Media Search:



Social Media, Discovery and Employment Law

With over one billion users on Facebook and the explosion of Twitter and LinkedIn, it is no surprise that social media has become an integral part of the day-to-day lives of employees across the country. As these social media websites have become increasingly popular, courts have continued to address the legal issues raised by social media, particularly in the area of discovery.

This article focuses on recent developments in the discovery of social media content in employment discrimination cases.1 Social Networking Site Information Questions of relevance and undue burden are nothing new to lawyers in the discovery stage of litigation. The developing body of law relating to e-discovery of social networking information, however, has illuminated some of the challenges that attorneys often confront when crafting discovery requests, and has also presented some new challenges. For example, obtaining relevant information in the form of social media content requires counsel to be up to speed on how social media sites work and what the proper terminology is when crafting requests for social media content. Not surprisingly, courts have generally prevented employers in litigation from obtaining an employees entire social networking profile on the theory that allowing such broad discovery would amount to the proverbial fishing expedition. Therefore, as the range of social media content expands to include new and different forms of communication and expression, it is important that information sought in a discovery request be relevant to the claims asserted.

Rule 34 of the Federal Rules of Civil Procedure entitles a party to obtain documents or electronically stored information from other parties in discovery, provided that the materials sought are relevant and that the requesting party identify such materials with reasonable particularity.2 The rules also, however, permit courts to limit discovery where the burden or expense of the proposed discovery outweighs its likely benefit.3

Applying these principles, courts have recently considered requests for social media content in employment cases by examining the scope of requests in light of the claims asserted, as well as whether the requests identify the information sought with reasonable particularity.

For example, in Mailhoit v. Home Depot,4 plaintiff claimed she was discriminated against by her employer, Home Depot, as a result of which she allegedly suffered post traumatic stress disorder and depression, and also isolated herself from others. Based on these allegations, the defendant/employer requested that plaintiff be compelled to produce social media content including her profiles, postings, messages, status updates, wall comments and blog entries regarding any emotion, feeling, or mental state of plaintiff or any communications relating to events that could reasonably be expected to produce a significant emotion, feeling, or mental state. While the court held that social networking content is not entitled protection based on a right of privacy, it also held that the social media content must be relevant to the litigation.5 Accordingly, the court found when requesting communications regarding a partys mental or emotional state, it is the substance of the communication that determines [its] relevance[,] rather than merely the fact that the user had such communications.6

With regard to the defendants request in Mailhoit, the court held that such request was overly broad and failed to put a reasonable person of ordinary intelligence on notice of which specific documents or information would be responsive to the request.7 Similarly, the court found that a request for all photographs posted by plaintiff on her social media profile over a seven-year period was overbroad as it was not limited to the issues relevant to the case.8

Mailhoit is notable for two reasons. First, it stands as a reminder of the importance of crafting narrowly tailored requests that identify the information sought. Second, it shows that courts are apt to analyze these issues differently depending on the circumstances of each case. In that regard, the court mentioned in a footnote that the requests it found to be overbroad were, in fact, modeled after requests found to be permissible by the District Court for the Southern District of Indiana in E.E.O.C. v. Simply Storage Mgmt.9Simply Storage Mgmt. is one of the earliest cases to address the discoverability of social media and is often cited as an authority on the proper scope of discovery requests for social media content.10 As another example of how courts may evaluate social media requests differently, some courts require a threshold showing of relevance based on the content found on a users public profile before they will compel production of the users private postings and other non-public communications.11

In another recent decision of note, the court in Giacchetto v. Patchogue-Medford Union Free School District,12 held in a disability discrimination case that routine status updates and/or communications on social networking websites were not relevant to plaintiffs claim for emotional distress. That said, social media postings pertaining to the emotional distress allegedly suffered as a result of the employers actions were relevant. Similarly, the court found that postings which refer to alternative potential stressor[s] may be relevant because by asserting a claim for emotional distress, the plaintiff has opened the door to discovery into other potential sources/causes of her distress.13

In another disability discrimination case, German v. Micro Electronics,14 the court rejected plaintiffs claim that defendants request for social media information was too burdensome. In this case, the defendant/employer requested that the plaintiff produce any blogs, social media sites, postings and similar online activities where plaintiff addressed her workplace, health condition, or other issues raised in her Complaint since January 1, 2009.15 The court held that the plaintiffs burden of responding to this request did not outweigh the benefit of the requested information because the defendant limited the scope of its request such that it targets only plaintiffs blogging and online activity since 2009 that concern her workplace, health condition, or other issues raised in her Complaint. The court held that based on the plaintiffs admission that she utilizes journals to communicate about her various health conditions, [the defendant's] narrowed request is reasonably calculated to discover information bearing on important issues in the case, namely, [plaintiff's] heatlh, which is central to her claims, as well as her damages.16

The issue of social media discovery was handled differently in E.E.O.C. v. Original Honeybaked Ham of Ga.,17 where the courtin response to a request to compel the production of social media content in a class actioncreated a process by which social media content would be reviewed in camera for relevance before being produced to the defendant. Here, plaintiffs brought claims alleging, among other things, that the defendant/employer engaged in class-wide sexual harassment and retaliation.18 Because plaintiffs sought emotional distress damages, defendants requested in discovery class members social media accounts and text messages concerning their alleged emotional and financial damages.19

See more here:
Social Media, Discovery and Employment Law

Blog beast empower network super affiliate free software. blogging beast unleashed – Video


Blog beast empower network super affiliate free software. blogging beast unleashed
http://blogbeastsoftware.net/free This FREE Software will get you FREE leads for Empower Network affiliates. http://blogbeastsoftware.net/free launch of blog...

By: Craig Scott

See the rest here:
Blog beast empower network super affiliate free software. blogging beast unleashed - Video

Tech companies help others, themselves with donations of software

Last month, global engineering firm Siemens made one of its largest donations, valued at $750 million, to the University of Maryland.

It wasnt a financial contribution. Instead, it was a license for its engineering software. Called Product Lifecycle Management, the software simulates the design and manufacturing processes for products such as cars and airplanes. PLM uses real data about the life span of certain parts to predict, for instance, how long a car might last.

In-kind software donations arent new. Microsoft, Apple and Google, among others, have been providing free software or hardware to schools, nonprofit groups and others for more than a decade. Tech companies often use such handouts not only to further a good cause, but also to gain exposure for their products and test new markets.

IT philanthropy can take other forms, as well. Siemens, whose U.S. subsidiary in the District of Columbia took in $22 billion in fiscal 2012, has a separate philanthropic arm donating about $7million annually to educational initiatives in the science, technology, engineering and mathematics fields.

The company distributes its PLM licenses through a program called GoPLM, which makes hundreds of such donations to academic institutions each year. But its not purely philanthropic. Its also intended to develop a cadre of engineers familiar with Siemens products, said Bill Boswell, director of partner strategy. Its a long-term investment in that pipeline of people, he said.

As products become more sophisticated, engineering students need training in technology to help them manage the design of complex products, Boswell said. Cars have hundreds of computers in them, and the cellphone has more processing power and memory than an entire Apollo moon mission, he said.

Although the software is free, universities receiving PLM grants typically pay Siemens an annual fee of a few thousand dollars for access to tech support and software maintenance.

Hardly alone

Siemens is hardly the only enterprise that has built a structure behind its donations. A new collaboration between nonprofit, academic and for-profit ventures called Journey Forward is offering free software to breast cancer survivors and oncologists, helping them to manage care after a patient is discharged from the hospital and to raise awareness of the emerging field of survivorship care.

Journey Forward developed and released the software this year. The group consists of the advocacy nonprofit groups the National Coalition for Cancer Survivorship (NCCS), the Oncology Nursing Society, UCLAs Cancer Survivorship Center, health benefits company WellPoint and biotechnology corporation Genentech.

See the article here:
Tech companies help others, themselves with donations of software

Joomla! sicher machen – Video


Joomla! sicher machen
Joomla! sicher machen aber wie? Wir zeigen es! Von den Grundvoraussetzungen, wie Passwörter, Rechte usw. über Backup-Möglichkeiten und Backupszenarien, bis h...

By: J and Beyond e.V.

Follow this link:
Joomla! sicher machen - Video

Fort Disco malware is now targeting email and FTP servers

News

By Lucian Constantin

September 30, 2013 12:15 PM ET

IDG News Service - A piece of malware designed to launch brute-force password guessing attacks against websites built with popular content management systems like WordPress and Joomla has started being used to also attack email and FTP servers.

The malware is known as Fort Disco and was documented in August by researchers from DDoS mitigation vendor Arbor Networks who estimated that it had infected over 25,000 Windows computers and had been used to guess administrator account passwords on over 6,000 WordPress, Joomla and Datalife Engine websites.

Once it infects a computer, the malware periodically connects to a command and control (C&C) server to retrieve instructions, which usually include a list of thousands of websites to target and a password that should be tried to access their administrator accounts.

The Fort Disco malware seems to be evolving, according to a Swiss security researcher who maintains the Abuse.ch botnet tracking service. "Going down the rabbit hole, I found a sample of this particular malware that was brute-forcing POP3 instead of WordPress credentials," he said Monday in a blog post.

The Post Office Protocol version 3 (POP3) allows email clients to connect to email servers and retrieve messages from existing accounts.

The C&C server for this particular Fort Disco variant responds with a list of domain names accompanied by their corresponding MX records (mail exchanger records). The MX records specify which servers are handling email service for those particular domains.

The C&C server also supplies a list of standard email accounts -- usually admin, info and support -- for which the malware should try to brute force the password, the Abuse.ch maintainer said.

Read more:
Fort Disco malware is now targeting email and FTP servers