1 00:00:00,440 --> 00:00:03,160 Speaker 1: Heather do for Cellen, Right, how about this. If you 2 00:00:03,240 --> 00:00:05,760 Speaker 1: have a habit of using colorful language or slagging people 3 00:00:05,760 --> 00:00:07,960 Speaker 1: off in your work emails or your work chat on 4 00:00:08,000 --> 00:00:09,799 Speaker 1: the phone, you better be careful because your boss might 5 00:00:09,800 --> 00:00:12,200 Speaker 1: be able to see more than you think too. Ministry 6 00:00:12,200 --> 00:00:14,520 Speaker 1: of Justice staff has got in a bit of trouble 7 00:00:14,560 --> 00:00:17,599 Speaker 1: for calling an academic the B word in some Microsoft 8 00:00:17,600 --> 00:00:20,560 Speaker 1: Teams messages that have now been made public under the 9 00:00:20,600 --> 00:00:23,520 Speaker 1: Official Information Act. Joe Williams is an employment lawyer at 10 00:00:23,560 --> 00:00:26,880 Speaker 1: Duncan Coltrol And with us. Now, hey, Joe, he are 11 00:00:26,920 --> 00:00:29,760 Speaker 1: you very well? Thank you? Now for the purposes of 12 00:00:29,800 --> 00:00:33,280 Speaker 1: this discussion, my boss pays for my phone and gives 13 00:00:33,360 --> 00:00:35,559 Speaker 1: me the device, Can he read my emails? 14 00:00:37,120 --> 00:00:42,520 Speaker 2: In a word, yes, unless there's an agreement otherwise. Essentially 15 00:00:42,760 --> 00:00:45,760 Speaker 2: the work owns the device, they pay for it, so 16 00:00:45,800 --> 00:00:49,000 Speaker 2: they're entitled to access it just as any other. 17 00:00:48,840 --> 00:00:51,239 Speaker 1: Tool of trade without telling me. 18 00:00:53,600 --> 00:00:58,640 Speaker 2: I think you'll often see workplaces in terms of delivering 19 00:00:58,680 --> 00:01:00,880 Speaker 2: these devices to staff giving them to you that there 20 00:01:00,880 --> 00:01:05,160 Speaker 2: will be some expectations setting around that. But ultimately you 21 00:01:05,240 --> 00:01:07,679 Speaker 2: have to assume, yes, that there's going to be fair 22 00:01:07,680 --> 00:01:11,920 Speaker 2: game for employers accessing essentially devices that they own and 23 00:01:12,000 --> 00:01:15,280 Speaker 2: data that they own, again, unless there's been in agreement otherwise, 24 00:01:15,560 --> 00:01:18,039 Speaker 2: or if there's been particular areas of the device carved 25 00:01:18,040 --> 00:01:19,040 Speaker 2: out that are private. 26 00:01:19,440 --> 00:01:21,679 Speaker 1: What about if you are running on your work supply 27 00:01:21,840 --> 00:01:25,160 Speaker 1: device a private Gmail account, can they access that? 28 00:01:26,160 --> 00:01:28,120 Speaker 2: Yeah, so this is an interesting one, and I can 29 00:01:28,160 --> 00:01:30,760 Speaker 2: say I've done this as well on my work devices, 30 00:01:30,760 --> 00:01:34,399 Speaker 2: as I think a lot of people do. In terms 31 00:01:34,440 --> 00:01:37,840 Speaker 2: of an employer going into your personal Gmail accounts and 32 00:01:37,880 --> 00:01:40,200 Speaker 2: things like that, I think that potentially would be seen 33 00:01:40,240 --> 00:01:43,360 Speaker 2: as invasive. But the simple point is if you want 34 00:01:43,400 --> 00:01:45,840 Speaker 2: to make sure it doesn't happen, then just be a 35 00:01:45,840 --> 00:01:48,680 Speaker 2: bit guarded about your own data privacy and be logging 36 00:01:48,720 --> 00:01:52,520 Speaker 2: out of those accounts on work devices. Ultimately, you don't 37 00:01:52,560 --> 00:01:55,480 Speaker 2: own them. You can't be in total control of who 38 00:01:55,600 --> 00:01:57,880 Speaker 2: is going to access the stuff that is on them. 39 00:01:58,000 --> 00:02:01,320 Speaker 1: But Joe, you're making it sound like they are able 40 00:02:01,400 --> 00:02:06,440 Speaker 1: to access things remotely, like potentially while you're not aware 41 00:02:06,640 --> 00:02:09,239 Speaker 1: they are logging on and going through your apps. Is 42 00:02:09,680 --> 00:02:10,200 Speaker 1: that what's up? 43 00:02:11,480 --> 00:02:13,440 Speaker 2: I think it would depend a bit on the capabilities 44 00:02:13,440 --> 00:02:17,280 Speaker 2: of a business. So you know, large corporates with sophisticated 45 00:02:17,320 --> 00:02:21,240 Speaker 2: IT teams, you know, I wouldn't be surprised. And often 46 00:02:21,280 --> 00:02:24,040 Speaker 2: there's a very good reason for having you know, an 47 00:02:24,040 --> 00:02:26,440 Speaker 2: I T team remote onto someone's device to help them 48 00:02:26,440 --> 00:02:30,480 Speaker 2: out with an I issue. For example, smaller smaller businesses 49 00:02:30,520 --> 00:02:34,360 Speaker 2: where you're talking giving a small teams and funds to 50 00:02:34,440 --> 00:02:36,600 Speaker 2: use and things like that, I'd say it's less likely 51 00:02:36,639 --> 00:02:40,440 Speaker 2: to be that active monitoring. But ultimately, if the employer 52 00:02:40,440 --> 00:02:42,480 Speaker 2: owns the device, they do have an entitlement to the 53 00:02:42,560 --> 00:02:43,239 Speaker 2: data that from it. 54 00:02:43,560 --> 00:02:46,800 Speaker 1: Fascinating, Okay, so that would mean basically that it's everything 55 00:02:46,800 --> 00:02:48,520 Speaker 1: that you do on your device, right, It's if you're 56 00:02:48,560 --> 00:02:51,160 Speaker 1: sending text messages, they'd be able to see if you're 57 00:02:51,200 --> 00:02:54,800 Speaker 1: accessing websites like porn, they'd be able to see that stuff, 58 00:02:54,800 --> 00:02:55,320 Speaker 1: wouldn't they. 59 00:02:56,639 --> 00:03:00,360 Speaker 2: I mean, to a degree the porn questions interesting, I'd 60 00:03:00,360 --> 00:03:03,120 Speaker 2: say yes, and it's probably never a good idea in 61 00:03:03,160 --> 00:03:04,680 Speaker 2: the first place to be doing that sort of thing 62 00:03:04,800 --> 00:03:08,840 Speaker 2: on a work device. But in terms of private text messages, 63 00:03:08,880 --> 00:03:11,079 Speaker 2: I mean, there is a line there in terms of 64 00:03:11,600 --> 00:03:15,440 Speaker 2: a reasonable expectation of privacy, and again there's been a 65 00:03:15,520 --> 00:03:19,280 Speaker 2: degree to which an employer would be criticized for intruding 66 00:03:19,320 --> 00:03:23,280 Speaker 2: into that. But again, the simple messages if you don't 67 00:03:23,280 --> 00:03:26,000 Speaker 2: want to have to deal with the situation where that's happened, 68 00:03:26,880 --> 00:03:28,960 Speaker 2: just be a bit guarded about your data privacy in 69 00:03:29,000 --> 00:03:30,639 Speaker 2: the first place, and you won't get into hot. 70 00:03:30,520 --> 00:03:32,880 Speaker 1: Water fascinating stuff. Joe, thank you very much. I really 71 00:03:32,880 --> 00:03:36,480 Speaker 1: appreciate it. Joe William's employment lawyer at Duncan Control. For 72 00:03:36,600 --> 00:03:40,200 Speaker 1: more from Hither Duplessy Allen Drive, listen live to news talks. 73 00:03:40,200 --> 00:03:43,400 Speaker 2: It'd be from four pm weekdays, or follow the podcast 74 00:03:43,480 --> 00:03:44,520 Speaker 2: on iHeartRadio.