Senators call for probe of employers seeking Facebook info
Move heats up debate over employers asking job seekers for passwords used for social networks like Facebook, Google+
Computerworld - Two U.S. senators are calling for a federal investigation into the growing trend of employers seeking access to the social network pages of job applicants.
Senators Richard Blumenthal and Charles E. Schumer posted an open letter on Monday, asking the U.S. Equal Employment Opportunity Commission (EEOC) and the U.S. Department of Justice (DOJ) to weigh in on the growing debate on personal privacy and the use of social networks to learn about job seekers.
It's been reported in recent weeks that an increasing number of employers are asking job applicants to hand over their social network user names and passwords to peruse personal information posted on sites like Facebook and Google+.
"Employers have no right to ask job applicants for their house keys or to read their diaries," Schumer said in a statement. "Why should they be able to ask them for their Facebook passwords and gain unwarranted access to a trove of private information about what we like, what messages we send to people, or who we are friends with?"
He added that as an ever increasing amount of personal information and social interactions are stored online, it's critical to make sure personal information is kept private.
"This is especially important during the job-seeking process, when all the power is on one side of the fence," said Schumer.
"Before this disturbing practice becomes widespread, we must have an immediate investigation into whether the practice violates federal law. I'm confident the investigation will show it does. Facebook agrees, and I'm sure most Americans agree, that employers have no business asking for your Facebook password," he added.
Late last week, Facebook warned employers of potential legal problems with seeking access to the Facebook accounts of workers.
"If you are a Facebook user, you should never have to share your password, let anyone access your account, or do anything that might jeopardize the security of your account or violate the privacy of your friends," wrote Erin Egan, Facebook's chief privacy officer in a blog post late last week. "As a user, you shouldn't be forced to share your private information and communications just to get a job."
Egan also noted that it's now a violation of Facebook's Statement of Rights and Responsibilities to share or solicit a Facebook password.
Facebook is prepared to take legal action in these kinds of cases, Egan added.
The American Civil Liberties Union (ACLU) also weighed in on the issue last week, saying employers asking employees or potential employees for access to their social networking accounts are out of line.
"People are entitled to their private lives," wrote ACLU attorney Catherine Crump in a blog post.
"You'd be appalled if your employer insisted on opening up your postal mail to see if there was anything of interest inside. It's equally out of bounds for an employer to go on a fishing expedition through a person's private social media account," she added.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts