SlideShare a Scribd company logo
1 of 21
Security: Identifying and Managing the Legal Risks of Development and Twitter Prof. Jonathan I. Ezor Touro Law Center 140: The Twitter Conference September 23, 2009 jezor@tourolaw.edu @ProfJonathan
Risk Management Key to Successful Business Risks come from many sources Financial Technological Legal “Silos” can lead to missed risks (and opportunities) Legal (hopefully) constructive part of team jezor@tourolaw.edu / @ProfJonathan
Software Development, Internet Both Have Unique Risks Each depends on other vendors, users for functionality Each also used for business-critical functions Combination adds to challenges jezor@tourolaw.edu / @ProfJonathan
Risks and Management for Twitter Software Developers Rights to their own code  Use and limits of contract language  General workplace risk from soc media use Unexpected legal issues  The Fail Whale Insurance jezor@tourolaw.edu / @ProfJonathan
Code and Copyright Software covered by copyright Under US law, copyright exists on creation Generally, creator (or employer) automatically owns copyright Otherwise, only transferred in writing Filing allows for litigation, increases remedies jezor@tourolaw.edu / @ProfJonathan
Licenses: Giving and Receiving Licenses how copyright holders control use by others Many types Cover variety of rights Freeware ≠ Public Domain (“libre” vs. “gratuit”) For software, license may be to object and/or source code jezor@tourolaw.edu / @ProfJonathan
Accidental Open Source “Infection” Open source licenses require devs to make source code avail to users May be free or commercial Different licenses (GNU, Creative Commons, Etc.) Issue when open source incorporated into intended closed source May turn entire project into open source Developer may not know about inclusion Must educate developers, monitor libraries/code jezor@tourolaw.edu / @ProfJonathan
Contract Language Contracts popular way to identify/manage risks Provide permitted uses State/limit warranties Limit liability Set applicable law May be provided in EULA, Terms of Use, etc Employee contracts also crucial (NDAs, non-competes, etc.) jezor@tourolaw.edu / @ProfJonathan
Contracts May Not Provide Expected Protection Contracts governed by state law Some language may be overbroad Clickthroughs may/may not be sufficient Copying others’ contracts could be problem As risks increase, need for signed contract does as well jezor@tourolaw.edu / @ProfJonathan
General Workplace Risks from Social Media Use As said yesterday, Twitter-focused companies “eat their own dog food” Also as said yesterday, humor in business doesn’t always work well Need to balance benefits and risks of Internet access/use in workplace Culture, business need, productivity all concerns jezor@tourolaw.edu / @ProfJonathan
http://shankman.com/be-careful-what-you-post/ Many of my peers and I feel this is inappropriate. We do not know the total millions of dollars FedEx Corporation pays Ketchum annually for the valuable and important work your company does for us around the globe. We are confident however, it is enough to expect a greater level of respect and awareness from someone in your position as a vice president at a major global player in your industry. A hazard of social networking is people will read what you write.
Additional Internet-Related Legal Risks to Consider Privacy International issues Consumer protection Prize promotions (http://bit.ly/ke7y5) Spam Overall marketing Others jezor@tourolaw.edu / @ProfJonathan
What if Twitter Fails? Building business on single vendor puts success in its hands Twitter a single company, single product Subject to technical issues, business risks of own When Twitter Ain’t Running, Ain’t Nobody Running: http://bit.ly/19gpb3 jezor@tourolaw.edu / @ProfJonathan
Appropriate Insurance a Key Risk Management Component Most businesses have some kind of insurance Question whether it covers Internet-related risks Many carriers offer appropriate policies Need to ask/find broker who also understands jezor@tourolaw.edu / @ProfJonathan
jezor@tourolaw.edu Knowledge, Policies and Procedures Must Work Together To Minimize Risks Create a “Social Media Policy” and enforce it (Good list at http://bit.ly/58oeQ) Adequate funding of IT staff, including training Make sure employees and outside professionals given proper education Set up systems with business concerns in mind Keep up with trade press Follow company on Twitter, FB, etc.
QUESTIONS?
Jonathan I. Ezorjezor@tourolaw.edu@ProfJonathan on Twitterhttp://www.mobilerisk.com

More Related Content

What's hot

Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
Mike Murray
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
MISY
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
BurkeV
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 

What's hot (17)

Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Uses,mis uses and risk of software
Uses,mis uses and risk of softwareUses,mis uses and risk of software
Uses,mis uses and risk of software
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital Parents
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of software
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Viewers also liked

Viewers also liked (9)

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 

Similar to 9 23 09 140tc Security Presentation

Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
ssuser454af01
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Ethan S. Burger
 

Similar to 9 23 09 140tc Security Presentation (20)

Iwamoto-Crews-Coe
Iwamoto-Crews-CoeIwamoto-Crews-Coe
Iwamoto-Crews-Coe
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 

More from Jonathan Ezor

More from Jonathan Ezor (6)

10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal Ethics
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

9 23 09 140tc Security Presentation

  • 1. Security: Identifying and Managing the Legal Risks of Development and Twitter Prof. Jonathan I. Ezor Touro Law Center 140: The Twitter Conference September 23, 2009 jezor@tourolaw.edu @ProfJonathan
  • 2. Risk Management Key to Successful Business Risks come from many sources Financial Technological Legal “Silos” can lead to missed risks (and opportunities) Legal (hopefully) constructive part of team jezor@tourolaw.edu / @ProfJonathan
  • 3. Software Development, Internet Both Have Unique Risks Each depends on other vendors, users for functionality Each also used for business-critical functions Combination adds to challenges jezor@tourolaw.edu / @ProfJonathan
  • 4. Risks and Management for Twitter Software Developers Rights to their own code  Use and limits of contract language  General workplace risk from soc media use Unexpected legal issues  The Fail Whale Insurance jezor@tourolaw.edu / @ProfJonathan
  • 5. Code and Copyright Software covered by copyright Under US law, copyright exists on creation Generally, creator (or employer) automatically owns copyright Otherwise, only transferred in writing Filing allows for litigation, increases remedies jezor@tourolaw.edu / @ProfJonathan
  • 6. Licenses: Giving and Receiving Licenses how copyright holders control use by others Many types Cover variety of rights Freeware ≠ Public Domain (“libre” vs. “gratuit”) For software, license may be to object and/or source code jezor@tourolaw.edu / @ProfJonathan
  • 7. Accidental Open Source “Infection” Open source licenses require devs to make source code avail to users May be free or commercial Different licenses (GNU, Creative Commons, Etc.) Issue when open source incorporated into intended closed source May turn entire project into open source Developer may not know about inclusion Must educate developers, monitor libraries/code jezor@tourolaw.edu / @ProfJonathan
  • 8. Contract Language Contracts popular way to identify/manage risks Provide permitted uses State/limit warranties Limit liability Set applicable law May be provided in EULA, Terms of Use, etc Employee contracts also crucial (NDAs, non-competes, etc.) jezor@tourolaw.edu / @ProfJonathan
  • 9. Contracts May Not Provide Expected Protection Contracts governed by state law Some language may be overbroad Clickthroughs may/may not be sufficient Copying others’ contracts could be problem As risks increase, need for signed contract does as well jezor@tourolaw.edu / @ProfJonathan
  • 10. General Workplace Risks from Social Media Use As said yesterday, Twitter-focused companies “eat their own dog food” Also as said yesterday, humor in business doesn’t always work well Need to balance benefits and risks of Internet access/use in workplace Culture, business need, productivity all concerns jezor@tourolaw.edu / @ProfJonathan
  • 11. http://shankman.com/be-careful-what-you-post/ Many of my peers and I feel this is inappropriate. We do not know the total millions of dollars FedEx Corporation pays Ketchum annually for the valuable and important work your company does for us around the globe. We are confident however, it is enough to expect a greater level of respect and awareness from someone in your position as a vice president at a major global player in your industry. A hazard of social networking is people will read what you write.
  • 12.
  • 13.
  • 14. Additional Internet-Related Legal Risks to Consider Privacy International issues Consumer protection Prize promotions (http://bit.ly/ke7y5) Spam Overall marketing Others jezor@tourolaw.edu / @ProfJonathan
  • 15.
  • 16.
  • 17. What if Twitter Fails? Building business on single vendor puts success in its hands Twitter a single company, single product Subject to technical issues, business risks of own When Twitter Ain’t Running, Ain’t Nobody Running: http://bit.ly/19gpb3 jezor@tourolaw.edu / @ProfJonathan
  • 18. Appropriate Insurance a Key Risk Management Component Most businesses have some kind of insurance Question whether it covers Internet-related risks Many carriers offer appropriate policies Need to ask/find broker who also understands jezor@tourolaw.edu / @ProfJonathan
  • 19. jezor@tourolaw.edu Knowledge, Policies and Procedures Must Work Together To Minimize Risks Create a “Social Media Policy” and enforce it (Good list at http://bit.ly/58oeQ) Adequate funding of IT staff, including training Make sure employees and outside professionals given proper education Set up systems with business concerns in mind Keep up with trade press Follow company on Twitter, FB, etc.
  • 21. Jonathan I. Ezorjezor@tourolaw.edu@ProfJonathan on Twitterhttp://www.mobilerisk.com