This website uses cookies

This website uses cookies to ensure you get the best experience. By using our website, you agree to our Privacy Policy

Jean-Yves Gilg

Editor, Solicitors Journal

Virtual worlds, real consequences

Feature
Share:
Virtual worlds, real consequences

By

Social networking sites have lured users into a false sense of confidentiality, but personal details held on these sites can be accessed and used by employers against employees – how far can this go, asks Sarah Crowther

For Generation Y, email, text and instant messaging software are 'old school'. Instead, social networking sites such as Facebook, MySpace and Bebo are now fundamental to the way in which they organise their social lives. Many have blogs or personal websites. They think nothing of uploading video and audio content onto sharing sites such as YouTube. Many others share information by copying files, by participating in file sharing (known as peer-to-peer or P2P) through the internet. A significant community of internet users live vicarious second lives by means of invented characters or 'avatars'.

Permanence of information

There is relatively little understanding by users that their actions in the virtual world impact on their 'real' lives. The permanence of information on the internet and in email is often overlooked by employees who are beguiled by the relative informality of e-communication. The dividing lines between individuals' professional or working lives and the personal sphere have been blurred.

A humorous, but striking, example of the practical import of this blurring on employment relationships was brought home last month to a Sydney call centre worker. He updated his 'status' on Facebook to declare that he had a hangover and was therefore taking a 'Sickie Woo!' Unfortunately, for him, the employee's line manager promptly illustrated his Facebook 'friendship' with his subordinate by dismissing him.

These developments pose interesting questions of law and practice in the employment sphere. To what extent is material posted on a personal website or a MySpace profile confidential? What dangers are posed by the difficulty of verifying the accuracy of the content of information on the web? How can employers protect themselves from adverse comment made by their employees on the web?

The question affects recruitment, control and management of the employment relationship.

Can I look at an applicant's blog?

An apparently common misconception among those who communicate using the web is that their personal sites are confidential. In fact, there is widespread anecdotal evidence to suggest that universities, colleges and potential employers routinely check applicants' websites, blogs and social networking pages as part of the recruitment process. As a matter of legal principle it would seem that there is little to preclude such searches: posting personal information on a publicly accessible website without adequate security restrictions is equivalent to taking up an advertisement in the local press.

Social networking sites rely heavily on the individual user setting personal security preferences. Facebook's terms of use, for example, contain no restrictions precluding an employer or potential employer from reading the content of personal pages. Mistakes are easily made: 18-year-old Ashley-Paul Robinson, a footballer for Crystal Palace, posted his intention to move to Fulham on his Facebook profile '“ thus informing not only his 194 Facebook 'friends' but also about 2.7m members of the 'London network'. The employer football club was understandably unimpressed with this release of commercially sensitive information.

On this basis, it would seem that in general, unless the individual user has sufficient regard for the security and privacy of his own information, there will be no additional protection offered by Article 8 of the European Convention on Human Rights, nor as a matter of the law of confidence. Employees should therefore exercise considerable caution before publishing anything less than flattering information concerning themselves, their employer or their colleagues.

Employers on the other hand might not be wise to grub around extensively on the internet for information regarding a potential candidate. Quite apart from the difficulty of avoiding mistaken identity in a world where many bloggers adopt alternative personas, how can the employer be sure that the content is true? Content may well have been uploaded by third parties with ulterior motives. This was precisely the scenario in Applause Store Productions v Raphael [2008] EWHC 1781 (QB), where a disgruntled former business associate set up a false and defamatory Facebook profile.

There could still be some content in which a blogger or poster has a legitimate expectation of privacy, even though it appears on a site that a potential employer could technically access. Such an expectation is however only likely to exist in respect of information of a particularly private nature which is not openly or widely disseminated. Information regarding sexual orientation or religious belief may appear on a social networking site. It would be illegal discrimination for a potential employer to take account of this information when deciding how to progress a candidate's application.

Can I discipline or dismiss in respect of conduct on the internet?

A common concern for employers is what action they can legitimately take should they suspect that an employee is misbehaving in the virtual world. Where such behaviour takes place in the course of employment and would easily be identifiable as misconduct in the 'real' world, there should be little difficulty in following standard disciplinary or dismissal procedures. For example, work-related internet-based conduct which amounts to bullying, sexual or racial harassment or obscenity would normally be categorised by a well-drafted disciplinary policy as gross misconduct and can be dealt with in the usual way.

However, matters become more complicated where the behaviour takes place outside work in course of the employee's personal life. It is in these situations that the employer would have to link conduct to a breach of the employment contract '“ usually by dint of the impact on a legitimate interest of the employer's business.

Bringing the employer into disrepute

An excellent example was the case of Ellen Simonetti, the Delta Airlines flight attendant whose blog 'Queen of the Sky' resulted in the termination of her employment. The Queen of the Sky reported various adventures, apparently all part of her experience as a flight attendant, accompanied by photographs of Ms Simonetti in uniform (who later insisted her Queen of the Sky character was merely fictional). Delta Airlines were not impressed: they relied on the misuse of their uniform and logo to establish a case for dismissal on grounds of bringing the company into disrepute.

In the UK such conduct is more likely to be categorised as a breach of trust and confidence but it is easy to see how employees might get themselves into trouble along similar lines: a disillusioned worker posting negative blog comments regarding his employer or colleagues could find himself on the end of a disciplinary charge. It may not avail the employee that the comments were true and therefore not defamatory and the whistleblowing provisions of s.47(B) of the Employment Rights Act 1996 (as inserted by the Public Interest Disclosure Act 1998) will not generally be of assistance to an employee in circumstances where the disclosure could reasonably have been made to the employer rather than the public at large.

Misuse of employer's property

Another avenue for employers is where the alleged conduct takes place using property belonging to the employer which has been misused. It is perhaps trite to advise that in this area prevention is better than cure. A good internet and e-communications policy will have clear guidance on use of social networking, virtual reality and P2P sites (and most likely access to the same will be restricted). Equally there should be parameters for reasonable usage (in terms of time, content and purpose) of BlackBerries, laptops, mobile phones and other equipment issued by an employer to assist an employee in carrying out his duties. It may be necessary to give separate consideration to homeworkers using personal internet connections in the policy.

It is worth an employer's while to use the policy to remind employees of the risks involved in inappropriate internet usage. In Moonsar v Fiveways Express Transport [2005] IRLR 9, the employer was held liable for sex discrimination where a female employee was exposed to obviously degrading and offensive pornographic material downloaded by male colleagues on their nearby PCs.

However, a well-drafted policy alone will not render a subsequent dismissal for breach fair and non-discriminatory. It is important to enforce policies and not simply use them as a smokescreen for dismissal on other grounds such as disapproval of a workplace affair, or merely as an excuse to get rid of an awkward employee. Tribunals will be astute to investigate the genuine reasons underlying a decision to dismiss in circumstances where it appears that an individual may have been scapegoated or unfairly selected for unusually harsh treatment.

If an employee is seriously over-using internet and email resources during work time, it may be that he is in breach of his contractual obligation to render the services which he has promised to provide. Such a breach is unlikely to form grounds for instant dismissal.

All but the most extreme case would justify some form of lesser disciplinary sanction and an opportunity to improve behaviour. In any situation where it is within an employer's power to remove the temptation (for example by blocking access to a particular social networking site) a move to dismiss such an employee immediately would probably be considered unfair.

Big Brother '“ monitoring employee's usage

In practice, difficult questions of enforcement arise, particularly in relation to mobile or senior employees who enjoy greater autonomy and are less likely to be directly supervised. The only real method is to monitor internet usage, which immediately raises questions of privacy and free speech.

Cyber-vetting has been a vexed legal question, previously resulting in successful ECtHR proceedings against the UK (Copland v UK (62617/00) ECHR). Email and internet activity falls within the scope of an employee's Article 8 right to a private life, even if sent from or received at work, unless an employee has been given due warning that his activity is liable to monitoring.

Following secondary legislation on the point (Telecommunications (Lawful Business Practice)(Interception of Communications) Regulations 2000 SI 2000/2699) it is clear that an employer is legally entitled to monitor email and internet traffic for the purpose of ascertaining whether it forms part of the legitimate business of the employer, so long as all reasonable efforts have been made to inform the employee that such interception may take place.

Once the snapshot of activity has been taken, the evidence will need to be preserved and subjected to expert analysis before it can be used as part of an investigation or disciplinary proceeding.

Managing expectations

While the internet and email are invaluable aids to business and workplace communication, unless expectations are managed on both sides of the employment relationship there is much potential for trouble and dispute. A well thought out, sensibly enforced and monitored usage policy is essential.