procedures or other internal
business-related confidential communications.
Respect financial disclosure laws. It is illegal to communicate or give a “tip” on inside information to
others so that they may buy or sell stocks or securities. Such online conduct may also violate the
Insider Trading Policy.
Do not create a link from your blog, website or other social networking site to a [Employer] website
without identifying yourself as a [Employer] associate.
Express only your personal opinions. Never represent yourself as a spokesperson for [Employer]. If
[Employer is a subject of the content you are creating, be clear and open about the fact that you are
an associate and make it clear that your views do not represent those of [Employer], fellow
associates, members, customers, suppliers or people working on behalf of [Employer]. If you do
publish a blog or post online related to the work you do or subjects associated with [Employer],
make it clear that you are not speaking on behalf of [Employer]. It is best to include a disclaimer
such as “The postings on this site are my own and do not necessarily reflect the views of
[Employer].”
Using social media at work
Refrain from using social media while on work time or on equipment we provide, unless it is work-related
as authorized by your manager or consistent with the Company Equipment Policy. Do not use [Employer]
email addresses to register on social networks, blogs or other online tools utilized for personal use.
Retaliation is prohibited
[Employer] prohibits taking negative action against any associate for reporting a possible deviation from
this policy or for cooperating in an investigation. Any associate who retaliates against another associate for
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
67
reporting a possible deviation from this policy or for cooperating in an investigation will be subject to
disciplinary action, up to and including termination.
Media contacts
Associates should not speak to the media on [Employer’s] behalf without contacting the Corporate Affairs
Department. All media inquiries should be directed to them.
For more information
If you have questions or need further guidance, please contact your HR representative.
REFERENCES
Abril, P. S., A. Levin, & A. Del Riego (2012). Blurred boundaries: Social media privacy and the twenty-first century
employee. American Business Law Journal, 49, 63-167.
American Management Association (AMA) (2000). 2000 Workplace monitoring & surveillance survey: Summary
of key findings. American Management Association. Retrieved July 19, 2012 from http://www.jinbo.net/
maybbs/pds/www/cyberight/monitr_surv
American Management Association (AMA) (2001). More companies watching employees, American Management
Association annual survey reports. American Management Association. Retrieved August 1, 2012 from
http://www.keylogger.org/articles/american-management-association-ama/more-companies-watching-
employees-american-management-association-annual-survey-reports-2.html
American Management Association (AMA) (2005). 2005 Electronic monitoring & surveillance survey. American
Management Association. Retrieved July 10, 2013 from http://www.epolicyinstitute.com/
survey2005Summary
American Management Association (AMA) (2008). 2007 Electronic monitoring & surveillance survey: Over half of
all employers combined fire workers for e-mail and internet abuse. American Management Association.
Retrieved July 12, 2012 from http://press.amanet.org/press-releases/177/2007-electronic-monitoring-
surveillance-survey/
Anonymous (2005). Many companies monitoring, recording, videotaping (and firing) employees. The Journal of the
Connecticut Business & Industry Association, 83(6). Retrieved August 30, 2012 from
http://www.cbia.com/cbianews/2005/07/200507_CompaniesMonitoring.htm
Arias v. Mutual Cent. Alarm Servs., Inc., 202 F. 3d 533 (2d Cir. 1998).
Atlantic Steel, 245 NLRB 814 (1979).
Bondi, B.J. & S.D. Lofchie (2011). The Law of Insider Trading: Legal Theories, Common Defenses, and Best
Practices for Ensuring Compliance. New York University Journal of Law & Business, 8, 151- 201.
Cal. Lab. Code §980 (Deering 2014).
Casper, C. (2011). Hype cycle for privacy, 2011. Gartner, Inc. Retrieved June 20, 2012 from
http://www.gartner.com/ id=1751128
City of Ontario v. Quon, 560 U.S. 746 (2010).
Ciocchetti , C. A. (2011). The eavesdropping employer: A twenty-first century framework for employee monitoring.
American Business Law Journal, 48, 285-359.
Economic Espionage Act, 18 U.S.C. §§1831-1839 (2012).
Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510-2712 (2012).
Employer Access to Social Media Passwords and Usernames (2013). National Conference of State Legislatures.
Retrieved March 28, 2013 from http://www.ncsl.org/issues-research/telecom/employer-access-to-social-
media-passwords-2013.aspx
Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g (2012).
Federal Bureau of Investigation (n.d.). The insider threat: An introduction to detecting and deterring an insider spy.
United States Department of Justice (no date).
Ford, J. C., B. J. White, & L. Willey (2010). Software development and intellectual property: What you don’t know
can hurt you. Issues in Information Systems, 11(1), 77-84.
Gaskell v. University of Kentucky, No. 09-244-KSF, 2010 U.S. Dist. LEXIS 124572 (E.D. Ky Nov. 23, 2010).
Global Policy Partners v. Yessin, 686 F. Supp. 2d 642 (E.D. Va. 2009).
Graham-Leach-Bliley Financial Modernization Act of 1999, 15 U.S.C. §§ 6801-6803 (2012).
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
68
Grasz, J. (2006). One-in-four hiring managers have used internet search engines to screen job candidates; one-in-ten
have used social networking sites, CareerBuilder.com survey finds. Careerbuilder.com. Retrieved April 19,
2012 from http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx? id=pr331&ed= 12%2F 31
%2F2006&sd=10%2F26%2F2006
Grasz, J. (2013). More employers finding reasons not to hire candidates on social media, finds CareerBuilder survey.
Careerbuilder.com. Retrieved September 1, 2013 from
http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?sd=6%2F26%2F2013&id=pr766&ed
=12%2F31%2F2013
Health Insurance Portability and Accountability Act, 42 U.S.C. § 1320d-6 (2011).
Henle, C. A., G. Kohut, & R. Booth (2009). Designing electronic use policies to enhance employee perceptions of
fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human
Behavior, 25(4), 902-910.
Hispanics United of Buffalo, Inc., 359 NLRB 37 (2012).
Huth, C. L. (2013). The insider threat and employee privacy: An overview of recent case law. Computer Law &
Security Review, 29(4), 368-381.
Karl Knauz BMW, Knauz Auto Group, 358 NLRB 164 (2012).
Katz v. United States, 389 U.S. 347 (1967).
Lanham Act, 15 U.S.C. § 1125(a) (2012).
Levinson, A. R. (2011). Workplace privacy and monitoring: The quest for balanced interests. Cleveland State Law
Review, 59, 377-397.
Levinson, A. R. (2012). Toward a cohesive interpretation of the electronic communications privacy act for the
electronic monitoring of employees, West Virginia Law Review, 114, 461-530.
Mann, J. (2011, May 11). Take four initial steps toward a social media policy, Gartner, Inc. Available:
www.gartner.com/id=1664315.
Mann, J. (2012, March 9). Categorize employees when creating enterprise social media policy, Gartner, Inc.
Available: http://www.gartner.com/id=1946315
Matwyshyn, A. (Fall 2005). Material Vulnerabilities: Data privacy, corporate information security, and securities
regulation. Berkeley Business Law Journal, 3, 129-203.
Memorandum OM 11-74 (2011), Office of General Counsel, National Labor Relations Board.
Memorandum OM 12-59 (2012), Office of General Counsel, National Labor Relations Board.
Meyers Industries, 268 NLRB 493 (1984).
Model Rules of Professional Conduct, American Bar Association. Available:
http://www.americanbar.org/groups/professional_responsibility/publications/model_rules_of_professional_
conduct/model_rules_of_professional_conduct_table_of_contents.html
Mujtaba, B. (2003). Ethical implications of employee monitoring: What leaders should consider. Journal of Applied
Management and Entrepreneurship, 8(3), 22-47.
National Labor Relations Act, 29 U.S.C. §§ 151-1
69
(2012).
NLRB v. Noel Canning,
70
5 F.3d 490 (D.C. 2013), cert. granted 133 S.Ct. 2861 (U.S. June 24, 2013) (No. 12-1281).
Papa, L., & S. Bass (2004). How employers can protect themselves from liability for employees’ misuse of
computer, internet, and e-mail systems in the workplace. Boston University Journal of Science and
Technology Law, 110-123.
Pure Boot Camp v. Warrior Fitness Boot Camp, 587 F. Supp. 2d 548, 555 (S.D.N.Y. 2008).
Restatement of Law (Third) of Agency, American Law Institute, (2006).
Restatement of Law (Second) of Torts, American Law Institute (1977).
Rozwell, C. (2012). Policy is not enough to inform employees about social media engagement. Gartner, Inc.
Retrieved July 3, 2012 from http://www.gartner.com/id=1916814
Schwartz, M. J. (2012). IBM launches advanced threat detection appliances. InformationWeek. Retrieved August 13,
2012 from http://www.informationweek.com/security/management/ibm-launches-advanced-threat-
detection-a/240004627
Stengart v. Loving Care Agency, 201 N. J. 300 (2009).
Sporer v. UAL Corporation, No. C 08-02835, 2009 WL 2761329 (N.D. Cal. 2009).
SuccessFactors, Inc. v. Softscape, Inc., 544 F.Supp.2d 975 (N.D. Cal. 2008).
Uniform Trade Secrets Act (1985).
United States v. Greiner, 235 Fed. Appx. 541 (9th Circuit 2007).
Walls, A. (2012a). Conduct digital surveillance ethically and legally: 2012 update. Gartner, Inc. Retrieved June 29,
2012 from http://www.gartner.com/id=1965315
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
69
Walls, A. (2012b). Security tools for control of social media usage. Gartner, Inc. Retrieved June 29, 2012 from
http://www.gartner.com/id=2085715
Willey, L., J. C. Ford, B. J. White, & D. Clapper (2011). Trade secret law and information systems: Can your
students keep a secret. Journal of Information Systems, 22(3), 271-278.
Willey L., B. J. White, T. Domagalski, & J. C. Ford (2012), Candidate screening, information systems and the law;
social media considerations, Issues in Information Systems, 13(1), 300-309.
Winton, R. (2012, August 1). L.A. City Hall employees urged to stop watching the Olympics at work. Los Angeles
Times. Retrieved August 12, 2012 from http://articles.latimes.com/2012/aug/01/local/la-me-0801-city-
olympics-20120801
Journal of Legal, Ethical and Regulatory Issues Volume 18, Number 1, 2015
70
Copyright of Journal of Legal, Ethical & Regulatory Issues is the property of Jordan Whitney
Enterprises, Inc. and its content may not be copied or emailed to multiple sites or posted to a
listserv without the copyright holder’s express written permission. However, users may print,
download, or email articles for individual use.
Week 7: Mini Lecture
Managing Change
Managers play a very important role during the change process in an organization. They must understand the changes, support employees, communicate effectively, advocate for the change, and reinforce it when it arrives. Ultimately, managers are accountable for adopting, embedding and sustaining new changes. If the leaders are not ready, willing and able to visibly reinforce the change – it will not stick.
Kotter’s 8 Step Change Model is designed as a campaign for change that managers can embrace. This is a simplistic model that is not focused on the actual change but on preparing people for and accepting change. The first three steps are all about creating a climate for change. The next steps focus on engaging and enabling the organization. And the final steps emphasize implementing and sustaining change (Normandin, 2012).
Flood & Coetsee (2013) assert that managers are usually able and competent in planning and structuring the change but less so when it comes to the people component of the change: implementing the change and building commitment towards the change. A variety of factors influence employee’s reaction to change. It is even irrational to think that there will be no negative employee reactions to change since the process of change itself involves going from the known to the unknown.
Technology continues to reshape the workplace as one the greatest areas of advancement and change. Technology in the workplace makes it possible for employees to telecommute, work from virtual offices around the world and communicate across the globe. Technology in business has increased efficiency and productivity; enhanced collaboration; improved management of organizational strategies and cost containment; and certainly, heightened the level of security in the business overall. Of the many technological changes, social media has permeated many aspects of daily life, and the workplace is no exception. According to Gonzales (2016) a recent study by a global law firm revealed that although 90% of businesses use social media for business purposes; 70% of those businesses also have created policies restricting employee’s use of social media at work.
Week 7 –
Assignment 1: Develop a Plan to Manage Change
Bottom of Form
Managing change is the process of planning, implementing and sustaining change in organizations. Individuals all have their own unique “depiction” of what change represents, and from this, they formulate their attitude and reactions to the change. Some actively resist the change, but many also use more passive resistance, which is the most difficult. It is not always obvious that the person resists change because they do nothing observable that shows their resistance the change. Change offers organization new realities that are only successful if employees accept and try to meaningfully interpret it.
Image Source:
Like the cartoon above, imagine that as a manager you are announcing an organizational change to your team. Although the team members aren’t openly expressing any feelings about the change they have various positive and negative thoughts. Now select three thoughts, at least one that could be assumed resistant or, at least, not supportive of the change displayed by different team members. Then decide the best strategies to address those team members concerns to help them get on board and support the change.
Develop a plan explaining what approaches, methodologies or tools you might use to address resistant team members. Determine which areas team members are targeting regarding their resistance to the change: the planning and implementation; the proposed change, or the individuals leading the change efforts.
Length: 1-2 pages, not including title and reference pages
Include a minimum of three (3) scholarly references, with appropriate APA formatting applied to citations and paraphrasing.
Assignment 2: Analyze SC Johnson A Family Company’s Social Media Policies
Top of Form
Bottom of Form
The saying “an ounce of prevention” is certainly worth much more than “a pound of cure” has been around for ages but it has never been more appropriate than when a company needs to manage the use of technology and social media specifically in the workplace. A good company social networking policy generally defines “social networking” and establishes clear purposes for the policy along with expected behavioral norms; provides guidance regarding use of social media associated with the organization, employees or customers; refers to proprietary and confidential information at risk; and outlines disciplinary measures for violating the social media policy. Some companies have effective social media networking policies that have been utilized as best practices across industries.
Begin this assignment by obtaining a copy of SC Johnson A Family Company’s social media policy. You can find examples using the Internet. Know that in some cases the social media policy might not be a separate policy, but is either included in an overall technology policy or the employee policy manual. (I will be comparing this information with my company’s social media guidelines)
·
Is there a clear purpose underpinning for SC Johnson’s social media policy?
· What image of social media is portrayed from the overall policy?
· What concepts of social media and employee functions are identified?
· What social media challenges are identified?
· What policy strategies have been selected to address these challenges?
·
Now, review the Social Media Guidelines from SC Johnson A Family Company organization and summarize the information you learned in a white paper for a new company ready to write their first social media policy. Be sure to include your recommendations.
Length: 1-2 pages, not including title and reference pages
Include a minimum of three (3) scholarly references, with appropriate APA formatting applied to citations and paraphrasing.
References:
TED. (2016, May). Jim Hemerling: 5 ways to lead in an era of constant change [Video file].
Week 7 Grading Rubrics
Assignment 1: Develop a Plan to Manage Change
Content (4 Points)
Points
1
Assignment includes an analysis of at least three thoughts with one that could be assumed resistant.
2
2
There is discussion on the best strategies to alleviate team member concerns to ensure they support the organizational change.
2
Organization (1 Point)
1
Organized and presented in a clear manner. Included a minimum of three (3) scholarly references, with appropriate APA formatting applied to citations and paraphrasing; 1-2 pages in length.
1
Total
5
Assignment 2: Analyze Social Media Policies
Content (7 Points)
Points
1
There is a synopsis of the meeting with a person involved in the formation, monitoring or enforcement of a social media policy using the assignment questions.
1.5
2
A comparison is made regarding of the organization’s policy and the Adidas Group Social Media Guidelines.
1.5
3
Summary of social media policy guidelines to new company presented as white paper with recommendations
2
Organization (2 Points)
1
Organized and presented in a clear manner. Included a minimum of three (3) scholarly references, with appropriate APA formatting applied to citations and paraphrasing; 2-3 pages in length.
2
Total
7
Blurred Boundaries: Social Media
Privacy and the Twenty-First-Century
Employee
Patricia Sánchez Abril,* Avner Levin,** and
Alissa Del Riego***
INTRODUCTION
In his groundbreaking book on social psychology, Erving Goffman pro-
posed that human beings control others’ impressions of them through
performances within spatially defined social establishments.1 He described
a social establishment as “any place surrounded by fixed barriers to per-
ception in which a particular kind of activity regularly takes place.”2
Through these performances, Goffman posited, individuals create and
tailor their social identities for particular audiences. He argued that each
performance’s audience must be segregated from the others for the per-
formances to succeed. That is, an individual must “ensure that those
before whom he plays one of his parts will not be the same individual
before whom he plays a different part in another setting.”3 Individuals
preserve audience segregation by following the rules of decorum of each
social situation and by filtering the information about themselves available
*Assistant Professor of Business Law, University of Miami School of Business Administration;
B.A., Duke University, 1996; J.D., Harvard Law School, 2000.
**Associate Professor and Chair, Law & Business Department, Ted Rogers School of Man-
agement, Ryerson University. I wish to thank the Cegla Center for Interdisciplinary Research
of the Law at the Buchman Faculty of Law, Tel Aviv University, where I worked on drafts of
this article as a visiting scholar during 2011.
***J.D. Candidate, 2012 Harvard Law School; B.A., University of Miami, 2009.
1ERVING GOFFMAN, THE PRESENTATION OF SELF IN EVERYDAY LIFE (1959).
2Id. at 238.
3Id. at 49.
American Business Law Journal
Volume 49, Issue 1,
63
–124, Spring 2012
© 2012 The Authors
American Business Law Journal © 2012 Academy of Legal Studies in Business
63
to each audience. When the veil of audience segregation is pierced, accord-
ing to Goffman, social disruption ensues. The disclosure of information
to unintended audiences discredits the construction of roles and
identities within the group and causes “difficult problems in impression
management.”4
The workplace is perhaps the quintessential social establishment
where performers “cooperate to present to an audience a given definition
of the situation.”5 Professionalism is the language of the traditional work-
place performance. It includes conduct and appearance that demonstrate
good judgment, a respectable stature, and the maintenance of “an air of
competency and a general grasp of the situation.”6 To that end, traditional
professionalism demands audience segregation between the employee’s
professional and private personas.
Goffman’s seminal text was written in 1959, well before the digital
revolution changed our vehicles of social interaction. Today, technology
makes the boundaries between the professional and personal more
porous. The social establishments bounded by physical space about which
Goffman wrote are no longer barriers for social performances and per-
ceptions. Personal blogs, social media profiles, Tweets, and other online
fora allow individuals to publicly express multiple facets of themselves,
including their private lives and their opinions. Employer-provided
laptops and mobile devices do not discriminate between private and pro-
fessional communications or locations. These “boundary-crossing”
technologies blur the already elusive line between the private and the
public, the home and the workplace. Private information that was pre-
viously segregated now becomes easily accessible to employers, colleagues,
recruiters, and clients, among other perhaps unintended audiences. By
its nature, digital information is infinitely transferable and hard to control.
This openness has far-reaching effects on personal privacy, reputation,
and self-expression.
Privacy law in the United States has traditionally been defined by
physical and social establishments like those described by Goffman. The
reasonable expectation of privacy analysis, which is endemic to privacy
jurisprudence, is firmly rooted in the experience of physical space and its
4Id. at 139.
5Id. at 238.
6Id. at 47.
64 Vol. 49 / American Business Law Journal
surrounding normative circumstances. The evaluation of whether privacy
expectations reasonably exist is present in nearly every assessment of
privacy under U.S. law, from torts to statutory rights. In a recent case, City
of Ontario v. Quon, the U.S. Supreme Court was charged with qualifying the
privacy expectations of an employee in a social establishment not defined
by physical boundaries: text messages.7 Officer Quon claimed a violation of
privacy when his employer searched the personal text messages he sent on
his employer-provided pager.8 The Court eschewed making what it
deemed would be premature legal conclusions regarding privacy and
technology, stating that “rapid changes in the dynamics of communication
and information transmission [are] evident not just in the technology itself
but in what society accepts as proper behavior.”9 It admitted having “dif-
ficulty predicting how employees’ privacy expectations will be shaped by
those changes or the degree to which society will be prepared to recognize
those expectations as reasonable.”10
Like the U.S. Supreme Court, other tribunals and lawmakers around
the world are having trouble conceptualizing privacy in new technologies.
In Europe, courts and legislatures alike are debating the wisdom of a
proposed “right to be forgotten,” an individual right that allows citizens to
delete unwanted information online about them.11 The Canadian
Supreme Court has echoed the U.S. Supreme Court’s reticence, opting to
“leave the privacy implications of the more evolved technology to be
decided when a comprehensive evidentiary record has been developed.”12
The shared unease among lawmakers around the world suggests that
they need more information to gauge privacy and behavioral norms for
new technologies. Without clear instruction from the law or a crystal ball,
indicators of normative views are the best way to forecast how expectations
7130 S. Ct. 2619, 2625 (2010).
8Id.
9Id. at 2629.
10Id. at 2630.
11Matt Warman, Online Right “To be Forgotten” Confirmed by EU, TELEGRAPH (Mar. 17, 2011,
12:53 PM), http://www.telegraph.co.uk/technology/Internet/8388033/Online-right-to-be-
forgotten-confirmed-by-EU.html.
12R. v. Gomboc, [2010] 3 S.C.R. 211, para. 40 (Can.); see also R. v. Tessling, [2004] 3 S.C.R. 432,
para. 55 (Can.) (“Whatever evolution occurs in future will have to be dealt with by the courts
step by step. Concerns should be addressed as they truly arise.”).
2012 / Social Media Privacy and the Twenty-First-Century Employee 65
of privacy are being shaped in new contexts and technologies. In this
article, we canvass existing domestic and international jurisprudence on
social media and related technologies in the workplace, in tandem with the
self-reported privacy expectations of the emerging workforce. We analyze
the findings of a survey conducted on two university campuses that asked
various questions of business students who were imminently entering the
workforce to ascertain their privacy expectations regarding social media in
the workplace. While legislatures and courts have waffled in characterizing
privacy expectations in social media, the rising generation of workers
already manifests certain beliefs about the technology as it plays out in work
life. Our findings suggest that Millennials13 are cognizant of their reputa-
tional vulnerability on digital media but are not willing to sacrifice Internet
participation to segregate their multiple life performances. Lacking the
technological or legal ability to shield performances, Millennials rely on
others, including employers, to refrain from judging them across contexts.
Their stated expectations of privacy, therefore, appear to be somewhat
paradoxical: employee respondents generally want privacy from unin-
tended employer eyes, and yet they share a significant amount of personal
information online, knowing it could become available to employers and
others. What is at the core of this seemingly contradictory behavior? Is it
just an adolescent “have my cake and eat it too” mentality, or does it reveal
something deeper about privacy and social performances? Should legal
doctrines and business practices acknowledge this expectation?
Informed by our empirical findings, we address these questions
and offer recommendations about the future of law and business practices
in a digital world. These recommendations strike a balance between
employees’ dignitary interests and employers’ practical realities. The ways
that law and society respond to the multiple issues presented by boundary-
crossing technologies will certainly affect the evolution of technology, the
demands of the twenty-first-century workplace, and individual
autonomy.
In Part I, we provide an overview of the extant legal landscape
with an emphasis on three general areas of employer activity related to
employees’ online activities: (1) monitoring and surveillance of employee
social media profiles, (2) evaluation of applicants’ social media pro-
files and online speech in making hiring decisions, and (3) limiting
13NEIL HOWE & WILLIAM STRAUSS, MILLENNIALS RISING: THE NEXT GREAT GENERATION 4 (2000)
(defining Millennials as those “born in or after 1982”).
66 Vol. 49 / American Business Law Journal
employees’ off-duty online activities. In Part II, we report the findings of
an empirical project assessing young employees’ expectations regarding
the role of technology, particularly social media, in the workplace.14 The
survey asked respondents about a wide range of topics related to social
media, such as the extent of personal information they post online, the
privacy-protective measures they employ on social media sites, their level
of concern regarding their privacy online, and their attitudes and expec-
tations regarding the use of social media in the workplace. Despite grant-
ing employers access to information about their private lives by
participating online, respondents expect that work life and private life
should be generally segregated—and that actions in one domain should
not affect the other. Guided by the survey findings and legal examples
from international jurisdictions, in Part III we discuss the future of
employee privacy in social media and offer workable recommendations
designed to protect employees’ desire to maintain some separation
between personal and professional contexts.
I. THE LAW ON SOCIAL MEDIA IN THE WORKPLACE
Whether it involves using employer computers to check personal e-mail
and social network profiles or sending text messages on employer-
provided communications devices, employee use of boundary-crossing
technologies in the workplace for personal purposes is prevalent.15 Social
14The findings discussed in this article are part of a larger research project we conducted
regarding the basic questions of online conduct and social media usage. The same survey was
administered to university students at Ryerson University, Canada, and the University of
Miami in Coral Gables, Florida. The Canadian portion of the project was funded by the
Privacy Commissioner of Canada’s Contributions Program and those data were reported to
the Privacy Commissioner of Canada. For the full Canadian report, see AVNER LEVIN ET AL.,
PRIVACY AND CYBER CRIME INST., THE NEXT DIGITAL DIVIDE: ONLINE SOCIAL NETWORK PRIVACY
(2008), available at http://www.ryerson.ca/tedrogersschool/privacy/Ryerson_Privacy_Institute_
OSN_Report . In 2009, some of the aggregate Canadian and American data relating to
general expectations of privacy were published in the Vanderbilt Journal of Entertainment and
Technology Law. Avner Levin & Patricia Sánchez Abril, Two Notions of Privacy Online, 11 VAND.
J. ENT. & TECH. L. 1001 (2009). This article focuses on the aggregate data particular to the
employment context. We refer to and cite the 2009 article throughout for general proposi-
tions regarding the survey and its overall findings.
15See, e.g., Corey A. Ciocchetti, Monitoring Employee E-mail: Efficient Workplaces Vs. Employee
Privacy, 2001 DUKE L. & TECH. REV. 0026 (2001), available at http://www.law.duke.edu/
2012 / Social Media Privacy and the Twenty-First-Century Employee 67
media, in particular, has permeated modern culture and the daily lives of
the incoming workforce.16 Both businesses and individuals view sites like
Facebook and Twitter as valuable marketing and communication tools.17
However, given these sites’ relative newness and the ill-defined norms
surrounding them, their use across work/life contexts raises numerous
legal, ethical, and business-related questions.
Accounts of employees discrediting themselves and their employers
via postings on social networking and media sites have become ubiquitous.
A high school teacher was dismissed after posting on her Facebook page
that she thought residents of the school district were “arrogant and
snobby” and that she was “so not looking forward to another year [at the
school].”18 A flight attendant was fired for posting suggestive pictures of
journals/dltr/articles/2001dltr0026.html (discussing employee use of personal e-mail in the
workplace); Cindy Krischer Goodman, Cellphones Raise Workplace Issues, MIAMI HERALD, Feb. 2,
2011, at B6, available at http://www.miamiherald.com/2011/02/01/2045915/cellphones-raise-
workplace-issues.html (discussing employee use of personal cell phones in the workplace);
Cindy Krischer Goodman, Social Networks Test Companies’ Boundaries, MIAMIHERALD.COM ( Jan.
19, 2011), http://www.miamiherald.com/2011/01/18/2022458/social-networks-test-companies.
html (discussing the use of online social networks in the workplace).
16Facebook, MySpace, Twitter, and LinkedIn boast a combined 1045 million worldwide users,
with Facebook accounting for seventy-two percent of that figure (despite first reaching 250
million users in just 2009). See Statistics, FACEBOOK.COM, http://www.facebook.com/press/
info.php?statistics (last visited Aug. 11, 2011); see also About Us, LINKEDIN.COM, http://
press.linkedin.com/about (last visited Aug. 11, 2011); Nicholas Carlson, Chart of the Day: How
Many Users Does Twitter Really Have? BUSINESS INSIDER (Mar. 31, 2011, 6:20 PM), http://
www.businessinsider.com/chart-of-the-day-how-many-users-does-twitter-really-have-2011-3;
Company Timeline, FACEBOOK.COM, http://www.facebook.com/press/info.php?timeline (last
visited Aug. 11, 2011).
17See Robert Ball, Social Media Marketing: What’s the Payoff for Your Business, HUFFINGTON POST
(Feb. 24, 2011, 6:00 PM), http://www.huffingtonpost.com/robert-ball/do-you-know-how-
social-me_b_826802.html (reporting a survey that found seventy percent of small businesses
use social media for marketing); David Bayer, Social Media Marketing—Using Twitter and
Facebook to Grow Your Business and Maintain Relationships, MORTGAGE NEWS DAILY (Nov. 12, 2009,
11:18 AM), http://www.mortgagenewsdaily.com/channels/community/118706.aspx (provid-
ing a primer for marketing on Facebook and Twitter and noting that “[s]ocial media mar-
keting has been on the rise for the past several years”); Josh Halliday, Twitter and Facebook
Under Scrutiny as ASA Polices Online Marketing, GUARDIAN (Mar. 1, 2011, 6:01 AM), http://
www.guardian.co.uk/media/2011/mar/01/twitter-facebook-online-marketing-asa (reporting
that the United Kingdom’s Advertising Standards Authority extended its regulatory over-
sight to include companies’ online marketing).
18H.S. Teacher Loses Job Over Facebook Posting, BOSTONCHANNEL.COM (Aug. 18, 2010, 7:06 AM),
http://www.thebostonchannel.com/r/24670937/detail.html.
68 Vol. 49 / American Business Law Journal
herself in her company uniform.19 A study reported medical students
engaged in unprofessional banter and disclosure about patients on their
social networking profiles.20 Two pizza chain employees were fired after
posting a “prank” video on YouTube that showed them preparing sand-
wiches at work while one put cheese up his nose and mucus on the food.21
Whether these well-documented anecdotes reflect ill-advised judgment of
employees or overly aggressive responses by employers, they exemplify
the tension between employer interests and employee privacy and speech
rights.
Employer intrusion into an employee’s personal life threatens the
employee’s freedom, dignity, and privacy—and may lead to discriminatory
practices. A considerable body of business research indicates that employer
invasiveness may lead to higher levels of employee stress, lower levels of
productivity, and worse employee health and morale.22 Despite docu-
mented adverse effects, employee monitoring and surveillance remain
pervasive in the business world.23 Employers have compelling business
19Complaint, Simonetti v. Delta Airlines Inc., No. 1:05-cv-2321 (N.D. Ga. Sept. 7, 2005), 2005
WL 2897844 (stayed pending Delta bankruptcy proceedings).
20Katherine C. Chretien et al., Online Posting of Unprofessional Conduct by Medical Students, 302
J. AM. MED. ASS’N 1309 (2009).
21Stephanie Clifford, Video Prank at Domino’s Taints Brand, N.Y. TIMES, Apr. 16, 2009, at B1.
22See FREDERICK S. LANE III, THE NAKED EMPLOYEE: HOW TECHNOLOGY IS COMPROMISING WORK-
PLACE PRIVACY 11–16 (2003) (describing increased workplace surveillance as “inherently
destructive of employee morale” and the Web as a “seductive” drain to employee productiv-
ity); Maureen L. Ambrose et al., Electronic Performance Monitoring: A Consideration of Rights, in
MANAGERIAL ETHICS: MORAL MANAGEMENT OF PEOPLE AND PROCESS 61, 69–72 (Marshall Schminke
ed., 1998) (discussing the fact that employer video surveillance, eavesdropping, and com-
puter monitoring generally can lead to employee stress, worsening health, and declining
productivity); Jeffrey M. Stanton, Traditional and Electronic Monitoring from an Organizational
Justice Perspective, 15 J. BUS. & PSYCHOL. 129, 130, 142–45 (2000) (discussing how employee
monitoring and its particular use in the workplace can affect whether employees feel they are
being treated fairly, which may affect job satisfaction).
23Although the terms “monitoring” and “surveillance” are used in the literature somewhat
interchangeably, we use “monitoring” to refer to the automated, computerized collection of
information. In contrast, we use “surveillance” to focus on the human review of activities or
collected data. Monitoring of electronic communication is routine in the workplace, while
surveillance is not. Surveillance is usually triggered by the employer’s suspicion of employee
misconduct. See Corey A. Ciocchetti, The Eavesdropping Employer: A Twenty-First Century Frame-
work for Employee Monitoring, 48 AM. BUS. L.J. 285, 301 (2011); Avner Levin, Big and Little
Brother: The Potential Erosion of Workplace Privacy in Canada, 22 CAN. J.L. & SOC. 197, 197–98
(2007). See generally Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477, 487–90
2012 / Social Media Privacy and the Twenty-First-Century Employee 69
reasons to surveil employees’ and applicants’ online activities. Aside from
monitoring for productivity, security, and performance, firms have a
vested interest in learning about their present and future employees’
moral constitution and personality traits that may affect on-the-job
duties.24 Failure to uncover an obvious flaw in an employee’s background
or character could lead to negligent hiring25 and negligent retention26
lawsuits or malpractice claims having serious business repercussions.27
Employers must also control employee behavior on company computers,
as legal liability may result from employee wrongdoing. In one case, an
employer faced liability for failing to act against an employee who used a
company computer to post nude photographs of his daughter.28 Finally,
employers must protect their reputational interests, intellectual property,
and trade secrets. Given the ease and low cost of widespread information
(2006) (discussing the harm resulting from those in a position of power collecting private or
personal data through the use of monitoring); AM. MGMT. ASS’N, 2007 ELECTRONIC MONITORING
& SURVEILLANCE SURVEY 4 (2008), http://www.plattgroupllc.com/jun08/2007Electronic
MonitoringSurveillanceSurvey (surveying employer monitoring practices in various areas
such as the Internet, e-mail, and computer usage).
24See Terry Morehead Dworkin, Protecting Private Employees from Enhanced Monitoring: Legis-
lative Approaches, 28 AM. BUS. L.J. 59, 75 (1990); Don Mayer, Workplace Privacy and the Fourth
Amendment: An End to Reasonable Expectations?, 29 AM. BUS. L.J. 625, 626 (1991).
25LEX K. LARSON, 1 EMPLOYMENT SCREENING § 10-2.3 (2006) (defining negligent hiring). Neg-
ligent hiring is a tort claim recognized in more than half of the states in the United States.
Timothy L. Creed, Negligent Hiring and Criminal Rehabilitation: Employing Ex-Convicts, Yet
Avoiding Liability, 20 ST. THOMAS L. REV. 183, 184 (2008). In jurisdictions where the tort exists,
an employer can be held liable for the harm its employee causes a third party if the employer
knew or should have known of the employee’s potential risk or if reasonable investigation
would have uncovered such a risk. Id. at 184–85.
26Creed, supra note 25, at 187. Negligent retention theories of liability involve an employer’s
duty to exercise reasonable care in the continued retention of an employee. The tort was the
basis of liability for employers of priests accused of pedophilia and football players accused of
crimes. See Joel Michael Ugolini, Even a Violent Game Has Its Limits: A Look at the NFL’s
Responsibility for the Behavior of Its Players, 39 U. TOL. L. REV. 41 (2007); Kelly H. Sheridan,
Note, Staying Neutral: How Washington State Courts Should Approach Negligent Supervision Claims
Against Religious Organizations, 85 WASH. L. REV. 517 (2010).
27Employers can also be held liable for the torts of their employees under the legal doctrine
of respondeat superior. See, e.g., Micah Echols, Striking a Balance Between Employer Business
Interest and Employee Privacy: Using Respondeat Superior to Justify the Monitoring of Web-Based,
Personal Electronic Mail Accounts of Employees in the Workplace, 7 COMPUTER L. REV. & TECH. J.
273, 294 (2003).
28Doe v. XYC Corp., 887 A.2d 1156 (N.J. Super. Ct. 2005).
70 Vol. 49 / American Business Law Journal
dissemination online, digital communication can be a powerful tool for
disgruntled employees seeking to harm their employers by divulging intel-
lectual assets or tarnishing their employers’ names or products.29
This part identifies three pressing legal issues regarding social media
within the employment context: (1) employer monitoring and surveillance
of employee speech in social media profiles, (2) employer evaluation of the
online speech of applicants in making hiring decisions, and (3) employer-
imposed limitations on employees’ off-duty social networking activities.
A. Monitoring and Surveillance of Employee Social Media Profiles
Most of the academic literature on the privacy of electronic communica-
tion in the workplace focuses on e-mail.30 The explosive increase in par-
ticipation on social media sites warrants an analysis of the applicability of
the current law. The Fourth Amendment, privacy torts, and statutes such
as the Electronic Communications Privacy Act of 1986 (ECPA) address
workplace privacy in this context. Their applicability to the monitoring
and surveillance of employee social media profiles and other online activi-
ties is discussed in turn below.
1. The Reasonable Expectations of Privacy Analysis
U.S. law emphasizes that the workplace and its resources are the property
of the employer. The employer is generally free to dictate permissible use
of company property as the employer sees fit. Workplace privacy is not an
employee right, but a restriction placed upon the employer’s property
rights. This restriction may arise constitutionally, legislatively, or in tort
29The American Management Association found that, of the twenty-eight percent of surveyed
employers who reported terminating an employee for e-mail misuse, twenty-two percent of
those violations involved a breach of confidentiality. See AM. MGMT. ASS’N, supra note 23, at 8–9.
30See, e.g., Bradley J. Alge, Effects of Computer Surveillance on Perceptions of Privacy and Procedural
Justice, 86 J. APPLIED PSYCHOL. 61 (2001); Ciocchetti, supra note 15; Barry A. Friedman & Lisa
J. Reed, Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee
E-mail Use, 19 EMP. RESP. & RTS. J. 75 (2007); Joan T. A. Gabel & Nancy R. Mansfield, The
Information Revolution and Its Impact on the Employment Relationship: Analysis of the Cyberspace
Workplace, 40 AM. BUS. L.J. 301 (2003); Jennifer L. Paschal et al., Effects of Electronic Mail
Policies on Invasiveness and Fairness, 24 J. MANAGERIAL PSYCHOL. 502 (2009); Janice C. Sipior &
Burke T. Ward, The Ethical and Legal Quandary of Email Privacy, 38 COMM. ACM, Dec. 1995, at
48.
2012 / Social Media Privacy and the Twenty-First-Century Employee 71
law, but in its essence it must be “reasonable” and not unduly erode the
employer’s property rights.31 Accordingly, the inquiry into whether the
employee had a reasonable expectation of privacy in the intruded space is
at the core of the law governing workplace privacy. Because the expecta-
tions lack an independent normative basis, the evaluation of the reason-
ableness of privacy expectations can be a chicken-and-egg analysis in which
normative behavior informs the law and the law, in turn, influences nor-
mative behavior. Furthermore, from a legal perspective, reasonable expec-
tations of privacy are formed in a two-step process.32 First, the claimant
must have a subjective expectation of privacy. Second, there must also be
an objective expectation of privacy that society accepts and legitimizes.
Most employee arguments for privacy are foiled in step one by such
instruments as employer communications and policies, but remain
grounded in a widespread, societal norm the legal analysis hardly ever
reaches.
For example, courts have generally held that employees do not have
a reasonable expectation of privacy in the workplace, especially if using
hardware provided by the employer33 or if the employer has communi-
31See infra notes 32–65 and accompanying discussion of reasonable expectations of privacy.
Other jurisdictions, most notably the member states of the European Union, understand
workplace privacy differently. In these jurisdictions, employees have a right to dignity and to
a private life that does not stop at the boundary of the workplace. While this right is not
absolute and must be balanced with the employer’s property rights, it does contain an
inalienable core that protects the dignity of the employee as a human being. See generally
James Q. Whitman, The Two Western Cultures of Privacy: Dignity Versus Liberty, 113 YALE L.J.
1151 (2004) (discussing these different approaches to understanding privacy).
32Katz v. United States, 389 U.S. 347, 360–61 (1967); see also Mayer, supra note 24, at 630–32.
In the context of private employers, the analysis is the same. See, e.g., Smyth v. Pillsbury Co.,
914 F. Supp. 97, 101 (E.D. Pa. 1996) (finding that there is no “reasonable expectation of
privacy in e-mail communications voluntarily made by an employee to his supervisor over the
company e-mail system”); Dir. of Office of Thrift Supervision v. Ernst & Young, 795 F. Supp.
7, 10 (D.D.C. 1992) (applying the O’Connor standard to the question of employee privacy in
diaries containing personal and company data). In O’Connor v. Ortega, 480 U.S. 709, 726
(1987), the Supreme Court held that an employee’s reasonable expectation of privacy in the
workplace should be judged under all the circumstances and must be reasonable both in
inception and scope.
33See, e.g., Bohach v. City of Reno, 932 F. Supp. 1232 (D. Nev. 1996); Smyth, 914 F. Supp. 97;
Bourke v. Nissan Motor Corp., No. B068705 (Cal. Ct. App. July 26, 1993) (unreported
decision); McLaren v. Microsoft, No. 05-97-00824-CV, 1999 Tex. App. LEXIS 4103, at *12
(Tex. App. May 28, 1999); Jay P. Kesan, Cyber-Working or Cyber-Shirking?: A First Principles
Examination of Electronic Privacy in the Workplace, 54 FLA. L. REV. 289, 303 (2002).
72 Vol. 49 / American Business Law Journal
cated to employees that they may be monitored (by written policy or
otherwise).34 The Supreme Court has also recognized that employers have
a legitimate interest in monitoring their employees, especially for reason-
able work-related reasons.35 As a result of this legal validation, employee
monitoring and surveillance has become a common practice.36
Despite the fact that organizations generally have a legal right to
access and monitor employees’ e-mail and online activities and that
employees generally accept monitoring practices, employees still cling to
certain expectations of privacy in the workplace.37 Studies show that
employees generally believe that it is illegal and unethical for employers to
intrude into certain areas of their lives.38 The manner in which reasonable
expectations of privacy are legally constructed, both for constitutional and
private law purposes, and the observable expectations of employees are
thus disconnected.39 For this reason, the debate over expectations of
privacy in the workplace endures and is apparent in privacy jurispru-
dence, specifically relating to the Fourth Amendment and the privacy
torts.
34See, e.g., Muick v. Glenayre Elec., 280 F.3d 741, 743 (7th Cir. 2002) (finding no reasonable
expectation of privacy in workplace computer files when the employer expressly reserved the
right to inspect the computer); Thygeson v. U.S. Bancorp, No. CV-03-467, 2004 WL
2066746, at *20 (D. Or. Sept. 15, 2004) (finding no reasonable expectation of privacy in
computer files and e-mail when the employee handbook explicitly warned of the employer’s
right to monitor files and e-mail); Kelleher v. City of Reading, No. Civ. A. 01-3386, 2002 WL
1067442, at *8 (E.D. Pa. May 29, 2002) (finding no reasonable expectation of privacy in
workplace e-mail when the employer’s guidelines “explicitly informed employees that there
was no such expectation of privacy”).
35O’Connor, 480 U.S. at 712.
36The American Management Association has reported that sixty-six percent of the largest
U.S. companies monitor Internet connections. The Latest on Workplace Monitoring and Surveil-
lance, AM. MGMT. ASS’N (Mar. 13, 2008), http://www.amanet.org/training/articles/The-Latest-
on-Workplace-Monitoring-and-Surveillance.aspx.
37See Jason L. Snyder, E-mail Privacy in the Workplace: A Boundary Regulation Perspective, 47 J.
BUS. COMM. 266, 268 (2010) (citing Gary Gumpert & Susan J. Drucker, The Demise of Privacy
in a Private World: From Front Porches to Chat Rooms, 8 COMM. THEORY 408 (1998)).
38See, e.g., Stanton, supra note 22, at 130 (discussing studies addressing employees’ reactions
to workplace monitoring).
39For more on the historical connection between the constitutional test as it was first set out
in Katz v. United States, 389 U.S. 347 (1967), and tort law, see Mayer, supra note 24, at 632–37;
Peter Winn, Katz and the Origins of the “Reasonable Expectation of Privacy” Test, 40 MCGEORGE L.
REV. 1 (2009).
2012 / Social Media Privacy and the Twenty-First-Century Employee 73
The Fourth Amendment—via the Fourteenth Amendment40—grants
individuals in the United States, including federal and state government
employees, the right to “be secure in their persons, houses, papers, and
effects” and protects them against “unreasonable searches and seizures.”41
Although the Fourth Amendment does not govern private-sector
employers, judicial interpretation of the reasonableness of privacy expec-
tations in the constitutional context validates new kinds of privacy interests
and serves as a guide to judges and employers in the private sector.42 As
such, Fourth Amendment analyses of privacy inform privacy tort law, an
area equally dependent upon the reasonableness of the plaintiff’s desire
for privacy.
Assessments of privacy expectations have traditionally hinged upon
territorial and context-driven factors. In O’Connor v. Ortega, the leading
Fourth Amendment employee privacy case, the U.S. Supreme Court con-
cluded that a state hospital did not violate an employee’s Fourth Amend-
ment right to privacy when it searched his office drawers and cabinets as
part of an inquiry into sexual harassment allegations against him.43 The
analysis, the Court reasoned, must first take into account whether the
employee had a reasonable expectation of privacy in the invaded space
given the “operational realities of the workplace.”44 Courts evaluating
privacy claims in light of O’Connor have held that employees maintain a
reasonable expectation of privacy in breakrooms,45 restrooms,46 and other
40Mapp v. Ohio, 367 U.S. 643, 654 (1961).
41U.S. CONST. amend. IV; see also O’Connor v. Ortega, 480 U.S. 709, 737 (1987) (stating that
“individuals do not lose Fourth Amendment rights merely because they work for the
government”).
42Kevin J. Conlon, Privacy in the Workplace, 72 CHI.-KENT L. REV. 285, 289–91 (1996); Mayer,
supra note 24, at 629.
43480 U.S. at 713.
44Id. at 717.
45State v. Bonnell, 856 P.2d 1265, 1279 (Haw. 1993) (holding that the defendants had a
reasonable expectation of privacy in their break room because access to the room was limited
to employees).
46Cf. Cramer v. Consol. Freightways, Inc., 209 F.3d 1122, 1131 (9th Cir. 2000) (holding that
an employment contract that arguably allowed video surveillance of the employee bathroom
could not supersede the mandatory provisions in state privacy laws), rev’d en banc, 255 F.3d
683 (9th Cir. 2001) (reversed in part on other grounds concerning the collective bargaining
agreement in place). On review, the en banc Ninth Circuit found that the invasion of privacy
74 Vol. 49 / American Business Law Journal
spaces normatively branded as private.47 The analysis must also consider
whether the purpose and scope of the employer’s search was reasonable.48
Searches conducted for “noninvestigatory, work-related purposes” and
“investigations of work-related misconduct” are permissible exceptions to
an employee’s right to privacy so long as they are reasonable in light of the
surrounding circumstances.49
Since O’Connor, the analysis into expectations of privacy in the work-
place has become considerably dislodged from its spatial roots. In City of
Ontario v. Quon, the Supreme Court revisited O’Connor in the context-
challenged world of digital technology.50 The case asked whether a police
officer had a reasonable expectation of privacy in the personal text mes-
sages sent and received on his employer-provided pager.51 Officer Jeff
Quon claimed his Fourth Amendment right to privacy had been violated
when his employer, the City of Ontario Police Department (OPD),
requested an administrative review of his text messages for purposes of
determining whether to upgrade its messaging plan.52 Upon review, the
OPD discovered that the preponderance of text messages sent by Quon
were of a personal nature.53 The review also revealed that Quon had sent
sexually explicit text messages to a fellow OPD employee with whom he
claims were independent of the terms of the collective bargaining agreement and not pre-
empted by the Labor Management Relations Act, 255 F.3d at 694; that any provision in the
collective bargaining agreement that purported to authorize the use of two-way mirrors was
illegal under state statute, id. at 695; and that such provision would thus be illegal and void.
id.
47See Leventhal v. Knapek, 266 F.3d 64, 74 (2d Cir. 2001) (finding an employee had a
reasonable expectation of privacy in the contents of his computer where the employee
occupied a private office with a door, had exclusive use of the computer in his office, and did
not share his computer with other employees or the public, notwithstanding the employer’s
policy prohibiting use of work equipment for personal purposes).
48O’Connor, 480 U.S. at 722–25.
49Id. at 725–26.
50130 S. Ct. 2619, 2625 (2010).
51Id. at 2632–33.
52Id. at 2626.
53Id. For example, of the 456 text messages Quon sent or received in the month of August
2002, no more than fifty-seven were work related. On an average business day, Quon sent or
received twenty-eight text messages, only about three of which were work related. Id.
2012 / Social Media Privacy and the Twenty-First-Century Employee 75
was romantically involved, and his then-wife.54 Consequently, the OPD
disciplined Quon for abuse of its policies.55
The Supreme Court held that the OPD did not violate Quon’s Fourth
Amendment right to privacy because the employer had a legitimate work-
related purpose for conducting the search. The Court declined to decide
whether Quon had a reasonable expectation of privacy in his text messages
because it determined that the search was reasonable both in scope and
purpose.56 In reference to scope, the Court gave great weight to the fact
that the OPD limited its search of Quon’s text messages to those sent and
received while he was on duty.57 As to purpose, the Court found that the
OPD’s stated purpose for the search—to determine whether the current
text-messaging service plan needed to be upgraded—was a “legitimate
work-related rationale.”58
A clear analogy can be drawn from text messaging on an employer-
provided pager or telephone to the practice of communicating through
social media sites on company computers. Both practices make use of
employer hardware and systems for the social and personal purposes of
the employee. In Quon, the Supreme Court displayed a surprising ambiva-
lence regarding privacy on boundary-crossing technologies. On the one
hand, the Court noted that the pervasiveness of the technology was sug-
gestive of its essential role “for self-expression, even self-identification,”
which it reasoned “might strengthen the case for an expectation of pri-
vacy.”59 On the other hand, the technology’s ubiquity suggested that it “is
generally affordable, so . . . employees who need cell phones or similar
devices for personal matters can purchase and pay for their own.”60 Ulti-
mately, the Court refused to elaborate on privacy expectations on an
54Id. at 2626.
55Id. at 2626–27. The officers were instructed that messages sent and received from their
issued devices would be treated as e-mails under the City’s Computer Policy, which stated that
the City “reserve[d] the right to monitor and log all network activity . . . with or without
notice.” Id. at 2625.
56Id. at 2630.
57Id. at 2631–32.
58Id. at 2632–33.
59Id. at 2630.
60Id.
76 Vol. 49 / American Business Law Journal
“emerging technology before its role in society has become clear,”61 claim-
ing that “[p]rudence counsels caution before the facts in the instant case
are used to establish far-reaching premises that define the existence, and
extent, of privacy expectations enjoyed by employees when using
employer-provided communication devices.”62
Although the Supreme Court sidestepped analyzing the reasonable-
ness of Quon’s privacy expectations, it opined in dicta that the employee’s
expectation of privacy should have been limited. A reasonable employee,
according to the Court, “would be aware that sound management prin-
ciples might require the audit of messages to determine whether the pager
was being appropriately used.”63 The Court also noted that “employer
policies concerning communications will of course shape the reasonable
expectations of their employees, especially to the extent that such policies
are clearly communicated.”64 This holding is consistent with previous
lower court rulings.65
While shedding some light on employees’ reasonable privacy expec-
tations, current Fourth Amendment jurisprudence fails to define the rea-
sonableness of those expectations as to modern technology and social
media. Some foreign courts have displayed a more direct approach. For
example, France’s Supreme Court has long been famous for its protective
stance toward employee privacy. In Société Nikon France, S.A. v. M. Onof, it
61Id. at 2629.
62Id.
63Id. at 2631.
64Id. at 2630.
65Courts customarily look at all of the circumstances surrounding the alleged consent to
company monitoring policies in assessing whether the employee has a reasonable expectation
of privacy. See Hernandez v. Hillsides, Inc., 211 P.3d 1063, 1078 (Cal. 2009) (holding that the
plaintiffs had a reasonable expectation of not being videotaped in their offices, despite
company policy indicating the employees had no reasonable expectation of privacy in their
communications, because such policy never alluded to the possibility of video recording);
Bourke v. Nissan Motor Corp., No. YC-003979 (Cal. Ct. App. July 26, 1993) (unreported
decision), available at http://www.loundy.com/CASES/Bourke_v_Nissan.html (last visited Oct.
9, 2011) (holding that employees forfeit reasonable expectations of privacy on work com-
puters by agreeing to the employer’s policies providing that use of its computers was for
business purposes only); Smyth v. Pillsbury Co., 914 F. Supp. 97, 101 (E.D. Pa. 1996) (holding
that, despite an employer’s failure to notify its employee that his communications were
being monitored, the employer’s “interest in preventing inappropriate and unprofessional
comments or even illegal activity over its e-mail system outweigh[ed] any privacy interest
the employee may have [had]”).
2012 / Social Media Privacy and the Twenty-First-Century Employee 77
held that employees have a robust right to privacy in their communications
on work computers.66 In that case, an employer was prohibited from
terminating an employee based on evidence obtained from e-mails written
by the employee on a work computer while at work.67 Recently, in another
case, La Société Seit Hydr’Eau v. M. J-M, the labor chamber of France’s
highest court found that employees had an expectation of privacy in
electronic folders that had been marked “personal” on work computers.68
It construed the expectation narrowly to conclude that an electronic folder
marked with the employee’s initials was not private.69
In Canada, courts have been walking a middle ground between the
United States and the European Union (EU).70 In R. v. Cole, a high school
teacher was accused of storing nude images of a sixteen-year-old student
on the laptop that the school board provided to him. He argued that he
had a reasonable expectation of privacy in the laptop.71 Cole was criminally
prosecuted after a board technician discovered the offending images and
other pornographic images on the laptop during a routine service of the
school’s information network.72 Cole argued that the board and the police
searched the laptop in violation of his rights under Section 8 of the
Canadian Charter of Rights and Freedoms.73 The Canadian court con-
cluded the teacher had a subjective expectation of privacy in the laptop,
66Cour de Cassation [Cass.] [supreme court for judicial matters] soc., Oct. 2, 2001, No. 4164
(Fr.), available at http://www.courdecassation.fr/jurisprudena_2/chamber_sociale_576/arret_
no_1159.html.
67Id.
68Cour de Cassation [Cass.] [supreme court for judicial matters] soc., Oct. 21, 2009, No. 2044
(Fr.), available at http://www.courdecassation.fr/publications_cour_26/arrets_publies_2986/
chambre_sociale_3168/2009_3332/octobre_2009_3246/2044_21_13949.html.
69Id.
70See Avner Levin & Mary Jo Nicholson, Privacy Law in the United States, the EU and Canada: The
Allure of the Middle Ground, 2 U. OTTAWA L. & TECH. J. 357 (2005) (describing Canada’s
middle-ground position on privacy matters).
71[2011] 105 O.R. 3d 253 (Can. Ont. C.A.), available at http://www.ontariocourts.on.ca/
decisions/2011/2011ONCA0218.htm.
72Id. at para. 12.
73Id. at para. 3. Section 8 is roughly equivalent to the Fourth Amendment, stating, “Everyone
has the right to be secure against unreasonable search or seizure.” Canadian Charter
of Rights and Freedoms, Part I of the Constitution Act § 8, 1982, available at http://
laws.justice.gc.ca/eng/charter/page-1.html.
78 Vol. 49 / American Business Law Journal
and absent a clear privacy policy or acceptable use policy or both, this
expectation was reasonable. In particular, the court stated that
based upon the totality of the circumstances in this case . . . the appellant had
a reasonable expectation of privacy in the personal use of his work laptop. . . .
The teachers used their computers for personal use, they employed passwords
to exclude others from their laptops, and they stored personal information on
their hard drives. There was no clear and unambiguous policy to monitor,
search or police the teachers’ use of their laptops.74
The Canadian court, however, found that Cole “knew that a school
technician had a limited right of access to the hard drive as part of his
duties to maintain the stability and security of the network system,”75 and
so concluded that Cole’s reasonable expectation of privacy did not apply to
the actions of the technician.76 Accordingly, once the technician had
stumbled upon the images, the technician’s and school board’s actions did
not violate the Canadian Charter.77
Cole is notable for linking expectation of privacy to organizational
norms and highlighting the important role that policies play in setting
privacy expectations. Other Canadian cases have held that policies in
collective bargaining agreements may also inform expectations of privacy
in personal data.78
These cases indicate the Canadian and American courts’ reluctance
to recognize a strong workplace privacy right and their willingness to defer
to employer policies and agreements as setting reasonable workplace and
e-mail privacy expectations. At the same time, it is clear from these
holdings that workplace policies are not entirely responsible for setting
expectations of privacy. The French court’s Seit Hydr’Eau decision demon-
strates that it is possible to protect employer interests notwithstanding
strong workplace privacy rights.79 The Canadian and American courts’
74Cole, 105 O.R. 3d 253, para. 45.
75Id. at para. 47.
76Id. at para. 48.
77Id. at paras. 63, 66.
78See, e.g., France v. Tfaily, [2009] 98 O.R. 3d 161 (Can. Ont. C.A.) (finding that a collective
bargaining agreement between a university and a faculty association granted a professor an
objectively reasonable expectation of privacy in relation to his personal electronic data on
university computers).
79See supra notes 68–69 and accompanying text.
2012 / Social Media Privacy and the Twenty-First-Century Employee 79
unwillingness to render broader holdings has left employees and employ-
ers without a clear answer about which surveillance and monitoring prac-
tices violate an employee’s reasonable expectation of privacy.80
2. The ECPA
The ECPA protects the private transmission and storage of electronic
data.81 Title I of the ECPA, known as the Wiretap Act, prohibits the
interception, use, or disclosure of any electronic communication while in
transit.82 The significant exceptions to the Wiretap Act limit its applicability
to employer monitoring and surveillance of employee social networking
activities. First, the Wiretap Act does not apply to communications made
through an electronic communication system that is readily accessible to
the general public.83 It appears, then, that if an employee makes her digital
information accessible to the general public, her employer is not pro-
hibited from monitoring, viewing, or intercepting such communication.
This is true whether or not she was at work when the communication was
made. Second, the Wiretap Act provides an exception for providers of the
communication service who intercept, use, or disclose the communication
in the ordinary course of business and when engaged in an activity inciden-
tal to the provision of such communication service.84 As such, organizations
providing mobile telecommunications service or Internet access to their
employees for work-related purposes may access all employee communi-
cation transmitted thereby. Third, the Wiretap Act permits interception of
a communication when one of the parties to the communication expressly
or impliedly consents to it.85 Individuals often expressly consent by accept-
ing a written electronic communications policy or contract clause and
80It also has been argued that, with every U.S. Supreme Court case defining the reasonable-
ness of an individual’s expectation of privacy under the Fourth Amendment, the Court has
become more vague and continued to narrow its holding in Katz v. United States, 389 U.S. 347
(1967). See Mayer, supra note 24, at 656–58.
81Pub. L. No. 99–508, Title I, 100 Stat. 1851, 1859 (codified at 18 U.S.C. §§ 2510–22 (2006));
Title II, 100 Stat. 1860 (codified at 18 U.S.C. §§ 2701–11 (2006)); Title III, 100 Stat. 1868
(codified at 18 U.S.C. §§ 3121–27 (2006)).
8218 U.S.C. § 2511(1).
83Id. § 2511(2)(g)(i).
84Id. § 2511(2)(a)(i).
85Id. § 2511(2)(c) & (d).
80 Vol. 49 / American Business Law Journal
acknowledgment of monitoring by way of a login prompt or corporate
policy are common ways of obtaining express consent. Courts infer
consent from the conduct of workers who continue employment after
having been notified that their communications are subject to surveillance
and monitoring.86 Finally, employees seem to have a claim under the
Wiretap Act only if their communications are intercepted while in transit,
rather than in storage.87
Title II of the ECPA, known as the Stored Communications Act
(SCA), may offer more redress for the employee whose personal online
information is accessed by an employer in an unsanctioned manner. The
SCA forbids the intentional and unauthorized access of stored communi-
cations.88 The SCA provides broader exceptions than the Wiretap Act
because it excludes from liability those who have been authorized access by
the entity providing the electronic communication service, a user of that
service who is the intended recipient of the communication, or the author
of the communication.89
Recently, courts have interpreted the meaning of “authorized access”
to social media profiles in light of the employment relationship. In Pietrylo
v. Hillstone Restaurant Group, two restaurant employees were terminated
after their manager discovered their password-protected MySpace group,
which contained personal information, also referenced illegal drug use,
violence, and sexual remarks about the restaurant’s management and
customers.90 Employee Brian Pietrylo had created the private online
86See Matthew Finkin, Information Technology and Workplace Privacy: The United States Law, 23
COMP. LAB. L. & POL’Y J. 471 (2002) (discussing the ECPA and U.S. workplace privacy in
general); Sylvia Kierkegaard, Privacy in Electronic Communication Watch Your E-mail: Your Boss Is
Snooping, 21 COMPUTER L. & SEC. REP. 226 (2005).
87See Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107, 114 (3d Cir. 2003) (holding that an
employer accessing an employee’s e-mail did not violate the Wiretap Act because the com-
munication was in storage rather than in transit); Konop v. Hawaiian Airlines, Inc., 302 F.3d
868, 878 (9th Cir. 2002) (holding that an employer that accessed its employee’s personal,
password-protected Web site did not violate the Wiretap Act because the electronic commu-
nication was accessed when in storage, rather than when in transmission).
8818 U.S.C. § 2701(a).
89Id. § 2701(c).
90No. 06-5754-FSH, 2008 WL 6085437, at *1-2 (D.N.J. July 25, 2008); see also Dionne Searcey,
Employers Watching Workers Online Spurs Privacy Debate, WALL ST. J., Apr. 23, 2009, at A13.
2012 / Social Media Privacy and the Twenty-First-Century Employee 81
forum to vent about work-related topics.91 One of the online group
members, a hostess at the restaurant, showed the site to a restaurant
manager.92 Another restaurant manager later requested the hostess
divulge her MySpace login information and password to management so it
could access Pietrylo’s private group and review the postings.93 The hostess
testified that she gave the password to the manager for fear of retaliation.94
Based on the content of the online postings, management terminated
Pietrylo and another employee.95 The employees filed suit, claiming the
employer violated the SCA, wrongfully terminated them in violation of a
clear mandate of public policy, and invaded their privacy.96 The jury found
that, because the employee who provided access to the private online
forum did not act voluntarily, employer Hillstone had “knowingly or
intentionally or purposefully accessed the [private MySpace group] . . .
without authorization,”97 in violation of the SCA, and awarded the plaintiff
employees compensatory and punitive damages.98 Regarding the privacy
claim, the jury found that, even though Pietrylo created the private
MySpace group as “a place of solitude and seclusion which was designed to
protect the Plaintiff’s private affairs and concerns,”99 he did not have a
reasonable expectation of privacy in the postings made on the group.100
91Pietrylo, 2008 WL 6085437, at *1.
92Id.
93Id.
94Id. at *4.
95Id. at *2.
96Id.
97Pietrylo v. Hillstone Rest. Grp., No. 06-5754 (FSH), 2009 WL 3128420, at *1 (D.N.J. Sept.
25, 2009).
98Id.
99Verdict and Settlement Agreement, Pietrylo v. Hillstone Rest. Grp., No. 2:06-cv-05754-
FSH-PS (D.N.J. June 26, 2009) 2009 WL 2342553.
100Id. Pietrylo is consistent with the manner in which expectations of privacy on social networks
have been analyzed in Canada. For example, in a recent labor arbitration decision on the
dismissal of a unionized employee of a car dealer, the arbitrator found that the employee had
no reasonable expectation of privacy in his Facebook postings because he had one hundred
Facebook friends. Lougheed Imports, Ltd. v. United Food & Commercial Workers Int’l
Union, Local 1518, [2010] CanLII 62482, para. 97 (Can. B.C.L.R.B.), available at http://www.
canlii.org/en/bc/bclrb/doc/2010/2010canlii62482/2010canlii62482.html. Similar to Pietrylo, the
82 Vol. 49 / American Business Law Journal
Pietrylo stands for the proposition that an employer cannot lawfully obtain
access to stored information on an employee’s social media profile by
coercion. It remains clear that employers are free to access such informa-
tion and to act upon it,101 if granted access to the online forum voluntarily
or if the online information is readily accessible to the public at large.
The court’s application of the SCA in Pietrylo is consistent with pre-
vious cases in which employers surreptitiously accessed the personal e-mail
accounts of their employees. In Pure Power Boot Camp v. Warrior Fitness Boot
Camp, a New York district court found that an employer’s unauthorized
access to a former employee’s personal Internet-based e-mail accounts was
a violation of the SCA, despite the existence of a company policy, which
stated that “e-mail users have no right of personal privacy in any matter
stored in, created on, received from, or sent through or over the sys-
tem.”102 Former employee Alexander Fell admitted he accessed his per-
sonal Gmail and Hotmail accounts on his work computer, but denied
drafting or receiving e-mails at work.103 Fell’s employer reportedly
obtained access to Fell’s personal Internet e-mail accounts because some of
the usernames and passwords to those accounts were stored on the
company computer. The employer gained access to another one of Fell’s
personal Internet e-mail accounts by correctly guessing that the password
was the same as the one used in his other two e-mail accounts.104 While the
court predictably found that the Wiretap Act did not apply because com-
munications were not in transit,105 it determined that the employer vio-
lated the SCA because the employee’s personal Internet e-mails,
administered through Google and Microsoft, were not stored on the
company system, per the company policy’s narrow scope.106
employer did not have direct access to the employee’s Facebook page, but was granted access
by an ex-employee. Id. at para. 22.
101See infra notes 152–62 and accompanying text (discussing whether employees’ off-duty
online speech is concerted activity under Section 7 of the National Labor Relations Act).
102587 F. Supp. 2d 548, 552 (S.D.N.Y. 2008).
103Id. at 553.
104Id. at 556.
105Id. at 557–58.
106Id. at 559.
2012 / Social Media Privacy and the Twenty-First-Century Employee 83
The employer had also argued that the one-sentence company e-mail
policy, advising employees that they had no right of personal privacy,107
eviscerated any reasonable expectation of privacy that Fell might claim in
his personal e-mail accounts and that leaving a username and password
accessibly recorded on an employer-provided computer constituted
implied consent to employer access to personal e-mail accounts.108 The
court concluded that this argument had “no support in the law” and
proceeded to determine that the employee did indeed have a reasonable
expectation of privacy in the passwords and usernames stored on company
computers.109 It analogized the situation to an employee leaving his house
key on his work desk, reasoning that under no circumstance would the law
interpret a mislaid house key as “consent to whoever found the key, to use
it to enter his house and rummage through his belongings.”110 The court
refused to accept that “carelessness equals consent” in the realm of pri-
vacy.111 The court further found that spotty enforcement of the company
e-mail policy reinforced the employee’s reasonable expectation of privacy
in his personal e-mail accounts while at work.112
With only a minor stretch of the imagination, Pure Power Boot Camp
suggests that employees who access their Facebook profiles on the job and
store their online social network (OSN) usernames and passwords on
workplace computers may be protected by the SCA from unauthorized
employer intrusion into their Internet profiles and accounts. The decision
is also a warning for employers. Employee Internet and social media use
policies must be explicit about what information is accessible to the
employer and where it is located. The existence of an explicit policy is not
always dispositive to a finding of a reasonable expectation of employee
privacy.
While the SCA was not drafted with the intention of securing
employee e-mail and Internet privacy, it seems to be in the process of
107Id. at 553.
108Id. at 559.
109Id.
110Id. at 561.
111Id.
112Id. The policy was not enforced in a consistent manner “that would have alerted employees
to the possibility that their private email accounts, such as Hotmail, could also be accessed and
viewed by their employer.” Id.
84 Vol. 49 / American Business Law Journal
experiencing a resurgence for that purpose. This is consistent with devel-
oping approaches to employee Internet privacy internationally. As men-
tioned above, the French Supreme Court has held that employers cannot
access employee communications that are clearly marked as “personal”
without employee permission.113
In Israel, a recent National Labor Court decision similarly restricted
employer access to employee e-mail and offered an innovative analysis
based on the character of the e-mail account, not its owner, label, or
location.114 The scenario was a familiar one—the employer wished to use
an employee’s e-mails as evidence to support a termination decision, and
the employee argued that the e-mails were private.115 After reminding
employers of the need to have clearly communicated policies as a precon-
dition for any employer action, the Israeli Labor Court drew a distinction
between private Internet-based e-mail accounts, which employees may
access at work, and certain types of employer-provided e-mail accounts.116
The court prohibited employers from accessing private Internet-based
e-mail accounts without a court order, even if such accounts were accessed
by the employee at work using employer-provided infrastructure.117 It
then distinguished among three types of workplace or employer-provided
e-mail accounts: (1) those used exclusively for work-related purposes, (2)
those used exclusively for personal purposes, and (3) those used by the
employee for both work-related and personal purposes.118 According to
the court, employers may regularly monitor “exclusively-work-related”
accounts, but may not access the content of personal e-mails sent from such
accounts unless the employee freely consents.119 This rule applies even if
113See supra notes 68–69 and accompanying text.
114File No. 90/08 National Labor Court, Tali Isakov Inbar v. Commissioner for Women Labor
(Feb. 8, 2011), available at http://elyon1.court.gov.il/heb/dover/3082302 [in Hebrew]. For
a case note in English, see Dan Or-Hof, Israel—Monitoring Employees Email Severely Restricted,
PEARL COHEN ZEDEK LATZER (Feb. 10, 2011), http://www.pczlaw.com/news/2011/02/10/israel—
monitoring-employees-email-severely-restricted.
115Tali Isakov Inbar, at para. 3.
116Id. at para. 2.
117The Israeli court explicitly stated that employee consent would be insufficient. Id. at para.
49.
118Id. at para. 2.
119Id. at para. 39.
2012 / Social Media Privacy and the Twenty-First-Century Employee 85
the employee sends personal e-mails on work accounts in violation of
corporate policies. Personal workplace accounts and dual-purpose work-
place accounts are subject to further restrictions: employers must have an
independent valid business reason for monitoring or accessing them, they
must first resort to less-invasive methods, and they must obtain the
employee’s freely given consent.120 While the Israeli decision offers
employees strong protection, it is a default position. Employers are not
obligated to offer employees personal e-mail accounts, and employers and
employees may enter into collective agreements to regulate workplace
privacy and the use of technology at work, which would supplant the
Israeli Labor Court’s default position.121
B. Employer Evaluation of Online Speech and Virtual Identity of Applicants
Organizations are increasingly monitoring social media for information
that may provide insight on prospective hires.122 One study recently found
that forty-five percent of surveyed employers researched job candidates
using online social networking sites.123 More than a third of employers in
that survey also reported having found publicly available content on appli-
cants’ social media profiles that caused them not to hire the applicants.124
Objectionable content included inappropriate photographs or informa-
tion, evidence of alcohol or drug use, and information revealing that the
120Id. at para. 41.
121Id. at para. 5. Employment in Israel is governed by collective agreements to a greater
extent than in the United States because legislation enables the Ministry of Labor to apply
such agreements to nonunionized workplaces as well. See Collective Agreements Law, 5717–
1957 §§ 25-33G (Isr.), available at http://www.tamas.gov.il/NR/rdonlyres/DF31497A-297C-
431A-8C63-7DB7CD653C1F/0/3 .
122See Diane Coutu, We Googled You, HARV. BUS. REV., June 2007, at 37, 44 (providing
comments by chairman and chief executive officer of Manpower, an employment company,
about the pervasiveness of the employee online screening practice); Brian Elzweig & Donna
K. Peoples, Using Social Networking Web Sites in Hiring and Retention Decisions, SAM ADVANCED
MGMT. J., Autumn 2009, at 27, 28.
123Career Experts Provide Advice on Dos and Don’ts for Job Seekers on Social Networking, CAREER-
BUILDERS.COM (Aug. 19, 2009), http://www.careerbuilder.com/share/aboutus/pressreleases
detail.aspx?id=pr519&sd=8/19/2009&ed=12/31/2009&siteid=cbpr&sc_cmp1=cb_pr519_&cb
RecursionCnt=2&cbsid=c6bd4651f8e845f187ba45c9c3152747-316799338-RK-4.
124Id.
86 Vol. 49 / American Business Law Journal
applicant had lied on the job application.125 More information about can-
didates is desirable when that information is bona fide. The danger of
“social media background checks” is that personal information presented
out of context or inaccurately may lead employers to judge candidates
unfairly without their knowledge or without providing an opportunity for
rebuttal. Worse yet, the surreptitious quality of the information search may
be a backdoor to illegal discrimination. This unregulated yet widespread
practice has received some scholarly attention.126
There are two main legal issues surrounding social media back-
ground checks: the propriety of employer access to the candidate’s online
information and the permissibility of basing hiring decisions on the dis-
covered digital information. Of course, employers are permitted to
research candidates’ lives and reputations as documented in their publicly
available, non-password-protected social media profiles. However, access-
ing a candidate’s password-protected social media profile in an unautho-
rized manner (such as surreptitiously or by coercion) violates the SCA.127
These practices could also violate the social network site’s terms of ser-
vice.128 Both Facebook’s and MySpace’s terms of service prohibit using
their networks for commercial purposes or gains without users’ consent.129
A company’s use of a social network to research its prospective hires may
be characterized as a commercial use of the network.130 Social media sites
also generally prohibit accessing a member’s account for the purpose of
125Id. (revealing that fifty-three percent of the employers that reported having found content
that caused them not to hire candidates said they found candidates had posted inappropriate
photographs or information, forty-four percent found evidence of candidates drinking
or using drugs, and twenty-four percent discovered that applicants had lied about their
qualifications).
126See, e.g., Alexander Wohl, After Forty Years of Tinkering With Teachers’ First Amendment Rights,
Time for a New Beginning, 58 AM. U.L. REV. 1285, 1316–17 (2009); Carly Brandenburg, Note,
The Newest Way to Screen Job Applicants: A Social Networker’s Nightmare, 60 FED. COMM. L.J. 597
(2008); Ian Byrnside, Note, Six Clicks of Separation: The Legal Ramifications of Employers Using
Social Networking Sites to Research Applicants, 10 VAND. J. ENT. & TECH. L. 445 (2008).
127See supra notes 90–101 and accompanying text.
128Brandenburg, supra note 126, at 612–13.
129MySpace.com Terms of Use Agreement, MYSPACE.COM, http://www.myspace.com/index.cfm?
fuseaction=misc.terms (last visited Aug. 14, 2011); Statement of Rights and Responsibilities,
FACEBOOK.COM, http://www.facebook.com/terms.php?ref=pf (last visited Aug. 14, 2011).
130Brandenburg, supra note 126, at 613.
2012 / Social Media Privacy and the Twenty-First-Century Employee 87
obtaining information regarding another member or circumventing
privacy settings.131 However, no regulation forces employers to disclose
their information-gathering practices on social networking sites.132 In
analogous contexts, the law suggests that regulating background checks of
social media by prospective employers may be warranted. For example,
the Fair Credit Reporting Act allows prospective employers to obtain a
candidate’s consumer report from consumer reporting agencies provided
they inform the candidate in writing of the request and obtain the candi-
date’s written authorization.133
Employers are currently free to judge candidates on the basis of all
available information, unless prohibited or restricted by law. A candidate’s
recklessness, bad reputation, and unsound moral character are obviously
justifiable reasons for denial of employment. Employers may not, however,
discriminate on other bases. Title VII of the Civil Rights Act of 1964 (Title
VII) covers most private employers with fifteen or more employees and
prohibits discrimination in the workplace “with respect to . . . compensa-
tion, terms, conditions, or privileges of employment, because of [an] indi-
vidual’s race, color, religion, sex, or national origin.”134 Various state
statutes have broadened the scope of hiring and employment discrimina-
tion. New York, for example, bars employers from basing employment
decisions on a candidate’s legal recreational activities, political activities,
union membership, and consumption of legal products provided that the
candidate’s behavior does not conflict with the employer’s genuine busi-
ness interest.135 By covertly obtaining personal candidate information to
131MySpace.com Terms of Use Agreement, MYSPACE.COM, supra note 129; Statement of Rights and
Responsibilities, FACEBOOK.COM, supra note 129.
132See generally Donald Carrington Davis, MySpace Isn’t Your Space: Expanding the Fair Credit
Reporting Act to Ensure Accountability and Fairness in Employer Searches of Online Social Networking
Services, 16 KAN. J.L. & PUB. POL’Y 237 (2007) (discussing the general lack of regulation
requiring employers to disclose the source or process by which they obtained information on
job candidates, which in turn makes them more likely to engage in surreptitious practices).
13315 U.S.C. §§ 1681a–b (2010).
13442 U.S.C. § 2000e-2(a)(1) (2006). While restrictive of some speech, Title VII has been
considered compatible with the First Amendment as it protects the individual’s autonomy of
consciousness promoted through the First Amendment. See O. Lee Reed, A Free Speech
Metavalue for the Next Millennium: Autonomy of Consciousness in First Amendment Theory and
Practice, 35 AM. BUS. L.J. 1, 36–38 (1997).
135N.Y. LAB. LAW § 201-d (Consol. 2011).
88 Vol. 49 / American Business Law Journal
which they would not otherwise be privy, employers may be more likely to
discriminate illegally and less likely to get caught.
C. Employer-Imposed Limitations on Employee Private Life
Conventional wisdom dictates that an employee is a representative of his
or her organization in all areas of life.136 This is especially true when an
employee uses a company logo, wears a company uniform, or purports to
speak for or about the company as an insider. In extreme cases, employers
have dismissed employees whose extracurricular activities could have a
negative impact on their organizations’ reputations.137 Some companies
have contended that employees’ aberrant, off-duty behavior can even
affect the bottom line.138 For these reasons, private employers have often
sought to control the risks of off-duty employee conduct by way of specific
contractual clauses such as morality clauses, confidentiality agreements,
and off-duty codes of conduct.139
136Patricia Sánchez Abril & Ann M. Olazábal, The Celebrity CEO: Corporate Disclosure at the
Intersection of Privacy and Securities Law, 46 HOUS. L. REV. 1545, 1575–76 (2010). As some have
noted, “as employees move up the organizational hierarchy, so does the expectation of
conformity with organizational expectations in one’s private life.” Rafael Gely & Leonard
Bierman, Workplace Blogs and Workers’ Privacy, 66 LA. L. REV. 1079, 1107 (2006).
137See LEVIN ET AL., supra note 14, at 68; Terry Morehead Dworkin, It’s My Life—Leave Me
Alone: Off-the-Job Employee Associational Privacy Rights, 35 AM. BUS. L.J. 47, 47–49 (1997)
(providing examples of companies in the past that made employment decisions based on the
employee’s personal life, if they found aspects of the employee’s personal life to conflict with
the image the company wanted to portray to the public).
138In one case, a low-level supermarket employee was terminated when his supervisors
learned he enjoyed dressing like a woman in private. Oiler v. Winn-Dixie La., Inc., No.
00-3114, 2002 U.S. Dist. LEXIS 17417, at *4–9 (E.D. La. Sept. 16, 2002). Company repre-
sentatives maintained, in their defense, that the employee’s aberrant behavior would cer-
tainly drive away customers in their small town. Id. at *9–10.
139See Brian Van Wyk, Note, We’re Friends, Right? Client List Misappropriation and Online Social
Networking in the Workplace, 11 VAND. J. ENT. & TECH. L. 743, 754–55 (2009) (discussing the
employment of a confidentiality and noncompetition agreement to prevent client misappro-
priation). See generally Terry Morehead Dworkin & Elletta Sangrey Callahan, Buying Silence,
36 AM. BUS. L.J. 151 (1998) (discussing the use of employee secrecy agreements in various
contexts); Marka B. Fleming et al., Morals Clauses for Educators in Secondary and Post-Secondary
Schools: Legal Applications and Constitutional Concerns, 2009 BYU EDUC. & L.J. 67 (2009)
(discussing the inclusion of morals clauses in teachers’ employment agreements); Fernando
M. Pinguelo & Timothy D. Cedrone, Morals? Who Cares About Morals? An Examination of Morals
Clauses in Talent Contracts and What Talent Needs to Know, 19 SETON HALL J. SPORTS & ENT. L. 347
2012 / Social Media Privacy and the Twenty-First-Century Employee 89
The growing use of interactive social media significantly compli-
cates this already elusive line between the private individual and the
company representative. A more public digital existence can threaten the
privacy of both employees and their employers. An amalgamation of all
of the elements and characters in a person’s life, social media profiles
allow for unprecedented transparency of an employee’s private dealings,
which can then be associated with his organization with minimal infer-
ence. A disgruntled employee can easily divulge trade secrets, intellectual
property, or confidential information—or can harm the organization’s
reputation with disparaging commentary. Even a well-intentioned but
reckless employee can tarnish an organization by disseminating
potential evidence of the organization’s negligence, immorality, or
incompetence.
Some organizations have restricted their employees’ off-duty use of
social networking sites or have prohibited using them altogether. For
example, the National Football League has prohibited players’ access to
social media immediately before, during, and after football games.140
College athletic programs also restrict their student athletes’ online par-
ticipation to avoid damaging the reputations of their host universities.141
Employer restrictions on off-duty speech and conduct are troubling in that
they squelch expression and individual autonomy and may compromise
the employee’s right to a private life, especially when restrictions are
unilaterally imposed after employment commences.
The First Amendment offers limited protection against speech
restrictions in the employment context.142 It does not shield private
(2009) (discussing the more traditional use of morals clauses in contractual agreements
involving talent, including endorsement contracts).
140Mark Maske, League Issues New Twitter Policy, WASH. POST: THE LEAGUE (Aug. 31, 2009, 4:53
PM), http://views.washingtonpost.com/theleague/nflnewsfeed/2009/08/league-issues-new-
twitter-policy.html.
141Autumn K. Leslie, Note, Online Social Networks and Restrictions on College Athletes: Student
Censorship? 5 DEPAUL J. SPORTS L. & CONTEMP. PROBS. 19, 20 (2008) (explaining that closer
monitoring and restrictions upon student athletes has traditionally been accepted because the
acts of those athletes could implicate or tarnish the moral character of the school).
142See generally Reed, supra note 134 (arguing for an interpretation of free speech values
in the new millennium more compatible with the human individual’s autonomy of
consciousness).
90 Vol. 49 / American Business Law Journal
employees,143 and rights afforded to public employees are limited to
speech regarding matters of public concern,144 which are balanced against
their employers’ business interests.145 The U.S. Supreme Court has held
that, if the employee’s speech “cannot be fairly considered as relating to
any matter of political, social, or other concern to the community, govern-
ment officials should enjoy wide latitude in managing their offices, without
intrusive oversight by the judiciary in the name of the First Amend-
ment.”146 As such, internal office matters generally are not issues of public
concern147 and, by logical extension, neither are pictures of drunken
employees or sexual remarks about coworkers. Employers in the public
sector, like the private sector, are not required to “tolerate action which
[they] reasonably believ[e] would disrupt the office, undermine [their]
authority, and destroy close working relationships.”148 The Supreme Court
also has found that an employer may lawfully base an adverse employment
action on an employee’s off-duty, off-premises speech.149 In City of San
Diego v. Roe, a police officer filed a First Amendment claim after he was
fired for selling on eBay videos of himself stripping off his police uniform
and masturbating.150 The Supreme Court held that the officer’s speech was
not protected under the First Amendment, because it was sufficiently
143Dixon v. Coburg Dairy, Inc., 369 F.3d 811, 817 n.5 (4th Cir. 2004); Pietrylo v. Hillstone Rest.
Grp., No. 06-5754-FSH, 2008 WL 6085437, at *5–6 (D.N.J. July 24, 2008); Laura B. Pincus
& Clayton Trotter, The Disparity Between Public and Private Sector Employee Privacy Protections: A
Call for Legitimate Privacy Rights for Private Sector Workers, 33 AM. BUS. L.J. 51, 53–54 (1995)
(discussing the difference in First Amendment and other privacy rights between private and
public sector employee); David C. Yamada, Voices from the Cubicle: Protecting and Encouraging
Private Employee Speech in the Post-Industrial Workspace, 19 BERKELEY J. EMP. & LAB. L. 1, 4–5
(1998).
144Connick v. Myers, 461 U.S. 138, 147 (1983).
145See Garcetti v. Ceballos, 547 U.S. 410, 418 (2006); City of San Diego v. Roe, 543 U.S. 77,
82–83 (2004); Connick, 461 U.S. at 142; Pickering v. Bd. of Educ., 391 U.S. 563, 568–70 (1968)
(holding that a public school teacher could not be dismissed from his job for writing a letter
to the newspaper criticizing the school board’s treatment of revenue measures for the school
because the teacher’s First Amendment rights outweighed the school’s business interests).
146Connick, 461 U.S. at 146.
147Id. at 143.
148Id. at 154.
149City of San Diego, 543 U.S. 77.
150Id. at 78–79.
2012 / Social Media Privacy and the Twenty-First-Century Employee 91
“linked to his official status as a police officer” and “detrimental to the
mission and functions of [his] employer.”151
The National Labor Relations Board (NLRB) has attempted to bring
employers’ restrictions of employees’ off-duty speech and conduct under
the purview of the National Labor Relations Act (NLRA).152 The NLRA
guarantees both union and nonunion employees the right to self-
organization and to “engage in other concerted activities for the purpose
of collective bargaining or mutual aid or protection.”153 In late 2010, the
NLRB issued a complaint against an ambulance service, claiming it unlaw-
fully terminated an employee for violating its Internet posting policy,
which forbade employees from making disparaging or defamatory com-
ments about the company or its supervisors at any time online.154 The
employee had posted remarks on Facebook angrily implying that her
supervisor was mentally ill and disparaging him with expletives.155 The
case eventually settled, and in the settlement agreement, the employer
agreed to alter its Internet policies and standards of conduct, which
“improperly restricted” employees’ rights to “discuss [their] wages, hours,
and working conditions with [their] fellow employees and others.”156
The NLRB recently filed additional complaints against employers
who terminated employees based on their online speech.157 The NLRB
151Id. at 84–85.
152Congress passed the NLRA in 1935 to protect workers’ right to unionize, and it created the
National Labor Relations Board to enforce the rights created under the Act. 29 U.S.C. §§
151–69 (2006). Before the passage of the NLRA, employers could freely spy on, interrogate,
and fire union members. See generally Coppage v. Kansas, 236 U.S. 1 (1915) (upholding an
employer’s right to fire its employee for refusing to sign a document stating the employee
would withdraw from the union.).
15329 U.S.C. § 157.
154See Complaint and Notice of Hearing, In re Am. Med. Response of Conn., Inc., No.
34-CA-12576 (N.L.R.B. Oct. 27, 2010), available at http://www.jdsupra.com/post/document
Viewer.aspx?fid=daf37177-f935-4fe0-be1f-82c65d0f2ac3.
155See id.
156Settlement Agreement, In re Am. Med. Response of Conn., Inc., No. 34-CA-12576
(N.L.R.B. Feb. 7, 2011), available at www.minnesotaemploymentlawreport.com/NLRB%20
Facebook%20Settlement .
157Melanie Trottman, NLRB Faults Company for Firing Workers Over Facebook Posts, WALL ST. J.
(May 18, 2011, 7:08 PM), http://online.wsj.com/article/SB1000142405274870350910457633
1861559033254.html.
92 Vol. 49 / American Business Law Journal
filed a complaint against a car dealership that fired an employee who
posted critical photos and comments on Facebook.158 The employee
complained that sales commissions were likely to drop because a promo-
tional event sponsored by the dealership served only water and hot-
dogs.159 As a result, the employee was terminated despite the fact that he
had complied with his employer’s request to delete his online rant.160
The NLRB also has taken action against Hispanics United of Buffalo, a
nonprofit organization in New York, after the organization fired five
workers for Facebook postings that criticized working conditions.161 It
remains to be seen, however, whether the scope of “concerted activities”
will eventually be broadened to include insulting rants about an
employer.162
In addition to federal protections, a few states such as California,
Colorado, Connecticut, New York, and North Dakota have passed legisla-
tion attempting to protect employees from reprisal for lawful off-duty
conduct.163 For example, the California statute prohibits demoting, sus-
pending, or discharging an employee for lawful conduct occurring during
nonworking hours away from the employer’s premises.164 Colorado and
North Dakota’s statutes provide an exception for conduct that has a rela-
tion to the employer’s business interests.165 Despite these protections,
158Press Release, NLRB, Chicago Car Dealership Wrongfully Discharged Employee for Face-
book Post, Complaint Alleges (May 24, 2011), available at http://www.nlrb.gov/news/chicago-
car-dealership-wrongfully-discharged-employee-facebook-posts-complaint-alleges.
159Id.
160Id.; Dave Jaimeson, Facebook Posting Led to Worker’s Unfair Firing: Feds, HUFFINGTON POST
(May 24, 2011, 3:15 PM), http://www.huffingtonpost.com/2011/05/24/facebook-posting-
worker-fired_n_866353.html.
161Trottman, supra note 157.
162Settlement Agreement, supra note 156; Company Settles Case in Firing Tied to Facebook, N.Y.
TIMES, Feb. 7, 2011, at B7.
163See Marisa A. Pagnattaro, What Do You Do When You Are Not at Work?: Limiting the Use of
Off-Duty Conduct as the Basis for Adverse Employment Decisions, 6 U. PA. J. LAB. & EMP. L. 625, 629
(2004). For a general discussion of free speech in America for employees both in and out of
the workplace, see BRUCE BARRY, SPEECHLESS: THE EROSION OF FREE EXPRESSION IN THE AMERICAN
WORKPLACE (2007).
164CAL. LAB. CODE § 96(k) (Deering 2011).
165COLO. REV. STAT. §§ 34-402.5(1)(a)–(b) (2011); N.D. CENT. CODE § 14-02.4-03 (2011).
2012 / Social Media Privacy and the Twenty-First-Century Employee 93
employers who can prove a legitimate business interest in regulating their
employees’ off-duty conduct are generally given a free pass.166 Case law
interpreting lifestyle protection statutes reveal that courts tend to err on
the side of employers when any business interest is at stake. Courts have
permitted dismissals arising out of conduct such as employee extramarital
affairs and criticism of an employer in the newspaper.167
In Canada, employers seeking to dismiss employees on the basis of
unsavory off-duty conduct have often opted to terminate them with com-
pensation to avoid litigation.168 For example, one employer dismissed an
employee with compensation after learning from a customer that the
employee moonlighted as an actor in the adult film industry.169 Labor
arbitration standards for the evaluation of off-duty conduct have a long
history in Canada. A 2011 decision from Nova Scotia, Cape Breton-Victoria
Regional School Board v. Canadian Union of Public Employees, Local 5050,
applied labor arbitration principles dating back to 1967 to evaluate the
conduct of a school caretaker who had a sexual relationship with a
student and ultimately married her.170 In the 1967 precedent, Re Mill-
haven Fibres Ltd. and Ontario O.C.A.W., Local 9-670, the court determined
the following factors to be relevant when evaluating off-duty conduct: (1)
whether a crime had been committed, (2) the harm to the employer’s
reputation or product, (3) the ability of the employee to continue to
perform his duties satisfactorily, (4) the effect on other employees, and
(5) whether the employer is able to continue managing and directing
employees efficiently.171 Presumably, labor arbitrators in Canada will
166See Aaron Kirkland, Note, You Got Fired? On Your Day Off?!: Challenging Termination of
Employees for Personal Blogging Practices, 75 UMKC L. REV. 545, 552–57 (2006) (discussing how
the presence of a legitimate business interest in regulating or monitoring employee conduct
could provide employers with a defense against various different state law claims).
167For a discussion of these examples and others, see Robert Sprague, From Taylorism to the
Omnipticon: Expanding Employee Surveillance Beyond the Workplace, 25 J. MARSHALL J. COMPUTER
& INFO. L. 1, 30–31 (2007).
168See LEVIN ET AL. supra note 14, at 68.
169Id.
170[2011] 298 N.S.R. 2d 258 (Can.), available at http://www.canlii.org/en/ns/nsca/doc/2011/
2011nsca9/2011nsca9.html.
171[1967] 18 L.A.C. 324 para. 20 (Can.).
94 Vol. 49 / American Business Law Journal
reformulate and apply these traditional factors when evaluating
online off-duty conduct and setting appropriate boundaries in employer
policies.
In summary, U.S. law currently provides feeble protection to the
electronic social communications of employees—whether on or off the
job. Fourth Amendment case law suggests that, while expectations of
privacy in digital communication may be recognized as reasonable in the
future, several factors usually cut against a finding of reasonableness,
including employer interests, the logistical demands of the workplace,
and the general accessibility of the information. In fact, every U.S. law
touching upon employee privacy grants significant deference to the
legitimate business interests of employers.172 Statutes that specifically
govern the intersection of social media and workplace privacy have yet
to be enacted. In their absence, it seems that U.S. employers may legally
canvass social media sites for information on employees and candidates
and act on the basis of the information found therein. Employers do not
have an obligation to disclose their methods of gaining information, but
they may not obtain access to digital profiles by coercion. Internationally,
courts are similarly struggling with blurred boundaries between work
and home. On the one hand, the French and Israeli courts, guided by an
inalienable right to privacy in each jurisdiction, are more generous
toward employees and their digital communications. Canadian courts, on
the other hand, acknowledge that workplace policies play a role, but not
an exclusive one, in shaping reasonable employee expectations. Against
this uncertain legal backdrop, an analysis of current workplace practices
and attitudes regarding social media participation is instructive. As
the U.S. Supreme Court has asserted, these burgeoning norms will
dictate the future of the law governing privacy in communication
technologies.173
172See French v. United Parcel Serv., Inc., 2 F. Supp. 2d 128, 131 (D. Mass. 1998); Marsh v.
Delta Air Lines, Inc., 952 F. Supp. 1458, 1462 (D. Colo. 1997).
173See City of Ontario v. Quon, 130 S. Ct. 2619, 2629–30 (2010).
2012 / Social Media Privacy and the Twenty-First-Century Employee 95
II. THE PRIVACY EXPECTATIONS OF MILLENNIAL
EMPLOYEES: A SURVEY
Whether referred to as Millennials,174 the MySpace Generation,175 Digital
Natives,176 or Generation Me,177 the rising workforce is marked by its
presence on the Web and its digital world view. Much has been forecast
about the role this demographic will play in shaping the workplace of the
twenty-first century.178 Scholars have described the new generation of
employees as ambitious—having high expectations for salary and career
promotions—while perhaps incongruously placing a premium on private
life, flexibility, and work/life balance.179 They are reported to value a “fun”
and relaxed workplace atmosphere180 and tend to perplex employers with
the “casualness of their e-mail and texting language” and their furtive
participation on social media while on company time.181 Regarding
174HOWE & STRAUSS, supra note 13. The term Millennial is typically used to describe the cohort
after Generation X and extends, according to Howe and Strauss, from those born from 1982
to 2002. Id. at 15. These authors posit that Millennials “are redefining the purpose of
information technology,” which involves communicating with networks of friends and
“almost uninterrupted contact with each other.” Id. at 272–75.
175Jessi Hempel, The MySpace Generation, BUS. WK., Dec. 12, 2005, at 86 (describing the
MySpace Generation as living comfortably in both the online word and the real world
simultaneously, using online social networks as a community center), available at http://
www.businessweek.com/magazine/content/05_50/b3963001.htm.
176JOHN G. PALFREY & URS GASSER, BORN DIGITAL: UNDERSTANDING THE FIRST GENERATION OF
DIGITAL NATIVES 346 (2008) (defining Digital Natives as those born after 1980 and discussing
their presence on the Internet).
177JEAN M. TWENGE, GENERATION ME: WHY TODAY’s YOUNG AMERICANS ARE MORE CONFIDENT,
ASSERTIVE, ENTITLED—AND MORE MISERABLE THAN EVER BEFORE (2006) (defining Generation Me
as a generation growing up in the 1980s, 1990s, and 2000s). Twenge describes this generation
as a self-important generation that believes everyone should follow and accomplish their
dreams. The generation also has an extremely high focus on individuality. Id. at 4–7.
178Stephanie Armour, Generation Y: They’ve Arrived at Work with New Attitudes, USA TODAY, Nov.
6, 2005, at 1B; The “Millennials” Are Coming, CBS NEWS (Feb. 11, 2009, 3:54 PM), http://
www.cbsnews.com/stories/2007/11/08/60minutes/main3475200.shtml; Steve Tobak, Gen Y:
Solve Your Own Damn Workplace Issues, BNET (May 13, 2010), http://www.bnet.com/blog/ceo/
gen-y-solve-your-own-damn-workplace-issues/4604.
179TWENGE, supra note 177, at 216–21.
180Id. at 218.
181PALFREY & GASSER, supra note 176, at 235.
96 Vol. 49 / American Business Law Journal
privacy, they have been characterized as having “few qualms about sharing
information that [others] might consider sensitive or private,”182 as evi-
denced by their copious digital dossiers. For them, identity seems to be a
“synthesis of real-space and online expressions of self.”183 Paradoxically, as
a whole this group reports being unnerved by the idea of “someone
aggregating, searching through, and acting on the basis of [the] informa-
tion” they share online.184
The empirical project discussed in this part was undertaken to define
attitudes about online privacy, specifically with regard to participation in
OSNs.185 We discuss and analyze that part of the survey pertaining to the
respondents’ usage of OSNs and their attitudes about online privacy vis-
à-vis their employment context. Approximately 2500 Canadian and
American undergraduate students answered questions relating to their
employment status, privacy expectations concerning employer access to
their OSN profiles, and the existence of and adherence to OSN workplace
policies, among other things. These questions were close ended, as respon-
dents chose from a list of various answer choices in multiple choice and
Likert-scale format.186
Most respondents (94%) were between the ages of eighteen and
twenty-four. Females (51%) and males (49%) were equally represented.
Two-thirds of respondents (67%) were employed in paid positions and
worked shifts while pursuing an undergraduate degree, as presented in
Figure 1. Few respondents (less than 10%) were employed full time.
Ninety-two percent of respondents indicated that Facebook was their
preferred OSN,187 while only 2% reported belonging to LinkedIn, a
business-oriented OSN mainly used for professional networking. The
project’s general findings suggest that respondents post a significant
182TWENGE, supra note 177, at 217.
183PALFREY & GASSER, supra note 176, at 36.
184Id. at 51.
185Supra note 14 (discussing the findings); see also LEVIN ET AL., supra note 14 (providing a full
report on the Canadian findings); Levin & Sánchez Abril, supra note 14 (offering general
propositions regarding the survey and its overall findings).
186For a detailed discussion of the methodology as well as the complete survey instrument, see
LEVIN ET AL., supra note 14, 80–92; Levin & Sánchez Abril, supra note 14, at 1048–51.
187Id. at 1023–24.
2012 / Social Media Privacy and the Twenty-First-Century Employee 97
amount of truthful information about themselves online.188 The most
commonly shared pieces of information were pictures of themselves (77%),
their hometown (76%), and their real full name (68%).189 Respondents
expressed some concern over their information reaching unintended
audiences.190 Seventy-two percent of respondents reported restricting
access to their profiles by use of the privacy settings offered by the OSN
Web sites.191
This part presents the findings related to the employment context to
draw conclusions regarding the views of both current and future employ-
ees. The findings have been categorized into three thematic groups: (1)
employer monitoring of OSNs, (2) work and personal life separation, and
(3) workplace restrictions on OSN usage.
A. Employer Monitoring of Employee OSN Profiles
The data suggest a general ambivalence regarding employer access to
employee OSN profiles. Most respondents reported being truthful about
facts relating to their identities (such as full name, portrait photograph,
hometown, etc.). In all likelihood, employers already enjoy access to these
188Id. at 1024–25.
189Id.
190Id. at 1026–27.
191Id. at 1034.
Figure 1. Hours respondents worked each week.
98 Vol. 49 / American Business Law Journal
bits of identifying information without monitoring OSNs. However, some
respondents reported voluntarily posting information about traditionally
private or sensitive topics such as political preferences (24%) or their
partner’s name (25%). Interestingly, 62% posted their relationship status
and 40% disclosed dating interests.192 Perhaps Millennials consider that
sharing such information, which is traditionally shared “at the water
cooler,” does not unduly compromise their privacy. It is unsurprising that
this cohort, which has been characterized as valuing a casual and social
work environment, would be inclined to share facts relating to private life
with employers. This sharing reflects perhaps a population that does not
construct the traditional segregation between social or home and work
contexts on the basis of such facts.
Respondents generally acknowledged that posting information on
social media sites makes it more accessible to many audiences. When asked
how they would react to an employer accessing their social network profile
information, respondents had mixed responses: 41% reported they would
not be concerned if their employer accessed information on their OSN
profiles, 35% indicated they were concerned or very concerned, and 25%
were neutral. These findings, displayed in Figure 2, suggest that respon-
dents were almost equally divided in their tolerance for employer access to
their social media profiles. It may be that the less concerned group is not
privacy wary, or it may be that they have made efforts to cleanse their
profiles of private information and information that could cast them in a
negative or unprofessional light in the eyes of employers.
192See id. at 1025 (providing a chart representing this data).
Figure 2. How concerned would you be if your employer accessed your
social network profile information?
2012 / Social Media Privacy and the Twenty-First-Century Employee 99
Despite what seems like overall ambivalence toward employer intru-
sion into employees’ social networking activities, 54% agreed with the
statement, “It is not right when people can have access to information not
intended for them.”193 This response suggests that respondents generally
disapprove of unintended audiences learning information about them
posted on social media profiles.
Overall, respondents disapproved of employer monitoring or access-
ing employees’ OSN profiles. Seventy-five percent found this practice to be
somewhat or very inappropriate (see Figure 3). This indicates that the
respondents perceive an employer’s monitoring of their private life as a
breach of trust, especially in light of the fact that they tend to be willing to
share certain private information openly with employers.
Respondents were slightly less perturbed, however, by employers
checking on job applicants online without the applicant’s knowledge. Fifty-
six percent of respondents considered it somewhat or very inappropriate
for employers to access OSNs to check the character of a job candidate (see
Figure 4). The greater disapproval of intrusions in the private life of
employees versus applicants may stem from a shared sentiment that
judging a person based on his or her private life is more appropriate
before hiring. After all, the purpose of the hiring process is to vet appli-
cants based in part on their character and reputation.
Almost half (49%) of respondents found it somewhat or very inap-
propriate for employers to proactively search OSNs with the purpose of
193Id. at 1027.
Figure 3. How appropriate would it be for you as a manager to use a social
network to check up on what your employees do during personal time
without them knowing?
100 Vol. 49 / American Business Law Journal
identifying potential candidates for future positions (see Figure 5).194 This
figure suggests that individuals do not expect to be assessed as job candi-
dates in their capacity as OSN members and that at least half of them are
uncomfortable with the blurring of those boundaries.
Figure 5 further underlines the conclusion above: Respondents dem-
onstrated clearly defined expectations of the uses and interpretations of
their online profiles. While they are apt to share their profiles with many
194For a discussion of automated processes developed for such purposes, see, for example,
Saul Hansell, Let Your Boss Find Your Facebook Friends, N.Y. TIMES (Dec. 15, 2008, 3:28 PM),
http://bits.blogs.nytimes.com/2008/12/15/let-your-boss-find-your-facebook-friends.
Figure 4. How appropriate would it be for you as manager to use a social
network to check out the character of someone who has applied for a job?
Figure 5. In your opinion, how appropriate would it be for you as a
manager to proactively research social networks to identify potential high
quality candidates for future positions?
2012 / Social Media Privacy and the Twenty-First-Century Employee 101
and disparate audiences, they reject one audience evaluating them on the
basis of information intended for another audience. Elsewhere, we have
labeled this attitude “network privacy.”195 Below we elucidate network
privacy in the employment context.
B. Work/Personal Life Separation
While a majority of respondents reported not inviting their employers or
supervisors to be part of their OSN, many respondents considered it
appropriate to blend worlds in that manner. Nearly one-third (29%) of
respondents included their immediate supervisor as an online “friend.” As
discussed below, some welcomed their employers’ participation in their
social networks; others reported being required to give their employers
access to their profiles. These data are consistent with the conclusion above
regarding the openness and transparency of Millennial employees vis-à-vis
their workplace cohorts, as well as the characterization of Millennials as
valuing casual and social work environments.
In what seems like a significant departure from traditional workplace
practices, 18% of respondents reported the participation of a senior
company executive in their OSN (see Figure 6). The survey did not define
“senior company executive,” but made it clear this was a person with which
offline socialization would not occur, someone senior to the immediate
supervisor. The data indicate, therefore, the internal blurring of bound-
195Levin & Sánchez Abril, supra note 14, at 1045–46.
Figure 6. In your current or most recent workplace, which of the
following belongs to your online social network?
102 Vol. 49 / American Business Law Journal
aries, or flattening of hierarchies, that digital media facilitate. Rather than
waiting for the “elevator pitch” that may never come, some young employ-
ees now have access to higher-level executives and are willing, perhaps
eager, to interact with these superiors in a digital context. The data also
indicate the willingness of some senior corporate executives to communi-
cate with junior employees through OSNs.
Respondents were divided in their opinions on the propriety of
supervisors socializing with employees through a social network. Thirty-six
percent opined that superior-to-employee socialization is somewhat to
very appropriate, 33% were neutral, and 31% found it to be somewhat to
very inappropriate. The equal distribution signals that respondents’ opin-
ions may depend on other factors, such as the ages and genders of the
parties, the workplace culture, the industry, and the unsettled norms that
are still actively forming in this area. Despite the fact that approximately
one-third of respondents included supervisors or senior company execu-
tives or both in their OSNs, respondents tended to disassociate work life
from personal life. As shown in Figure 7, 54% of those surveyed strongly or
somewhat agreed that “work life is completely separate from personal life,
and what you do in one should not affect the other.” Eighteen percent of
respondents somewhat or strongly disagreed with that statement. Further,
56% disagreed that “knowing how a person behaves outside of work hours
gives managers insight into whether that person is ready for a promotion.”
Only 16% of respondents agreed that off-duty behavior is evidence of
career readiness or potential, which is highly consistent with a separatist
Figure 7. Work life is completely separate from personal life, and what
you do in one should not affect the other.
2012 / Social Media Privacy and the Twenty-First-Century Employee 103
view of professional and personal life. The plurality of those surveyed did
not believe that their participation on social media would significantly
impede their professional development. Over half (52%) somewhat or
strongly disagreed with the following statement: “People wanting to move
up the career ladder should not be part of OSNs because [they] can’t
completely control what is posted about [them].” Nineteen percent agreed
with the foregoing statement, despite their own admitted participation on
OSNs, which indicates that the need to be connected may supersede any
perceived threat to privacy or reputation. Perhaps it indicates that identity
presentation and audience segregation should be facilitated by other legal
and technological means.
One of our hypothetical scenarios probed the relationship between
online behavior and workplace consequences. We asked respondents if
they had heard of the scenario occurring or if it had occurred to them
personally. Putting themselves in the place of the hypothetical actor,
respondents were also asked to attribute responsibility for the conse-
quences of the scenario to the various parties involved. Finally, they were
asked whether they believed real harm could arise from the event. The
hypothetical involved an employee who was caught in a lie when his
employer found incriminating information about him on a social media
Web site. The scenario read as follows:
You called in sick to work because you really wanted to go to your friend’s all
day graduation party. The next day you see several pictures of you having a
great time at the party. Because the pictures are dated you start to worry about
whether you might be caught in your lie about being sick. You contact the
developers of the social network and ask that the pictures be taken down
because the tagging goes so far, it would take you too long to find all the
pictures. There was no response from the network. You are stunned to be
called in by your supervisor a week later to be advised that you were being
“written up” for taking advantage of sick leave and put on notice that if it
happened again you would be terminated.
When attributing responsibility to the various parties for the adverse
consequences, 78% assumed personal responsibility, while the rest laid
blame on the “snooping” supervisor.196 Nearly half (47%) of respondents
were concerned that material about them was not posted by them.197
Seventy-one percent respondents agreed that “real harm”—defined as
196Id. at 1033.
197Id. at 1037.
104 Vol. 49 / American Business Law Journal
physical, economic, or reputational injury—could arise from this occur-
rence (see Figure 8).198 Respondents reported experiencing an invasion of
privacy when information moved, uncontrolled by participants, across
networks and contexts.
These statistics suggest the same contradiction that we have seen
above: the respondents were willing to give digital access to their personal
lives but resists being judged on the basis of what they disclose. They
expect their work and personal lives to be segregated regardless of their
unified and publicly accessible digital identity.
C. Workplace Policies on Employee Participation in Social Media
The survey results show that the preponderance of the respondents’
employers did not adopt clear policies regarding social media use in the
workplace. Sixty-two percent of respondents indicated that their work-
places did not have formal policies on social networking (see Figure 9).
Nineteen percent of respondents did not know if their employers had a
policy on social media usage. Respondents’ lack of clarity as to the exist-
ence of a policy and its contents has clear implications on their expecta-
tions of privacy both in and out of the workplace.
One-fifth of respondents were subject to a formal workplace policy
on social media. Of respondents whose employers have a formal workplace
policy, 32% reported that the policy banned employee access to social
media during company time. Others only forbade any association with or
mention of the company name on the employee’s profile. Respondents
198Id. at 1043.
Figure 8. This scenario could result in physical, economic, or reputational
injury in the offline world.
2012 / Social Media Privacy and the Twenty-First-Century Employee 105
whose employers had formal policies admitted adherence to such
policies was generally poor. Only 22% of respondents working for an
employer with an OSN policy stated that employees abided by the policy
(see Figure 10). Another recent survey found that nearly half of office
employees access Facebook during work hours.199
199NUCLEUS RESEARCH, FACEBOOK: MEASURING THE COST TO BUSINESS OF SOCIAL NETWORKING
(2009), http://nucleusresearch.com/research/notes-and-reports/facebook-measuring-the-cost-
to-business-of-social-notworking/.
Figure 9. Does your workplace have a formal policy related to use of
OSNs during company time?
Figure 10. If there is a policy that forbids all use of OSNs during work
time, do employees generally abide by the policy?
106 Vol. 49 / American Business Law Journal
At the same time, when asked to answer in the role of manager, 51%
of respondents agreed that “accessing OSNs should not be allowed during
work hours” (see Figure 11). This indicates that, although employees
habitually access their OSNs during working hours, there is a generalized
acknowledgment that such practice is counterproductive and that
employer restrictions on this practice during work hours are reasonable.200
Some businesses have begun policing their employees’ online behav-
ior by way of requiring employees to add superiors to their OSN pro-
files.201 As noted above, 18% of respondents reported a senior executive
requested to (and was) added as a friend or connection to an OSN profile.
If employer access is obtained by implicit or explicit coercion, this practice
clearly contravenes the SCA and other laws.202 Eighty-one percent of
respondents considered it inappropriate for employees to be required to
invite their supervisor to their OSN profile. Considering that only 31% of
respondents believed it inappropriate for managers to socialize with
employees via a social network after work hours and that 29% of respon-
dents included their immediate supervisor, it is likely a considerable
200It is possible that some respondents may have interpreted “work time” and “work hours”
broadly, to include breaks and meal times.
201See Jared Sandberg, OMG—My Boss Wants to “Friend” Me on My Online Profile, WALL ST. J.,
July 10, 2007, at B1.
202See supra notes 90–101 (discussing the anti-coercion principle as applied in Pietrylo v.
Hillstone Rest. Grp., No. 06-5754(FSH), 2009 WL 3128420 (D.N.J. Sept. 25, 2009)).
Figure 11. In my opinion, accessing OSNs should not be allowed during
work hours.
2012 / Social Media Privacy and the Twenty-First-Century Employee 107
number of employers may already have access to their employees’ infor-
mation on an OSN and would, therefore, not violate the SCA. Given these
employee practices, the current legislative framework does not offer mean-
ingful protection for employee information online.
D. Summary
The data suggest that Millennial employees maintain an expectation of
privacy regarding information disclosed on social media, especially in
relation to their current and prospective employers. They acknowledge
the increased accessibility and transparency of their private lives when
memorialized on social networks. They also understand that they lack
control over the information posted about them, the way such informa-
tion is interpreted, and the unintended audiences that may access the
information.
Despite these realizations, Millennial respondents displayed a clear
discomfort with the idea of information flowing across contexts. Three-
fourths found it inappropriate for an employer to check employee off-duty
conduct via social networks. More than half (56%) objected to the practice
of social media background checks. More than half also expressed that
work and personal life should not be commingled and that individuals
should not be judged across these contexts. When researchers posed a
scenario in which an employee was caught lying via a social network
posting, most respondents agreed that the employer invaded the employ-
ee’s privacy—even though the employee was engaged in wrongdoing.
Millennials seem to take for granted that their work and personal
lives do not intersect and that their actions in one should not affect the
other, as marked by their overwhelming belief that an employee’s conduct
outside the office should not be used as a basis for making promotion
determinations. Their objection to this increasingly common practice203
reflects an expectation that they would not be discriminated against on the
basis of their online identities. However, the practice of trawling the web
203See DELOITTE, 2009 ETHICS AND WORKPLACE SURVEY 6 (May 21, 2009), http://
www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/us_2009_ethics_
workplace_survey_220509 (reporting that, while 53% of employee respondents said their
social networking pages are none of their employer’s business, 40% of business executive
respondents disagreed and 30% admitted to informally monitoring social networking
sites).
108 Vol. 49 / American Business Law Journal
for information about applicants and employees—and perhaps discrimi-
nating on that basis—will no doubt continue to become the norm unless
restricted by law or technology.
Although many respondents expressed unease at the lack of control
they exercise over the information about them available on OSNs,204 it is
clear that respondents were not willing to forgo participation in social
networks to achieve privacy or separation of work and personal life. They
displayed a strong desire to socialize, to interact, and to share truthful
information about themselves on social networks. The majority believed
participation on social networks is worth the risk; only a small percentage
agreed that participation in social media can impede professional devel-
opment because individuals cannot fully control what is posted about
them.
There are indeed indications in our findings that Goffman’s tradi-
tional theories on audience segregation may no longer hold, because a fair
number of respondents welcomed the blurring of work and personal
boundaries. Roughly a third invited the participation of their bosses in
their OSNs, with even more reporting that employer access to their social
networking profile would not cause them concern. Somewhat surprisingly,
a small percentage responded that work and personal life should not be
separate. This may indicate a growing trend favoring casual work envi-
ronments, it may reflect a lack of concern toward transitory “student jobs,”
or it may be indicative of the naiveté of a young demographic with respect
to the business world.
Overall, the findings are consistent with what we have labeled
network privacy,205 which can be defined as privacy within the informa-
tion’s intended network and context.206 An invasion of privacy is experi-
enced when information moves, uncontrolled by participants, across
networks and contexts.207 The information then loses what Professor
204Levin & Sánchez Abril, supra note 14, at 1037.
205Id. at 1045–46.
206Id.
207See generally Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U. CHI. L. REV.
919 (2005) (arguing the harm and measure of privacy breaches actually occurs upon the
information dissemination outside or beyond the certain social networks to which the victim
of the breach reasonably expected the information to travel).
2012 / Social Media Privacy and the Twenty-First-Century Employee 109
Helen Nissenbaum has called its “contextual integrity.”208 Relevant to the
discussion here, employers access and interpret information meant for
employees’ social friends, sometimes leading to adverse consequences.
Network privacy appears to carry with it a paradox: Millennial employees
generally want privacy from unintended employer eyes and yet share a
significant amount of personal information online, knowing it could
become available to employers and others. The following part will discuss
this ostensible paradox and suggest a framework for the continued discus-
sion of network privacy in law and business.
III. THE FUTURE OF DIGITAL PRIVACY IN THE
WORKPLACE
Prior to the phenomenon of online participation, Goffman’s notion of
audience segregation shielded employees from employers’ judgment of
their private lives. Information about employee performances outside the
work sphere was less readily available to employers. Our findings suggest
that Millennials understand digital media and that cross-performance
access (i.e., employer access to Millennials’ “personal” performances) may
occur, but they are not willing to sacrifice Internet participation to segre-
gate their multiple life performances. Because it is technically and legally
unfeasible to hide their multiple life performances, Millennials rely on
employers to refrain from judging them across contexts.
With minimal technological, contractual, or statutory barriers, it is
not reasonable for an individual to expect others to refrain from judging
him or her based on publicly accessible information, especially in the
business world, where organizations have legitimate and compelling legal
and economic reasons to protect their reputations, trade secrets, and
workplace environments. U.S. law drives employers to evaluate applicants
and employees on all available, legally permissible information. While a
majority of the surveyed Millennials found employer monitoring of
employee online profiles inappropriate, an employee’s remedy in U.S. law
is contingent on whether the information obtained by the employer was
208See Helen Nissenbaum, Privacy As Contextual Integrity, 79 WASH. L. REV. 119, 136–43 (2004)
(defining the concept of “contextual integrity” and arguing that it is the “benchmark of
privacy”).
110 Vol. 49 / American Business Law Journal
publicly available. The “reasonable expectations of privacy” bar is high.209
More often than not, the large number of OSN friends with whom Mil-
lennials share information would clearly eliminate any reasonable expec-
tation of privacy. Computer usage policies, which employers broadly adopt
and employees often thoughtlessly accept, also inform the reasonable
expectation analysis.210 Though our survey respondents generally expect
the information they post on their OSNs will remain private from unau-
thorized parties, their expectation is not currently recognized by U.S. law
as reasonable and legally protectable.
Millennials’ online participation appears inconsistent with their
stated expectations of privacy and audience segregation. However, what
seems at first glance as incongruous is readily understandable as an
attempt to achieve some control in a world where individuals will inevita-
bly amass a public digital dossier. The only way to control the dossier is to
participate actively in shaping it, rather than to renounce entirely online
participation.211
A picture emerges of a society that is, surprisingly, less free, in which
tools for self-expression turn oppressive in the absence of normative,
technological, and legal controls. Normative controls may come in the
form of social acceptance of certain types of disclosures or skeletons in the
online closet. Some have suggested that businesses and society in general
will necessarily become more forgiving of unseemly personal disclosures
eventually, because so many individuals will have online evidence of some
purportedly inappropriate behavior.212 Technological controls, which have
not yet been widely perfected, could one day give individuals the capacity
to shield unwanted audiences from their online expression and identities.
As we wait for normative and technological controls to mature, the law
should protect individuals from employers who are intrusive, discrimina-
tory, or quick and unforgiving in their judgments based on unsubstanti-
ated online information.
209See supra notes 31–65.
210See supra Part I.A.
211Clive Thompson, The See-Through CEO, WIRED (Mar. 2007), http://www.wired.com/wired/
archive/15.04/wired40_ceo.html.
212See Lew McCreary, What Was Privacy? HARV. BUS. REV., Oct. 2008, at 126, 129 (citing David
Weinberger from the Berkman Center for Internet & Society as proposing such a “forgive-
ness” principle and indicating that its development may result over time as the digital-native
generation ages).
2012 / Social Media Privacy and the Twenty-First-Century Employee 111
As discussed above, the law does not currently offer meaningful
protections. Statutory protections, such as the ECPA, were enacted long
before the emergence of online social technologies.213 Updating these and
other statutes to reflect the current technological reality is essential.214
While some initiatives have already gained some traction in Congress,215
this messy, reactionary lawmaking is poor guidance for businesses and
individuals.
A continued absence of legal protection will eventually lead to a life
that Goffman called “unbearably sticky.”216 We find such a transparent
future untenable and contrary to the stated wishes of network privacy
expressed by our survey respondents. As such, we propose below a series
of recommendations for legal and business practices. These recommenda-
tions are drawn from domestic and international case law and informed by
the empirical results of our survey. They are designed to protect employ-
ees who participate online from discrimination, intrusion, harassment, and
other dignitary harms, while balancing the reasonable business and repu-
tational interests of employers.
Because social media privacy encompasses so many facets of the
complex employment relationship, it is clear that there can be no one-size-
fits-all solution. Instead, initiatives should be tailored to specific unwanted
outcomes, take into account the nature of digital information and commu-
nication,217 and give both employees and their employers the latitude to set
213Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir. 2002) (“The ECPA was written
prior to the advent of the Internet and the World Wide Web. As a result, the existing statutory
framework is ill-suited to address modern forms of communication like Konop’s secure
website.”).
214While a worthwhile and important task, making specific recommendations regarding the
modernization of U.S. privacy statutes is beyond the scope of this article.
215In May 2011, Senator Patrick Leahy introduced the Electronic Communications Privacy
Act Amendments Act of 2011, which would update the ECPA and introduce some new
safeguards for consumers. Press Release, U.S. Senator Patrick Leahy, Leahy Introduces
Benchmark Bill to Update Key Digital Privacy Law (May 17, 2011), http://leahy.senate.gov/
press/press_releases/release/?id=b6d1f687-f2f7-48a4-80bc-29e3c5f758f2.
216GOFFMAN, supra note 1, at 49 (“Urban life would become unbearably sticky for some if every
contact between two individuals entailed a sharing of personal trials, worries, and secrets.”).
217See generally Ciocchetti, supra note 23, 324–57 (categorizing employee surveillance and
monitoring practices and prescribing analysis based on a more specific than one-size-fits-all
approach).
112 Vol. 49 / American Business Law Journal
the tone for their employment relationship in context- and firm-specific
ways. The following subsections will address these recommendations in
turn.
A. Clear and Communicated Employer Policies on Technology and Internet
Participation
Even though social media have become pervasive in the lives of employees,
their use in the workplace remains legally ungoverned and normatively
unsettled. Employees bring to the shared workplace diverse and often
paradoxical attitudes toward social media. Without legal or normative
guidance, employers are in the best position to set parameters for behavior
and expectations that reflect and honor the realities of the modern world.
What legal guidance there is points to employer responsibility. All of
the international cases on workplace privacy that we canvassed stressed the
importance of explicit workplace privacy policies. In Israel, where courts
have been extremely protective of employee privacy, the existence of clear
privacy policies is a precondition for any employer action.218 Recent deci-
sions from Canadian courts illustrate how the absence of understandable
workplace privacy policies affects employer action.219 In the United States,
much depends on the language and communication of the corporate
policies that regulate the employer–employee relationship.
Our survey shows that a striking 82% of respondents either were not
subject to a workplace policy on social media or did not know if they were.
Of the remaining 18% who reported being subject to a workplace OSN
policy, most reported the policies were ineffectual, and compliance was
poor. These statistics provide evidence that employees are unlikely to take
the time to read and understand written policies or to condition their
employment on the content of such policies. This is consistent with the
literature and empirical reports on click-wrap agreements and form poli-
cies.220 Employee-respondents’ lack of attention to these policies may result
from some combination of the incomprehensibility, legalistic style, or
218See supra notes 114–21 and accompanying text.
219See supra note 74 and accompanying text.
220See Adam Gatt, Electronic Commerce—Click-Wrap Agreements: The Enforceability of Click-Wrap
Agreements, 18 COMP. L. & SECURITY REP. 404 (2002); see also Ryan J. Casamiquela, Contractual
Assent and Enforceability in Cyberspace, 17 BERKELEY TECH. & L. J. 475 (2002).
2012 / Social Media Privacy and the Twenty-First-Century Employee 113
overbreadth of the policies and employees’ perception that the policies are
inapplicable or underenforced. To achieve buy-in from employees, and
thereby establish a uniform privacy culture with clear expectations, tech-
nology and Internet participation policies must be specific and clearly
articulated in a manner consistent with the organization’s culture, while
reflecting emerging society-wide norms. Meaningful Internet participation
policies should contain a high level of detail specific to the type of com-
munication (cell phones, text messages, computer), the character of the
medium (company e-mail versus Internet-based e-mail), the nature of the
online forum (chat rooms, blogs, etc.), the location of the message sender
(on the employer premises versus at home, on employer time or off duty),
and the effect of the hardware and transmitting systems’ ownership on the
message’s privacy. Employees also should be informed about the types of
information they are prohibited from transmitting (such as harassment or
libel about a coworker, confidential and proprietary information, unau-
thorized expressions of endorsement using the company logo or affilia-
tion, and the like). Further, such policies should remind employees that
digital information is fluid and difficult to control and that employees must
comply with Web sites’ terms of service.
An employer also should articulate and justify its technology and
Internet participation policy in terms of the organization’s purpose and
mission. Compelling policies will have a nexus to a shared purpose among
employees and the general nature of the business. For example, employees
of a private school, who are charged with being role models to children,
are much more likely to understand and abide by limitations on certain
off-duty online behavior than employees whose public personas do not
logically affect their workplace role.
Finally, technology and Internet participation policies should realis-
tically reflect the stated perceptions and common expectations of employ-
ees. Employers should consider polling employees regarding their views
or inviting representative employees to give input on proposed policies.
Surveys detailing the privacy climate and biases of the incoming work-
force, such as the one reported in this article, may be particularly instruc-
tive in the formulation of employer policies.
However, as both domestic and international courts have found, the
mere existence of a policy is not sufficient to support privacy expectations
among employees. For example, Pure Power Boot Camp v. Warrior Fitness
Boot Camp admonished that a blanket e-mail policy stating that employees
have no privacy in any matter flowing through the employer’s system may
114 Vol. 49 / American Business Law Journal
not be enough to eviscerate an employee’s expectation of privacy.221 Courts
have reasoned that the totality of circumstances, including both implicit
and explicit messages sent by employers, informs whether a reasonable
expectation of privacy exists.222 Employers should be cognizant that
written policies must be carried through, enforced consistently, and incor-
porated into the organization’s culture to form the rational foundation of
employees’ privacy expectations.
B. An Employee’s Right to Designate Private Spaces
Throughout this examination of workplace privacy concerning social
media, several recurring themes emerge. One is the individual’s real or
imagined construction of what Goffman termed “fixed barriers to percep-
tion.”223 Another is the complexity of creating those fixed barriers we call
“privacy” within an employer’s physical domain.
In the face of these challenges, courts have repeatedly remedied the
employee’s inequity by acknowledging the realities of the employment
relationship and allowing employees to burrow holes of privacy within
their employer-controlled spaces. ECPA jurisprudence has acknowledged
that an employer’s mere request for access to an employee’s password-
protected sites can constitute coercion, given the context of the employ-
ment relationship.224 The U.S. Supreme Court has held that certain areas
of the office can be deemed private, subject to the “operational realities of
the workplace.”225 The French Supreme Court has gone further, giving
employees a right to create certain private spaces by labeling them as
such.226 In these decisions, the French Supreme Court recognized that
221587 F. Supp. 2d 548, 559 (S.D.N.Y. 2008) (finding that an employer’s e-mail policy, which
stated that “e-mail users have no right of personal privacy in any matter stored in, created on,
received from, or sent through or over the system,” was not enough to eviscerate an
employee’s expectation of privacy in his personal e-mail even if accessed at work).
222Id. at 561.
223GOFFMAN, supra note 1, at 238.
224See, e.g., Pietrylo v. Hillstone Rest. Grp., No. 06-5754(FSH), 2009 WL 3128420, at *1
(D.N.J. Sept. 25, 2009).
225O’Connor v. Ortega, 480 U.S. 709, 717 (1987).
226See, e.g., X v. Y-Z, Cour de Cassation [Cass.] [supreme court for judicial matters] soc., Dec.
15, 2009, No. 2561 (Fr.); La Société Seit Hydr’Eau v. M. J-M, Cour de Cassation [Cass.]
2012 / Social Media Privacy and the Twenty-First-Century Employee 115
employees may legitimately store certain private information on their
workplace computers and that boundary crossing is inevitable.
The French Supreme Court’s approach is compatible with our
survey respondents’ stated expectations and behaviors. Our survey
results suggest that young employees are likely to disregard traditional
work–home boundaries by intermingling audiences and accounts. Defin-
ing online behavior with territorial distinctions is simply impracticable.
Most people do not have separate devices for different types of digital
communication. As such, we propose the creation of a right of employees
to designate certain spaces as private within the workplace or employer-
provided spaces. This can be in the form of a tag on a picture labeled
“confidential,” the subject line of an e-mail reading “private,” or the label
on a digital folder. Employees should, however, bear the burden of
shielding what they want to keep private. This is a well-established tenet
of trade secret and privacy tort law. Moreover, protecting information
prospectively—that is, before a leak or a breach—by labeling it as private
both reduces the potential risk of disclosure and simplifies the messy ex
post facto evaluation of an employee’s subjective expectations. In addi-
tion to resonating with emerging technological and social practice, such a
right allows employees some reasonable and circumscribed freedom to
act within their employer’s policies.
C. An Applicant’s Right to Transparency
Fifty-six percent of our survey respondents disapproved of employers
using social networks to perform background checks on job applicants,227
while 49% found it inappropriate for employers to trawl social network
profiles for job candidates.228 Despite these findings, reports suggest that
surreptitious Internet searches of job candidates and employees have
[supreme court for judicial matters] soc., Oct. 21, 2009, No. 2044 (Fr.), available at http://
www.courdecassation.fr/publications_cour_26/arrets_publies_2986/chambre_sociale_3168/
2009_3332/octobre_2009_3246/2044_21_13949.html; Société Nikon France SA v. M. Onof,
Cour de Cassation [Cass.] [supreme court for judicial matters] soc., Oct. 2, 2001, No. 4164
(Fr.), available at http://www.courdecassation.fr/jurisprudena_2/chamber_sociale_576/arret_
no_1159.html.
227See supra Part II.A, Fig. 4.
228See supra Part II.A, Fig. 5.
116 Vol. 49 / American Business Law Journal
become widespread.229 In fact, employers are often reluctant to acknowl-
edge their use of online resources for selection processes and reluctant to
disclose the manner in which they gain access to information applicants
seek to disclose exclusively to their friends online.230 The informal, clan-
destine quality of the practice may disadvantage applicants who participate
online. The practice may also provide employers with a secret backdoor
for illegal employment discrimination.
Regulations on employers’ screening of social media profiles could
serve to placate the concerns of social media users in the workforce. Some
have called for the application of statutory standards of fairness and
transparency for social media background checks and employer evaluation
of employee off-duty conduct.231 Such proposals would require employers
to disclose their screening practices, including the ways they use online
information in making employment decisions. This disclosure require-
ment would significantly deter employers with a penchant for illegal dis-
crimination and would simultaneously alert applicants who may not know
the effect of their online reputation or behavior on their employment
prospects.
D. An Employee’s Right to Respond and Rebut
Similarly, employees who are adversely affected by employment decisions
based on online information or off-duty online conduct should have the
opportunity to know the contents of the information and should have the
right to respond regarding the information’s integrity and veracity. Online
information, by nature, is often presented in a contextual vacuum. A
photograph or comment that may seem inappropriate to unintended
audiences can easily belie the real circumstances under which it occurred.
Our survey revealed that most students are uncomfortable with others
viewing information about them out of context. Fifty-two percent of
respondents agreed that “it is not right when people can have access to
229See Alan Finder, When a Risque Online Persona Undermines a Change for a Job, N.Y. TIMES, June
11, 2006, at 1.
230These uses of online resources may violate an OSNs’ terms of service. See Brandenburg,
supra note 126, at 612–13; Byrnside, supra note 126, at 465–67.
231See, e.g., Davis, supra note 132; Byrnside, supra note 126.
2012 / Social Media Privacy and the Twenty-First-Century Employee 117
information not intended for them.”232 Further, individuals often cannot
control what is said about them or what images of them are “tagged” in
online fora. While some facts about a person may prove to be true, digital
information’s vulnerability to abuse cannot be overlooked.
In the event online information either suggests employee involve-
ment in criminal or unethical activity or evidences a breach of loyalty,
employers should be free to take action against the employee only after
revealing the source of the discrediting information and offering the
employee a meaningful opportunity to respond or to prove the informa-
tion inaccurate. This type of process would be similar to what the courts
have required of government employers under the Fifth Amendment’s
Due Process Clause. For example, in Perry v. Sindermann, the U.S. Supreme
Court held that, when a public employee’s continued employment was
implied and subject only to a for-cause dismissal, such employee had the
procedural due process right to contest the legitimacy of the claims
brought against him when fired.233
E. An Individual’s Right to Delete
About half of respondents in our survey (47%) were concerned that mate-
rial posted about them was not posted by them, and 71% of respondents
believed that online posts that cast them in a negative light could adversely
affect them physically, economically, or reputationally in the offline
world.234 In response to this sentiment, the European Commission recently
introduced into the European Parliament legislation that seeks to create a
“right to delete” or “right to be forgotten.”235 This proposed legislation
232See LEVIN ET AL., supra note 14, at 41.
233408 U.S. 593 (1972).
234See supra notes 197–98 and accompanying text.
235Press Release, European Union, European Commission Sets Out Strategy to Strengthen
EU Data Protection Rules (Nov. 4, 2010), http://europa.eu/rapid/pressReleases
Action.do?reference=IP/10/1462. In Spain, the country’s robust laws protecting individual
honor, intimacy, and privacy have already been interpreted as granting such a right, but
Spanish lawmakers remain baffled regarding how to implement it. See Agencia Española de
Protección de Datos, Study on the Privacy of Personal Data and on the Security of Information in
Social Networks, 62–67 (2009), available at http://www.inteco.es/Seguridad/Observatorio/
Estudios/est_red_sociales_es. Article 18.4 of the Spanish Constitution of 1978 directs the law
to “regulate information technology in order to guarantee individual honor and personal and
118 Vol. 49 / American Business Law Journal
would allow users to compel Web sites, including social networking sites
and possibly even search engines, to delete users’ personal information
upon request, essentially giving users a right to be “forgotten” online.236
If passed, individuals would obtain the right to request any personal
information that is not in the public interest be deleted from a Web
site.237
Armed with this right, employees would be able to request the dele-
tion of images and information about themselves on a site-by-site basis,
allowing for significant reputation cleansing or correcting. On the one
hand, this proposal grants the Millennial generation nothing more than
the right of forgetting that the natural frailty of the human memory gave
past generations.238 On the other hand, it is an opportunity to rewrite the
past and potentially (yet figuratively) get away with murder. From an
employer’s perspective, employees’ ability to delete negative information
about themselves from the Internet provides an alternative solution to
resolve instances of inappropriate online conduct, without having to resort
to termination.
Although the proposed right has yet to be fleshed out from a practical
perspective, a system akin to the notice and takedown procedure under
the United States’ Digital Millennium Copyright Act of 1998 may be
applicable.239 Among other things, that copyright statute limits the
infringement liability of Internet service providers who expeditiously take
familial intimacy and the exercise of individual rights.” C.E., B.O.E. n. 311, Dec. 29, 1978
(Spain), available at http://noticias.juridicas.com/base_datos/Admin/constitucion.t1.html#a18
(as translated by author); see also L.O.P.J. 15/1999, Dec. 13, 1999 (Spain) Protección de
Datos de Carácter Personal, available at http://www.boe.es/boe/dias/1999/12/14/pdfs/A43088-
43099 .
236Matt Warman, Online Right ‘To be Forgotten’ Confirmed by EU, TELEGRAPH (Mar. 17, 2011, 12:53
PM), http://www.telegraph.co.uk/technology/Internet/8388033/Online-right-to-be-forgotten-
confirmed-by-EU.html. The proposal would grant national privacy bodies in EU member
nations the power to investigate and prosecute offending websites. Id.
237For example, individuals would be able to request that Facebook delete an unflattering
photograph of them, provided the photograph’s presence online is not in the public interest.
Id.
238See VIKTOR MAYER-SCHöNBERGER, DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE 2
(2009) (discussing the effects of modern technology and the Internet specifically on humans’
newfound inability to forget as content remains pervasively available online).
23917 U.S.C. § 512(c)(3) (2006).
2012 / Social Media Privacy and the Twenty-First-Century Employee 119
down infringing material upon receipt of proper notification from the
copyright owner. The statute builds in certain safeguards to protect against
fraud, error, and abuse. For example, all representations in the notices are
made under penalty of perjury,240 and the process allows the initial
uploader of the allegedly infringing material to file a counter notification
in response to the takedown.241 In theory, this procedure is workable in the
privacy context, where individuals (like copyright owners) could petition
Web sites to take down reputation-tarnishing material.
In reality, Web sites do not have the economic or legal incentives to
establish this costly procedure because they are not liable for invasions of
privacy as they would be for copyright violations.242 Further, establishing
copyright ownership and infringement, although difficult, is a more com-
fortably objective task than establishing whether a piece of information is
public or the subject of legitimate public interest. For legal reasons as well,
the introduction of a right to be forgotten (and an accompanying take-
down system) seems highly unlikely to pass muster under U.S. law. In
Europe, the archetypal advocate for this right is a Spanish woman whose
drug conviction was pardoned in 1995.243 The woman petitioned Google
to remove all information about her past because she objected to the
inevitable association a search of her name would produce with news of
her pardon (which was published in an official national bulletin and pre-
viously accessible to a limited few by virtue of its format).244 While this
request may not seem extreme to European eyes, it is outlandish to
American observers. U.S. law unequivocally holds that any information
that is accessible or available to the public cannot be private. As such, there
240Id.
241Id. § 512(g)(2).
242See Communications Decency Act, 47 U.S.C. § 230 (2006); Jeff Kosseff, Defending Section
230: The Value of Intermediary Immunity, 15 J. TECH. L. & POL’Y 123, 149 n.151 (2010) (collecting
example cases); Molly Sachson, Note, The Big Bad Internet: Reassessing Service Provider Immunity
Under § 230 to Protect the Private Individual from Unrestrained Internet Communication, 25 J. CIV.
R. & ECON. DEV. 353, 366–67 (2011).
243Rosario G. Gomez, Quiero que Internet se Olvide de Mi, EL PAIS (Jan. 7, 2011), http://
www.elpais.com/articulo/sociedad/Quiero/Internet/olvide/elpepisoc/20110107elpepisoc_1/
Tes.
244Id.
120 Vol. 49 / American Business Law Journal
is a meager right to privacy in public places,245 public documents,246 and
truthful-yet-shameful histories.247
However, the spirit of this proposed European right should be
adopted privately to safeguard individual dignitary interests. Employer
policies could include grandfather clauses to forgive past reputational scars
evidenced online before the date of hire, and employers could help their
employees manage their individual reputations online in a mutually satis-
factory and beneficial way.
F. An Employee’s Right to an Off-Duty Private Life
As noted above, the EU’s privacy paradigm is more in line with the
reported online privacy expectations of our respondents. European
employees have a right to dignity and a private life that does not stop at the
employer’s doorstep. This right balances the employer’s property rights
against the employee’s dignitary protection.248 Canadian courts have simi-
245See, e.g., Daly v. Viacom, Inc., 238 F. Supp. 2d 1118 (N.D. Cal. 2002) (finding no expec-
tation of privacy with respect to kissing in a bathroom stall because the couple also kissed on
a street corner in plain sight); Wilkins v. Nat’l Broad. Co., Inc., 84 Cal. Rptr. 2d 329 (Cal. Ct.
App. 1999) (holding that, because the plaintiff agreed to attend a meeting at a public
restaurant, no invasion of privacy occurred when the plaintiff was secretly audio- and
videotaped); Helen Nissenbaum, Protecting Privacy in an Information Age: The Problems of
Privacy in Public, 17 LAW & PHIL. 559, 565 (1998) (offering a philosophical justification for
“privacy in public” in the face of “the inconsistencies, discontinuities and fragmentation, and
incompleteness in the framework of legal protections and in public and corporate policy”).
246Florida Star v. B.J.F, 491 U.S. 524 (1989) (reversing an award of damages to a rape victim
whose name was published in a newspaper because the name had been reported in a police
report and was a matter of public significance).
247Melvin v. Reid, 112 Cal. App. 285, 290–91 (Cal. Ct. App. 1931) (“When the incidents of a
life are so public as to be spread upon a public record they come within the knowledge and
into the possession of the public and cease to be private.”). Despite this proclamation, the
California Court of Appeals held in this famous 1931 case that a reformed prostitute could
sue for invasion of privacy when producers of a film revealed she was a former prostitute who
had been tried for murder. The court relied on the fact that the woman had reformed her life
and that the producers revealed other private information. Id. at 292–93; see also Hall v. Post,
372 N.E.2d 711 (N.C. 1988) (holding no recovery for injury caused by a newspaper’s
publication of family secrets, which included the abandonment of a child at a carnival and her
illicit adoption).
248For more on dignity as a basis for workplace privacy, see generally Avner Levin, Dignity in
the Workplace: An Enquiry into the Conceptual Foundation of Workplace Privacy Protection Worldwide,
11 ALSB J. EMP. & LAB. L. 63 (2009). For more detailed discussions of the differences between
2012 / Social Media Privacy and the Twenty-First-Century Employee 121
larly developed rubrics for drawing the elusive line between the
employer’s rights and the employee’s private life.249
For practical and free speech reasons, it would be futile to focus
regulatory efforts on suppressing the online information itself. Any pro-
posal to protect individuals from the unjust consequences of an employer’s
privacy intrusion should focus on imposing reciprocal duties on the
employer. One publicly accepted model of limiting action on the basis of
publicly available information is found in the prohibited grounds model of
Title VII. Under Title VII, employers are prohibited from acting against
individuals based on their sex, color, race, national origin, or religion.250
Title VII does not seek to hush the information (e.g., the fact that an
employee is of a certain race or religion) but rather to regulate the
permissible actions that can legally result from the information’s
consideration.
A more aggressive proposal would limit employer action to situations
in which online information reveals evidence of criminal conduct, conduct
that implicates the employee’s performance, or activity that financially
harms the employer. In other words, information that merely reveals
aspects of an employee’s private life or off-duty conduct should not alone
be grounds for adverse employment decisions. While this proposal finds its
format in Title VII, its substance is also well established in Canadian law,
which utilizes the previously discussed five-factor analysis for evaluating
off-duty conduct.251
Limiting the basis of employment decisions strikes an even balance.
On the one hand, we do not want to protect individuals who have been
involved in nefarious affairs, and we believe that society benefits from
privacy laws and jurisprudence in the United States and the EU, see generally Nancy J. King
et al., Workplace Privacy and Discrimination Issues to Genetic Data: A Comparative Law Study of the
European Union and the United States, 43 AM. BUS. L.J. 79 (2006); Levin & Nicholson, supra note
70.
249See R. v. Cole, [2011] 105 O.R. 3d 253 (Can. Ont. C.A.), available at http://
www.ontariocourts.on.ca/decisions/2011/2011ONCA0218.htm.
25042 U.S.C. § 2000e-2(a)(1) (2006). Similar protection exists in other countries. See, e.g.,
Canadian Human Rights Act, R.S.C. 1985, c. H-6, § 3.
251See supra text accompanying note 171 (listing the factors as (1) whether a crime had been
committed, (2) the harm to the employer’s reputation or product, (3) the ability of the
employee to continue to perform his or her duties satisfactorily, (4) the effect on other
employees, and (5) whether the employer is able to continue managing and directing
employees efficiently).
122 Vol. 49 / American Business Law Journal
having more information. On the other hand, we do not want to unjustly
harm individuals because online media have made their information acces-
sible across contexts and boundaries.
Ultimately, the foregoing recommendations are a first step in devel-
oping legal and normative tools to simulate territorial privacy rights
online. Our survey respondents confirmed that online participation
should not translate, at least in their ethos, to unlimited publicity. How we,
as a society, set limits on online information—as imagined by the Millennial
respondents—will define the role of privacy in the future workplace.
CONCLUSION
In his dissent in O’Connor v. Ortega, Justice Blackmun argued that defining
privacy by physical space is illusory, in that “the tidy distinctions . . .
between the workplace and professional affairs, on the one hand, and
personal possessions and private activities, on the other, do not exist in
reality.”252 Indeed, this is especially the case whenever digital social fora
meet the workplace—contexts collapse, intermingling relationships and
information unrestricted by time and space. As with other historical break-
downs in public/private boundaries, the incursion of social media in the
workplace calls for an evaluation of burgeoning societal expectations and
an assessment of the compatibility of these expectations with existing law
and business practices.
The Supreme Court has recently displayed reluctance in determin-
ing whether expectations of privacy can reasonably exist in modern com-
munication technology, stating that, “[a]t the present, it is uncertain how
workplace norms, and the law’s treatment of them, will evolve.”253 To
clarify this uncertainty, we have analyzed data regarding these emerging
norms as reported by the incoming workforce. In light of the ubiquity of
social media, employers and employees need guidance on how to view
social media in the workplace context and how to shape appropriate
policies on their use. Recent international debates and decisions have also
provided instruction on privacy expectations in the workplace. The
foreign decisions discussed highlight the need for courts and lawmakers to
252O’Connor v. Ortega, 480 U.S. 709, 739 (1987) (Blackmun, J., dissenting).
253City of Ontario v. Quon, 130 S. Ct. 2619, 2630 (2010).
2012 / Social Media Privacy and the Twenty-First-Century Employee 123
grasp the normative realities of communication technology in making and
enforcing laws. As the United States waits for workplace privacy norms to
evolve, relevant international case law provides a potential normative
point of reference. Such analysis also provides the necessary insight to
lawmakers and judges, especially those who are not personally immersed
in the technologies.
We have shown that Millennials crave to live out in the open, offering
traditionally private information online. Despite this transparency, our
findings suggest that Millennial respondents maintain an expectation of
network privacy, or of audience segregation. Our survey respondents
displayed strong reactions against being forced to share with unintended
audiences and objected to being judged across contexts. In line with
Goffman’s observations, it appears that Millennials share the need of all
healthy individuals to engage in performances bound in social establish-
ments and directed at distinct audiences, in order to shape their identities.
Although the rising workforce desires network privacy, technology, law,
and prevailing business practice do not currently support that approach.
Other jurisdictions have successfully begun regulating the intersection of
social media and the workplace. By shedding light on the legal vacuum
and defining burgeoning societal expectations, we hope that clarity can
emerge and employee dignity and autonomy can be preserved.
124 Vol. 49 / American Business Law Journal
Copyright of American Business Law Journal is the property of Wiley-Blackwell and its content may not be
copied or emailed to multiple sites or posted to a listserv without the copyright holder’s express written
permission. However, users may print, download, or email articles for individual use.
Employee Interpretations of Change: Exploring
the Other Side of the Resistance Story
Vaibhavi Kulkarni
This study examines change re
sistance in Indian organizations
by departing from change-agent
perspective, and focusing on the
em p lo yee in te rp re ta tio n o f
change. Change ‘resistors ’ were
identified based on inputs from
HR m anagers im p le m en tin g
change, fo llo w in g which in-
depth interviews were conducted
with fifty -fo u r such employees.
The interviews were qualitatively
analyzed to understand employee
p ersp ective. Findings revealed
that employees may not perceive
their actions as resistance and
legitim ize their behavior based
on ideological reasons or their
assumption that they are behav
ing in long-term interests o f the
organization. Poorly fram ed com
munication can lead to negative
resp o n se tow ards the change,
even i f employees do not fin d the
proposed change problematic.
Vaibhavi Kulkarni is from Indian Institute of
Management Ahmedabad 380015. E mail:
vaibhavik@iima.ac.in
Introduction
Resistance is a complex, multifaceted
phenomenon that has been widely dis
cussed in management literature, and
more often than not, change scholars
have identified employee resistance as a
crucial factor that influences the success
o f change implementation. For the last
several decades change research has
focused on ways to reduce or eliminate
resistance, with the primary assumption
that it is dysfunctional and therefore
thwarts change implementation (Lewis,
2011). Most of this work has been done
in the Western context, with several re
searchers pointing towards the dearth of
change management and change resis
tance studies in the Indian context
(Bhatnagar, Budhwar, Srivastava & Saini,
2010). Bezboruah(2008) called for a need
to understand employee resistance in In
dia.
The concept o f resistance was first
introduced by Lewin (1947), and since
then, it has been defined as a multifac
eted phenomenon that leads to unantici
pated delays, costs and instabilities in
implementing change (Ansoff, 1988);
behavior that attempts to maintain the
246 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
mailto:vaibhavik@iima.ac.in
Employee Interpretations o f Change
status quo when the organization wants
to change the status quo (Zaltman&
Duncan, 1977); willingness to engage in
deception (Shapiro, Lewicki& Devine,
1985); or as a reactive process that sig
nals power relations and organizational
members opposition to initiatives taken
by other members (Jermier, Knights &
Nord, 1994).
Needless to say, most o f the times
resistance has been described in nega
tive terms – it either prevents organiza
tions from carrying out change imple
m entation or creates challenges that
make this process more difficult. Resis
tance research can be broadly divided
into two approaches: the first which pro
vides a more conventional, traditional
view o f resistance recognizes it as a
barrier to change processes and studies
it primarily from the change-agent’s per
spective. Researchers taking a contem
porary view of resistance question the
traditional ‘change agent centric’ per
spective o f change implementation and
argue for greater focus on employee
perspective. Researchers have begun to
believe that resistance can provide valu
able insights from employees and raise
legitimate concerns about the change
process itself. However, both these
views have primarily been shaped based
on Western concepts of change as well
as resistance. Unfortunately, studies
examining Indian perspectives regard
ing resistance are few and far in be
tween. This article attempts to close this
gap by taking a contemporary view of
resistance by examining it from the em
ployee perspective, and doing so in the
Indian context.
Since resistance has been considered
problematic for change implementation,
most studies focus on attempts to ‘man
age’ resistance. In an effort to under
stand (and prevent) resistance, significant
body of resistance research has focused
on identifying reasons that lead to resis
tance and thereby managing resistance.
Factors Leading to Resistance
Schein (1993) found change resis
tance to be a ubiquitous phenomenon in
organizations. Researchers have identi
fied a wide variety of factors that pro
vide explanation for resistance: organi
zational culture, organizational politics,
lack of resources, lack o f commitment,
insufficient information, poor timing, lack
of trust, uncertainty, fear o f unpleasant
consequences (Dent & Goldberg, 1999;
Labianca, Gray & Brass, 2000), psycho
logical support, gradual and flexible par
tic ip a tio n o f change (F ernandez &
Rainey, 2006), loss o f status or power,
lack o f reward, disruption o f routine
(Gilley, Godak& Gilley, 2009). With the
emergence o f such wide variety of fac
tors, some researchers attempted to clas
sify them in to broad categories. Largely,
literature suggests that resistance can be
because of individual or organizational
factors, though focus seems to be more
on individual reasons for resisting change.
This focus is not surprising because
change researchers have acknowledged
that it is not possible to change organiza-
It is not possible to change orga
nizations in meaningful ways unless
the employees change.
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 247
Vaibhavi Kulkarni
tions in meaningful ways unless the em
ployees change (Poole & Van de Van,
2004).
In d iv id u a l F a cto rs: E ffectiv e
change im plementation assumes that
employees begin believing differently,
thinking differently and behaving differ
ently, thus placing emphasis on individual
level acceptance of change. For instance,
change acceptance and resistance has
been linked to individual personality char
acteristics (Oreg, 2003). In his study,
Oreg developed a resistance to change
scale based on personality attributes such
as intolerance, reluctance to lose control,
cognitive rigidity and dispositional ten
dency.
Resistance literature also emphasizes
understanding the cognitive processes
underlying employee resistance. Lau and
Woodman (1995) tried to provide a cog
nitive explanation for employee reactions
to change by using the concept o f indi
vidual schemas. They posit that schema
can help people make sense of informa
tion in the environment and when orga
nizations undergo change, members have
some interpretations and expectations of
these changes. Understanding change
schema can help us examine employees’
current change orientation, anticipate
expectations about future change and
identify the possibility of change resis
tance beforehand. Similarly, Labianca,
Bray and Brass (2000) found that change
recipients’ inability to revise old decision
making schemas and enact new schemas
can lead to resistance during change pro
cess. They found that resistance was in
stigated by employee self -interest and
was further motivated by skepticism re
garding management’s commitment to
the new change schema. Another popu
larized assumption about resistance is that
emotional responses have predominantly
negative implications for change imple
mentation and scholars have associated
them with irrational resistance (Kiefer,
2005). To a large extent, negative emo
tions such as fear, anxiety, stress and in
security have been perceived to be an
individual problem, wherein the employee
lacks the maturity or ability to appreci
ate change (Carr, 2001).
O rganizational F a cto rs: Though
several scholars have argued that resis
tance to change is also built into organi
zational factors (Burke, 2002), there are
relatively few studies looking at macro
level reasons for resistance. Waddell and
Sohal(1998) identify systems, processes,
climate and culture as factors causing a
state of inertia that leads an organization
towards greater reliability and predict
ability which, in turn, makes it difficult
for agents to implement change. There
has been some focus on understanding
organizational culture and capabilities to
anticipate and manage change resistance
(Jones, Jimmieson & Griffiths, 2005).
Top management support and com
mitment to change are expected to play
a crucial role in change acceptance, since
skillful and strategic leader can success
fully bring together disparate employees
and overcome obstacles (Fernandez &
Rainey, 2006). Employee resistance is
also likely to be high when it is perceived
that organizational resources and capa
bilities do not support the proposed
248 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
Employee Interpretations o f Change
L ack o f reso u rces can lead to
higher stress levels and even ne
glect of organizational functions.
change. Since planned change involves
redeployment or redirection of resources,
lack o f resources can lead to higher
stress levels and even neglect o f organi
zational functions(Burke, 2002). Finally,
factors such as broken agreements, vio
lation of trust, communication breakdown
and misrepresenting o f situation have
been found to be major causes of resis
tance by scholars (Reichers et al., 1997;
Ford, Ford &D’Amelio, 2008).
Embedded Assumptions
These studies mentioned in the ear
lier sections provide ways o f preventing
resistance by identifying factors that can
lead to resistance, but do not truly en
gage with the notion o f resistance in a
meaningful way. There is little interest in
understanding how recipients make sense
o f this process; researchers are prima
rily concerned with efficient accomplish
ment o f management goals, leading to
preventative prescriptions for overcom
ing resistance.
During recent times, however, re
searchers have begun to question the con
ventional wisdom that people always re
sist change. An oft repeated critique of
negative approach towards resistance is
that almost all discussions o f resistance
take place from the change agent’s per
spective. Therefore any response that is
not in keeping with the change agent’s
expectation is perceived as resistance
People do not resist change per se,
but may resist the uncertainty as
sociated with the unknown.
(Bartunek, 1993). This one sided approach
towards understanding change resistance
leads us to conceptualize resistance as a
problem that is invariably caused by the
recipient and it is up to the change agent
to manage or overcome this problem.
Such ‘change agent centric’ view, accord
ing to Ford et al. (2008), assumes that an
account of change resistance is an accu
rate report provided by an unbiased source
presenting an objective reality. Human
resource managers and change scholars
have paid scant attention to the perspec
tives of those facing the change and over
whelmingly, research takes the perspec
tive of the management implementing the
change. Further, Piderit (2000) draws our
attention to managerial tendency of asso
ciating resistance with recipient inability
to accept change and fundamental attri
bution error. Change agents responsible
for implementing change are likely to
blame others (in this case, change recipi
ents) for ineffective change implementa
tion rather than accepting their own role
in this process.Dent and Goldberg (1999)
suggest that people do not resist change
per se, but may resist the uncertainty as
sociated with the unknown, or the way in
which change is implemented, or certain
rationale behind change implementation.
Objective of the Study
This study takes a contem porary
view of resistance and views resistance
from the employee viewpoint through in-
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 249
Vaibhavi Kulkarni
terpretive approach. This approach is not
new; Isabella (1990) argued for the need
to use interpretive approach to under
stand sense making during change pro
cess over two decades ago. It is only
recently that this perspective is gaining
ground (Putnam, Grant, Grant & Cutcher,
2005). According to Isabella (1990),
change processes often unfold over a
long period of time, thus demanding con
stant adjustment on the part of those in
volved in change. She argues that the
studies that have focused on cognitive
shifts and schemas have viewed the pro
cess from behavioral perspective and not
interpretive perspective. Our understand
ing o f change is restricted to a large ex
tent to the observed behavior of the em
ployees, but we know little about the in
terpretations associated with these be
haviors. This study takes the interpretive
approach by examining the notion o f re
sistance at Indian workplace by focus
ing on the employees facing the change
rath er than those im plem enting the
change. In other words, it attempts to
look at the employee perspective for two
significant purposes: first is to move away
from traditional, change agent perspec
tive o f resistance and second is to con
tribute to our understanding of resistance
in the Indian context, since there is little
knowledge o f how the change unfolds in
Indian organizations. Accordingly, the
study asks the following questions:
1: How do employees make sense of
their own reaction to change initia
tives?
2: How does employee interpretation of
change influence their reaction and
readiness towards change?
Data Collection
Data was collected through in-depth
interview method. Approximately 75 HR
managers present at a management con
clave on Change Management in India
were requested to share information re
garding change implementation. They
were asked to provide contact informa
tion of the employees that fulfilled the
following criteria: a) the employees were
significantly affected by the change, and
b) their response to the proposed change
was perceived as negative by change
implementers. After a 45 day gap, the
employees were contacted to get their
views on the change process. Eighty-
seven employees were contacted on the
phone and during the introductory con
versation they were assured of confiden
tiality regarding the interview,along with
the guarantee that their conversations
would not be shared with any of their
organizational members, including their
supervisors (Appendix 1 for preliminary
telephone script). The same introductory
script was repeated for all the phone
calls. Out of the 87 employees contacted,
54 agreed to do the interview (Appendix
2 for participant details).
Typically two or three rounds o f in
terviews were conducted to build trust
and allow participants to open up regard
ing their change experience (Table 1 for
details). The interviews were conducted
over a four-month period. Due to the
manner in which participants were ap
proached, none of the interviews were
reco rd ed . A research a ssistan t was
present during the interviews and was
assigned the task o f taking down the in-
250 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
Employee Interpretations o f Change
terviews verbatim for purposes o f tran
scription. Initially, a set o f open-ended
guiding questions (Appendix 3) were
asked to get participant perspective to
ward change, though, as comfort level
o f the participants increased, the inter
view s led to d e e p e r n a rra tiv e s o f
change.
Table 1 Details of Interview Sessions for 54 P articipants
Number o f
Participants
Number o f Interviews
per participant
Approximate Number o f Minutes
per One Interview
27 2 120
20 3 80
5 1 180
2 1 120
Data Analysis
The data was examined using con
tent analysis technique, defined as a
“method for subjective interpretation of
the content o f text data through the sys
tematic classification process of coding
and identifying them es or p a tte rn s”
(Hsieh & Shannon, 2005: 1278). Content
analysis requires development of coding
schemes that work as translation devices
and enable researchers to organize data
iqto categories. Categories are themes
that are either directly expressed in the
text or are derived from the text by the
analyst. The final step is to identify rela
tionships among categories. For the pur
poses o f this study, content analysis was
conducted using the qualitative analysis
software Atlas.ti. The tools o f the pro
gram enable researchers identify themes,
create coding schemes leading to vari
ous categories o f data, and recognize
patterns that allow for understanding of
the complex relationships between vari
ous codes. Through Atlas.ti large amounts
o f data in the form o f documents and
audio-visual files can be stored as herme
neutic units (HU), which in turn contain
primary documents, field notes, interpre
tive memos, codes and categories, direct
quotations, etc. A total o f 178 primary
documents were created in Atlas.ti, out
o f which 121 represented interview tran
scripts, and the rest comprised field notes
in the form of observation notes, and
memos created during analysis.
During the first phase o f analysis,
each line of each primary document was
analyzed to understand the ways in which
organizational members talked about the
change and resistance to change. Spe
cific text was coded by the same label
when found to be conceptually similar,
and as analysis progressed, codes were
further refined. The first level coding
facilitated creation of themes and catego
rized at the content level, and the second
level coding led to identification of asso
ciations and patterns through inter-link
ages o f codes. The second level coding
led to creation o f Super-codes, which
aided by the use o f Co-Occurrence tool
of Atlas.ti. This tool allows researchers
to retrieve codes that occur in proximity
to each other, which in turn facilitates
recognition of connections between cer-
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 251
Vaibhavi Kulkarni
tain codes and allows for establishment
of relationships.
The study found three main themes
running across the notion o f resistance
at workplace, namely ideological reasons,
organizational good and expression of
voice.
‘Ideological’ Resistance
Analysis of the interviews revealed
that several employees viewed their re
action not as resistance but as a stand
taken to conserve certain principles or
world views (fig. 1 ). When discussing
their reactions to change, most o f them
chose to term their actions not as resis
tance but as behaviors undertaken out of
sense of responsibility or obligation.
Most of them chose to term their
actions not as resistance but as be
haviors undertaken out of sense of
responsibility or obligation.
Fig. 1 Atlas.ti Network View for Super-codes on Findings for Ideological Resistance
252 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
I
Employee Interpretations of Change
The reasons for the sense of respon
sibility varied, depending on the context
of change, their designations and the or
ganizational affiliation. Further, the stand
taken was either to reduce the disso
nance between individual values/norms
and the perceived changes within the
organization or dissonance between or
ganizational values /norms and perceived
changes. The study found age to be a
crucial factor with regard to the type of
dissonance. The narrations by the older
generation typically centered on per
ceived conflict between what is, namely
current organizational culture, and what
will be, namely future organizational cul
ture, due to the change implementation.
One o f the participants who was faced
with organizational change related to pay
structure and perform ance appraisal
stated: “With 20 years in this organiza
tion, I can tell you we are going in the
wrong direction. This incentive will lead
to cut throat competition and inter-depart
mental fights. It won’t matter to me be
cause I am not interested in rising up at
the cost of friends, but it is my duty to
point it out. I have written to the Chief
General Manager, but let’s see whether
he listens.” (Participant # 7)
As mentioned earlier, those with 10
or less than 10 years o f experience typi
cally cited how they struggled with the
proposed change primarily because it
clashed with their personal beliefs re
garding what was the ‘right’ thing to do.
For instance, a 32 year old corporate
communications employee talked about
her discom fort with the decision to
outsource the design aspect o f their
brand building: ’’Even if the company has
a rationale related to cost cutting or
something like that, the studio employ
ees have been hired for their creative
a b ilitie s, not liaiso n w ith some ad
agency. There needs to be respect for
individual talent. Speaking up is the only
thing one can do, and I would rather do
that than keep shut and go against my
beliefs.’’(Participant # 13)
Symbolic or Sacrificial
The study found that those who op
posed change due to ideological factors
did so based on certain assumptions re
lated to how these actions would play out
within the organization. One of the find
ings was the belief that their actions
would be more along the lines of sym
bolic gestures and may not yield any con
crete results.
Those who opposed change due to
ideological factors did so based on
certain assumptions related to how
these actions would play out within
the organization.
The undertaking was more of an at
tempt to delegitimize the change rather
than a call for action against the change
implementers. The attempt to discredit
the change took many forms, such as sig
nature campaigns, emails to the business
unit heads or other top management of
ficials, refusal to participate in input so
licitation regarding change and refusal to
provide feedback during change imple
mentation. As noted by participant #
53:”It may not make a difference in
terms of outcome, but it is my duty to
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 253
Vaibhavi Kulkarni
show that there are problems here, is
sues that have not been addressed.”
The second scenario envisaged by
the participants was that they would face
severe consequences because o f their
viewpoint, but they saw it as an inevi
table part o f larger context in which they
were situated. This was partly due to
strong b elief systems and sense o f what
they perceived to be right or wrong.
Organizational Good
A n o th e r d o m in a n t th e m e th a t
em erged from the interview s was the
concept o f resistance as something that
was perceived to be helpful for the or
ganization. There was a b elief that the
change is not going to be as beneficial
for the organization as proposed by the
change agents and in fact, may harm the
organization if not implemented appropri
ately. The underlying patterns between
various codes revealed two significant
aspects related to this b elief (fig. 2). The
first one was the concern for organiza
tional well-being, and second one was the
concern for organizational team mem
bers, which translated into a quasi- lead
ership role undertaken by those speak
ing up against the change. The reactions
were based prim arily on the uncertainty
surrounding change and the manner in
which it would affect the organization in
the long run.
Fig.2 Atlas.ti Network view for Super-codes on Findings for Organizational Good
254 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
Employee Interpretations o f Change
Organizational Well-being
The uncertainty or lack o f informa
tion surrounding the nature of change and
im plementation tactics emerged as a
major issue for the participants. One of
the frequent concerns was the dearth of
information surrounding change, leading
to high levels of anxiety regarding the im
plications. One o f the participants, for
instance, explained how he found the
timeline problematic because the conse
quences of the change were not clear to
him: “We are changing the entire supply
chain system but the timeline shared by
HR does not indicate if there will be trial
run or what will happen if the system
crashes or whether clients are in the loop.
There’s all this talk and no actual infor
mation. We are a small unit so our rela
tionship with vendors will take a beating
if there are glitches,’’(Participant # 29)
Several participants also seerrted to
be concerned about the difference be
tween top management assumptions and
field-level realities, thus implying that the
proposed changes could fail because of
misconceptions regarding what was hap
pening out there in the field. Citing one
such issue, a senior safety manager (Par
ticipant # 1 ) elaborated on what he per
ceived to be ill-thought policy change
regarding travel claims and entitlements
which would negatively impact the sales
force: “This is a case o f change seeming
to be logical or appropriate in the corpo
rate office when a bunch o f top people
discuss it but it will not work in reality.
There will be unnecessary bottlenecks
that negatively affect my men’s perfor
m ance.”
Team’s Well-being
Closely associated with the idea of
organizational well-being is the notion of
team or peer well-being. Several par
ticipants echoed not only the view of or
ganization being unaware o f ground re
alities (mentioned in the earlier quote),
but were also o f the b e lie f that the
change was not well-thought. This was
attributed to the assumption that the or
ganization has not taken input from the
ground-level and therefore certain as
pects of change are going to create prob
lems for their team or themselves as well
as peers. Further, interviews revealed
that participants’ actions were often mo
tivated by their concern for their team
well-being along with their conviction
that the change would directly affect the
team perform ance levels and career
growth. At times, this was translated
into a sense of responsibility toward the
team and the response to change was
articulated as characteristics befitting a
team leader. “Changes in parameters of
appraisal affect all o f us. They are try
ing to get us to run in circles but if we
don’t speak up now, we can only blame
ourselves later. My team expects me to
provide this feedback and frankly as
their supervisor I think their expectations
are valid” (Participant # 49). In some
cases, the impending changes related to
the nature o f work and lack o f clarity
regarding the way in which the change
would play out, affected anxiety levels
o f organizational members. The re
sponses to the rising anxiety levels
ranged from demands for more infor
mation to demand for modification in
change policies.
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 255
Vaibhavi Kulkarni
Expression of ‘Voice’
The final theme emerging from in
terviews was that o f response to change
as a need for self-expression or making
their voice salient. Analysis suggested
that the way in which change was framed
and announced made a significant impact
on how change was perceived. Further,
when organizations did not provide the
em ployees an o p p o rtu n ity to clarify,
make suggestions or provide input, it
seemed to negatively impact employee
self-worth. Several o f the participants
who were senior in terms o f their desig-
Fig.3 Atlas.ti Network View for Super-codes on
nations or work experience within the
organization experienced anguish at the
w ay in w hich the change w as being
brought about (fig. 3). Two aspects domi
nated the theme o f change resistance as
need for self-expression and voice – first
one was that o f employee need for vali
dation and their b elief regarding loss o f
face which resulted due to the way in
which change was planned as well as
announced; second was the assertion that
their voice was im portant and could not
be drowned by the authoritative or hier
archical manner in which change was
being implemented.
Findings for Employee Voice
Authentication of Self-worth
As m entioned earlier in the article,
the manner in which the change was com
municated had a significant impact on
ch ange-readiness. F irst one was the
medium or channel chosen to communi
cate change. Several participants were
256 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
I Employee Interpretations o f Change
of the belief that their position within the
organization or the relationship they
shared with the change implementers
was such that receiving the information
through a standard email or memo was
patronizing and unbecoming in light of
their stature. “It is a matter o f great dis
tress. For them to tell me in such a man
ner, without any prior consultation and
then expect me to just accept it, it is sim
ply not done.” (Participant # 25).The re
sulting feeling of loss of pride also led
some o f the employees to react nega
tively and be defiant, even if the nature
o f change per se was not found to be
problematic. “I guess what’s being pro
posed is not that bad and we could work
with it. But the fact is, decisions are be
ing made in an ivory tower and their high
handed attitude is putting us all down. We
might as well be nothing. We need to be
heard, we need to have some self-re
spect.” (Participant # 8)
Change Framing
The framing o f the message also
made a significant impact on change-
readiness of those interviewed. Several
participants pointed out that change an
nouncements and their framing affected
how they anticipated the change to un
fold. “The announcement of change was
so one-sided; it just mentioned what was
happening and how it was good for us.
There was no mention o f why this was
The framin g o f the message also
m a d e a s i g n i f i c a n t im p a c t on
ch a n g e-rea d in ess o f those in ter
viewed.
happening, how it would unfold and what
we should expect regarding our job roles.
It was almost as if we should be follow
ing the top management blindly, with no
in d iv id u a l th o u g h ts o f our
own.’’(Participant # 3).The tone and the
contents of change communication were
perceived as patronizing and several par
ticipants expressed how they felt con
strained by the environment surrounding
change implementation. This, in turn,
prompted them to express their discon
tent related to change, though deeper dis
cussions during interviews revealed that
dissonance was caused by framing of the
change messages rather than the actual
change itself.
Discussion & Conclusion
Change presents an organization with
new realities that employees need to ac
cept and try to meaningfully interpret.
Based on recent shifts in our understand
ing of resistance (e.g. Reissner, 2008),
this study has moved away from em
ployee actions o f resistance and focused
on employee interpretations o f change.
The initial finding of employee resistance
due to ideological reasons can be linked
to the notion o f principled dissent. Prin
cipled dissent is the effort by employees
to challenge the status quo on ethical
grounds or principles (Kassing &Avtgis,
1999). Such resistance is driven by em
ployee commitment and sincere interest
in change outcomes and therefore HR
p ro fe s sio n a ls and o th er change
im p lem en ters need to give such
dissentersa serious consideration. Fur
ther, some of the participants in the study
felt obligated to speak up against what
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 257
Vaibhavi Kulkarni
they perceived was problem atic, even
when they realized that it would not im
pact the outcome (resistance as symbolic)
or would affect their career negatively
(resistance as sacrifice). Engaging in dia
logue with such employees for sense giv
ing purposes can serve to enhance the
change im plem entation process, espe
cially if they are able to see the long term
b e n e fits o f ch an g e and becom e key
influencers within the organization.
Further, when employees react nega
tively to change due to their desire to help
the organization (for organizational good),
it calls for change agents to examine their
initiatives more closely and prevent them
from taking change-related assumptions
for granted. By resisting a change, em
p lo y e e s o fte n try to b rin g to
m anagem ent’s attention issues that need
to be addressed for efficient functioning
o f the organization and provide feedback
fo r sm o o th ch an g e im p le m e n ta tio n
(Gilley, Godak& Gilley, 2009). Often large
scale change implem entation is an ex
tremely complex task and it is not pos
sible to plan for every minor contingency
or every ground-level complication. Thus,
employee objections may contain infor
mation that can be used to improve the
change initiative. Taking input regarding
ground-level information could serve the
multiple purpose o f allaying anxieties sur
rounding change, generating a more en
thusiastic response to the change itself
and getting the opportunity to iron out
glitches that may have escaped the no
tice o f top management officials.
A s n o te d by R a m n a ra y a n and
N ilakant (2006), within the Indian con
text, organizational members are more
likely to be active participants in change
when they are able to contribute to the
change process. In fact, management
literature overwhelmingly suggests that
employee involvement, specifically, em
ployee participation in change processes,
is the best way to reduce resistance.The
need for em ployee p articip a tio n was
brought up by Coch and French (1948)
in their classic study on change process,
who argued that participation increases
employee commitment and therefore re
duces resistance. Since then, participa
tion has been widely cited as being the
best way to overcome resistance (Burke,
2 0 0 2 ). A c c o rd in g to B a s in g e r an d
Peterson (2008), participation helps em
ployees prepare cognitively for future
adjustments, thus leading to better out
comes, whereas lack o f participation can
lead to resistance.
Organizational members are more
likely to be active participants in
change when they are able to con
tribute to the change process.
The study found that within the In
dian context, participation may be impor
tant not only to solicit employee feedback
and prepare employees for im pending
change, but also because non-involve
ment o f certain section o f employees may
lead to loss o f face and status for them.
In high context cultures such as India,
change implementers need to take into
consideration the relationship between
change agent and the recipient. An im
personal, logical message with a sense
o f objectivity regarding change may work
258 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
Employee Interpretations o f Change
in low-context cultures, but within the
Indian context, the study found that the
announcement o f change and rationale
for change are not seen as outside and
apart from communicating parties – rea
sons by themselves are not persuasive,
it is the context, the relationship and the
way it is com m unicated that m atters.
Further, the choice o f the medium for
com m unication can carry a sym bolic
m essage that goes beyond the actual
content o f the message. These symbolic
cues go beyond the objective features o f
the m edium ; they are in terp retatio n s
based on shared meaning o f a medium
that has been developed over time. The
medium for communication is based on
continuum o f ‘richness’ i.e. the ability to
accommodate two-way communication
and the extent to which the medium simu
lates actual presence o f the communica
tors. Face to face communication is the
richest medium followed by telephone,
email and various forms o f formal and
informal written communication. Within
the Indian context, where relationships
are personalized within the workplace
(Sinha, 2000), the symbolic meaning as
sociated with the medium o f communi
cation during change announcements as
sumes vital importance.
Finally, members o f collectivist cul
tures have been found to dem onstrate
higher commitment to work due to an
ingrained sense o f duty and responsibil
ity and therefore the popular notion is that
they are less likely to engage in overt
resistance. At the same time, Chatterjee
& Pearson (2000) have noted that this
orientation is more salient at the family
and kinship level, and does not always
hold true within the organizational con
text. In keeping with this argument, this
study found that in terms o f change com
munication, ignoring employee’s sense o f
individuality could have a negative impact
on their willingness to accept change.The
need for self-expression is an important
finding, especially since researchers of
ten make the assumption that authority
and hierarchy within Indian organizations
mitigates the employee need individual
expression.
In conclusion, so far, the most com
mon way o f managing change resistance
has been to ‘resist’ resistance. This pa
per moves away from this concept and
posits that resistance may not always be
detrimental to change if the HR manag
ers engage meaningfully with those react
ing negatively to change. As found by the
study, in several cases, it was not the
change per se that was problematic. Em
ployee actions were often guided by their
belief that the change would lead to orga
nizational-level problems (erosion o f val
ues or performance issues) or team level
problems (issues with employee well-be
ing and sense o f unfairness). Many o f
these perceptions resulted from lack o f
information regarding change and increase
in anxiety or uncertainty surrounding
change. While issues related to organiza
tional and individual uncertainty or anxi
ety have been addressed in resistance-re
lated research within the Western context,
we need more studies to get a nuanced
understanding o f how these perceptions
are shaped in Indian workplace.
Other reasons for negative responses
included the manner in which the change
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 259
Vaibhavi Kulkarni
was announced or the lack o f input so
licitation during planning of change. The
loss of face and self-doubt experienced
by senior employees (in terms o f desig
nation or in terms o f work experience)
points to the need for more contextualized
studies that can unpack how societal cul
ture influences organizational members’
reaction to change. In a similar vein, we
need more studies to understand how
change framing and choice of medium
can lead to greater resistance, even if the
change is not problematic. There is a
definite need for greater focus on em
ployee resistance in India so that we can
generate contextually relevant knowledge
regarding implementation o f planned
change. Finally we need to examine re
sistance through the local and emergent
dimension, instead of taking the view that
resistance needs to be curbed without
understanding their causes or implica
tions. As indicated by this study, there is
much to be gained by understanding how
and why em ployee resistan ce takes
place.
R e f e r e n c e s
Ansoff, I. (1988), The New Corporate Strategy.
New York: John Wiley & Sons.
Bartunek, J. M. (1993), “The Multiple Cogni
tions and Conflicts Associated with Sec
ond Order Organizational Change” in J.K.
Murnighan (ed.), Social Psychology in Or
ganizations: Advances in Theory and Re
search, Englewood Cliffs, NJ: Prentice-Hall.
Bezboruah, K.C. (2008), “Applying the Congru
ence Model o f organizational Change in
Explaining the Change in the Indian Eco
nomic Policies”, Organizational Change
and Social Transformation, 5(2): 129-40.
Bhatnagar, J., Budhwar, P., Srivastava, P. & Saini,
D. S. (2010),’’Organizational Change and
Development in India: A Case o f Strategic
Organizational Change and Transforma
tion”, Journal o f Organizational Change
Management, 23(5): 485-99.
Burke, W.W. (2002), O rganization Change:
Theory and Practice, Thousand Oaks, CA:
Sage.
Carr, A. (2001), “Emotion and Emotionality in a
Process of Change”, Journal o f Organiza
tional Change Management, 14(5): 421-34.
Chatterjee, S. R. & Pearson, C. A. (2000), “In
dian Managers in Transition: Orientations,
Work Goals, Values and Ethics”, MIR:
M a n a g em en t I n te r n a tio n a l R eview ,
40( l):81-95.
Coch, L. & French, J. R. P (1948), “Overcoming
Resistance to Change”, Human Relations,
1:512-32.
Dent, E.B. & Goldberg, S.G. (1999),’’Challenging
Resistance to Change”, Journal o f Applied
Behavioral Science, 35(1): 25-41
Fernandez, S. & Rainey, H. G. (2006). “Manag
ing Successful Organizational Change in the
Public Sector”, Public Administration Re
view, 66(2): 168-76.
Ford, J. D., Ford, L. W.& D ’Amelio, A. (2008),
“Resistance to Change: The Rest o f the
Story,” Academy o f Management Review,
33(2): 362-77.
Gilley, A., Godek, M. & Gilley, J. W. (2009),
“Change, Resistance, and the Organiza
tional Immune System”, SAM Advanced
Management Journal, 74(4): 4-10.
Hsieh, H. & Shannon, S. E. (2005), “Three Ap
proaches to Qualitative Content Analysis”,
Qualitative Health Research, 15(9): 1277-
88.
Isabella, L. A. (1990), “Evolving Interpretations
as a Change Unfolds: How Managers Con
strue Key O rganizational Events”, The
Academy o f Management Journal, 33(1):
7-41.
260 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
Employee Interpretations o f Change
Jermier, J.M., Knights, D. & Nord, W (1994),
Resistance and Power in Organizations,
London: Routledge.
Jones, R. A., Jimmieson, N. L. & Griffiths, A.
(2005),’’The Impact o f Organizational Cul
ture and Reshaping Capabilities on Change
Implementation Success: The Mediating
Role o f Readiness for Change”, Journal o f
Management Studies, 42(2): 361-86.
Kassing, J. W. &Avtgis, T. A. (1999), “Examin
ing the Relationship between Organiza
tional Dissent and Aggressive Communica
tion”, Management Communication Quar
terly, 13(1): 100-15.
Kiefer, T. (2005), “Feeling Bad: Antecedents and
Consequences o f Negative Emotions in
Ongoing Change”, Journal o f Organiza
tional Behavior. 26: 875-97
Labianca, G., Gray, B.& Brass, D. J. (2000), “A
Grounded Model of Organizational Schema
Change during Empowerment”, Organiza
tion Science, 11(2): 235-57.
Lau, C.M. & Woodman, R. W. (1995), “ Under
standing Organizational Change: A Sche
matic Perspective”, The Academy o f Man
agement Journal, 38(2): 537.
Lewin, K. (1947), “Frontiers in Group Dynam
ics”, Human Relations,\: 5-41
Lewis L.K. (2011), Organizational Change: Cre
ating Change through Strategic Communi
cation, New York: Wiley-Blackwell.
Oreg, S. (2003), “Resistance to Change: Devel
oping an Individual Differences Measure”,
Journal o f Applied Psychology, 88(4): 587-
604.
Piderit, S. K. (2000), “Rethinking Resistance and
Recognizing Ambivalence: A Multidimen
sional View of Attitudes toward an Organi
zational Change,” Academy o f Management
Review, 25:783-94.
Poole, M. S. & Van deVen, A. H. (2004), Hand
book of Organizational Change and Inno
vation, New York, Oxford University Press.
Putnam, L. L., Grant, D., Grant, M.& Cutcher,
L. (2005), “Discourse and Resistance: Tar
gets, Practices, and Consequences”, Man
agement Communication Quarterly, 19(1):
5-18
Ramnarayan, S. &Nilakant, V. (2006), “Dynam
ics o f Reinvention”, Vikalpa, 31(1): 31.
Reichers, A. E., Wanous, J. P.& Austin, J. T.
(1997), “ U nderstanding and Managing
Cynicism about Organizational Change”,
Academy o f Management Executive, 11(1):
48-59.
Reissner, S.C. (2008), Narratives of Organiza
tional Change and Learning: Making Sense
o f Testing Times, Cheltenham, Edward
Elgar.
Schein, E. (1993), “On Dialogue, Culture, and
Organizational Learning”, Organizational
Dynamics, 22(2): 40-51.
Shapiro, D.L., Lewicki, R.J, & Devine, P. (1985),
“When Do Employees Choose Deceptive
Tactics to Stop Unwanted Organizational
Changtzl”Research on Negotiation in Or
ganizations, 5: 155-84.
Sinha, J.B.P. (2000), Patterns of Work Culture:
Cases and Strategies for Culture Building,
New Delhi: Sage
Waddell, D.& Sohal, A. S. (1998), “Resistance: A
Constructive Tool for Change Management,
Management Decision, 36(8): 543-48.
Zaltman, G. & Duncan, R. (1977), Strategies for
Planned Change, New York: John Wiley &
Sons.
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 261
i
Vaibhavi Kulkcirni
Appendix 1 General Telephone Script to Communicate with Potential Participants
I am a US-bascd researcher, visiting India for data collection related to change management. I managed
to get your contact details from an HR professional from your organization when I recently attended
a Change Management conclave in India. Do you have a minute to talk?
Would you be comfortable talking to me about your experiences related to organizational change?
Confidentiality will be paramount in this case and our discussion will not be shared with anyone in
your organization. Anything you share will be used for research purposes only. O f course, at any
given point o f time if you feel uncomfortable, we can stop talking and 1 will destroy all documentation
regarding our discussion.
My information is available on my university’s website, and when we meet, I can also share with you
the Dean’s contact details, so that you can be assured o f my credentials. This study has been ap
proved by the Institutional Review Board (IRB) and I will show you the approval when we meet. The
approval clearly states that you have the right to stop at any time and if you find the study problem
atic, you can address your complaints to the Board.
If you are comfortable, I would like to meet with you and discuss this further. Can we do so?
Appendix 2 Participant Information1
Number Name Sex Age Industry
1 Neeraj Male 41 Manufacturing
2 Ratnadeep Male 46 Manufacturing
3 Neera Female 33 Manufacturing
4 Yash Male 46 Manufacturing
5 Chetan Male 40 Manufacturing
6 Janak Male 45 Manufacturing
7 Kaushik Male 52 Oil & Gas
8 Deepak Male 48 Oil & Gas
9 Raj an Male 41 Oil & Gas
10 Roopkumar Male 55 Oil & Gas
11 Ashok Male 39 Oil & Gas
12 Disha Female 33 Oil & Gas
13 Preeta Female 32 Pharmaceuticals
14 Shyam Sunder Male 55 Pharmaceuticals
15 Vedika Female 40 Pharmaceuticals
16 Inder Male 48 Retail
17 Kamala Female 42 Retail
18 Bhavya Male 34 Steel
19 Gopalan Male 48 Steel
20 Ishwar Male 40 Steel
21 Hasit Male 39 Steel
22 Zarna Female 48 Telecommunications
23 Urvish Male 43 Telecommunications
24 Teja Male 35 Automobile
25 Sameer Male 51 Banking
26 Utpal Male 50 Banking
1 Pseudonyms given to the participants for reasons of confidentiality
262 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
Employee Interpretations o f Change
27 Brijesh Male 38 Banking
28 Narayan Male 33 Banking
29 Subhajit Male 36 Broking Industry
30 Jasmine Female 30 Construction
31 Hasmukh Male 44 Construction
32 Mamita Female 38 Construction
33 Navjot Male 49 Construction
34 Subramaniam Male 36 Fertilizers & Pesticides
35 Rupa Female 35 Fertilizers & Pesticides
36 Shashank Male 42 Fertilizers & Pesticides
37 Kapil Male 38 FMCG
38 Jay Male 47 FMCG
39 Geetha Female 35 FMCG
40 Subodh Male 40 FMCG
41 Amritlal Male 33 Food processing
42 Santana Female 28 Food Processing
43 Joseph Male 49 Food Processing
44 Faraz Male 36 Food Processing
45 Prasanth Male 48 Food Processing
46 Anvesh Male 31 Food Processing
47 Divya Female 28 Health
48 Shrikant Male 55 Insurance
49 Vishwas Male 35 Insurance
50 Roshan Male 53 Insurance
51 A rpita Female 51 Insurance
52 Rupa Female 44 Insurance
53 Ravikant Male 37 IT Industry
54 Arup Male 33 IT Industry
Appendix 3 Guiding Questions for In-Depth Interviews
Initial Guiding Questions
1. Can you tell me about the change that your organization implemented?
2. When did you first hear about it?
3. What is your role vis-a-vis this change?
4. What was your reaction when you heard about the change?
5. How did other members in your organization react to the change announcement?
6. Did your reaction change over time, or did you continue feeling the same way?
7. Why do you think this change was implemented?
8. What do you think o f those involved with implementing the change?
9. If you had to provide input to those involved in the change, what would you tell them?
10. Can you share some of your key experiences and key organizational events surrounding
the change communication and change implementation?
The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016 263
Perceptions of Territoriality in Open Office
Environment: Impact on Situated Learning
Aneetha Rao Kasuganti & Pooja Purang
This study analyzed the effect o f
territoriality on situated learning
in open-plan offices. A cross-sec
tio n a l study was conducted on
112 p ro fessio n a ls fro m I T and
consultancy companies. Results
o f hierarchical linear regression
with bootstrapping indicated that
territorial behavior was a signifi
cant predictor o f situated learn
ing in open office environments.
Findings o f the study add to the
existing literature on facilitators
o f situated learning by identify
ing that feelin g s o f control and
belonging that territorial behav
ior invokes allow fo r greater in
te ra c tio n th ereb y in c re a sin g
knowledge sharing and prom ot
ing learning that occurs in ev
eryday activities on the job. The
results o f the study also provide
inputs to practitioners, guiding
them in the creation o f environ
ments that support situated learn
ing.
Aneetlia Rao Kasuganti (E-mail: aneethakasug
anti@iitb.ac.in) is Research Scholar &Pooja Purang
(E-mail: purang p @ iitb .ac.in ) is Professor,
Department of Humanities and Social Sciences, IIT
Bombay, Mumbai 400076.
Introduction
Changing technologies, expanding
markets and fierce com petition in the
rapidly changing business environments
have made learning a process by which
organizations develop the ability to face
change and gain com petitive advantage
(Argote, 1999; Stata, 1989). O rganiza
tional learning has therefore captured the
interest o f both researchers and practi
tioners; researchers attem pt to under
stand the phenomenon and identify what
promotes or facilitates learning in orga
nizations; practitioners seek to use this
knowledge to identify interventions that
w ould ensure prom otion o f learning,
th e re b y e n su rin g s u s ta in a b ility and
growth o f the organization. The practice
based view o f organizational learning
considers it as a social process, em pha
sizing its collective and situated nature.
According to this perspective, learning
occurs during activities and practices that
are shared and rooted in m ulti-dim en
sional organizational contexts comprising
individuals, their actions, relationships,
and the physical environment in which the
actions take place (Brow n &Duguid,
1991; Nova, 2005). Ittelson, Franck and
O ’Hanlon (1976) argue that individuals
264 The Indian Journal o f Industrial Relations, Vol. 52, No. 2, October 2016
mailto:anti@iitb.ac.in
mailto:purangp@iitb.ac.in
Copyright of Indian Journal of Industrial Relations is the property of Shri Ram Centre for
Industrial Relations, Human Resources, Economic & Social Development and its content may
not be copied or emailed to multiple sites or posted to a listserv without the copyright holder’s
express written permission. However, users may print, download, or email articles for
individual use.