Tag Archive for Employment

BYOD Could Land Employees in Jail

BYOD Could Land Employees in JailAgreeing to a BYOD policy could land an employee in jail. Courts can go after employee personal phones in litigation involving companies. Michael Kassner, an information security consultant told FierceMobileIT that employees could be dragged into civil or criminal litigation.

Agreeing to a BYOD policy could land an employee in jailEmployees could be required to give up their personal device to the courts or even have all the data on the device searched, with possible legal ramifications for the owner.  According to Mr. Kassner, “There is legal precedence involving e-discovery and plain-view doctrine that allows the seizure of evidence whether it is related to the case under investigation or not.” There are three possible legal scenarios involving BYOD, says Mr. Kassner who consulted with Tyler Pitchford, with the law firm of Brannock and Humphries.

The first scenario outlined in the article involves an employee who has signed a BYOD end-user license agreement, having his personal data wiped along with the corporate data. If the end-user agreement includes the clause enabling the wiping of all data on the personal device, the employee is out of luck.

Legal contractIn the above scenario we’re talking about a legal contract, which means if the employee signed the contract, he agreed to its terms, granting his employer the right to reset the employee’s phone,” comments lawyer Pitchford.

In the second scenario, the enterprise becomes involved in a civil lawsuit and a subpoena is issued for the employee’s smartphone. During the legal discovery process, sensitive personal information is publicly disclosed.

Since the employee co-mingled work and personal data, she has turned her smartphone into discoverable evidence …The employee can seek an order quashing the subpoena or an order sealing the discovered information, but that’s unlikely in this circumstance,” Mr. Pitchford observes.

DetectiveIn the third scenario brought up in the article, the employee’s company does business with a firm that is the subject of a criminal proceeding. Authorities issue a warrant for the employee’s phone because the employee has done work for the targeted firm. Incriminating evidence is found on the employee’s phone and the employee is now under criminal investigation.

Assuming the warrant is valid, then anything the government located in plain view within the scope of the warrant is admissible against the employee in another proceeding,” Mr. Pitchford notes.

Case lawMr. Kassner concludes: “Until case-law or new technologies decide which way the legal winds are blowing about BYOD, it might be in your best interest to avoid BYOD and its alluring convenience.

rb-

I am not a lawyer and you should consult your own legal counsel but as I have said this before – ummm Acceptable Use Policy?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IT Admins Switching Careers Due to Stress

IT Admins Switching Careers Due to StressHelp Net Security highlights a report from GFI Software which reports that 67% of IT administrators have considered switching careers due to job stress. IT administrators cited managers, users (employees), and tight deadlines as the biggest job stressors. GFI’s survey results (PDF) also revealed that IT professionals tend to work long overtime hours, with one-third working up to 10 extra weeks per year.

GFI Software logoThe independent blind survey, which polled 204 IT administrators in U.S. organizations ranging from 10 to more than 500 employees, gauged respondents’ stress levels at work and revealed their opinions on their main stressors, as well as how their stress level compares to friends and family, and how it affects their personal and professional lives.

Key findings from the GFI Software survey include:

  • Nearly 70% of all IT administrators surveyed consider their job stressful.
  • Greater than 67% of IT administrators consider switching careers on either an occasional (43%) or regular (25%) basis due to job stress.
  • 72% of respondents consider themselves either just as stressed as or the most stressed compared to others in their social circle.
  • While less than half (47%) of IT admins at companies with between 10 and 49 employees say their jobs are stressful, that number skyrockets to 83% when those at companies with between 50 and 99 employees are polled, representing the most stressed group in the respondent base.
  • The top three sources of stress for IT admins are management (28%), tight deadlines (20%), and the users they support (18%).
  • IT admins in the Northeast are the most stressed in the country (74%). Midwesterners are the least stressed, with nearly two-thirds (64%) still saying their job is stressful.

their job has affected their personal lifeIn addition to the stressors themselves, IT admins also told GFI that they routinely put in many overtime hours beyond the traditional 40-hour workweek. More than one in three (36%) say they work eight hours or more of overtime during an average week, which adds up to nearly 10 extra weeks per year.

Nearly 85% of respondents feel as though their job has affected their personal life in some way. According to the survey results, respondents have:

  • Lost sleep over work (42%)
  • Missed out on social functions (40%)
  • Missed time with their kids (39%)
  • Canceled commitments to friends and family due to work (35%).

Additionally, many GFI survey respondents say their jobs have even affected their health. Nearly one in four (22 percent) say they don’t feel great physically and 20 percent say they have experienced stress-related health issues, such as high blood pressure.

rb-

The article concludes with Phil Bousfield, general manager of GFI Software’s Infrastructure Business Unit who says; “IT is a critical component of a company’s success.” He says, “firms … need to take these findings as a wake-up call, and ensure their IT staff is supported, productive, and armed with the tools they need to be successful. Doing so will deliver business value and help IT admins have a better work-life balance.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Time to Review Corporate Computer Policies

Time to Review Corporate Computer Policies The National Law Journal is reporting that three recent court decisions make it important for companies to begin a thorough review of their computer policies. The National Law Journal suggests firms focus on two issues: ensuring that employees have no expectation of privacy in using the company computer systems and delineating the scope of the employee’s permissible access to the company computers. The article by Nick Akerman, a partner in the New York office of Dorsey & Whitney who specializes in trade secrets and computer data discusses three recent decisions and their implications for creating effective corporate computer policies that protect the company against the theft of its data.

Mr. Ackerman says two recent decisions, Quon v. Arch Wireless Operating Co. Inc. and Stengart v. Loving Care Agency Inc., affect a company’s ability to gather evidence from its own computers. The article states both cases found company computer policies insufficient to defeat the employee’s expectation of privacy in using the company computers for personal reasons. Whether an employee has an expectation of privacy on the company computers can become a critical issue when an employee is suspected to have stolen corporate data.

review of text messagesIn Quon, (which I wrote about here) the 9th U.S. Circuit Court of Appeals held that a review of text messages on pagers provided to municipal police officers violated the Fourth Amendment as an unreasonable search. The article explains that although the city had no express policy “directed to text messaging by use of the pagers,” it did have a general “Computer Usage, Internet and E-mail Policy” applicable to all employees that limited the “use of City-owned computers and all associated equipment, software, programs, networks, Internet, e-mail and other systems operating on these computer” to city business.  This policy was acknowledged in writing by each city employee, and it was announced orally that this policy applied to pagers according to the National Law Journal.

The article goes on to state that the 9th Circuit affirmed the district court’s finding that Quon had a reasonable expectation of privacy with respect to the text messages because the policy did not reflect the “operational reality” at the police department where the staff was told that the department “would not audit their pagers so long as they agreed to pay for any overages” that exceeded a “25,000 character limit.” Consistent with that informal policy, Quon had exceeded that limit “‘three or four times and had paid for the overages every time without anyone reviewing the text of the messages,” demonstrating that the police department “followed its ‘informal policy’ and that Quon reasonably relied on it” the author states.

YahooIn Stengart, Mr. Ackerman argues the issue of the computer policies arose in the context of the attorney-client privilege. Marina Stengart used her employer’s laptop computer to communicate with her attorney about an anticipated lawsuit against her employer “through her personal, web-based, password-protected Yahoo email account.” After Stengart filed a discrimination suit, her then-ex-employer found many e-mails on the company computer between Stengart and her attorney. The employer’s computer policy was nearly identical to the policy addressed in Quon with one significant exception. Unlike the written policy in Quon, which limited the use of the computers to the employer’s business, the policy in Stengart provided that “[o]ccasional personal use is permitted.”

The court found two specific “ambiguities” with the computer policy that “cast doubt over the legitimacy of the company’s attempt to seize and retain personal e-mails sent through the company’s computer via the employee’s personal email account.” First, the “policy neither defines nor suggests what is meant by ‘the company’s media systems and services,’ nor do those words alone convey a clear and unambiguous understanding about their scope.” Second, the court found that one could reasonably conclude “that not all personal emails are necessarily company property because the policy expressly recognizes that occasional personal use is permitted.” Given these ambiguities, Stengart could have assumed her e-mails with her attorney would be confidential.

The National Law Journal article says the third decision relates to a company’s ability to use evidence found on its own computers to bring a viable court action against the disloyal employee under the federal Computer Fraud and Abuse Act to retrieve the stolen data and prevent its dissemination in the marketplace. The CFAA, provides a civil remedy for a company that “suffers damage or loss” by reason of a violation of the CFAA. A critical element in proving most CFAA claims is that the violator accessed the computer “without authorization” or “exceeding authorized access.”

The last case, LVRC Holdings LLC v. Brekka, Mr. Ackerman argues has made it more important than ever for corporate computer policies to address what is not permissible access to the company computer system. He reports that Brekka puts into question the concept that an employee’s authorization to access the company computers is predicated on his agency relationship with his employer such that when an employee violates his duty of loyalty by stealing his employer’s data, his authorization to access the company computers terminates. Brekka refused to apply the CFAA to a theft of employer data, holding that employees cannot act “without authorization” because their employer gave them “permission to use” the company computer.

Although this division in the circuit courts will ultimately have to be resolved by the U.S. Supreme Court, the article says that from an employer’s standpoint it is important to emphasize that the agency relationship with the employee is not the only way to prove that an employee’s access to the company computer was unauthorized or exceeded authorization. Employers can proactively establish the predicate for unauthorized access by promulgating the rules of access through company policies. The “CFAA … is primarily a statute imposing limits on access and enhancing control by information providers.. Thus, a company “can easily spell out explicitly what is forbidden” through several methods including an employee handbook explains the National Law Journal article.

Mr. Ackerman concludes by suggesting that in designing corporate computer policies and employee agreements, it is important not to lose sight of the well-established operating principle that company computers are company property, and, as such, the company can “attach whatever conditions to their use it wanted to,” even if these conditions are not “reasonable.” Nonetheless, he suggests in light of Quon, Stengart and Brekka, a company should check its computer policies to make sure that they do the following:

• Clearly define the computer systems covered by the policy; expressly encompass whatever technology is used, such as text messaging or instant messaging; and address not only the servers but removable media such as thumb drives and disks.

• Make clear that all data created in furtherance of any personal use belongs to the company — including use of the company systems to access personal web-based e-mail accounts — and may be monitored by the company and will not be confidential.

• Reflect operational reality and are audited at least annually to ensure they reflect operational reality.

• Spell out precisely the scope of an employee’s permissible authorization to the company computers, particularly what they are not permitted to do, e.g., access the company computers to retrieve company data for a competitor.

The time to get this right is now before the company finds itself the victim of data theft.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Detroit is Growth Leader in Tech Jobs

Detroit is Growth Leader in Tech JobsMost of the things I read in the Bach Seat about Detroit are negative at best, so good news about jobs in Detroit is always welcome. Detroit has seen a 66% growth in tech jobs which BussinessWeek says second-best in the U.S., behind Cleveland.

The article says that Detroit employers are looking for technology workers as automakers create cars with increasingly sophisticated Internet services (a trend I wrote about here) and lithium-ion batteries. Skills needed in Motor City are project management and experience with Oracle software. The tech top employers in Motown are Computer Sciences and General Electric.

Cities with tech job growth

Detroit3. Cincinnati

4. Jacksonville, FL

5. Salt Lake City

6. Richmond, VA

7. Miami

8. Tampa

9. Portland, OR

10. Pittsburgh

rb-

I have hired a couple more techs to coordinate and am looking to hire a couple more, so maybe BuseinessWeek is right.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.