Employee Social Media Griping: Can An Employer Terminate Employees Because of Their Social Media Posts Without Violating Section 8(a)(1) of the National Labor Relations Act

Ruth Binger

By Ruth Binger



Social Media is the new water cooler conversation. It enables and facilitates conversations that years ago would have taken places at the old-fashioned water cooler. In today’s world of Facebook and Twitter, employee complaining is instantly, electronically and permanently transmitted to the world. Social Media users think less about their posts and disclose more so that a simple gripe monologue is turned into dialogue – on steroids – with the world. Such platforms encourage employees to blur their personal and professional lines of behavior and blurt out what is bothering them without engaging their higher level thinking tools.

With seven hundred and fifty million people actively using Facebook, there is a significant chance that a post about working conditions, compensation or other issues related to their employment will spark a conversation with an employee’s colleagues, and such conversations may constitute concerted activity under the National Labor Relations Act.

The question remains, if your employees say something negative on Facebook about your company, their fellow employees or their supervisors, can you terminate without running afoul of the National Labor Relations Act?

The answer depends on the facts surrounding the post(s). The test is whether the employee is engaging in activity solely for himself or on behalf of other employees.

Continue reading »

Beware the Trojan Horse that is Social Media

Ruth Binger

By Ruth Binger



While establishing and maintaining an organizational presence on popular media websites and blogs (Facebook, LinkedIn, etc.), businesses need to be aware of the legend of Troy and its supposed downfall due to a Trojan Horse. Greek mythology states that Greek warriors concocted a scheme whereby they built a wooden horse and offered it as a gift to the Trojans. The Trojans, in their greed and arrogance, accepted the gift and brought it within their gates. Then, at night as the Trojans slept, the Greek warriors emerged from the belly of the Trojan horse and defeated the Trojans changing the course of a ten-year siege.

Today, a Trojan Horse is more often thought of as a destructive software program that disguises itself as a helpful application. Similarly, although social media may be helpful for your business, be aware what could be lying in the belly of that Trojan Horse.

Line Between Private vs. Public Blurred

According to the Socialnomics web site, Generation Y will outnumber baby boomers sometime this year and 90% of them have already joined an online social network. For many young people, and even 50 year-olds, the line between private and public has disappeared as they tweet, blog, text and share the minutiae of both their personal lives and everyone around them – including their employer. Social media users are under the mistaken assumption that they own the web content they are generating and can retrieve it and delete it if needed.

They are also under the mistaken impression that what they say is protected by some cocoon and that the content they generate is private. This is not true, as evidenced by a Detroit hospital worker who was terminated after she posted a comment on Facebook about a man she treated who was accused of killing a police officer. She was fired for violating strict patient privacy rules under the federal HIPAA law. A Massachusetts 54 year old high school teacher also learned this lesson when posting negative comments about her school community, students, and parents even though she had set the privacy setting on her Facebook account. Moreover, cases are clear that locking a profile from public access does not prevent discovery in litigation either.

Disclosure of Company Information at Risk

Given the fact that technology is moving so fast and disclosure is instantaneous, worldwide and permanent, companies need to train their employees on the dangers of purposeful or inadvertent disclosure of company information. What is at stake for the employer is the loss of confidential information and trade secrets, disclosure of protectable third party information or medical information, suits from other companies for disclosure of secrets, and discrimination suits. For instance, companies recruiting and hiring managers often use social media in order to obtain more information on a candidate than they otherwise could. Continue reading »

Mergers and Sales – Trade Secrets & Confidential Information

Ruth Binger

By Ruth Binger



Who Owns the Salesperson’s LinkedIn Account?

Owners/shareholders own businesses for many reasons, including selling the business at a value higher than the investment cost. However, when a business owner goes to sell his or her business and attempts to obtain the highest price available, it is important to understand where the value of that business lies and how to maximize that value to any potential buyer.

In many instances, a significant part of the business’s value is found in the intellectual property possessed by the employees.

Part of that intellectual property is found in the trade secrets and confidential information that the company develops to provide its services and products faster, cheaper, and better over time. A very critical component is the customer networks that its sales/marketing people developed over time.

Who owns those networks, especially LinkedIn, and the data associated with them? Continue reading »

Choosing a Trademark or Servicemark

David R. Bohm

By David R. Bohm



So, you’ve decided to open a new business, or your current business is set to begin offering a new product line or set of services. Now you need to decide what you are going to call this new business, product or service. In other words, what trademark or servicemark (collectively referred to herein as “mark”) are you going to adopt to identify your product? This was a question my father faced when he opened his first photo studio in 1942. He chose the name Rembrandt Portrait Studio. As will be explained in this article, this was a good choice.

A company wanting protection for a mark that it will use in interstate commerce will generally want to register it with the United States Patent and Trademark Office (“USPTO”). If the mark is only used in one state or a limited number of localities, a company may choose to register with a state trademark registry, or rely on common law protection (even unregistered marks may be entitled to some protection). A mark may not be registered if it (or a similar mark) is already in use to describe a competing product or service.

Continue reading »

Protecting Your Company’s Intellectual Property from Predation by Employees and Independent Contractors

David R. Bohm

By David R. Bohm



The success of a company in the technology sector is largely dependent upon its intellectual property, which, in turn, is derived from investment in human capital. It is the company’s employees (as used herein, the term “employee” will include independent contractors and contract employees) who develop software, invent new products or techniques, and generate other types of trade secrets and confidential information. Today, because employees are more mobile than ever, it is extremely important that businesses take precautions to keep their intellectual property from being utilized by an employee who goes to work for a competitor.

Patent and copyright law provide an entrepreneur some rights in relation to employees involved in developing patented or copyrighted material. Additionally, an entrepreneur has some common law rights in its trade secrets and confidential information. However, in order for a business to fully protect its interests in intellectual property developed and utilized by it, it is important to implement written agreements
that specifically address the rights of the business and its employees relative to such inventions and information.

Continue reading »