0 évaluation0% ont trouvé ce document utile (0 vote)
57 vues6 pages
Only New South Wales and the Australian Capital Territory have specific legislation regulating email surveillance by employers. Access control technologies may only be bypassed by agreement with the controller of a computer system. The ability to undertake surveillance of employee emails is often a significant benefit to employers.
Only New South Wales and the Australian Capital Territory have specific legislation regulating email surveillance by employers. Access control technologies may only be bypassed by agreement with the controller of a computer system. The ability to undertake surveillance of employee emails is often a significant benefit to employers.
Only New South Wales and the Australian Capital Territory have specific legislation regulating email surveillance by employers. Access control technologies may only be bypassed by agreement with the controller of a computer system. The ability to undertake surveillance of employee emails is often a significant benefit to employers.
Dianne Banks, Peter Leonard, James Pomeroy, Grace Keesing and Kim McGuren GILBERT + TOBIN LAWYERS The key rules relating to surveillance of employee emails by private sector employers in Australia are as follows: Only New South Wales and the Australian Capital Territory have specic legislation regulating email surveillance by employers. These laws apply to the surveillance of employees of a company and its related corporations, as well as volunteers and some contract workers. In these jurisdictions, employers must conduct email surveillance in accordance with a company policy and must comply with notication require- ments. Various Commonwealth, state and territory laws regulate unauthorised access to computer systems or data on computer systems that is protected by password or some other form of access control. Although the laws take a variety of forms and need to be considered on an individual basis, in general access control technologies may only be bypassed by agreement with the controller of a computer system, and there needs to be clarity as to who that controller is. In practice, this makes it prudent, if not mandatory, for employers to pub- lish and implement a surveillance policy that makes it clear that a condition of provision of internet access to employees is the right of the employer to conduct reasonable email surveil- lance. General privacy and communications interception laws may also be relevant to employers when conducting email surveillance. However, the lim- ited application of these laws to email surveil- lances will present few obstacles for employers when conducting reasonable email surveillance. The ability to undertake surveillance of employee emails is often a signicant benet to employers. In addition to maintaining records of business transactions and client or customer relationships, surveillance of employee emails can assist an employer in monitoring the performance of its workforce; detecting and inves- tigating any employee misconduct (such as fraud, sexual harassment, theft of condential information, and diver- sion of business opportunities); and ensuring the safety of its employees. However, in order to avoid liability or criminal sanctions, employers engaging in email surveil- lance need to know the legal restrictions and prohibi- tions that apply to surveillance. Australia does not have uniform laws governing surveillance in the workplace by private sector employ- ers. As a consequence, the rules that apply to email surveillance in the workplace depend upon the jurisdic- tion in which the employer is operating. There is currently no political momentum that is likely to see the advent of a national approach in the near future. New South Wales and the Australian Capital Territory are the only jurisdictions that specically regulate the monitoring of workplace email and computer usage. Workplace surveillance in other jurisdictions is regu- lated by general surveillance statutes that prohibit the use of listening, optical or tracking devices except in specied circumstances, but do not expressly apply to email monitoring. The rules applicable in each jurisdic- tion are summarised below. New South Wales The Workplace Surveillance Act 2005 (NSW) (NSW Act) restricts the circumstances in which an employer may lawfully engage in surveillance of its employees. An employee includes a person employed by the employer and its related corporations. However, the employers obligations under the NSW Act also apply in respect of employees of an unrelated third party who perform work for the employer, such as the employees of a labour hire company and volunteers. The NSW Act applies when the employees under surveillance are at work, irrespective of whether they are at their employers premises or any other place (includ- ing if they are working from home). Email surveillance is not limited to surveillance during normal business hours. The legislation makes clear that an employee is at work whether or not the employee is actually performing work at the time. This means that an employer may (subject to compliance with the notice requirements) carry out surveillance of emails sent or internet law bulletin April/May 2013 8 received using the employers information technology resources and systems, including emails sent or received outside business hours or using a private email account such as hotmail. The NSW Act also contains provisions dealing with blocking delivery of emails sent to or by an employee, employee access to websites, and the use of surveillance records other than in accordance with the Act. It is arguable that an employers obligations apply regardless of whether the surveillance takes place in New South Wales, provided that the employees who are under surveillance are located within the jurisdiction. Overt surveillance Computer surveillance means: surveillance by means of software or other equipment that monitors or records the information input or output, or other use, of a computer (including, but not limited to, the sending and receipt of emails and the accessing of Internet websites). 1 With the exception of covert surveillance, computer surveillance by employers of employees in New South Wales is prohibited unless the employee has been given 14 days prior written notice by their employer (or a lesser period by agreement) and the surveillance is conducted in accordance with the employers policy for computer surveillance. The written notice to the employee must specify: 2 the kind of surveillance to be carried out, in this case computer surveillance; how the surveillance will be carried out; when the surveillance will start; whether the surveillance will be continuous or intermittent; and whether the surveillance will be for a specied limited period or ongoing. The employee must also be notied of the employers computer surveillance policy in such a way that it is reasonable to assume that the employee is aware of and understands the policy. Surveillance relevantly includes tracking surveil- lance, which is surveillance by means of an electronic device the primary purpose of which is to monitor or record geographical location or movement (such as a global positioning system tracking device). Covert surveillance Where an employer suspects that one or more of its employees are engaged in unlawful activity, it may apply to a magistrate for an authority allowing covert surveillance of its employees. Covert surveillance occurs where the employer does not comply with the notica- tion requirements set out above. The application must include, among other things: the grounds for the employees suspicion; the names of the employees who will be the subject of the surveillance; the kind of surveillance; and the dates on which the surveillance will be undertaken. The application will not be granted unless the mag- istrate is satised that there are reasonable grounds to justify the issue of the authority, having regard to the seriousness of the unlawful activity with which the application is concerned. Where an authority is granted, the surveillance must be conned to surveillance for the purpose of establishing whether or not the employees are involved in an unlawful activity, and cannot be used for monitoring an employees work performance. Pen- alties of up to $5500 apply where an employer conducts covert surveillance of an employee at work without rst obtaining a covert surveillance authority. Acorporations directors who knowingly authorise or permit a contra- vention may also be prosecuted. 3 Australian Capital Territory In the Australian Capital Territory, the Workplace Privacy Act 2011 (ACT) (ACT Act) regulates the collection and use of workplace surveillance informa- tion and the surveillance of workers. Workers includes employees, independent contractors, outworkers, per- sons doing work experience, and volunteers. A work- place is any place where work is, has been, or is to be carried out for someone conducting a business or under- taking. While using slightly different terminology, the ACT Act establishes a regulatory framework for employee email surveillance that is almost identical to that of the NSW Act. Surveillance is dened to include surveil- lance using a data surveillance device, being a device or program capable of being used to record or monitor the input of information into or the output of information from a computer. 4 Overt surveillance Like the NSW Act, the ACT Act prohibits surveil- lance of workers in the workplace except where the employer has given the worker written notice and, in the case of data surveillance, the surveillance is in accor- dance with an applicable employer policy. However, unlike the NSWAct, the ACTAct prescribes the form of the policy, which must state: how the employers computer resources may, and must not, be used; what information about the use of the employers computer resources is logged and who may access the logged information; and internet law bulletin April/May 2013 9 how the employer may monitor and audit a work- ers compliance with the policy. An employer who conducts surveillance of a work- ers emails otherwise than in accordance with these requirements commits an offence under the ACT Act, and will be liable in respect of each infringement for a ne of up to $2200 for an individual or $11,000 for a corporation. Covert surveillance The ACT Act also provides for the authorisation and regulation of covert surveillance of workers in similar terms to the NSW Act. Other Australian jurisdictions None of the other states or the Northern Territory has followed the New South Wales lead of specically regulating surveillance of employee emails. Victoria is the only other jurisdiction that has legislation dealing specically with workplace surveillance (but not email surveillance) following amendments to the Surveillance Devices Act 1999 (Vic) (Victorian Act) by the Surveil- lance Devices (Workplace Privacy) Act 2006 (Vic). A 2004 Bill before the South Australian parliament 5 to regulate the monitoring, interception, storage or retrieval of email messages was never enacted. The Victorian Act prohibits employers 6 from conduct- ing optical surveillance or using a listening device to observe, listen to, record or monitor the activities or conversations of a worker in a toilet, washroom, change room or lactation room at a workplace. The denition of an optical surveillance device is anything capable of being used to observe an activity, other than spectacles or the like. 7 Considering the specic workplace loca- tions where optical surveillance is prohibited (ie, loca- tions where personal activities are conducted and privacy expected), it is highly unlikely, if not impossible, for the regulation of optical surveillance under the Victorian Act to have any application to email surveillance. Accord- ingly, Victorian employers have generally no obligations under the Victorian Act when conducting computer surveillance of their employees. Western Australia, 8 South Australia, 9 Tasmania 10 and the Northern Territory 11 all have traditional listening devices legislation, which, at a minimum, regulates the monitoring or recording of conversations. Western Aus- tralia, South Australia and the Northern Territory also regulate visual and tracking (or location) surveillance. The Northern Territory legislation regulates data surveil- lance (which encompasses surveillance of emails) by law enforcement agencies, but does not apply to data surveillance by private sector employers. Communication interception laws An employer will commit an offence under the Telecommunications (Interception and Access) Act 1979 (Cth) if it intercepts, or permits another person to intercept (among other matters), a communication pass- ing over a telecommunications system, 12 without the knowledge of the person making the communication. 13 The question of when a communication is taken to be passing over is the critical one for any liability under the legislation. Section 5F denes a communication as passing over a system when it is: sent or transmitted by the person sending the communication; and taken to continue to pass over the system until it becomes accessible to the intended recipient of the communication. This clearly prohibits an employer from monitoring an email while it is in transit from the sender to the recipient. However, the temporal nature of when inter- ception may not occur provides limited protection for employees where email surveillance will not breach the legislation once an email has been received. An employer will prudently notify its employees of any email surveillance to avoid any risk that its surveil- lance may breach this legislation, even in those Austra- lian jurisdictions where a company policy is not required under specic workplace surveillance legislation. Various Commonwealth, state and territory laws regulate unauthorised access to computer systems or data on computer systems that is protected by password or some other form of access control. Particular caution needs to be exercised in relation to app, browser or cookie-based data analytics technologies, which might be said to permit or facilitate unauthorised access to any device, or data on any device, that is protected by password or some other form of access control technolo- gies. This is particularly the case where the device is an employee-owned device, such as a bring-your-own smartphone or a home computer. Although the laws take a variety of forms and need to be considered on an individual basis, in general access control technologies may only be bypassed by agreement with the controller of a computer system. Accordingly, there needs to be clarity as to who that controller is and agreement by that controller to the relevant access. Privacy legislation The Privacy Act 1988 (Cth) (Privacy Act) provides limited protection for employees from email surveil- lance by their employers. The Act regulates the collec- tion, storage and use of personal information of an internet law bulletin April/May 2013 10 individual, 14 unless an organisation is exempt from its requirements. One exemption is the employee records exemption. The employee records exemption applies to an act or practice of an organisation that is directly related to: a current or former employment relationship between the organisation and its employee; and an employee record held by the organisation and relating to the employee. An email that contains an employees personal infor- mation and relates to the employees employment meets the denition of an employee record. Employee record is broadly dened and arguably covers many matters of interest to an employer when conducting email surveil- lance, so as to exclude such emails that relate to the employees employment from any protection under the legislation. The examples of an employee record in the Privacy Act include records as to terms and conditions of employment, disciplining of the employee, leave entitlements, and union membership. However, there is always a risk that surveillance may unintentionally capture emails that do not meet the denition of an employee record. For this reason, it is prudent for an employer to ensure that there is at least inferred consent of the employee to the surveillance through prominent publication of the surveillance policy. The substantive amendments to the Privacy Act as made by the Privacy Amendment (Enhancing Privacy Protection) Act 2012 (Cth) commence in March 2014. The amendments were made in response to some of the recommendations of the Australian Law Reform Com- mission (ALRC) in 2008. 15 The employee records exemption has so far survived, despite the ALRCs recommendation that it be abolished. Lessons for employers National private sector employers currently face a disjointed approach to regulation of email surveillance in Australia. The comprehensive approach to regulation in New South Wales and the Australian Capital Territory has not been followed in other jurisdictions. Employers operating in various jurisdictions are able to take a different approach to informing employees about email surveillance. The prudent employer will adopt a consis- tent company policy that provides for notication and meets any statutory requirements. Dianne Banks Partner Gilbert + Tobin Lawyers dbanks@gtlaw.com.au Peter Leonard Partner Gilbert + Tobin Lawyers pleonard@gtlaw.com.au James Pomeroy Lawyer Gilbert + Tobin Lawyers jpomeroy@gtlaw.com.au Grace Keesing Lawyer Gilbert + Tobin Lawyers gkeesing@gtlaw.com.au Kim McGuren Lawyer Gilbert + Tobin Lawyers kmcguren@gtlaw.com.au Footnotes 1. Workplace Surveillance Act 2005 (NSW), s 3. 2. Above, n 1, s 10. See also s 10 for when the notication in relation to workplace surveillance must be given to employees. 3. Above, n 1, s 43. 4. Above, n 1, s 8. 5. Workplace Privacy Bill 2004 (SA), by the Hon Ian Gilllan MLC. 6. Section 9A of the Victorian Act denes an employer to include a person who engages independent contractors, commission agents and volunteers. 7. Victorian Act, s 3. 8. Surveillance Devices Act 1998 (WA). 9. Listening and Surveillance Devices Act 1972 (SA). 10. Listening Devices Act 1991 (Tas). 11. Surveillance Devices Act 2000 (NT). internet law bulletin April/May 2013 11 12. See s 7(1) of the Telecommunications (Interception and Access) Act 1979 (Cth) regarding what is the interception of a communication. 13. See s 6(1) of the Telecommunications (Interception and Access) Act 1979 (Cth). 14. Section 6 of the Privacy Act 1988 (Cth) denes personal information as information or an opinion (including informa- tion or an opinion forming part of a database), whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion. 15. Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, ALRC Report 108, 2008, available at www.alrc.gov.au. internet law bulletin April/May 2013 12 internet law bulletin April/May 2013 13