The Employer's Lawyer

Technology

To Delete, Or Not To Delete

Two recent cases, one from the plaintiff’s side and one from the defendant’s side, highlight the importance of following information retention requirements. Recently, Heather Painter learned a difficult lesson about deleting. Ms. Painter claimed that her boss, a dentist, sexually harassed her. After filing her lawsuit, she deleted some Facebook comments that (allegedly) said she…

Confident It Won’t Remain A Secret

Two fairly new apps are receiving a lot of press lately: Confide and Secret.  While you may have heard them mentioned before, you may not be familiar with what each app offers. Confide is an iOS messaging app that its creators say will allow users to send messages without fear that those messages will be…

Don’t Let Jailbreaking Escape Your BYOD Policy

Bring-your-own-device (BYOD) approaches have been embraced by employers, because they can reduce costs and employees tend to prefer being allowed the freedom to choose their own phones and tablets. Of course, the freedom to purchase and use their own phones and tablets comes with a new set of challenges and, potentially, headaches.  A small, but…

Tight Rope Walking: Social Media Policies and the NLRB

I’ve written about technology and social media before, and how they are continually impacting your business. Social media, particularly, plays a huge role in your employees’ lives. And if you think they’re not accessing social media throughout the day, including work hours, I have a bridge in Brooklyn to sell you. Over the last few…

Dnt Txt N Drv

While many states, including Pennsylvania, have implemented laws the ban texting while driving, the federal government has also thrown its hat into the ring. The Occupational Safety & Health Administration (OSHA) has implemented a Distracted Driving Initiative, which will focus on texting while driving. OSHA calls upon all employers to ban texting while driving and…

Will a BYOD Policy W-O-R-K for You?

One of the most popular trends in the IT world right now is the bring-your-own-device (BYOD) approach, where employees use their own mobile device at work. Its another case of new technology creating new problems. Before implementing a BYOD policy, you need to weigh the risks against the cost benefits. IT departments have spent years…

The Cost of Curiosity

In a growing trend, employers are asking job applicants and employees to provide login information to their Facebook pages and other social networking accounts. Many are questioning the propriety of asking for login information, particularly because an applicant or employee may believe refusing will cost them a job. However, even reviewing social media profiles, or utilizing…

Managing the Madness

Yesterday, the 68 teams taking part in the NCAA Men’s Basketball Championship were announced, and on March 13, 2012, March Madness begins. Employees will have access to scores, streaming audio and streaming video for all 67 games on their work computers, smartphones and tablets. It is estimated that more than 50 million Americans will participate…

The Problem’s Not Just Porn Anymore

Computer policies used to be fairly simple: no personal emails, no surfing the internet on company time, and especially no porn. Now, with social media and “the cloud,” there are so many more avenues for trouble. One of the more prevalent issues recently has been who owns Twitter followers when an employee leaves.  The issue…