While many employers worry that some court decisions will add "insult to injury," New Jersey employers must now be aware of Stengart v. Loving Care Agency Inc., et al., --- A.2d ----, ---N.J. -- (N.J. 2010), decided March 30, 2010, which presages adding "injury to injury." That is because it first injures employers' interests by stating that an employer cannot write an enforceable policy that “banned all personal computer use and provided unambiguous notice that an employer could retrieve and read” all emails that an employer wrote through a personal email account using an employer’s computer and that an employee’s communications with personal counsel concerning matters adverse to the company may occur during work time using the employer's resources. And if that were not injury enough to the employer's interests, in having employees actually work on company business while at the office using the company's resources, the Stengart Court then goes on to add another possible injury—on remand, the trial court should consider disqualifying the company's counsel for not immediately returning to the departed employee (or her counsel) all copies of such communications. The Stengart decision demands that employers, especially in New Jersey, not only revisit their written policies, but also that they consider how such policies are actually being applied and enforced. Decisions like Stengart can also directly impact on steps that have become part of best practices responses in trade secret and restrictive covenant cases involving departing employees.


Plaintiff Marine Stengart was the Executive Director of Loving Care, Inc., a home care services agency, who resigned and then sued Loving Care for constructive discharge under the New Jersey Law Against Discrimination. Stengart was issued a company laptop computer. Despite some factual discrepancies between the parties as to the content and dissemination of certain policies, the Court also assumed for its analysis that the company had a well-publicized electronic communications policy that made all aware that the employer's computer and system (including those allowing for internet access) were all company property, to be used for company business, and that the company believed that there was no reasonable expectation of privacy in any communications that an employee had through such equipment or system because the communications were, as announced in the policy, subject to monitoring, were considered the property of the company, and were embedded within the company's physical property. Stengart, nonetheless, used her company computer to communicate with her personal counsel through her Yahoo account. Such communications were discovered by her former employer on that computer after her termination. Loving Care's counsel did not immediately disclose the existence of such communications to Stengart or her counsel, and instead referenced and included those of relevance to a response to a later discovery request.

The Court's Analysis

The Court’s analysis is driven by two basic factors, one case specific, one more general, on the issue of whether a privilege ever existed or was waived.

Of specific concern to the Court was Loving Care's written policy, which clearly stated that E-mail and voice mail messages, internet use and communication and computer files are considered part of the company's business and client records, that "such communications are not to be considered private or personal to any individual employee, that the company reserved the right to review, audit, intercept, access and disclose “all matters on the company’s media systems and services at any time." But the policy also stated that "occasional personal use is permitted." The Court, assuming the policy was in effect, and despite language in the policy that specifically applied to "internet use and communication" in addition to e-mail, found that an objective reader might not conclude that the policy applied to using a work computer to access a personal, password-protected Yahoo account. Moreover, the Court held that the company's reasonable statement that "occasional personal use" of the company email would be tolerated somehow further frustrated the company's effort to thwart the creation of any reasonable expectation of privacy.

But, more generally, the Stengart Court found that the interests protected by the attorney-client privilege outweighed employers' interests in enforcing electronic communications policies. In doing so, the Court seemed to ignore the fact that privileged communications require an expectation of confidentiality, and none should have arisen on the facts of this case. The Court's analysis suggests strongly the policy's provision allowing for occasional "personal" use somehow created an expectation of privacy, ignoring the distinction between "private" and "personal." In Stengart, the terms were used interchangeably, even though the words do not necessarily carry the same connotation.

The holdings of the Stengart Court go beyond the earlier Appellate Division decision in the case, which had only implied that a policy cannot be written that would have led the Court to have found any claim of privilege inert or waived. Indeed, the Supreme Court expressly stated that, and also noted that “a zero-tolerance policy [on personal use of computers]” is “unworkable and unwelcome in today’s dynamic and mobile workforce…” That reading is certainly furthered by the Court's remand to consider whether the employer's counsel should be disqualified under RPC 4.4(b) for having kept and reviewed the communications.

Takeaways and Next Steps

The decision leaves employers with several questions that we will try to help you answer, and they are questions that can have particular impact in the area of trade secret and restrictive covenant litigation:

1. Do you, as an employer, want a policy that reaches otherwise privileged or private communications? You do. Though the Stengart Court says that no legitimate business interest is furthered by transforming all private communications into company property, the Court misses the important point that many legitimate business interests are furthered by stemming private communications during work, the most basic being the employer's interest in having work being done at work. Indeed, the very examples earlier used by the Appellate Division as to what is accessible instantly "with the touch of a keyboard or a click of a mouse" (e.g., medical records, bank accounts, phone records, and tax returns) illustrate full well that these are the very sort of personal items that an employer has a great interest in keeping from being disclosed in or to the workplace. In warning employees that what is personal and private will be neither if brought into the workplace, employers are protecting themselves and their employees, and also assuring that they are not paying employees to come to work to work on personal medical, financial or other matters between lunch breaks and coffee breaks.

2. Does Stengart allow for the creation of such a policy? It may. But drafting and then upholding that policy against legal challenge will take great care. We know this because a close reading of Stengart leaves the careful room to operate—as the Supreme Court says, “Our conclusion…does not mean that employers cannot monitor or regulate the use of workplace computers.” For instance, Stengart says that a policy requiring that one work at work and not spend valuable time on personal communications is appropriate, “[b]ut employers have no need or basis to read the specific contents of personal, privileged, attorney-client communications in order to enforce corporate policy." Of course, overlooked by the Court is that one cannot define the communicative activity as one outside the employer's business interests without knowing the content that would show that. Thus, the Stengart Court's distinction between communicative conduct and communicative content probably fails analytically, which is implicitly acknowledged by the Court's noting that an employer may have an interest in certain types of personal content as reflected in previously decided cases. Nevertheless, one can enforce such a policy by blocking access to Internet-based email accounts from employee computers, or through other mechanisms and policies that focus on the time devoted to such communications as opposed to their content.

3. With or without a new policy, what do you do if you find attorney-client communications on a departed employee's computer? The first thing that one must do is collect, segregate and preserve such communications. Once that has been done, whether by one's internal IT staff or outside IT consultants, the existence of such documents should be made known to outside counsel. Then things get a little more complicated. If the employer is already in litigation, it would appear that Stengart compels one to either then turn over all copies to the plaintiff and his/her counsel or present them to the court for in camera review as to whether or not they are privileged or if privilege has been waived. Because fully reviewing the documents at issue after becoming aware that they are arguably privileged raises the possibility of later disqualification under RPC 4.4(b), an employer may even consider retaining special counsel separate from regular employment counsel to handle the application to the court, and to advise the client concerning the issues that have arisen without running the risk of having primary defense counsel disqualified from the matter. An even more sensitive, nuanced analysis will be required if that matter is not yet in litigation, and there is no already designated third party decision maker available. At that point, the employer, along with employment counsel and possibly special counsel, must carefully weigh a number of practical, legal, ethical and business factors before determining how to approach the relevant issues.

Having both employment counsel and possibly special counsel familiar with those issues and the new landscape defined by Stengart will be essential to avoiding damaging one’s position concerning claims that the departed employees are expected to file. This is especially true as it relates to departing employees in the trade secret or restrictive covenant context, where one often seeks to document through forensic computer analysis what communications occurred in preparation for a departure and what confidential information may have been transmitted. The last thing one wants when operating with a need for speed is some ancillary disqualification issue to arise for one’s outside counsel. That is why segmenting roles and responsibilities is important, and it may be that special counsel can turn the tables on a departing employee and his/her counsel by demonstrating that the pre-departure communications were actually advice as to how and under what circumstances information could be taken. This would have the potential to render the communications unprivileged ones in furtherance of a “crime or fraud,” which exception has been construed in New Jersey and elsewhere to apply to civil wrongs of a wide variety, and could possibly lead to the ex-employee’s counsel becoming a witness in the matter, which could have its own potentially disqualifying or limiting implications.

Back to Trade Secrets & Employee Mobility Blog

Search This Blog

Blog Editors


Related Services



Jump to Page


Sign up to receive an email notification when new Trade Secrets & Employee Mobility posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.