Welcome to YLOAN.COM
yloan.com » Web misc » Cyber Crime Email Crunches
Online Business Site Promotion Web misc Affiliate-Revenue Auctions Audio-Streaming Autoresponders Blogging-Rss Email-Marketing Ezine-Publishing Forums Internet-Marketing List-Building PPC-Advertising Podcasting SEO Spam-Blocker Traffic-Building Video-Streaming Web-Design Web-Development Web-Hosting Domain Name soreness web analysis vinyl mlm searching media info spyware access microsoft outlook farmville

Cyber Crime Email Crunches

In this day and age, practically everyone communicates electronically often and for a multitude of reasons

. This of course, is true in the workplace. While employees communicate by email for work-related reasons, it is not uncommon for them also to send emails relating to personal matters.

Employers frequently put in place and have employees execute employee email privacy policies. These policies provide that emails sent and received by employees on computer equipment provided by employers are not private and are subject to proper employer review.

But does that always hold true? Not necessarily, at least according to the New Jersey Supreme Court based upon the facts of one particular recent case.

In the case of Stengart v/s Loving Care Agency, Inc., the employee used the laptop (provided by her employer for company business) to access a personal, password-protected email account on the Yahoo Web site. Through that account, she communicated with her attorney about issues she was having related to her employment. She did not save her Yahoo identification or password on the laptop. When she ceased her employment, she returned the laptop to the employer. She then filed an employment discrimination complaint against the employer based on the issues she felt that she had encountered at work.


As part of the litigation and in anticipation of discovery, the employer hired experts to create a forensic image of the laptop's hard drive; including the temporary Internet files. Those files contained the contents of certain emails that the employee had exchanged with her attorney using her Yahoo account. At the tail-end of the emails sent by the lawyer, there was language that stated that the information in the emails "is intended only for the personal and confidential use of the designated recipient" and that the emails may constitute "privileged and confidential" attorney-client communications.

The employer took the position in the litigation that the emails were fair game because the former employee had no reasonable expectation of privacy in files on a company-owned computer, especially based on the employer's electronics communications policy. That policy stated that the employer could review, access and disclose "all matters on the company's media systems and services at any time." The policy also provided that emails, Internet communications and computer files are deemed company business records and "are not to be considered private or personal" to employees. However, the policy also stated that "occasional personal use is permitted."

At the end of the day and based on the facts of this specific case, the New Jersey Supreme Court held that the employee could reasonably expect that her emails with her attorney through her personal, password-protected Yahoo account should remain private; and that just because she used a company laptop did not undermine that privacy expectation and the attorney-client privilege.

The Court reached this conclusion for various reasons, including the following: 1) the employer's policy did not specifically state that emails exchanged on personal, password-protected email accounts would be subject to monitoring if employer equipment were used; 2) the reference to review of matters on the employer's "media systems and services" was too vague; 3) the policy did not provide notice that the contents of personal emails stored on hard drives might be forensically retrieved and read; 4) while stating that emails "are not to be considered private or personal," the policy at the same time allowed "occasional personal use of email"; and 5) the lawyer's emails contained language stating that they were personal, confidential and possibly attorney-client communications.

The Court was clear in stating that "whether an employee has a reasonable expectation of privacy in a particular work setting must be addressed on a case-by-case basis." Here, the Court did not believe that a reasonable person in the employee's position would expect that her employer "would be watching over her shoulder as she opened emails from her lawyer on her personal, password-protected Yahoo account." The Court went on to note that while employers can enforce computer use polices "to protect the assets and productivity of a business, they have no basis to read the contents of personal, privileged, attorney-client communications."

Indeed according to the New Jersey Supreme Court, even "a policy that provided unambiguous notice that an employer could retrieve and read an employee's attorney-client communications, if accessed on a personal password-protected email account using the company's computer system, would not be enforceable."

So what are the take home messages from this case? For employers, they must be as explicit and specific as possible in terms of providing notice in their policies to employees as to how they may monitor the employee's electronic communications and the level of privacy. Hardly any employees can expect full privacy in their communications. However according to the New Jersey Supreme Court, notwithstanding all of the clear notice in the world, some monitoring still may not be permissible.


As far as employees, they should read and understand their employers' computer use policies. They should recognize that they indeed may have very little privacy in their electronic communications sent and received using employer computer equipment. When in doubt, they should send personal communications from their own personal equipment using their own private accounts. Of course, that is easier said than done. Employees spend long hours at work and on portable work equipment, and they may not always remember to separate their work and private lives - and some courts may, and some courts may not, find that to be reasonable on the facts of given cases.

Treat your email system at work as you should your business phone. Strictly limit your communications with family and friends. Don't send any messages that others might interpret as bigoted or unkind; even if your intent was humorous or lighthearted, it won't look that way to others.

The golden rule of manners applies to email as well: Do not send any message that you would be uncomfortable having your mother -- or, in this case, a coworker or your employer -- read.

by: Manilla
The Truth About Cyber Slander - Thomas Rothstein Takes advantage of miscues, Missouri beats Oklahoma Keep Cyber Stalking From Going Too Far Why It Is Grievous To Charter An Seo Organisation For Your Cyberspace Sector CyberScrub AntiVirus Uninstall – Instructions on Thoroughly Uninstalling and Removing CyberScrub AntiVirus Avoiding Cybercrime The Best Way to Remove Cyber Security Quickly and Easily - Perfect Method to Remove Them The Facts on Cyber-Bullying Fed Up With Cyber Stalkers? You Can Get The Harassment Stopped! Cyber Monday Nintendo Wii Console And Wii Accessory Deals paper reycle misconceptions Cyber Stalkers Have Got To Go - So, What Do You Do? Cyber criminals ? TRue or False?
print
www.yloan.com guest:  register | login | search IP(216.73.216.197) California / Anaheim Processed in 0.019025 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 28 , 6476, 79,
Cyber Crime Email Crunches Anaheim