Antitrust and Consumer Protection
Competition: Fall 2019, Vol 29, No. 2
Content
- Chair's Column
- Competitive Balance In Sports: "Peculiar Economics" Over the Last Thirty Years
- Compliance With the California Consumer Privacy Act In the Workplace: What Employers Need To Know
- Editor's Note
- Let Me Ride: No Short-cuts In the Antitrust Analysis of Ride Hailing
- Masthead
- Monopsony and Its Impact On Wages and Employment: Past and Future Merger Review
- Protecting Company Confidential Data In a Free Employee Mobility State: What Companies Doing Business In California Need To Know In Light of Recent Decisions and Evolving Workplace Technology
- The Complexities of Litigating a No-poach Class Claim In the Franchise Context
- Whistleblowing and Criminal Antitrust Cartels: a Primer and Call For Reform
- Social Media Privacy Legislation and Its Implications For Employers and Employees Alike
SOCIAL MEDIA PRIVACY LEGISLATION AND ITS IMPLICATIONS FOR EMPLOYERS AND EMPLOYEES ALIKE
By Robert B. Milligan, Daniel P. Hart and Sierra Chinn-Liu1
I. INTRODUCTION
According to the Pew Research Center, approximately seven-in-ten Americans use social media to connect with one another, engage with news content, share information and entertain themselves.2 YouTube and Facebook are the most widely used online platforms: these two platforms, respectively, are visited by 73% and 69% of Americans every day.3 Sites and applications such as Twitter, Instagram, LinkedIn, and SnapChat also garner substantial daily use.4
Social media clearly influences and permeates our daily livesâand the workplace is no exception. Companies frequently conduct business via social platforms, and employees often use social media on the job for both personal and work-related reasons.5 The pervasive use of social media, however, creates a tension between the rights of employees to personal privacy on the one hand, and the needs of companies on the other, to protect corporate intellectual property, comply with regulatory reporting requirements, guard against cyber threats, and maintain appropriate systems and data management practices.