Get access to the exclusive HR Resources you need to succeed in 2018.
Sign up for free email newsletters and get more SHRM content delivered to your inbox.
Is your employee handbook keeping up with the changing world of work? With SHRM's Employee Handbook Builder get peace of mind that your handbook is up-to-date.
Build competencies, establish credibility and advance your career—while earning PDCs—at SHRM Seminars in 14 cities across the U.S. this fall.
Gain the skills you need to rise to the next level in your career. Jon us at SHRM's Leadership Development Forum, October 2-3 in Boston.
Members may download one copy of our sample forms and templates for your personal use within your organization. Please note that all such forms and policies should be reviewed by your legal counsel for compliance with applicable law, and should be modified to suit your organization’s culture, industry, and practices. Neither members nor non-members may reproduce such samples in any other way (e.g., to republish in a book or use for a commercial purpose) without SHRM’s permission. To request permission for specific items, click on the “reuse permissions” button on the page where you find the item.
CHICAGO—In a wide-ranging session June 16, 2013, at the Society for Human Resource Management (SHRM) Annual Conference & Exposition, attorney Jonathan A. Segal covered privacy issues that included workplace searches and bring-your-own-device practices.
Segal, a frequent speaker at SHRM conferences, is a partner at Philadelphia-based Duane Morris LLP in its Employment, Labor, Benefits and Immigration Practice Group. He also is the managing principal of the Duane Morris Institute, which provides training for HR professionals, in-house counsel, benefits administrators and managers at Duane Morris, at client sites and by webinar on employment, labor, benefits and immigration matters.
“Privacy rights can be destroyed or can be created by an employer,” Segal said during the session “Privacy Rights: A Workplace Oxymoron?,” which involved 33 pages of slides and hypothetical workplace scenarios.
He cautioned employers against creating statements that can be used against them.
For example, an employer that states in writing that it respects employee privacy may be making assurances that it can’t keep in the event an employer believes a workplace search is warranted.
“Be very careful about the sort of aspirational statements that give employees rights they otherwise wouldn’t have,” Segal said.
The practice of allowing employees to bring their own devices (BYOD)—including electronic devices such as smartphones and laptops—also raises some privacy issues.
“If you have a BYOD policy, you will want employees to agree to it and acknowledge their specific agreement to it,” he said.
The policy should make it clear that the employer reserves the right to review information contained on the personal devices the employee brings to the workplace, he said. If the employee’s device contains private information that the employee wishes to keep confidential, the employer should make it clear that the employee should not bring that device to work.
Similarly, if the employee leaves the organization, the employer should reserve the right to wipe employer-related information off the employee’s device. The risk of this, Segal pointed out, is that the employee’s personal content may inadvertently be wiped out as well. He recommended that employers take care to minimize that risk during the wiping process and to advise employees to back up their personal information in case that information is lost.
When it comes to physical searches of the employee, the employee’s belongings and/or work area:
Segal presented the hypothetical case of “Christine,” an employee seen downloading information onto a flash drive and putting the flash drive into her purse. When the employer asks to search her purse, she refuses on privacy grounds.
As a standard procedure in such cases, Segal suggested that the employer use a third party—security personnel or an employee assistance program representative, for example—to conduct the search. The third party simply confirms whether or not the item that in question—in this case the flash drive—is among the employee’s possessions.
“This creates a vehicle to address the employee’s privacy concern” and shows respect for the person’s privacy, Segal said.
Kathy Gurchiek is associate editor for HR News.
You have successfully saved this page as a bookmark.
Please confirm that you want to proceed with deleting bookmark.
You have successfully removed bookmark.
Please log in as a SHRM member before saving bookmarks.
Please sign in as a SHRM member before saving bookmarks.
Please purchase a SHRM membership before saving bookmarks.
An error has occurred
Recommended for you
Join SHRM's exclusive peer-to-peer social network
SHRM’s HR Vendor Directory contains over 10,000 companies