Get access to the exclusive HR Resources you need to succeed in 2018.
Sign up for free email newsletters and get more SHRM content delivered to your inbox.
Is your employee handbook keeping up with the changing world of work? With SHRM's Employee Handbook Builder get peace of mind that your handbook is up-to-date.
Build competencies, establish credibility and advance your career—while earning PDCs—at SHRM Seminars in 14 cities across the U.S. this fall.
Gain the skills you need to rise to the next level in your career. Jon us at SHRM's Leadership Development Forum, October 2-3 in Boston.
Members may download one copy of our sample forms and templates for your personal use within your organization. Please note that all such forms and policies should be reviewed by your legal counsel for compliance with applicable law, and should be modified to suit your organization’s culture, industry, and practices. Neither members nor non-members may reproduce such samples in any other way (e.g., to republish in a book or use for a commercial purpose) without SHRM’s permission. To request permission for specific items, click on the “reuse permissions” button on the page where you find the item.
Employers need strategies to prevent social media attacks or other inappropriate social media use by their employees. They also need to quickly and effectively respond to these incidents.
Consider these real-life examples:
When social media is used wisely, it can be a smart, polished and effective means to promote a company, its events, and its products or services. Some employees, however, do not realize that they can harm themselves and their employers when they post impulsively, without thinking through the consequences to their careers—or the company’s brand, competitive strategy and customers.
During one of the 2012 presidential debates, President Barack Obama mentioned that his grandmother died two days before he was elected in 2008. An employee of a well-known appliance company tweeted from the company’s corporate account that his grandmother died because she knew how bad the president’s first term was going to be. The company subsequently offered its Twitter followers its “deepest apologies for an irresponsible tweet that is in no way representative of the brand’s opinion.”
Individuals are increasingly being held responsible for what they say on social media. A recent case,
Elonis v. United States, illustrates this trend. Anthony Elonis
openly posted threats against his spouse and co-workers on Facebook. He was subsequently convicted of violating a federal statute that prohibits the transmission of threats to injure another person in interstate commerce. His conviction is currently under review by the U.S. Supreme Court.
However, unlike in the Elonis case, a significant number of disparaging, harassing or threatening posts are anonymous. Currently, the legal options for employers to get anonymous posts removed or to discover the author’s identity are limited. The anonymity of many harassing or defamatory posts generally means that the only obvious target for employers is the Internet service provider (ISP) or website on which the posts appear. To further complicate matters, Section 230 of the Communications Decency Act of 1996 (CDA) provides broad civil immunity to websites that contain information provided by others. This effectively prevents aggrieved employers and supervisors from suing a website for libel, unless the site itself is the provider of the harmful information at issue.
There are some tactics employers may consider to deal with and help prevent social media attacks. Employers may be able to remove unwanted posts from websites, to determine the identity of an anonymous blogger short of litigation, and to change the company’s culture so employees will find negative use of social media to be unnecessary.
Telecommunications Harassment Act
The Telecommunications Harassment Act may provide some relief to employers in attempting to remove posts that contain abusive, threatening or harassing content. The act prohibits websites from knowingly permitting their site to be used for postings “with intent to annoy, abuse, threaten or harass any person.” A website risks potential criminal exposure under the statute if it allows an abusive, threatening or harassing post to remain on its site after being put on notice that a particular post’s content violates the act.
Section 230(c)(2) of the CDA also provides websites with an independent exemption from liability when they take good-faith steps to restrict access to harassing material or to filter such material. Thus, removal of posts can be mutually beneficial for both the employer and the website under both statutes.
Employers benefit from having signed agreements that require employees to turn over laptops or other electronic devices for inspection and imaging at termination or upon request. Such agreements should include an employee’s personal electronic devices if used for work.
If an employer believes that a current employee is the author of an anonymous post, such agreements can assist the employer in confirming his or her identity through inspection or forensic examination of the device. Forensic examination may reveal the deleted e-mails or texts (or remnants of them), including the dates and times the device was used to visit specific websites. With respect to the earlier real-life example about the CEO who is receiving anonymous threats, an examination of a device’s Internet history and e-mail remnants could reveal that an employee created a personal e-mail account from his device to send those threats to the CEO.
Practical experience with cellular service providers may have already taught employers that the content of text messages is difficult to obtain by means of subpoena or even the employee’s own signed authorization. Cellular service providers do not want to be in the business of producing text messages in response to civil subpoenas, so they generally respond that text messages are preserved only for a handful of days or not at all. Yet, forensic examination of smartphones may reveal the actual content of text messages–even deleted texts—provided employers have the necessary employee agreements in place to allow them to inspect and/or image the device.
Culture Built on Trust and Responsiveness
Employees are less likely to engage in social media attacks if employers create a culture that demonstrates that they respect and promptly address employee concerns.
Most employees are at-will and can be discharged at any time without notice. However, giving employees notice of their performance problems and an opportunity to correct them can help prevent negative, disparaging posts. Even if a discharged employee does not accept the termination decision, most co-workers recognize when a peer has been given a legitimate opportunity to fix performance issues. This may encourage co-workers to not post negatively about the decision, so there will be no protected concerted speech.
Additional pragmatic steps that employers can take to develop a culture built on trust and responsiveness include regular training and dissemination of anti-harassment policies. Employers then need to be receptive to complaints when they occur, and immediately investigate and resolve them. This same level of employer responsiveness applies to compliance policies and employee hotlines that encourage internal reporting on issues beyond harassment, so concerns are promptly addressed.
While it never hurts to remind employees of the company’s internal complaint procedures, employers should be careful not to tell employees to only complain internally—rather than file a charge with the applicable agency or air their grievances online. The National Labor Relations Board (NLRB) views such directives to have the effect of inhibiting employees from engaging in protected concerted speech in violation of Section 7 of the National Labor Relations Act.
Regularly Train Employees
A lesson employers should take from both the anti-Obama tweet and the
Elonis case is the continued need to train employees on the company’s social media policy.
Encourage smart, positive use of social media, and remind employees of the consequences of using work e-mail accounts or Twitter handles to express personal opinions or politics, to violate the law, or to violate the company’s anti-harassment and bullying policies. Recent NLRB guidance has confirmed an employer’s ability to regulate off-duty social media conduct by employees like Elonis who violate a company’s policies or code of conduct.
Because some employees view social media as a lawless zone where they can behave as they see fit without regard to right and wrong, they need to be told that this is wrong. Let employees know, especially, that if their use of social media involves threats of harm, the company will cooperate with law enforcement authorities. Any threatening posts can have consequences for their employment and potential criminal liability.
Anne E. Larson is an attorney with Ogletree Deakins in Chicago.
You have successfully saved this page as a bookmark.
Please confirm that you want to proceed with deleting bookmark.
You have successfully removed bookmark.
Please log in as a SHRM member before saving bookmarks.
Please sign in as a SHRM member before saving bookmarks.
Please purchase a SHRM membership before saving bookmarks.
An error has occurred
Recommended for you
Join SHRM's exclusive peer-to-peer social network
SHRM’s HR Vendor Directory contains over 10,000 companies