Social Media Law

  • 1,006 views
Uploaded on

Social Media Law 2008

Social Media Law 2008

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,006
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
60
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Social Media & the law
  • 2. Part I –the Legal Issues
    • Defamation
    • Privacy
    • Copyright
    • Trademarks
  • 3. Libel Basics
    • The elements of a cause of action for defamation are:
    • 1.A defamatory (pejorative) statement (it’s assumed untrue )
    • 2. Published by the Defendant (to another).
    • 3. Reasonably understood to refer to the Claimant.
  • 4. Examples:
    • Incompetence in your business or profession
    • Corruption - particularly against those in public office
    • Dishonesty - Lying or Theft
    • Adultery - if married
    • Previously accusations of promiscuity or homosexuality were defamatory, but less so.
  • 5. Defenses
    • Truth (justification)
    • Fair Comment (honest opinion based on true facts)
    • Privilege (Qualified ---legal, social, moral on both sides)
    • If there is no defense, it is a libel (if written) and damage I presumed.
  • 6. Extent of liability
    • The Repetition Rule – no defence to repeat – each publisher is liable.
    • Republication Rule— a publisher liable for all forseeable republications.
    • All in the chain liable, primary (authors, editors and publishers) and secondary publishers (printers, distributors and deliverers)
    • Secondary publishers could rely on the defense of innocent dissemination.
  • 7. Remedies
    • Correction – online editions often edited on request
    • Right of Reply
    • No injunctions for Libel –publish and be dammed
    • Damages. For individuals the limit around £250,000 and much less for companies
  • 8. A Drastic Step to sue:
    • Must sue in 1 year and both Statements of Case will be reported in the media.
    • The Defence opens the trial –so initial media coverage is negative for Claimant.
    • Often people start proceedings to save their reputation and hope to settle quietly when the public has forgotten – but you may have to pay the other party’s legal fees.
  • 9. The New Reynolds Defence
    • A new defence for the media – including bloggers and amateur journalists.
    • It allows publication of material you cannot prove is true, providing that checks and balances are adopted.
    • A special type of qualified privilege if:
    • (1) Public interest; and
    • (2) Responsible Journalism—10 point test.
  • 10. The 10 point test
    • The seriousness of the allegation
    • Nature of the information and the extent to which it is a matter of public concern
    • Source of the information – How reliable is it?
    • Who verified the information and what steps were taken?
    • Status of the information
    • Urgency of the matter – News is a perishable commodity but is there an urgent need for the public to be told?
    • Comment from the claimant? A meaningful opportunity to respond to the precise allegations should be given
    • Publish the gist of the claimant’s side of the story? Note a paragraph at the end will not suffice
    • Tone of the article – sensational or balanced?
    • 10. Other .
  • 11. Tips on Reynolds
    • No defense if step into the story and acts as judge and jury or adopts the allegations.
    • Most critical of the 10 points are:
      • The subject of the article must be given the precise allegations to be published
      • The subject must have a meaningful opportunity to respond to them (7) and the gist of that response should be published (8)
    • Those relating to sources (3), status (5) and verification (4) –all require critical analysis of the allegations –rather than blind adoption of the unlikely, fanciful or plain uncorroborated.
  • 12. Misuse of Private Info
    • Is it private (does the person have a reasonable expectation of privacy); and
    • 2. Is it proportionate to prevent disclosure? A balancing exercise between Privacy and Freedom of Expression.
    • Eg.
    • Family life , intimate relationships and sexual life
    • Financial information and position
    • Physical and mental health and medical conditions and details of treatment
    • Previous convictions and sentences
    • Photographs and particularly of children
    • Personal privacy is not lost once disclosed.
  • 13. Public Interest
    • Can justify intrusions of privacy :
    • To detect or expose crime or impropriety.
    • Protect public health and safety.
    • 3. Prevent the public from being misled –hypocrisy (eg Naomi Campbell).
    • 4. Public funds.
    • The press often try to create a public interest hook to a story that is essentially private.
    • Egs.
    • -Lord Brown of BP’s lover’s use of BP resources.
    • -Max Mosley –make the sex romp Nazi to use hypocrisy hook
  • 14. Remedies
    • A warning by the PCC –can stop a story in its tracks if it is truly private. This is free!
    • An injunction –costs around £25k and can backfire badly –eg BP
    • If dissemination has passed the point of no return –then a remedy will not be granted eg Mosley.
    • If a privacy claim –then you usually also have a data protection claim for unfair processing.
  • 15. Copyright Basics
    • Protects form of fixation ---not the idea.
    • The individual creator of a work (or his employer) is the first owner of copyright.
    • Copyright will only prevent copying –not independent creation.
    • Copying is presumed from access and similarity, unless the defendant can prove independent creation.
  • 16. Infringement Copyright infringement: 1. Is what is taken substantial?   2. If so, is there a defense? 3 very narrow “fair dealing” defenses :   A. Private study or research of literary, dramatic, musical or artistic works for non-commercial purposes (§29). B. Criticism or review of a work already in the public domain with acknowledgement, (§30(1)). C. Reporting of current events with acknowledgement (this does not apply to photographs) (§30(2)).
  • 17. Trade Marks
    • A statutory right to the exclusive use of the mark in connection in the classes for which it is registered.
    • The right to sue for infringement against uses of an identical or similar mark in connection with identical or similar goods without consent, where a likelihood of confusion.
    • Owners of fameous marks can prevent use of an identical or similar mark on dissimilar goods if tarnishes brand (dilution).
    • Broader than copyright as independent creation is no assist as a defence. A monopoly.
    • Defences include comparative advertising, and use of names and descriptive use.
  • 18. Marks on web
    • Territorial nature of trade marks v Domain Names .
    • Taking third party’s mark as a Domain name, can constitute bad faith the Uniform Domain Name Dispute Resolution Policy of ICANN
    • Online use on a website is not considered international use, Courts consider:
    • The intentions of the site operator.
    • Languages,
    • Currency of prices,
    • Disclaimers and shipping territories
    • Telephone numbers and addresses will all be considered.
  • 19. Territorial Issues
    • A Defamation is published where read -not place of publisher. Potential liability is worldwide –subject to location of assets against which to enforce. Special rule in EU.
    • Privacy , usually country of residence of individual.
    • Copyright , Berne Convention members grant reciprocal recognition to other nationals copyright works
    • Trade Marks are country by country except for:
    • the Community Trade Mark (all 27)
    • International registrations
  • 20. Part II: Online Issues
  • 21. Takedown basics
    • Applies to all content liability issues
    •  
    • Only works if directed at the intermediary. Not for primary publishers, or authors or editors.
    •  
    • Cannot moderate or review.
    • Only applies if the intermediary has no actual knowledge (of the content) or constructive knowledge.
    •  
    • The intermediary must expeditiously remove the material after receiving notification (Takedown).
    •  
    • Liable for the content, if you leave it up after request. Demon v Godfrey and Blunt v Tilley.
  • 22. If and how to Takedown
    • Most ISPs remove on complaint ---no questions asked
    • Some resist –consider carefully the intermediary and the material.
    • If a clear defence, Takedown can backfire and be a PR disaster, E.g –we fought the Lloyds .
    •  
    • To give a Takedown Notice –do a WHOIS Search on the Domain .
    • The Takedown Notice should:
    • Identify the URL and the content complained of.
    • Be vague as to the legal justification for removal.
  • 23. Trouble in the EU
    • The UK --pro ISP, Blunt v Tilley & BBC v Allen, -- e.g. chat on Bulletin Boards is more slander than libel and casual , like people chatting in a bar. Smith v ADVFN.
    •  
    • French Courts have taken a very different approach:
    •  
      • Web tools plus ads destroys intermediary status and renders an editor or publisher, Lucky Comics v Tiscali, Lucky Comics v MySpace
    •   
      • Video sharing platform ,liable as availability of copyright works increased audience and income from advertising). Daily Motion
    •  
      • Zadig Productions v Google Video (despite repeat takedowns , Google liable for new postings as had not shown it had taken all steps necessary to prevent reposting).
  • 24. Other free remedies
    • Paid space or search –make a Complaint to the ASA
    • Editorial – complain to the PCC
    • Audiovisual – complain to Ofcom
    • Can use for inaccuracies/defamation and breach of privacy.
    • They will order removals or corrections and apologies ---but no damages.
    • Only requires the time to prepare a Complaint.
  • 25. Getting the posters
    • The intermediary may be ordered to disclose the identity of the poster -- a Norwich Pharmacal order.
    • Due to confidentiality & Data Protection obligations, ISP’s require a Court Order before revealing identities.
    • EU law requires a Court Order in civil cases, Promusicae v Telefonica
    • UK Courts have robustly refused to make orders where the comments were jokes or just abusive comments. BBC v Sheffield FC’s Dave Allen, BBC v Hargreaves
  • 26. Fighting Takedown 1. Seek the precise allegations they say are inaccurate and the meanings they complain of. A blanket notice will not suffice.   2. Consider temporarily removing while taking advice.   3. Post the Takedown Notice—on your own site and also at www.chillingeffects.org . This ensures the public can see what is being done and casts sunlight on attempts to remove materials online. 4. Posting the other side of the story –create a qualified privilege or Reynolds defense to defamation–provided the information has some public interest relevance. See one we did at http://www.hotukdeals.com/item/187273/redsave-nettexmedia-take-down-notic/showthread.php?t=187273&page=29 .
  • 27. Linking
    • Can be copyright or trade mark infringement or breach of the database right (if deep linking where no copying).
    • Can be commercial use as deep links take the user past advertising and affect the revenues.
    • Breach of contract --where linking is prohibited by the Ts & Cs.
    • No implied licences /consent just because online and not copy protected.
    • Intermediaries can and should treat UG links just like other UGC.
    • Care where the use is commercial, consider the nature of the owner. Newspapers sue, Copiepresse v Google
  • 28. Keywords
    • Invisible use of a competitors mark ---unproblematic.
    • English and German cases have held Google & Yahoo not liable for selling keywords that are third party trademarks e.g. Mr Spicy .
    • Avoid any misrepresentation that you are your competitor –or confusion as to the origin of the goods or services.
    • Caution if another’s mark used in your link/ad:
      • Avoid use of another’s logo mark/graphics -copyright
      • 2. Comparative advertising is permitted if compares like to like, is fair and honest , no likelihood of confusion, or denigration of goods or marks, or unfair advantage. 02 v Hutchison
  • 29. Second Hand Goods
    • Trade mark holders can only control the first sale in the EU—after that rights are “exhausted. ”
    • Genuine second hand goods or repair services can be described by reference to the trade mark ---care required. BMW and Volvo cases –different results for second hand dealers.
    • eBay cases in the US and France:
        • Tiffany v eBay, not liable as sales of authentic second hand goods were protected by “nominative fair use.” Generalized knowledge insufficient for liability and eBay tookdown.
    • Louis Vuitton & Christian Dior v eBay, eBay liable, Facts were almost identical but in France the keywords included “imitation” and “replica” and “fake” with the trade mark.
  • 30. Blogs
    • Bloggers subject to the law of libel and privacy and other legal restrictions on speech ---like any other publishers and like a newspaper.
    • Bloggers can claim the Reynolds defence of qualified privilege for the media, if public interest and they meet the standard of responsible journalism (see the 10 point test).
    • Untested whether bloggers can claim protection from disclosure of their sources --under §10 of the Contempt of Court Act.
    • Employee blogs: unauthorized or undisclosed, may expose :
      • Trade secrets and business plans and financials.
      • Company to vicarious liability for bullying or harassment or discrimination of other employees and defamation.
      • Reputational --as employer, corporate citizen
  • 31. Flogs/Astroturfing
    • A breach of the CAP Code’s requirements of truthfulness which applies to advertising in paid for space and paid for search or sponsored links and viral ads with downloads.
    • New rule 22.3 on “Recognizing Marketing Communications and identifying marketers” –marketers should not falsely claim or imply they are acting as consumers or for purposes that do not relate to their business.
    •  
    • Breach of the Consumer Protection from Unfair Trading Regulations 2008.
    •  
  • 32. Networking
    • Users grant consent under the Ts & Cs and Privacy Policy, when users post information on themselves.
    • Minors cannot consent.
    •  
    • Users cannot grant consent on behalf of others –and a particular issue with photos of private activities.
    • Users risk their privacy and personal data and disclosures they may later regret.
    • Abusive comments can be defamatory, harassment or bullying.
    •  
    • Identity theft and fraud and extortion are regarded as major risks for users. See ENISA report.
    • Sexual predators the major risk for minors
    •  
  • 33. Early cases
    • Who owns a contact?
    •  
      • Recruitment agency sued former employee (who had left to establish a competing firm) for migrating company contacts to his personal linked in account –despite the fact that it was done with their consent and once uploaded it had ceased to be confidential. Not a final ruling –merely an order to disclose documents. Likely a contract issue but once confidence is lost -gone for good. Hays v Ions
    •  
      • Customer cards and addresses were not confidential –when on a company website and the personal contacts could be found online. WRN v Awris.
    •  
    • False Identities can be defamatory and misuse of private information –eg Applause Store Productions Limited and Mathew Firsht v Grant Raphael.
  • 34. Regulation
    • Taskforce on Child Protection on the Internet
    • Good practice guidance for providers of social-networking and other interactive services . Similar views as recent Byron review.
    • http://police.homeoffice.gov.uk/publications/operational-policing/social-networking-guidance?view=Binary
    • Key Recommendations:
    • Safety info & privacy tools
    • Takedown procedures
    • Clear information about data gathering
    • Default profiles set to private or to approved contacts for the under 18s
    • Private profiles of under 18s should not be searchable
    • Moderation of video and photo content from under 18s
    • Identity authentication and age verification