The job market continues to be volatile, and businesses are willing to take more risks to hire proven talent. That means taking the best people from their competition. Business owners therefore need to start preparing for when (not if) a key employee leaves to join a competitor.
Below are some ideas to help you prepare for a key employee’s potentially sensitive exit to a competitor and ensure your business is protected: begin preparing and setting up a plan of action so you are prepared to handle.
• Review current restrictive covenant and confidentiality agreements. This is particularly important right now because non-compete laws are changing in Illinois and in other states in the US.
• Update confidentiality agreements to require employees to submit information about their digital footprint on their personal devices, including making those devices available for a forensic review upon the employee’s exit.
• Consider implementing phantom equity programs or bonus plans.
• Evaluate your hybrid-work environment and focus on flexibility.
• Audit your IT protocols and ensure your most important data is being monitored and its confidentiality maintained.
• Limit which employees get access to sensitive information – gone are the days that every employee gets access to all your information.
When an employee leaves to join a competitor, employers should immediately take certain preliminary steps to identify possible wrongdoing:
• Preserve the employee’s email and activity logs. This data is often auto deleted unless you place a hold on the information.
• Review emails sent to personal email addresses.
• Review all emails sent with attachments.
• Review activity logs.
• Preserve any devices used by the employee.
• Conduct an internal investigation to determine if there has been any other unusual activity.
• Retain a computer forensic expert.
Once these preliminary steps are completed, consider sending a cease-and-desist letter to the former employee and the new employer to ensure any damage is contained. Depending on the circumstances, filing a lawsuit (including seeking immediate injunctive relief) may offer the best protection for your business.
The attorneys at Levin Ginsburg can help businesses prepare for and react to the departure of key employees so that any impact is mitigated. For additional help navigating these issues, feel free to contact Walker R. Lawrence, a partner in the employment law practice at Levin Ginsburg, at firstname.lastname@example.org, or (312) 368-0100.
An Employer Can Be Liable for Accessing an Employee’s Personal Email Even if the Employee Engaged in Misconduct
Over the last several years, communication via email and text has become commonplace in the workplace. Oftentimes, employees use one device for both personal and work-related communication regardless of whether that device is employee-owned or employer-provided. There is no doubt that employers may have legitimate business reasons for monitoring employee communications. For example, an employee may leave the company and the employer is concerned that she has taken confidential information or illegally solicited clients. Employers feel entitled to review data stored on employer-provided, particularly where employees are instructed that the company owns the devices and has the right to monitor the data. As a general rule, the law supports employers here. An employer’s zeal to snoop, however, may subject it to both civil and criminal penalties under both federal and state statutes.
The Electronic Communication Privacy Act (ECPA) and the Stored Communications Act (SCA) both govern an employer’s ability to review electronic communications. The ECPA prohibits the interception of electronic communications, and the term “interception” as used in the ECPA has been interpreted narrowly. The SCA makes it illegal to “access without authorization a facility through which electronic communication service is provided,” making it illegal to obtain access to certain communications in electronic storage. With regard to an employer’s review of employee emails sent through web-based email accounts like Gmail or Hotmail, the most frequent scenario is where the former employer is able to access the former employee’s web-based email account because the employee saved his username and password on a device provided by the employer. In these cases, courts have typically sided with the former employee and have been reluctant to punish the former employee for failing to take appropriate steps to secure their own personal information and allegedly private communications. The former employee’s own negligence in securing personal data is not a defense for the employer.
Bottom line – an employer should seek advice before accessing an employee’s personal email account without authorization even though it has the ability to do so.
For more information on this topic please contact:
Howard Teplinsky at:
312-368-0100 or email@example.com.