Filed 11/4/13 Redeker v. Collateral Specialists CA1/4
NOT TO BE PUBLISHED IN OFFICIAL REPORTS
California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
or ordered published for purposes of rule 8.1115.
IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
FIRST APPELLATE DISTRICT
DIVISION FOUR
JAMES A. REDEKER,
Plaintiff and Appellant,
A136291
v.
COLLATERAL SPECIALISTS INC., (Marin County
Super. Ct. No. CIV1100779)
Defendant and Respondent.
Plaintiff James A. Redeker brought this case against his former employer,
Collateral Specialists Inc. (CSI), for wrongful termination in violation of public policy
and Labor Code section 1102.5, unfair business practices, and invasion of privacy. In
this appeal, he challenges the trial court’s order granting CSI summary judgment. We
affirm summary adjudication of Redeker’s claim for invasion of privacy, but we reverse
summary adjudication of his other three claims.
I.
FACTUAL AND PROCEDURAL
BACKGROUND
CSI provides services to banks and other lenders by inspecting collateral used to
secure loans. The inspections are performed by field representatives, whom CSI
classifies as independent contractors. Beginning in December 2007, CSI employed
Redeker as Operations Manager, and his duties included assigning work to field
representatives. Redeker reported to Kevin Power, CSI’s Vice President of Operations.
1
James Jennings (J. Jennings) was President of CSI and co-owned the company with Brian
Jennings (B. Jennings), the Executive Vice President.
Redeker came to believe that CSI’s classification of the field representatives as
independent contractors, rather than employees, might be wrong. In November 2009, he
met with Power and J. Jennings to discuss his concern. The meeting’s participants recall
the event differently. J. Jennings testified that he told Redeker CSI was aware of various
state laws governing employee classification, that CSI made every effort to comply with
those laws, and that an IRS audit had confirmed CSI was properly classifying the field
representatives. J. Jennings and Power testified that they left the meeting believing
Redeker’s concerns had been resolved. According to Redeker, however, J. Jennings
acknowledged that CSI’s compliance was questionable and stated that reclassifying the
field representatives as employees would be too expensive. J. Jennings said that CSI was
legally protected, notwithstanding the company’s questionable compliance, because the
field representatives contractually agreed to be independent contractors and CSI exploited
“loopholes” in state laws. In the month following the meeting, Redeker received a pay
raise.
Redeker continued to spend time on the classification issue. On January 26, 2010,
he wrote a long e-mail to Power memorializing his version of the November meeting. In
it, he stated that he had further researched the classification issue and had contacted
officials in three states to discuss CSI’s compliance. He also urged CSI to research state
laws further to ensure that it was acting legally. Redeker conveyed his concerns to CSI’s
outside counsel, Gabriel Levine.
Power found the January 26 e-mail to be “really negative” and “kind of shocking,”
since he had believed the issue was resolved. Upon receiving the e-mail, he forwarded it
to the Jenningses, who decided to review Redeker’s other e-mails on the corporate
servers.
In reviewing Redeker’s e-mails, CSI discovered that Redeker had forwarded an
electronic file containing a list of CSI’s field representatives (the field-representatives
file) from his work e-mail account to his personal e-mail account in early January. CSI
2
considered the list of field representatives important and confidential: J. Jennings
testified that it was one of CSI’s “two most prized possessions,” along with the
company’s customer list. In a confidentiality agreement that Redeker had signed after
CSI hired him, he agreed to “not, except in performing [his] duties, remove or copy any
confidential information or materials . . . without [CSI]’s written permission.”
Redeker had obtained the field-representatives file in December 2009 while he
was working on a different project he had undertaken without CSI’s direction or
permission. In that project, Redeker used the file to check the names of field
representatives against names in publicly available sex-offender databases. The field-
representatives file had been sent to Redeker at his request by CSI’s information
technology manager. The day he received the file, Redeker and another employee, Lynda
Harrison, began checking the names on the list against names in the sex-offender
databases. Later that day, Redeker e-mailed Power, who was on vacation, to notify him
that the search had resulted in three matches.
On January 5, after Power had returned from vacation, Redeker again e-mailed
Power to tell him that there were three matches with about half the list checked. The next
day, at 8:27 a.m., Redeker e-mailed Power again and asked whether Redeker and
Harrison should keep checking to finish the list. In that e-mail, Redeker noted that CSI
had deactivated one of the three field representatives whose names were included in the
sex-offender databases, but that the other two continued to receive assignments.
At 10:51 a.m., Power responded, “Let’s hold off until I have discussed the
situation with the Jennings [sic]. I’ll get back to you next week.” The parties agree that
Power and Redeker then had a conversation about the project later the same day, but they
disagree about what was said. Power says he told Redeker to stop the search. Redeker
says that Power agreed to let him work on the project at home that evening.
At 4:00 p.m., Redeker e-mailed Power again. He thanked Power “for handling
these very sensitive issues with others in CSI’s senior management team.” He also wrote,
“I recognize the need to discuss and fully evaluate at the appropriate time the critical
business issue of background checking, but why would CSI not want to immediately
3
deactivate the other two reps who we’re pretty sure are convicted criminals?” He
expressed concern that CSI was still sending the remaining two field representatives out
on jobs, although he recognized that it was Power’s decision to make. At 4:47 p.m.,
Redeker e-mailed the field-representatives file to his personal e-mail account.
The next morning, on January 7, Power responded to Redeker’s 4:00 p.m. e-mail
from the previous day: “I agree, I actually spoke to [the Jenningses] yesterday and Brian
will be deactivating these reps today . . . . I have spoken to [Harrison] and she will
continue checking the remainder of our reps. We will be doing a search on all newly
added reps and we will set up an annual process as well. [¶] Thank you for your efforts,
they are greatly appreciated.”
The review of Redeker’s e-mails revealed two other notable exchanges. In the
first, Redeker told a new employee that “CSI isn’t concerned that it provides sex offender
convicted felons to work for customers,” citing the fact that only one of the three field
representatives whose names were included in the sex-offender databases had been
deactivated. In the second, Redeker sent Harrison a link to a book excerpt “about the
Death Spiral and weakening of the organizational immune system,” asking that she “let
[him] know if [she had] ever seen such anywhere in real life.” Both Jenningses testified
that these e-mails actually played little, if any, role in the decision to terminate Redeker.
On the morning of March 15, 2010, Redeker used his CSI computer to send an e-
mail from his personal account to his own attorney, seeking advice about the
classification issue and expressing concern about possible retaliation. Later that day, his
employment with CSI was terminated. The termination letter stated that the reasons for
termination “include[d Redeker]’s disparagement of [CSI] to other employees, and [his]
removal of highly confidential and proprietary information from company property
without permission, in violation of [CSI’s] policies and [his] Confidentiality Agreement.”
Redeker brought suit against CSI. CSI moved for summary judgment or, in the
alternative, summary adjudication of his claims. The trial court granted CSI’s motion for
summary judgment on all claims, and Redeker timely appealed.
4
II.
DISCUSSION
A. Standard of Review.
In this appeal, Redeker challenges the summary judgment entered against him.
The standard for reviewing a grant of summary judgment is well-established. Summary
judgment is appropriate if “there is no triable issue as to any material fact and . . . the
moving party is entitled to judgment as a matter of law.” (Code Civ. Proc., § 437c,
subd. (c).) Our review of the record is de novo. (Miller v. Department of Corrections
(2005) 36 Cal.4th 446, 460.) We “liberally constru[e] the evidence,” including drawing
all reasonable inferences from it, in favor of the nonmoving party, and “resolv[e] doubts
concerning the evidence” in that party’s favor as well. (Id. at pp. 460, 470.) We are also
mindful that “many employment cases present issues of intent, and motive, . . . issues not
determinable on paper. Such cases . . . are rarely appropriate for disposition on summary
judgment.” (Nazir v. United Airlines, Inc. (2009) 178 Cal.App.4th 243, 286.) “If
summary judgment was properly granted on any ground,” however, “we must affirm
regardless of whether the court’s reasoning was correct.” (Jackson v. Ryder Truck
Rental, Inc. (1993) 16 Cal.App.4th 1830, 1836.)
B. Summary Adjudication of the Two Wrongful Termination
Claims Was Improper.
1. The legal standards governing the wrongful
termination claims.
Redeker brought two direct claims for wrongful termination. The first, wrongful
termination in violation of public policy, requires him to show that his termination
“violate[d] fundamental principles of public policy.” (Tameny v. Atlantic Richfield Co.
(1980) 27 Cal.3d 167, 170.) In order for a public policy to be sufficient to support a
Tameny claim, the policy “must be: (1) delineated in either constitutional or statutory
provisions; (2) ‘public’ in the sense that it ‘inures to the benefit of the public’ rather than
serving merely the interests of the individual; (3) well established at the time of the
discharge; and (4) substantial and fundamental.” (Stevenson v. Superior Court (1997)
16 Cal.4th 880, 894.) In addition, there must be a sufficient “nexus” between the adverse
5
action and the violation of public policy. (Turner v. Anheuser-Busch, Inc. (1994)
7 Cal.4th 1238, 1258.) The nexus requirement is generally satisfied when an employer
retaliates against the employee in violation of the policy. (3 Witkin, Summary of Cal.
Law (10th ed. 2005) Agency and Employment, § 250, pp. 325-326.)
Redeker’s second cause of action is for wrongful termination in violation of Labor
Code section 1102.5,1 which prohibits retaliation against employees who engage in
whistleblowing and related activities. Under subdivision (b), “[a]n employer may not
retaliate against an employee for disclosing information to a government or law
enforcement agency, where the employee has reasonable cause to believe that the
information discloses a violation of state or federal statute, or a violation or
noncompliance with a state or federal rule or regulation.” Under subdivision (c), “[a]n
employer may not retaliate against an employee for refusing to participate in an activity
that would result in a violation of state or federal statute, or a violation or noncompliance
with a state or federal rule or regulation.”2
Claims for retaliatory termination in violation of public policy or under section
1102.5 are both analyzed under the burden-shifting framework of McDonnell Douglas
Corp. v. Green (1973) 411 U.S. 792. (Loggins v. Kaiser Permanente Internat. (2007)
151 Cal.App.4th 1102, 1108-1109 [retaliatory termination in violation of public policy];
Akers v. County of San Diego (2002) 95 Cal.App.4th 1441, 1453 [section 1102.5].) First,
the plaintiff must establish a prima facie case by showing “ ‘(1) he or she engaged in a
“protected activity,” (2) the employer subjected the employee to an adverse employment
action, and (3) a causal link between the protected activity and the employer’s action.’ ”
(Loggins at p. 1109; see Akers at p. 1453.) The employer must then present evidence that
it had “a legitimate, nonretaliatory reason for the adverse employment action.” (Akers at
1
Unless otherwise noted, all further statutory references are to the Labor Code.
2
Redeker also pleaded a violation of section 1102.5, subdivision (a), which prohibits the
enactment or enforcement of policies against employees’ disclosure of information to
government agencies. The parties and the trial court did not consider the applicability of
this subdivision when litigating the motion for summary judgment, and we accordingly
express no opinion whether it may be a basis for liability.
6
p. 1453; see Loggins at p. 1109.) The burden then shifts “back to the employee to
provide ‘substantial responsive evidence’ that the employer’s proffered reasons were
untrue or pretextual.” (Loggins at p. 1109; see Akers at p. 1453.)
The order of proof under McDonnell Douglas, supra, 411 U.S. 792 shifts
somewhat when an employer brings a motion for summary judgment. (Wills v. Superior
Court (2011) 195 Cal.App.4th 143, 160.) In this context, the employer must “either
(1) negate an essential element of [the employee]’s prima facie case . . . or (2) establish a
legitimate, [nonretaliatory] reason for” the adverse employment action. (Ibid.) If the
employer makes the required showing, the employee must then offer “substantial
evidence” of pretext or intentional discrimination. (Ibid.)
CSI moved for summary adjudication of the second cause of action (the § 1102.5
claim) on the ground that the company had legitimate nonretaliatory reasons for the
termination that Redeker could not show were pretextual. CSI asserted the first cause of
action (the Tameny claim) was predicated on a violation of the policy embodied in
section 1102.5 and failed because the second cause of action failed.3
2. There is a dispute of material fact whether CSI’s claim
that Redeker violated his confidentiality agreement
was a pretext for his termination.
To demonstrate that an employer’s proffered reason for terminating an employee
is pretextual, the employee may show that “the proffered reason had no basis in fact, the
proffered reason did not actually motivate the discharge, or, the proffered reason was
insufficient to motivate the discharge.” (Hanson v. Lucky Stores, Inc. (1999)
74 Cal.App.4th 215, 224.) The employer’s “true reasons need not necessarily have been
wise or correct. [Citations.] While the objective soundness of an employer’s proffered
reasons supports their credibility [citation], the ultimate issue is simply whether the
employer acted with a motive to discriminate illegally.” (Guz v. Bechtel National, Inc.
3
We take no position on whether the parties and trial court correctly assumed that
Redeker’s first and second causes of action are governed by the same analysis, but we
accept that any distinctions are inconsequential for purposes of resolving this appeal.
7
(2000) 24 Cal.4th 317, 358, italics omitted; see also King v. United Parcel Service, Inc.
(2007) 152 Cal.App.4th 426, 436 [“It is the employer’s honest belief in the stated reasons
for firing an employee and not the objective truth or falsity of the underlying facts that is
at issue in a discrimination case”].)
The trial court concluded that CSI had offered evidence of a legitimate
nondiscriminatory reason for terminating Redeker—that he violated his confidentiality
agreement by sending the field-representatives file to his personal e-mail account when
he lacked permission to continue the search for sex offenders—and that the e-mails
between Redeker and Power regarding the sex-offender issue supported CSI’s contention
that Redeker lacked permission to continue the search.4 According to the court,
Redeker’s testimony that he had permission to take the list and continue the search was
“by itself . . . not sufficient to raise a triable issue that the reason for his termination was
pretextual,” and he had offered no other evidence that CSI’s proffered reason should not
be believed.
We conclude that there is an issue of material fact whether Redeker had
permission to continue the search. According to Redeker, he and Power spoke in person
between Power’s 10:51 a.m. e-mail and Redeker’s 4:00 p.m. e-mail, and during this
conversation Power gave him permission to continue the search. Assuming, as we must,
that this is true, we conclude that Redeker’s comment in the 4:00 p.m. e-mail that he
4
The trial court believed that section 1102.6 required CSI “to prove a legitimate reason
for termination . . . by the higher standard of ‘clear and convincing evidence.’ ” We
disagree. Section 1102.6 provides that in an action under section 1102.5, “once it has
been demonstrated by a preponderance of the evidence that an activity proscribed by
[s]ection 1102.5 was a contributing factor in the alleged prohibited action against the
employee, the employer shall have the burden of proof to demonstrate by clear and
convincing evidence that the alleged action would have occurred for legitimate,
independent reasons even if the employee had not engaged in activities protected by
[s]ection 1102.5.” Section 1102.6’s clear-and-convincing standard applies only when it
has been proven that retaliation was a “contributing factor” to the employee’s dismissal,
and the employer would have taken the adverse action even if retaliation had not been a
motive. Section 1102.6 is inapplicable in this case because it has never been determined
or conceded that retaliation was a “contributing factor” to Redeker’s termination.
8
“recognize[d] the need to discuss and fully evaluate at the appropriate time the critical
business issue of background checking” is not necessarily an acknowledgement by
Redeker that he needed to stop working on the project immediately. Instead, the
comment can be read as a recognition that it would take time for CSI to formulate a
policy going forward for dealing with background checks. As a result, a genuine
question of material fact exists even if Power did not authorize the search between 4:00
p.m. (when Redeker sent the e-mail) and 4:47 p.m. (when Redeker sent the field-
representatives file to his personal e-mail account).
It is also possible to harmonize Power’s January 7 e-mail to Redeker with
Redeker’s version of events. The trial court reasoned that it would have been
unnecessary for Power to state that he had spoken to the Jenningses and that “Brian will
be deactivating these reps today” if, as Redeker testified, Power had already told Redeker
that B. Jennings had deactivated one of the three field representatives. But given
Redeker’s stated concern in the 4:00 p.m. e-mail that two field representatives remained
active, Power’s statement can be read as referring to them, not to all three field
representatives. In addition, Power’s telling Redeker that B. Jennings had deactivated a
representative does not necessarily mean that Power told Redeker he had discussed with
both Jenningses how to deal with the sex-offender issue going forward.
The trial court also believed that if Power had agreed to let Redeker continue the
search, “there would [have been] no need for Power to inform [Redeker] that he was
assigning [Harrison] that task,” and that “Power would reasonably have directed
[Redeker] to stop his search now that [Power had] assigned the task to [Harrison].” But
this goes too far in interpreting the exchange in CSI’s favor. Power’s informing Redeker
that Harrison “will continue checking the remainder of our reps” does not necessarily
require an interpretation that Redeker was being directed to stop working on the project.
Moreover, it is possible that Harrison was assigned the task after Power gave Redeker
permission to continue the search but before Power sent his e-mail the next day. As a
result of these possibilities, we conclude that there is an issue of material fact whether
9
Redeker had permission to continue the search when he e-mailed the file to himself and
thus whether he violated his confidentiality agreement.
CSI contends that J. Jennings had a good-faith belief that Redeker violated his
confidentiality agreement, and this is sufficient to preclude Redeker from showing that
CSI’s proffered reason for terminating Redeker was pretextual. We agree that Redeker
did not satisfy his burden of showing pretext simply by showing that he might not have
violated his confidentiality agreement. “[The employer’s] true reasons [for the
termination] need not necessarily have been wise or correct. [Citations.]” (Guz v.
Bechtel National, Inc., supra, 24 Cal.4th at p. 358.) We conclude, however, that Redeker
has introduced sufficient evidence to raise a genuine issue whether the asserted reason for
his termination was a pretext.
To begin with, the evidence shows that Redeker was terminated within weeks of
his sending the January 26 e-mail. The temporal proximity between an employee’s
protected activity and an adverse employment action may support an inference of
retaliation (Flait v. North American Watch Corp. (1992) 3 Cal.App.4th 467, 479),
although timing “alone is not sufficient to raise a triable issue as to pretext once the
employer has offered evidence of a legitimate, nondiscriminatory reason for the
termination.” (Arteaga v. Brink’s, Inc. (2008) 163 Cal.App.4th 327, 353, italics added.)
Still, timing may well be a relevant factor in establishing pretext, particularly where, as
here, the employee has a good performance record before engaging in the protected
activity. (See ibid.)
CSI argues that the timing of Redeker’s termination does not suggest pretext
because Redeker first raised his concerns about the classification issue soon after he
began working, but he was not monitored or terminated until months later. As Power
acknowledged, however, the January 26 e-mail “changed the tone” of the classification
issue. The January 26 e-mail was apparently the first time Redeker disclosed to his
employer that he was so concerned about the issue that he had been discussing it with
government agencies—a protected activity under section 1102.5. The resulting review of
Redeker’s e-mails, and Redeker’s termination within weeks of the January 26 e-mail,
10
lends credence to the possibility that CSI’s proffered reason for the termination was a
pretext.5
Additional evidence supporting a possible inference of pretext is the
uncontroverted fact that CSI began monitoring Redeker’s e-mail because Redeker sent
the January 26 e-mail to Power. It is possible to infer that CSI reviewed Redeker’s e-
mails because it “was engaged in a search for a pretextual basis for [termination], which
in turn suggests that the subsequent [termination] imposed was for purposes of
retaliation.” (See Yanowitz v. L'Oreal USA, Inc. (2005) 36 Cal.4th 1028, 1062.) While
the monitoring may have been reasonable and nonretaliatory, it was not necessarily so.
CSI has not introduced any evidence that it monitored other employees’ e-mail. In fact,
J. Jennings testified that he could not recall any such surveillance of any other employee.
Finally, CSI’s failure to investigate Redeker’s alleged misconduct revealed by the
e-mails also raises the possibility that the stated reason for the termination was a pretext.
CSI contends that J. Jennings honestly believed Redeker lacked permission to continue
the sex-offender search based on his review of the e-mails between Redeker and Power,
and that J. Jennings did not know about any permission that Power may have given
Redeker to continue the search. Redeker disputes CSI’s contention that Power was not
involved in the termination decision, citing evidence that Power and the Jenningses met
daily for discussions. But even if we assume that J. Jennings never spoke to Power about
whether Redeker had permission to continue the search, the decision to fire Redeker
without getting more information could be suggestive of possible pretext. (See Nazir v.
United Airlines, Inc., supra, 178 Cal.App.4th at p. 280 [“An employer’s failure to
5
In contrast, the timing between Redeker’s March 15 e-mail to his attorney and his
termination is not suggestive of pretext based on the evidence currently before us.
Redeker has offered no proof (except the timing itself) to contradict CSI’s evidence that it
did not monitor e-mails sent on its system from his personal account. In subsequent
proceedings Redeker may be able to present evidence showing that CSI terminated him
in part because of the e-mail to his attorney, but we do not rely on that e-mail’s timing in
concluding that there is an issue of material fact whether CSI’s stated reason for the
termination was a pretext.
11
interview witnesses for potentially exculpatory information evidences pretext”].) CSI
contends that J. Jennings had no reason to investigate, because he was unaware that
Redeker claimed he had permission to continue the search, and the e-mail evidence
established he did not. But as discussed above, the e-mail exchange between Redeker
and Power does not foreclose the conclusion that Redeker was given permission to
continue the search. This evidence creates a triable issue whether the perceived violation
of the confidentiality agreement was the true reason for Redeker’s termination or pretext
for retaliation.
C. The Unfair Business Practices Claim Survives with the
Wrongful Termination Claims.
In its summary judgment motion, CSI offered no independent argument on
Redeker’s claim under Business and Professions Code section 17200. Rather, CSI
simply argued that the viability of the claim depended on the wrongful termination
claims. The trial court agreed and granted summary adjudication on this claim since it
had granted summary adjudication on Redeker’s wrongful termination claims. Because
we reverse the summary adjudication of Redeker’s wrongful termination claims, we also
reverse the summary adjudication of his claim for unfair business practices.6 (See
Sisemore v. Master Financial, Inc. (2007) 151 Cal.App.4th 1386, 1426 [holding that
plaintiff who stated claims for discrimination under civil rights statutes had also stated
claim under Business and Professions Code section 17200, which broadly prohibits
“ ‘ “ ‘anything that can properly be called a business practice and that at the same time is
forbidden by law.’ ” [Citation.]’ ”])
D. Summary Adjudication of the Invasion of Privacy Claim Was
Proper Because Redeker Had No Reasonable Expectation of
Privacy.
Redeker’s claim for invasion of privacy under the California Constitution was
based on the allegation that CSI saw the March 15 e-mail that Redeker had sent to his
6
Redeker also challenges the exclusion of certain evidence he submitted in opposition to
the summary judgment motion. We need not review these evidentiary rulings because
they all pertain to his causes of action related to his alleged wrongful termination, and we
reverse the summary adjudication of these claims.
12
personal attorney while it was monitoring his e-mail. The trial court concluded that
Redeker possessed no protected privacy interest in the e-mail, failed to establish a serious
invasion of any privacy interest, and experienced no injury as a result of any invasion.
We agree that summary adjudication of this claim was proper.
A claim for invasion of privacy under California Constitution, article I, section I
requires: (1) “a legally protected privacy interest”; (2) a reasonable expectation of
privacy; and (3) an invasion of that interest that “ ‘constitute[s] an egregious breach of
the social norms.’ ” (Hernandez v. Hillsides, Inc. (2009) 47 Cal.4th 272, 278, 287.)
Redeker argues that whether he had a reasonable expectation of privacy is an issue for the
fact finder. He does not, however, challenge the court’s ruling that he failed to establish
a serious invasion of his right to privacy and that he did not establish any injury. Either
basis alone justified summary adjudication. As a result, we find that Redeker has
forfeited his challenge to the summary adjudication on this claim. (See Sprague v.
Equifax, Inc. (1985) 166 Cal.App.3d 1012, 1050.)
Furthermore, even if Redeker could establish a serious invasion or an injury, we
would conclude that he did not have a reasonable expectation of privacy based on the
undisputed facts. When “a legally cognizable privacy interest” exists, “the extent of that
interest is not independent of the circumstances,” and factors including “ ‘accepted
community norms,’ ” any “advance notice,” and “the opportunity to consent to or
reject . . . the invasion” are relevant to the reasonableness determination. (TBG Ins.
Services Corp. v. Superior Court (2002) 96 Cal.App.4th 443, 449-450.) “[W]hether the
circumstances give rise to a reasonable expectation of privacy . . . [is a] mixed question[]
of law and fact.” (Pioneer Electronics (USA), Inc. v. Superior Court (2007) 40 Cal.4th
360, 370.) As a result, “ ‘[i]f the undisputed material facts show no reasonable
expectation of privacy,’ ” an invasion of privacy claim may be decided as a matter of law.
(Ibid.)
CSI’s employee handbook gave Redeker notice that CSI could monitor personal e-
mails sent from CSI’s computers. The handbook provided that “[c]omputers, computer
files, the email system, and software furnished to employees are CSI property intended
13
for business use . . . . To ensure compliance with this policy, computer and email usage
may be monitored.” The handbook stated that “[t]he equipment, services, and technology
provided to access the Internet remain at all times the property of CSI. As such, CSI
reserves the right to monitor Internet traffic, and retrieve and read any data composed,
sent, or received through our online connections and stored in our computer systems.”
The handbook also stated that “[a]ll Internet data that is composed, transmitted, or
received via [CSI’s] computer communications systems” may be disclosed “to law
enforcement or other third parties.”
Redeker identifies other evidence that he contends creates a factual dispute about
the reasonableness of his expectation of privacy. He cites two other portions of the
handbook. The first provides, “While Internet usage is intended for job-related activities,
incidental and occasional brief personal use is permitted within reasonable limits.” The
second provides, “Because CSI is sensitive to the legitimate privacy rights of employees,
every effort will be made to guarantee that workplace monitoring is done in an ethical
and respectful manner.” He also cites B. Jennings’s admission that the company never
orally told or reminded employees about the policy allowing for monitoring of computer
usage, and Redeker’s own testimony in which he referred to the e-mail to his attorney as
being “private” and “privileged.”
Redeker fails to explain how any of this evidence gives rise to a factual dispute.
Neither party disputes the handbook’s contents, and Redeker does not suggest he was
unaware of them or that they did not apply to him. CSI does not contest that it did not
inform employees of the handbook provisions except in the handbook itself. Although
the parties disagree whether CSI actually reviewed the e-mail to Redeker’s attorney, the
disagreement is irrelevant to the issue of Redeker’s expectation of privacy. Rather, the
dispute is whether, under the circumstances that both parties agree existed, Redeker’s
expectation that the e-mail to his attorney was private was reasonable. This is an issue of
law that can be resolved through summary adjudication.
“[T]he use of computers in the employment context carries with it social norms
that effectively diminish the employee’s reasonable expectation of privacy with regard to
14
his use of his employer’s computers.” (TBG Ins. Services Corp., supra, 96 Cal.App.4th
at pp. 451-452.) Here, CSI’s handbook clearly informed employees that the company
could monitor computer usage, which included “retriev[ing] and read[ing] any data
composed, sent, or received through [CSI’s] online connections and stored in our
computer systems.” The handbook also gave notice that such data could be disclosed to
third parties. Personal e-mails sent by CSI’s computers fall into this category. The
handbook provision permitting “incidental and occasional brief personal use” of CSI’s
computers does not, by its terms, limit CSI’s ability to monitor data transmitted online.
CSI’s promise to do “workplace monitoring . . . in an ethical and respectful manner”
cannot reasonably be interpreted to mean that CSI was prevented from monitoring
personal e-mail when it had expressly reserved the right to do so. And the fact that CSI
never reminded its employees about its computer usage policies is of no consequence,
especially since Redeker does not deny that he was aware of those policies. We conclude
that Redeker had no reasonable expectation of privacy in his personal e-mail sent with
CSI’s computers since CSI told him that it could monitor data he transmitted online using
CSI’s computers. (See Holmes v. Petrovich Development Co., LLC (2011)
191 Cal.App.4th 1047, 1068-1069.)
III.
DISPOSITION
The order granting summary judgment is affirmed in part and reversed in part, and
the case is remanded for further proceedings consistent with this opinion. The parties
shall bear their own costs on appeal.
15
_________________________
Humes, J.
We concur:
_________________________
Ruvolo, P. J.
_________________________
Rivera, J.
16