08.01.2015 Views

For The Defense, February 2012 - DRI Today

For The Defense, February 2012 - DRI Today

For The Defense, February 2012 - DRI Today

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

not be sufficient to encompass the specific<br />

concerns related to social networking, for<br />

example, especially if social networking is<br />

not mentioned. Second, in terms of “education,”<br />

employees must receive education<br />

about an acceptable use policy and understand<br />

the repercussions of violating the<br />

policy. Third, company must enforce an<br />

acceptable use policy. Fourth, an employer<br />

can require employees who use social networking<br />

for business purposes to create<br />

separate business accounts based on business<br />

e-mail addresses as a condition to<br />

using certain sites in the workplace and<br />

on the employer’s equipment, including<br />

mobile phones, desktops, and laptops,<br />

establishing “separation” between acceptable<br />

business use and personal use. Fifth,<br />

an employer should ensure “discoverability”<br />

by making employees aware that the<br />

information that they post on social networking<br />

sites, their e-mails, and conversations<br />

may be subject to legal holds and legal<br />

collection obligations. An employer should<br />

formulate a written agreement stating that<br />

in exchange for an employee’s access and<br />

use of social networking in the workplace,<br />

the employee will grant consent for the disclosure<br />

of the information from his or her<br />

business profile page, including e-mail,<br />

posts, notes, and all features of Facebook<br />

or Twitter used for communication purposes<br />

in the event that the employer needs<br />

the information for litigation or general<br />

auditing purposes. Sixth, by “visibility”<br />

we mean that an employee should have no<br />

expectation of privacy in communications<br />

on social networking sites made through<br />

the employee’s business account, on an<br />

employer’s computer network, or on the<br />

employer’s hardware, including desktop<br />

computers, laptop computers, and mobile<br />

phones. Seventh, “formality” means that<br />

an employer should remind employees<br />

that the rules that apply to their normal<br />

business conversations and communications<br />

also apply with respect to social<br />

networking in the workplace. Eighth and<br />

finally, an employer should define the privacy<br />

settings “accessibility limits” that an<br />

employee account should maintain in his<br />

or her business accounts. <strong>For</strong> example, an<br />

employee profile should be set so that an<br />

Internet search would not reveal information<br />

about the employer’s business contacts<br />

or clients.<br />

Records Retention, Preservation,<br />

and Collection<br />

As mentioned previously, employees’ use<br />

of social networking and mobile devices<br />

for business purposes increases the scope<br />

of discoverable information that a company<br />

has to manage, and so a company<br />

may need to modify data retention procedures<br />

to accommodate discovery- related<br />

legal duties. If a company anticipates litigation,<br />

after consulting with counsel a company<br />

should consider issuing a litigation<br />

hold that encompasses information posted<br />

on social networking sites.<br />

A company should also work with the<br />

company IT departments to explore the<br />

application of tools that automatically<br />

retain and preserve electronic records<br />

aligned with the company’s legal hold<br />

instructions. Given the rapid pace of technological<br />

innovation, however, it is likely<br />

that automatic preservation technologies<br />

will continue to trail the evolution of communication<br />

platforms, creating burdensome<br />

discovery efforts, which will include<br />

retaining and preserving certain electronic<br />

records manually. This can be especially<br />

complicated for data such as instant<br />

messages or information created in an<br />

Enterprise 2.0 environment because the<br />

technology available to export data may be<br />

less sophisticated. A company should first<br />

determine whether it needs to retain and<br />

preserve information under the Federal<br />

Rules of Civil Procedure. Courts appear<br />

to be moving toward requiring companies<br />

to retain more and more types of information,<br />

even transitory information such<br />

as instant messages. See Alexi Oreskovic,<br />

Instant Headache, Law.com (May 20, 2005),<br />

http://www.law.com/jsp/cc/ PubArticleFriendlyCC.<br />

jspid=900005429200 (last visited Jan. 3,<br />

2011).<br />

If subject to preservation, a company<br />

may need to take special steps to preserve<br />

continuously replicated or overwritten data<br />

appropriately.<br />

An organization should also consider<br />

instituting a plan guiding how it will collect<br />

data that it does not control, such as text<br />

messages stored on the servers of a wireless<br />

provider or data in hosted applications<br />

from a software- as- a- service vendor. Even<br />

controlled systems contain unmanageable<br />

information: a company should bring unified<br />

communications systems that combine<br />

messaging, voice, and video into the company<br />

record- keeping process.<br />

In considering cloud options, when a<br />

vendor or another third party will possess a<br />

company’s data, the company should make<br />

sure to incorporate provisions in the contract<br />

with the vendor requiring the vendor<br />

to cooperate with subpoenas for company<br />

information.<br />

Allowing employees<br />

to use public social<br />

networking tools, webbased<br />

technologies,<br />

and microblogging in<br />

the normal course of<br />

business offers tremendous<br />

marketing opportunities.<br />

Conclusion<br />

Despite the pervasiveness of Web 2.0 technologies<br />

and mobile devices in today’s<br />

workplace, a recent survey of management<br />

and human resource executives indicated<br />

that a majority of companies do not<br />

have written social media or acceptable<br />

use policies. Companies with employees<br />

and offices spread throughout the world<br />

especially rely on collaborative platforms<br />

and technologies such as internal social<br />

networks, instant messaging, and cloud<br />

computing—and it is nearly certain that<br />

employees in companies of all sizes and<br />

in every industry use applications outside<br />

of the companies’ internal networks. Failing<br />

to pay attention to or manage the exponentially<br />

burgeoning data resulting from<br />

today’s technologies can create serious<br />

legal risk and expense for all organizations.<br />

Those entities which attorneys counsel to<br />

manage their data strategically and proactively,<br />

however, will undoubtedly reap<br />

the rewards of increased efficiency, greater<br />

potential revenue, enhanced security, and<br />

legal defensibility.<br />

<strong>For</strong> <strong>The</strong> <strong>Defense</strong> ■ <strong>February</strong> <strong>2012</strong> ■ 29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!