BYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee's private social networking site. If your company lets employees bring their own devices for work purposes, you’d better have a formal BYOD policy—one that understands employee privacy rights and employer access rights.Such policies are often crafted by legal experts for good reason. Violations of certain rights can land companies in hot water. Management consulting firm Janco Associates has created a 14-page BYOD policy template covering everything from help and support to disaster recovery to access control. In the privacy section, Janco outlines legal issues. Janco cites one of the cornerstone legal considerations called the Stored Communications Act, or SCA. It deals with the disclosure of stored wire and electronic communication and transaction records retained by third-party Internet service providers, or ISPs. Essentially, SCA prohibits ISPs from divulging a customer’s content. Companies attempting to access electronic communications stored at an ISP without authorization can be fined or imprisoned. The employee can also seek a civil remedy. There is a legal precedent favoring employee rights: Pietrylo v. Hillstone Restaurant Group in 2009, whereby a couple of employees created a MySpace page to complain to registered members about the company. Managers allegedly pressured one member, another employee, to give up her log-in ID and password to access the MySpace page. The two employees that created the MySpace page were outed and fired, yet the court upheld the jury’s verdict that Hillstone was liable for violations of the SCA. One can only imagine similar scenarios playing out on a BYOD smartphone or tablet. These devices access an employee’s Facebook page and other password-protected social networks and personal data residing on servers. With the rise of BYOD, technology and legal experts are now predicting employee lawsuits concerning privacy violations, unpaid overtime and other issues. Story: BYOD Lawsuits Loom as Work Gets Personal The message is, do not try to gain unauthorized access to an employee’s private social networks, says Janco. You shouldn’t even ask an employee to provide log-ins and passwords to a private site, because you may have to show that you didn’t coerce or threaten the employee to comply. “The Stored Communications Act is outdated as its authors never contemplated the prevalence of social media and BYOD (Bring Your Own Device) computing environment,” Janco writes in its policy template. “Companies don’t have to stop monitoring because of the Stored Communications Act; they just have to be smart about it. If you ask the owner or administrator for access to a private site and they say no, walk away. Recognize the limitations imposed by employment and privacy laws on your ability to monitor employee sites.” Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at tkaneshige@cio.com Related content feature 13 essential skills for accelerating digital transformation IT leaders too often find themselves behind on business-critical transformation efforts due to gaps in the technical, leadership, and business skills necessary to execute and drive change. By Stephanie Overby Jun 05, 2023 12 mins Digital Transformation IT Skills tip 3 things CIOs must do now to accurately hit net-zero targets More than a third of the world’s largest companies are making their net-zero targets public, yet nearly all will fail to hit them if they don’t double the pace of emissions reduction by 2030. This puts leading executives, CIOs in particul By Diana Bersohn and Mauricio Bermudez-Neubauer Jun 05, 2023 5 mins CIO Accenture Emerging Technology case study Merck Life Sciences banks on RPA to streamline regulatory compliance Automated bots assisted in compliance, thereby enabling the company to increase revenue and save precious human hours, freeing up staff for higher-level tasks. By Yashvendra Singh Jun 05, 2023 5 mins Digital Transformation Robotic Process Automation feature Expedia poised to take flight with generative AI CTO Rathi Murthy sees the online travel service’s vast troves of data and AI expertise fueling a two-pronged transformation strategy aimed at growing the company by bringing more of the travel industry online. By Paula Rooney Jun 02, 2023 7 mins Travel and Hospitality Industry Digital Transformation Artificial Intelligence Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe