ARTICLE
6 January 2014

When Federal Law Treats You As A Hacker

FL
Foley & Lardner

Contributor

Foley & Lardner LLP looks beyond the law to focus on the constantly evolving demands facing our clients and their industries. With over 1,100 lawyers in 24 offices across the United States, Mexico, Europe and Asia, Foley approaches client service by first understanding our clients’ priorities, objectives and challenges. We work hard to understand our clients’ issues and forge long-term relationships with them to help achieve successful outcomes and solve their legal issues through practical business advice and cutting-edge legal insight. Our clients view us as trusted business advisors because we understand that great legal service is only valuable if it is relevant, practical and beneficial to their businesses.
Edward Snowden and Julian Assange have become recent public faces of hacking.
United States Privacy

Edward Snowden and Julian Assange have become recent public faces of hacking. But hacking is not always sensationalized by stolen state secrets, diplomatic crises, and asylum applications. As we previously reported, laws intended to address hacking are increasingly being brought to bear on more mundane workplace settings. Though these settings are much less controversial than the more publicized instances of hacking, they nonetheless provide a cautionary tale about the potential consequences of lax electronic-monitoring policies.

Consider one recent example of alleged hacking where an employee of a telecommunications company used her company-issued blackberry for both personal and business purposes. Before she quit her job, she returned the device to her supervisor, mistakenly believing she had deleted her personal Gmail account from the phone. Her supervisor then took a keen interest in her emails and spent the next 18 months perusing her personal emails (over 48,000 of them).

No state secrets were stolen, no undercover operatives identified, no foreign leaders incensed. But that is little comfort to the employee whose communications about her family, finances, health, and other personal matters had allegedly been read by a supervisor she once worked for.
So the employee sued under Electronic Communications Privacy Act ("ECPA"), a law primarily designed to provide a claim against computer hackers. The court recognized that the supervisor was not a "hacker" in the conventional sense. After all, as a supervisor, he was authorized to be in possession of the blackberry. Further differentiating him from a traditional hacker, the supervisor did not "hack" the employee's account in the sense that he did not misuse or manipulate a password to access the emails. Nonetheless, the court recognized the employee could bring a claim against the supervisor and the employer under the ECPA because, within the meaning of that law, hacking is merely accessing stored electronic communications without consent.

How to avoid this situation? Employer policies should clearly define an employee's expectation of privacy and the employer's right to monitor communications. Even better, employers could obtain have an employee's consent – preferably in written policies and signed acknowledgments – before accessing employee emails, particularly if there is some reason to look at email accounts that are not issued by the employer. Courts are very reluctant to infer or imply consent. For example, a court will not infer consent to monitor communications merely on the basis that the communications occurred on a company-owned device or because the employee knew the employer was capable of monitoring communications. Nor will a court infer consent from the fact that an employee negligently left the "e-mail door open" to her supervisor. A few relatively easy and proactive steps regarding electronic device usage and communications up front can prevent a lot of potential headaches in the future.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More