SlideShare a Scribd company logo
1 of 14
Social Media:
Legal & Regulatory Compliance
           Presentation to




            June 21, 2012

         David M. Adler, Esq.
Background
• Social media provides the opportunity for authentic interaction and
  engagement
• Business is Social: using these services as strategic marketing tools.
• New technological developments often create new legal and
  business risks.
• You will learn:
  1.   How to identify the legal issues
  2.   How to develop policies and procedures to avoid legal risks
  3.   How to maintain regulatory compliance.
• DISCLAIMER: I Am Not Your Lawyer. This is NOT Legal Advice
Overview of Legal Risks
•   Copyright Infringement
•   Trademark Infringement
•   Right of Publicity
•   User-Generated Content
•   HR/Employer/Employee Relations
•   Fraud
    • Endorsement & Testimonials
• Emerging Areas
    • Privacy
• Regulations
    •   CAN SPAM
    •   FTC “Dot Com” disclosures
    •   COPPA
    •   FTC Privacy Report
Legal Risks: Copyright
• Copyright protects “original works of creative authorship fixed in a
  tangible medium of expression
• What this means:
   • CONTENT IS PROTECTED BY COPYRIGHT1
   • GET PERMISSON FIRST
• Practical Applications
   • Placing a hyperlink to a photo on a publicly-accessible web site2
   • Use of photo from photo-sharing web site3
   • Are “Tweets” protected by Copyright?4
Legal Risks: Trademarks
• What is a Trademark/Servicemark?
  • Any word, name, symbol or device that signifies the source of goods or services
• How Are Trademarks Used in Social Media?
  •   Brand Names
  •   Social Media Handles “@Midwest”
  •   Facebook Groups/Pages
  •   Comparative Advertising
• How Are Trademark Rights Acquired?
  • Use
  • Registration
     • State & Federal
• Practical Applications
  • Is Creating a Facebook Page about your favorite brand infringement?1
  • Is Tweeting about a brand infringement?
  • Is using a trademark as a social media handle infringement?
Legal Risks: Publicity Rights
• What is the Right of Publicity?
   • Prevents unauthorized commercial use of an individual's name, likeness, or other
     recognizable aspects of one's persona.
   • Largely protected by state law.
   • The Restatement Second of Torts recognizes intrusion, appropriation of name or
     likeness, unreasonable publicity, and false light.
• Practical Applications
   • Unauthorized Use of One’s Name & Likeness
      • Ton LaRusa, manager of the St. Louis Cardinals baseball team sued Twitter,
        Keith Olberman, CNN recently acquired the rights to CNNbrk (CNN Breaking
        News), the largest Twitter account on record with 959,011 followers, 'owned' by
        James Cox, who doesn't even work for CNN.
      • The Philadelphia Daily News published comments from Philadelphia Eagles
        cornerback Asante Samuel's Twitter feed, only to find that his words were being
        'tweeted' by an imposter.1
Legal Risks: UGC
• What is User Generated Content (“UGC”)?
  • Simply put, anything that is uploaded/posted by a “user”
  • Used in a wide range of applications, including problem processing, news,
    gossip and research
  • question-answer databases (LinkedIn Answers), digital video (YouTube),
    blogging (Wordpress), podcasting, forums, review-sites, social networking,
    mobile phone photography and wikis.
• What Are The Risks?
  • Social Media is a Conversation. You cannot control what someone else is going to
    say about you, your company, your product/service/brand.
• Practical Applications
  •   Unauthorized “fan” page1
  •   False/Deceptive/Misleading statements
  •   Misappropriated content: Photos, Videos, Text
  •   Defamatory/Objectionable language
Legal Risks: HR
• Social Media is a business imperative
• The NLRB released 3 Reports, the latest May 30, 2012
  • An employer violates the Act if a rule “would reasonably tend to chill
    employees in the exercise of their Section 7 rights.”
  • Greater risks to regulated industries: FTC, FDA, FINRA, SEC.
• Practical Applications
  • No Policy. According to Grant Thornton, as of Nov. 2011, 79% of companies
    surveyed did not have social media policies
  • Policy Unenforceable. In 2011, the NLRB had received 129 cases involving social
    media
  • Policy Unclear. Training employees is just the beginning; AU telecom co. Telstra
    (40,000+ employees) mandates training “3Rs” – responsibility, respect and
    representation
  • Policy Outdated. Oct. 2011 FTC settles with Frostwire, developer of p2p file-sharing
    application over the default privacy settings
  • Failure to Engage. Reputation Damage control
Legal Risks: Emerging
Areas
• Privacy
  • More time spent interacting through social networking sites than email
• Mountains of Data previously regarded as private
  • “Profile page”
       • location and background,
       • real-time updates on moves and mood
       • groups that reflect the user's interests and views
  •   Available to "friends” / “friends of friends” / “everyone”
  •   Investigative GOLDMINE
  •   Currently, NO Restrictions on Gathering, Using, Sharing or Storing
  •   White House Privacy Bill of Rights
  •   Do Not Track




                              David M. Adler, Esq. & Assoc: Safeguarding Ideas, Relationships &
                                                          Talent®
Legal Risks: Emerging
Areas
• Practical Applications
  • Mobile/GPS – location data
  • Stored Communications Act, 18 U.S.C. §2702 challenge to obtaining social
    networking data directly from a third party social networking website.
      • private messages on social networking sites are not readily accessible to the
        general public
      • “wall postings” and comments are not protected if available to a wider audience.
  • CA District Court granted Sony access to personally identifiable information
    of individuals who visited defendant's website, Twitter account, YouTube
    video and blog.
  • New State Laws
      • NY bills S6779 A8688 - would ban “anonymous” speech
      • AZ bill 2529 – criminalizes any speech that could be construed as cyber-bullying
      • WA SB 6251 – criminalizes providing access to third parties' “offensive” materials
        by online service providers
Legal Risks: Regulations
• Axiomatic that advances in technology proceed faster than the law.
• In addition to various federal statutes, Federal Trade Commission has
  implemented a number of initiatives to “protect consumers.”
• Important Statues
  • Federal CAN SPAM Act: sets the rules for commercial email (not just SPAM),
    establishes requirements for messages, gives recipients the right to have you stop
    emailing them
  • FTC “Dot Com” Disclosures: Guidelines involve disclosing information about
    relationships with advertisers or endorsers that would have a material impact about
    how a prospective consumer would view the message.
  • COPPA: governs collection of personally identifying information of children aged 13
    years or younger; requires parental consent.1
  • FTC Privacy Report: December 1, 2010 FTC proposed a new framework for
    protecting consumer privacy, along with more specific and aggressive guidelines for
    those in the business of sharing consumer information with third parties.
Summary
• Due Diligence
  • Is your firm aware of the legal and regulatory issues that
    impact social media?
  • Does your firm take a “best practices” approach to engaging
    customers, employees and business partners?
  • Does your firm have a Social Media Policy that address the
    firm’s philosophy and Behavioral, Channel, Contextual and
    Content Expectations?
  • Does your firm monitor social media channels for negative
    messaging or IP rights violations?
  • Does your firm have an action plan for addressing these
    risks?
Summary
• Action Items
  •   Proper Contractual Provisions
  •   Code of Ethics/Code of Conduct
  •   Social Media Policy
  •   Monitoring
       • Google Alerts
         •   Brand names/Trademarks
         •   Social Media Handles
         •   Executives Names
       • Facebook/Myspace/LinkedIn Pages
  • Updated Privacy Policy
Summary
•Thank You!!!!
•@adlerlaw
•Linkedin: adlerlaw
•adlerlaw.wordpress.com

More Related Content

More from Adler Law Group

ISBA Privacy CLE “special areas”
ISBA Privacy CLE “special areas”ISBA Privacy CLE “special areas”
ISBA Privacy CLE “special areas”Adler Law Group
 
Privacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location DataPrivacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location DataAdler Law Group
 
Identifying Intellectual Property Issues in Startups 2014
Identifying Intellectual Property Issues in Startups 2014Identifying Intellectual Property Issues in Startups 2014
Identifying Intellectual Property Issues in Startups 2014Adler Law Group
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
 
Entertainment Law & Technology: Trends in Media & Advertising
Entertainment Law & Technology:  Trends in Media & AdvertisingEntertainment Law & Technology:  Trends in Media & Advertising
Entertainment Law & Technology: Trends in Media & AdvertisingAdler Law Group
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Adler Law Group
 
Facebook Marketing Legal & Regulatory Compliance
Facebook Marketing Legal & Regulatory ComplianceFacebook Marketing Legal & Regulatory Compliance
Facebook Marketing Legal & Regulatory ComplianceAdler Law Group
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)Adler Law Group
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Adler Law Group
 
Social Media Legal, Regulatory & Compliance: Risks & Issues
Social Media Legal, Regulatory & Compliance: Risks & IssuesSocial Media Legal, Regulatory & Compliance: Risks & Issues
Social Media Legal, Regulatory & Compliance: Risks & IssuesAdler Law Group
 
Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)Adler Law Group
 

More from Adler Law Group (12)

ISBA Privacy CLE “special areas”
ISBA Privacy CLE “special areas”ISBA Privacy CLE “special areas”
ISBA Privacy CLE “special areas”
 
Privacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location DataPrivacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location Data
 
Identifying Intellectual Property Issues in Startups 2014
Identifying Intellectual Property Issues in Startups 2014Identifying Intellectual Property Issues in Startups 2014
Identifying Intellectual Property Issues in Startups 2014
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
Entertainment Law & Technology: Trends in Media & Advertising
Entertainment Law & Technology:  Trends in Media & AdvertisingEntertainment Law & Technology:  Trends in Media & Advertising
Entertainment Law & Technology: Trends in Media & Advertising
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
Facebook Marketing Legal & Regulatory Compliance
Facebook Marketing Legal & Regulatory ComplianceFacebook Marketing Legal & Regulatory Compliance
Facebook Marketing Legal & Regulatory Compliance
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
Social Media Legal, Regulatory & Compliance: Risks & Issues
Social Media Legal, Regulatory & Compliance: Risks & IssuesSocial Media Legal, Regulatory & Compliance: Risks & Issues
Social Media Legal, Regulatory & Compliance: Risks & Issues
 
Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

@Midwest social media legal issues

  • 1. Social Media: Legal & Regulatory Compliance Presentation to June 21, 2012 David M. Adler, Esq.
  • 2. Background • Social media provides the opportunity for authentic interaction and engagement • Business is Social: using these services as strategic marketing tools. • New technological developments often create new legal and business risks. • You will learn: 1. How to identify the legal issues 2. How to develop policies and procedures to avoid legal risks 3. How to maintain regulatory compliance. • DISCLAIMER: I Am Not Your Lawyer. This is NOT Legal Advice
  • 3. Overview of Legal Risks • Copyright Infringement • Trademark Infringement • Right of Publicity • User-Generated Content • HR/Employer/Employee Relations • Fraud • Endorsement & Testimonials • Emerging Areas • Privacy • Regulations • CAN SPAM • FTC “Dot Com” disclosures • COPPA • FTC Privacy Report
  • 4. Legal Risks: Copyright • Copyright protects “original works of creative authorship fixed in a tangible medium of expression • What this means: • CONTENT IS PROTECTED BY COPYRIGHT1 • GET PERMISSON FIRST • Practical Applications • Placing a hyperlink to a photo on a publicly-accessible web site2 • Use of photo from photo-sharing web site3 • Are “Tweets” protected by Copyright?4
  • 5. Legal Risks: Trademarks • What is a Trademark/Servicemark? • Any word, name, symbol or device that signifies the source of goods or services • How Are Trademarks Used in Social Media? • Brand Names • Social Media Handles “@Midwest” • Facebook Groups/Pages • Comparative Advertising • How Are Trademark Rights Acquired? • Use • Registration • State & Federal • Practical Applications • Is Creating a Facebook Page about your favorite brand infringement?1 • Is Tweeting about a brand infringement? • Is using a trademark as a social media handle infringement?
  • 6. Legal Risks: Publicity Rights • What is the Right of Publicity? • Prevents unauthorized commercial use of an individual's name, likeness, or other recognizable aspects of one's persona. • Largely protected by state law. • The Restatement Second of Torts recognizes intrusion, appropriation of name or likeness, unreasonable publicity, and false light. • Practical Applications • Unauthorized Use of One’s Name & Likeness • Ton LaRusa, manager of the St. Louis Cardinals baseball team sued Twitter, Keith Olberman, CNN recently acquired the rights to CNNbrk (CNN Breaking News), the largest Twitter account on record with 959,011 followers, 'owned' by James Cox, who doesn't even work for CNN. • The Philadelphia Daily News published comments from Philadelphia Eagles cornerback Asante Samuel's Twitter feed, only to find that his words were being 'tweeted' by an imposter.1
  • 7. Legal Risks: UGC • What is User Generated Content (“UGC”)? • Simply put, anything that is uploaded/posted by a “user” • Used in a wide range of applications, including problem processing, news, gossip and research • question-answer databases (LinkedIn Answers), digital video (YouTube), blogging (Wordpress), podcasting, forums, review-sites, social networking, mobile phone photography and wikis. • What Are The Risks? • Social Media is a Conversation. You cannot control what someone else is going to say about you, your company, your product/service/brand. • Practical Applications • Unauthorized “fan” page1 • False/Deceptive/Misleading statements • Misappropriated content: Photos, Videos, Text • Defamatory/Objectionable language
  • 8. Legal Risks: HR • Social Media is a business imperative • The NLRB released 3 Reports, the latest May 30, 2012 • An employer violates the Act if a rule “would reasonably tend to chill employees in the exercise of their Section 7 rights.” • Greater risks to regulated industries: FTC, FDA, FINRA, SEC. • Practical Applications • No Policy. According to Grant Thornton, as of Nov. 2011, 79% of companies surveyed did not have social media policies • Policy Unenforceable. In 2011, the NLRB had received 129 cases involving social media • Policy Unclear. Training employees is just the beginning; AU telecom co. Telstra (40,000+ employees) mandates training “3Rs” – responsibility, respect and representation • Policy Outdated. Oct. 2011 FTC settles with Frostwire, developer of p2p file-sharing application over the default privacy settings • Failure to Engage. Reputation Damage control
  • 9. Legal Risks: Emerging Areas • Privacy • More time spent interacting through social networking sites than email • Mountains of Data previously regarded as private • “Profile page” • location and background, • real-time updates on moves and mood • groups that reflect the user's interests and views • Available to "friends” / “friends of friends” / “everyone” • Investigative GOLDMINE • Currently, NO Restrictions on Gathering, Using, Sharing or Storing • White House Privacy Bill of Rights • Do Not Track David M. Adler, Esq. & Assoc: Safeguarding Ideas, Relationships & Talent®
  • 10. Legal Risks: Emerging Areas • Practical Applications • Mobile/GPS – location data • Stored Communications Act, 18 U.S.C. §2702 challenge to obtaining social networking data directly from a third party social networking website. • private messages on social networking sites are not readily accessible to the general public • “wall postings” and comments are not protected if available to a wider audience. • CA District Court granted Sony access to personally identifiable information of individuals who visited defendant's website, Twitter account, YouTube video and blog. • New State Laws • NY bills S6779 A8688 - would ban “anonymous” speech • AZ bill 2529 – criminalizes any speech that could be construed as cyber-bullying • WA SB 6251 – criminalizes providing access to third parties' “offensive” materials by online service providers
  • 11. Legal Risks: Regulations • Axiomatic that advances in technology proceed faster than the law. • In addition to various federal statutes, Federal Trade Commission has implemented a number of initiatives to “protect consumers.” • Important Statues • Federal CAN SPAM Act: sets the rules for commercial email (not just SPAM), establishes requirements for messages, gives recipients the right to have you stop emailing them • FTC “Dot Com” Disclosures: Guidelines involve disclosing information about relationships with advertisers or endorsers that would have a material impact about how a prospective consumer would view the message. • COPPA: governs collection of personally identifying information of children aged 13 years or younger; requires parental consent.1 • FTC Privacy Report: December 1, 2010 FTC proposed a new framework for protecting consumer privacy, along with more specific and aggressive guidelines for those in the business of sharing consumer information with third parties.
  • 12. Summary • Due Diligence • Is your firm aware of the legal and regulatory issues that impact social media? • Does your firm take a “best practices” approach to engaging customers, employees and business partners? • Does your firm have a Social Media Policy that address the firm’s philosophy and Behavioral, Channel, Contextual and Content Expectations? • Does your firm monitor social media channels for negative messaging or IP rights violations? • Does your firm have an action plan for addressing these risks?
  • 13. Summary • Action Items • Proper Contractual Provisions • Code of Ethics/Code of Conduct • Social Media Policy • Monitoring • Google Alerts • Brand names/Trademarks • Social Media Handles • Executives Names • Facebook/Myspace/LinkedIn Pages • Updated Privacy Policy

Editor's Notes

  1. Note limited exceptions (e.g. government works, public domain) and work-for hire South Carolina case involving user ’s experience with BidZerk; placed link on his blog U.S. suit against Australian advertiser for using photo without permission Twitter's terms of service say you own your own posts; copyright law applies. Fair Use? In 2007, CCIA filed FTC complaint against Major league sports; Brooklyn Law School professor and EFF staff attorney Wendy Seltzer
  2. 1. Facebook legal policies: Advertising Guidelines and Pages Policies prohibit, false, misleading or deceptive practices.
  3. Get Permission Check your facts & Sources
  4. 1. Coca-cola: 2009 2d most popular Facebook page; Coke contacted creators and partnered with them
  5. WSJ article Feb, 22, 2011: Prosecution and defense lawyers are scouring the site for personal details about members of the jury pool that could signal which side they might sympathize with during a trial. Yes, but remember Title VII protected classes In Yath v. Fairview Clinics, 767 N.W. 2d 34 (Minn. App. 2009), a patient sued Fairview Cedar Ridge Clinic, two employees and others invasion of privacy, after learning that clinic employees had reviewed her medical file, learned that she had a sexually transmitted disease, disclosed this information to other people, and the information showed up on MySpace.
  6. 1. In 2007 When registering at thedollpalace.com, for example, a child under 13 is told “you need a parent’s permission to continue. Is a parent with you right now.” The child can then select “yes” or “no.” The “yes” selection allows the child to click “ok” at the bottom of a permission page. The “no” selection prompts a child to enter an e-mail address. An e-mail is sent to that address asking for consent; no subsequent verification is made.