112
© 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

  • View
    223

  • Download
    0

Embed Size (px)

Citation preview

Page 1: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Privacy in the Workplace: Electronic

Surveillance Under State and Federal Law

Charles Lee Mudd Jr. – Mudd Law Offices

Page 2: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

OverviewTrends in Workplace Surveillance

Highlights of Applicable Law

More Common Surveillance Issues

Arbitration - Lessons Learned

Policy Guidelines

Novel Circumstances

Page 3: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Trends in Workplace Surveillance

1997

13.7% of employers monitored computer files

14.9% of employers monitored e-mail

Data obtained from the American Management Association

Page 4: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Trends in Workplace Surveillance (cont’d)

2007

43% of employers monitored computer files

43% of employers monitored e-mail

Data obtained from the American Management Association

Page 5: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Trends in Workplace Surveillance (cont’d)

ADDITIONAL STATISTICS

66% of employers monitor Internet connections

12% of employers monitor blogs for comments on company

10% monitor social networking sites

8% use GPS to track company vehicles

American Management Association DATA

Page 6: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Trends in Workplace Surveillance (cont’d)

The Privacy Foundation reports that

of those employees "who regularly use e-mail or Internet access at work,"

fourteen million "are under 'continuous' surveillance ... for their Internet access or e-mail usage."

Page 7: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Trends in Workplace Surveillance (cont’d)

For a myriad of reasons…

the monitoring of employee activity and conduct by employers through

electronic surveillance in the workplace

…will continue to increase.

Page 8: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Protecting Employers … and Employees

With increasing prevalence of workplace surveillance

Employers Must Be Advised Properly…

… in Advance of Implementation

Page 9: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Highlights of Applicable Law

United States Supreme Court

Federal Statutes

State Statutes

Common Law

Page 10: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

O'Connor v. Ortega

480 U.S. 709, 107 S. Ct. 1492 (1987)

While investigating alleged impropriety, public employers broke into employee’s office, desk, and file cabinet

Court determined neither party entitled to summary judgment and affirmed in part and reversed in part

….HOWEVER….

United States Supreme Court

Page 11: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Supreme Court (cont’d)

Ortega helped establish:

Analytical Process in Workplace Privacy:

Expectation of privacy?

Reasonableness of search at inception?

Reasonableness of search in scope?

Page 12: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Supreme Court (cont’d)

For legitimate work-related, non-investigatory intrusions as well as investigations of work-related misconduct, a standard of reasonableness is used.

Page 13: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Supreme Court (cont’d)

City of Ontario v. Quon

177 L. Ed. 2d 216 (U.S. 2010)

The review of transcripts of employee text messages held to be reasonable given that legitimate non-investigatory reasons prompted the review.

(to determine whether the character limit on the city's contract was sufficient to meet the city's needs)

Page 14: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Supreme Court (cont’d)

Principles arising from and reaffirmed in Quon:

1. special needs of workplace is an exception to Fourth Amendment warrant requirement

2. “the extent of an expectation [of privacy] is relevant to assessing whether the search was too intrusive”

Page 15: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Supreme Court (cont’d)

Note:

Utah equivalent of Fourth Amendment

Utah Constitution, Art I., § 14

Page 16: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Federal Statutes

Primarily….

Electronic Communications Privacy Act

Stored Communications Act

Computer Fraud and Abuse Act

Page 17: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

§ 2511, criminalizes

Intentional interception of oral, wire or electronic communication

Discloses

Uses

Page 18: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Question: What is interception (……still debated…..)

Question: What is electronic communication?

United States v. Councilman, 418 F.3d 67 (1st Cir. Mass. 2005)

United States v. Szymuszkiewicz, 2009 U.S. Dist. LEXIS 60755 (E.D. Wis. June 30, 2009)

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

Page 19: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Civil Remedies

generally any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

Page 20: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Relief

Preliminary, declaratory and other equitable

reasonable attorney’s fee and costs

Damages, either (a) actual plus profits OR (b) statutory ($100/day or $10,000)

18 U.S.C. § 2520

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

Page 21: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Employers cannot:

use any devices to intercept wire, oral, or electronic communication.

Use or disclose any information obtained through these methods

Disclose or obtain unauthorized access to stored communications.

Three Exceptions…..

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

Page 22: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Employers cannot:

use any devices to intercept wire, oral, or electronic communication.

Use or disclose any information obtained through these methods

Disclose or obtain unauthorized access to stored communications.

Three Exceptions…..

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

Page 23: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

THREE EXCEPTIONS

If one party has given prior consent.

Business extension exception – Certain interceptions are OK in the ordinary course of business.

Provider exceptions – Certain interceptions OK on internal communications systems.

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

Page 24: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Consent: requires only that one party to the communication consent to its interception and access (but be wary of stricter statutes)

Providers: employers who own and provide their own e-mail or instant message systems are exempt

Not applicable if the interception occurs in the “ordinary course of business.”

Electronic Communications and Privacy Act18 U.S.C. § 2510, et seq.

Page 25: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

whoever--

(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or

(2) intentionally exceeds an authorization to access that facility;

AND…..

Stored Communications Act (18 U.S.C. § 2701)

Page 26: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished . . .

Stored Communications Act (18 U.S.C. § 2701)

Page 27: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

(REMEMBER - CRIMINAL STATUTES)

Civil Remedy

Very similar to ECPA except minimum statutory of $1,000

Punitive if willful determination

18 U.S.C. § 2707

Stored Communications Act (18 U.S.C. § 2701)

Page 28: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

18 U.S.C. § 2702

Providers generally cannot disclose contents of communications except in certain instances

Stored Communications Act (18 U.S.C. § 2701)

Page 29: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

General Thoughts

Harsher penalties when done for malicious purposes or commercial advantage

Certain permission creates exceptions

Stored Communications Act (18 U.S.C. § 2701)

Page 30: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

General Thoughts

Provides exception for “the person or entity providing a wire or electronic communications service.”

Thus, courts have been favorable to employers when e-mails occur on employer-created e-mail servers.

BUT BE WARY…..MISPERCEPTION

Stored Communications Act (18 U.S.C. § 2701)

Page 31: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

City of Ontario, California v. Quon, et al.

SCA Question:

In storing texts, was Arch Wireless acting as a “remote computing service” or an “electronic communication service”?

If remote computing service, it could disclose, as subscriber was the City employer.

Stored Communications Act (18 U.S.C. § 2701)

Page 32: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

City of Ontario, California v. Quon, et al.

SCA Question:

If electronic communication service, it could not disclose because the City was not an “originator or an addressee or intended recipient of such communication.”

This is what Ninth Circuit concluded.

Stored Communications Act (18 U.S.C. § 2701)

Page 33: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Impact of Quon on Use of Employer Devices

by Employees will continue….

Stored Communications Act (18 U.S.C. § 2701)

Page 34: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

Prevents Unauthorized Access or Exceeding Authorized Access

to Computers in

Variety Contexts

- National Security- Financial Information- Information from Government- Protected Computer

Page 35: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

Protected Computer

Financial Institution or related

Interstate or Foreign Commerce

18 U.S.C. § 1030(e)(2)

Page 36: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

Protected Computer

…… and Causes Damage

Page 37: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

Civil Remedy provision

18 U.S.C. § 1030(g)

Anyone harmed BUT….

Page 38: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

One of five types of damage

Most Common

(I) loss to 1 or more persons during any 1-year period

(and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers)

aggregating at least $5,000 in value;

Page 39: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

Also:

affecting medical examination, diagnosis, treatment, or care physical injury to any person;

a threat to public health or safety;

damage affecting a computer used by or for an entity of US

Page 40: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

Must be

Unauthorized Access

Exceeding Authorized Access

Key Question….

Page 41: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Computer Fraud and Abuse Act (CFAA)(18 U.S.C. § 1030)

Snap-on Business Solutions Inc. v. O'Neil & Assocs., Inc. (N.D. Ohio April 16, 2010)(Examined Agreements, question of fact denied MSJ)

LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009)(access not automatically unauthorized if disloyal)

International Airport Centers, LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006)(employee who violates duty of loyalty, no authorization)

US v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009)(violation of TOS not enough)

Page 42: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

State Statutes

Utah

Offenses Against Privacy76-9-403 Privacy Abuse76-9-403 Communications Abuse

Interception of Communications Act77-23a-1, et seq.

Access to Electronic Communications77-23b-1, et seq.

Page 43: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-402. Privacy Violation

(1)A person is guilty of privacy violation if, except as authorized by law, he:

(a)Trespasses on property with intent to subject anyone to eavesdropping or other surveillance in a private place; or

Page 44: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-402. Privacy Violation

(1)A person is guilty of privacy violation if, except as authorized by law, he:

(b) Installs in any private place, without the consent of the person or persons entitled to privacy there, any device for observing, photographing, recording, amplifying, or broadcasting sounds or events in the place or uses any such unauthorized installation; or

Page 45: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-402. Privacy Violation

(1)A person is guilty of privacy violation if, except as authorized by law, he:

(c) Installs or uses outside of a private place any device for hearing, recording, amplifying, or broadcasting sounds originating in the place which would not ordinarily be audible or comprehensible outside, without the consent of the person or persons entitled to privacy there.

Page 46: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-403. Communication abuse

(1) A person commits communication abuse if, except as authorized by law, he:

(a) Intercepts, without the consent of the sender or receiver, a message by telephone, telegraph, letter, or other means of communicating privately;

[Illinois legislation]

Page 47: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-403. Communication abuse

[the foregoing paragraph] does not extend to:

(i) Overhearing of messages through a regularly installed instrument on a telephone party line or on an extension; or

(ii) Interception by the telephone company or subscriber incident to enforcement of regulations limiting use of the facilities or to other normal operation and use; or

Page 48: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-403. Communication abuse

(b) Divulges without consent of the sender or receiver the existence or contents of any such message if the actor knows that the message was illegally intercepted or if he learned of the message in the course of employment with an agency engaged in transmitting it.

(2)Communication abuse is a class B misdemeanor.

Page 49: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-401. Definitions

(1) "Private place" means a place where one may reasonably expect to be safe from casual or hostile intrusion or surveillance.

(2) "Eavesdrop" means to overhear, record, amplify, or transmit any part of a wire or oral communication of others without the consent of at least one party thereto by means of any electronic, mechanical, or other device.

(3) "Public" includes any professional or social group of which the victim of a defamation is a member.

Page 50: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Utah 76-9-401. Definitions

(1) "Private place" means a place where one may reasonably expect to be safe from casual or hostile intrusion or surveillance.

(2) "Eavesdrop" means to overhear, record, amplify, or transmit any part of a wire or oral communication of others without the consent of at least one party thereto by means of any electronic, mechanical, or other device.

(3) "Public" includes any professional or social group of which the victim of a defamation is a member.

Page 51: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Interception of Communications Act77-23a-1, et seq.

Akin to the ECPA

Page 52: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Access to Electronic Communications77-23b-1, et seq.

Akin to the SCA

Page 53: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Common Law

Privacy Torts

Utah

Intrusion Upon SeclusionPublic Disclosure of Embarrassing

Private FactsMisappropriation of Name or LikenessFalse Light in Public Eye

Page 54: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Common Law

Utah

Intrusion Upon Seclusion

(1) 'an intentional substantial intrusion upon the solitude or seclusion of the complaining party,’

(2) the intrusion 'would be highly offensive to the reasonable person.'"

Page 55: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Common Law

Utah - Intrusion Upon Seclusion

Physical intrusion not required

“As the Utah courts explained, although a physical intrusion may not always be necessary, ‘there must be something in the nature of prying or intrusion.’”

Barker v. Manti Tel. Co., 2009 U.S. Dist. LEXIS 819 (D. Utah Jan. 6, 2009)

Page 56: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Common Law

Utah - Intrusion Upon Seclusion

Publicity Not Required

“Thus, it is that affirmative physical intrusion, eavesdropping, investigation, examination or prying that constitutes the tort, not any subsequent sharing of the information learned in an intrusion.”

Barker v. Manti Tel. Co., 2009 U.S. Dist. LEXIS 819 (D. Utah Jan. 6, 2009)

Page 57: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Common Law

Intrusion Upon Seclusion

requires that the complainant have a reasonable expectation of privacy

and that any violation of that expectation be highly offensive.

Typically, courts find that employees meet neither requirement.

Page 58: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Common Law

Intrusion Upon Seclusion - General Observations

Any employer policy that notifies an employee that there is no expectation of privacy is likely to be sufficient.

Judges rarely find that systematic measures taken by a business to protect its interests to be offensive.

Courts rarely find that the degree of intrusion outweighs the interest of an employer.

Page 59: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

More Common Surveillance Issues

Page 60: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - ECPA

Emails considered “communications” by the ECPA

Steve Jackson Games, Inc. v. United States Secret Service816 F. Supp. 432 (W.D.Tex. 1993), aff'd, 36 F.3d 457 (5th Cir. 1994)

Reading and deleting messages stored on employee’s computer was not an interception under the Wiretap Act.

Generally, for an employee to sue under the ECPA, the email must be intercepted while being transferred

Page 61: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - SCA

Provides exception for “the person or entity providing a wire or electronic communications service.”

A court has held that employers whose computer terminals and software were integral in the communications systems fell under this exception

Many other cases have also allowed access under this theory

Page 62: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Common Law

One MA case allowed invasion of privacy claim to go forward where

Employees could choose own passwords, no policy against personal emails, and the supervisor spent 8 hours reading through emails

Most challenges have not been successful

Page 63: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Cases

Thygeson v. Bancorp

The court denied claim holding that

"when, as here, an employer accesses its own computer network and has an explicit policy banning personal use of office computers and permitting monitoring, an employee has no reasonable expectation of privacy.”

2004 U.S. Dist. LEXIS 18863, 2004 WL 2066746 at *21 (D. Or. Sept. 15, 2004)

Page 64: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Cases

Recently cited in Idaho case

Alamar Ranch, LLC v. County of Boise, 2009 U.S. Dist. LEXIS 101866 (D. Idaho Nov. 2, 2009)

In discussion of attorney-client privilege, also citing

Kaufman v. SunGard Invest. Sys., 2006 U.S. Dist. LEXIS 28149 (D.N.J. May 9, 2006)

Where attorney-client privilege lost . . .

Page 65: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Cases

Where attorney-client privilege lost . . .

because

the company policy clearly informed employees that emails would be "subject to monitoring, search or interception at any time . . . ."

Page 66: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Cases

Smyth v. Pillsbury Co., 914 F. Supp. 97, 101 (E.D. Pa. 1996)

The Court concluded that an employee did not have a reasonable expectation of privacy in a company's e-mail system despite company assurances that e-mails would "remain confidential and privileged.”

Page 67: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Cases

Smyth v. Pillsbury Co., 914 F. Supp. 97, 101 (E.D. Pa. 1996)

“Once plaintiff communicated the alleged unprofessional comments to a second person (his supervisor) over an e-mail system which was apparently utilized by the entire company, any reasonable expectation of privacy was lost.”

Page 68: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Email Cases

Cole v. Zavaras, 349 Fed. Appx. 328 (10th Cir. Colo. 2009)

(approving conclusion by district court that no legal authority exists for the proposition that there is a reasonable expectation of privacy in e-mails sent to a stranger over the Internet, or that the person to whom the e-mails are directed may not disclose them)

Page 69: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Email Cases

United States v. Perrine518 F.3d 1196 (10th Cir. Kan. 2008)

citing a number of cases regarding privacy of subscriber information and…

United States v. Lifshitz, 369 F.3d 173, 190 (2d Cir. 2004)

("Individuals generally possess a reasonable expectation of privacy in their home computers. . . . They may not, however, enjoy such an expectation of privacy in transmissions over the Internet or e-mail that have already arrived at the recipient.").

Page 70: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Email Monitoring - Other Considerations

Can be used as evidence in cases

Inappropriate emails could be harassment in and of themselves.

National Labor Review Board

If employees are unionized, the bargaining agreement may restrict an employer’s ability to monitor email.

Page 71: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Instant Messaging

Same basic legal rules apply as apply to e-mails.

Especially if the IM service is provided by the employer.

Difference if using AOL, Google, or MSN programs:

Higher expectation of privacy, but this can be reduced through policies

Page 72: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Instant Messaging

Best option is to address IMs within policy that discusses email and other communications

How/when/why IM-ing is allowed

Clearly notify employees if there is a policy of storing or reviewing instant messages.

Page 73: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Monitoring Web Usage

Not a “communication” under ECPA, making it easy to regulate.

If an employee wants to challenge monitoring of Internet usage, it must be done under common law

Likely “intrusion upon seclusion” invasion of privacy.

Not much case law on this. Typically hard to claim, especially if logged on to an employer’s network or if an employer’s written policy is in use.

Page 74: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Monitoring Web Usage

Still grounds that have not fully been covered

Logging in from a remote location (home computer, for example)

One search was ok in CA appeals because the computer was issued by work and employee signed an electronic equipment policy establishing no expectation of privacy.

Page 75: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Monitoring Web Usage

Still grounds that have not fully been covered

Obligation to third parties to monitor and stop inappropriate online action that could harm third parties?

Page 76: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Blogging

Statutory concerns

Blog-related discipline may not be used to retaliate against the employee’s statutory rights.

If an employer's behavior has a disparate impact upon a protected class of employees, or employees are treated differently, i.e. subjected to disparate treatment, Title VII of the Civil Rights Act is applicable

Page 77: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Blogging

Statutory concerns

Whistle blowing or discussing terms of employment are protected.

Blogs advocating employee activity to improve terms and conditions of employment might also be protected under the National Labor Relations Act.

Page 78: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Blogging

Common solution: Have an employee blogging policy

May not be able to limit off-duty blogging

Limit blogging on company equipment

If employees note themselves as employees on the blog, require a disclaimer

Prohibit mentioning clients, customers, etc without their consent

Notify of any practice of monitoring blogs.

Page 79: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Blogging

It is difficult to prevail under a tort theory of privacy since blogs are posted online for anyone to view.

Thus absent any federal or state statutory protections, employers can terminate, at will, employees whose blogs they dislike.

Page 80: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Blogging

Termination Examples

A former Delta Airlines flight attendant says she was terminated for her blog, Diary of A Flight Attendant. Posing in her Delta uniform in an empty plane, Ellen Simonetti says she was terminated for placing "inappropriate" pictures on the Web.

Page 81: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Blogging

Termination Examples

Michael Hanscom, a temporary Microsoft employee, was fired in 2003 by Microsoft for photos posted on his blog, eclecticism. At the site, Hanscom took a picture of several Apple G5 notebooks being unloaded on a loading dock

Page 82: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Blogging

Termination Examples

A high profile Washington, D.C. blogging termination involved Jessica Cutler, then a staff assistant to Senator Mike DeWine. Cutler was terminated after blogging about her sexual exploits with various Washington politicians. Jessica was terminated for "misusing an office computer.

Page 83: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Page 84: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration Development

Union guidelines brought arbitration into the field of employee surveillance.

Present day labor arbitrators have confronted issues with employee surveillance and technological developments.

This method is being relied on more heavily as the disputes become more frequent.

Page 85: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Suggested Guidelines

Right to affirmatively refuse monitoring;

Notice of monitoring;

Notice of the particulars of the monitoring;

Notice of infractions related to the use of new technology;

Page 86: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Suggested Guidelines

Notice of resulting discipline for those infractions;

Consistent enforcement of policies relating to technology;

Confidential review of information discovered through monitoring;

Page 87: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Suggested Guidelines

Limited collection of information through technological monitoring;

Reasonable suspicion of an infraction before monitoring;

Page 88: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Suggested Guidelines

Assessment of the accuracy and reliability of the information produced by the monitoring;

Compensation for a violation of privacy; and

Restrictions on discipline imposed based on information gathered as a result of monitoring.

Page 89: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Monitoring Personal Use of Computers

Forbidding personal use is out of sync with modern workplace reality

Page 90: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Monitoring Personal Use of Computers

Right to Privacy When Using Computer for Personal Reasons

Some arbitrators - employees have a right to privacy in their computer usage.

Others - e-mails are not private unless employer policy explicitly says so.

Many employees believe their communications will be private and if viewed, they would not be disciplined for their contents.

Page 91: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Monitoring Personal Use of Company Computers

Nonetheless…..Some Uses Can Be Prohibited

An employer has a legitimate business interest in prohibiting certain computer uses that are likely to negatively impact the business or workplace.

Page 92: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Monitoring Personal Use of Company Computers

Nonetheless…..Some Uses Can Be Permitted

Illegal conduct….

downloading images of child pornography

Page 93: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Monitoring Personal Use of Company Computers

Nonetheless…..Some Uses Can Be Permitted

Illegal conduct….

defamatory communication

Page 94: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Monitoring Personal Use of Company Computers

Nonetheless…..Some Uses Can Be Permitted

Illegal conduct….

offensive images of a racial or sexual nature, or that result in racial or sexual harassment

Page 95: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Notice of Use

Provides an important safeguard for employees' right to privacy

Does Not Interfere With Ability to Monitor

Page 96: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Surreptitious Surveillance, when is it appropriate?

Documentary evidence obtained through a nonconsensual search is appropriate "so long as the methods employed are not excessively shocking to the conscience of a reasonable person....”

Another case suggests that surreptitious monitoring is appropriate when there is a known violation but no knowledge of who has engaged in the violation.

Page 97: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Surreptitious Surveillance, when is it appropriate?

When there is a reasonable suspicion that a violation of company policy has taken place.

Page 98: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Arbitration - Lessons Learned

Surreptitious Surveillance, when is it appropriate?

Employers should give notice:

Type of conduct that will constitute an infraction and the level of discipline for each infraction.

Monitoring will take place when the employer has a reasonable suspicion of an infraction.

Monitoring system that will be used.

Page 99: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Policy Guidelines

We have discussed various items for a policy….

….presumes the need for a policy.

Page 100: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues

Page 101: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Text Messages/Smart Phones

City of Ontario v. Quon United States Supreme Court (2010)

Page 102: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Video Surveillance

Hernandez v. Hillsides, Inc., Supreme Court of California (2009)

Secret camera placed in an office shared by 2 female employees without notice to them. Intended to find identity of person using their office after closing to view pornographic materials.

The camera was not operated during business hours and plaintiffs' activities were not viewed or recorded

Page 103: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Video Surveillance

Hernandez v. Hillsides, Inc., Supreme Court of California (2009)

Reasoning

Expectation of privacy?

Yes. Less because the office is shared.

Reasonableness in inception and in scope?

Actual surveillance was drastically limited in nature and scope, exempting plaintiffs from its reach, and defendants were motivated by strong countervailing concerns.

Page 104: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Phone Surveillance

Narducci v. Moore (7th Cir. 2009)

Defendants worried about threats from residents to finance officials (calls usually due to residents not paying utility bills) and about employees making personal calls on village time and using village phones.

No calls were ever actually reviewed

Page 105: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Phone Surveillance (cont’d)

Narducci v. Moore (7th Cir. 2009)

Rule for justifiable at inception:

When there are reasonable grounds for suspecting that the search will turn up evidence that the employee is guilty of work-related misconduct, or that the search is necessary for a non-investigatory work-related purpose.

Rule for justifiable in scope:

So long as "the measures taken by the employer are reasonably related to the search's objective and they are not overly intrusive in light of the nature of the alleged misconduct."

Page 106: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Drug Free Workplace Act

41 USC § 701

Only applied to employers who meet qualifications

Must provide notice that drugs are not allowed. Also must note counseling, rehab, etc. for recovery options.

Page 107: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Title VI of Civil Rights Act

No-dating policies have been challenged as sex discrimination.

Dress codes may result in religious discrimination.

Page 108: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Smoker’s Rights

Most states have laws that prohibit employers from making employment decisions based on lawful, out of work activities (marital status, lifestyle, appearance)

Approximately thirty states protect against discipline for smoking off-duty and away from the employer's premises

Page 109: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Pen Registers/Trap & Trace

18 USCS § 3121

Need a court issued warrant.

Exceptions:

relating to the operation, maintenance, and testing of a wire or electronic communication service or to the protection of the rights or property of such provider, or to the protection of users of that service from abuse of service or unlawful use of service;

or

Page 110: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Pen Registers/Trap & Trace

18 USCS § 3121

Need a court issued warrant.

Exceptions:

to record the fact that a wire or electronic communication was initiated or completed in order to protect such provider, another provider furnishing service toward the completion of the wire communication, or a user of that service, from fraudulent, unlawful or abusive use of service;

or

Page 111: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Novel Issues - Pen Registers/Trap & Trace

18 USCS § 3121

Need a court issued warrant.

Exceptions:

where the consent of the user of that service has been obtained

Page 112: © 2010 Mudd Law Offices Privacy in the Workplace: Electronic Surveillance Under State and Federal Law Charles Lee Mudd Jr. – Mudd Law Offices

© 2010 Mudd Law Offices

Charles Lee Mudd Jr.Mudd Law Offices

Park City Office

311 Main StreetSecond FloorP.O. Box 483Park City, Utah 84060435.640.1786 Telephone435.603.1035 [email protected]

om

Chicago Office

3114 West Irving Park Road

Suite 1WChicago, Illinois 60618773.588.5410 Telephone773.588.5440 [email protected]

om