Escolar Documentos
Profissional Documentos
Cultura Documentos
Presented by:
jg@greenwaldllp.com www.greenwaldllp.com
Legal trends
Restrictive covenants are more prevalent especially for salespeople (depends on state law)
Enforceability, however, often depends on customization and how narrow
Technology
2
Non-compete agreements
Reasonable in geography, duration, scope Must be in writing and protect legitimate business interest Should only be in writing and signed by key employees
Confidentiality agreements
Should be signed by all employees Defines proprietary information (trade secrets)
3
Money damages
Hard to quantify
Lost business Lost profits
Misappropriation of Trade Secrets Common Law Duty of Loyalty Legal right to Protect Against Unfair Competition Protect Against Conversion of Property Protect Against Outright Theft
Computer Protection
Have a snapshot taken in certain circumstances as employee leaves
How Does Employees Legal Right To Privacy Interact With An Employers Right To Monitor Workplace Activity?
Courts balance the employees expectation of privacy against the employers need for control and operation in the workplace Courts often distinguish between the employees work-related activities (less privacy), and employees private and personal activities in the workplace (greater right to privacy)
9
How Much Privacy Does An Employee Have A Legal Right To Expect In Electronic Communications on the Computer?
Email/Internet Policy
What an email/internet policy should contain:
Email procedures All email is property of employer no expectation of privacy
Employer has right to monitor (get consent) Offensive, harassing emails are prohibited Passwords shall not be made available to others
Internet procedures Not for personal use Careful about postings Offensive or harassing messages are prohibited
11
What Are The Legal Limitations On Employers Use Of Video Cameras For Surveillance In The Workplace?
Under many state laws, it is illegal (without a court order) to make any video recording in any restroom, locker room, or other area that has been designated by the employer for changing clothes Dont record audio! Selective surveillance e.g., positioning a hidden camera over the desk of one individual employee may be discriminatory
12
Can An Employer Monitor The Movement Of Mobile Employees Via Global Positioning Systems (GPS)?
Generally is OK however, should be advised through policies and get consent!! (some states require)
GPS monitoring should probably not be used to track employees during off-duty hours Use only on company equipment it at all
Consult legal counsel before attempting to use any info collected via GPS
13
14
Getting References
Another source of background information
Get them? Give them? Defamation concerns?
15
16
Investigation Concerns
Investigation report: Be thorough, detailed, factual; include documents, photos, interview notes, every page marked confidential (perhaps get outside agency)
Be careful about your threats to thief! - Extortion
17
Taking Action
Internal discipline/termination;
Disclaimer
The foregoing is a summary of the laws discussed above for the purpose of providing a general overview of these laws. These materials are not meant, nor should they be construed, to provide information that is specific to any law(s). The above is not legal advice and you should consult with counsel concerning the applicability of any law to your particular situation. MMXII Greenwald Doherty LLP All rights reserved. These materials may not be reproduced without permission.
19
rvminc.com
collection, examination, and analysis of data [Electronically Stored Information (ESI)] while preserving the integrity of the information and maintaining a strict chain of custody for the data. SOURCE: Special Publication (SP) 800 series (SP 800-86)
analyzes, and examines data while preserving the integrity and maintaining a strict chain of custody of information discovered. SOURCE: Special Publication (SP) 800 Series (SP 800-72)
Information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software.
- Kenneth J. Withers, Managing Director, The Sedona Conference NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Spring 2006
Mobile devices
e.g., iPad, Android, Blackberry, iPhone
Email servers Microsoft Exchange GroupWise Lotus Notes Web hosted email
Gmail Hotmail
Files downloaded/uploaded Audio and video files Digital images Cloud Dropbox Internet History Websites visited Social media communication Facebook posts Twitter tweets
Any other type of electronic files .doc, .xls, .pdf, .jpg, .cad
Text messages Contacts Calendars Pictures Taken or stored Videos Call Logs Websites visited Downloads Social networking posts
www.rvminc.com
Take a snapshot in certain circumstances as employee leaves Should the computer be used after incident occurs? What is a forensic copy?
Preservation of metadata
Maintaining chain of custody Logging
Certifications
EnCase Certified Examiner (EnCE) AccessData Certified Examiner (ACE)
Software
Open Source vs. Closed Source
A forensic expert can formulate a collection plan which would consider clients
e-Discovery workflow, budget and time constraints
Some of the key forensic tools experts use and are certified in
include:
Guidance Softwares EnCase AccessDatas Forensic Toolkit (FTK) Parabens Network Email Examiner Kroll Ontracks Power Controls Cellebrites Universal Forensics Extraction Device(UFED)
appointments Preemptively preparing forensically sound data collection Developing models for legal hold preservation Bolstering defensibility Satisfying best practices standards and legal requirements Devising practices and implement technology for communication and enforcing legal hold compliance Assisting client counsel in preparation for depositions Serving as an expert witness
Intellectual property
Trademark infringement Theft of intellectual property Temporary Restraining Order (TRO) Permanent Injunction
Greg Cancilla, EnCE, ACE is a Certified Computer Forensic Engineer and the Director of Forensics at RVM. He is experienced in the preservation, identification, extraction, documentation and interpretation of computer data. Greg has completed computer forensics training programs from renowned industry outfits, such as New Technologies, Access Data, and Guidance Software (the developers of Encase Forensics Software) among others. As a certified forensic engineer, he has performed countless computer forensics investigations since entering the field in 2003. Additionally, Greg has offered testimony in numerous cases, including presenting a key piece of evidence in Ronald Luri vs. Republic Services, Inc., et al., which rendered the largest verdict in the State of Ohios history. Greg holds a Bachelors Degree in Business Administration and Computer Science from the University of Toledo.
Certifications: EnCase Certified Examiner (EnCE) AccessData Certified Examiner (ACE) Oregon State University Computer Forensics Training
800.525.7915
info@rvminc.com
RVM Chicago RVM Cleveland
rvminc.com