Privacy Within the Virtual Workplace

24
Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a Virtual “Private Zone” and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow 1 Privacy within the Virtual Workplace: The Entitlement of Employees to a Virtual Private Zoneand the "Balloon" Theory Dr. Shlomit Yanisky-Ravid 1 Abstract: This paper addresses the question of whether employees should have a right to privacy within the virtual sphere of their workplaces, both at the workplace and while using employer-owned property, such as computers and networks. I conclude that there are strong justifications for a paradigm in which a sphere of privacy would be delineated within the virtual workplace, providing employees protection from employer intrusiveness. In other words, my main claim is that employees should have a “private zone” within the employer wired/digital/virtual premises, even when using corporate network tools or accounts (i.e. Internet accounts) and even during working hours. The reasonable expectation of privacy test implemented by the public sector, when applied within a modern virtual workplace realm, (almost) completely eliminates employees’ privacy rights. The same result of drained privacy rights has been diagnosed in the private sector by Professor Christine Jolls, who found that non-governmental workers overwhelmingly lose their rights when courts apply a test that examines explicit or implicit consent (all employees “agree” to waive the right to privacy). Therefore, moving toward employees’ “Consent” policy would not change the result. The outcome is that employees (almost) totally lost their privacy rights within the virtual workplaces. Furthermore, the article argues that U.S. legal realm, stemming from court decisions, which eventually distinguish between privacy within tangible premises of the workplace versus virtual spheres, should be reconsidered and refined. The traditional test as set forth by the Supreme Court in its 1987 O’Connor v. Ortega decision, recognizing that employees’ tangible workspaces (such as a desk or cubicle or office) in a public office may be deemed as private space, should be applied to today’s virtual workspaces, 1 Professor of Law. Yale Law School, Information Society Project (ISP), Fellow, 2011-2013. Fordham Law School, Visiting International Professor, 2012. Ono Academic, School of Law, Israel. The Founder and the Head of the Shalom Comparative Legal Research Center, OAC. Thanks to Prof. Jack Balkin, ISP and to Prof. Joel Reidenberg, Center on Law and Information Policy (CLIP), Fordham Law. Special thanks to Ms. Elizabeth Ledkovsky for outstanding research assistance.

description

-

Transcript of Privacy Within the Virtual Workplace

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    1

    Privacy within the Virtual Workplace: The Entitlement of

    Employees to a Virtual Private Zone and the "Balloon" Theory

    Dr. Shlomit Yanisky-Ravid1

    Abstract:

    This paper addresses the question of whether employees should have a

    right to privacy within the virtual sphere of their workplaces, both at the

    workplace and while using employer-owned property, such as computers and

    networks. I conclude that there are strong justifications for a paradigm in

    which a sphere of privacy would be delineated within the virtual workplace,

    providing employees protection from employer intrusiveness. In other words,

    my main claim is that employees should have a private zone within the employer wired/digital/virtual premises, even when using corporate network

    tools or accounts (i.e. Internet accounts) and even during working hours.

    The reasonable expectation of privacy test implemented by the public

    sector, when applied within a modern virtual workplace realm, (almost)

    completely eliminates employees privacy rights. The same result of drained privacy rights has been diagnosed in the private sector by Professor Christine

    Jolls, who found that non-governmental workers overwhelmingly lose their

    rights when courts apply a test that examines explicit or implicit consent (all

    employees agree to waive the right to privacy). Therefore, moving toward employees Consent policy would not change the result. The outcome is that employees (almost) totally lost their privacy rights within the virtual

    workplaces.

    Furthermore, the article argues that U.S. legal realm, stemming from

    court decisions, which eventually distinguish between privacy within tangible

    premises of the workplace versus virtual spheres, should be reconsidered and

    refined. The traditional test as set forth by the Supreme Court in its 1987

    OConnor v. Ortega decision, recognizing that employees tangible workspaces (such as a desk or cubicle or office) in a public office may be

    deemed as private space, should be applied to todays virtual workspaces,

    1 Professor of Law. Yale Law School, Information Society Project (ISP), Fellow, 2011-2013.

    Fordham Law School, Visiting International Professor, 2012. Ono Academic, School of Law,

    Israel. The Founder and the Head of the Shalom Comparative Legal Research Center, OAC.

    Thanks to Prof. Jack Balkin, ISP and to Prof. Joel Reidenberg, Center on Law and Information

    Policy (CLIP), Fordham Law. Special thanks to Ms. Elizabeth Ledkovsky for outstanding

    research assistance.

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    2

    extending the law so as to integrate it with the realities of the digital era. The

    employee expectation test as well as other contract and tort theories likewise

    should be either replaced or adjusted to this notion of virtual workplace

    privacy zones.

    Securing a private zone to U.S. employees, a concept adopted by several other legal regimes, is justified by a bundle of psychological theories

    that can be concisely described as the balloon theory, describing the importance of a private sphere that constantly and permanently surrounds the

    persona wherever one goes, including within the public domain and digital

    spheres. Studies have shown that providing private zones fosters a sense of responsibility and accountability and, consequently, improves employee

    productivity. This theory is consistent with court decisions out side the US

    such, which found venues to secure employees privacy (i.e. the Israeli Isakov case).

    Accordingly, I conclude that we should reconsider these tests in order

    to secure a threshold of Private Zone within the virtual workplace. A new and needed policy may implement other new tests or make use of existing

    tools, such as the Least Invasive Mean (the Proportionality Analysis).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    3

    Table of Contents

    I. INTRODUCTION ........................................................................................................... 3 II. THE VIRTUAL SPHERE INHABITED BY EMPLOYEES ..................................................... 6 III. THE BALLOON THEORY ............................................................................................ 9 IV. THE LEGAL U.S. NORM OF PRIVACY IN WORKPLACE VIRTUAL SPHERES ............... 14 V. A DIFFERENT ATTITUDE: SECURING VIRTIAL PRIVATE ZONE .............................. 16 VI. ALTERNATIVE LEGAL TOOL: THE LEAST INVASIVE MEAN ..................................... 19 VII. RECOMMENDATIONS ............................................................................................. 21

    A. Private Zones....................................................................................................... 22 B. The Least Invasive Mean .................................................................................... 22 C. Transparency ....................................................................................................... 22 D. Consent................................................................................................................ 23 E. Specific Purpose. ................................................................................................. 24

    VI. Conclusion ............................................................................................................. 24

    I. INTRODUCTION

    The virtual domains, such as the Internet, blur the boundaries between

    workplace property and private zones. Standard modes of communication

    have changed dramatically. Todays employees have few, if any, viable

    alternatives to communicating with the world without using the virtual space

    (such as e-mail, websites, social networking/Facebook, Skype, and so on and

    so forth). Many employees today carry the newest portable digital devices,

    like mobile phones, tablets, and portable computers, wherever they go,

    including to work. Denying or diminishing this virtual sphere can be equal to

    and as drastic as forbidding a person from speaking, as these mechanisms are

    the digital eras basic means of communication with others. Eventually,

    nowadays, other alternatives are not "usable" and therefore, cannot be

    considered as a "real" alternative (i.e. sending letter from work for private

    purposes instead of an e-mail or text message).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    4

    Furthermore, employees who spend a tremendous portion of their

    waking time at the workplace have no other practical option than to use their

    employers virtual spheres. Dedication to a job or mere employment does not

    justify loss of privacy.

    A different perspective on the issue of employee privacy emerges from

    multinational firms, and the new era of international commerce gives rise to

    new considerations. American corporations, while working in and with

    foreign firms located in different countries, might wrongfully assume that

    American policy prevails. The result might be a breach of the local policy

    regarding privacy in the workplace.

    In Israel, for example, a recent Supreme Labor Court decision held that

    there are four types of e-mail accounts within the workplace: Professional

    Mailbox supplied by the employer for professional purposes under a

    condition of informed written consent by employees that any private use is

    forbidden (type A); Mixed Mailbox combined or hybrid accounts (type B);

    Employer-Provided Personal Mailbox, provided by the employer for the

    employees personal purposes only (type C), and Employees Private

    Mailbox (i.e. employees Gmail account, which they use for private purposes)

    (type D). The court held that employers may not read employees private

    messages in any of these accounts, including type A, even when holding a

    contract signed by the employee allowing the employer to do so.2 Therefore,

    uniformity and harmonization of the norm, preferably by a new international

    2 Labour Appeal no. 90/08 Tali Isakov-Inbar v. The Commissioner for Women Labour (February 8

    th,

    2011) [hereinafter Inbar v Commissioner].

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    5

    instrument defining and allowing a private zone, might be a wise and

    coherent resolution to the policy variations that currently exist around the

    globe.

    This Article argues that under the new U.S. legal realm employees

    (almost) totally lost their privacy rights within the virtual workplaces. This

    Article not only argues the case for a more balanced approach to employee

    privacy, but it also suggests a new desirable model to be adopted by

    policymakers. Inter alia, this solution should be part of the current

    governmental discourse about privacy protection within the workplace. It

    concludes with several suggestions, including adding hard law attributes to the

    proposed instruments, toward effective implementation and genuine

    progression of attitudes toward workplace privacy in this global, digital age.

    The first part of the article describes the virtual sphere inhibited by

    employers. The following part discusses psychological perspectives of privacy

    within the workplace. The psychological discourse further refines the

    distinction between tangible and virtual workplaces. The theories can be

    concisely described as the balloon theory, describing the importance of a

    private sphere that constantly and permanently surrounds the persona

    wherever one goes, including within the public domain, the digital spheres and

    the employers kingdom". The next part describes briefly the American legal

    norm, whereas the following part introduces a different attitude from a

    different legal system (Israel). The last parts conclude with recommendation

    of alternative principles.

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    6

    We start from explanations and demonstrations of violations of

    employees privacy within the virtual spheres.

    II. THE VIRTUAL SPHERE INHABITED BY EMPLOYEES

    In the digital era, there is tremendous potential for employees use of

    virtual spheres to put individuals at risk of compromising their own privacy by

    exposing themselves to present of future employer. The most common

    violation of employee privacy is employer reading of employees private e-

    mails correspondence and employers tracking private information posted

    about the employees on web sites, even though the discussion of the privacy

    within the virtual spheres is broader and can embrace many more examples.

    For example, employers can intervene in employees private means of

    communication by reading private text messages in mobile phone and other

    devices, by tracking on-line activity, through surveillance of web postings (i.e.

    on Facebook), by tracking a persons location using GPS or voluntary social

    media check-ins, and so on and so forth.

    Snchez Abril, Levine and Del Riego described three ways in which

    employers are actively screening on-line activities of employees: (1) monitoring and

    surveillance of employee social media profiles, (2) evaluation of applicants social

    media profiles and online speech in the hiring process, and (3) limiting employees

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    7

    off-duty online activities.3 In the twenty-first century, both employees and employers

    use the Internet and, more specifically, social media as substantial tools relative to

    employment. Employees use this tool while seeking work, whereas the employers

    rely on social media while searching for candidates and gathering information about

    existing and potential employees. Businesses monitor sites like Facebook and Twitter

    in search of information that may provide insight about prospective hires, while

    individuals can learn more about what it is like to work at a particular organization.4

    In the famous case of City of Ontario v. Quon, the U.S. Supreme Court held that an

    employer did not violate the Fourth Amendment by reading private text messages,

    even if the employee had a reasonable expectation of privacy.5 Writing that the Court

    must proceed with care when considering the whole concept of privacy expectations

    in communications made on electronic equipment owned by ... a[n]... employer,

    Justice Kennedy revealed ambivalence toward the Courts present reasonable

    3 Patricia Snchez Abril, Avner Levin and Alissa Del Riego, Blurred Boundaries: Social Media

    Privacy and the Twenty-First-Century Employee, 49 AM. BUS. L.J. 63, 66-67 (2012), available at:

    http://onlinelibrary.wiley.com/store/10.1111/j.1744-

    1714.2011.01127.x/asset/ablj1127.pdf;jsessionid=51714F857C44696F55ABE310ED90FAFB.d03t02?

    v=1&t=hdxrdur0&s=ec0aff2696bd567a3122b8b3bd2163fe84e3257.

    4 Id. at 69. Jeffrey Rosen, The Right to Be Forgotten, 64 STAN. L. REV. ONLINE 88 (Feb. 13, 2012),

    available at http://www.stanfordlawreview.org/sites/default/files/online/topics/64-SLRO-88.pdf. See

    also Laura Lagone, The Right To Be Forgotten: A Comparative Analysis (December 7, 2012), available

    at SSRN: http://ssrn.com/abstract=2229361.

    5 City of Ontario v. Quon, 30 S. Ct. 2619 (2010) (An employers monitoring and reading of an

    employees personal text messages was justified by legitimate employer interests, even though the

    employee may have had a reasonable expectation of privacy).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    8

    expectations of privacy test, articulated in a 1987 decision.6 The narrow opinion was

    carefully worded, however, expressly describing the Courts wariness of making too

    early a pronouncement about the privacy levels that individuals may reasonably

    expect with regard to text messages or similar technologies, acknowledging that both

    science and society are evolving very rapidly in this realm.7

    Indeed, digital technology has revolutionized the vehicles of social interaction.

    Future generations of employees, such as students, are cognizant of their reputational

    vulnerability on digital media, yet are not willing to sacrifice Internet participation to

    segregate their multiple life performances. Lacking the technological or legal ability

    to shield certain aspects of their lives that might once have been exclusively private,

    Millennials rely on others, including employers, to refrain from judging them across

    contexts. In other words, despite granting employers access to information about their

    private lives by exposing themselves online, respondents expect that work life and

    private life should be generally segregatedand that actions in one domain should

    not affect the other.8 Furthermore, portable electronic devices are now pervasive and

    increasingly dominate everyones life. 9 Thus, some people who are aware of the

    6 Id. at 2628-9. See O'Connor v. Ortega, 480 U.S. 709, 107 S. Ct. 1492, 94 L. Ed. 2d 714 (1987).

    7 Id. at 2629.

    8 Abril et al, supra note 3, at 65-66 (empirical data reveals that new employees stated expectations of

    privacy appear to be somewhat paradoxical: employee respondents generally want privacy from

    unintended employer eyes, and yet they share a significant amount of personal information online, fully

    knowing it could become available to employers and others.)

    9 Michael Z. Green, Against Employer Dumpster-Diving for E-Mail 64 S.C. L. REV. 323 (2012).

    (argues that the rise to ubiquity of portable electronic devices (Blackberries, i-phones, i-pads,,

    Androids, etc.) that blur the workspace with private spaces and blend work-time and private-time, calls

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    9

    potential outcomes of a possible violation of their privacy pay a price, avoiding any

    kind of Internet expression, becoming virtual cripples, choosing to stay behind as

    current popular means of communication advance.

    The question of whether employers common practice of tracking

    employees private information with the virtual sphere is desirable can be

    discussed from several points of view. The following section will focus on the

    psychological need for privacy.

    III. THE BALLOON THEORY

    The abundant diversity of Internet/virtual tools provides more than just new

    means of expression. The pervasive use of the these virtual instruments, such as e-

    mail, Facebook, Twitter, what sup, Skype, and so on and so forth, combined with the

    growing popularity of these tools among future employees, reflect a new reality.

    Access to culture, education, knowledge and human relationships are conducted

    primarily by active and constant everyday use of these virtual instruments. The

    virtual tools play an essential role in the definition of the person identity, self,

    self-expression, and self-identification.10 This is the point where psychological

    discourse meets the legal rules.

    for a re-thinking of traditional distinctions and a new emphasis, not on employees reasonable

    expectations, but, rather, employers reasonableness in monitoring workers). See also United States v.

    Ziegler, 456 F.3d 1138, 1144 (9th

    Cir. 2006) (withdrawn on rehearing).

    10 Id, at 2630.

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    10

    Works about intrinsic motivation, from the psychological perspective, reveal

    that privacy is a notion perceived entirely in a persons consciousness, and not in the

    external world.11

    The virtual spheres influence this consciousness, as related to

    privacy, because it does not depend on or stem from tangible assets or physical

    reality. In other words, privacy actually exists within our mind and soul. Privacy is

    the way we perceive privacy. This insight leads to the conclusion that differentiating

    between tangible and virtual spheres in their legitimate influence on privacy rights

    discourse or expectation to privacy may be misleading.

    Perceiving the consciousness as the intermediary between the cause of

    violated privacy and the psychological outcomes thereof justifies the interconnection,

    as has been made in the legal literature, between the right to privacy (including within

    virtual sphere) and important values embedded in psychological concepts such as

    freedom, dignity, autonomy of the persona, selfhood and human relation.12

    Scholars and jurists have suggested many definitions to privacy without

    having settled on any one as the right one.13

    I hold the notion that from a

    psychological/personhood perspective, privacy is the personal information and

    11

    Mihaly Csikszentmihalyi, Introduction, in OPTIMAL EXPERIENCE: PSYCHOLOGICAL STUDIES OF

    FLOW IN CONSCIOUSNESS 10, 17 (Mihaly Csikszentmihalyi, Isabella Selega Csikszentmihalyi, eds,

    Cambridge University Press, 1998). (Consciousness is the information system that could differentiate

    among variety of stimuli that could choose certain stimuli and focus selectively on them and that could

    store and retrieve the information is a usable way).

    12 Daniel J. veve, Marc Rotenberg & Paul M. Schwartz, PRIVACY, INFORMATION AND TECHNOLOGY

    40 (Aspen Publishers, 2006).

    13 The most famous one is the right to be left alone. Samuel D. Warren and Louis D. Brandeis, The

    Right to Privacy, Harvard Law Rev. (2890).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    11

    emotions that remain personal, when the person is exposed in public. It can also be

    considered the ability of individuals to differentiate themselves or information about

    themselves and thereby reveal themselves selectively to others. We refer to private

    issues as information that is considered emotionally or personally sensitive or

    inherently important or special.14

    The levels, boundaries, or content of what is

    considered private differ among situations, cultures and individuals, but share basic

    common themes. One of them is the wish to remain unnoticed or unidentified in the

    public realm (anonymity).15

    In contrast to one of Professor Jed Rubenfelds main claims that privacy exists

    within a private sphere,16

    I suggest that the real meaning of privacy does not exist

    when there are no others around, as the meaning of privacy and the need to privacy is

    established when other people may be perceived as invading into this conceptual

    privacy sphere. It can occur by physical invasion, such as seizure, scrutiny or rape,

    but most of the time it happens by others finding personal information (surveillance)

    or asking personal questions (investigation). Privacy, then, is the outcome of a

    persons wish to withhold from others certain knowledge as to his past, present or

    future. The wish for privacy is the desire to be an enigma to others or, more

    generally, the desire to control others perceptions and beliefs by monitoring the

    exposed information about ones self.17

    14

    Solove et al, supra note 12, at 39-42 (different definitions of privacy).

    15 Jed Rubenfeld, Anonymity and the digital Revolution, (publication pending, 2013)

    16 Id,

    17 Sidney M. Jourard, Some Psychological Aspects of Privacy, DUKE LAW AND CONTEMP. PROBS. 307

    (1966).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    12

    This sphere of privacy consists of our perception about information and

    emotions can be analogized to the concept of an intangible balloon that always

    accompanies a person wherever she or he goes within the public domain or when

    perceiving an encounter with other people or actually interacting with other people.

    The size of the balloon differs according to the interaction. When we are with

    family and friends we consciously shrink the balloon and share part of it with them.

    When we are with foreigners or employers we need to save the balloon in order to

    preserve our personal sovereignty. The person may choose the time, place, and the

    level of disclosures of personal information, experience and emotions as well as the

    company before whom such disclosures are made. The state of privacy is related to

    the act of concealment.18

    The reality of employees staying at the premises of

    employment and using the employers tools both tangible tools such as computers

    and virtual ones such as Internet accounts is a classic example of the balloon theory

    in action, where the need to protect privacy is generated by a situation or encounter.

    The persons differ from one situation to the other.19

    Different sets of social norms

    control distinct social settings. Thus, among friends and family, one acts according

    to one set of social behaviors, whereas the same behavior is not acceptable in a

    different setting and subject to sanction for visible deviation from patterned role

    behavior.20

    Drinking with friends or at a festive celebration is welcome, unlike

    18

    Id.

    19 Shlomit Yanisky Ravid, Will the Wolf Dwell with the Lamb? Psychological Relationships in the

    Workplace, in Liber Amicorum Elisheva Barak-Ussoskin (Guy Davidov and Guy Mundlak, eds.,

    2012).

    20 Jourard, supra note 16, at 308 (physical sickness and mental disease may be the outcome of role-

    conformity).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    13

    drinking at the workplace or while driving. Today, the Internet has blurred the

    borders between social contexts and mixed the different situations, creating a blend,

    and sometimes a clash, of rights and wrongs. It is ok to take pictures with friends at a

    costume party, but the same picture, once posted on the web, can cause a persons

    dismissal. A person should have adequate freedom to build the self and choose

    how that self will be represented. Likewise, the concept of privacy as limited

    accessibility enables us to identify when loss of privacy occurs to one self.21

    The experience of psychotherapists has shown that people maintain

    themselves in physical health as well as psychological and spiritual well being when

    they have private space some locus that is inviolable by others, except by the

    persons express invitation.22 People disclose themselves to those that they trust, and

    it is reasonable to expect trust to be built before the disclosure. Nevertheless,

    electronic communication is different than traditional communication. Writing to a

    computer or keypad tends to seem impersonal. Consequently, messages are

    depersonalized, often resulting in stronger or more uninhibited text and more

    assertiveness in return.23

    In other words, todays electronically transmitted

    communications are more likely than more traditional forms to be even more personal

    and, as perceived by the creator, private in nature. Yet, despite documented adverse

    21

    Solove at al, supra note 12, at 40.

    22 Jourard, supra note 17, at 310.

    23 Sara Kiesler, Jane Siegel, and Timothy W. McGuire, Social Psychological Aspects of Computer-

    Mediated Communication, AM. PSYCHOLOGIST 1125 (1984), 9 (the use of electronic communication

    brings new social psychological norms of behavior).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    14

    effects from psychological and business perspectives, employee monitoring and

    surveillance remain pervasive in the business world.24

    Having a private sphere in the workplace might bring better results from the

    employers point of view. In place of suspicion and mistrust, privacy and trust might

    encourage employee motivation, followed by higher productivity levels, an improved

    sense of responsibility toward work, an increased likelihood of employees taking

    initiative and even better worker health.25

    IV. THE LEGAL U.S. NORM OF PRIVACY IN WORKPLACE VIRTUAL

    SPHERES

    The current U.S. legal policy regarding privacy at the workplace reveals that

    employees are often exposed to trespass by their employers, via unwelcome reading

    of private mails or text messages in mobile phones and other devices, tracking their

    webs activities, surveillance of web postings (i.e. on Facebook), tracking of employee

    location, and so on and so forth.

    The fact is, courts and lawmakers around the world are having trouble

    conceptualizing privacy in new technologies.26

    The prevailing attitude in the U.S. is

    that the digital sphere of the employers (i.e. e-mail, internet accounts) is not protected

    24

    Abril et al, supra note 3, at 69.

    25 Id. See also Jourard, supra note 17, at 308.

    26 Abril et al, supra note 3, at 64 (the shared unease among lawmakers around the world suggests that

    they need more information to gauge privacy and behavioral norms for new technologies).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    15

    from employer intrusiveness into the employees privacy.27 The law differentiates

    between employees who work in governmental institutions and those who work in the

    private sector, because the U.S. Constitution (specifically with respect to privacy, its

    Fourth Amendment) limits the government, including in its capacity as an

    employer).28

    That distinction notwithstanding, the policy permitting employer

    intrusion upon employee electronic communication and digital tool usage is prevalent

    within both sectors. Public Sector employer monitoring of employee usage of

    employer Internet tools and other communication devices is subject to a test of the

    employees reasonable expectation of privacy,29 whereas private sectors workers are

    governed mainly by explicit or implicit contracts.30

    The prevailing attitude in the U.S.

    27

    Privacy Rights Clearinghouse, Fact Sheet 7: Workplace Privacy and Employee Monitoring,

    available at https://www.privacyrights.org/fs/fs7-work.htm#4a (last visited March 7, 2013).

    28 Paul M. Secunda, Privatizing Workplace Privacy, 88 NOTRE DAME L. REV. 277 (2012) (offers a

    clear delineation of the differences between the private and the public employment sectors, arguing that

    there are sound public policy interests in providing greater protection for government workers. Absent

    government intervention or involvement as an employer, the law affecting private employers and their

    employees is based mainly in tort, and it is evolving).

    29 Articulated by Justice Harlan (there is a twofold requirement, first that a person have exhibited an

    actual (subjective) expectation of privacy and, second, that the expectation be one that society is

    prepared to recognize as reasonable.), concurring in Katz v. U.S., 389 U.S. 347, 360 (1967). But the

    Court later held that privacy rights do not rise or fall with the Katz formulation, noting that common

    law understandings of trespass, including the particular concern of government trespass upon the areas

    (persons, houses, papers, and effects) was not repudiated by Katz, but rather supplemented by the

    ruling. U.S. v. Jones, 132 S. Ct. 945, 950 (2012).

    30 Christine Jolls, Privacy and Consent Over Time: The Role of Agreement in Fourth Amendment

    Analysis, available at

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    16

    workplace and courts is that e-mail privacy (and, less explicitly, Internet usage in

    general) as well as tracking of private information on employee Internet posts is not

    protected, whether originating in the physical workplace or from the virtual sphere,

    especially when employees use employer computers and networks. Courts have held

    that employees cannot have a reasonable expectation of privacy related to e-mail or

    other electronic communications, and federal law is very limited and generally leans

    away from affording employee privacy, especially when it comes to the specific issue

    of e-mail. Courts have held that employees cannot have a reasonable expectation of

    privacy related to e-mail or other electronic communications. 31

    Physical instruments and spaces have traditionally defined privacy law in the

    United States. The reasonable expectation of privacy analysis, endemic to privacy

    jurisprudence, is firmly rooted in the experience of physical space and its surrounding

    normative circumstances. Policy makers have thus far failed to adjust privacy norms

    to the new reality that most workers function within a virtual sphere in a way that

    individual privacy will be at least partially protected.

    V. A DIFFERENT ATTITUDE: SECURING VIRTIAL PRIVATE ZONE

    Israels National Labor Court combined two appeals concerning the

    admissibility of email correspondence as evidence.32

    In the first, Panaya Ltd., a

    software company, dismissed Tali Isakov-Inbar, an employee of the company. Inbar

    http://www.law.yale.edu/documents/pdf/Alumni_Affairs/Jolls_RationalityandConsentinPrivacyLaw_1-

    21-10.pdf (last visited Mar. 7, 2012).

    31 Lisa Smith-Butler, Workplace Privacy: Well Be Watching You, 35 OHIO N.U. L. REV. 53 (2009).

    32 Isakov v. Commissioner, supra note 2.

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    17

    sued her former employer, claiming that she was unlawfully dismissed due to her

    pregnancy. Panaya contended that the dismissal notice was issued to Isakov prior to

    her pregnancy. To support its claim, Panaya submitted copies of Inbar's e-mails sent

    from her company-provided mailbox. These emails contained Inbar's CV and were

    sent to several employment agencies. Inbar argued that, although Panaya provided

    the mailbox to her, use of the mailbox for personal purposes was permitted. In the

    second case, Ron Fisher was a senior manager, employed for over 20 years by Afikei

    Mayim, an agricultural cooperative that supplies water in the Beit Shean Valley. The

    employer suspected Fisher of using its trade secrets to run a competing business and

    claimed that such activity caused the company significant financial harm. The

    employer fired Fisher and supported its action through e-mails from Fishers private

    e-mail account and from paper copies of the e-mails, which Fisher had thrown into his

    garbage can at work. In Inbar's case, the Regional Labor Court ruled that there was

    no violation of the Privacy or Eavesdropping laws. However, the Israeli National

    Labor Court, by a unanimous decision, ruled that in both cases the employers violated

    the employees privacy.33

    The Court distinguished four different types of employee mailboxes based on the

    type of correspondence generally exchanged in such mailboxes and whether the

    mailbox was provided by the employer, establishing different rules for each type of

    mailbox. It should be noted that those specific rules are in addition to the general

    standards detailed above, which apply to all monitoring activity.

    33

    Id. English version interpretation and recommendation: Landmark Case Establishes Guidelines For

    Monitoring Employee Online activity, Meitar, available at: http://www.meitar.com/177013

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    18

    Under this ruling, a Professional Employer Mailbox(type A) is a mailbox

    provided by the employer for professional purposes only and the employee is

    restricted from using it for his or her private needs. The employer is required to

    inform the employee of the restrictions on use and of the employer's ability to

    Monitor the email correspondence exchanged in such mailbox. The employer is

    required to obtain general consent for its e-mail policy in order to monitor even

    professional correspondence, but is not required to obtain consent for each individual

    instance of monitoring of professional correspondence in this type of mailbox. The

    most important rule is related to personal correspondence in the Professional Mailbox:

    the Court did not accept an expectation of privacy test, and held that, although the

    employee is not authorized to engage in private correspondence, the employer is

    nevertheless prevented from reviewing the content of such correspondence without

    the employees specific consent. Moreover, in accordance with the High-Tech Sector

    Agreement from 2008 on Email Monitoring and Computer Use, which was referred to

    on several occasions in the Inbar opinion, the employer may be required to notify the

    employee that they have a right to be present during such review of email.

    A Mixed Mailbox" (type B) is a mailbox provided by the employer for both

    professional and personal purposes. 34

    Reviewing (i.e., actually inspecting and reading

    the content of the correspondence), as opposed to merely monitoring, personal

    correspondence in the Mixed Mailbox requires the employee's specific consent in

    each instance.

    34

    In our view, in most cases these days, employers will be providing such a mixed mailbox, as e-mail

    is used for both professional and personal purposes.

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    19

    On the other hand, the "Employer-Provided Personal Mailbox" (type C) is

    provided by the employer for the employees personal purposes only. Any type of

    Monitoring of the Personal Mailbox (whether actually inspecting the content of e-

    mails or just monitoring subject lines of the e-mails or other parameters, such as size

    of the e-mails), regardless of the type of correspondence (personal or professional)

    requires the employees specific consent in each instance.

    Finally, an Employees Private Mailbox is a mailbox privately held by the

    employee (such as Hotmail, Gmail, Yahoo, etc.), which may be accessed via the

    workplaces Internet connection (Type D). All monitoring of the Private Mailbox by

    the employer is prohibited without a court order, even in when the employee gives

    general or specific consent. Hence the court has adopted the private zone within a

    digital employment sphere wherein employees are entitled to private space,

    respecting individual dignity and providing workers the opportunity to be party to any

    inspection and to (at least partially) control it.35

    VI. ALTERNATIVE LEGAL TOOL: THE LEAST INVASIVE MEAN

    The reasonable expectation of privacy test implemented by the

    public sector, when applied within a modern virtual workplace realm, (almost)

    completely eliminates employees privacy rights. The same result of drained

    privacy rights has been diagnosed in the private sector by Professor Christine

    Jolls, who found that non-governmental workers overwhelmingly lose their

    rights when courts apply a test that examines explicit or implicit consent (all

    35

    Id.

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    20

    employees agree to waive the right to privacy). 36 Therefore, moving toward

    employees Consent policy would not change the result. The outcome is

    that employees (almost) totally lost their privacy rights within the virtual

    workplaces.

    Securing a private zone to U.S. employees, which have been adopted by

    several other legal regimes, is justified by a bundle of psychological theories that can

    be concisely described as the balloon theory. Following the conclusion that

    employees have the right for secured private zone, we should rethink about the

    existing tests and consider replacing them with alternative tools that better serve this

    purpose. Without excluding other alternative tools, the article brings the Least

    Restrictive Mean test usually considers as part of the proportionality analysis, as an

    example for an alternative legal tool.37

    Proportionality analysis has widely diffused over the past fifty years. It is

    today an overarching principle of constitutional adjudication, the preferred procedure

    for managing certain disputes. Although other modes of rights adjudication were

    available and could have been chosen and developed, proportionality analysis has

    emerged as a multi-purpose, best-practice, standard.38

    36

    Jolls, supra note 30.

    37 Aharon Barak, Proportionality: Proportionality: Constitutional Rights and their Limitations

    (Cambridge Studies in Constitutional Law, 2011) (Aharon Barak explores its four components of proportionality: proper purpose, rational connection, necessity and proportionality stricto sensu) 38

    Alec Stone Sweet and Jud Mathews. "Proportionality Balancing and Global Constitutionalism"

    Columbia Journal of Transnational Law 47, 74-75 (2008) (In the authors view, proportionality-based

    rights adjudication now constitutes one of the defining features of global constitutionalism, if global

    constitutionalism can be said to exist at all).

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    21

    The core of necessity analysis is the deployment of a least restricted Means

    (LRM) test: the judge ensures that the measure does not curtail the right any more

    than is necessary for the other side (government) to achieve its stated goals.39

    When

    applied to workplaces, either public or private, I suggest using the Least Invasive

    Mean as the applicable test for maintaining Virtual Privacy (as well as other sorts) at

    the workplace. The idea behind this principle is simple. When there are two means to

    achieve legitimate information the permissible mean would be the less invasive, less

    restrictive, less offensive one. The mean that better protects the right will be the

    right one. I conclude with a recommendation to implement this principle within the

    context discussed in this study.

    VII. RECOMMENDATIONS

    The conclusions, follow from the alternative case of Isakov discussed above, and

    can be implemented in a wide variety of cases in the field of employees privacy

    within the virtual spheres. 40

    A number of principles emerge that make sense for a 21st

    century workplace environment that encourages employee engagement and respects

    privacy. The components described below do not stand alone. Their efficiency

    depends on combining them together into one coherent solution.

    39

    Id. 40

    Isakov, supra note 2

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    22

    A. Private Zones

    The importance of privacy rights does not skip over employees at the

    workplace. It is time to reconsider standard privacy policy within the workplace and

    to secure private zones to employees using the virtual sphere of the workplace.

    B. The Least Invasive Mean

    The rule of proportionality can be implemented in this issue of employees

    privacy efficiently.

    The employers should limit incursion of employees private zone to extreme

    circumstances in which severe immediate damage may be caused to the employers

    legitimate interests (such as criminal harmful activity by the employee). Violation of

    employees privacy may only take place if it is proportional, measured in light of the

    potential harm to the employer, and only to the extent there are no other, less invasive

    alternatives to achieve the same result. Employers should use the least invasive

    technology available. For example: automated monitoring or blocking software

    would be less invasive than human monitoring of e-mail.41

    C. Transparency

    Employers should have a clear, written and detailed internet, e-mail and computer

    usage policy. The employee should be aware of the policy and its outcomes and must

    41

    Isakov, supra note 2

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    23

    explicitly agrees to it. The policy should be attached to individual employment

    agreements and approved by the employee signature. If the company has an

    employee handbook, the policy should be included. 42

    D. Consent

    Employers should obtain employees informed, willing, written and signed

    consent to any violating of employees privacy. In order to meet the informed

    consent requirement, the employer must disclose to employee, in writing, the matters

    set forth in the policy, such as: the nature of any monitoring tools, the purpose of

    monitoring, and the period for which monitored data will be retained.

    There are two types of employees consent: (i) general consent to e-mail policy; and

    (ii) specific consent to each instance of monitoring. . 43

    In case of privacy, in order to

    secure the necessary private zone, we recommend to adopt the second specific rule

    of specific consent

    The consent policy bears risks, as employees would probably sign any

    agreement in order to be employed.44

    Therefore, I suggest considering informed and

    explicit consent only when the broader policy includes more components for securing

    a minimum of privacy, which will not be subject to contractual waiver. 45

    42

    Isakov, supra note 2 43

    Isakov, supra note 2 44

    Jolls, supra note 30. 45

    Isakov, supra note 2

  • Work In Progress, Privacy within the Virtual Workplace: The Entitlement of Employees to a

    Virtual Private Zone and the "Balloon" Theory, Shlomit Yanisky Ravid, Prof. of Law, Yale Law School, ISP, Fellow

    24

    E. Specific Purpose.

    Surveillance after any employees private information must be founded on a

    specific, clear and legitimate purpose, and the employer may not use the information

    gathered from the monitoring for a purpose other than the purpose for which the

    monitoring was performed. 46

    VI. Conclusion One of the most important conclusions is the fact that the mere existence of

    technical tools, capable of tracing, surveillance and tracking of personal data, does not

    mean that using them to violate privacy is a permissible norm. There is a gap between

    what can technically be done and what should be done. Bringing American policy in

    line with the realities of digital age society will benefit employers, by fostering trust,

    encouraging workplace creativity and improving productivity.

    46

    Isakov, supra note 2