In the last several years, issues such as cybersabotage (hacking), espionage, stalking and infringement, cyber harassment, discovery requests for electronically stored data, identity theft and surreptitious photographic equipment (picture phones) have begun to confound businesses. Protecting companies against egregious electronic abuses by outsiders and employees has become one of the human resources professionals' job responsibilities. Common threat sources to technology systems include natural threats (e.g. floods, earthquakes, electrical storms), human threats (unintentional acts or deliberate actions) and environmental threats (power failures, chemicals, liquid leaking). In addition, companies' policies and procedures necessarily need to change with times. This presentation is intended to red flag potential problem areas, help you prevent liability and deal with problems after they arise.
- Internet applicants and resumes: required recordkeeping for internet job applicants
- Electronic background checking
- Company policies regarding e-mail and internet
- New perspectives on union solicitation and distribution of union materials
- The attendee will be able to discuss challenges with the retention of electronic documents.
- The attendee will be able to identify cybersabotage, espionage and other security breaches.
- The attendee will be able to review privacy issues.
8:30 a.m. - 10:15 a.m.
I. Internet Applications And Resumes:
Required Recordkeeping For Internet
A. Using Internet And Electronic Data Processing Technology As Part Of The Initial Recruitment And Selection Process
B. Proposed EEO Recordkeeping Guidelines Require Employers To Track Some Internet Applicants
II. Electronic Background Checking
A. What To Check?
B. Is Consent Needed?
III. Company Policies Regarding E-Mail
A. Why Are They Necessary?
B. How To Develop And Implement
10:15 a.m. - 10:25 a.m.
10:25 a.m. - 12:45 p.m.
IV. On-Line Employee Handbooks,
Personnel Policies, Benefits
Information And Other Company
A. To Post Or Not To Post (Website Or Intranet)
B. Ownership Of Posted Information/Return To Company Upon Termination Of Employment
C. New Software Systems Help Employers Track Employees Who Have And Have Not Accessed Documents
V. Challenges With The Retention Of
A. Statutory Retention Requirements
1. Documents That Must Be Retained
2. How The Documents Must Be Retained
3. How Long The Documents Must Be Retained
B. Litigation Obligations
1. What Must You Produce
2. When Must You Produce
3. What Steps Must You Take To
Ensure The Documents Safekeeping
VI. Cybersabotage, Espionage And Other
A. Who's Interested In Your Information?
B. What Are They Interested In?
C. How Do They Achieve Their Objectives?
D. What Are You Going To Do About It?
E. When Bad Things Happen: Where To Go For Help Outside the Company
12:45 p.m. - 1:45 p.m.
Lunch (On Your Own)
1:45 p.m. - 2:50 p.m.
VII. New Perspectives On Union
Solicitation And Distribution Of Union
A. Section 7 Of The National Labor Relations Act
B. Adapting The Labor Laws To Deal With The Use Of Technology
C. Leafletting V. E-Mail
D. Personal v. Business Computer Use
VIII. Privacy Issues
A. 'No Privacy' Workplace Policies
B. Legal Liability For Monitoring Communications
2:50 p.m. - 3:00 p.m.
3:00 p.m. - 4:30 p.m.
IX. Cell Phones, Picture Phones, 'Shoe
Phones' And Cameras: Maxwell
Smart Hits Your Company
A. Why All The Concern Over These New Toys?
B. Safety And Privacy Issues
C. Banning Picture Phones In The Workplace
D. Liability Issues
X. Who's Minding The Electronic Store?
(The Team's Approach)
A. Corporate Risk Management Team
B. Legal Department/Corporate Legal Counsel
C. MIS Department/Technical Support Personnel
D. Human Resources Professional
E. Outside Resources.