Feeds

Man accused of using LinkedIn to steal clients

Ex-employee must disclose online contacts, rules UK court

Beginner's guide to SSL certificates

An ex-employee of recruitment firm Hays has been ordered to disclose details of his profile at social networking site LinkedIn. Mark Ions set up a rival agency and is accused of using LinkedIn to steal clients. He says Hays encouraged his use of the site.

Ions worked for Hays Specialist Recruitment for six and a half years before leaving to run his own agency, Exclusive Human Resources, which he set up almost three weeks before resigning.

Hays alleges that while still an employee Ions copied and retained confidential information about clients and contacts of Hays. The firm says that Ions used that information for his own venture and that he breached his contract of employment. Hays went to the High Court in London to seek pre-action disclosure from Ions and his firm, i.e. an order to disclose information that Hays could use as the basis of a subsequent lawsuit.

Hays examined Ions' email account after his departure and found evidence that Ions had invited at least two Hays clients to join his network at LinkedIn, a social networking site that focuses on professional relationships. It suspects him of inviting many more.

Ions told the court that he had been a member of LinkedIn for over a year, with the encouragement of Hays. LinkedIn is widely used by recruitment firms and Ions said that others in Hays were also members.

In a letter to Hays' solicitors, Ions offered to delete "the entirety of the Hays linked contacts" from his LinkedIn network though he did not say how many there were. Hays demanded full details and warned him to preserve this evidence. Ions then said he had arranged for the whole of his old LinkedIn network to be deleted. He said he had no other copy of the list and could not recreate it. The US operator of LinkedIn agreed to preserve the data pending the outcome of the case.

Ions argued that all the information was put on the site during the course of his employment. Mr Justice David Richards wrote, "His case, denied by Hays, is that it was done with Hays' consent and that once uploaded and once the invitation to join his network is accepted, the information ceased to be confidential because it was accessible to a wider audience through his network."

His lawyer said it was not Ions' action in uploading email addresses to LinkedIn, but the invitees' acceptance to become connections which resulted in the information which resulted in the information becoming available on his network and it is not then confidential but publicly available, at least to his other connection.

"In my view, this breaks down at the first stage," wrote Justice Richards, dismissing that argument. "If the information was confidential, it was Mr Ions' action in uploading the email addresses which involved a transfer of information to a site where at least the details of those addresses who accepted his invitation would be accessible by him after his employment had ceased."

"The evidence suggests that he may have done so, not for the benefit of Hays but for the benefit of his post-termination business," he wrote. "If so, even if confidentiality in the information was thereafter lost, Hays may well have a claim against Mr Ions."

Later in the judgment, Justice Richards observed of the email addresses, "Even if he uploaded them with authority, it is difficult to imagine that the authority was not limited to using them in the performance of his duties as an employee of Hays."

Ions was ordered to disclose his LinkedIn business contacts requested by Hays and all emails sent to or received by his LinkedIn account from Hays' computer network. Ions was also ordered to disclose all documents, including invoices and emails, evidencing his use of the LinkedIn contacts and any business obtained from them. Ions was told to ask LinkedIn for the documents.

Hays' additional request for a copy of Ions' entire database of clients was rejected as being "simply a fishing expedition" and "plainly too wide."

Copyright © 2008, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Choosing a cloud hosting partner with confidence

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.