Vol. 72, No.
3, March 1999
Coping With the Legal Perils of Employee
Email
Endnotes
1An article
in USA Today reports:
"Email has become so popular that many managers are using
it more than the telephone for business communication. More than
35% of 400 managers polled say they use email the most of any
communications tool, based on an April survey by the American
Management Association and Ernst & Young. That beats the
26% who use the phone most frequently and 15% who rely on face-to-face
meetings."
2 R. Timothy Muth, Security
on the Internet, 70 Wis. Law. 17 (Oct. 1997).
3This article is not concerned
with possible viruses, spam email, or other similar potential
dangers commonly associated with Internet browsing and email
communication.
4 Senate Report No. 99-541, which
is the chief legislative source of the Electronic
Communications Privacy Act of 1986 (ECPA), 18
U.S.C. § 2510, et seq., defines email, or "electronic
mail," in terms that could apply to both internal company
or Internet email:
"Electronic mail is a form of communication by which
private correspondence is transmitted over public and private
telephone lines. In its most common form, messages are typed
into a computer terminal, and then transmitted over telephone
lines to a recipient computer operated by an electronic mail
company. If the intended addressee subscribes to the service,
the message is stored by the company's computer 'mail box' until
the subscriber calls the company to retrieve its mail, which
is then routed over the telephone system to the recipient's computer.
If the addressee is not a subscriber to the service, the electronic
mail company can put the message onto paper and then deposit
it in the normal postal system. Electronic mail systems may be
available for public use or may be proprietary, such as systems
operated by private companies for internal correspondence."
From Westlaw Online version of S. Rep. 99-541, p. 16-17.
5This article is located
online. Attorneys Dichter and Burkhardt are with the Philadelphia
office of Morgan, Lewis & Bockius LLP. Their scholarly article
is recommended to anyone interested in the topic of this article.
6 PBS
Online
7 International
Communications Headcount.com
8 "Unleash
E-Commerce Now", an article from Wired Magazine. See also ZD-Net
E-Business Homepage.
9Harley v. McCoach, 928
F. Supp. 533 (E.D. Pa. 1996); Strauss v. Microsoft Corp.,
814 F. Supp. 1186, 1193-94 (S.D. N.Y. 1993).
10 Harley, 928 F. Supp.
at 540.
11 It appears that negligence
and not strict liability continues to be the standard for determining
whether an employer is liable for creating a hostile work environment,
at least in the Seventh Circuit. According to an en banc determination
of the court in Jansen
v. Packaging Corp. of America, 123 F.3d 490 (7th Cir.
1997), "All the judges with the exception of Judges Easterbrook,
Rovner, and Wood believe that negligence is the only proper standard
of employer liability in cases of hostile-environment sexual
harassment even if as here the harasser was a supervisor rather
than a coworker of the plaintiff." Id. at 494.
12Noble v. Monsanto Corp.,
973 F. Supp. 849, 858 (S.D. Iowa 1997). See Faragher
v. City of Boca Raton, 118 S. Ct. 2275, 2292-93 (1998),
wherein the U.S. Supreme Court stated:
"In order to accommodate the principle of vicarious liability
for harm caused by misuse of supervisory authority, as well as
Title VII's equally basic policies of encouraging forethought
by employers and saving action by objecting employees, we adopt
the following holding in this case and in Burlington Industries
Inc. v. Ellerth, ante, ___ U.S. at ___, 118 S. Ct. at ___,
also decided today. An employer is subject to vicarious liability
to a victimized employee for an actionable hostile environment
created by a supervisor with immediate (or successively higher)
authority over the employee. When no tangible employment action
is taken, a defending employer may raise an affirmative defense
to liability or damages, subject to proof by a preponderance
of the evidence. See Fed. Rule Civ. Proc. 8(c). The defense
comprises two necessary elements: (a) that the employer exercised
reasonable care to prevent and correct promptly any sexually
harassing behavior, and (b) that the plaintiff employee unreasonably
failed to take advantage of any preventive or corrective opportunities
provided by the employer or to avoid harm otherwise. While proof
that an employer had promulgated an antiharassment policy with
complaint procedure is not necessary in every instance as a matter
of law, the need for a stated policy suitable to the employment
circumstances may appropriately be addressed in any case when
litigating the first element of the defense."
13Paine Webber Jackson and
Curtis Inc. v. Winters, 579 A.2d 545, 548 (Conn. App. 1990).
14 While the law is unsettled
and still in a state of flux, the existence of a Web page can
be sufficient to subject a company to the jurisdiction of a foreign
tribunal. Heroes Inc. v. Heroes Found, 958 F. Supp. 1,
*4 (D.D.C 1996); cf. Inset Sys. Inc. v. Instruction Set Inc.,
937 F. Supp. 161, 164 (D. Conn. 1996). Where a company responded
to "hits" from out-of-state visitors to its Web page
by sending out email across state lines, at least one court found
that the Web page and email responses were sufficient to confer
jurisdiction over that foreign company. Maritz v. CyberGold
Inc., 947 F. Supp. 1328, 1333 (E.D. Mo. 1996) ("CyberGold
automatically and indiscriminately responds to each and every
Internet user who accesses its Web site. Through its Web site,
CyberGold has consciously decided to transmit advertising information
to all Internet users, knowing that such information will be
transmitted globally.").
15 Castano v. American Tobacco
Co., 896 F. Supp. 590 (E.D. La. 1995).
16 Consider the following description
of the new Microsoft Office 2000:
"With Office 2000, you can save Office documents in HTML
file format and retain the fidelity of your native Office file
format. By saving as HTML, you ensure that anyone with a Web
browser can view your documents. Office 2000 also simplifies
publishing your Office documents to your intranet or to an Internet
site. New File Open and File Save dialog boxes make saving documents
to a Web server as easy as saving them to your hard disk or to
a file server."
Quoted from Microsoft
Office 2000 WWW site.
17 See, e.g., Jackson
v. Metropolitan Edison Co., 419 U.S. 345, 453 (1974);
United States
v. Jacobsen, 466 U.S. 109, 113 (1984).
18See, e.g., Wis. Stat.
§ 895.50.
19 Electronic Communications Privacy
Act of 1986, 18
U.S.C. § 2510, et seq.
20 There are other reasons why
an employer needs to be cautious about how it treats employee
email. For example, the NLRB recently ruled that employee email
could be found to be a protected activity. 14 Comp. Law. 22 (September
1997).
21 K-Mart Corp v. Trotti, 677
S.W.2d 632, 634-35, 640-41 (Tex. Ct. App. 1984) (where an employer
was found liable for $100,000 for conducting a search of an employee's
locker on a suspicion of wrongdoing); cf. Doe v. Kohn, Nast
& Graf, 862 F. Supp. 1310, 1326 (E.D. Pa. 1994) (involving
the searching of an attorney's desk by his partner).
22 K-Mart, at 638.
23Saldana v. Kelsey-Hayes Co.,
443 N.W.2d 382, 384 (Mich. App. 1989); Simmons v. Southwestern
Bell Tel., 452 F. Supp. 392, 394 (W.D. Okla. 1978). Even
public employers can monitor employees or search their workspaces
if there is a legitimate business reason for such searches, although
the Fourth Amendment obviously increases the extent of an employee's
right to privacy. See, e.g., O'Connor
v. Ortega, 480 U.S. 709, 719-20 (1987).
24 Smyth v. Pillsbury Co.,
914 F. Supp. 97 (E.D. Pa. 1996) (Despite the fact that an
employer assured employees that email communication would be
private [Id. at 98], the employer escaped liability because
the employee who was terminated after the company searched for
and found offensive email was an at will employee.). Id. at
101.
25 Regardless of privacy issues,
it would seem that an employer will be protected if the employer
attempts to block employee access to pornographic, violent, harassing,
or otherwise objectionable Web sites or third-party email sent
into a company, under the Good Samaritan exception to the Telecommunications
Act of 1996, 47 U.S.C. § 230, which provides in pertinent
part:
"No provider or user of an interactive computer service
shall be held liable on account of -
"(A) any action voluntarily taken in good faith to restrict
access to or availability of material that the provider or user
considers to be obscene, lewd, lascivious, filthy, excessively
violent, harassing, or otherwise objectionable, whether or not
such material is constitutionally protected; or
"(B) any action taken to enable or make available to information
content providers or others the technical means to restrict access
to material described in paragraph (1)."
26 18
U.S.C. § 2510 (5). While it could be argued that the
quoted definition does not reach email, it is clear from the
legislative history underlying this Act that it was intended
to reach email. See, e.g., the quoted language from Senate
Report No. 99-541, reproduced supra at footnote 4.
2718 U.S.C. §§ 2510-2522;
2701-2711,
3121-3127.
2818 U.S.C. §§ 2511,
2520.
29Cf. Sanders v. Robert Bosch
Corp., 38 F.3d 736, 741 (4th Cir. 1994).
30Watkins v. L.M. Berry &
Co., 704 F.2d 577 (11th Cir. 1983) ("[T]he general rule
seems to be that if the intercepted call was a business call,
then Berry Co.'s monitoring of it was in the ordinary course
of business." Id. at 582).
31 Deal v. Spears, 980
F.2d 1153, 1157 (8th Cir. 1992).
32 James v. Newspaper Agency
Corp., 591 F.2d 579, 581 (10th Cir. 1979).
33 In addition to the ECPA, consider
the terms of Wis. Stat. section 968.31, which proscribes the
interception of wire and electronic communication, that contains
exceptions similar to those found in the ECPA. According to section
968.31
(2):
"(2) It is not unlawful under §§ 968.28 to
968.37:
"(a) For an operator of a switchboard, or an officer, employee
or agent of any provider of a wire or electronic communication
service, whose facilities are used in the transmission of a wire
or electronic communication to intercept, disclose or use that
communication in the normal course of his or her employment while
engaged in any activity which is a necessary incident to the
rendition of his or her service or to the protection of the rights
or property of the provider of that service, except that a provider
of a wire or electronic communication service shall not utilize
service observing or random monitoring except for mechanical
or service quality control checks.
"(b) For a person acting under color of law to intercept
a wire, electronic or oral communication, where the person is
a party to the communication or one of the parties to the communication
has given prior consent to the interception."
34 Cf. Watkins v. L.M. Berry
& Co., 704 F.2d at 583.
35Deal v. Spears, 980 F.2d
1153, 1157 (8th Cir. 1992) ("[c]onsent under [the ECPA]
is not to be cavalierly implied.... [K]nowledge of the capability
of monitoring alone cannot be considered implied consent.").
36Griggs-Ryan v. Connelly,
904 F.2d 112, 116 (1st Cir. 1990); United States v. Amen,
831 F.2d 373, 378 (2d Cir. 1987).
37Griggs-Ryan v. Connelly,
904 F.2d at 116-17.
38 See Wis. Stat.§
968.31
(2), supra.
39 Cf. United States v. Mullins,
992 F.2d 1472, 1478.
40See, e.g., Brown, Developing
Internet, Intranet and Email Policies, 520 PLI/Pat 347 (July
1998); Ballon, The Emerging Law of the Internet, 507 PLI/Pat
1163, 1270-73 (Feb. 1998); Ciapciak and Matuszak, "Employer
Rights in Monitoring Employee Email," For the Defense
(Nov. 1998).
According to Ballon, Alternate Corporate Responses to Internet
Data Theft, 471 PLI/Pat 737, 750-751:
"Companies should adopt and enforce email and Internet
use policies. Companies should adopt Internet policies [in order]
(i) To negate any expectation of privacy employees might otherwise
have. (ii) To limit liability under the Telecommunications Act
of 1996. By taking affirmative action to monitor email transmissions
for offensive conduct, a company may be able to avoid indirect
liability for third party violations of state law (such as sexual
harassment and defamation) under the Good Samaritan exemption
created by the Telecommunications Act of 1996. [A]n Email Policy
[should specify that] (i) The company owns the computer system
and all data stored on or transmitted over company networks.
(ii) The employee has no right to privacy in any information
stored on the system. The employer reserves the right (but does
not assume the obligation) to monitor employee email. (iii) Define
categories of email that should be retained in the ordinary course
of business and specific procedures for retaining such communications.
(iv) Purge all other email messages at regular intervals."
41 This article is located
online. Supra.
42See In re Prudential Ins.
Co. Sales Practices Litigation, 169 FRD 598 (D. N.J. 1997),
where the court found that distribution by email was an ineffective
method of distributing a company policy. Id. at 603-04.
43 Id.
44 See supra note 40.
45 This article is located
online.
46 Companies such as Equitrac
and Sequel Technology. See
47 From the Equitrac
Web page
48 See, e.g., Fennel
v. First Step Designs Ltd., 83 F.3d 526 (1st Cir.
1996), involving a request to examine an employer's hard drive
for the purposes of learning whether a particular email memorandum
had been predated to avoid liability. Id. at 532-33.
49 See Law
Journal Extra: United States v. Microsoft, specifically a
Nov.
3, 1998, story, wherein it is reported, "Gates seemed
most argumentative on the [video] tape [of his deposition by
Government lawyers] when questioned about a June 23, 1996, [email]
memo he wrote to Paul Maritz and Brad Silverberg, two top Microsoft
executives. The email describes a meeting Gates had two days
prior with Apple executives."
50 See McChrystal, Gleisner,
and Kuborn, Document
Destruction and Confidentiality, 71 Wis. Law. 25 (Aug.
1998).
|