Commentary

Cybersecurity and the Workplace: Balancing Privacy, Security and Innovation

American workplaces are on the cusp—or already in the middle—of significant, widespread changes brought about by rapid advances in technology.

July 24, 2019 at 12:31 PM

8 minute read


Jennifer Betts, Ogletree, Deakins, Nash, Smoak & Stewart Jennifer Betts, Ogletree, Deakins, Nash, Smoak & Stewart

American workplaces are on the cusp—or already in the middle—of significant, widespread changes brought about by rapid advances in technology. Among other issues, new workplace technologies can often capture massive amounts of data about employees, providing employers access to ever-increasing amounts of information about their workforces. As employers continue to innovate and grow their digital capabilities, they must remain mindful of both maintaining the security of the data they collect and protecting, or at least being sensitive to, employee privacy concerns.

Background

  • A brief background of the current paradigm relating to employee privacy and cybersecurity in the workplace. 

The current rules of the road relating to balancing data security and employee privacy are an at-times unclear, but typically manageable, compliance hurdle. From a data integrity and security perspective, a web of local, state, federal and international rules impose obligations on many organizations to implement reasonable measures to maintain the security of sensitive data, and impose notification obligations if a breach occurs. While the European Union (EU) has adopted a uniform approach to privacy under the General Data Protection Regulation (GDPR), the United States has a piecemeal approach to privacy driven by, mostly, evolving state and local laws. For example, California recently passed GDPR-like legislation that may place limitations on employers' use of employee or applicant data. The laws relating to data protection are evolving and require employers' regular review of applicable federal and state regulations.

From an employee privacy perspective, many workers expect that they have some degree of privacy in the workplace. This expectation is at times at odds with employers' obligation to maintain data security, which often requires the imposition of certain monitoring requirements to ensure that external or internal breaches do not occur. Whether employees have an actual legal right to privacy depends largely on where and how an employer is accessing the employee's personal information. Over time, courts have developed some generally accepted rules surrounding permissible employer monitoring of employees tied to widely adopted technology (like email). For example, generally, an employer can monitor employees' work emails and internet use when employees are on a company network. Similarly, employers can generally install surveillance cameras to record images in areas where employees have no reasonable expectation of privacy (recording audio is more complicated, as are “hidden” surveillance videos).

  • Technology innovations are driving the future workplace.

Over the next decade, the future of work will involve increasing job augmentation and modification due to technological advancements. Already, many American workplaces (large and small) are incorporating ever more technology into their workflows—both in “operations” and “administration.” As just some examples:

  • Employers have access to an unprecedented amount of information about employees through big data and advances in artificial intelligence (AI). For example, employers now have access to AI-powered tools that can comb through employee emails and identify which employees are flight risks. AI-powered recruitment tools also can review applicant videos and resumes and provide employers with insights about things like the individual's temperament and fitness for a role.
  • Employers are also increasingly incorporating biometric devices into the workplace. Biometric technology recognizes and authenticates employees based on their unique biological or behavioral traits. The biometric technologies most commonly used in the workplace are facial recognition and fingerprint scanning, with some organizations using hand geometry, iris scanning and voice recognition. Companies are using biometric devices as a potentially more secure way to authenticate employee identity for things like time-keeping, accessing facilities or devices, or granting access to sensitive data.
  • Employers are providing employees with wearable devices like fitness trackers to encourage employee wellness. Perhaps more significantly, employers are increasingly incorporating wearable technology into their workflows like smart glasses, wearable scanners, and wearable exoskeletons. These devices can augment employees' physical and perceptual capabilities in numerous ways; they also capture significant amounts of data that can be utilized for quality control and risk management, among other things.

These technologies can provide powerful benefits to organizations in terms of increased efficiencies, improved quality, lower cost, and better results. However, almost all forms of technology, particularly ones driven by AI, can collect, potentially analyze and draw insights from data—raising issues of data security and employee monitoring. Over the last decade, a small number of states have implemented new rules attempting to strike a balance between privacy and reasonable employer monitoring relating to technological developments in areas like employee social media activity and biometric privacy.

  • Balancing privacy, security and technology. 

As new technologies develop, managing employee privacy expectations, cybersecurity obligations and the need to evolve and innovate will become increasingly difficult. Since new regulations  have not (and are unlikely) to develop with the pace of technology, the lack of a good “fit” between 21st century technology and 20th century laws creates compliance concerns that can be tricky to navigate. However, implementation of best practices can help to balance employers' competing priorities. Consider:

  • Include a cross-disciplinary team of decision makers. Cross-functional teams with a mix of skills and perspectives are ideal when considering new technology and issues of cybersecurity and employee monitoring. The teams should include business and operations management-level personnel and analytics experts, human resources professionals, and legal personnel.  Not only should the teams include members with different skill sets, they should also be demographically diverse. Bringing together members with different backgrounds and skill sets can assist with identifying opportunities, ensuring internal alignment, deploying tools consistently with corporate culture, and mitigating legal and practical risks.
  • Maintain and regularly review and update policies. Employers should consider the development of clear policies surrounding monitoring of employees and use and access to the data available through new technologies, as well as specific policies surrounding what will happen if data is accessed without authorization and what will happen if a breach occurs. Employers should regularly audit and monitor their policies to ensure that the policies work as designed, and evaluate whether changes are needed.
  • Obtain informed employee consent where needed. While, often, it is sufficient to simply have a policy that provides notification, for example, about what data is being tracked by an employer and how it will be used, sometimes it may be advisable to obtain informed employee consent. For example, Illinois' General Assembly passed the Artificial Intelligence Video Interview Act which would require employers to take certain steps before asking applicants to submit to video interviews: notify applicants for Illinois-based positions of plans to have their video interviews analyzed electronically; explain to the applicants how the artificial intelligence analysis technology works and what characteristics will be used to evaluate them; and obtain the applicants' consent to using the technology. The law has not yet been signed by Illinois' governor, but could be a harbinger that similar consent laws may be forthcoming.
  • Develop clear communication mechanisms surrounding new technology. Presenting employees with information about changes in workplace technology, including any monitoring of their activities and limitations on their privacy tied to technology, will allow employees to understand and recalibrate their expectations in the workplace. Communication should be timely, clear, and presented by someone in leadership.
  • Limit and restrict data access. The more data is disseminated, the more opportunities for it to be breached.  Similarly, the more data that is available to an employer, the more opportunity for litigation challenges based on use of the data. Careful advance evaluation of logistical details such as how data is stored, who has access to data, and to what forms of data access is provided (traceable data or anonymized, for example) is important.

This area of the law is constantly evolving. Best practices should be adapted to each employer's operations and should be re-evaluated based on changing legal, technological and business conditions.

Jennifer G. Bettsa shareholder at Ogletree, Deakins, Nash, Smoak & Stewart, represents and counsels employers regarding complex traditional labor and employment matters. She has defended numerous employment class and collective actions for clients in a wide array of industries including retailers, manufacturers, banks, and in the energy sector.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Go To Lexis →

Not a Lexis Subscriber?
Subscribe Now

Go To Bloomberg Law →

Not a Bloomberg Law Subscriber?
Subscribe Now

NOT FOR REPRINT

Latest
Trending

Who Got The Work

J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.

Read More

Who Got The Work

Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.

Read More

Who Got The Work

Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.

Read More

Who Got The Work

Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.

Read More

Who Got The Work

Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.

Read More

Law.com Pro