e-Sexual Harassment

New Jersey Law Journal, January 29, 2001

Copyright 2001 American Lawyer Newspapers Group, Inc.
New Jersey Law Journal

January 29, 2001


LENGTH: 2283 words

HEADLINE: Internet Law Internet Activity in the Workplace Can Result in Sexual Harassment

BYLINE: JONATHAN BICK
THE AUTHOR IS AN ADJUNCT PROFESSOR OF INTERNET LAW AT PACE LAW SCHOOL AND RUTGERS LAW SCHOOL-NEWARK. HE IS ALSO THE AUTHOR OF 101 THINGS YOU NEED TO KNOW ABOUT INTERNET LAW (RANDOM HOUSE 2000).

BODY:
It is not surprising that the Internet has been implicated in sexual harassment conduct in the workplace because it has become mainstream by every commercial standard.
It is incumbent upon companies and firms to examine their electronic environment for evidence of harassment activity. They must also know what action to take upon discovering Internet harassment misconduct.
The Supreme Court has interpreted Title VII of the 1964 Civil Rights Act as prohibiting sexual harassment. Sexual harassment violates Title VII when it alters the terms or conditions of employment because of the individual's sex.
The Equal Employment Opportunity Commission defines sexual harassment as (1) unwelcome sexual advances, requests for sexual favors and other verbal or physical conduct of a sexual nature; and (2) conduct, the submission or rejection of which affects an individual's employment unreasonably or interferes with an individual's work performance or creates an intimidating, hostile or offensive work environment.
There are the two types of sexual harassment. The first type, quid pro quo sexual harassment, occurs when the victim suffers actual, concrete, economic consequences, such as firing, demotion or failure to receive a promotion, for rebuffing the sexual harassment. The second type, hostile environment sexual harassment, occurs when there have been unwelcome advances that have been sufficiently "severe or pervasive" so as to alter the terms and conditions of employment, even in the absence of economic consequences.
In most workplaces owners, managers and professional and clerical staff use the Internet at every level. The Internet has also legitimized the home office as a true equivalent of the traditional office environment. This workplace technological change has brought many benefits to the workplace but has also enabled employees with malicious intent to cause grievous harm to their companies, co-workers and clients.
Studies of workplace Internet use have found that employees have extensive access to other employees while also having a perceived level of anonymity. Such studies have found that employees view the Internet as a communication mechanism. These factors are responsible in part for the rise of Internet sexual harassment in the workplace.
On the Internet, harassing mail needs no paper, no envelopes and no stamps. Electronic pornography needs no projector or printer. Malicious employees can distribute material, with the ease of a mouse click, to any part of the company in a matter of minutes.
Employees use the Internet in nearly every facet of business, and, consequently, the Internet generally allows immediate access among all employees. Many employers have implemented procedures to deal with Internet sexual harassment in the workplace. Unfortunately, even employers with the most elaborate policies and procedures in place for preventing Internet sexual harassment are forced to use policies that are often too vague, too outdated or not actively enforced.
In addition, managers typically misjudge their own skills in detecting Internet sexual harassment. For example, many believe that users can only transfer computerized files as attachments to a delivery vehicle such as e- mail. In fact, one can easily transfer files via the Internet without e-mail. The use of the Internet may hide the identity of the person engaging in harassing conduct.
Consider the case of Knox v. State of Indiana, 93 F.3d 1327 (7th Cir. 1996), in which the court found state computers were used to engage in sexual harassment via e-mail messages to the victim. In addition, consider Greenslade v. Chicago Sun-Times, Inc. 112 F.3d 853 (7th Cir. 1997), in which the court found that a newspaper's computers were used to engage in sexual harassment via e-mail.
Electronic mail is the most recognizable method for sending and receiving communications that include harassing exchanges. Employees can transmit e- mail to others without regard to differences in servers, services or physical locations. Such e-mail communication may comprise any kind of computer file including text, photos, sound or video. The identity of the sender of an e- mail transmission may not be easy to figure out if the sender makes efforts to conceal his identity. However, truly anonymous e-mail -- completely stripped of any identifying information -- is not currently possible.
Internet newsgroups are essentially online bulletin boards that normally allow free access. A person can engage in Internet sexual harassment activity by posting certain text, photographs, software and full-motion videos. One difference between Internet news groups and e-mails is that e-mail messages are targeted messages to a specific known group of individuals, while newsgroup messages are available to the public.
Live conversations among users on the Internet exist in many formats including text, audio and video and can take place at any time. Online services such as America Online and Yahoo also offer chat rooms, which can be a distribution point for Internet sexual harassment in the workplace.
The Internet has a simultaneous presence throughout the world. The Internet is composed exclusively of digital data that enable its users to make nearly an unlimited number of copies from a single posted document, photograph, video or song each being as good as the original. An employee's use of the Internet as part of a sexual harassment transaction poses risks of criminal and civil liability for the organization and the employee.
For companies or firms with ethical, professional or associational obligations, such misconduct may lead to ethical grievances. Other problems can include embarrassing press coverage, the loss of business, the temporary or permanent seizure of part or all of the organization's computer system, the disclosure of internal company secrets and the possibility of additional criminal charges or civil actions based on other information discovered on the organization's systems during the initial investigation.
Looking for Misconduct
Many organizations routinely review their employees' e-mail, which can be examined on the main e-mail server or on employees' individual computers. Even after users have deleted e-mail, it can be reviewed under certain circumstances. For example, since many organizations regularly back up computer data, employers can recover e-mail years after its first transmission, even if the author has deleted it.
Alternatively, an employee's newsgroup posting may also be found after the author no longer has access to it because it has been copied by another server. One such server system allows searching by user name, by company name and by many other terms, which have been posted during the past five years or so. A similar service allows the retrieval of all messages posted by an individual. The use of such archives may be helpful when interviewing potential employees and when reviewing the activities of existing employees, to prevent and reduce harassment misconduct.
Evidence of employee misconduct on a chat network is fleeting because, unlike newsgroups, computers do not usually record activities on live chat networks. Generally, one cannot search chat networks for past visits, file transfers or conversations after the fact. However, an employer's system administrator can configure the employer's server software to log chat activity. A review of such logs can also reveal Internet sexual harassment misconduct.
Transmissions to and from an employee's computer can be an excellent source of information and evidence regarding sexual harassment misconduct. Such a review can confirm abusive activity that is already suspected. It can also alert the organization to new forms of abuse. Apart from what the e-mail or file contains, transmissions usually contain a wealth of clues about the source and destination of the transmission, even where the sender's identity appears unknown.
It should be noted that barring enactment of a company policy of electronic monitoring, there is very little that cannot be done by the nongovernmental employer to electronically detect employee harassment abuse. However, the Fourth Amendment protects governmental employees to the extent that such searches are unreasonable.
Collecting and Preserving Evidence
Once employee harassment misconduct is detected, special steps must be taken to collect the associated evidence. A mistake in collecting and preserving the evidence is often irremediable.
Computer evidence is "animated" in the sense that, unlike documents, mishandling can change its intrinsic condition. Even the likelihood of alteration can obliterate the company's legal action because it may not be possible to prove a negative -- that nothing has been changed.
Consequently, firms are advised to use a team of technicians and attorneys to preserve the data in question. Team members might include a company principal or manager; the company's attorney; the company's system administrator; a private investigator or computer expert; and, in some situations, a representative from a law enforcement agency.
The involvement of state or federal law enforcement agencies requires thought because it is not always clear what agency has jurisdiction. At the very least, an attorney should review and approve policies and procedures for handling problem situations. The firm needs to ensure that it does not become a target of the inquiry. The involvement of law enforcement can mean unwanted publicity, delays and the loss of control over the investigation.
In the event that a firm is satisfied that wrongdoing has occurred, it should take certain steps at once to set the stage for proper evidence collection. The first step is to separate the employee from his computer and from remote access to the firm's server as quickly as possible, to prevent the destruction of evidence. It is possible to delete all information on a computer's hard drive or on a firm's server in a matter of minutes, either locally or remotely. The separation should be done in as noninvasive a manner as possible, since it is always possible other employees are involved.
The employer should change the suspected employee's passwords to all company programs and accounts, remotely if possible, to maintain the terminal exactly as the employee left it after it has been physically disconnected from the firm's e-mail system. The employee's work area also should be secured but not altered. All items that the employer must preserve should be conserved in the condition in which they were found. The degree of preservation and collection depends on the wrongdoing and the choice of remedy (i.e. disciplinary, termination, etc.)
In order that evidence can be identified computers, computer screens and the employee's surrounding work area should be videotaped under the supervision of a person knowledgeable in litigation videotaping. Still photographs also should be taken, particularly of the components' serial numbers and model numbers.
To prevent the discovery of data, an employee can configure his machine to delete data if it is started in his or her absence. To circumvent this eventuality, the use of a "boot disk" to start the computer is advised. A boot disk is a floppy disk that contains the information necessary to start or "boot" the computer's systems from a location other than a computer's hard drive.
Internet and other computer-related evidence should be downloaded on two sets of movable media, such as diskettes or zip disks. This reduces the risk of deletion or modification of data being downloaded. Directory and file names, creation dates and the contents of each file must be left precisely as found. Only one set should be used and the other should be left in the same condition as it was created, allowing for verification that the employer did not tamper with the evidence.
There are several ways to obtain evidence that an employee has visited certain Internet sites. The most frequently used way is to identify the hyperlinks and the cache copies of the Web sites on the employee's computer. Care should be taken to save all the components of the cache to ensure that the employer can present an exact duplicate of the site at the time the employee visited it. When attempting to save e-mail or other Internet messages, be sure to save the routing information, sometimes known as the " header."
If the matter is to be referred to law enforcement authorities, management must ensure that nothing is altered. To do otherwise will lead to arguments of tampering or modification. The chain of evidence is critical to a prosecutor's ability to use the evidence.
A well-designed Internet sexual harassment prevention policy, developed before a problem is discovered, is the key to minimizing the risk from claims of sexual harassment. It is important to balance the legitimate privacy interests of employees with the legitimate workplace and security needs of the employer. Firms must be prepared to address these Internet-based problems, both within their organization and on behalf of employees who experience such problems.
However, since no plan is fail-safe, policies and procedures should include contingency plans to address problems when they arise. With an understanding of the Internet and the associated laws, companies and firms can timely and properly address Internet sexual harassment in the workplace.