SlideShare une entreprise Scribd logo
1  sur  112
Privacy in the Workplace:   Electronic Surveillance Under State and Federal Law   Charles Lee Mudd Jr. – Mudd Law Offices
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trends in Workplace Surveillance ,[object Object],[object Object],[object Object],[object Object]
Trends in Workplace Surveillance (cont’d) ,[object Object],[object Object],[object Object],[object Object]
Trends in Workplace Surveillance (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trends in Workplace Surveillance (cont’d) ,[object Object],[object Object],[object Object]
Trends in Workplace Surveillance (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Employers … and Employees   ,[object Object],[object Object],[object Object]
Highlights of Applicable Law ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],United States Supreme Court
Supreme Court (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Supreme Court (cont’d) ,[object Object]
Supreme Court (cont’d) ,[object Object],[object Object],[object Object],[object Object]
Supreme Court (cont’d) ,[object Object],[object Object],[object Object]
Supreme Court (cont’d) ,[object Object],[object Object],[object Object]
Federal Statutes ,[object Object],[object Object],[object Object],[object Object]
Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq. ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq.
[object Object],[object Object],Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq.
[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq.
[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq.
[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq.
[object Object],[object Object],[object Object],[object Object],Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq.
[object Object],[object Object],[object Object],Electronic Communications and Privacy Act 18 U.S.C. § 2510, et seq.
[object Object],[object Object],[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],[object Object],[object Object],[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],[object Object],[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],[object Object],[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],[object Object],[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
[object Object],[object Object],Stored Communications Act  (18 U.S.C. § 2701)
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object],[object Object],[object Object]
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object]
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object],[object Object]
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object],[object Object],[object Object]
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object],[object Object],[object Object]
Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
State Statutes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Utah  76-9-402.  Privacy Violation ,[object Object],[object Object]
Utah  76-9-402.  Privacy Violation ,[object Object],[object Object]
Utah  76-9-402.  Privacy Violation ,[object Object],[object Object]
Utah  76-9-403.  Communication abuse   ,[object Object],[object Object],[object Object]
Utah  76-9-403.  Communication abuse ,[object Object],[object Object],[object Object]
Utah  76-9-403.  Communication abuse ,[object Object],[object Object]
Utah  76-9-401.  Definitions ,[object Object],[object Object],[object Object]
Utah  76-9-401.  Definitions ,[object Object],[object Object],[object Object]
Interception of Communications Act 77-23a-1, et seq. ,[object Object]
Access to Electronic Communications 77-23b-1, et seq. ,[object Object]
Common Law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Law ,[object Object],[object Object],[object Object],[object Object]
Common Law ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common Law ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common Law ,[object Object],[object Object],[object Object],[object Object]
Common Law ,[object Object],[object Object],[object Object],[object Object]
More Common Surveillance Issues
Email Monitoring - ECPA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email Monitoring - SCA ,[object Object],[object Object],[object Object]
Email Monitoring - Common Law ,[object Object],[object Object],[object Object]
Email Monitoring - Cases ,[object Object],[object Object],[object Object],[object Object]
Email Monitoring - Cases ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email Monitoring - Cases ,[object Object],[object Object],[object Object]
Email Monitoring - Cases ,[object Object],[object Object],[object Object]
Email Monitoring - Cases ,[object Object],[object Object],[object Object]
Email Monitoring - Email Cases ,[object Object],[object Object],[object Object]
Email Monitoring - Email Cases ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email Monitoring - Other Considerations ,[object Object],[object Object],[object Object],[object Object]
Instant Messaging ,[object Object],[object Object],[object Object],[object Object]
Instant Messaging ,[object Object],[object Object],[object Object]
Monitoring Web Usage ,[object Object],[object Object],[object Object],[object Object]
Monitoring Web Usage ,[object Object],[object Object],[object Object]
Monitoring Web Usage ,[object Object],[object Object]
Blogging ,[object Object],[object Object],[object Object]
Blogging ,[object Object],[object Object],[object Object]
Blogging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Blogging ,[object Object],[object Object]
Blogging ,[object Object],[object Object]
Blogging ,[object Object],[object Object]
Blogging ,[object Object],[object Object]
Arbitration - Lessons Learned
Arbitration Development ,[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object]
Arbitration - Lessons Learned ,[object Object],[object Object],[object Object],[object Object],[object Object]
Policy Guidelines ,[object Object],[object Object]
Novel Issues
Novel Issues - Text Messages/Smart Phones City of Ontario v. Quon  United States Supreme Court (2010)
Novel Issues - Video Surveillance ,[object Object],[object Object],[object Object]
Novel Issues - Video Surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Novel Issues - Phone Surveillance ,[object Object],[object Object],[object Object]
Novel Issues - Phone Surveillance (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Novel Issues - Drug Free Workplace Act ,[object Object],[object Object],[object Object]
Novel Issues - Title VI of Civil Rights Act ,[object Object],[object Object]
Novel Issues - Smoker’s Rights ,[object Object],[object Object]
Novel Issues - Pen Registers/Trap & Trace ,[object Object],[object Object],[object Object],[object Object],[object Object]
Novel Issues - Pen Registers/Trap & Trace ,[object Object],[object Object],[object Object],[object Object],[object Object]
Novel Issues - Pen Registers/Trap & Trace ,[object Object],[object Object],[object Object],[object Object]
Charles Lee Mudd Jr. Mudd Law Offices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justifiedParker Donat
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace SurveillanceSampath
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHealthCare Too, LLC
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEnercare Inc.
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceTodd Merrill
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020LawPlus Ltd.
 
Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11dabrannen2
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 

Tendances (20)

Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace Surveillance
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach Overview
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Data protection
Data protectionData protection
Data protection
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the Law
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020
 
Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 

Similaire à Privacy in the Workplace: Electronic Surveillance under State and Federal Law

Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Roger Royse
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data ProtectionLawPlus Ltd.
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Consumer protection is your smartphone too smart
Consumer protection is your smartphone too smartConsumer protection is your smartphone too smart
Consumer protection is your smartphone too smartarcherlaw1
 
Data Privacy & Protection Laws From Around The World
Data Privacy & Protection Laws From Around The WorldData Privacy & Protection Laws From Around The World
Data Privacy & Protection Laws From Around The WorldDigital Addicts
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationJason Hoeppner
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Shawn Tuma
 
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...Shawn Tuma
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
Privacy & The Smart Grid (Susanlyon   Chtlj01292010)Privacy & The Smart Grid (Susanlyon   Chtlj01292010)
Privacy & The Smart Grid (Susanlyon Chtlj01292010)Susan Lyon-Hintze
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAPDavid Sweigert
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
AnalyzinglegislationDr. TJ Wolfe
 

Similaire à Privacy in the Workplace: Electronic Surveillance under State and Federal Law (20)

Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
Consumer protection is your smartphone too smart
Consumer protection is your smartphone too smartConsumer protection is your smartphone too smart
Consumer protection is your smartphone too smart
 
Data Privacy & Protection Laws From Around The World
Data Privacy & Protection Laws From Around The WorldData Privacy & Protection Laws From Around The World
Data Privacy & Protection Laws From Around The World
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
 
cyber crime midterm paper--nosal
cyber crime midterm paper--nosalcyber crime midterm paper--nosal
cyber crime midterm paper--nosal
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
 
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
Privacy & The Smart Grid (Susanlyon   Chtlj01292010)Privacy & The Smart Grid (Susanlyon   Chtlj01292010)
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 

Privacy in the Workplace: Electronic Surveillance under State and Federal Law

  • 1. Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 101. Novel Issues - Text Messages/Smart Phones City of Ontario v. Quon United States Supreme Court (2010)
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.