Risk
6/18/2010
04:04 PM
50%
50%

Supreme Court Rules Employers Can Read Employee Texts

Provided there is a “legitimate work-related purpose,” the court supports the right of employers to review an employee's text messages.

The Supreme Court has ruled that employers may monitor employee conversations made via an employer-issued cell phone if there is a “legitimate work-related purpose” to do so.

In a ruling handed down Thursday, the court ruled unanimously that a police department in California did not violate privacy rights by monitoring text messages of an employee sent on a department-issued device.

A review of the messages of SWAT team officer Sgt. Jeff Quon after he exceeded his monthly service limits revealed personal and sexually explicit texts to both his wife and his mistress.

The police department of the city of Ontario conducted the review as part of an investigation into whether a character limit on the city’s contract with a company called Arch Wireless was “sufficient to meet the City’s needs,” according to the ruling.

Quon argued that the review violated his Fourth Amendment right to privacy, but the Supreme Court disagreed.

“Reviewing the transcripts was reasonable because it was an efficient and expedient way to determine whether Quon’s overages were the result of work-related messaging or personal use,” the Court’s opinion stated.

Officers at the police department were told that a certain amount of personal use on the devices was allowed, but that they should not expect total privacy because messages were all subject to auditing.

The ruling reversed ones in Quon’s favor by a district judge and the U.S. Court of Appeals for the 9th Circuit. It also sets a precedent for allowing employers to monitor cell-phone of employees if they feel they have just cause.

Still, the Court made it clear in its decision that it would make future decisions on a case-by-case basis and would exercise caution before giving employers blanket license to review such messages in the future.

“The Court must proceed with care when considering the whole concept of privacy expectations in communications made on electronic equipment owned by a government employer,” according to the opinion. “The judiciary risks error by elaborating too fully on the Fourth Amendment implications of emerging technology before its role in society has become clear.”

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-6093
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.0.x before 7.0.0.2 CF29, 8.0.x through 8.0.0.1 CF14, and 8.5.x before 8.5.0 CF02 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6196
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSp...

CVE-2014-7247
Published: 2014-11-25
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?