Creative solutions may be risky, but the risks of leaving unlawful behavior unaddressed may be greater
Every employer knows the feeling. You know some inappropriate or illegal activity is taking place involving one or more of your employees. You or somebody else has observed just enough irregular behavior from employees who have given you just enough cause in the past to question their integrity to make you almost certain the company has a problem on its hands. But you are lacking that piece of firsthand evidence to justify taking action on your strong hunch without putting the company at risk. There is no specific victim to interview as there would normally be in a harassment scenario, and there are no witnesses.
Temptation to Snoop
A few targeted minutes looking through one or more employees’ e-mail activity might very well give you what to need. But when you go to confirm that the employee(s) you need to investigate have signed off on the company’s technology use policy consenting to the company’s accessing their electronic communications, you cannot find it. It was just one of those details that was not properly attended to at the time of initial hire, or in some other way it fell through the cracks.
Your training tells you there are risks to not having the proper documentation in place. That's where technology use policies came from in the first place, to provide the notice and consent needed to limit the company’s risks under federal and state wiretapping and stored communications laws.
For the first decade or so of those policies’ existence beginning in the mid- to late 1990s, there were few challenges to employers relying on those policies as a basis for searching employee e-mail. In recent years, though, it seems that courts have more closely scrutinized employers’ monitoring policies and practices. So there is risk to the company in charging into electronic investigation mode without proper policies and sign-offs in place.
Getting Law Enforcement Involved
As an initial matter, if there is criminal activity suspected, contacting law enforcement is likely a good first step. Make the laws regarding information gathering their problem. Law enforcement will have an entirely different set of tools at their disposal, as well as restrictions on their ability to utilize those tools, but the risk to the company of making a good faith report to law enforcement agencies is slight.



