Your SlideShare is downloading. ×
0
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Ip issues in social media
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ip issues in social media

337

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
337
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. IP ISSUES IN SOCIAL MEDIA Divya Raman Corporate Department Altacit Global Email: info@altacit.com Website: www.altacit.com
  • 2. Social Media• Use of web-based and mobile technologies to turn communication into an interactive dialogue.• Media for social interaction, as a superset beyond social communication.• Eg: Facebook, Twitter, LinkedIn, Youtube etc.
  • 3. Impact of social media•Anti-government protesters in Tunisiaand Egypt used Twitter, Facebook andother platforms to run rings aroundattempts at censorship and organizedemonstrations that ousted presidentsZine El Abidine Ben Ali and HosniMubarak.
  • 4. Impact of social media (contd…)• US has also seen seen some modest signs of social media-organized protest, with hundreds of protesters occupying Wall Street in anger at perceived excesses by its banks.
  • 5. Intellectual Property• Patent.• Design.• Copyright.• Geographical Indications.• Trademark.
  • 6. IP Issues in Social MediaSocial networking sites present severalrisks, including trademark infringementand copyright violation issues. Forexample, a companys valuable trademarkscould appear without authorization on ausers profile page or as part of a username ("name squatting") on a socialnetworking site.
  • 7. Copyright•Some social media websites claim copyrightover all items posted on its website.•While others recognize that the copyrightremains with the owner.•File sharing is one of the aspect ininfringement of copyright through socialwebsite. Eg: sharing video clips ofmovies, music, books being shared. All thishas posed copyright infringement throughsocial media.
  • 8. Trademark•Trademark can potentially be used toprotect competitors from selling goods orservices with confusingly similar marks.•Scrabulous: Developed by two commercegraduates in India – game application infacebook. Features of this game is similar toscrabble owned by Hasbro in Canada – onlydifference is scrabulous is in electronicformat. Founders of scrabulous sued andthey withdrew the game from facebook.
  • 9. Trade SecretSocial media can put at risk a company’s tradesecrets. Since the sine qua non of a trade secret isthat it is kept secret, the speed and ease in whichinformation can be rapidly (and permanently)distributed with a click of a button in social mediaand internet poses a clear risk for any companyseeking to maintain a trade secret. A simple postingof a company’s secret information can destroy thesecret and leave that information to be available toanyone.
  • 10. Customer List - Trade SecretConsider, for a second, a company that considersits customer list to be a trade secret and seeks toprotect such information. A salesperson whoidentifies those customers as “friends” onFacebook, or “connections” on LinkedIn, or someother similar status on another social mediawebsite, could destroy the secret nature of such alist. It also can lead to that salesperson, inessence, appropriating that information shouldhe or she leave to go to work for a competitor.
  • 11. Case LawsOne recently reported high-profile case involved TonyLa Russa, manager of the St. Louis Cardinals baseballteam, whose identity was hijacked on Twitter by animposter. The suit filed in the Superior Court ofCalifornia in San Francisco, which has since beendismissed, claimed that someone created an accountunder La Russas name and posted tweets, giving thefalse impression that the comments came from LaRussa. The suit also said that the comments were"derogatory and demeaning" and thus damaged LaRussas trademark rights.
  • 12. There also have been reports of corporatesabotage. For example, it was reported thata public relations firm allegedly set up aTwitter account in the name of a rival firm.The firm then allegedly disseminatedmalicious tweets for two months before thecompeting firm realized that its identity hadbeen hijacked.
  • 13. Protective Measures•Companies can initiate a self-monitoringprogram which include a weekly or monthlyreview of a number of available social mediaweb sites.•Companies may decide to hire an outsideservice provider to monitor for negativecomments and infringements in the socialmedia websites.
  • 14. ConclusionSocial networking sites can present difficultenforcement and liability issues, but withappropriate preventative measures, consistentmonitoring and carefully designedenforcement priorities and actions, companiescan "confirm" social networking sites and theirusers as friends with few reservations.
  • 15. To minimize the risks of trademarkhijacking, trademark infringement and damage tobrand reputation that may occur on social medianetworking sites, it is advisable to takeprecautionary and proactive steps. Those stepsinclude reserving company names and keypermutations of company names with socialnetworking sites, developing a presence in socialnetworking communities, assigning companyemployees who are responsible for overseeing themonitoring process, understanding terms of use foreach of the major social networks and developingconsistent enforcement procedures.
  • 16. THANK YOU

×