Privacy in the Workplace
Privacy in the Workplace
Volume 72
Issue 1 Symposium on Generic Products Article 10
Liability
January 1996
Recommended Citation
Kevin J. Conlon, Privacy in the Workplace, 72 Chi.-Kent L. Rev. 285 (1996).
Available at: https://scholarship.kentlaw.iit.edu/cklawreview/vol72/iss1/10
This The Piper Lecture is brought to you for free and open access by Scholarly Commons @ IIT Chicago-Kent
College of Law. It has been accepted for inclusion in Chicago-Kent Law Review by an authorized editor of Scholarly
Commons @ IIT Chicago-Kent College of Law. For more information, please contact [email protected],
[email protected].
PRIVACY IN THE WORKPLACE
KEVIN J. CONLON*
INTRODUCTION
A. Federal Constitution
While the Constitution does not specifically recognize the right to
privacy, the Supreme Court has identified certain zones of privacy in
which government action is limited. 4 These zones of privacy only pro-
tect against intrusive state action. The Court has been reluctant to
find state action in the private sector,5 and consequently, private sec-
tor employees must look to statutory, case, and contract law for pro-
tection from intrusive employers.
B. State Constitutions
Several states have incorporated specific privacy guarantees into
their constitutions. 6 With the exception of California, these constitu-
tional provisions do not extend to employees in the private sector. 7 In
California, the courts have held that the state constitution prohibits all
intrusions into an individual's private matters unless the employer can
show a "compelling interest" that justifies the invasion. 8 The "com-
pelling interest" test has been applied to situations involving drug
4. See Griswold v. Connecticut, 381 U.S. 479 (1965) (The Griswold Court held that a Con-
necticut statute restricting the use of contraceptives by married couples was unconstitutional on
the ground that it impinged on matters "concem[ing] a relationship lying within the zone of
privacy created by several fundamental constitutional guarantees." Id. at 485. The Court based
its decision on the First, Third, Fourth, Fifth, and Ninth Amendments. See id. at 484.); see also,
Roe v. Wade, 410 U.S. 113, (1973) (The Court recognized an individual's general right to hold
certain private matters away from public scrutiny. In Roe, the Court enumerated those areas of
personal autonomy which deserve constitutional protection and subsequent courts have strictly
limited the right to privacy to these enumerated categories.).
5. See, e.g., Jackson v. Metropolitan Edison Co., 419 U.S. 345 (1974).
6. See, e.g., ALASKA CONsT. art. I, § 22; CAL. CONST. art. I, § 1; FLA. CONST. art. 1, § 23;
HAW. CONST. art. I, § 6; ILL. CONST. art. I, § 12; LA. CONST. art. 1, § 5: MoNT. CONST. art. II, § 9;
S.C. CONST. art. 1, § 10; WASH. CONST. art. I, § 7.
7. See, e.g., Bianco v. American Broad. Co., 470 F. Supp. 182, 186-87 (N.D. II1. 1979) (The
right to be secure against "unreasonable... invasions of privacy or interceptions of communica-
tions by eavesdropping devices or other means" as set forth in Article I, Section 6 of the Illinois
Constitution, is a limitation on governmental activity only.).
8. See Semore v. Pool, 266 Cal. Rptr. 280 (1990) (finding no compelling interest to justify
requiring an employee to take a "pupillary reaction test"); Wilkinson v. Times Mirror Corp., 264
Cal. Rptr. 194 (1989) (finding that an employer had a compelling interest in testing a job appli-
cant for drug use).
1996] PRIVACY IN THE WORKPLACE
C. Federal Statutes
The Electronic Communications Privacy Act of 1986 ("ECPA")
protects against the interception, disclosure, and intentional use of
wire and electronic communications by both private and public parties
absent prior judicial authorization. 10 The statute's protections apply
only if the interception is accomplished through the use of an "elec-
tronic, mechanical or other device."" Thus, an employer can listen to
an employee's conversation on an extension telephone without violat-
ing the statute. 12
The statute contains two sweeping exceptions relevant to the
workplace setting. The first is the prior consent exception which pro-
vides that the interception of oral, wire, or electronic communications
shall not be unlawful if one of the parties to the conversation has
given prior consent to the interception. 13 The "prior consent" excep-
tion has been interpreted narrowly in the employment context: con-
sent will rarely be implied 14 and cannot be given on behalf of the
9. See Luck v. Southern Pacific Transportation Co., 267 Cal. Rptr. 618 (1990) (upholding
the claim of a computer programmer who refused to take a urine test in a wrongful discharge
case); see also, Soroka v. Dayton-Hudson Corp., 1 Cal. Rptr. 2d 77 (1991) (The appellate court
reversed the lower court and held that the employer's interest in securing psychologically fit
applicants for important security positions was not compelling enough to justify asking highly
intrusive questions about the applicants' religion and sexual preferences on a job application.).
10. Pub. L. No. 90-351, 82 Stat. 212 (codified as amended at 18 U.S.C. §§ 2510-2520 (1988)).
11. 18 U.S.C. § 2511(1)(a)-(b).
12. See Briggs v. American Air Filter Co., 630 F.2d 414, 420 (5th Cir. 1980) (finding that
"[i]t is in the ordinary course of business to listen in on an extension phone for at least as long as
the call involves the type of information he fears is being disclosed").
13. 18 U.S.C. § 2511(2)(d).
14. See Deal v. Spears, 980 F.2d 1153, 1157 (8th Cir. 1992) (consent could not be implied
from the circumstances because no reasonable person would have consented to the taping of
conversations about their participation in a theft or their sexual activities); Watkins v. L.M.
CHICAGO-KENT LAW REVIEW [Vol. 72:285
Berry & Co., 704 F.2d 577, 581 (11th Cir. 1983) (knowledge of the capability of monitoring alone
cannot be considered implied consent).
15. The language and legislative history of § 2511(2)(d) make it clear that consent can only
be given by one of the parties to the communication. See S. Rep. No. 90-1097 (1968), reprinted
in 1968 U.S.C.C.A.N. 2112, 2182 (citing United States v. Pasha, 332 F.2d 193 (7th Cir. 1964)).
16. 18 U.S.C. § 2510(5)(a)(i).
17. Id.
18. See, e.g., Deal, 980 F.2d at 1157 (finding that an automatic tape recorder that is not
connected to the phone line does not fall under the exception).
19. See James v. Newspaper Agency Corp., 591 F.2d 579 (10th Cir. 1979) (upholding the
routine monitoring of customer service representatives).
20. See Watkins v. L.M. Berry & Co., 704 F.2d 577, 581 (lth Cir. 1983) (finding that an
actual consent to a policy of monitoring sales calls was not consent to the monitoring of private
calls except to the extent necessary to determine their nature).
21. See Briggs v. American Air Filter Co., 630 F.2d 414, 420 (5th Cir. 1980) (The court
found that the employer had acted in the ordinary course of business when it monitored em-
ployee phone calls made to a competitor. The following facts influenced the court's decision: (1)
the plaintiff admitted that the call was of a business, rather than a personal nature; (2) the super-
visor's act of surveillance was limited in purpose and time; and (3) the surveillance was not part
of a general practice of secret monitoring.).
22. See Watkins, 704 F.2d at 584 (permitting an employer to listen to a personal call for a
time sufficient to determine the call's nature, but no longer).
1996] PRIVACY IN THE WORKPLACE
D. State Statutes
Most states have enacted legislation prohibiting electronic moni-
toring and surveillance by private individuals. 23 The statutes generally
mirror their federal counterpart and include the prior consent and
business use exceptions. 24 In a handful of states, both parties to the
conversation must consent to the interception. 25 In all states, consent
can be express or implied.
In at least one state, the legislature amended the state anti-eaves-
dropping statute to allow more general telephone monitoring of em-
ployees.26 The statute would have permitted monitoring "for
educational, training or research purposes. '' 27 The statute so worded
would have given employers the right to monitor almost any phone
call for almost any reason. Fear of abuse prompted unions in the
state to campaign against the statute. The legislature responded by
amending the statute and limiting its applicability to "quality control
of marketing or opinion research or telephone solicitation. '28 From
the employee's perspective, state anti-eavesdropping statutes provide
very limited protection from overly intrusive monitoring practices.
E. Common Law
Since constitutional and statutory law provide limited privacy
protection to individuals at work, the discussion of worker privacy
rights has largely focused on common law privacy claims. The com-
mon law of privacy is comprised of four distinct causes of action: (1)
unreasonable intrusion into seclusion; (2) public disclosure of embar-
23. South Carolina is the only state without such legislation. See Kenneth A. Jenero &
Lynne D. Mapes-Riordan, Electronic Monitoring and the Elusive "Right to Privacy," 18 EM-
PLOYEE RELATIONS UJ.71, 94 (1992).
24. But see, Kansas, KAN. STAT. ANN. § 21-4001 (1995), and Rhode Island, R.I. GEN. LAWS
§ 11-35-21 (1994), whose statutes do not include a prior consent exception.
25. California, Delaware, Florida, Georgia, Illinois, Maryland, Massachusetts, Michigan,
Montana, New Hampshire, Pennsylvania, and Washington all require both parties' consent to
the monitoring. See CAL. PENAL CODE §§ 631(a), 632(a) (West 1996); DEL CODE ANN. tit. 11,
§ 1336(b) (1995); FLA. STAT. ch. 934.03(2)(d) (1995); GA. CODE ANN. § 16-11-66(a) (1996); 720
ILL. COMP. STAT. 5/14-2 (West 1993); MD. CODE ANN., Cts. & Jud. Proc. § 10-402(c)(3) (1995);
MASS. GEN. LAws ANN. ch. 272 § 99(B)(4) (West 1990); MICH. COMP. LAws ANN. § 750.539c
(West 1991); MONT.CODE ANN. § 45-8-213(c) (1995); N.H. REV. STAT. ANN. § 570-A:2 (1986);
18 PA. CONS. STAT. ANN. §§ 5703-04 (West 1995); WASH. REV. CODE ANN. § 9.73.030(1)(b)
(West 1988). Note, however, that many state courts have interpreted these statutory provisions
to only require one party's consent to the monitoring, despite the explicit statutory language to
the contrary. See e.g., People v. Beardsley, 503 N.E.2d 346, 350 (I11.App. Ct. 1986) (interpreting
the Illinois statute to require the consent of only one of the parties to the conversation).
26. See 720 ILL. COMP. STAT. ANN. 5/14-30) (West 1996).
27. Id,
28. 1996 Ill. Laws PA 89-452.
CHICAGO-KENT LAW REVIEW [Vol. 72:285
29. WILLIAM L. PROSSER, HANDBOOK OF THE LAW ON TORTS 802-18 (4th ed. 1976).
30. THE RESTATEMENT OF TORTS § 652B (1977), defines the tort of intrusion upon seclu-
sion as: "One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion
of another or his private affairs or concerns, is subject to liability to the other for invasion of his
privacy, if the intrusion would be highly offensive to a reasonable person."
31. See id.
32. See, e.g., Johnson v. Corporate Special Services, Inc., 602 So.2d 385, 386 (Ala. 1992)
(The court based its decision on whether the plaintiff should have anticipated an investigation
into his physical well-being after filing a worker's compensation claim.); Alabama Electric Co-
Operative v. Partridge, 225 So.2d 848, 851 (Ala. 1969) (finding that the plaintiff had a reduced
expectation of privacy after filing a personal injury claim and then balances that interest against
the employer's business interest in not paying a fraudulent personal injury claim).
33. Courts grant a great deal of deference to employer business interests, making it clear
that employees are not entitled to the same degree of privacy at work that they enjoy at home.
Employer interests play a clear role in defining what is "reasonable". Generally speaking, so
long as the monitoring is limited to job performance or related matters, courts will find that the
monitoring activity was not "highly offensive to a reasonable person." Some courts have even
read employer business interests to allow off-site monitoring of workers. See, e.g., Johnson v.
Corporate Special Services, Inc., 602 So.2d 385, 388 (Ala. 1992) (The court held that an em-
ployer's off-site surveillance of an employee who had filed a worker's compensation claim
against the employer did not violate the employee's privacy. The employer was found to have a
legitimate interest in determining the scope of the employee's injuries.).
34. Some would argue that electronic monitoring techniques are less intrusive than tradi-
tional monitoring techniques. For example, a hidden camera is less obtrusive than direct over-
sight by a supervisor. This argument, however, fails to recognize the pervasive and constant
19961 PRIVACY IN THE WORKPLACE
II. ANALYSIS
nature of electronic monitoring devices in the modem workplace which has a negative impact on
worker privacy interests.
35. Alan F. Westin, Privacy in the Workplace: How Well Does American Law Reflect Ameri-
can Values?, 72 Cm.-KErrr L. REV. 271 (1996).
36. Id. at 283.
37. See CWA Testimony, supra note 1 at 15.
38. Charles Piller, Bosses With X-Ray Eyes, MACWORLD, July 1993, at 123.
CHICAGO-KENT LAW REVIEW [Vol. 72:285
Thus far this Article has focused upon the inadequate protection
afforded by our current legal system to worker privacy interests. It is
clear that legal reform is necessary to guarantee that individual pri-
vacy interests are protected from overly intrusive electronic monitor-
ing devices. Because tort reform is a slow and unwieldy process,
change must come from the legislature. What follows is a list of the
reforms needed to protect individual privacy interests in the
workplace:
CONCLUSION
51. "DON'T BUG ME:" CONSUMER AND WORKER ACTION Krr TO PROTECT WORKPLACE
PRIVACY 4 (prepared by the Communications Workers of America).
STUDENT NOTES AND COMMENTS