Showing posts with label employment law. Show all posts
Showing posts with label employment law. Show all posts

Friday, March 28, 2014

NLRB Says “No Workplace Secrets Allowed!”



The National Labor Relations Board (“NLRB”) has held that an employer’s enforcement of a commonly used workplace policy could expose the employer to liability under the National Labor Relations Act (“NLRA” or “the Act”).
This particular matter involved the technology company MCPc, which had a confidentially provision in its employee handbook which read. In part, as follows:

[D]issemination of confidential information within [the company], such as personal or financial information, etc., will subject the responsible employee to disciplinary action or possible termination . . . .


This type of policy, in one form or another, is commonly utilized by many employers.  In the case of MCPc, the company fired an employer after he announced at a meeting that the salary paid to a particular executive, stating the specific amount of the executive’s compensation, would have been used to hire additional engineers.  In terminating the employee for his statements, MCPc also based the decision on the employee improperly accessing computer files to discover the executive’s salary.
Last month, the NLRB upheld an administrative law judge’s decision, finding that MCPc’s internal confidentiality policy was overbroad and violated The NLRB held that this language violated Section 8(a)(1) of the NLRA because employees would reasonably construe the overbroad rule to prohibit discussion of wages or other terms and conditions of employment with their coworkers.  In upholding the ruling against MCPc for the termination of the employee, the NLRB agreed that the employee’s discussion was protected discussion because it involved the terms and conditions of his employment, i.e. staffing shortages.

In recent years, the NLRB has used the same rationale to find many employers’ social media policies to be in violation of the Act.  Another lesson to remember from the NLRB’s assault on workplace social media policies is that an employer can be found in violation on the basis of an overbroad policy alone, even if there is no action taken against an employee for violation of the policy.  As many employers also learned from the NLRB’s social media focus, even non-union employers can be found in violation of the NLRA.

Where does this leave employers?  As mentioned above, many employers have similar policies in their employee handbooks.  This is often for the purpose of avoiding the inevitable bickering and complaints that arise when employees start comparing their respective salaries, and are aggrieved over their perception of being underpaid, or another employee being overpaid.  Unfortunately, that goal is exactly what the NLRB views as a violation.
From the perspective of the NLRB’s “bigfoot” approach in the area of social media policies, I think employers are ultimately going to have to scrap the broadly worded confidentiality policies, and opt instead for narrowly tailored policies that protect against the disclosure of trade secrets and other confidential or proprietary information.

Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLC, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here. He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com

Tuesday, November 26, 2013

THE LEGAL PITFALLS OF WORKPLACE ROMANCE


 

Birds do it, bees do it,

Even educated fleas do it,

Let’s do it, let’s fall in love

                        Let’s Do It (Cole Porter 1928)

I.  Introduction

History is full of great romances.  Romeo and Juliet, who defied their families for true love.   Rhett and Scarlett’s tumultuous love was set against the backdrop of the Civil War.  And of course, the classic workplace romance at the Daily Planet between Clark Kent/ Superman and Lois Lane.

But for Larry, GeneriCorp’s Human Resources Director, the great romance he’s concerned about is between Shipping Department Manager Ken Worth and Shipping Clerk Lola Rider.  Ken is Lola’s direct supervisor.  Larry learned about the couple’s sexual relationship after other female clerks in the Shipping Department angrily complained about Ken’s plans to promote Lola to the newly created and higher paying position of Assistant Shipping Manager. 

All indications at this point are that the relationship is consensual.  Morale is suffering in the Shipping Department amid complaints of favoritism and Larry is concerned about whether the company may have more serious potential legal problems.

II.  The Workplace as a “Dating Pool” 

Workplace romances are nothing new and if anything, have become more common. With the amount of time people spend working and the increased percentage of women in the workplace, it’s no surprise that the workplace is fertile ground for couples to meet. People who work together also usually live within a reasonable dating distance, and because they share a workplace, they see each other on a daily basis.  Coworkers in similar jobs may also be approximately the same age, and share similar interests both inside and outside of work.  As such, the workplace creates an inadvertent dating pool. 

In a survey of U.S. workers by the staffing and recruiting business Spherion Corporation, 39% of workers said they have already had a workplace romance and the same percentage would consider it.  Looking at the workplace relationships, the survey found 27% involved couples dating for just a few weeks or less, 30% dating for several months, 15% dating several years and 25% resulting in marriage of coworkers.  As the survey indicates, the majority of these relationships are short term and when the romance sours or goes bad, it can be really bad and cause serious problems for employers.  The Spherion Corporation survey noted that nearly half of all employees surveyed (46%) said they felt that dating a coworker would jeopardize their job security or career advancement opportunities.

III.  Non-Fraternization Policies

In this case, GeneriCorp does not have a non-fraternization policy, which would otherwise address Ken and Lola’s workplace romance.  In this regard, GeneriCorp is not unique. A recent survey by the Society for Human Resource Management  showed that 72 % of the employers who responded said they did not have a written non-fraternization policy, 14 % said they had a non-written policy that was understood within their workplace, and only 13 % indicated they had a formal written policy.  However, even when there is a policy, many employers adopt an enforcement attitude of benign neglect. 

This is not surprising.  It’s an awkward subject for some employers and Human Resource professionals, who do not relish the role of being the “Romance Police.” Many would rather not get involved in employees’ personal lives unless it is causing problems in the workplace.  However, such policies are important so employers can clearly communicate to employees what is and is not appropriate in the workplace and to protect themselves from legal liability and disruption of the work environment.

What are some of the specific reasons for adopting such a policy?  It addresses and hopefully prevents problems arising from:

·         Favoritism/perceptions of favoritism (and the ensuing rumor mill)

·         Disruption of the workplace (including extramarital affairs)

·         Conflicts of interest

·         Confidentiality (nondisclosure agreements, trade secrets, salary information, etc.)

·         Hostile Work Environment

·         Sexual Harassment (including repeated unsolicited requests for dates)

The purpose of this article is primarily to address the issues that arise from consensual workplace romances, and it is not intended to address the broader area of sexual harassment.  However, as noted above, the problem with certain office romances, especially between supervisors and subordinates, is that they may not be consensual, and in fact may be coerced.  Contrary to the traditional Title VII scenario in such cases, in recent years there has been an increase in the number of EEOC charges filed by male employees, complaining of sexual harassment from female supervisors.  Any such  issues should be addressed fully by the sexual harassment policy employers should already have in place. A non-fraternization policy should be utilized in conjunction with the sexual harassment policy.

A.        Supervisor and Subordinate Relationships

In the case of the romance between GeneriCorp Shipping Manager Ken Worth and Shipping Clerk Lola Rider, what are the legal issues?  Assuming that it is a voluntary consensual relationship, there would not appear to be any liability for GeneriCorp under Title VII for sexual harassment and/or sexual discrimination. 

  However, what about the claims of favoritism from the other female clerks in the Shipping Department, who are upset that Lola is getting a promotion from her boss and new boyfriend?  Do these other employees have a Title VII claim against GeneriCorp for favoritism shown to a co-worker who is sexually involved with a supervisor?

According to the EEOC, the answer, in regard to “insolated instances” of sexual favoritism, is “no.”  The EEOC Policy Guidance on Employer Liability under Title VII was adopted January 12, 1990, and was updated in June 1999.  It provides that:

Not all types of sexual favoritism violate Title VII.  It is the Commissioners position that Title VII does not prohibit isolated instances of preferential treatment based on consensual romantic relationships.  An isolated instance of favoritism toward a “paramour” (or a spouse or friend) may be unfair, but it does not discriminate against women or men in violation of Title VII, since both are disadvantaged for reasons other than their genders.  A female [plaintiff] who is denied an employment benefit because of such sexual favoritism would not have been treated more favorably had she been a man nor, conversely, was she treated less favorably because she was a woman.[1]

In essence, the EEOC is saying that while other employees in the workplace, both men or women, may feel the situation is unethical or unfair, it is not sexual discrimination because both groups are disadvantaged for reasons other than their gender.  However, the EEOC Policy Guidance also notes that:


Managers who engage in widespread sexual favoritism may also communicate a message that the way for women to get ahead in the workplace is by engaging in sexual conduct or that sexual solicitations are a prerequisite to their fair treatment.  This can form the basis of an implicit “quid pro quo” harassment claim for female employees, as well as a hostile work environment claim for both women and men who find this offensive.
 

The EEOC authority has been cited favorably by federal courts within the Fifth Circuit (which encompasses Louisiana, Mississippi and Texas) in dismissing such claims of sexual favoritism.  The Fifth Circuit itself has also held that an employee does not have a cause of action for retaliation for reporting a supervisor’s sexual relationship with a subordinate coworker.[2]

However, there is some indication that courts may be taking a more nuanced view on sexual favoritism based on consensual relationships. The key phrase in the EEOC Policy Guidance is that “Title VII does not prohibit isolated instances of preferential treatment based on consensual romantic relationships.” 

In a recent case by the California Supreme Court, it was held that widespread and overt sexual favoritism resulting from consensual relations could create a cause of action for sexual harassment and hostile work environment.  This ruling may reflect a trend in how courts view such cases.
 In Miller v. Department of Correction, 36 Cal. 4th  446 (Cal. 2005), two former female employees at a California prison claimed that the warden gave unwarranted favorable treatment to numerous female employees with whom he was having sexual affairs, and they claimed it amounted to sexual harassment and discrimination.  The case was dismissed at the trial stage but the California Supreme Court reinstated the lawsuit.  While it was a state court claim, the California Supreme Court relied on the federal EEOC Policy Guidance.  In finding for the Plaintiffs, the Court held:

[A]lthough an isolated instance of favoritism on the part of a supervisor toward a female employee with whom the supervisor is conducting a consensual sexual affair would not constitute sexual harassment, when such sexual favoritism in a workplace is sufficiently widespread it may create an actionable hostile work environment in which the demeaning message is conveyed to female employees that they are viewed as “sexual playthings” or that the way required for women to get ahead in the workplace is to engage in sexual conduct with their supervisors or the management. (emphasis added).

It is not uncommon that once a consensual relationship ends, the subordinate employee will subsequently claim they were coerced by the supervisor and will file a Title VII lawsuit.    Aside from any potential legal liability, the issue of a supervisor sexually involved with a subordinate can result in acrimony and disruption in the workplace if the relationship ends badly.  Even assuming the relationship continues happily, the impact in the workplace can be disgruntled coworkers, poor morale and a never-ending distraction from the real work of your business.
An employer’s non-fraternization policy should strictly prohibit romantic relationships between supervisors and subordinate employees or any employee who falls under that supervisor’s chain of supervision.  Companies that are large enough sometimes have policies that allow the supervised employee to transfer, if possible, to a different department, where they would not be supervised by their love interest.  However, this potentially opens the door to claims of employees being treated differently on the basis of their gender.  A zero tolerance policy best protects the employer.

While this type of policy may seem harsh and draconian, it is important to remember that the purpose of your business is not to be a dating service or a singles bar.  You did not create the situation, the two employees who started the relationship created the problem.  Having been involuntarily placed in the position of having to deal with it, this is the best option to avoid possible legal liability and problems in the workplace.  In the instance of a violation of the policy, the following procedure can be followed:

(1)   Call them in and talk to them separately;

(2)   Tell them that you have reason to believe that they are involved in a sexual relationship with the other employee;

(3)   Make them aware that the company has serious concerns because a relationship between a supervisor and a subordinate employee leaves the company open to claims of sexual harassment, hostile work environment, retaliation or favoritism;

(4)   Inform both employees that it put the company in position where it has to do something to avoid legal liability and/or disruption to the workplace, and the situation  cannot continue;

(5)   Tell both of them they have until noon the next day or some other deadline to decide between themselves which of them is going to voluntarily decide to resign, and if they can’t, both of them will be terminated.  This avoids later claims of sex discrimination, because the employer’s decision is not based on gender and in the event they cannot decide, both genders are treated equally.  Some employers may elect to terminate one of the employees based on their respective employment history, position and seniority.  However, this opens the door to claims that employees of different genders were treated differently.
Some employers adopt non-fraternization policies that discourage but do not strictly forbid relationships between supervisors and employees who do not fall under their chain command.  Such policies require that the relationship must be disclosed by the supervisor to his or her manager or the next person up the supervisory chain.  The higher supervisory official then must assess the situation and make a recommendation to resolve any actual or potential conflict created by the relationship.  However, such policies may not address all of the potential problems. Likewise it results in  company managers using company time to “assess” romantic relationships.

 B.        Coworker Relationships
Fresh on the heels of addressing the Ken and Lola romance in the Shipping Department, Larry the Human Resources Manager is faced with another office love affair.  This time it’s over in the Data Processing Department.  Larry learns that Data Entry Clerks Ivy Pod and  Pete Dief have been dating quietly for six months, and generally few people at GeneriCorp know they are an item.  Neither Ivy nor Pete have any supervisory authority over each other.

It’s estimated that 80% of office romances involve similarly situated co-workers. Romantic relationships between co-workers with no supervisory authority over the other still present many of the same potential problems for the employer.  While there is less potential for sexual coercion than in a supervisor - subordinate situation, there is still plenty of opportunity for disruption of the workplace during the relationship, and even more so after an unhappy breakup.
Adopting the same zero tolerance policy as to co-worker romances is an option.  However, Human Resource professionals report such policies are harder to enforce in a co-worker scenario. Employees resent the intrusion into what they perceive as their private lives and they are more likely to keep the workplace relationships underground, putting more effort into “beating the system” as opposed to complying with a no-dating policy.

Taking into account the realities of the workplace and the reluctance to be the “Romance Police”, some employers have adopted policies that allow co-workers to date but require both individuals to enter into written agreements: (1) voluntarily disclosing their relationship, (2) acknowledging their understanding of the company’s sexual harassment and discrimination policy, and (3) acknowledging that if the relationship causes disturbance in the workplace, they may be subject to discipline, up to and including termination.  Such an agreement also requires either party to promptly report to management anything relating to the relationship or a broken-off relationship that might serve as the basis of a harassment complaint. 
Such an agreement is a way for employers to preemptively avoid problems with office romances.  If you need such a policy drafted for your business or a non-fraternization policy, please feel free to contact me and we can discuss what type of policy or agreement would work best for your workplace.

                        IV.  Tips for Dealing with Workplace Romances  
Office romances are often the focus of intense gossip, so Human Resources professionals and supervisors need to know to keep their ears open for news about job or career damaging behavior resulting from such relationships.  Supervisors need to know the appropriate disciplinary measures to take if a romance derails and the resultant employee behavior disrupts the workplace.

Employees need to be made aware that the company will not tolerate sexual liaisons or sexual behavior at work and any such relationships need to be kept entirely separate from the work environment. The company’s sexual harassment and non-fraternization policy needs to be posted and all employees should be trained as to the company’s policy.  If romance becomes sexual harassment, supervisors, working in concert with Human Resources, needs to know what to do to take immediate action.

V.  Conclusion
Paraphrasing the old song at the start of this paper, if birds and bees and educated fleas fall in love, the odds are employees at your company are doing the same.  Having the appropriate policies and training in place can help prevent legal woes  as well as workplace headaches and heartaches

Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLC, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here. He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com


[1] See EEOC Policy Guidance on Employer Liability under Title VII for Sexual Favoritism No. 915.048
 
[2]       See Ellert v. Univ. of Texas, 52 F.3d 543 (5th Cir. 1995) (“Even if [Plaintiff’s] knowledge of the affair was the true animus behind the discharge decision, it was a motivation that did not rely upon her gender and, as such, it was not within the ambit of Title VII’s protections.”).

Wednesday, October 16, 2013

The EEOC’s Title VII Conciliation Duty Remains Fair Game for Judicial Review



I am going to apologize in advance for this “Employee with the Dragon Tattoo Employment Law Blog” posting, because I suspect it will likely contain more than your daily suggested requirement of “legal-ese”. However, the issue of the Equal Employment Opportunity Commission’s (“EEOC”) duty to engage in conciliation before suing an employer seems to be developing into another ongoing showdown between the agency and the federal courts. It is also an important issue for employers.

What prompted this posting was an editorial in the Wall Street Journal entitled "Is the EEOC Above the Law?"  It addressed the EEOC’s recently stated position that the EEOC’s conciliation efforts with employers, or lack thereof, were not subject to review by the courts. As detailed in the editorial, the EEOC subsequently received a severe slap-down by a U.S. District Judge in Texas. It also got me thinking about a case I had a number of years ago where the question of “good faith conciliation” became a significant issue.

For non-lawyers (and other well-adjusted folks) “conciliation” is just a fancy word for trying to reach a settlement before an EEOC Investigation and determination evolves into an actual lawsuit brought by the agency.  It's an option many employers want to at least explore before having to engage in the costly defense of a discrimination suit brought by a government agency. 

When the EEOC makes a “reasonable cause” determination in the course of investigating a charge of discrimination, it triggers a mandatory responsibility under 42 U.S.C. § 2000e-5(f)(1) to engage in good faith conciliation efforts before filing a lawsuit. This responsibility is not supposed to be a mere formality that is satisfied by merely making a few telephone calls and then checking a box on an agency form. Conciliation, after all, serves important public interests by, among other things, guaranteeing administrative due process to the accused, protecting the public from unwarranted litigation expense, and conserving scarce administrative and judicial resources. It is for these reasons that federal courts uniformly recognize that the responsibility of good faith conciliation is so important that honoring it is a condition precedent to the EEOC filing a lawsuit.

Good faith conciliation efforts depend on the honest and straightforward communication of basic factual information. Common sense dictates that good faith conciliation efforts do not include “hiding the ball” by failing to communicate, or worse, withholding, basic factual information, since such tactics obviously deprive the accused of both the opportunity to respond to claims against it and the ability to understand the basis of any damages sought in settlement of those claims. Rather, good faith conciliation efforts can only occur when the EEOC “lays the cards on the table” by disclosing factual information sufficient to afford the accused with a reasonable opportunity to respond to the claims and damages at issue before the EEOC commits itself to litigation.

To satisfy the statutory requirement of good faith conciliation, the EEOC must: (1) outline to the employer the reasonable cause for its belief that the law has been violated; (2) offer an opportunity for voluntary compliance; and (3) respond in a reasonable and flexible manner to the reasonable attitudes of the employer. If a court finds that the EEOC terminated conciliation prematurely or failed to conciliate in good faith, it may stay the action and compel the EEOC to conciliate or dismiss the lawsuit. 42 U.S.C. § 2000e-5(f)(1) (1976) (the court may “in its discretion stay further proceedings for not more than sixty days pending further efforts of the Commission to obtain voluntary compliance”); see also EEOC v. Agro Dist., LLC, 555 F.3d 462, 469 (5th Cir. 2009) (“Courts remain free to impose a stay for the EEOC to continue prematurely terminated negotiations, and where the EEOC fails to act in good faith, dismissal remains an appropriate sanction.”).

So what are some hallmarks of “bad faith” conciliation? Denying an employer’s reasonable request for a face-to-face meeting is a common and compelling factor in finding that the EEOC has failed to conciliate in good faith. See, e.g., EEOC v. Agro Dist., LLC, 555 F.3d 462, 469 (5th Cir. 2009); EEOC v. Pacific Maritime Assoc., 188 F.R.D. 379, 380-381 (D. Or. 1999).

Another tactic found by the courts to be unreasonable and in bad faith is if the EEOC takes an “all-or-nothing” approach to settlement. See, e.g., Agro, 555 F.3d at 468 (“The EEOC's take-it-or-leave-it demand for more than $150,000 represents the coercive, ‘all-or-nothing approach’ previously condemned by this court…”); EEOC v. Asplundh Tree Expert Co., 340 F.3d 1256, 1259 (11th Cir. 2003) (“As we have said before, such an ‘all or nothing’ approach on the part of a government agency, one of whose most essential functions is to attempt conciliation with the private party, will not do”).

Lastly, federal courts have held that the EEOC’s failure to explain its monetary demands is not reasonable and does not allow a defendant to properly respond. See, e.g., EEOC v. Golden Lender Fin. Group, No. 99 CIV. 8591 (JGK), 2000 WL 381426, at *5 (S.D. N.Y. Apr. 13, 2000) (holding that the EEOC did not meet its statutory obligation to conciliate when it ended conciliation after the charged party sought additional information regarding the requested damages of certain alleged victims); EEOC v. Pac. Mar. Ass’n, 188 F.R.D. 379, 381 (D. Or. 1999) (ordering a stay for further conciliation where “meaningful conciliation efforts were thwarted” during conciliation after “[c]ounsel for [defendant] reasonably requested that the EEOC investigator explain his calculation of the monetary settlement offered”).

In the case I was involved in, my co-counsel and I were faced with all three of the tactics described above. We were representing an out-of-state company in a sexual harassment claim brought by a number of employees, and the particular out-of-state EEOC office had filed suit after very perfunctory and unproductive conciliation.  The client had responded promptly and correctly when it discovered the actions of a rogue supervisory employee, yet the EEOC was demanding an excessive "take-it-or-leave-it" monetary settlement, wildly disproportionate to actual damages in the case.

We responded by filing a motion with the court to stay litigation and compel good faith conciliation. In a well-reasoned opinion, the U.S. Magistrate assigned to the case ruled in our favor and ordered the EEOC back to the table.  While the case was not resolved at the "re-conciliation", it laid the groundwork for a later settlement of the case for a reasonable amount.

I think the ability of the federal courts to review the EEOC’s conciliation efforts is a valuable protection for employers, and without it, the statutory requirement of conciliation would become meaningless. In fairness and full disclosure, my overwhelming experience with the EEOC in this regard, especially the local office here in Jackson, Mississippi, has been positive and the people professional and upfront in conciliation negotiations. However, as shown by the many court opinions on the subject, bad faith conciliation occurs and the judiciary is a vital check to such abuse.

Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLP, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here. He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com

Sunday, October 13, 2013

Accessing Employee’s Personal E-Mails on Company-Issued Phone Exposes Employer to Liability Under Federal Stored Communications Act



Earlier this month, I posted an article on how employers could face liability under the federal Stored Communications Act (“SCA”) if they solicited Facebook “friends” to access an employee’s social media postings. 
According to a U.S. District Court in Ohio, employers also could face SCA liability for viewing an employee’s e-mails on a company-issued phone.
In Lazette v. Kulmatycki and Cellico Partnership d/b/a Verizon Wireless, 3:12-cv-2416 (JGC) (N.D. Ohio June 5, 2013), Sandi Lazette received a company-issued Blackberry from her employer, Verizon Wireless.  Lazette would send and receive business related e-mails on the device. She was told that she also could use the company-issued phone for personal e-mail so she linked the device to her personal G-mail account.

When she left the company in September 2010, she returned the company-issued phone to her supervisor, Chris Kulmatycki. She understood that Verizon would “recycle” the phone for use by another employee.  However, when Lazette returned the phone, she neglected to delete the access to her personal Gmail account.

Over the next 18 months, without Lazette’s knowledge or authorization, Kulmatycki accessed her G-mail and accessed approximately 48,000 of her e-mails, which included communications about her family, career, financials, health, and other personal matters.  Lazette subsequently filed suit against Verizon and her former supervisor under the SCA. 

The company sought to have the case dismissed on a number of grounds, including its argument that the supervisor’s access was “not” unauthorized because: (1) he used a company-owned Blackberry; (2) he did not access a “facility,” as the statute uses that term; and that (3) Lazette authorized Kulmatycki’s access because she had not expressly told him not to read her e-mails and that she implicitly consented to his access by not deleting her G-mail account. Not surprisingly, the District Court rejected Verizon’s argument:

Turning to the substance of defendants’ contentions, defendants, in effect, contend that plaintiff’s negligence left her e-mail door open for Kulmatycki to enter and roam around in for as long and as much as he desired . . . Whether viewed through the lens of negligence or even of implied consent, there is no merit to defendants’ attempt to shift the focus from Kulmatycki’s actions to plaintiff’s passive and ignorant failure to make certain that the blackberry could not access her future e-mail.

After the District Court denied Verizon and Kulmatycki’s motion to dismiss, the case settled in August 2013 before it went to trial.
In this particular case, it’s obvious that the supervisor’s actions were not authorized by Verizon and his stalker-like review of the plaintiff’s personal e-mails were not for any legitimate business purpose. 
Aside from the inherent creepiness and “ick factor” of the plaintiff’s former supervisor, this case highlights the need for employers to have very clear policies as to what level of privacy an employee can expect in their use of a company’s devices or when an employee uses a personal mobile device or computer on behalf of their employer. 
In years past, such policies would simply inform employees that they should have no expectation of privacy, and that the company device is the property of the employer and may be subject to monitoring.  However, with companies allowing more personal use of company devices or moving to the practice of “BYOD” or “bring Your Own Device” for use at work, the lines have gotten blurred.  As such, employers need to regularly review and update their handbook policies to address how technology is actually being utilized by employees.
In light of this case, a good internal practice would be for a company’s IT department to review all returned devices and ensure they are scrubbed of any personal information before being recycled to another employee.
Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLP, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here. He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com.

Tuesday, October 8, 2013

EEOC Lawsuit Over Dreadlocks Sparks Criticism and Highlights Issues with Workplace Grooming Policies







The Equal Employment Opportunity Commission ("EEOC") has filed suit against Catastrophe Management Solutions, a Mobile, Alabama based insurance claims company, alleging the company violated Title VII of the Civil Rights Act by discriminating against an African-American job applicant on the basis of race because she wore dreadlocks. (Equal Employment Opportunity Commission v. Catastrophe Management Solutions, Inc., Civil Action No. 1:13-cv-00476-CB-M) The lawsuit highlights the employment issues that can arise over workplace grooming policies, and also has sparked sharp criticism from the business community.

According to the EEOC's suit, after completing an online job application, Chastity Jones was among a group of applicants who were selected for a group interview on May 12, 2010. At the time of the interview, Jones, who is black, had blond hair that was dreaded in neat curls, or "curllocks." Catastrophe's human resources staff conducted the group interview and offered Jones a position as a customer service representative.

Later that day, the human resources staff met with Jones to discuss her training schedule. During that meeting, they realized that Jones's curled hair was in dreadlocks. The manager in charge told Jones that the company did not allow dreadlocks and that she would have to cut them off in order to obtain employment. Jones declined to cut her hair, and the manager immediately rescinded the job offer.

In the lawsuit, the EEOC argues that Catastrophe's ban on dreadlocks and the imposition of its grooming policy on Jones discriminates against African-Americans based on physical and/or cultural characteristics. Delner Franklin-Thomas, district director for the EEOC's Birmingham District Office, stated, "Generally, there are racial distinctions in the natural texture of black and non-black hair. The EEOC will not tolerate employment discrimination against African-American employees because they choose to wear and display the natural texture of their hair, manage and style their hair in a manner amenable to it, or manage and style their hair in a manner differently from non-blacks.

The lawsuit came under sharp criticism today in a Wall Street Journal editorial entitled "The EEOC's Bad Hair Day".  The editorial notes the EEOC has a habit of "challenging perfectly legal business practices" and "[s]o is it any wonder that the agency is now expanding resources to workplace dress codes." The editorial had much harsher words for the EEOC’s position:
Apparently Ms. Franklin-Thomas has never seen dreadlocked whites (like the Counting Crow's Adam Duritz) or Latinas (like Shakira). Catastrophe's policy is in fact racially neutral because it enjoins all employees, regardless of race, "to be dressed and groomed in a manner that projects a professional and businesslike image," including "hairstyle." The company determined that dreadlocks don't meet that standard, as is its right.

By leveling a complaint on Ms. Jones's behalf, the EEOC is perversely suggesting that black people shouldn't be held to the same standards as everyone else. The larger travesty of this case and other misbegotten EEOC crusades of late is that they take time and resources away from individuals with legitimate claims of employment discrimination. Banning dreadlocks doesn't qualify.
Lawsuits over grooming policies and dress codes are nothing new, but usually arise in the context of Title VII claims of religious discrimination. These occur when a workplace policy conflicts with a religious practice. Such practices might include the wearing of a beard by Muslim men, the wearing of a skullcap or yarmulke by Jewish men, the wearing of a veil or hijab by Muslim women or the wearing of a turban by male practitioners of Sikh faith. As noted in an earlier article, the wearing of certain tattoos can be considered a religious practice under Title VII. Typical conflicts are policies against facial hair, or wearing attire that interferes with safety equipment or procedures.

In the context of religion, Title VII requires an employer to reasonably accommodate an employee’s or job applicant’s religious observances or practices unless it can demonstrate that doing so would constitute an undue hardship on the conduct of its business. The reasonableness of an employer’s attempt to accommodate is a factual determination, made on a case-by-case basis. Each case necessarily depends on its own facts and circumstances, and in a sense every case boils down to whether the employer has acted reasonably. When putting together employee handbooks for clients, I typically advise including a provision in the dress or grooming codes that provides for a request for religious accommodation.

However, in the lawsuit against Catastrophe, the EEOC is claiming that the insurance company’s policy that employees "be dressed and groomed in a manner that projects a professional and businesslike image," including "hairstyle" specifically discriminates against African-Americans on the basis of race. The aggressive position of the EEOC on this issue is a troubling development for employers, many of which likely have grooming and dress code policies very similar to the defendant in this case.

Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLP, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here. He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com.

Friday, October 4, 2013

Employers who Solicit Facebook Friend “Snooping” Could Face Liability Under Federal Stored Communications Act


Facebook postings by employees have increasingly become a factor in employment discrimination lawsuits.  In some of my recent cases, employers were made aware of an employee’s threats of violence, workplace misconduct or other inappropriate actions when a co-worker, who also was a Facebook “friend”, brought the Facebook post to the employer’s attention.  Such posts can be powerful evidence in defending against a discrimination lawsuit and proving that any adverse employment action was for a legitimate non-discriminatory reason.
However, a recent ruling by a federal District Court in New Jersey strongly suggests that employers who actively solicit Facebook friends to disclose the postings of an employee could be in violation of the Federal Stored Communications Act (“SCA”), 18 U.S.C. §§ 2701-11.
The SCA provides that whoever "(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters or prevents the authorized access to a wire or electronic communication while in electronic storage in such a system" shall be liable for damages. The statute further provides that "[i]t shall not be unlawful . . . [to] access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public." In other words, the SCA covers: (1) electronic communications, (2) that were transmitted via an electronic communication service, (3) that are in electronic storage, and (4) that are not public.
In Ehling v. Monmouth-Ocean Hospital Service Corp. , the plaintiff was a nurse who maintained a Facebook account and had approximately 300 Facebook friends. Plaintiff selected privacy settings for her account that limited access to her Facebook wall to only her Facebook friends. Plaintiff did not add any hospital managers as Facebook friends. However, Plaintiff added many of her coworkers as friends. Unbeknownst to Plaintiff, a hospital paramedic who was one of her Facebook friends was taking screenshots of Plaintiff's Facebook wall and printing them or emailing them to Plaintiff’s manager.
The evidence in the case showed that the paramedic independently came up with the idea to provide Plaintiff's Facebook posts to the manager, who had never asked the paramedic for any information about Plaintiff and had never requested to be apprised of Plaintiff's Facebook activity.
Plaintiff was subsequently temporarily suspended when the hospital learned of her Facebook post where she criticized paramedics in Washington, D.C. for saving the life of a gunman involved in a fatal shooting.  The post read as follows:

 An 88 yr old sociopath white supremacist opened fire in the Wash D.C. Holocaust Museum this morning and killed an innocent guard (leaving children). Other guards opened fire. The 88 yr old was shot. He survived. I blame the DC paramedics. I want to say 2 things to the DC medics. 1. WHAT WERE YOU THINKING? and 2. This was your opportunity to really make a difference! WTF!!!! And to the other guards....go to target practice.

The plaintiff received a memo from the hospital explaining the reason for the suspension was the hospital’s concern that her Facebook comment reflected a "deliberate disregard for patient safety." In response, Plaintiff filed a complaint with the National Labor Relations Board ("NLRB"). After reviewing the evidence, the NLRB found that the hospital did not violate the National Labor Relations Act. The NLRB also found that there was no privacy violation because the post was sent, unsolicited, to hospital management.  The plaintiff subsequently filed suit in federal court, alleging the hospital violated her rights under the SCA.
In its ruling, the District Court held that that non-public Facebook wall posts are covered by the SCA, because: (1) Facebook wall posts are electronic communication, (2) they are transmitted via an electronic communication service, the Facebook wall posts are in electronic storage, and (4) Facebook wall posts that are configured to be private are, by definition, not accessible to the general public, and that the touchstone of the SCA is that it protects private information.
However, the District Court ruled that the hospital was not liable because one of the SCA’s exceptions applied, which exempted conduct authorized (1) by the person or entity providing a wire or electronic communications service; [or] (2) by a user of that service with respect to a communication of or intended for that user." 18 U.S.C. §2701(c).
The Court held that exception applied because the plaintiff had authorized the paramedic to have access to her Facebook wall by making him a “friend” and that the information the paramedic supplied to hospital management was completely unsolicited.
The District Court implicitly held that if the hospital had directed the paramedic or any other of the plaintiff’s Facebook friends to monitor and keep them appraised on Plaintiff’s Facebook activity, it would have constituted a violation of the SCA due to the hospital seeking unauthorized access.  The SCA provides for civil liability under the statute and an employer would be subject to monetary damages.
While it may be tempting for employers to utilize the Internet to monitor employees’ conduct, the lesson from this case is that employers should never request that co-workers or any other individuals access an employee’s private social media.  As related in previous articles, employers also need to be aware that overly broad social media policies could expose them to potential liability under the National Labor Relations Act.
Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLP, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here.  He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com.

Friday, September 27, 2013

Improving Prospects for Federal Law Protecting Against Sexual Orientation/Gender Identity Discrimination


For decades, legislation has been unsuccessfully introduced in Congress to include sexual orientation/gender identity as protected categories under Title VII.  As the law currently stands, an employee has no cause of action against an employer for adverse employment actions based on the employee being lesbian, gay, bisexual or transgender (“LGBT”).  However, in light of the Supreme Court’s recent overturning of the Defense of Marriage act, and changing societal attitudes, that could be about to change.

According to political observers and employment law experts, the Employment Non-Discrimination Act (“ENDA”) has very good prospects of being enacted within the next year. ENDA would put in place put a nationwide ban on workplace discrimination based on sexual orientation and gender identity. 

According to an article published by Ben James in Employment360, the evolving attitude of the American public on LGBT issues “has created a critical mass to make this the best time and the best opportunity for ENDA to pass.

ENDA’s improved prospects for passage comes after the Equal Employment Opportunity Commission’s (“EEOC”) release late last year of its Strategic Enforcement Plan (“SEP”) for 2013-2016.  In the SEP, the EEOC made it clear, that despite sexual orientation not being a protected class under Title VII or any other federal law, it intended to bring cases against employers for LGBT discrimination by construing such instances as “sexual stereotyping” under Title VII’s general prohibition against gender discrimination.

Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLP, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here. He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com.

Sunday, September 22, 2013

Pirates and Rogues: Employee Theft of Trade Secrets and Proprietary Information “or” Jack Sparrow, Esquire’s Tips for Battling Digital Raiders

I. Introduction
"Me? I'm dishonest. And a dishonest man you can always trust to be dishonest. Honestly, it's the honest ones you want to watch out for, because you can never predict when they're going to do something incredibly ... stupid."
~ Captain Jack Sparrow

In the mid-18th Century, an owner of a merchant vessel on the high seas would clearly know when his ship came under pirate attack. Cannons would be fired and buccaneers armed with cutlasses would board the vessel, looking to carry off the ship owner’s gold and other treasure.

In the modern workplace, the theft of an employer’s treasure, i.e. trade secrets, proprietary information, customer data, is much less obvious but just as devastating. Unlike the pirates roaming the sea in the late 1700’s, this theft is most likely to be carried out by a trusted and supposedly honest employee, usually for the benefit of a business competitor or to assist the employee in setting up his own competing business.

To paraphrase the observation above by the infamous Captain Jack Sparrow from the Pirates of the Caribbean movies, employers need to watch out for the employees they “think” are honest but who are actually getting ready to do something “incredibly stupid” and most likely, illegal.

This is further complicated by the now common “bring your own device” or “BYOD” practice of many employers, who allow employees to use their personal computers and smart phones to perform their workplace duties. When the employee eventually sails out the door to another job, the employer’s trade secrets likewise can sail away inside the employee’s iPad, iPhone or other device.

According to a 2013 survey conducted by computer security software company Symantec, more than half of departing employees kept confidential information belonging to their former employer and 40 percent planned to use such misappropriated trade secrets in their new jobs.

The purpose of this article is to make employers aware of how such workplace theft can occur, how to best protect and defend your business against any would-be pirates in the workplace and the options for launching a legal counter-attack.

II. The “Pirate” Attack

"Worry about your own fortunes gentlemen. The deepest circle of hell is reserved for betrayers and mutineers."
~ Captain Jack Sparrow

The theft of company trade secrets and other information by former employees or executives has become so common, it regularly makes the news. For example, computer chipmaker Advanced Micro Devices just recently sued four former employees, alleging they stole hundreds of thousands of documents before leaving to work for a competitor. In August 2012, a former Intel Corporation employee was sentenced to three years in federal prison for stealing Intel’s confidential design information prior to taking a job with another high tech company.

According to a 2010 statistical analysis, the annual costs associated with the theft of trade secrets and intellectual property were estimated at that time to be as high as $300 billion dollars a year, and that number has only risen in the ensuing years. However, such theft is not limited to large corporations, and businesses of any size can fall victim to such misappropriation.

In the most typical instance, an employer will not be aware its trade secrets or proprietary information have been stolen until it discovers the information is already being used to lure away its business and customers. The following hypothetical scenario illustrates the very real types of improper conduct now common in the American workplace.

Port Royal Industries (“PRI”) is a successful marine engineering company founded twenty-five years ago by its owner, Will Turner. Back when PRI was a small family business, Turner hired Hector Barbossa and Edward Teach for entry level positions. They ultimately became top executives and corporate officers. Turner considers them friends and trusted employees.

Because of the level of trust Turner has in Barbossa, Teach and all of his employees, PRI has never required its employees to sign non-disclosure, non-solicitation or non-compete agreements. Because of the “family business” atmosphere, Turner is somewhat lax about security for the Company’s computer network, where PRI’s proprietary designs and customer information are stored. Barbossa has a company-owned laptop which he uses for work, while Teach uses his personal iPad to perform his duties.

Late one Friday afternoon, Turner receives an e-mail from Barbossa, informing him that Barbossa, Teach and three of PRI’s top design engineers are resigning, effective immediately.

Turner learns that Barbossa, Teach and the engineers now work for PRI’s chief competitor, Black Pearl Enterprises (“BPE”). After the return of Barbossa’s company laptop, a preliminary computer forensic examination reveals that days prior to the resignations, Barbossa downloaded thousands of PRI’s engineering and design blueprints off its server and copied them onto external hard drives and flash drives. Computer professionals examine PRI’s server and determine that the day before he resigned, Teach used his iPad to remotely access and copy PRI’s confidential customer and pricing information.

The forensic examination also reveals that months prior to their resignations, Barbossa and Teach engaged in regular e-mail communications with the President of BPE. Among the topics discussed in the e-mails are their plans to leave PRI, how the abrupt loss of the three design engineers will cripple PRI’s ability to serve its customers, and PRI’s internal pricing information for key customers.

BPE is now aggressively competing against PRI and has been able to underbid PRI on a number of projects using the stolen pricing information. Utilizing the misappropriated design information, which they otherwise would not have been able to obtain through legitimate means, Barbossa and Teach have been able to take a number of key customers away from PRI.

An angry Will Turner contacts the law firm of Davy, Jones & Locker, LLC, to determine the best way to give Barbossa and Teach a legal keelhauling, and makes an appointment to meet with the firm’s top employment attorney, Jack Sparrow, Esquire. Unlike his famous cousin of the same name, Mr. Sparrow has issues with sea sickness, and opted to attend law school as opposed to entering the family business of captaining sailing ships.


The tale of PRI, its mutinous former executives and the piracy of its confidential business information will serve as the backdrop for how employers can avoid finding themselves in the unfortunate position of Will Turner. The advice from Jack Sparrow, Esquire also will show employers how to turn the tide against would-be boardroom buccaneers.

III. Best Practices to Avoid Trade Secret Theft by Employees
"Prepare the cannons, wake all sailors and prepare to repel boarders." ~ Captain Jack Sparrow

In their first meeting, attorney Jack Sparrow agrees with Will Turner that Barbossa and Teach are indeed “scurvy dogs, yellow-bellied bilge rats and generally dishonest rapscallions.” However, he advises that PRI could have avoided many of the problems now facing it by having had in place some basic policies and practices. “Not only would these policies have prevented or at least discouraged your two former executives from trying to pillage your business, but it would have given us additional legal claims to bring against these scalawags.” Will asked, “what do we need to incorporate into our HR policies and practices.”

A. Confidentiality / Non-Compete / Non-Solicitation Agreements
Sparrow explained, “One of the easiest ways to prevent employees from stealing your company’s confidential information is to simply have them contractually agree in advance not to do it.”
For most companies, employee confidentiality is vital to a company's competitiveness. An employee confidentiality agreement establishes that an employee will keep the employer's confidential, private, secret and proprietary information private and confidential and that such information will not be disclosed to the general public or to outside third parties, such as competitors. Typically, such agreements also can prevent an employee’s unauthorized use of such information. Employee confidentiality agreements ensure that a company's private information and valuable knowledge stays where it belongs, within the company.

Sparrow noted that another option would be for PRI to have all of its higher level employees enter into non-compete / non-solicitation agreements. “These type of agreements prevent former employees from competing against you or soliciting your customers for a period of time after they leave the company.”

In most states, these type of “restrictive employment covenants” are generally not favored, but will be enforced by the courts if the terms of the agreement are reasonable under the particular circumstances. Generally, there are three requirements: (1) the employer has a valid interest to protect; (2) the geographic restriction is not overly broad; and (3) a reasonable time limit is given. The employer bears the burden of proving the reasonableness of the agreement. The reason these types of agreements are construed very narrowly is that most courts recognize that an employer is not entitled to protection against ordinary competition from a departing employee.”

“In your instance” Sparrow observed, “you could justify the first factor because Barbossa and Teach were high level executives with access to confidential business and customer information, as opposed to one of your employees working on the loading dock. Courts look closely at the geographic restrictions of such agreements, because it would be against public policy for the restriction to be so broad as to prevent an individual from earning a living in his or her chosen field. For example, a restriction on competing within the entire United States would be considered overly broad and unenforceable. However, a limitation on competition in specific markets where you currently do business would be more likely to be enforced. As far as time restrictions, most courts will find a period of one to two years to be reasonable and enforceable.”

Sparrow also remarked that to be enforceable, these types of agreements must be supported by sufficient consideration. When Turner looked puzzled, Sparrow explained, “In non-lawyer talk, that means that the employee had to have received something of value in exchange for entering into the agreement.” What constitutes sufficient consideration can vary depending on the specific circumstances. However, in many states, courts have held that continued employment alone can be sufficient consideration to uphold a contract.

If Barbossa and Teach had been required to sign these types of restrictive covenants as a condition of their employment or continued employment with PRI, their actions would serve as the clear basis for a breach of contract claim. “However”, Sparrow noted, “because they never signed an agreement, that is one legal claim unavailable to us.” Turner sighed and noted, “I never expected I would need to have my employees contractually promise not to be dishonest” and he and Sparrow made arrangements for Davy, Jones & Locker, LLC to draft such agreements for PRI to use going forward.

B. “BYOD” or Bring Your Own Device Policies

The subject then turned to Teach’s use of his iPad to access and copy PRI’s confidential customer and pricing information. Sparrow asked “How long has PRI allowed its employees to use their personal computers and devices for work, and what kind of policies do you have in place to regulate how they are used?”

Turner replied, “Well, about two years ago, we started letting employees link their work e-mail to their personal smart phones. Over time, I let people use their personal laptops and tablets because they tended to be more efficient and productive with their own devices. It also saved the company money because it spared us the cost of buying a company-issued gadget. We instead pay a monthly stipend to the employees who use their own devices. We really don’t have any formal policy on how they are used.”

“You’re not alone,” Sparrow said. “In one recent survey, 92% of the companies reported that they had employees using their own personal devices for work. However only 44% of those organizations had ‘bring your own device’ or “BYOD’ policies that regulated the use of personal devices in the workplace. Even those employers who have BYOD policies are constantly having to scramble to ensure they are still relevant in light of the constantly changing technology.”

Sparrow continued, “While there are a lot of good reasons for having an effective BYOD policy, one key benefit is to prevent the misappropriation of your company’s confidential information. In a recent corporate survey, the most pressing concern was that sensitive information will be on a personal device that is lost, stolen, or in the possession of someone who leaves the company or other theft of data via uploading to a personal device.”
Turner requested that Davy, Jones & Locker, LLC draft a BYOD policy for PRI, and asked, “What should our policy include?” Sparrow said, “There is no ‘one-size-fits-all” policy, because every business is different and has different security and technology issues. He then outlined the following:

• Require devices to be pre-approved. Sparrow pointed out, “Different gadgets have their own pros and cons when it comes to security, and your company’s particular security needs will dictate which ones employees should be allowed to use.”

• Have mobile device management (MDM) software installed. “The two non-negotiable elements to look for in an MDM system are the ability to enforce security policies and to wipe remotely the personal devices used by employees.” Sparrow further explained, “Such software typically requires a strong password that's entered every time the device is turned on; ensures on-device file encryption; disables the camera; and specifies which applications are allowed, banned, or mandatory. It may also allow for monitoring to limit or deny access to certain company information. Data loss prevention (DLP) technologies also can automatically flag when sensitive files are touched or an unusual number of files accessed or copied.”

• Have employees agree in writing to security provisions. “You can save yourself a lot of grief if you address the issue with employees on the front end,” Sparrow said. “For example, an employee must agree to have their device remotely wiped if (1) the device is lost, (2) the employee terminates his or her employment, (3) if IT detects a data or policy breach, including unauthorized access to confidential company information, or (4) if there is any virus, malware or similar threat to the security of the company’s data and technology infrastructure.”

• Have an acceptable business use policy. The policy should define acceptable business use as activities that directly or indirectly support the business of the company. Devices may not be used for unauthorized storage or transmission of proprietary information belonging to the company or misappropriated from another company, to engage in outside business activities, to harass others, view pornography, etc.

• Disciplinary policy. “Employees need to know there will be consequences for lax computer security when using their own devices for work,” said Sparrow. “The company should reserve the right to take appropriate disciplinary action, up to and including termination for noncompliance with the BYOD policy.”

• Have a plan for departing employees. “The company should have a written agreement, signed by the employee, stating that the company’s IT department will be allowed to inspect and delete all confidential information from the device when the employee leaves the company.”

• Institute specific prohibitions on copying and forwarding of confidential information. Sparrow noted that a common thread in these types of cases is the downloading and copying of company information onto external hard drives/flash drives, or the forwarding of confidential information by e-mail to an employee’s personal e-mail address.

• Prepare a Departing Employee Checklist so nothing is ever forgotten. “The list itself will vary by the individual employer,” Sparrow noted, “but might include changing office lock codes, collecting keys, asking questions about any personal devices that may have company data, having the employees sign a statement acknowledging that all company data has or will be returned and another statement acknowledging that any post-departure access to the network would be a criminal act.”

• Consider other employment related issues. For example, a non-exempt employee’s use of a personal smart phone to check and respond to business –related e-mails or voice-mails off-the-clock can potentially expose an employer to liability under the Fair Labor Standards Act for unpaid wages or overtime. A BYOD policy should address when an employee is allowed to use the personal device for business purposes.

Sparrow added that along with the BYOD policy, “You also should have your IT department be on the lookout for any unusual activity that would suggest unauthorized accessing and/or copying of company information.”

IV. Assessing the Damage/Preparing a Case

"I leave you people alone for just a minute and look what happens. Everything’s gone to pot."~ Captain Jack Sparrow

When a company suspects a former employee has stolen confidential information, time is of the essence, both to prevent additional losses, and to acquire and preserve digital evidence of the employee’s wrongdoing to build a case against them. Sparrow told Turner, “A company that sits idly by while its trade secrets are being used unlawfully invites significant commercial harm, and even potentially risks waiving its rights to an injunction to protect those secrets, or even from claiming them as secrets at all. An employer should be ready to immediately implement an action plan.” This should include the following:

• Sparrow said, “you need to immediately lock the digital door”. “Terminate any remote access privileges or user credentials that the employee may have to company proprietary information, and make sure that all company-issued electronic devices (e.g. laptop, smart phone, tablet, USB and external drives, etc.) have been returned. These steps should have been done at the time of the employee's termination but are sometimes overlooked.”

• “Not all the information you need will be on a computer,” Sparrow noted. “Interview the employee's manager and co-workers about what the employee was working on, had access to, and whether there was unusual activity during the employee's last days, and whether the employee was acting secretively or left the company on bad terms.”

• Pointing to the computer on Turner’s desk, Sparrow said, “A common mistake is for employers to immediately re-assign a former employee’s computer equipment to another employee without first having it examined by a qualified expert. It is best not to even turn on or ‘power-up’ any such returned equipment,” he warned. “Collect and sequester any electronic media (e.g. smart phones, laptops, and removable hard drives) that the employee used, and store it in a safe location accessible to one or only a few people to ensure the devices are not tampered with and that a chain of custody is preserved.”

• “You’ve already taken one important step,” Sparrow said with a smile. “Retain outside counsel experienced in trade secrets and hacking cases to oversee the investigation and analyze the intellectual property and other legal rights which are available.”

• Sparrow also strongly stressed that any employer victimized by computer theft needs to “Retain an experienced computer forensic consultant.”

Sparrow told Turner, “While it is tempting for a company to rely on its in-house IT personnel to look for evidence of computer piracy, I always advise retaining an outside computer forensic expert to do the job. They typically have the specialized training and software to analyze the data without altering the contents or operating parameters of the devices and drives in question. This preserves the evidence for any litigation. A common practice is for the forensic expert to create an exact forensic ‘image’ of the device’s hard drive for purposes of analysis, leaving the original device unaltered.”

“What are the computer forensic experts looking for?,” Turner asked. “Using specialized techniques and software, they are looking for proof that files or other information have been copied off the device or otherwise misappropriated,” Sparrow explained. “A registry analysis will identify every external device that was attached to the computer by the date the device was connected, the time the device was connected, and the name and serial number of the device that was connected. It won’t tell you who was on the computer at the time or which files were copied, but it will provide some evidence that can be followed up in further discovery that can establish the theft.”

For example, Sparrow said, “If an analysis shows that Barbossa’s laptop was used to illegally copy your files, and the copying was done on a date when he was the only one with access to the device, that can be strong evidence to support our case.” Sparrow laughed and remarked, “It still amazes me how people will put the most harmful evidence in e-mails and texts, thinking they can destroy the evidence just by hitting ‘delete’. We should be able to get a better idea of what Mr. Barbossa and Teach were up to once we get a good look at their e-mails.”

“In some cases, you have employees who are more sophisticated about their computer theft and this is where computer forensics really pays off,” said Sparrow. “Rather than copying files off a laptop, they may simply copy the entire hard drive using software such as Norton Ghost©, which creates an exact duplicate image which can be transferred to another computer or storage device. They may then try to cover their tracks by using software like EvidenceEliminator© or Evidence-Blaster©.”

“However, this ‘cleverness’ can come back to bite them, said Sparrow. “While they may succeed in overwriting deleted data, making the files unrecoverable, the fact that they installed and then uninstalled evidence wiping software a day or two before they quit will remain in the registry. This raises the interesting question of what type of evidence is more damning, the forensic recovery of deleted files showing proprietary information was on the employee’s computer but deleted, or the presence of unauthorized evidence elimination software that could only be present for the purpose of spoiling the evidence.”

Sparrow also noted that computer forensic information is important in determining what business losses can be attributed to the employee theft. “In any lawsuit, you’ll bear the burden of having to prove money damages because of Barbossa and Teach’s wrongdoing.”

V. Legal Action Against Former Employees and Others

"Send this pestilent, traitorous, cow-hearted, yeasty codpiece to the brig."~ Captain Jack Sparrow

Turner banged his fist on the table and demanded, “Is there anything I can do right now to stop these rogues? I’m afraid that by the time we get to trial, they’ll have already sunk my business using my own trade secrets against me.”

Sparrow said, “The first thing we can do is to ask the court to grant some immediate injunctive relief. Injunctive relief is an equitable remedy granted when money damages would not be enough to compensate you for your losses if an injunction was not granted.“

“The type of injunctive relief we’ll seek is a temporary restraining order or “TRO” against Barbossa, Teach and BPE to prevent them from disclosing or utilizing PRI’s trade secrets. We’ll later move the court to leave it in place until our lawsuit can be decided on the merits. To obtain a TRO, we’ll have to convince the court of four things: (1) that we’re likely to succeed on the merits of our claims, (2) that PRI is being irreparably harmed by the improper disclosure and use of its trade secrets, (3) that Barbossa, Teach and BPE will not suffer irreparable harm if the TRO is granted, and (4) that the public interest is served by issuing the injunction.”

Turner thought about what Sparrow had explained and said “Well, if I’m going to have to convince the court I’ll succeed on the merits of my claims, I guess I better know what kind of claims I can bring. I think we’ve clearly and painfully established that it was a mistake for me not to have Barbossa and Teach under a restrictive covenant, and that rules out a breach of contract claim,” said Turner. What other options do I have?” Sparrow chuckled and said, “There’s more than one way to have these treacherous scoundrels walk the plank!”

A. Uniform Trade Secrets Act

“In your case, there is statutory protection against the theft of your trade secrets by your former executives,” said Sparrow. “Most states have adopted the Uniform Trade Secrets Act. The purpose of the Act (“UTSA”) is to prevent a person or business from profiting from a trade secret developed by another, because it would allow them to acquire ‘a free, competitive advantage.’ To establish a claim of trade secret misappropriation under UTSA, we would have to be able to show: (1) that a trade secret existed; (2) that the trade secret was acquired through a breach of a confidential relationship or discovered by improper means; and (3) that the use of the trade secret was without the plaintiff’s authorization.”

“So can you tell me what is considered a trade secret under UTSA?,” Turner asked. Sparrow explained that under the Act, “A trade secret’ means information, including a formula, pattern, compilation, program, device, method, technique or process, that derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means, by other persons who can obtain economic value from its disclosure or use, and is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.”

“Skip the legal jargon,” Turner demanded, “What the heck does that mean?” “In essence,” Sparrow said, “It means that a trade secret is something that is valuable to your business because it is not generally known outside your business, you take reasonable efforts to keep it secret, and the only likely way your competitor could find out about it would be by stealing it or through other improper means. Sparrow noted, “It would seem that the engineering designs that were stolen would meet the definition under UTSA.”

“Would the customer information they took also be considered a trade secret?” Turner asked. Sparrow nodded “Courts interpreting this section of the UTSA have consistently held that lists of current and prospective customers, the requirements of customers, and other proprietary business information can constitute a trade secret.”

Sparrow continued, “UTSA refers to the theft of trade secrets as misappropriation. That means the acquisition of a trade secret by someone who knows or has reason to know that it was acquired by improper means, such as theft, bribery, misrepresentation, breach or inducement of a breach of duty to maintain secrecy. It also includes the disclosure or use of a trade secret without consent by someone who used improper means to acquire knowledge of the trade secret. For example, if an ex-employee spilled the company secrets to a business rival, who starts using the trade secrets.”

“UTSA also prohibits the use of trade secrets by a company which ‘has reason to know’ that the material constitutes a trade secret. This is known as constructive knowledge (versus actual knowledge). In other words, even if a company was unaware it possessed purloined trade secrets, it can still be prosecuted if it should have known.”
Sparrow added, “With what we know right now, it looks like we have a good claim of misappropriation of trade secrets against Barbossa and Teach. In addition, we also should be able to go after BPE, because they clearly had reason to know that the information they were using belonged to PRI and was acquired by improper means. Under the Act, we can seek injunctive relief against them all and also seek money damages for the business losses they’ve caused to PRI.”

B. Computer Fraud and Abuse Act

“Because of the way Barbossa and Teach stole information from PRI’s computer system, you also can assert a claim under federal law, said Sparrow. Sparrow continued, “The Computer Fraud and Abuse Act (“CFAA)” provides civil remedies for certain types of misuse of computers and computer files. “This law was originally enacted to bring criminal charges against computer hackers, but the civil component of the statute allows employers to seek damages against former employees for misuse of a protected computer,” Sparrow noted. “CFAA defines a ‘protected computer’ as a computer ‘used in interstate or foreign commerce or communication’ so a protected computer, in effect, could include any computer connected to the Internet.

CFAA prohibits numerous types of conduct, including the theft of data from a protected computer and the unauthorized access of a protected computer resulting in damage to a protected computer. Sparrow pointed out to Turner “The crucial evidence to support a successful CFAA claim will be the information you obtain from the forensic examinations you conduct early in the litigation process”

C. Breach of Fiduciary Duty
“What really bothers me about all this is that these two mutinous swine were my top executives and officers in the company and they were actively conspiring with my competitor. They were supposed to be working on behalf of PRI,” Turner said to Sparrow. “Surely that can’t be legal! Is it legal?”

“No, it’s not,” said Sparrow. Because they were trusted high level executives and corporate officers, they owed a legal duty of care and loyalty to your company. Because they clearly and intentionally worked against the best interests of PRI, we have a strong claim against them for breach of fiduciary duty!”
Sparrow explained to Turner that under the law in most states, a corporate officer has a duty of care which can be defined as follows: "A director or officer has a duty to the corporation to perform the director’s or officer’s functions in good faith, in a manner that he or she reasonably believes to be in the best interests of the corporation, and with the care that an ordinarily prudent person would reasonably be expected to exercise in a like position and under similar circumstances."

Sparrow continued, “The second fiduciary duty that all officers owe to their employer is that of loyalty, good faith and fair dealing. Officers have a duty to exercise ‘the utmost good faith and loyalty’ to the corporation. This includes the duty to refrain from engaging in self-dealing activities.”

“In this case, Barbossa and Teach are clearly fiduciaries because of their high level positions within the company. However, courts have recognized that even lower level employees, such as a store manager or an office manager, also may owe such fiduciary duties to their employer, depending on the individual circumstances.”

Looking through copies of the e-mails between Barbossa and Teach and the President of BPE, Sparrow said, “In these e-mails, your two back-stabbing executives are actively discussing with your chief competitor how to do damage to PRI. They’re doing this while serving as company officers and top executives who are ‘supposed’ to be working in the best interests of your company. This is hardly the conduct of loyal employees acting in good faith. These e-mails are ‘the smoking gun’ in our breach of fiduciary duty claim against them! Plus, juries generally don’t care for sneaky dishonest employees who are foolish enough to discuss all their wrongdoing in an e-mail.”

Turner asked, “Is there any type of claim we can bring against BPE? What about the engineers who left with Barbossa and Teach? They had to have known what those two pieces of shark bait were up to, and helped them to steal our information!”

Sparrow nodded and said, “A person or a corporation ‘who knowingly joins with or aids and abets a fiduciary in an enterprise constituting a breach of the fiduciary relationship becomes jointly and severally liable with the fiduciary for any profits that may accrue.’ In other words, if BPE, its President or your former engineers knowingly helped Barbossa and Teach in breaching their fiduciary duties to PRI, they also can be can be held liable for money damages. This could include any profits they made utilizing PRI’s information.”

D. Tortious Interference with Business Relations / Civil Conspiracy
“I’d really like to sink these sea rats” Turner said. “Is there one more claim I might be able to bring?” Sparrow laughed, “How about two?”

“One potential claim against them would be for tortious interference with business relations. To prove such a claim, we would have to show (1) their acts were intentional and willful; (2) their acts were calculated to cause damage to PRI in its lawful business; (3) the acts were done with the unlawful purpose of causing damage and loss, without right or justifiable cause on the part of BPE or its President, and (4) actual damage and loss resulted.”
“In our case, I think we’ll be able to prove all of that. First, their actions were clearly intentional and willful because we can show this scheme had been in the works for months. Second, their acts were calculated to cause damage to PRI, by taking away its business and customers using stolen information. Third, BPE has no lawful right to be using your information against you. Finally, we can show PRI has suffered actual damage because of their wrongful actions.”

Sparrow continued, “Another possible claim would be for civil conspiracy. Conspiracy requires a finding of “(1) two or more persons or corporations; (2) an object to be accomplished; (3) a meeting of the minds on the object or course of action; (4) one or more unlawful overt acts; and (5) damages as the proximate result.” The purpose of the conspiracy has to be to accomplish an unlawful purpose or a lawful purpose unlawfully.”
“In your case, Barbossa, Teach, BPE, its President and your engineers had the goal of hurting PRI’s business and clearly agreed on how they were going to go about it. Further, the unlawful acts involved the breach of fiduciary duty, violations of MUTSA and CFAA when they stole your information, as well as their tortious interference with your business relations.”

VI. Conclusion

'Well, then, I confess, it is my intention to commandeer one of these ships, pick up a crew in Tortuga, raid, pillage, plunder and otherwise pilfer my weasely black guts out."~ Captain Jack Sparrow

As illustrated by the fictional pirate tale above, dishonest employees rarely let you know in advance of their intention to “raid, pillage, plunder and otherwise pilfer” your company’s trade secrets. However, employers who put in place the proper policies and practices are less likely to find themselves in the position of the overly trusting Will Turner, and better prepared for any legal battles against pirates and rogues in the workplace.

Mark Fijman is a labor and employment attorney with Phelps Dunbar, LLP, which has offices in Louisiana, Mississippi, Florida, Texas, Alabama, North Carolina and London. To view his firm bio, click here. He can be reached at (601) 360-9716 and by e-mail at fijmanm@phelps.com. An abbreviated version of this article has previously been published in the Mississippi Business Journal.