{"id":959,"date":"2012-09-09T16:12:34","date_gmt":"2012-09-09T16:12:34","guid":{"rendered":"http:\/\/ncjolt.org\/?p=959"},"modified":"2020-06-04T20:54:08","modified_gmt":"2020-06-04T20:54:08","slug":"access-denied-proposed-federal-legislation-takes-aim-at-employers-requesting-employee-social-network-passwords","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/access-denied-proposed-federal-legislation-takes-aim-at-employers-requesting-employee-social-network-passwords\/","title":{"rendered":"Access Denied: Proposed Federal Legislation Takes Aim at Employers Requesting Employee Social Network Passwords"},"content":{"rendered":"<p>Tuesday, September 4, 2012 by Laura Arredondo-Santisteban<br \/>\nEarlier this year, Senators Richard Blumenthal (D-CT) and Chuck Schumer (D-NY) introduced into the House of Representatives and Senate a bill amending the Computer Fraud and Abuse Act called the <a href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/BILLS-112s3074is\/pdf\/BILLS-112s3074is.pdf\">Password Protection Act of 2012<\/a>.\u00a0 The bill would make it a federal crime for employers to \u201cknowingly and intentionally\u201d coerce any person to authorize access, such as provide their password, to a computer that is not the employer\u2019s computer for the purposes of hiring, promoting, or firing.<br \/>\n\u201cIn an age where more and more of our personal information\u2014and our private social interactions\u2014are online, it is vital that all individuals be allowed to determine for themselves what personal information they want to make public and protect personal information from would-be employers,\u201d Senator Schumer said in an Associate Press <a href=\"http:\/\/www.nytimes.com\/2012\/03\/26\/technology\/senators-want-employers-facebook-password-requests-reviewed.html?_r=2\">statement<\/a>.<br \/>\nThe American Civil Liberties Union hails the bill as a <a href=\"http:\/\/www.aclu.org\/blog\/technology-and-liberty\/password-protection-act-2012-good-start-against-employer-snooping\">\u2018Good Start Against Employer Snooping,\u2019<\/a> but states that the bill still contains many weaknesses, such as a lack of protection for students.\u00a0 The ACLU notes that the bill would not cover student-athletes, for whom it is now common for coaches to monitor and access their social media networks.\u00a0 In the wake of the 2011 NCAA <a href=\"http:\/\/www.heraldsun.com\/view\/full_story\/8780740\/article-UNC-football-under-NCAA-investigation?instance=homeseventhleft\">investigation<\/a> of UNC\u2019s football team, many other university sports programs began <a href=\"http:\/\/www.citmedialaw.org\/blog\/2010\/intentional-grounding-can-public-colleges-limit-athletes-tweets\">banning<\/a> or actively monitoring their student-athletes\u2019 social media sites.<br \/>\nApart from not offering protection to students, the bill also leaves room for employers to compel employees or job applicants to grant access to their personal sites through employer\u2019s computer that does constitute a \u201c<a href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/BILLS-112s3074is\/pdf\/BILLS-112s3074is.pdf\">protected computer<\/a>.\u201d\u00a0 This is significant in cases involving \u2018over the shoulder browsing,\u2019 in which employers compel potential employees to log into their personal online accounts on an employer\u2019s computer for the purpose of reviewing the content together.<\/p>\n<blockquote><p>In an age where more and more of our personal information\u2014and our private social interactions\u2014are online, it is vital that all individuals be allowed to determine for themselves what personal information they want to make public and protect personal information from would-be employers,\u201d Senator Schumer<\/p><\/blockquote>\n<p>While criticized as weak in the extent of its coverage, one of the Act\u2019s strengths is that the protections offered are not limited to solely social media sites, but also includes private email accounts and photo-sharing sites.\u00a0 The ACLU praises the Act as being largely technology-neutral, allowing it to remain applicable despite the constant evolution of technology.<br \/>\nSeparately, <a href=\"http:\/\/www.aclu.org\/blog\/technology-and-liberty\/password-protection-act-2012-good-start-against-employer-snooping\">states<\/a> have begun enacting their own privacy measures in an effort to protect workers\u2019 and their online social networking accounts.\u00a0 This past May, <a href=\"http:\/\/www.aclu.org\/blog\/technology-and-liberty\/maryland-passes-nations-first-social-media-privacy-protection-bill\">Maryland<\/a> became the first state to sign into law a bill, which prohibits employers from requiring employers or job applicants to provide their usernames, passwords, or any other access to personal sites as a condition for employment.\u00a0 The bill was drafted in response to stories, like those of <a href=\"http:\/\/www.npr.org\/2012\/03\/21\/149091139\/resume-cover-letter-and-your-facebook-password\">Robert Collins<\/a>, who was required to turn over this Facebook password to his employer upon reapplication for his job.<br \/>\nMaryland is not the only state to have enacted legislation protecting workers online privacy.\u00a0 In August 2012, <a href=\"http:\/\/www.illinois.gov\/PressReleases\/ShowPressRelease.cfm?SubjectID=2&amp;RecNum=10442\">Illinois<\/a> enacted House Bill 3782, which makes it unlawful for employers to request social network account information, like a password or username, from potential or current employees.\u00a0 Around the same time, <a href=\"http:\/\/www.huffingtonpost.com\/2012\/08\/22\/california-social-media-privacy-bill_n_1822517.html?ncid=edlinkusaolp00000003\">California\u2019s<\/a> state senate unanimously voted in support of a bill similar to Maryland and Illinois, banning employers from requiring access to employees\u2019 and job applicants\u2019 social media accounts, as well as to barring employer retaliation if requests to grant access are denied.<br \/>\nIn an age where more and more people are choosing to share personal information with a selected group of viewers online, such legislation at the federal and state level is an <a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/05\/09\/we-really-do-need-a-federal-ban-on-employers-logging-into-applicants-facebook-accounts\/\">important<\/a> step at reestablishing boundaries between a person\u2019s private and work life.\u00a0 However, the legislation is not without its flaws and should be recognized for what it is: a good step.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tuesday, September 4, 2012 by Laura Arredondo-Santisteban Earlier this year, Senators Richard Blumenthal (D-CT) and Chuck Schumer (D-NY) introduced into the House of Representatives and Senate a bill amending the Computer Fraud and Abuse Act called the Password Protection Act of 2012.\u00a0 The bill would make it a federal crime for employers to \u201cknowingly and <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/access-denied-proposed-federal-legislation-takes-aim-at-employers-requesting-employee-social-network-passwords\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/959"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=959"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/959\/revisions"}],"predecessor-version":[{"id":7705,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/959\/revisions\/7705"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}