An employer has substantial leeway when it comes to fashioning policies governing the use of company computer and communication systems and to monitoring employee use of company systems to ensure compliance with policies? Having network policies that limit access to competitively sensitive information can help give that information trade secret status. Having the right kind of email and internet policies allows an employer to monitor employee use of those systems without running afoul of privacy rights and to protect the network from viruses, unlicensed software, and potential hacking. Our lawyers can help identify what interests are served by having what policies and how safely to write, implement, and enforce such policies.
For further information, contact:
- Ralph Tener
- Bill Bethune
- Peyton Mahaffey
- Laura Liff
- Derek Karchner
Disclaimer: This firm only offers legal advice to clients, and the facts of a particular situation usually drive the legal advice we give to clients. This message is not intended to be legal advice appropriate for all situations.