Electronically Stored Information, Social Media and the Rules of Professional Conduct: Are you compliant with your duties of competence and diligence?

Recently published in The National Law Review was an article about Compliance and Diligence and Electronic Media by  Charles H. Gardner of  Much Shelist, P.C.:

Electronically Stored Information and its increasingly complex progeny, social media evidence (collectively, “ESI”) are quickly being woven into the fabric of discovery and the practice of law.  As the cases and rules of professional conduct discussed below demonstrate, lawyers who fail to thoughtfully investigate and use social media evidence (both that of their own client and that of the opposing party(ies)) are not engaged in best practices.

The American Bar Association (“ABA”) Model Rule of Professional Conduct 1.1 (Competence) states that “[a] lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” (The Model Rules have been adopted in all of the fifty states, except California, and in the District of Columbia and the U.S. Virgin Islands). Comment 5 to Rule 1.1 provides, in part, that “[c]ompetent handling of a particular matter includes inquiry into and analysis of the factual and legal elements of the problem, and use of methods and procedures meeting the standards of competent practitioners. It also includes adequate preparation (emphasis added).” Further, the ABA Standing Committee on Ethics and Professional Responsibility Formal Opinion No. 98-411(1998) states, “[w]e believe the ethical issues are the same whether [involving] substantial legal or procedural aspects of a client’s matter or [a lawyer’s] ethical duties in furtherance of the client’s matter.”

Much has changed since the ABA adopted the Model Rules of Professional Conduct and its predecessor guidelines. Electronic data and communication and social media communities such as Facebook, MySpace, and Twitter have become linchpins of society and discourse. As of December 2011, Facebook alone reported that it had 845 million monthly users and more than 483 million average daily users (http://newsroom.fb.com/content/default.aspx?NewsAreaId=22, last visited Feb. 12, 2012).

In the recent case of Griffin v. Maryland, 192 Md. App. 518, 535 (2010), the court opined, “[i]t should now be a matter of professional competence for attorneys to take the time to investigate social networking sites (emphasis added).” In addition, a 2010 study by the American Association of Matrimonial Attorneys found that an overwhelming eighty-one percent of the nation’s top divorce attorneys said that they have seen an increase in the number of cases in which social media evidence plays a role. Sixty-six percent of those attorneys cite Facebook as the primary source of such evidence. Accepting as an imminent practical reality that an attorney has or will soon have an affirmative duty to investigate social media evidence, what might the cost be to the attorney, the client, or both for failing to do so or, worse, failing to preserve such evidence?

Consider hypothetically the evidentiary value of photographs posted on a disability claimant’s social media page showing her rock climbing, for example. One can see just how persuasive ESI can be.  However, ESI can also be a minefield of professional liability. Consider the case of Lester v. Allied Concrete Company, Nos. CL08-150, CL09-223 (Va. Cir. Ct. Oct. 21, 2011) in which a Virginia attorney was found to have instructed his assistant to tell his client to remove a photograph from a social media website. Finding that the lawyer had violated Virginia’s equivalent of Model Rules 3.3 (Candor toward the tribunal), 3.4 (Fairness to opposing parties and counsel), 5.3 (Responsibilities regarding non-lawyer assistants), 8.4 (Misconduct) and rules of court regarding conduct that tends to defeat the administration of justice or to bring the courts or the legal profession into disrepute, the court sanctioned the attorney with a fine of $540,000. In addition, the court fined the client $180,000 for spoliation of evidence. For the twenty-first century practitioner, a well thought-out ESI discovery plan could mean not only the difference between success and failure in the matter at hand, but may also mean the difference between a grateful client and a client that brings a malpractice claim, a disciplinary complaint or both for ineffectiveness in investigation and preparation. However, case investigation and preparation are not the only source of risk for attorneys and judicial officers.

The case of In re: B. Carlton Terry, Jr., No. 08234 (N.C. Judicial Standards Commission, April 1, 2009) demonstrates how critical it is for attorneys to be savvy in social media and ESI discovery in general. In that family law case, the judge, plaintiff’s counsel and defense counsel were discussing Facebook in a meeting in chambers. Plaintiff’s attorney commented that she did not know what Facebook was and did not have time for it. Following the meeting in chambers, Judge Terry and defense counsel became friends on Facebook and discussed the case in some detail. Judge Terry also conducted independent investigation into plaintiff’s social media pages and quoted from them at the hearing. The judge did not inform plaintiff’s counsel of his actions until after he had entered an oral order. Plaintiff’s counsel immediately sought to and did have the judge’s order vacated. Judge Terry voluntarily disqualified himself and the case was remanded for a new hearing, costing the taxpayers a considerable amount. Ultimately Judge Terry was publicly reprimanded by consent in formal proceedings before the Judicial Standards Committee.

Had plaintiff’s counsel conducted a thorough, or even a rudimentary, ESI investigation, the wrongdoing on the part of defense counsel and the bench could have been addressed promptly which would have spared both Plaintiff and the taxpayers significant costs in having to try the same matter twice.

Furthermore, it is worth noting that the rules of professional conduct apply equally to in-house counsel and transactional attorneys as to litigators. In the more casual in-house and transactional business environments, the line between clients and business colleagues can become easily blurred. These attorneys should be especially mindful of their professional responsibilities and the implications that their actions may have on their organization in the event that litigation ensues.

Following are six simple and practical suggested steps towards developing a strong ESI discovery plan and investigation process:

  1. Educate yourself about social media and ESI in general. If you do not know where to look, you could be lost in a search engine “black hole”. Not only can you place yourself ahead of the pack in the legal community, you will also be able to communicate with your children and grandchildren!
  2. Draft a written ESI discovery plan that includes an immediate request for a discovery hold on ESI.  Be systematic and judicious in your requests. And be mindful of Model Rule 1.3 (diligence).
  3. Draft and circulate acknowledgement forms to all personnel in your organization and obtain their signatures.  These documents should educate your personnel about sound social media practices and emphasize ethical concerns as well as the legal liability to the organization, to you and to the employee, who could also face appropriate discipline for violating company policy.  Be mindful of Model Rule 5.3 (responsibilities regarding non-lawyer assistants). And, with respect to employees, be mindful of the limitations imposed by the National Labor Relations Act when drafting your policies and acknowledgement forms.
  4. Instruct your client that ESI is evidence and that the client should not tamper with or destroy such evidence until the case is completely resolved, including during the time allowed for appeals and in appellate proceedings, if any.
  5. Check your client’s social media pages.  Know what you are up against.
  6. Conduct a thorough review of any and all available ESI of the other party.  Be careful to abide by the “no contact” rules.  For example, do not send a surreptitious friend request to gain access to another party’s ESI, but rather, look only at what is publicly available to you and obtain proper warrants for any additional information.  And be prepared to argue to the court why the evidence is relevant and why it should be produced and admitted.

If you are not making diligent and competent use of ESI, you place yourself and your client at a severe disadvantage and you are arguably breaching your ethical obligations. The immediate future is a rare opportunity to be on the cutting edge of developing law.  With a little knowledge and a reasonable amount of follow-through, you can set yourself apart in the new media frontier by making sound use of the bountiful resources that new media technologies have brought to the practice of law.


Charles H. Gardner is Special Counsel to the Intellectual Property & Technology group at Much Shelist, P.C. and head of its social media practice.  Mr. Gardner is a frequent writer and lecturer on the topic of social media and new media technologies. He has been featured in Crain’s Chicago Business and The Chicago Daily Law Bulletin and will be leading a CLE seminar on the “Laws of Social Media” (tailored for house counsel and business executives) on February 21, 2012.* Before joining Much Shelist, Mr. Gardner served as Director of Legal and Business Affairs for Harpo Studios, Inc. Mr. Gardner has a juris doctorate from Loyola Law School, Los Angeles (Entertainment Law Review) and a bachelor’s degree from the University of California, Berkeley.  He is admitted to practice law in California, New York, Illinois, the District of Columbia and before the United States Supreme Court.

*For more information and/or for complimentary registration, please call or e-mail Mr. Rodney Abstone at CLS Executive Search at (312) 251-2564 or email rabstone@clsexecutivesearch.com. 

© 2012 Much Shelist, P.C.

8th Annual Asian ITechLaw Conference

The National Law Review is pleased to bring you information on the upcoming 8th Annual Asian ITechLaw Conference:

ITech --8th Annual Asian ITechLaw Conference on February 23 and 24, 2012

 

As National Law Review member you are entitled to a 10% discount to the

8th ITechLaw International Asian Conference

 

ITechLaw’s 8th annual run of the very popular International Asian Conference will take place in Bangalore – the high technology capital of India.

The theme for India VIII is Technology Law in an Era of Changing Business Paradigms. For a glimpse of what is lined up for a discerning attendee like you, please visit http://www.itechlaw-india.com. Be sure to be one of the first to sign up for this landmark India event.

  • 8th Consecutive event of the ITechLaw India series
  • A ringside view of Indian IT, Media and Telecom Law
  • Supported by several of the largest law firms and global associations
  • ITechLaw’s CyberSpaceCamp® to be held on February 22, 2012
  • Contemporary topics addressed by leading experts drawn from some of the best global law firms
  • Engaging debates with panelists from industry, regulatory authorities and in-house legal departments
  • Interactive sessions on issues affecting the largest IT bases in the world
  • Welcome Reception and Art Show, promoting emerging Indian artistes, allowing delegates to network with local corporates and invited guests
  • Gala Dinner and Networking Luncheons – ample networking opportunities to meet fellow professionals
  • I – Win Tea Meeting
  • In – House Counsel Breakfast Meeting
  • Exclusive golf outings on February 22 and 25, 2012
  • Make the trip a memorable experience by taking an excursion to exotic destinations across southern India, such as Mysore, Kerala and Tamil Nadu

Look forward to a considerable amount of debate and brainstorming. Social meets such as luncheons and gala dinners will enable attendees to indulge into fruitful networking with prospects, contacts and peers from around the world.

See you at the 8th ITechLaw International Asian Conference.

8th Annual Asian ITechLaw Conference

The National Law Review is pleased to bring you information on the upcoming 8th Annual Asian ITechLaw Conference:

ITech --8th Annual Asian ITechLaw Conference on February 23 and 24, 2012

  • 8th Consecutive event of the ITechLaw India series
  • A ringside view of Indian IT, Media and Telecom Law
  • Supported by several of the largest law firms and global associations
  • ITechLaw’s CyberSpaceCamp® to be held on February 22, 2012
  • Contemporary topics addressed by leading experts drawn from some of the best global law firms
  • Engaging debates with panelists from industry, regulatory authorities and in-house legal departments
  • Interactive sessions on issues affecting the largest IT bases in the world
  • Welcome Reception and Art Show, promoting emerging Indian artistes, allowing delegates to network with local corporates and invited guests
  • Gala Dinner and Networking Luncheons – ample networking opportunities to meet fellow professionals
  • I – Win Tea Meeting
  • In – House Counsel Breakfast Meeting
  • Exclusive golf outings on February 22 and 25, 2012
  • Make the trip a memorable experience by taking an excursion to exotic destinations across southern India, such as Mysore, Kerala and Tamil Nadu

8th Annual Asian ITechLaw Conference

The National Law Review is pleased to bring you information on the upcoming 8th Annual Asian ITechLaw Conference:

ITech --8th Annual Asian ITechLaw Conference on February 23 and 24, 2012

  • 8th Consecutive event of the ITechLaw India series
  • A ringside view of Indian IT, Media and Telecom Law
  • Supported by several of the largest law firms and global associations
  • ITechLaw’s CyberSpaceCamp® to be held on February 22, 2012
  • Contemporary topics addressed by leading experts drawn from some of the best global law firms
  • Engaging debates with panelists from industry, regulatory authorities and in-house legal departments
  • Interactive sessions on issues affecting the largest IT bases in the world
  • Welcome Reception and Art Show, promoting emerging Indian artistes, allowing delegates to network with local corporates and invited guests
  • Gala Dinner and Networking Luncheons – ample networking opportunities to meet fellow professionals
  • I – Win Tea Meeting
  • In – House Counsel Breakfast Meeting
  • Exclusive golf outings on February 22 and 25, 2012
  • Make the trip a memorable experience by taking an excursion to exotic destinations across southern India, such as Mysore, Kerala and Tamil Nadu

8th Annual Asian ITechLaw Conference

The National Law Review is pleased to bring you information on the upcoming 8th Annual Asian ITechLaw Conference:

ITech --8th Annual Asian ITechLaw Conference on February 23 and 24, 2012

  • 8th Consecutive event of the ITechLaw India series
  • A ringside view of Indian IT, Media and Telecom Law
  • Supported by several of the largest law firms and global associations
  • ITechLaw’s CyberSpaceCamp® to be held on February 22, 2012
  • Contemporary topics addressed by leading experts drawn from some of the best global law firms
  • Engaging debates with panelists from industry, regulatory authorities and in-house legal departments
  • Interactive sessions on issues affecting the largest IT bases in the world
  • Welcome Reception and Art Show, promoting emerging Indian artistes, allowing delegates to network with local corporates and invited guests
  • Gala Dinner and Networking Luncheons – ample networking opportunities to meet fellow professionals
  • I – Win Tea Meeting
  • In – House Counsel Breakfast Meeting
  • Exclusive golf outings on February 22 and 25, 2012
  • Make the trip a memorable experience by taking an excursion to exotic destinations across southern India, such as Mysore, Kerala and Tamil Nadu

8th Annual Asian ITechLaw Conference

The National Law Review is pleased to bring you information on the upcoming 8th Annual Asian ITechLaw Conference:

ITech --8th Annual Asian ITechLaw Conference on February 23 and 24, 2012

  • 8th Consecutive event of the ITechLaw India series
  • A ringside view of Indian IT, Media and Telecom Law
  • Supported by several of the largest law firms and global associations
  • ITechLaw’s CyberSpaceCamp® to be held on February 22, 2012
  • Contemporary topics addressed by leading experts drawn from some of the best global law firms
  • Engaging debates with panelists from industry, regulatory authorities and in-house legal departments
  • Interactive sessions on issues affecting the largest IT bases in the world
  • Welcome Reception and Art Show, promoting emerging Indian artistes, allowing delegates to network with local corporates and invited guests
  • Gala Dinner and Networking Luncheons – ample networking opportunities to meet fellow professionals
  • I – Win Tea Meeting
  • In – House Counsel Breakfast Meeting
  • Exclusive golf outings on February 22 and 25, 2012
  • Make the trip a memorable experience by taking an excursion to exotic destinations across southern India, such as Mysore, Kerala and Tamil Nadu

8th Annual Asian ITechLaw Conference

The National Law Review is pleased to bring you information on the upcoming 8th Annual Asian ITechLaw Conference:

ITech --8th Annual Asian ITechLaw Conference on February 23 and 24, 2012

 

  • 8th Consecutive event of the ITechLaw India series
  • A ringside view of Indian IT, Media and Telecom Law
  • Supported by several of the largest law firms and global associations
  • ITechLaw’s CyberSpaceCamp® to be held on February 22, 2012
  • Contemporary topics addressed by leading experts drawn from some of the best global law firms
  • Engaging debates with panelists from industry, regulatory authorities and in-house legal departments
  • Interactive sessions on issues affecting the largest IT bases in the world
  • Welcome Reception and Art Show, promoting emerging Indian artistes, allowing delegates to network with local corporates and invited guests
  • Gala Dinner and Networking Luncheons – ample networking opportunities to meet fellow professionals
  • I – Win Tea Meeting
  • In – House Counsel Breakfast Meeting
  • Exclusive golf outings on February 22 and 25, 2012
  • Make the trip a memorable experience by taking an excursion to exotic destinations across southern India, such as Mysore, Kerala and Tamil Nadu

Status Update: Fired – Social media is a great way to market a company. It is also a great way to get fired from one.

Recently featured in the National Law Review an article by Emily Holbrook of Risk Management Magazine about Social Media:

Time Line: Status Update — Fired Social media is a great way to market a

company. It is also a great way to get fired from one.

Facebook recently reached a milestone: 750 million active users worldwide. With people spending more than 700 billion minutes per month on the social network, it’s no wonder many users get themselves in trouble for what they post. For example, a juror in the UK was dismissed after she disclosed sensitive case information on her Facebook profile, asking her friends to participate in a poll to help her decide “which way to go” with the verdict. But repercussions from other comments on social media sites have been much worse.

Many employees have been terminated over certain comments or pictures, and the National Labor Relations Board says it has been receiving an increased number of social media cases as this new mode of communication continues to grow in popularity and users continue to post with reckless abandon.

June 2008

20-year-old James Brennan was fired from his job at a store in central London after posting a derogatory statement about his employers. He believed his comment was visible only to his friends, but a colleague printed off the remark and showed it to his boss. Brennan claimed that what he wrote was private and done on his own time. Nonetheless, he was fired on the spot.

November 2008

Virgin Atlantic canned 13 flight attendants after they criticized the airline’s flight safety standards and described passengers as “chavs” (a derogatory term used in the UK referring to aggressive, arrogant, lower-class young adults) on Facebook. Management at Virgin Atlantic fired the 13 individuals due to their “totally inappropriate behavior” that “brought the company into disrepute.”

April 2009

An unnamed employee of Nationale Suisse, an international insurance company, lost her job after supervisors realized she was using Facebook after calling in sick because she was suffering from a migraine and needed to lie in a dark, quiet room. The woman claimed she was not using her computer, but instead accessing the site from her iPhone. The company said it lost trust in the employee while the woman accused the company of setting up fictitious “friends” to spy on her account activity.

August 2009

Georgia public school teacher Ashley Payne was given a “resignation or suspension” ultimatum after her supervisors saw that her Facebook profile included a photo of her taken during her European vacation that showed her clutching a glass of wine in each hand. Along with the photo, one of her status updates contained an expletive (though she was merely referring to the official name given a local bingo night). Payne sued the school, making hers one of several lawsuits filed within the past few years involving teachers who feel they were unfairly dismissed because of the contents of their Facebook pages.

April 2010

Tania Dickinson, a ministry employee in Auckland, New Zealand, was fired over a Facebook comment in which she described herself as a “very expensive paperweight” who is “highly competent in the art of time wastage, blame-shifting and stationary [sic] theft.” The Employment Relations Authority refused to uphold a complaint from Dickinson that she was unfairly dismissed.

June 2010

24-year-old Andrew Kurtz worked as a “Pittsburgh Pierogi” mascot for the Pittsburgh Pirates baseball franchise, a job that entailed racing around the field between innings and greeting fans. Kurtz was also a diehard Pirates fan and when he found out team president Frank Coonelly decided to keep general manager Neal Huntington and manager John Russell on for another season, he took to Facebook, stating “Coonelly extended the contracts of Russell and Huntington through the 2011 season. That means a 19-straight losing streak. Way to go Pirates.” He was immediately fired.

February 2011

Dawnmarie Souza, an employee of American Medical Response, a Connecticut ambulance service, took to Facebook to criticize her supervisor and other coworkers. Soon after, she was terminated from her position. The National Labor Relations Board (NLRB) promptly brought the wrongful termination complaint before an administrative court, arguing that the company’s social media policy was too broad and that Souza’s termination violated the National Labor Relations Act, which keeps employers from penalizing employees for talking about unionization or working conditions. A settlement was reached in which Souza did not return to work but the company changed its social media policy.

September 2011

In October 2010, five employees of the minority advocacy group Hispanics United of Buffalo were fired for complaining about working hours at their nonprofit employer. The five decided to fight back, taking their case to the NLRB. There, administrative law judge Arnold Amchan, in a first-of-its-kind decision, ruled that after-hours Facebook wall complaints about being over-worked constituted legitimate “concerted activity” within the meaning of Section 7 of the National Labor Relations Act. He ordered the organization to reinstate the five employees along with back pay.

Risk Management Magazine and Risk Management Monitor.

Copyright 2011 Risk and Insurance Management Society, Inc. All rights reserved.

Health Care Entities Using Social Media: Guidance from the Division of Quality Assurance

Recently posted in the National Law Review an article by Diane M. Welsh and Linda C. Emery of von Briesen & Roper, S.C. regarding  the use of social media and web-based email services:

Many articles have been written about the legal and business risks associated with the use of social media and web-based email services. However, the risk of using social media is heightened in the health care industry in light of a health care entity’s legal and regulatory obligations to protect the privacy and security of health care information. Health care entities need to be particularly familiar with the risks of using social media in the health care industry and methods for reducing those risks.

The DQA October 24, 2011 Memorandum

On October 24, 2011, the Wisconsin Division of Quality Assurance (“DQA”) issued numbered memorandum 11-026 entitled, “Using Social Media Platforms, such as Twitter, Facebook, MySpace and LinkedIn”. The Memo is available at www.dhs.wisconsin.gov/rl_DSL/Publications/11-026.htm.

The DQA definition of “Social Media” includes what one would normally consider social media, as well as “free and unencrypted web-based email services” such as Yahoo and Gmail, and web-based calendars. The purpose of the Memo is to “provide guidance to providers on the fast-changing landscape of the internet and the impact of using social networking and social media as a communications tool”.

DQA released the Memo to address concerns raised about (1) health care entities and their staff using web-based email accounts (e.g., Gmail) or web-based calendars (e.g., Yahoo Calendars) to convey patient or resident care information; and (2) health care entity staff members sharing protected health information on FaceBook.

The DQA notes that inappropriate use of Social Media or use of Social Media without adequate security protections may violate a patient’s or resident’s privacy rights. Moreover, DQA emphasizes that Social Media sites are now major targets of the hacker underground, creating further risk of a network security breach. DQA also warns health care entities of the potential for criminal and civil risks of using Social Media, (including criminal prosecution or civil actions under HIPAA) because it is the United States Department of Health and Human Services Office of Civil Rights—and not the Division of Quality Assurance—which has jurisdiction over such violations.

Risk Management Considerations With Regard to Entity Use of Social Media

DQA includes a number of recommendations for reducing the risks associated with the use of social media by health care entities.

First, the DQA recommends that each health care entity conduct a risk assessment to determine whether the entity or its staff members are utilizing Social Media in a manner that may violate patient or resident rights.

DQA also recommends that providers and staff members should be fully aware of the broad definition of “protected health information.” If a health care entity chooses to utilize a Social Media tool, it should insure that the information it discloses is “de-identified under HIPAA.” DQA points out that no health care provider should ever post any protected health information on-line without the appropriate written patient authorization. Merely omitting a patient’s name from a post does not make it a permissible disclosure. Posts that discuss the patient’s condition—even without disclosing the patient’s name—contain protected health information.

DQA emphasizes that “a covered entity should consider the need for a business associate agreement with a social media site, if the entity is uploading protected health information to the site. HIPAA makes it mandatory for all covered entities along with their business associates to ensure complete protection of patient health information, which they store, process and exchange between themselves.”

Finally, DQA recommends that health care entities should develop a social media policy that guides employees on the appropriate use of social media, and includes specific guidance (e.g., “Refrain from discussing patients, even in general terms.”). The organization should also provide staff with ongoing training on resident rights, privacy and security.

Marketing Uses of Social Media

DQA does not directly address the use by healthcare entities of social networking sites like FaceBook, Twitter or YouTube, or even the providers’ own websites, to promote their services or discuss advances they have made in healthcare. Many health care entities use videos, photos, and patient interviews to promote their services. If a health care entity posts a video, photograph, or patient interview of actual patients, that provider would be disclosing protected health information.

Any health care provider using protected health information in this manner should only do so with the express written authorization of the patient. Even with such authorization, the provider must be sure that the patient understands that when posting information online, the provider and the patient lose much control of the information. Although the provider could remove the materials if a patient withdraws authorization, the patient and the provider cannot get back any material that may have been downloaded by others.

Although not referenced in the Memo, health care providers should institute a social media policy which identifies who is permitted to use social media for the business purposes of the organization and what information may be posted on the company’s website or a social media web page.

Considerations for Staff Member’s Personal Use

One of the greatest risks of social media sites is that a health entity staff member may post protected information on the staff member’s social media page. The internet is filled with stories of hospital employees being fired for providing their opinions about a patient on a Facebook account, albeit without identifying the patient’s name. Given that any information disclosed about a patient or resident would likely constitute a breach of protected health information, it is imperative that providers inform staff that they are not to share any confidential information whether at work, or outside of work—including on their FaceBook pages or through Twitter (or in actual conversation with their family or friends). Staff should understand that they are not to share any patient information online—even if they are not naming the individual patient.

Additional Resources

Additional information on this issue is available through the HIPAA Collaborative of Wisconsin website, at www.hipaacow.org.

©2011 von Briesen & Roper, s.c

New Facebook Cases – No Protected Concerted Activity, But Is It Surveillance??

Posted in the National Law Review an article by Adam L. Bartrom and Gerald F. Lutkus of Barnes & Thornburg LLP regarding Facebook cases continue to be examined by the NLRB

Facebook cases continue to be examined by the NLRB as a new technology cloaked in traditional case law.  The NLRB’s General Counsel has recently decided to dismiss three complaints brought by terminated employees who were fired for their Facebook posts.  In all three cases, the GC found the conduct not to be protected concerted activity under Section 7 of the NLRA.  That approach is consistent with the GC’s memo earlier this year which emphasized that content and context were key in analyzing whether disciplinary action brought as a result of social media chatter violated the NLRA.  A recent blog post on the topic appears here. To access the GC’s office memoranda on these cases, click here.  All three continue to show the NLRB’s focus on whether the Facebook chatter is merely an expression of individual gripes or is the chatter an effort to initiate group dialogue or group action.  Employers must continue to evaluate decisions to discipline for social media postings within that context.

 However, buried in one of the opinions, Intermountain Specialized Abuse Treatment Center, is a provocative and concerning analysis by the GC’s office regarding union surveillance.  The Advice Memorandum concludes that it agrees with the Regional Director that the Employer did not unlawfully create the impression that it was engaged in surveillance of protected union activity by having knowledge of the Facebook post.  What??  The memorandum states that employer surveillance or creation of an impression of surveillance constitutes unlawful interference with Section 7 rights.  Here, there was no such impression of surveillance because the employer received the Facebook information from another employee and the conduct at issue turned out not to be protected activity.  However, the memorandum certainly raises the question of whether an employer practice to examine Facebook posts on a regular or even on an as needed basis would violate Section 7 rights.  The jury is still out on that issue.  Stay tuned.

© 2011 BARNES & THORNBURG LLP