shoesMicrosoft Corp. and LinkedIn recently announced that Microsoft will soon acquire LinkedIn in a transaction valued at $26.2 billion – click here for the company’s announcement.

Under the deal, Microsoft will purchase LinkedIn’s shares at $196 each. If a share sale like this happened in Ontario, the identity of LinkedIn would not change – Microsoft would simply step in to the shoes of LinkedIn. Microsoft would inherit all employees and employment-related liabilities and obligations of LinkedIn after the deal closed.Continue Reading Microsoft Acquiring LinkedIn: What is the Employee Impact in a Share Transaction?

fire hydrantA blog post just in time for some downtime over the holiday – when can personal tweets become grounds for termination?  Some of you may remember when in August of 2013 Canadian news outlets were a-buzz with the termination of two Toronto Firefighters for sexist comments made on Twitter. For a media report on the details of the tweets and reactions, click here.

While the tweets were made off-duty, and not in reference to anything work related, management got involved partly because the Firefighters in question identified themselves as such on their Twitter profiles. The conduct was deemed to be in violation of employer policies, including their Social Media Policy, damaging to the reputation of Toronto Fire and ultimately worthy of termination.

Both individuals grieved their terminations, asking for their jobs back. These two cases are a good example of when tweets can amount to grounds for termination and when reinstatement may be ordered.
Continue Reading Tweeting Your Way to Termination

settlement by computerWill technology replace or merely enhance our abilities to achieve settlements?  Last week I spoke at an Osgoode Professional Development session on Settlement in the Digital Era: Essentials for Non-Techies.  My co-panelist was Colm Brannigan, a mediator very familiar with Online Dispute Resolution (ODR).  Colm and I have had some good discussions beforehand about how technology can assist the settlement process, whether an informal negotiation between parties or a formal court-ordered mediation.

Ultimately, despite the tech fan and early adopter in both of us, we realised that nothing can replace the human aspect of resolving most disputes beyond a traffic ticket.  For many people, they simply need to physically face their opposing party and ‘have their day in court’.  The emotions in our voice and on our face, the passion of our positions and the human needs that have to be addressed in dispute resolution cannot be completely replaced by technology.

But…. 
Continue Reading Does technology replace or enhance dispute resolution?

OPC BYOD GuidelinesI’ve written several posts about BYOD in the past, and continue to believe that for many workplaces, BYOD will be difficult if not impossible to resist. However, it won’t be news to anyone that BYOD raises a full array of privacy and security issues related to the potential blurring and blending of employee personal information and business/customer information on devices.

Recently, the Office of the Privacy Commissioner of Canada, along with the Alberta and British Columbia Information and Privacy Commissioners, have published guidelines to assist organizations considering or implementing BYOD policies.

While the publication does not introduce anything overly novel, it does provide a good roadmap in one document, a roadmap with quite a bit of weight if you are trying to prove your organization did its due diligence around implementing a prudent BYOD program.Continue Reading Privacy Commissioner’s BYOD Guidelines

On Wednesday, the Canadian federal government introduced Bill C-13, a ‘new’ cyberbullying bill to address the increasingly harmful effects of intimate images going viral online.  The cyberbullying proposals are part of a wider omnibus bill that amends a few acts, including the Criminal Code and Evidence Act. 

Many of the cyberbulling provisions are in

Last week, I conducted a workshop on implementing a successful “Bring Your Own Device” (BYOD) program at the Canadian Institute’s Privacy Law & Compliance Conference.  I met a wonderful group of privacy experts who had plenty to contribute to the discussion.

We talked about the benefits, risks and costs of permitting employees to use their personal device to perform work-related tasks, which typically includes accessing the company’s network.  Over half the group was in the public sector and regularly handled very sensitive, confidential personal information.

The private sector attendees in the group had an equally strong concern about protecting highly sensitive and confidential business information.  At the end of the day, most organizations, regardless of how open they may or may not be, require a certain level of security around their data, intellectual property and personal information.

So how to implement a successful BYOD program?

Continue Reading Implementing a Successful BYOD Program