Summary of Program

Companies and their employees are now widely using social media in their daily business activities. These networking sites are used by employees to communicate with one another as well as current and potential customers. However, an employee’s use of social media may occasionally adversely impact their employer’s business or present other legal

Summary of Program

Companies and their employees are now widely using social media in their daily business activities. These networking sites are used by employees to communicate with one another as well as current and potential customers. However, an employee’s use of social media may occasionally adversely impact their employer’s business or present other legal

Summary of Program

Employees use networking sites to communicate with one another (as well as current and potential customers). They post their daily thoughts and activities, uploading photos and, occasionally, adversely impact their employers’ business. What can an employer do to protect itself without intruding on employee rights?

Program Highlights

  • Employer’s use of employee’s social

Summary of Program

Employees use networking sites to communicate with one another (as well as current and potential customers). They post their daily thoughts and activities, uploading photos and, occasionally, adversely impact their employers’ business. What can an employer do to protect itself without intruding on employee rights?

Program Highlights

  • Employer’s use of employee’s social

By:   James Kachmar

Those of you who attended our seminar on protecting confidential and trade secret information last Spring may recall our discussion about a trade secret misappropriation case involving a Twitter account. In that case, PhoneDog v. Kravitz, 2011 U.S. Dist. LEXIS 129229 (N.D. Cal. 2011), a product news and review company, PhoneDog, claimed it issued Twitter accounts to its employees so that they could publish content for users to support PhoneDog’s business. When one employee, Kravitz, left PhoneDog, he refused to provide PhoneDog with access to the Twitter account he was assigned, changed its handle to delete references to PhoneDog, and continued to use it (with its 17,000 followers) for personal purposes.Continue Reading A Reminder to Employers of the Need for Social Media Policies