A Legal Guide To The Use of Social Media In The Workplace

Gray Plant Mooty
Total Views  :   1734
Total Likes  :  
Total Shares  :  1
Total Comments :  0
Total Downloads :  0

Description

A Collaborative Effort Minnesota Department of Employment and Economic Development A Legal Guide To The Use Of SOCIAL MEDIA IN THE WORKPLACE The Use Of SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE ISBN 1-888404-61-2 A Legal Guide To Gray Plant Mooty . A Legal Guide To The Use Of SOCIAL MEDIA IN THE WORKPLACE is available without charge from the Minnesota Department of Employment and Economic Development, Small Business Assistance Office, 1st National Bank Building, 332 Minnesota Street, Suite E-200, St. Paul, MN 55101-1351. Telephone: (651) 556-8425 or (800) 310-8323 Fax: (651) 296-5287 | Email: deed.mnsbao@state.mn.us Website: www.positivelyminnesota.com/sbao This guide is also available from Gray Plant Mooty, 500 IDS Center, 80 South Eighth Street, Minneapolis, MN 55402 Telephone: (612) 632-3000 Upon request, this publication can be made available in alternative formats by contacting (651) 259-7476. The Minnesota Department of Employment and Economic Development is an equal opportunity employer and service provider. Printed on Recycled Paper With a Minimum of 10% Postconsumer Waste . A Legal Guide To The Use Of SOCIAL MEDIA IN THE WORKPLACE July 2013 A Collaborative Effort Minnesota Department of Employment and Economic Development Gray Plant Mooty Copyright © 2013 Minnesota Department of Employment and Economic Development and Gray Plant Mooty ISBN 1-888404-61-2 . TABLE OF CONTENTS PREFACE...........................................................................................iii DISCLAIMER .........................................................................................v INTRODUCTION................................................................................vii SOCIAL MEDIA AND THE EMPLOYMENT RELATIONSHIP......1 WAGE AND HOUR CONSIDERATIONS.....................................2 DISCRIMINATION LAWS..............................................................4 PROTECTED ACTIVITY LAWS......................................................5 APPLICANT SCREENING LAWS...................................................10 EMPLOYEE PRIVACY CONSIDERATIONS...............................13 FEDERAL LAWS APPLICABLE TO ELECTRONIC COMMUNICATIONS AND DATA...........................................16 OTHER TORT LIABILITY FOR EMPLOYERS..........................18 SAFEGUARDING CONFIDENTIAL AND PROPRIETARY INFORMATION...........................................................................21 EMPLOYER POLICIES AND PRACTICES.................................23 OWNERSHIP OF SOCIAL MEDIA ACCOUNTS............................27 USER GENERATED CONTENT.........................................................33 COPYRIGHT..........................................................................................34 i . TRADEMARKS.............................................................................38 TRADE SECRETS..........................................................................44 DEFAMATION..............................................................................47 PROTECTION THROUGH TERMS OF USE AND PRIVACY AND PRIVACY POLICIES.............................................................49 EFFECT OF SOCIAL MEDIA USE ON PRIVACY AND SECURITY COMPLIANCE...........................................................51 COMPLIANCE WITH SECURITIES AND DISCLOSURE LAWS.......................................................................61 SOCIAL MEDIA AS A MARKETING TOOL..................................65 SOCIAL MEDIA IN LITIGATION....................................................71 SOCIAL MEDIA AUDIT.....................................................................73 SOCIAL MEDIA PLATFORM TERMS OF USE..............................77 RELEVANT LAWS AND REGULATIONS......................................79 ii . PREFACE Although the major social media outlets are no more than twenty years old, their growth in terms of audience and functionality has grown exponentially in that time as businesses recognize the explicit economic value of social media use in areas like advertising, market research, branding, sales and contracting, and other direct involvement with customers and suppliers. That broad functionality, the ability to reach large audiences, and the desire to be a first-adopter of a valuable technology can, however, sometimes lead a business to adopt – at least initially - an uncritical approach to social media use that ignores the need for well thought out review of issues and development of comprehensive use policies. While there is no single body of law governing the use of social media, this publication does offer a primer on the ways in which current law operates in areas like intellectual property protection, human resources and the employer-employee relationship, agency, tort liability, ownership of social media accounts and content, privacy, and the relationship of a business’ own use policies with the policies and terms of use of social media platforms. As the reader will discover, these topics overlap and relate to each other in the business social media context in ways that are not intuitive and which can trip the inattentive business into unconsidered legal liability. iii . The Minnesota Department of Employment and Economic Development is pleased to join with Gray Plant Mooty in developing and publishing these materials. While this is a collaborative publication, a special note of thanks goes to the firm’s attorneys Michael Cohen, Karen Wenzel, Ashley Bennett Ewald, Meghann Kantke, and Kate Nilan as well as summer associate Leah Leyendecker for their work and insight in authoring this publication. Charles A. Schaffer Director Small Business Assistance Office Minnesota Department of Employment and Economic Development July 2013 iv . DISCLAIMER This Guide is designed to alert businesses to legal issues which commonly arise when social media is used in the workplace or as a business tool. It should only be used as a guide and not as a definitive source to answer your legal or business questions. The materials in this Guide are intended to provide general information and should not be relied upon for specific legal advice. Legal and other professional counsel should be consulted. Gray Plant Mooty and the Small Business Assistance Office cannot and do not assume any responsibility for decisions based upon the information provided in this Guide. v .

vi . INTRODUCTION Businesses, large and small, are increasingly recognizing the power of social media and incorporating its use within their business plans. No marketing and communications strategy is complete without some reference to social media. It is hard to ignore the value of Facebook®, Twitter®, LinkedIn®, YouTube®, Pinterest® and other social media platforms that promote such a dynamic interactive dialogue with current and potential customers. Businesses can engage with customers as never before and develop audiences in new ways that are only available through social media. Social media is used to connect with customers, generate brand name recognition and exposure, attract business and increase sales, drive website traffic, improve search rankings, enhance customer service, product development, raise capital, and as a human resources tool. As businesses increasingly utilize social media they face new and evolving legal issues. Whether they collect customer information, use social media to screen employees, market, blog, or use text messaging, they need to become aware of and have a basic understanding of the applicable laws and regulations.

They also need to become familiar with the rules and procedures established by the specific social media platform. No company is immune from the risks inherent in the access to and use of personal information and social media. vii . The purpose of this Guide is to help businesses navigate the legal issues related to the use of social media, to provide a basic overview of the legal landscape with a focus on practical tips, best business practices, and general guidance to help businesses avoid costly mistakes and potential liability. In addition to educating employees on proper use of social media, businesses might also consider adopting appropriate corporate policies on the use of social media. If such a policy is adopted it can be designed and implemented in conjunction with other corporate policies related to use of the internet and technology. As will be discussed in this Guide, any corporate policies instituted must take into consideration the specific practices of the business but must be careful to not cross the line and restrict employee rights. With the increased business use of social media comes new challenges. Business reputation, brand equity, and goodwill can quickly evaporate or be tarnished.

A business can put its most valuable trade secrets at risk, become liable for unfair or deceptive trade practices, violate employment or labor laws, infringe upon another’s intellectual property rights, or if not careful, assume any number of other risks. The value of social media accounts including the followers and “likes” of such accounts can also become valuable corporate assets and should be treated as such. As businesses adopt new and innovative ways to utilize social media they also need to consider how to maintain the value of such assets without incurring liabilities. There is no single body of law governing the use of social media. When a business considers the legal implications of any social media related activity they must look at an amalgamation of United States federal and state laws and regulations. The business must also become familiar with the unique terms of use and privacy policies imposed by the social media platforms accessed and used by the business. viii .

In this Guide we offer an overview of legal issues surrounding businesses’ use of social media. We have not tried to answer every question. It is our hope that this Guide will highlight many of the key issues and cause the reader to ask the right questions regarding the use of social media. We have also tried to identify best practices as ways for a business to mitigate risk. We highly recommend that a business conduct a periodic self-audit of business practices related to privacy, e-commerce, intellectual property and the use of social media.

This audit will allow a business to assess what activities may be necessary and to ensure that risks are minimized. In many cases these activities can be done at little or no cost. Employees should also be given training so that they can understand and implement the business practices and procedures. One thing we know for sure-the laws and practices discussed in this Guide are likely to change in the months and years ahead.

To facilitate revisions or updates, this publication is available on Gray Plant Mooty’s website at www.gpmlaw.com as well as the website of the Minnesota Department of Employment and Economic Development at www.positivelyminnesota.com. If you are looking for the most current version of the Guide, please check the above websites to see if an update has been completed. Michael R. Cohen , CIPP/USA Principal Gray Plant Mooty Law Firm July 2013 ix .

. SOCIAL MEDIA AND THE EMPLOYMENT RELATIONSHIP In the employment context, social media is the water cooler writ large. Employees may gather to gripe, to get to know each other, or to exchange ideas. But unlike the water cooler, employees’ social media communications have the potential to “go viral.” Employers and employees are struggling to define the boundaries of appropriate employee use of technology, including social media, as well as appropriate employer monitoring and management of electronic data. In addition to concerns about employee productivity, the sophisticated electronic communication tools available to employees create new challenges for businesses, including potential harm to reputation and brands, theft of trade secrets and other confidential information, and potential liability for employee behavior online.

For example, an employer may be liable for an employee’s online comments that are discriminatory or defamatory, even if the employee posts from a personal computer on personal time. Likewise, an employer may be liable for an employee’s online endorsements of the employer’s if the employee does not properly disclose her affiliation with the employer. In addition to current employee issues, many businesses are also increasingly using social media and other online technology tools to market their organization and to search for, recruit, and screen potential employees. The legal obligations and rights of employers are continuing to evolve as technology changes.

Nevertheless, employers can anticipate and plan for many of the legal risks associated with the use of technology in the workplace by applying existing 1 . laws to what we know about new electronic tools. Although new technological tools may ultimately be a “game changer” for employers, there are a number of practical steps that employers can take based on the law today to manage legal risk in this new frontier. WAGE AND HOUR CONSIDERATIONS With advances in information technology, employees can work from almost anywhere as long as they have a computing device and an Internet connection. As a result, many employers now allow employees to telecommute for at least a portion of their workday. Even employers that do not formally allow employees to telecommute often provide employees with technology resources to stay connected to the office, such as smartphones, laptops, and tablet computers.

These technologies can create a number of legal issues for employers under wage, hour, and leave laws. The Fair Labor Standards Act (“FLSA”) and the Minnesota Fair Labor Standards Act (“MFLSA”) Both the FLSA, 29 U.S.C. § 201, et seq., and the MFLSA, Minn. Stat. § 177.21, et seq., require covered employers to pay non-exempt employees a statutorily prescribed minimum wage and overtime pay at a rate of one and one-half times the regular rate of pay. Under the FLSA, “employ” is defined as “suffer or permit to work.” Similarly, the MFLSA defines employ as “permit to work.” Thus, nonexempt employees who are encouraged or even simply allowed to work remotely must be paid for the time that they spend working. Employers should adopt a clear policy to address whether work by non-exempt employees outside of the office is expected or even allowed, especially when employees are provided with smartphones or remote access to the network.

Employers should 2 . also require non-exempt employees to record all time they work outside of the office. Although there is a de minimis exception to the FLSA’s recordkeeping requirements, it only applies in narrow circumstances involving uncertain and indefinite periods of time, a few seconds or minutes in duration, and where the failure to count such time is justified by industrial realities. Finally, employers should also consider requiring non-exempt employees to obtain permission to work overtime. Addressing these issues in written policies both educates employees about their responsibilities and protects the employer from unnecessary expense and potential liability. For telecommuting non-exempt employees, employers should consider addressing the above concerns in a written agreement with the employee.

The agreement should further specify whether the nonexempt employee will be paid for time spent commuting to and from the workplace when necessary. The Family Leave Medical Act (“FLMA”) and Minnesota Parental Leave Laws Both federal and state laws provide covered employees with an entitlement to unpaid leave for qualifying reasons, including the birth or adoption of a child, care for family members, or to care for a serious health condition. See 29 U.S.C. § 2612; Minn.

Stat. § 181.941. When an employee is on qualifying leave, the employer cannot request or require the employee to perform work-related duties, including checking email or performing work through remote network access. If an employee does agree to perform work remotely, the employer may not count time an employee spends telecommuting to work as FLMA leave. 3 .

DISCRIMINATION LAWS Federal and Minnesota state law prohibit discrimination both in hiring and in employment on the basis of various legally protected class statuses, including race, color, creed, religion, national origin, sex, sexual orientation, marital status, disability, genetic information, receipt of public assistance, age, and military service. Most employers are aware of these restrictions and would never consider making a decision on the basis of an employee’s protected class status. However, advances in technology have revolutionized both the hiring process as well as management of current employees. Employers should be aware of the ways in which discrimination laws could be impacted by these changes. Protected Class Information Employers generally may not ask applicants or employees about protected class status.

In many cases, an employee’s protected class status (such as race or gender) will be apparent to an employer. However, there are many circumstances where an employee’s protected disability or religion would not be readily apparent to an employer. Resources available on the Internet—particularly social media—can complicate this delicate balance for employers. In conducting an online search or reviewing social media sites of an applicant or an employee, an employer may learn information about the individual’s protected class status. While employers in most cases are not prohibited from learning protected class information, they are prohibited from considering protected class information in making hiring and employment decisions.

As such, having access to this information through online searches can increase the risk of a discrimination claim. Employers should therefore take special steps to wall off the individuals performing searches from the hiring or employment decision process to ensure that protected class information is not shared with or taken into account in the decision-making process. 4 . Special Issues for Genetic Information The ease in obtaining information about genetic information of employees also raises important employment law considerations for employers. The federal Genetic Information Nondiscrimination Act (“GINA”) of 2008 provides that it is an unlawful employment practice for an employer or other covered entity to “request, require, or purchase genetic information with respect to an employee or family member of the employee.” Section 202(a). Minnesota state law also prohibits discrimination based on genetic information. Minn. Stat.

§ 181.974. GINA defines “genetic information” broadly, providing that genetic information may include an individual’s family medical history or an individual’s own disclosure of a genetic condition. Because genetic information may be obtained through an online or social media search, employers need to take care not to violate GINA in performing online applicant screening or gathering information about current employees. The Equal Employment Opportunity Commission’s (“EEOC”) final regulations implementing GINA provide some guidance on the acquisition of genetic information about applicants or employees via the Internet and social media sites.

According to the EEOC, an Internet search on an individual that is likely to result in obtaining genetic information constitutes an unlawful “request” for genetic information, whereas acquisition of information from a social media platform where the employee has given the supervisor permission to access the profile is considered inadvertent. See 29 C.F.R. § 1635.8. PROTECTED ACTIVITY LAWS Various federal and state laws provide that employers may not take adverse action against applicants or employees based on certain legally protected activities.

Accordingly, when online information 5 . about employees or applicants reveals protected activities by an individual, employers need to take care to ensure that they do not consider or act on such information in making its hiring or employment decisions. The following is a summary of some of the laws that establish protected activities. Protected Concerted Activity Under the National Labor Relations Act (“NLRA”) Several prohibitions found in the federal labor law – NLRA – apply to employers gathering information about applicants or employees through social media or other online searches. For example, Section 7 of the NLRA protects non-management employees’ right to engage in concerted activity for mutual aid and protection and applies whether or not an employee is in a union. Section 7 rights are broad, encompassing outright union organizing and actions such as discussing or complaining about compensation or terms and conditions of employment.

Section 8(a)(1) of the NLRA further provides that it is an unfair labor practice for an employer “to interfere with, restrain, or coerce employees in the exercise of the rights guaranteed by Section 7.” The NLRA prohibits employers from taking adverse action against an applicant or employee due to online information about the individual’s protected Section 7 activities. The National Labor Relations Board (“NLRB” or the “Board”), which enforces the NLRA, has sided with employees who were terminated for off-theclock comments made on Facebook, finding that the employees’ comments were protected speech under the NLRA. In these and other “Facebook firing” cases, the Board has considered whether an employee is engaging in protected concerted activity or just airing an individual gripe, which is not protected.

One way to tell the difference is to consider what happens after the initial post. If other employees express support or share the concern, and the conversation turns to “what should we do about this?” the 6 . employee’s less-than-flattering initial post, along with the other employees’ comments, are likely protected. Not only is it unlawful for an employer to take adverse action against an applicant or employee because of Section 7 activities, the mere maintenance of a work policy or rule that chills Section 7 rights may amount to an unfair labor practice, even without evidence of policy enforcement. This is true even if the policy is not explicitly aimed at protected concerted activity. If it tends to chill employees’ exercise of their Section 7 rights, it will be found unlawful. The NLRB has put forth a two-step inquiry to determine whether a policy or work rule amounts to an unfair labor practice. The first step is to ask whether the rule explicitly restricts Section 7 rights. If it does, the policy is unlawful.

If there is no explicit restriction, an employer should move to step two. In step two, an employer should ask three questions: 1) would employees reasonably construe the language to prohibit Section 7 activity?; 2) was the rule promulgated in response to union activity?; and 3) has the rule been applied to restrict the exercise of Section 7 rights? If the answer to any of these questions is yes, maintenance of the policy is an unfair labor practice. In May 2012, the NLRB’s Acting General Counsel released a summary report outlining the NLRB’s stance on the legality of social media policies, available online at http://mynlrb.nlrb.gov/ link/document.aspx/09031d4580a375cd. As with other employment policies, merely having a social media policy is enough to find an unfair labor practice if the policy would reasonably tend to chill employees in the exercise of their Section 7 rights.

The following are some examples of policy provisions that the General Counsel found to be so broad that they unlawfully encompassed protected employee rights: • “[I]n addition to disclosing that … your views are personal, you must also be sure that your posts are completely 7 . accurate and not misleading and that they do not reveal non-public company information on any public site.” • “Offensive, demeaning, abusive or inappropriate remarks are as out of place online as they are offline, even if they are unintentional.” • “Don’t release confidential guest, team member or company information…” • “If [you] become aware of personal information about … employees, contingent workers, [or] customers … don’t disclose that information in any way via social media or other online activities. You may disclose personal information only to those authorized to receive it in accordance with [company] privacy policies.” The NLRB has focused its enforcement efforts on broad policies that could be construed to limit: 1) critical statements about the company or managers; 2) discussion of wages, hours, and other terms and conditions of employment; and 3) discussions with union representatives and coworkers. An employer thinking of developing a social media policy (or re-evaluating its current one), thus, has a number of factors to consider. First, the employer should determine whether a policy is necessary.

Do the risks associated with having a policy outweigh the risks of going without one? If a policy is necessary, it is important to draft carefully and consult with an attorney. A lawful policy has clarifying language that restricts its scope to non-protected activity and includes examples of covered conduct that is clearly illegal or unprotected. Lawful Consumable Products or Activities Laws Employers that use the web or social media sites to screen applicants or to monitor employees might also uncover information about an individual engaged in alcohol use, smoking, or other lawful activities that an employer might disagree with or prefer the 8 . individual not do. However, Minnesota law prohibits employers from refusing to hire an applicant or taking adverse action against an employee for the consumption of lawful products, such as alcohol or tobacco, away from work during nonworking hours. See Minn. Stat. § 181.938, Subd.

2. Many other states have similar laws, and some even prohibit adverse action based on other lawful activities, such as an individual’s appearance, political affiliations, or other factors. The Minnesota law provides exceptions if a restriction on consumption of lawful consumable products is based on a bona fide occupational requirement or is necessary to avoid a conflict of interest with any responsibilities owed by the employee to the employer.

However, employers should act cautiously before taking any action against an applicant or employee on the basis of these narrow exceptions. Whistleblower Laws Another area of legal risk for employers related to technology is the area of whistleblower law. In Minnesota, an employer may not take adverse employment action against an employee based on the employee making a good faith report of a violation or suspected violation of law or refusing to participate in any activity that the employee in good faith believes is illegal. Some employees may use the web or social media sites to complain about actual or suspected legal violations of a company.

Because such complaints may be legally protected, depending on the circumstances, employers should take care to assess the legal risks before taking any adverse action in response to such information. Retaliation Laws Similarly, employers may face legal risk for taking action based on information that could be construed as asserting rights under employment laws. A number of federal and state employment laws (including but not limited to anti-discrimination, wage and hour, 9 . leave, and worker’s compensation laws) prohibit retaliation against an individual for asserting rights under the law, assisting someone else to assert their rights, or participating in an investigation or legal proceeding. Just as employers may learn of whistleblowing through online sources, employers also may learn of other protected activities that an individual may claim gives rise to anti-retaliation rights. An employer who learns of such activities through online sources must act carefully to avoid engaging in unlawful retaliation. APPLICANT SCREENING LAWS Surveys and informal data suggest that employers are increasingly using the web and social media sites to both identify and recruit desirable job candidates, as well as to weed out less desirable candidates. Just as there are legal limitations to screening applicants through more traditional methods, legal issues are likely to arise when applicants are screened online.

The following section summarizes some of the special applicant screening laws that may be triggered by online screening of job applicants. Negligent Hiring In Minnesota, an employer can be liable for negligent hiring if it “plac[es] a person with known propensities, or propensities which should have been discovered by reasonable investigation, in an employment position in which, because of the circumstances of employment, it should have been foreseeable that the hired individual posed a threat of injury to others.” Ponticas v. K.M.S. Investments, 331 N.W.2d 907, 911 (Minn. 1983).

Employers have a “duty to exercise reasonable care in view of all the circumstances in hiring individuals who, because of the employment, may pose a threat of injury to members of the public.” Ponticas, 331 N.W.2d at 911. This has come to be known as a sliding scale duty, requiring the employer to decide how much investigation is necessary based 10 . on the nature of the position. Because of this potential liability, it is sometimes appropriate for an employer, depending on their business and a particular position’s duties, to do a more thorough screening of an applicant’s background to try to ensure that the individual does not pose a safety risk or other risks to the business or third parties. Historically, the doctrine of negligent hiring has resulted in employers considering whether it is appropriate to run a criminal background check on applicants. As social media becomes more common, it is possible, although not yet known, that the scope of an employer’s duty to investigate job applicants for safety risks may extend to conducting social media or other online searches. Fair Credit Reporting Act (“FCRA”), 15 U.S.C. § 1681, et seq., and State Background Check Laws When an employer conducts a background search on an applicant entirely in-house using only the employer’s staff, background check laws generally do not apply.

However, when an employer uses an outside entity for a fee to obtain a criminal background check or to otherwise obtain a background report or investigate an applicant’s background for employment purposes, the employer must comply with background check laws, including FCRA and any applicable state law. FCRA establishes a number of legal requirements for obtaining a background report, including notice, consent, and various procedural steps that must be followed before acting on background check information to withdraw a job offer. Although the legal landscape of online searches is still evolving, it is likely that an employer who pays an outside entity or uses a fee-based online service to obtain online background information on an applicant must comply with FCRA and any applicable state background check laws. While background checks arise most often in the hiring context, employers sometimes pay outside entities to obtain criminal 11 .

background information about or to otherwise investigate a current employee. In these situations, FCRA and state background check laws may still apply. Disparate Impact Claims In recent years, the EEOC announced its E-RACE Initiative (“Eradicating Racism and Colorism in Employment”) which is aimed at reducing race discrimination in hiring. The EEOC has sued employers in several high-profile cases for policies and practices that the EEOC believes lead to systemic discrimination in hiring. Although the cases so far have involved employer use of background checks, the EEOC has also announced its intent to pursue employers that require the use of video résumés or other technological application processes.

According to the EEOC, these practices lead to “disproportionate exclusion of applicants of color who may not have access to broadband-equipped computers or video cameras.” Given the EEOC’s very public statements about technology and disparate impact claims, employers should take care to ensure that their hiring policies and practices in hiring do not result in systemic discrimination. In 2012, the EEOC issued guidance on employers’ use of criminal history information to exclude individuals from employment. See http://www.eeoc.gov/laws/guidance/arrest_conviction.cfm. Because persons of color are arrested and convicted at disproportionate rates, excluding individuals from employment based on a criminal record can be unlawful race discrimination under Title VII of the Civil Rights Act of 1964. To be lawful under Title VII, an employment exclusion must be based on proven criminal conduct and must be job-related and consistent with business necessity. In light of the EEOC’s new guidance, employers should tread carefully and consult with legal counsel before excluding someone from employment based on criminal history information, including information found online. 12 .

In addition to following the above-described guidelines, employers must comply with Minnesota’s “Ban the Box” law, which restricts the timing of employer inquiries into an applicant’s criminal past. See Minn. Stat. §§ 364.021, 364.06, 364.09. Effective January 1, 2014, Minnesota law requires employers to wait until a job applicant has been selected for an interview, or a conditional offer of employment has been extended, before inquiring about an applicant’s criminal history or conducting a criminal background check. EMPLOYEE PRIVACY CONSIDERATIONS Employees’ potential privacy rights form yet another technologyrelated legal consideration for employers.

Where an employer provides employees with technology resources or monitors employees through its own technology, employees may argue that they have a right to privacy in the technology or conduct at issue. Privacy issues may also result from the online conduct of employees outside of the employer’s network or technology resources. Because of the public nature of the web and many social media sites, privacy law may, at first blush, seem inapplicable. However, the law regarding online privacy rights is unsettled, and some of the few cases involving the issue have raised the possibility of legal risks for employers, at least when online data comes from a website with privacy restriction settings.

While privacy law is still unsettled and evolving, the following is a summary of some of the legal issues that might arise. [See discussion of privacy in section -EFFECT OF SOCIAL MEDIA USE ON PRIVACY AND SECURITY COMPLIANCE.] Common Law Invasion of Privacy Minnesota recognizes invasion of an individual’s privacy as a tort action. See Bodah v.

Lakeville Motor Express, Inc., 663 N.W.2d 550 (Minn. 2003). The most common privacy claims raised by employees against employers are intrusion upon seclusion and publication of private 13 . facts. To prove either type of privacy claim, however, the plaintiff must first demonstrate a reasonable expectation of privacy. When information is publicly available on the Internet, it may be difficult for an individual to establish any reasonable expectation of privacy in the information. It is less clear, however, whether individuals might claim some reasonable expectation of privacy in social media sites with some privacy settings, such as Facebook, which allows users to limit access to the site to only individuals that have been approved by the user.

In a case involving a restricted MySpace chat room used by employees, the court declined to recognize an invasion of privacy claim where a supervisor accessed a restricted site using a password given by an employee participating in the site. See Pietrylo v. Hillstone Restaurant Group, No.

06-5754, 2009 U.S. Dist. LEXIS 88702 (D.N.J. Sept.

25, 2009). However, the employer was still found to have violated the Stored Communications Act, discussed in further detail below. In order to establish that employees have no reasonable expectation of privacy in the activity or technology at issue, employer policies should clearly state that the resources provided to employees are provided for the benefit of the organization and that employees do not have any expectation of privacy in the specific conduct. The policy should also reserve the right to monitor employee email and other uses of its own technology resources.

With these policies in place, employers are much less vulnerable to an invasion of privacy claim. State Wiretapping Laws Minnesota statutory law prohibits the interception and disclosure of wire, electronic, or oral communications. Minn. Stat.

§ 626A.02, Subd. 1. Any interception of these forms of communication will violate the law unless an exemption applies.

However, an exemption applies if one of the parties to the communication has given prior consent to such interception. Minn. Stat.

§ 626A.02, Subd. 2(d). 14 . To assert this exemption to Minnesota’s wiretapping law, employers that wish to monitor employee communications with outside parties must be able to demonstrate that the employee in question consented to the monitoring of those communications. To do so, employers should, at a minimum, maintain policies that explicitly state that employees have no expectation of privacy in communications using employer-provided communication technologies. Employers should also document the employees’ written consent in the form of an acknowledgement that the employee has received and understands the employer’s policy, including that the employer has the right to monitor such communications. Surveillance and Creating an Impression of Surveillance Employers may also be liable for an unfair labor practice under Section 8(a)(1) of the NLRA for engaging in the surveillance of, or creating an impression of surveillance of, union activity. In Magna International, Inc., 7-CA-43093(1), 2001 NLRB LEXIS 134 (Mar.

9, 2001), for example, an administrative law judge held that it was a violation of Section 8(a)(1) of the NLRA for a supervisor to tell an employee that he liked a picture of her the day after the photo was posted to a union blog, because this suggested to the employee that her union activities were being monitored. Employers faced with organizing activity should be mindful of this complicated and often surprising body of the labor law. Special Concerns for Public Employers In addition to the above privacy laws, public employers are also subject to the Fourth Amendment of the United States Constitution. The Fourth Amendment protects public employees from unreasonable searches and seizures, and this prohibition extends to electronic information. In 2010, the United States Supreme Court decided the case of City of Ontario v.

Quon, 130 S. Ct. 2619 (2010), a case that raised the question of whether law enforcement employees 15 .

had a reasonable expectation of privacy in text messages sent on employer provided devices. In Quon, the employer had a written policy allowing inspection of messages, but in practice did not regularly monitor messages. Although the Supreme Court declined to find that the employees had a reasonable expectation of privacy in the messages, the court held that the search was reasonable under the Fourth Amendment because the search was motivated by a legitimate work-related purpose and was not excessive in scope. Public employers must be mindful of this additional constitutional responsibility. FEDERAL LAWS APPLICABLE TO ELECTRONIC COMMUNICATIONS AND DATA In addition to privacy laws, federal electronic communication laws may also be implicated by an employer’s search of social media sites or other online data. These laws include the Electronic Communications Privacy Act, the Stored Communications Act, and the Computer Fraud and Abuse Act.

These laws are briefly summarized below. The Electronic Communications Privacy Act (“ECPA” or the “Wiretap Act”), 18 U.S.C. § 2510, et seq. The federal Wiretap Act prohibits the unlawful “interception” of an electronic communication contemporaneously with the communication being made. As such, employers that monitor and intercept employee’s online communications through social media or other online sources could, depending on the circumstances, be liable under the Act.

Most employers do not, however, monitor employee communications in real time as they are occurring. If there is no real-time, contemporaneous “interception” of an electronic communication, the Wiretap Act most likely does not apply. 16 . The Stored Communications Act (“SCA”), 18 U.S.C. § 2701, et seq. The SCA prohibits the knowing or intentional unauthorized access to “a facility through which an electronic communication service is provided.” 18 U.S.C. §§ 2701, 2707. This includes unauthorized access to a password-protected email account or social networking site.

Key exceptions exist, however, if the person accessing the communication is the provider of the service, a user of the service and the communication is from or intended for that user, or has been granted access to the site by an authorized user. 18 U.S.C. § 2701(c)(2). At least three notable cases have applied the SCA to electronic communications.

In Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir. 2002), the Ninth Circuit Court of Appeals was confronted with a situation where the employer gained access to the site by submitting an eligible employee’s name and creating a password to enter, after accepting terms and conditions that prohibited viewing by management.

According to the court, this conduct alleged by the plaintiff was sufficient to bring a claim under the SCA. In the Pietrylo case discussed above, the District Court of New Jersey upheld a jury verdict imposing liability against an employer under the SCA. 2009 U.S. Dist.

LEXIS 88702. The Court found sufficient evidence that a company supervisor accessed the passwordprotected employee chat room with a password provided by an employee coerced into giving access. Finally, in the Quon case mentioned above, the Ninth Circuit Court of Appeals held that the employer and wireless provider violated the SCA by viewing the content of text messages sent by employees through a third-party pager service, even though the employer paid for the service. The Supreme Court declined to hear the wireless provider’s challenge to this ruling.

USA Mobility Wireless, Inc. v. Quon, 130 S. Ct.

1011 (2009). 17 . The Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, et seq. The CFAA prohibits “intentionally access[ing] a computer without authorization or exceed[ing] authorized access.” The CFAA provides for both criminal prosecution and civil actions for violations. Although the CFAA may apply against employers in some circumstances, the CFAA is far more often a tool for employers to pursue claims against employees who abuse their access to the employer’s computer network. For example, an employer may pursue claims against employees who abuse their access to confidential information in violation of the employer’s policies.

See United States v. Rodriguez, 627 F.3d 1372 (11th Cir. 2010). OTHER TORT LIABILITY FOR EMPLOYERS Information an employer might obtain online or an employer’s own use of online information may also lead to liability for an employer under various tort laws.

These laws are briefly summarized below. Negligent Retention and Supervision As in the hiring context, employers can be held responsible for the actions of employees who are known to be a danger to others. An employer is liable in Minnesota under the doctrine of negligent retention “when an employer becomes aware or should have become aware that an employee poses a threat and fails to take remedial measures to ensure the safety of others.” Benson v. Northwest Airlines, Inc., 561 N.W.2d 530, 540 (Minn.

Ct. App. 1997). Similarly, employers have a “duty to control employees and prevent them from intentionally or negligently inflicting personal injury” in the scope of their employment under the doctrine of negligent supervision.

Johnson v. Peterson, 734 N.W.2d 275 (Minn. Ct. App.

2007). Both torts require a threat of physical injury or harm (as opposed to economic harm, for instance) to be actionable. 18 . The law is still sufficiently undeveloped in this area that it is likely not yet the standard of care for employers to regularly monitor employees’ social media postings for signs of danger. Should an employer learn through online sources that an employee may pose a safety risk, however, the employer may be obligated under negligent retention and supervision laws to investigate and take appropriate action to address those risks. Defamation As with more traditional forms of communication, employers may face tort liability if an employee defames another employee, customer, or others through social media or other online statements. In addition, employers may face liability if they defame their own employees through social media or publicize defamatory information about an individual that they have obtained online. The plaintiff in a defamation action must usually prove: (1) a defamatory statement; (2) published to third parties; and (3) which the speaker or publisher knew or should have known was false. To avoid defamation claims, employers should take care in how they communicate about employees and how they handle online information. Employers should also consider adopting policies and providing training to prevent employees from engaging in defamation. [See discussion of DEFAMATION in USER GENERATED CONTENT.] References and Recommendations The popular business social networking site LinkedIn.com allows employees to ask their “connections” to provide recommendations for them.

Most employers, however, due to defamation, privacy, and other legal considerations, typically provide very limited reference information on former employees. See, e.g., Randi W. v.

Muroc Jt. Unified School Dist., 14 Cal. 4th 1066 (1997) (finding liability where an employer provided positive references but failed to disclose 19 . complaints of sexual misconduct). Employers should make sure that employees are aware that any limited reference policies that the employer may have in place extend to providing references on social media sites, such as LinkedIn. Child Pornography Laws State and federal law strictly prohibit the possession of child pornography. Where an employee downloads child pornography to a work computer, employers may face liability for continued possession of the material. As a result, employers should work with the relevant legal authorities to report and turn over any pornographic material depicting children that is discovered on work computers. Employee Endorsements and Testimonials Federal and state laws generally prohibit companies from engaging in false or misleading advertising.

While there is currently little legal authority that has been specifically enacted with respect to social media and other online postings, the Federal Trade Commission (“FTC”) has taken the position that false advertising legal requirements apply to online postings by a company’s employees. The FTC’s revised “Guides Concerning the Use of Endorsements and Testimonials in Advertising” provide that: (1) both endorsers and advertisers are subject to liability for false or unsubstantiated statements made in endorsements; and (2) advertisers are subject to liability for failing to disclose material connections between themselves and endorsers. The FTC also provides illustrative examples of how false and misleading advertising laws would apply to endorsements and testimonials made through social media, including both paid advertisements and provision of product samples for reviews. 20 . Employers may, therefore, find themselves liable if employees offer online endorsements or testimonials of the company’s products or services without disclosing their connection to the company. Employers should adopt a social media and online posting policy that makes clear the appropriate and inappropriate uses of social media and advises employees of the need to comply with the FTC Guides. In addition, employers should also consider performing at least minimal monitoring of employees’ use of social media to ensure compliance with the FTC Guides. SAFEGUARDING CONFIDENTIAL AND PROPRIETARY INFORMATION In today’s knowledge-based economy, confidential information and electronic systems are often the most valuable resources of a company. Employees who have access to this information or create the employer’s electronic systems during the course of their employment can do a great deal of harm to a company if they disclose this information or attempt to take it with them when they leave their employment. Both state and federal laws provide guidelines for employers and employees in this important arena. These laws are summarized below. Information Security Employers have a responsibility to keep certain information confidential.

For example, employee personnel records often include information that employers must keep confidential, such as employee medical records, drug testing records, social security numbers, and credit reports. Employees may also have access to similar confidential information about customers, clients, or donors that the employer is obligated by contract or law to keep confidential. 21 . Employers should adopt systems and policies to address the security of this confidential information. If employees have access to particularly sensitive information, employers should also consider requiring those employees to sign agreements acknowledging the duty to keep such information secure and providing specific guidelines on appropriate practices for keeping that information secure. Confidential and Proprietary Information The Uniform Trade Secrets Act, codified in Minnesota at Minn. Stat. § 325C.01, et seq., prohibits misappropriation of trade secrets, and provides employers with the right to injunctive relief and actual damages in the event of a threatened or actual misappropriation. The law defines a trade secret as information that derives independent economic value from not being generally known by others, so long as the employer makes reasonable effort to maintain its secrecy. Employers should also consider entering into written agreements with employees to either broaden the scope of protected information or simply to provide more information to employees about what the employer considers to be confidential.

Although such agreements cannot stop employees from breaching their obligations by publishing information online, the agreements will at least bolster the employer’s case for injunctive relief and damages in the event of such a disclosure. Ownership of Intellectual Property Created By Employees Under federal copyright law, the creator of a work is generally considered the legally recognized author and owner of the work. An exception applies, however, where an employee creates the work in the course of employment. In such a case, the so-called “work made for hire” is considered to be the property of the corporate employer. Minnesota law also gives employers the right to ask employees to 22 .

agree in advance to assign any rights to inventions or copyrightable subject matter created within the scope of their employment. Where an employer expects an employee to create inventions or develop copyrightable subject matter that might appear in websites or social media accounts, the employer should explicitly address the ownership of both the content and the accounts themselves in written policies or agreements. Although federal and state laws provide some protection to employers, the importance of this medium makes it worthwhile for employers to proactively address these issues in written agreements with employees. Better to be explicit and clear about these ownership issues to avoid any later disputes. [See discussion of COPYRIGHT in USER GENERATED CONTENT.] EMPLOYER POLICIES AND PRACTICES An important tool in managing the legal risks associated with employees’ use of technology and social networking sites is a wellcrafted technology and social media policy that balances company needs and concerns against employees’ legal rights. Some of the business and legal risks that an employer should address in a technology and social media policy include: • Covered technology and devices: Employers should consider whether the policy will extend only to employerpaid or provided devices or whether the employer may lawfully and should extend the policy to personallyowned devices used for work purposes.

The law is still evolving in this area, and it is not clear that employers have the legal right in all jurisdictions to search an employee’s personal device or personal email account on a company or personally-owned device. However, having a clearlyworded policy can improve an employer’s legal position 23 . in arguing that it has the right to access any technology devices used by an employee for work purposes. • Privacy considerations: Due to the privacy issues discussed above, a policy should include an express warning that the employer retains the right to monitor and review the use of and content on any technology and devices covered by the policy. As discussed above, however, there have been court decisions finding employers liable for improperly accessing or using online content, particularly where the content was on a website with restricted privacy settings, such as Facebook.com. As such, employers should take care to ensure they lawfully access online content, and they should consult with counsel as appropriate to ensure compliance. • Permissible and impermissible uses: The policy should explain the permissible and impermissible uses of technology and social media. Items to address might include, for example, personal use of technology on work time, employees’ obligation not to use technology to engage in unlawful behavior, the need to protect confidential or trade secret information, and the need to respect others’ intellectual property rights.

An employer may also want to prohibit employees from engaging in any company-related blogging, tweeting or the like without express written permission of the company to engage in such social networking activities on behalf of the business. • Lawfully Protected Employee Activity: In setting out any prohibited conduct in a workplace policy, employers must take care to balance the employer’s needs against employees’ legal rights. As discussed above, a job applicant’s or employee’s use of technology and online content may be legally protected by discrimination, antiretaliation, lawful consumable products, lawful activity, 24 . labor law, or other laws. As such, an employer should be cautious in rejecting a job candidate or disciplining or terminating an employee for online activity to ensure that adverse action is not taken based on legally-protected activities by the individual. • Wage and Hour issues: As discussed above, non-exempt employees generally must be paid at least minimum wage for all time worked and overtime pay, which can, depending on the circumstances, include time spent checking voice mails or e-mails away from work. In addition, wage and hour issues may arise for employees that use remote technology while telecommuting or while on a leave of absence. As such, an employer should consider addressing limits on the use of technology by non-exempt employees outside of normal working hours or by employees on leave. • Photography and Recording: Smartphones and other mobile devices make it far easier than in the past for employees to secretly record conversations at work or to take unauthorized photographs or videos that might be widely disseminated on the internet and go “viral.” Depending on the employer’s business and its unique risks, a technology policy might include language prohibiting the use of devices to make recordings or take photographs or videos.

Again, however, an employer should consult with counsel to ensure that any such language does not run afoul of individuals’ Section 7 labor law rights or other employment law rights. • Testimonials: As discussed above, the FTC has taken the position that false and misleading advertising laws apply to online postings. As such, employers should include language in any policy that advised employees of the need to comply with FTC requirements when making endorsements or testimonials about the company. 25 . • Return of Company Data: An employer should make clear that all company data, including any electronic data stored on an employee’s personally-owned devices, such as a smartphone, tablet, or personal computer, must be returned to the company upon request or when an employee leaves employment. An employer that has a BYOD (bring your own device) approach to workplace technology should consider including language in a technology policy stating that employees agree to turn over their personal devices to the company to permit the company to wipe any company data from the device. In addition, many companies have the capability to remotely cut off access to company technology and to remotely wipe company-owned or employee-owned devices. An employer that has a BYOD approach, should consider including language in a policy that provides that an employee that is permitted to use a personal device for work agrees to permit the company to remotely wipe the device even if that may result in personal data on the device being deleted. 26 .

OWNERSHIP OF SOCIAL MEDIA ACCOUNTS Who owns the accounts that are opened on Facebook, LinkedIn, Twitter or other social media platforms? If an employee opens up a Twitter account using the company brand, who owns the followers of the account? How much is a follower worth? As more and more businesses actively encourage their employees to use social media as a marketing tool, we are likely to see an increase in litigation over the ownership of such accounts. The following cases illustrate how some courts have addressed these issues. Phonedog, LLC v. Noah Kravitz [Case No. 3:11-CV-03474-MEJ (N.D.

Cal. 2011)] In this case Phonedog, a website that provides mobile news and reviews of products and services of mobile phone carriers, used a variety of social media, including Twitter, Facebook and YouTube, to market and promote its services to potential users. Phonedog sued Noah Kravitz, a former employee, who continued to use a Twitter account that had been initially created for use by the company.

Kravitz had used the handle @phonedog_Noah to disseminate Phonedog marketing material and reviews of mobile devices. Kravitz left Phonedog and simply changed his Twitter handle to @noahkravitz. The Kravitz Phonedog Twitter account had reached 17,000 followers.

Phonedog sued Kravitz alleging that the Twitter account and its followers belonged to Phonedog. Phonedog also asserted the value of Twitter followers at $2.50 per follower per month and sought damages of $340,000. The parties reached a settlement agreement and Kravitz was allowed to retain custody of @noahkravitz as a Twitter handle. 27 .

After the settlement Kravitz issued the following statement: “If anything good has come of this,” Kravitz wrote, “I hope it’s that other employees and employers out there can recognize the importance of social media to companies and individuals both. Good contracts and specific work agreements are important, and the responsibility for constructing them lies with both parties. Work it out ahead of time so you can focus on doing good work together -- that’s the most important thing.” Unfortunately we are still waiting to find out how much a Twitter follower or a Facebook “like” is worth. Eagle v. Morgan [Case No. 2:11-CV-4303-RB (E.D. Pa.

2011)] In this case Dr. Linda Eagle sued her former employer for its continued use of her LinkedIn account after her employment had been terminated. She sued her former employer setting forth eleven causes of action as follows: (1) violation of the Computer Fraud and Abuse Act (“CFAA”) 18 U.S.C § 1030(a)(5)(C); (2) violation of the CFAA, 18 U.S.C § 1030 (a)(2)(c); (3) violation of section 43(a) of the Lanham Act; (4) unauthorized use of name in violation of 42 Pa.

C.S. § 8316; (5) invasion of privacy by misappropriation of identity; (6) misappropriation of publicity; (7) identity theft under 42 Pa. C.S § 8315; (8) conversion; (9) tortious interference with contract ; (10) civil conspiracy; and (11) civil aiding and abetting.

The court dismissed all of the federal claims and only addressed the state claims finding in favor of the plaintiff on her claims of unauthorized use of her name, invasion of privacy by misappropriation of identity, and misappropriation of publicity. The court noted that while the company had urged employees to create LinkedIn accounts and had guidelines covering on-line content, the company had never informed employees that their LinkedIn accounts were the property of the employer. Unfortunately for Dr.

Eagle, the court also determined that she had failed to put forth sufficient 28 . evidence of compensatory damages that were causally connected to defendant’s improper activity and awarded her no damages. In the Matter of Merck KGaA, [Index No. 11113215, Supreme Court of State of New York (November 2011)] The German pharmaceutical company Merck KGaA brought this action in the New York Supreme court seeking an order requiring Facebook to disclose the circumstances leading up to the takeover of its Facebook page by its rival in the United States Merck & Co. According to Merck KGaA, its former Facebook page was now being used by the similarly named US entity. These legal proceedings were initiated by Merck KGaA to discover how the Facebook page www.facebook.com/merck that it had established was somehow transferred by Facebook to Merck & Co. without any notice or consent from them.

The action was not against Merck but against Facebook to find out how the Facebook website they thought they owned was now being used by another company. Best Practices • Have Written Agreements. If your employees are asked to use social media to market and promote your business’s products or services, have written agreements that make it clear that the company owns the account, including customer lists, friends, and followers and that the employee relinquishes any rights to the account when he or she leave. • Appropriate Corporate Policies. Employers should take pre-emptive steps to mitigate the risk of misappropriation. This can be done through appropriate corporate social media policies and individual employment agreements that delineate at a minimum that whatever the employee creates on company time or with company resources 29 .

belongs to the employer. Rather than leave it up to a court to decide and mitigate disputes over social media account ownership, employers should have clear policies and written agreements with all employees that cover social media account ownership when such accounts are used for company business. • Register Social Media Accounts in Company Name. Businesses should register social media accounts in the company name or if a personal name is required use the name of a senior marketing person. The company policy should prohibit employees from conducting business through social media using individual accounts held in their own name. • Establish Ownership of Social Media Accounts Used By Business. Company business should only be conducted through company-owned social media accounts. Employees should be required to use company-provided account log-ins and passwords.

Company ownership of social media accounts and the followers of such accounts should be clearly stated in a corporate social media policy and in written employment agreements prior to the establishment of any employer-sponsored social media account. The company can also clarify that such ownership and control is limited to the social media accounts that are used for business purposes and not the personal Facebook and other social media accounts used by individual employees for their own personal and private purposes. • Limit Number of Persons with Administrative Controls. Only a few key corporate employees should be given administrative rights that would allow any change in control of any website or webpage. If external providers are used for registration of domain names or social media user names, ownership and control by the business should 30 .

be made clear in any agreements with the identity known of any individual granted such administrative rights. • Consider Social Media Account Ownership in Due Diligence. When acquiring a business, do not overlook social media accounts that are used by the target business and make sure that the target business can transfer the rights to the relevant social media account. 31 . 32 . USER GENERATED CONTENT Social media allows for a wide variety of digital media that is created and shared by multiple users. This user generated content (“UGC”) appears in the form of Twitter tweets, Facebook postings, photos, comments, or videos posted on social networks, blogs, and e-commerce sites. A common form of this UGC appears in the form of product reviews and ratings. Social media tools have made UGC and other content easier to create and share than ever before. But with increased opportunities come increased risk of an infringement, defamation, or related claim. By creating thoughtful policies, businesses can manage their risk wisely while also staying current in the marketplace.

In doing so, it can be helpful to train employees regarding not only the content of the policies but also the reasons behind them because some may seem overly strict or counterintuitive. Businesses, however, have to manage a much higher risk of litigation than an individual due to rules relating to advertising as well as the simple fact that businesses present a more lucrative target than most individuals. In addition to ensuring that no affirmative infringement is occurring, businesses also need to monitor their own intellectual property to ensure that no one else is infringing upon their original content. Strategies for both preventing infringement and monitoring and enforcing original content are discussed below, as well as ways to mitigate activities that might trigger right of publicity or defamation claims. 33 . COPYRIGHT Copyright protects original works of authorship, including literary works (which includes computer programs), dramatic, musical (including lyrics), artistic (including pictorial, graphic, and sculptural works), motion pictures and other audiovisual works, sound recordings, architectural works, compilations, collective works, and derivative works. A copyright gives its owner the exclusive right to reproduce the work, sell or distribute the work, make derivatives based upon it, perform it, and display it (and to license any or all of these rights to others). Managing Risk When Reusing Others’ Content Most social media tools, by design, encourage their users to share others’ content. Whether it is reposting on Facebook, re-tweeting on Twitter, or pinning on Pinterest, reusing others’ content makes up much of what happens in social media. None of the social media platforms, however, will protect businesses if they are sued for copyright infringement.

Quite the opposite, each specifically disclaims liability and states that users are responsible for the content they post. In some cases the terms of use that appear on the platform site may require that the user indemnify the platform from any third party claims of infringement. It is important, therefore, that businesses create and enforce policies with respect to what it posts and what it allows employees to post on social media. The approach with the least risk is to only post original content and to never repost other users’ content unless and until the following questions can be answered: • Does the user actually own the copyright in the work? • If so, does the user give the business permission to reuse the work? • Is any attribution necessary in order to reuse the work? 34 .

• Are there any other permissions that need to be obtained, such as the right of publicity from any people whose images are used or products that are displayed in the work? If the answer to any of the above questions gives you pause, it is better to skip reusing the content than risk an infringement action. Policing Others’ Use of Original Content It is equally important to monitor others’ use of your own original content, and to think about your goals in the content’s use. Perhaps you are creating a work that you want to go viral and be shared and reshared by thousands. On the other hand, you may be creating something that took a great deal of time, talent, and/or money to come to fruition. In that case, it may make sense to actively monitor others’ use of your work and take steps to stop infringement when it happens.

Depending on the amount of time and money you spent in creating the work, or the likelihood that others might infringe upon it, registering your copyright with the U.S. Copyright Office may make sense. Registration is not necessary to obtain or maintain your copyright, but it is required before bringing a legal action against an infringer, and timely registration can preserve additional rights and remedies available under the Copyright Act. Copyright registration is a relatively inexpensive process and is highly recommended for the benefits it provides. Before going to the expense of filing a legal action against an infringer, sending a cease and desist letter to the infringer, or having your legal counsel do so, can be a relatively simple and cost effective way to stop the infringement. 35 .

Digital Millennium Copyright Act The Digital Millennium Copyright Act (“DMCA”) creates a method to notify internet service providers of infringement and request that the provider remove the infringing content. Specific information is required in order for the notice to be a valid takedown request, including [17 USC § 512(c)(3)(A)]: • A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. • Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site. • Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material. • Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted. • A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law. • A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. 36 . Many of the social media platforms have included notice and takedown provisions as necessary to comply with the DMCA. You should look for the areas of their sites where copyright owners or their representatives can report violations. In many instances, the platforms will respond to a takedown request within days or even hours of a report. The first step is to go to the social media provider’s Terms of Use and find the sections that explain its policy regarding intellectual property. You will also find details on how to submit your DMCA notice reporting any alleged copyright infringement. It should be noted that the DMCA only protects from liability the online service provider or OSP.

The definition of OSP in the DMCA is fairly broad but generally covers the party that is making available the website or internet services. The DMCA does not protect the users including any marketers who might access the website or social media site. A person or business that utilizes any UGC such as uploading such material onto a third party’s website is therefore not shielded from liability under the DMCA. Since social media platforms include their own terms of use that attempt to allocate the risks of using copyrighted materials online, it is important to become familiar with the terms of use that are unique to the platform being used. The social media site Pinterest allows users to “pin” interesting images they find to a virtual pinboard that is shared with others. This seems to encourage the unauthorized copying and distribution of copyrighted materials.

Even that cute photo of a kitten that your aunt Bessie has posted on Pinterest is protected by copyright. While many businesses may be flattered by such “pinning” of their images and not seek to stop such use, it does not lessen the fact that such unauthorized copying may be an infringement. Pinterest has included an opportunity on its site for website owners to opt out of such activity by using a “no-pin” meta tag. If selected, this code 37 .

will present the following message to the potential pinner: “This site does not allow pinning to Pinterest. Please contact the owner with any questions.” The Pinterest terms of use also require the members or “pinners” to indemnify Pinterest against any damages in the event infringing material is pinned on the site. TRADEMARKS A “trademark” is a word, phrase, symbol, design, or any combination of those things that identifies the source of particular goods or services. In the United States, trademark rights are created through the bona fide use of a mark in connection with the sale of goods or services in interstate commerce, but trademarks are often registered to strengthen and enhance a trademark holder’s rights. Trademarks are used to distinguish the goods or services from those of others in the same line of business, assure consistent quality to the consumer, prevent consumer confusion, and support advertising, promotion, and marketing activities. To preserve and strengthen the trademark, a business must continue to use it and enforce its rights against infringers. Businesses are generally familiar with the need to protect what might be their most valuable commercial asset – their trademark or brand.

The ability of the brand or trademark to communicate directly with a customer base through social media is critical in today’s business environment. A business must therefore control how its trademark and brand is used as well as any social media user-names, handles, or domain names. A business cannot afford to have its brand, image, or message hijacked by spammers, brandjackers, cybersquatters, impersonators, or competitors. The hallmark of trademark infringement occurs when a party’s use of a mark creates a “likelihood of confusion” among consumers as to the source of its goods or services and those of another, senior 38 .

trademark user, due to similarities between the parties’ marks. As discussed above, the internet, and in particular social media sites, encourage sharing of content, and trademarks are no exception. Although not required, one of the best platforms from which to protect and preserve a company’s trademark rights is to register the trademark(s) with the USPTO. The USPTO accepts applications for trademark registration based on either the trademark owner’s existing use of the mark (a “use based” application) or on the applicant’s bona fide intent to use the mark in commerce (an “intent to use” or ITU application). The benefits of trademark registration include nationwide priority of use of the mark (subject to any preexisting rights of others), nationwide constructive notice of trademark rights, use of the “®” designation, and many others.

Registered trademarks can last forever, but they must be maintained via periodic filings with the USPTO that confirm the mark’s continued use in commerce. On a broader level, there are additional best practices companies should follow to strengthen and preserve their trademark rights, particularly in the realm of social media. While trademark holders are encouraged to use their marks continuously and extensively, they are also advised to control the quality of the goods or services offered and/or sold under the mark, and to control the use (and minimize the misuse) of the mark. If an online presence is important in connecting with customers and delivering your company’s products or services, make sure that any trademark use within social media outlets consistently uses your trademarks in proper fashion.

Marks should be used without modifications, and as adjectives (with the generic name of the product or service), not as a noun. They should always include the proper trademark notice (® or ™ or SM). And a company’s website should always include Terms of Use that specifically state that the business’s name and any related names, logos, product and service names, designs and slogans are trademarks of the Company or its affiliates or licensors. 39 .

These guidelines are also important if, in their online presence, employees are associating themselves with their employer’s business via the use of its trademarks. Companies should educate employees and anyone who is authorized and licensed to use trademarks on both how to use, and the importance of using, their trademarks properly and consistently. For example, if you ask or expect employees to use social media to market and promote your business’s products or services, ensure you have written agreements in place that make clear how your marks must appear and be used. It is also important to make clear that the company owns any such accounts, including customer lists, friends, and followers, and that the employee relinquishes any rights to the account if and when they leave the company. [See discussion of Ownership of Social Media Accounts.] Policing Trademarks as They Appear Online and On Social Media In addition to taking proactive measures to protect and preserve the use of your trademarks on social media, it is also very important to police improper use or infringement of your mark by others if and when it does occur.

Social media provides cybersquatters, impersonators, competitors, and sometimes even your own affiliates many opportunities to infringe upon your trademarks. It is important to monitor or “police” the use of your marks online to prevent others from damaging the goodwill inherent in your trademarks and to prevent your trademarks from becoming diluted or generic, which happens when use of a particular term becomes widespread. Several companies provide monitoring services and will alert you of new uses of your marks.

Setting up an alert through Google News Alert is another way to monitor usage. When you see an infringing use of your mark, there are a variety of options you can pursue to stop the infringement. Before you take any action, however, it is prudent to consult an attorney. There is some risk in taking action, because if the “infringer” turns out 40 .

to have been using the mark longer than you, calling attention to the situation may cause the other party to take action against you. Once you and your counsel are satisfied that your use is “superior” to the infringer’s (i.e., you have been using the mark longer for the same or similar goods and services in the same territory), consider taking one or more of the following steps: Send a Cease and Desist Notice A simple and cost-effective first step is to send the infringer a letter identifying yourself as the owner of the mark, explaining how long you have used the mark, and requesting that the other user cease infringing upon the mark. Many companies choose to keep the tone of the initial letter friendly for two reasons: to encourage compliance and to maintain a positive brand image should the infringer decide to post the letter online. It is useful to send the letter via certified mail or some other method that includes tracking.

Documenting the fact that an infringer has received the letter may be important later if the infringer does not cooperate. Have Outside Counsel Send a Cease and Desist Notice Some companies choose to skip sending their own letters and have outside counsel handle it directly. Others prefer to send a first letter and then have outside counsel send a follow up. Often having the demand to cease infringing arrive on legal letterhead is enough to cause the infringer to stop. Follow the Platform’s Complaint Procedures All of the major social media platforms have procedures in place to remove infringing content posted on their sites.

Searching for the name of the platform and the word “complaint” in a search engine usually leads to easy locating of the page to report infringement. Typically the complaint form requires the complainant to enter information related to the marks, the name and address of the 41 . complainant, and a link to the infringing content. Having a registered trademark improves the odds of success. While there is no guarantee of getting the infringing content removed, filing a complaint often results in removal, and the platforms usually respond quite quickly. Civil litigation When all else fails, filing a complaint in federal court is an option for trademark owners whose rights are being violated. An attorney will advise you about the cost, risk, and benefits of such a step, as well as the evidence you will need to produce in order to improve your chances of success in court. Additional Options to Address Cybersquatting The term “cybersquatter” is used to describe a person who registers a trademark as a domain name and then offers to sell it to the trademark owner.

Cybersquatters may register a company’s trademark in one or more generic top-level domains (gTLDs), which are the suffixes of domain names (e.g. com, edu, org, info). For example, a company might own the domain for its trademark in the .com gTLD and a squatter might go out and purchase the same mark in the .org gTLD in the hopes that he or she can resell the domain to the mark owner at an increased price. Squatters may also engage in “typosquatting” by registering domains that are misspelled, or they may add a word to the beginning or end of the mark. The Internet Corporation for Assigned Names and Numbers (ICANN) has set up a system for trademark owners to file complaints about cybersquatters.

It involves filing what is known as a Uniform Domain-Name Dispute-Resolution (UDRP) complaint with the World Intellectual Property Organization (WIPO) or the National Arbitration Forum. The complainant must show that it has ownership of the mark, and it must also demonstrate bad faith use 42 . of the mark by the infringer. The infringer has a chance to respond. Finally, an arbitration panel of one to three arbitrators decides who has rightful ownership of the mark and may order that the domain be transferred to the Complainant if all the elements of a UDRP action are proved. The arbitrator’s decision is given deference by ICANN, and if he or she decides that a respondent is using the mark in the domain name in bad faith, he or she may order the internet service provider to transfer access to the account. UDRP cases may be a good method for controlling costs where you believe you have a strong case to make as to the other party’s use of your marks.

Of course, a qualified attorney can help you assess the likelihood of success. The introduction of new generic top-level domain names by ICANN will add additional complexity to the policing of trademarks on the internet and on social media. While the program is still in its early stages, thousands of new gTLDs are anticipated to emerge in coming years, requiring heightened awareness of trademark owners to the use of their marks online and in domain names in particular. ICANN’s Trademark Clearinghouse database is one option for trademark owners to use, allowing for defensive registration of key marks in certain domains, and/or active monitoring for cybersquatters or infringers. The Uniform Rapid Suspension (URS) system will also assist trademark owners in settling trademark disputes related to gTLDs. LaRussa v.

Twitter In 2009 Tony LaRussa the manager of the St. Louis Cardinals sued Twitter over a fake account and allowing an imposter to register the domain name twitter.com/Tony LaRussa along with use of an unauthorized photo of Tony. Tweets were posted in his name that referred to team-related incidents including the death of a pitcher and LaRussa’ DUI arrest.

In his complaint against Twitter, LaRussa alleged trademark infringement and dilution, claiming that these 43 . unauthorized tweets from this handle damaged the LaRussa trademark. The case settled, and LaRusssa now appears to own the @TonyLaRussa handle. Twitter deleted the fake account the same day the lawsuit was filed. Twitter now protects celebrities with a verification policy that authenticates the identity of public figures and attaches a blue checkmark next to the profile on a verified account. Facebook has adopted a similar policy.

California has a law that makes online impersonation a crime [Cal. Penal Code § 528.5]. Falsely sending out Twitter messages that purport to be from a celebrity or falsely creating a Facebook page under the name of another person to embarrass them would subject the impersonator to criminal and civil liability. TRADE SECRETS A trade secret is information such as a formula, pattern, compilation, program device, method, technique or process that is economically valuable because of its secrecy, and is protected by reasonable efforts by the business to maintain that secrecy.

Unlike copyrights and trademarks as discussed above, which are meant to be publicly shared and are frequently licensed for use by others (but still require protection), the most important aspect in maintaining trade secret protection is to ensure that the trade secrets are not disclosed without a confidentiality agreement or shared publicly at all, particularly on social media. Protecting Trade Secrets from Disclosure on Social Media Companies can and should take multiple actions to protect any trade secrets or other confidential information important to their business from being publicly disclosed. The first and most important step is to limit the disclosure of such information to 44 . only those individuals who absolutely require the knowledge in order to perform their services for the business. Any discussions or materials that do divulge such information should be labeled as confidential, and employees should be consistently reminded of the importance of the confidential nature of the information. Businesses should also train and contract with their employees to protect their confidential information. The use of confidentiality agreements and policies is advised, as well as the use of noncompete and nonsolicitation agreements when allowed. You should be sure to accurately define both the type of confidential information required to be protected, and the means by which it should be protected, including prohibitions on any public disclosures such as social media activity.

Legal recourse against employees who breach such agreements can include claims for breaches of loyalty or fiduciary duty to their employer, tortious interference, misappropriation, and others. Finally, companies should have a clear plan to respond to any undesired disclosure of trade secrets. In particular, if breaches of confidentiality are thought to have occurred through an employee’s use of social media, companies must make sure that in removing the information, they are complying with any other rights of employees in the content as discussed above [See Employment section for discussion of – requirements against disciplining employees for social media posts.] Best Practices • Take advantage of the protections offered by the Digital Millennium Copyright Act safe harbors by using appropriate notice and take down provisions on any corporate website. • Make sure that all necessary rights are obtained for any images or text that are published or posted on any social 45 . networking sites and that any content that is uploaded does not infringe another’s copyright. • Obtain all necessary third party permissions from authors, photographers, videographers, songwriters or other copyright owners. • Manage and police your mark as it appears online and in various social media sites. • Follow trademark best practices (e.g. filing, maintaining, licensing). • Always use your trademarks and copyrights correctly by displaying them with the ®, ™, or ©. • Monitor others’ usage of your marks online and in print media. • Watch for cybersquatters, impersonators, and competitors. • Consider new generic top-level domains as potential homes for social media sites and potential infringers. • Utilize complaint procedures on social media sites for removing infringing marks. • Register key marks in the Trademark Clearinghouse. • Enforce your rights by demanding that an infringer cease using the mark, and be prepared to sue the case out, either in federal court or through the UDRP process, if the user fails to respond to your cease and desist demand. • Protect your trade secrets by limiting disclosure and requiring employees and independent contracts to sign non-disclosure agreements. 46 . DEFAMATION The posting of defamatory material can lead to liability for defamation and invasion of privacy and such acts have given rise to several lawsuits. Businesses must be vigilant against allowing such material to be posted by their employees or otherwise appear as a result of online marketing or other activities. Traditional defamation law recognizes that reputation is a valued possession and that individuals have an interest in preserving their good names. Defamation is a tort, or civil wrong, that attempts to redress damages to reputation. [See discussion of Defamation in Social Media and the Employment Relationship.] Any article, story, or statement that appears online is considered published and subject to a potential defamation claim. The federal Communications Decency Act (CDA) immunizes website operators and other interactive computer service providers from liability for certain tortious acts of third parties, including acts of defamation, invasion of privacy, and intentional infliction of emotional distress.

So long as the provider of the website or interactive service provider does not participate in the creation or development of the content, the operator as the mere passive transmitter of information will be immune from defamation claims arising from the use of third party content. The use of the DMCA and CDA to mitigate and reduce risks is fundamental to any business active in social media and ecommerce. Despite the generally broad application by the courts of immunity under the CDA, it will not protect a party who exercises editorial control over the content or whose edits materially alter the meaning of the content. If a business operates its own blogs, YouTube channel, or other social media account, they must avoid any possibility that they have contributed to the creation or development of offensive 47 .

content. If the business is such a participant in creating the offensive content the CDA immunity will not be available. Frequently Asked Questions What if you post a lie about someone on Facebook? You may be liable for defamation. This posting is a publication and you may have damaged this person’s reputation. What if I repeat something I thought was true on Twitter but later find out it was false? You may be just as responsible as the originator. You may however have some defense if you simply linked to the defamatory statement or re-tweeted the statement.

But creating your own tweet or adding something to the defamatory tweet will not help your case. If you re-tweet a message that may be defamatory are you protected by the CDA? You may be protected as the CDA shields both the provider of the interactive computer service and the user. Reposting or re-tweeting such statements is likely covered by the CDA, so long as the re-poster or re-tweeter did not participate in creating the original content. It should also be noted that the CDA is not available to protect one for the posting of content that infringes the copyright or trademark of others. In the event of such allegedly infringing content the operator of the site must follow the notice, take down, and other procedures to comply with the DMCA as discussed above. 48 .

PROTECTION THROUGH TERMS OF USE AND PRIVACY POLICIES The DMCA and CDA offer important safe harbors to businesses relative to the unauthorized posting of content on corporate sites or social networks. Another way to mitigate these and other risks is through the use of effective terms of use. Most social media sites and websites have terms of use that users are supposed to follow when participating in such sites. These terms of use along with the website privacy policy frequently appear through a link at the bottom of the home page of the website.

A violation of these terms of use may constitute a breach of contract and “exceeding authorized access” under the Federal Computer Fraud and Abuse Act (“CFAA”) 18 U.S.C. § 1030. The CFAA provides, in part, as follows: “whoever knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access … shall be punished as provided in subsection (c) of this section.” This additional protection to website owners would be available if the terms of use explicitly prohibited the posting or uploading of infringing content and a valid click wrap agreement required the user to acknowledge acceptance of the terms of use, by clicking on an I Accept button. The terms of use might also include other relevant terms and conditions of use including limitations of liability, dispute resolution, governing law, and appropriate representations, warranties, and indemnification from the user. 49 .

All of the major social media platforms have terms of use that are updated and revised from time to time along with their privacy policies. These so-called “agreements” are not negotiated and lack the “meeting of the minds” that is typically required for enforceable legal agreements. While academics and others still debate the legality of these unilateral standard form contracts, the courts have generally upheld these terms of use. A defense that the terms were either not read or understood will not likely be supported in court. If a business makes use of social media they should assume that the terms of use and privacy policies will be enforced.

[Links to the most current terms of use for several social media platforms appear at the end of this Guide. These terms can be changed unilaterally at any time by the provider and frequently do so you are advised to confirm the most recent version of the terms of use and privacy policy.] 50 . EFFECT OF SOCIAL MEDIA USE ON PRIVACY AND SECURITY COMPLIANCE Participating in social media or conducting any ecommerce activity, in essence, makes a business a global company, and the laws of other countries may have to be considered. This is particularly true in the area of privacy where the United States approach is markedly different than Europe. The focus of this Guide is limited to a discussion of United States law. This Guide does not cover the privacy laws and regulations of each and every jurisdiction. A business should be alert to the legal environment they operate within and appreciate the unique legal challenges posed by social media based on their activities and geography.

With this information a business should implement secure and effective marketing and ecommerce programs and avoid unnecessary risks in the workplace. A major step in this direction would be the use of a social media and privacy policy as well as a security program that are implemented in conjunction with training and education of employees. Privacy Related Laws and Regulations A business’s collection of personal information of customers through active websites, ecommerce, online promotions, apps, customer and product support, marketing, and other activities may implicate privacy and security compliance obligations. These concerns should likewise be considered when using social media such as Facebook and Twitter.

There are both federal and state laws to consider relative to consumer protection and the collection, use, and security of personal information. 51 . While a privacy policy may be posted, and the business posting the policy will be required by law to abide by the policy, the actual content and substance of the policy is not regulated. There is no law that prohibits a website operator from sharing or selling personal information it has lawfully obtained. The website operator could however be liable for failing to notify a customer of its practice of selling or sharing such information. The Federal Trade Commission (FTC) Act generally prohibits deceptive trade practices. However, it has often been used in the specific context of company policies and activities related to personal consumer information obtained via the internet, and in particular, a company’s compliance with its stated privacy policy (discussed below).

The FTC’s Fair Information Practices Principles set out the following general guidelines relating to a company’s collection of consumer information over the internet: • Consumers should receive notice of the company’s information practices before their personal information is collected; • Consumers should receive a choice as to how certain collected personal information will be used; • Consumers should have the ability to access and correct their information; and • Companies must take appropriate steps to protect consumer information. There are no specific or definitive security measure requirements set forth in the FTC Act. Rather, a company’s protection must be “reasonable.” This standard takes into account the sensitivity of the collected data, the nature of the business’s operations, the scope and type of risk faced by the company, and the protections available to the company. In particular, companies should only retain data as long as necessary to satisfy a legitimate business or legal need. 52 .

The FTC also provides guidelines specific to online behavior advertising, a mainstay in the social media context. The FTC defines online behavior advertising as “the tracking of a consumer’s online activities over time – including the searches the consumer has conducted, the web pages visited, and the content viewed – in order to deliver advertising targeted to the individual consumer’s interests.” In this context, companies are recommended to: • Provide transparency regarding their data privacy practices; • Allow customers to choose whether or not to have their information collected; • Provide reasonable security for the data collected; and • Ensure they comply with their stated data privacy policies. For companies utilizing the internet and/or social media as an advertising tool, the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM) provides an important regulatory framework. The CAN-SPAM Act regulates the use of email addresses for commercial purposes, and sets out specific requirements for such emails’ header information, subject lines, message identification, and opt-out notices. Other federal data privacy laws apply to particular business sectors. The Gramm-Leach-Bliley Act (GLBA) regulates the security of personal information collected by financial institutions, and sets forth particularized disclosure and protection procedures. The Health Insurance Portability and Accountability Act (HIPAA) governs personal information collected by health care providers and related entities.

And the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA) apply to businesses within the credit reporting industry. 53 . HIPAA Compliance HIPAA requires organizations to safeguard the electronic record of patient information including a patient’s health status, medical care, treatment plans, medical care, and payment. HIPAA compliance is beyond the scope of this Guide but is mandatory and essential to mitigating risks when using social media. The ease of using social media, like email and other forms of electronic communication, make a business vulnerable to HIPAA compliance issues. Businesses should make sure that processes are in place to prevent the access and use of protected patient information by unauthorized employees or third parties. If you are a health care organization or a business that provides services to a health care organization you must make sure that you are HIPAA compliant.

The penalties and consequences of non-compliance can be severe. Best practices would include appropriate policies, written agreements, employee education, and secure technology to restrict access, manage content, and prevent data theft, confidentiality breaches, and other security threats. COPPA The federal Children’s Online Privacy Protection Act (COPPA) regulates the collection of information by commercial websites or online services from children under the age of 13. Websites that purposefully collect personal information from children or are directed toward children are required, among other actions, to provide a privacy policy and give direct notice to and receive consent from parents prior to collecting or disclosing a child’s personal information.

Final amendments to the FTC’s Children’s Online Privacy Protection Rule were approved and are set to take effect on July 1, 2013. While the core COPPA principles remain unchanged, it is important to become familiar with COPPA and any changes in the law if your business markets products or services online that are directed to 54 . children under 13 or if you have actual knowledge that you are collecting personal information online from children in that age group. The new rules generally cover parental notice and consent mechanisms, confidentiality and security requirements, as well as new definitions that include geo-location information. The FTC has sent notices to more than 90 mobile app developers reminding them of the broader definition such that liability could be triggered for apps that do not provide parental notice and consent before collection or use of photographs, videos, address and location information, cookies, IP addresses, or other unique identifiers involving children under 13. Any business operating online consumer services should evaluate how changes to COPPA impact their compliance obligations. Data Breach If your business uses credit cards, social security numbers, health care records, private financial data, or other sensitive consumer information, it is essential to comply with the relevant data breach notification laws. The United States does not currently have one federal nationwide data breach notification law that requires the reporting of security breaches.

There are however a number of federal laws to consider. In addition to the framework of federal laws, individual state laws also apply to the use of the internet and social media by companies, and in particular, security of personal information obtained through these channels. Many states have laws similar to the FTC Act, the GLBA, and HIPAA, as well as more particularized regulations surrounding social security numbers, disposal of records, and breach notification.

Industries may provide their own standards as well, such as the CTIA Best Practices and Guidelines for Location Based Services, which intend to “promote and protect user privacy as new and exciting locationbased services are developed and deployed.” CTIA lists the most 55 . important principles in this arena as user notice and consent to location-based tracking. The use of smartphones, tablets and other mobile devices outside the business’s firewall and beyond the reach of security safeguards places the confidential business information (and possibly protected patient information) at increased risk of interception, theft, or loss. This increased risk is further reason to have appropriate privacy and security rules in place. Privacy Policies As discussed above, one of the most important protections a company can have in its online dealings with consumers is a privacy policy. Though privacy policies are not required under the FTC Act, a company that has one (and complies with it) has a defense against certain potential consumer claims, and a convenient vehicle for setting forth how it complies with the remaining laws applicable to data privacy on the internet. California specifically requires the disclosure of online privacy practices by commercial websites and online services. California’s Online Privacy Protection Act (OPPA) requires commercial operators of websites and online services, including mobile and social apps which collect personally identifiable information from Californians to conspicuously post a privacy policy. The OPPA also includes specific requirements for the content of privacy policies.

This has broad implications for any business that has a commercial website or mobile application. The California Attorney General’s office has already gone after Delta Airlines for failing to comply with OPPA by not having a conspicuous privacy policy within their mobile app called “Fly Delta”. The Attorney General has indicated that she and her office are prepared to sue developers if necessary to enforce OPPA.

In addition, the Attorney General has reached an agreement with the major app platforms to require that apps distributed through their platforms have clear privacy policies. 56 . Since California has the most stringent privacy laws of any other state, it is often used as a benchmark. When privacy policies are drafted, even for non-California based businesses, compliance with California privacy laws will most likely assure that a business will limit their risks elsewhere. For the same reason, businesses consider the Massachusetts law governing the implementation of security safeguards to protect personal information as Massachusetts implemented rigorous laws in this area. What is typically included in a privacy policy? At a high level, privacy policies should describe the types of personal information collected from users of the site (whether directly or indirectly), and how the company may use and/or disclose such information. A current privacy policy is typically binding on the user by the user’s use or access of a website or application, but the FTC has made it clear that companies must provide consumers with an additional opportunity to opt-out any time it makes new, material changes to its privacy policies. The most typical and important privacy policy provisions include: • Information collected by the company about its users, both voluntarily (such as a form submission or post) and involuntarily (i.e., through cookies, IP addresses, or global positioning technology); • User responsibility and guidelines for “user contributions” such as public posts; • How the company may use personal information collected (e.g.

customizing web presence, providing information and advertisements to users); • How the company may disclose personal information collected (e.g. to subsidiaries and affiliates, in connection with a legal obligation, to advertisers); • How a user may access and/or correct its personal information; 57 . • How the company secures the data on its site; and • Any state-specific rules or regulations. A privacy policy typically also includes contact information for the company, and the most recent date of any amendments or revisions. While privacy policies are often simply statements of a website’s practices, many incorporate their policy into their terms of use (discussed below) and require that a user accept the terms as a binding contract. In some cases courts have had to consider whether or not to enforce privacy claims against a business based on breach of contract. [See In re Northwest Airlines Privacy Litigation, 2004 WL 1278459 (D. Minn.

2004) finding that the privacy statement did not constitute a unilateral contract and that plaintiff must have read the policy to rely upon it).] Terms of Use Terms of use are often used in connection with a privacy policy to protect a business in its commercial online dealings. As compared to a privacy policy, terms of use set forth more broadly the rules for a user’s interaction with a company’s site or service. The burden is on the user to agree and comply with the terms (either implicitly by using the site, or by clicking a box), but providing such a contract helps a company control and police its site. Typical terms of use provisions include the following: • How users can access the site and maintain account security; • What intellectual property rights exist in site content and contributions; • Prohibited uses of the site; • Standards for user contributions and content; • Company monitoring and enforcement mechanisms; 58 .

• Liability and responsibility for information on the site including DMCA notice ; • Links to or from the website; • Any geographic restrictions on users of the site; • Warranty disclaimers and limitations on company liability; • Any indemnification obligations; and • Other standard contractual provisions. As with privacy policies, terms of use typically also include contact information for the company and the most recent date of any amendments or revisions. Due to the evolving nature of laws surrounding data privacy and security on the internet, as well as the increase in business’s involvement with consumers via the web, many companies find beneficial an annual audit of privacy and security policies as well as their website to ensure that practices, policies, notices, and statements are consistent with legal standards and industry best practices. 59 . 60 . COMPLIANCE WITH SECURITIES AND DISCLOSURE LAWS Federal and state securities and other disclosure laws are also important to consider in the context of communicating via social media. For example, SEC Regulations FD (“Fair Disclosure”) and G prohibit companies from selectively disclosing certain material nonpublic information or non-GAAP financial information. The Private Securities Litigation Reform Act of 1995 regulates certain forward-looking public statements made by companies. And SEC Rule 10b-5 broadly prohibits companies from making false or materially misleading public statements (including the omission of material information).

In additional to government regulation, both the NYSE and NASDAQ also maintain policies regarding the dissemination of material company information. Any disclosure via social media therefore becomes a potential liability under securities laws, particularly because many social media outlets encourage brief and casual types of statements rather than full-context messages that have been fully confirmed and vetted. Because of the securities’ laws general prohibition on selective disclosures of material information, any brief business or financial disclosure via social media (whether positive or negative) could be deemed incomplete, or to be omitting other material information that informs the statement. Whether social media disclosures violate these regulations often depends on specific facts and circumstances, including whether the disclosure was deemed to be “public” or not. The SEC would particularly examine how broad or exclusive the disclosure channel is on which the information is distributed. 61 .

Social media also causes concerns relating to companies’ actual offering and sale of securities. Multiple SEC regulations address disclosures in the framework of a securities offering, including general solicitation of purchasers, “gun jumping” concerns, and other registration concerns. Historically, these have been particularly scrutinized in the context of initial public offerings. However, the creation of additional avenues to solicit the sale of securities has broadened the context for these issues. For example, so-called “crowd funding” has allowed businesses to solicit small investments from thousands of investors. In 2011 the SEC challenged two entrepreneurs’ effort to raise money online to purchase Pabst Brewing Company.

They were alleged to have violated SEC securities regulations by launching a website seeking pledges of money in exchange for ownership shares. This online offering triggered SEC requirements for security registration and disclosures of financial information. Kickstarter is considered to be one popular online “crowd funding” tool that allows entrepreneurs to raise capital, but does not run afoul of SEC securities regulations because the capital is considered a donation with no ownership stake provided (rather, investors are given other benefits such as a memento from the company). In 2012, the Jumpstart Our Business Startups Act (JOBS) [Pub. L. No.

112-106] created an exception to the traditional securities requirements for small companies going public via online offerings. However, regulations related to the JOBS Act are still being adopted, and any company considering raising capital should consult with a lawyer familiar with SEC laws and regulations. Best Practices The following are some general suggestions for avoiding SEC compliance issues in the context of social media use: • Ensure your company’s social media guidelines cover securities and corporate governance issues, and advise 62 . employees as to the risks if speaking as a representative of the company via social media. • Convey full context when tweeting or posting corporate information, by incorporating a link to complete information such as the full earnings release, any downsides to a positive statement, GAAP reconciliation, etc. Include forward-looking disclaimers if the information being conveyed is “fuzzy,” or unverifiable. • Monitor access to social media content and activity, and plan for responses to any leaks of out-of-context, material information. 63 . 64 . SOCIAL MEDIA AS A MARKETING TOOL Pitfalls of Advertising By Email, Text Messaging and Online The regulation of advertising generally falls under the Federal Trade Commission’s (FTC’s) ability to prohibit “unfair and deceptive practices.” This prohibition has been interpreted as covering all consumer advertising, but this section covers the additional federal and state laws that prohibit or regulate advertising through the more “social” outlets of email, text messaging and online. And with the increasing popularity of advertising and customer feedback through text messaging, the Federal Communications Commission (FCC) also has jurisdiction over some advertising, providing an even wider swath of consumer remedies when companies have not followed advertising laws. Email Advertising and CAN-SPAM ACT The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act regulates the sending of commercial email messages. Most companies that send customer emails are aware of the general requirements of the CAN-SPAM Act, but basically, unless a company is emailing about a transaction initiated by the consumer, there are requirements that marketers include certain disclosures and “opt-out” functions in every email sent to consumers. First, all email messages must use accurate header and routing information, including the originating domain name and email 65 . address. The message must also include a valid physical postal address where recipients can send mail to the sender. The message must use accurate subject lines, and identify itself as an advertisement. Finally, the message must provide an opportunity for the recipient to opt out of future communications, and the sender must honor opt-out requests within 10 business days’ receipt of the request.

For companies using outlet offices or franchise systems, it is important to coordinate sending emails to consumers, as the FTC will consider a brand as one “company” for the purposes of the law and if consumers opt out of one type of email, they should be removed from all emails from that company. More importantly, violations of the CAN-SPAM Act can be steep – resulting in civil penalties of up to $16,000 for each message that violates the Act. In addition, criminal penalties can apply for certain actions, such as routing messages through other computers to disguise the origin of the message, or generating email messages through a dictionary attack. Although CAN-SPAM falls under the jurisdiction of the FTC, as will be discussed under the “text messaging” section, the FCC has applied the CAN-SPAM Act to emails sent directly to wireless devices, if sent through a telephone network, rather than through a computer network. This means a company sending emails through telephone networks could wind up facing enforcement actions from both the FTC and FCC. In addition to the federal anti-spam act, 37 states have enacted laws regulating unsolicited email advertising.

Most of the state laws target commercial or fraudulent email, although some laws apply to unsolicited bulk emails. Like the CAN-SPAM Act, most state anti-spam laws prohibit misrepresenting the origin of the message or the routing information of the sender. State laws generally also prohibit including misleading information in the subject line of an email.

Many states restrict the use of third-party computers, and some states prohibit the sale or distribution of software that is designed solely to forge the origin of email messages. 66 . The Telephone Consumer Protection Act (TCPA) and Text Messaging All marketing through telephonic devices, including mobile phones, is controlled by the Telephone Consumer Protection Act (TCPA), which falls under the FCC’s jurisdiction to regulate. Although email may still be the bread and butter of consumer communication by companies, text messaging is gaining in popularity, in large part because texting has proven to be one of the more effective and targeted forms of marketing. The TCPA requires that a caller provide their name and the entity from which they are calling, the phone number at which the entity can be reached, and that a caller not call before 8 a.m. or after 9 p.m.

The TCPA also established the National Do Not Call Registry. Once a consumer has put his or her personal number on the list, telemarketers cannot call (or text) them without express prior permission unless the parties have an established business relationship. Most applicable to text messaging, the TCPA also restricts the use of autodialers and prohibits any autodialed calls to a wireless device that charges for usage, unless the consumer has specifically consented to the communication. Short message service (SMS) messages and text messages sent to a number of consumers at once almost always use an “autodial” function and therefore, companies are prohibited from sending texts without consent.

And although not as steep as penalties for violating the CAN-SPAM Act, the TCPA allows for a private right of action (meaning consumers can sue a company directly claiming violation of TCPA) for $500 per infringing call or text message, or $1,500 per violation if the company willfully or intentionally violated the law. Because of this private right of action, the prohibition against autodialed text messages in the TCPA has gotten a number of large— and smaller—companies in trouble over the past decade, as mobile communication continues to grow. Notably, in 2011, a class action 67 . lawsuit was brought against Domino’s Pizza for a text message campaign that the plaintiffs claimed was directed to consumers who had not previously consented to the communication. A similar case was brought against Papa John’s in 2012. Domino’s settled its TCPA class action suit in 2013 for just under $10 million. In 2013, Huffington Post was sued for sending out “news alerts” by text messaging at all times of the day and night, but not taking readers off their list when receiving requests to “UNSUBSCRIBE.” With violations from $500 to $1,500 per text message, these lawsuits could be damaging enough to put companies out of business.

Larger and franchised companies need to be sure to have a pulse on what satellite or franchised offices are sending through mobile devices, as the FCC also treats the brand as a single company and requires that companies track their customer data very carefully to prevent misuse of text messaging as a marketing tool. Companies should generally make sure to create and maintain a tracking database for customers’ consent to be texted and follow up immediately when receiving a request to “unsubscribe” or “opt out” of future text or phone calls. Online and Behavioral Advertising Akin to regulating targeted email communication, the FTC is pushing hard to regulate companies’ use of “behavioral advertising” or advertising that tracks online activity and then targets a consumer with pop-up ads related to past searches or internet activity. In 2010, the FTC proposed a regulatory framework—dubbed “do not track” legislation—that would give consumers the same sort of control and “opt out” authority online as has been applied to email and phone communications.

Although a number of bills have been proposed in the U.S. Congress since the FTC’s framework was published, there has not yet been federal law passed to control companies’ use of marketing data or limit businesses’ ability to use online behavioral marketing. If passed, most suspect that unlike the 68 .

“do not call” registry, the “do not track” registry would not be a national registry. Rather, it may encompass restrictions on browsers to give consumers the ability to control what advertisements reach them and to control the data provided to businesses about their online activities. In the meantime, although not required, businesses should start to think through their ability to accurately describe their use of customer data and make sure privacy policies include any behavioral advertising activities. Some larger companies already using behavioral advertising, like Zappos® and Amazon®, provide links for consumers to click when they see various advertising that detail why consumers are seeing particular ads and how they can stop seeing certain ads. It is one thing if a consumer sees a shoe it was just browsing show up another site, but may be very different if sensitive prescription drug research done on one site shows up as advertising for aliment cures on another site. Advertising through Group Coupons Another popular social media marketing forum is the use of “group coupons”, offering discounts to a certain number of individuals signed up for couponing websites like Groupon® and Living Social®.

Although these companies have come under fire in recent years for taking large portions of the amount consumers pay for the services, there is also some risk of violation of state laws when limiting the redemption period or the amount of the coupon. A number of states, including Minnesota, have state gift card or gift certificate laws that apply to any electronic or written agreement for goods or services provided at the value shown on the certificate or card. Most of those state laws forbid any “fee” for dormancy when the gift certificate or gift card is not used in a certain period of time. Since most group coupons must be used within several months of the purchase date, retailers should be aware that in states with gift 69 . card laws, they may have to honor the group coupon long after the expiration date. They may be able, however, to only honor it for the amount it was purchased, rather than the face value of the deal paid for by the consumer. For example, if a company uses Groupon® and offers the ability for customers to pay $15 for $30 of goods by a certain expiration date, the customer could come in long after the expiration date and it must still be honored by the company, but only for the amount purchased of $15. 70 . SOCIAL MEDIA IN LITIGATION Twitter tweets, blog posts, LinkedIn profiles, text messages, YouTube videos, email, and any other online content may be considered electronic business records and subject to subpoena or otherwise used as evidence to support a lawsuit. All organizations are required by law to manage and maintain their electronic business records in a way that is compliant with the rules governing the discovery of evidence. Discovery is the phase of litigation when parties to a lawsuit must produce all documents relevant to the case. The process of requesting and collecting electronically stored information is called “e-discovery”.

E-discovery has become a significant part of most litigation today and adds an additional unexpected cost to the already expensive litigation costs. Failure to produce relevant electronically stored information can result in enormous financial penalties and sanctions imposed by the court. To be prepared for e-discovery and to mitigate risk, a business should adopt appropriate document retention policies and social media activity so it is ready when e-discovery requests are made. Best Practices • Do you have a social media policy in place and has it been reviewed in the past twelve months? • What is your record retention policy regarding electronic business records? • Are all users familiar with your policy and program? 71 . • Do users understand the difference between business records that must be retained and archived for legal and regulatory reasons and personal email that may be deleted in the ordinary course of business? • Do you have technology to archive and support your retention policy? • Do your employees understand the rule regarding personal use of corporate technology such as laptops, tablets, smart phones, social media accounts? • Can you effectively search your records to produce relevant business records? • Can you comply with the Federal Rules of Civil Procedure and applicable state laws and e-discovery guidelines? • In Minnesota the rules of civil procedure and e-discovery guidelines can be found at http:www.mncourts. gov/?page=511 • Determine an appropriate retention, preservation, and deletion schedules understanding that email and other forms of electronic information never disappear completely. • Form a records management team and implement a record retention policy • Create a litigation hold policy and procedures designed to mitigate risk and that can be implemented immediately upon the initiation of a lawsuit • Train employees and all those who may have access to our use your business records on your program and process for electronic record management so that they all know and understand what the business considers a “business record” and understand the role they play(if any) in the preservation of electronic business records and the deletion of non-records. 72 . SOCIAL MEDIA AUDIT This Guide presents a myriad of issues and concerns for a business to consider. What should your business do to comply with all of the rules and regulations associated with social media? Simply rolling out a new corporate policy on the use of social media is not the answer. In fact, a corporate social media policy might create additional risk for the employer. Before committing to any new policies or procedures you should take a good look at what you are already doing and what plans you have going forward. By conducting a comprehensive review of your current and planned use of social media you can make intelligent and strategic decisions that are appropriate to your business.

This will allow you to determine what steps your business must take to comply with the relevant laws and the best practices to minimize risk and maximize opportunities. This audit should be expansive and additionally cover privacy, security, intellectual property, technology use, and e-commerce issues. This information gathering, along with a review of the appropriate federal and state laws, will help you identify the specific risks and opportunities based upon your current and planned use of social media. It may also be appropriate to consider laws of countries other than the United States especially if privacy and security of personal information is involved.

If your business operates in a regulated industry such as financial services or health care then the audit should consider the specific regulations and compliance requirements for your business. 73 . Here is a sample of the type of information you should gather as part of this audit: • Do you have proper data security procedures in place? • Can employees access and download confidential and proprietary business information and customer data? • How are smartphones and other mobile devices used? • How are social media sites used to interact with customers, prospective employees, and the general public? • Does your business have a corporate page on Facebook or other social media platform? • Does your business operate a blog? Do your employees write for outside blogs? • Do your employees use Twitter for business purposes? • Is YouTube used to educate consumers on products and services? • Do you use internal employee only wikis or blogs? • Has employee use of social media had any effect on the business? • How are employees trained on proper use of social media? • What are your current policies regarding social media, privacy, intellectual property, blogs, mobile devices, email, text messaging, and other uses of technology? • What about policies for use of technology outside the office? • When were your formal corporate policies last updated ? • Are your website terms of use and privacy policies appropriate for your business? • Are e-discovery risks and compliance considered in record retention? 74 . Upon completion of this audit you might be surprised to find that you can take some easy and relatively inexpensive steps to mitigate risk, such as updating your corporate policies, revising website terms of use and privacy policies, and employee training. 75 . 76 . SOCIAL MEDIA PLATFORM TERMS OF USE The following are links to the terms of use of various social media platforms that were effective as of July 1, 2013. www.pinterest.com/terms/ www.twitter.com/tos www.facebook.com/legal/terms www.linkedin.com/legal/user-agreement 77 . 78 . RELEVANT LAWS AND REGULATIONS Fair Labor Standards Act (FLSA) Genetic Information Nondiscrimination Act (GINA) Family Leave Medical Act (FLMA) FTC Act [15 USC §§ 41-58 (as amended)] Section 43(a) of Lanham Act [15 USC § 1125(a) sections 43(a) and 43 (d) {ACPA}] Copyright Act [17 USC § 101 et seq.] Digital Millennium Copyright Act Computer Fraud and Abuse Act Minnesota State Wiretap law [Minn. Stat. § 626 A.02, subd. 1] Electronic Communications Privacy Act (ECPA) Stored Communications Act (SCA) Unlawful Internet Gambling Enforcement Act Uniform Trade Secrets Act, codified at Minn.

Stat. § 325C.01 79 . Communications Decency Act Telephone Consumer Protection Act (TCPA) [covers unsolicited text messages] JOBS Act Anticybersquatting Consumer Protection Act (ACPA) Fair Credit Reporting Act (FCRA) Electronic Funds Transfer Act (EFTA) Children’s Online Privacy Protection Act (COPPA) Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Health Insurance Portability and Accountability Act (HIPAA) Gramm Leach Bliley Act (GLBA) Drivers Privacy Protection Act (DPPA) US Telemarketing Sales Rule (TSR) US National Do Not Call Registry Junk Fax Protection Act (JFPA) National Labor Relations Act (NLRA) and related decisions 80 . 81 . A Legal Guide To The Use Of SOCIAL MEDIA IN THE WORKPLACE is available without charge from the Minnesota Department of Employment and Economic Development, Small Business Assistance Office, 1st National Bank Building, 332 Minnesota Street, Suite E-200, St. Paul, MN 55101-1351. Telephone: (651) 556-8425 or (800) 310-8323 Fax: (651) 296-5287 | Email: deed.mnsbao@state.mn.us Website: www.positivelyminnesota.com/sbao This guide is also available from Gray Plant Mooty, 500 IDS Center, 80 South Eighth Street, Minneapolis, MN 55402 Telephone: (612) 632-3000 Upon request, this publication can be made available in alternative formats by contacting (651) 259-7476. The Minnesota Department of Employment and Economic Development is an equal opportunity employer and service provider. Printed on Recycled Paper With a Minimum of 10% Postconsumer Waste . A Legal Guide To SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE SOCIAL MEDIA IN THE WORKPLACE ISBN 1-888404-61-2 The Use Of SOCIAL MEDIA IN THE WORKPLACE A Collaborative Effort Minnesota Department of Employment and Economic Development Gray Plant Mooty .

< 300 characters or less

Sign up to contact