Security: Identifying and Managing the Legal Risks of Development and Twitter<br />Prof. Jonathan I. Ezor<br />Touro Law C...
Risk Management Key to Successful Business<br />Risks come from many sources<br />Financial<br />Technological<br />Legal<...
Software Development, Internet Both Have Unique Risks<br />Each depends on other vendors, users for functionality<br />Eac...
Risks and Management for Twitter Software Developers<br />Rights to their own code <br />Use and limits of contract langua...
Code and Copyright<br />Software covered by copyright<br />Under US law, copyright exists on creation<br />Generally, crea...
Licenses: Giving and Receiving<br />Licenses how copyright holders control use by others<br />Many types<br />Cover variet...
Accidental Open Source “Infection”<br />Open source licenses require devs to make source code avail to users<br />May be f...
Contract Language<br />Contracts popular way to identify/manage risks<br />Provide permitted uses<br />State/limit warrant...
Contracts May Not Provide Expected Protection<br />Contracts governed by state law<br />Some language may be overbroad<br ...
General Workplace Risks from Social Media Use<br />As said yesterday, Twitter-focused companies “eat their own dog food”<b...
http://shankman.com/be-careful-what-you-post/<br />Many of my peers and I feel this is inappropriate. We do not know the t...
Additional Internet-Related Legal Risks to Consider<br />Privacy<br />International issues<br />Consumer protection<br />P...
What if Twitter Fails?<br />Building business on single vendor puts success in its hands<br />Twitter a single company, si...
Appropriate Insurance a Key Risk Management Component<br />Most businesses have some kind of insurance<br />Question wheth...
jezor@tourolaw.edu<br />Knowledge, Policies and Procedures Must Work Together To Minimize Risks<br />Create a “Social Medi...
QUESTIONS?<br />
Jonathan I. Ezorjezor@tourolaw.edu@ProfJonathan on Twitterhttp://www.mobilerisk.com<br />
Upcoming SlideShare
Loading in …5
×

9 23 09 140tc Security Presentation

2,435 views
2,378 views

Published on

Presentation on managing legal and other risks at 140: The Twitter Conference's developer track

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,435
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

9 23 09 140tc Security Presentation

  1. 1. Security: Identifying and Managing the Legal Risks of Development and Twitter<br />Prof. Jonathan I. Ezor<br />Touro Law Center<br />140: The Twitter Conference<br />September 23, 2009<br />jezor@tourolaw.edu<br />@ProfJonathan<br />
  2. 2. Risk Management Key to Successful Business<br />Risks come from many sources<br />Financial<br />Technological<br />Legal<br />“Silos” can lead to missed risks (and opportunities)<br />Legal (hopefully) constructive part of team<br />jezor@tourolaw.edu / @ProfJonathan<br />
  3. 3. Software Development, Internet Both Have Unique Risks<br />Each depends on other vendors, users for functionality<br />Each also used for business-critical functions<br />Combination adds to challenges<br />jezor@tourolaw.edu / @ProfJonathan<br />
  4. 4. Risks and Management for Twitter Software Developers<br />Rights to their own code <br />Use and limits of contract language <br />General workplace risk from soc media use<br />Unexpected legal issues <br />The Fail Whale<br />Insurance<br />jezor@tourolaw.edu / @ProfJonathan<br />
  5. 5. Code and Copyright<br />Software covered by copyright<br />Under US law, copyright exists on creation<br />Generally, creator (or employer) automatically owns copyright<br />Otherwise, only transferred in writing<br />Filing allows for litigation, increases remedies<br />jezor@tourolaw.edu / @ProfJonathan<br />
  6. 6. Licenses: Giving and Receiving<br />Licenses how copyright holders control use by others<br />Many types<br />Cover variety of rights<br />Freeware ≠ Public Domain (“libre” vs. “gratuit”)<br />For software, license may be to object and/or source code<br />jezor@tourolaw.edu / @ProfJonathan<br />
  7. 7. Accidental Open Source “Infection”<br />Open source licenses require devs to make source code avail to users<br />May be free or commercial<br />Different licenses (GNU, Creative Commons, Etc.)<br />Issue when open source incorporated into intended closed source<br />May turn entire project into open source<br />Developer may not know about inclusion<br />Must educate developers, monitor libraries/code<br />jezor@tourolaw.edu / @ProfJonathan<br />
  8. 8. Contract Language<br />Contracts popular way to identify/manage risks<br />Provide permitted uses<br />State/limit warranties<br />Limit liability<br />Set applicable law<br />May be provided in EULA, Terms of Use, etc<br />Employee contracts also crucial (NDAs, non-competes, etc.)<br />jezor@tourolaw.edu / @ProfJonathan<br />
  9. 9. Contracts May Not Provide Expected Protection<br />Contracts governed by state law<br />Some language may be overbroad<br />Clickthroughs may/may not be sufficient<br />Copying others’ contracts could be problem<br />As risks increase, need for signed contract does as well<br />jezor@tourolaw.edu / @ProfJonathan<br />
  10. 10. General Workplace Risks from Social Media Use<br />As said yesterday, Twitter-focused companies “eat their own dog food”<br />Also as said yesterday, humor in business doesn’t always work well<br />Need to balance benefits and risks of Internet access/use in workplace<br />Culture, business need, productivity all concerns<br />jezor@tourolaw.edu / @ProfJonathan<br />
  11. 11. http://shankman.com/be-careful-what-you-post/<br />Many of my peers and I feel this is inappropriate. We do not know the total millions of dollars FedEx Corporation pays Ketchum annually for the valuable and important work your company does for us around the globe. We are confident however, it is enough to expect a greater level of respect and awareness from someone in your position as a vice president at a major global player in your industry. A hazard of social networking is people will read what you write.<br />
  12. 12.
  13. 13.
  14. 14. Additional Internet-Related Legal Risks to Consider<br />Privacy<br />International issues<br />Consumer protection<br />Prize promotions (http://bit.ly/ke7y5)<br />Spam<br />Overall marketing<br />Others<br />jezor@tourolaw.edu / @ProfJonathan<br />
  15. 15.
  16. 16.
  17. 17. What if Twitter Fails?<br />Building business on single vendor puts success in its hands<br />Twitter a single company, single product<br />Subject to technical issues, business risks of own<br />When Twitter Ain’t Running, Ain’t Nobody Running: http://bit.ly/19gpb3<br />jezor@tourolaw.edu / @ProfJonathan<br />
  18. 18. Appropriate Insurance a Key Risk Management Component<br />Most businesses have some kind of insurance<br />Question whether it covers Internet-related risks<br />Many carriers offer appropriate policies<br />Need to ask/find broker who also understands<br />jezor@tourolaw.edu / @ProfJonathan<br />
  19. 19. jezor@tourolaw.edu<br />Knowledge, Policies and Procedures Must Work Together To Minimize Risks<br />Create a “Social Media Policy” and enforce it (Good list at http://bit.ly/58oeQ)<br />Adequate funding of IT staff, including training<br />Make sure employees and outside professionals given proper education<br />Set up systems with business concerns in mind<br />Keep up with trade press<br />Follow company on Twitter, FB, etc.<br />
  20. 20. QUESTIONS?<br />
  21. 21. Jonathan I. Ezorjezor@tourolaw.edu@ProfJonathan on Twitterhttp://www.mobilerisk.com<br />

×