Topic 4.4: The Right to Privacy and Other Protections from Employer Intrusions
Most people recognize that the remarkable technological developments of the 1990s were generally very beneficial to society. Many people are beginning to realize they have their downsides as well. Primarily, new technologies allow others to obtain personal information about people at levels and ways unheard before the advent of the computer and other high-technology devices. For example, employers can now determine who employees talk to on the phone, for how long, and even what was said. Employers are now using information derived from the applicant’s saliva, hair, or urine to predict who may have future health problems or who may have children with future health problems. All this is done in the name of saving the business money. One area of increasing concern—but as of yet not uniformly regulated—is the use and monitoring of e-mail.
Employer Need for Information
Certainly there are some good reasons for employers to collect information about their employees. In our increasingly competitive economy and its emphasis on service and information, the individual employee can be the employer’s greatest investment. Clearly, employers have an incentive and interest—but not always the right—to gather whatever information they can on their employees. At some point, the employer’s right know must be offset by the employee’s right to privacy.
Foundations of the Privacy Right
The Constitution is silent on the right to privacy, but the right of privacy has been acknowledged as necessary for the fulfillment of other constitutional rights we hold. These fundamental rights include the right of free speech, to marital privacy, and to be free from unreasonable searches and seizures, which is constitutionally guaranteed.
Employees in the public sector have additional protection because the Constitution protects individuals from wrongful intrusions by the state or anyone acting on behalf of the state.
Constitutional Protection
The Fourth Amendment protects against unreasonable searches and seizures. A search has been interpreted to include any collection of blood, hair, or urine samples, or other bodily invasions, as well as personal information acquired from oneself or others. For a search to be considered unreasonable, it must be unjustified at its inception and impermissible in scope.
One court held that a search was justified at its inception when the employer has reasonable grounds for suspecting the search will turn up evidence that the employee is guilty of work-related misconduct or that the search is necessary for a noninvestigatory work-related purpose such as retrieving a file.
A search is permissible in scope when:
· the measures adopted are reasonable related to the objectives of the search
· not excessively intrusive in light of the nature of the misconduct being investigated
The unreasonableness of a search must be balanced with the extent of the invasion and the extent the employee should expect to have privacy in this particular area against the employer’s interest in the security of its workplace, the productivity of workers, and other job-related concerns. For example, when the employer searches employer-owned property—such as desks, lockers, and file cabinets—the employees should be given notice, but no consent is required. When the employer searches personal affects—such as purses, briefcases, and wallets—the employer should inform the employee of the process and obtain the consent first. The employer is guilty of false imprisonment if the employee is not allowed to leave the premises during the search.
The Fifth and Fourteenth Amendments also protect a government employee’s right to privacy by prohibition on the states’ right to restrict individual fundamental rights, such as the right to travel.
When the state attempts to infringe on fundamental rights, that restriction is subject to strict scrutiny (the most difficult standard to meet) by the courts. To be justified, the state must a show a compelling state interest and that the infringement is the least intrusive alternative available. For those interests not considered fundamental, the state restriction must be rationally related to a valid state interest.
The Privacy Act of 1974 applies only to federal government employees. It regulates the release of personal information about federal employees by federal agencies. The act prohibits the release of any employee information that allows the employee to be identified, unless the employee consents. When an exception applies, the employee consent does not apply.
There are four basic principles addressed by the Privacy Act:
· employees should be able to correct an inaccurate record
· employees should be able to prevent information from being inappropriately revealed, unless required by law
· the person in charge of maintaining the information must ensure its security and proper use
· employees should have access to their own files
The right to privacy is not absolute, however. It is subject to a balancing test of the employee’s right to privacy and the requestor’s need to know.
Two options for relief are available—criminal penalties and civil remedies, such as damages, and injunctive relief.
The Federal Wiretapping Statute protects public- and private-sector employees from employer monitoring of their phone calls and other communications without a court order. There are two exceptions to the statute:
· interception is authorized when one of the parties to the communication has given prior consent
· when the equipment used is also used in the ordinary course of business (known as the business extension provision)
The privacy of private-sector employees is significantly less protected than that of public employees. Employers suggest that employees take one of three options when faced with objectionable intrusions—quit, comply, or object and risk termination.
Actually, states protect employee privacy in one of four ways:
· legislation mirroring federal laws
· state constitutions that recognize a right to privacy
· protection in certain areas, such as personnel records and the use of credit information
· personal injury torts and other legal theories
Tort Theories
Three tort theories involving invasion of privacy are public disclosure of private facts and defamation, intrusion into seclusion, and publication in a false light. The last two theories are discussed here.
Intrusion into Seclusion
To be actionable, the employee’s sphere of privacy must be invaded to the point that it would be objectionable to a reasonable person. The employer can respond with justifiable business purposes for the intrusion.
Employers may regulate employees’ off-work activities when they believe it affects the employee’s work performance. But the courts will look very closely at such cases to ensure the regulation is sufficiently related to a legitimate business interest.