SlideShare a Scribd company logo
1 of 38
SOCIAL MEDIA LAW
         It is Real and, Yes,
 Really Can Impact Your Business
                   Presented for

                   MENG
Marketing Executives Networking Group - Dallas
              November 9, 2012
I am a lawyer
       what I say today as well as the slide presentation are
        for educational purposes only and not intended to
        be legal advice and should not be relied on as such
       this does not create an attorney-client relationship
       why am I really happy about being here and what
        am I really trying to do?



www.brittontuma.com                                              2
3
1. Can I be sued for [x, y, or z]?   Yes!
     2. Is the risk of using social media worth it?




       Law + Social Media = Peaceful Coexistence
www.brittontuma.com                                   4
Today I want to:
           help find an acceptable balance

           educate you on risks of using social media, along with
            other digital business risks

           show you some ways to help minimize those risks

           Remember: social media is a tool – what you say and
            do is much like “real life”

           Use common sense!

           Of course use social media – but use it properly!
www.brittontuma.com                                                  5
WHAT IS
SOCIAL MEDIA LAW?




                    6
Social Media Law:
            The law that applies to and
            governs the use of social media.

                          (was that all you really wanted to know?)




www.brittontuma.com                                                   7
Social Media Law:
         inherent risks
         natural tension between promoters v. risk
          management in business
         BUT!!!
         I am “sold out” on social media and an avid
          user … and I don’t want to get sued either …

www.brittontuma.com                                      8
2 General Types of Law

             Codes: legislatures create specific laws to
              address specific problems

             Common Law: judges look to general
              principles of law and, by using reason,
              apply those principles to resolve
              previously unforeseen problems
www.brittontuma.com                                         9
Legislatures want to keep up
              impossible
              speed technology is evolving
              speed culture and business environment changing
              legislature too slow
                    example:
                        • last spring the big ruckus was prospective
                            employers asking for social media logins –
                            the massive public outcry made it such
                            that nobody in their right mind would do
                            that now
                        • Aug 2012: Illinois became one of 2 states
                            to enact a law to prohibit (eff. date: 1/1/13)

www.brittontuma.com                                                          10
www.brittontuma.com   11
Look to Common Law
             contract law
             intellectual property law
             torts – defamation
             regulatory law
             employment law
             evidence law

www.brittontuma.com                       12
You can’t protect against what you
            don’t know, so let’s apply this “law
                stuff” to the real world …




www.brittontuma.com                                13
Who uses social media for marketing?
             do you want to give your marketing efforts to
              your competitor?
             who really owns your account
             followers / connections?
             “an ounce of prevention is worth a pound of
              cure”: PhoneDog v. Kravitz
             each service or site has a contract
             contract law
www.brittontuma.com                                           14
Who has trade secrets, confidential and
        proprietary information?
             do you want to tell your competitors?
             customer / vendor lists
                     who are you talking to or following?

             secret business alliances, strategies, plans
             business situational awareness
             intellectual property law


www.brittontuma.com                                          15
Who wants to get sued?
             infringement of trademark
             right to publicity
                   name, voice, signature, photo, likeness (statutory after death)
                   common law while living if for value
                   commercial v. educational or newsworthy
                   audience picture v. company promo video
             infringement of copyright
                   attribution isn’t always enough
                   DMCA Takedown Request
                   Google now penalizes for too many
                must have a license or use creative commons
                intellectual property law
www.brittontuma.com                                                                   16
Copyright Example


                                                                     License:
                                                                Creative Commons
                                                                  Attribution 3.0




       Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html
www.brittontuma.com                                                                  17
Who wants to get sued some more?
             what you (and your employees) say can hurt you!


                    Bland v. Roberts – “Like” case
                     tortious interference
                     defamation (libel, slander, bus. defamation)
                     false advertising & false warranties
                     fraud & negligent misrepresentation
                     online impersonation
                     harassment and cyber-bullying
                     “puffery” of facts
www.brittontuma.com                                                  18
Who wants to get investigated by the
        Feds?
               FTC – Investigated Hyundai for not disclosing incentives
                given to bloggers for endorsements.
                     Google recently. (Fed. Ct. in Oracle v. Google)
               HHS & OCR – could have investigated hospital worker who
                posted patient “PHI” on Facebook (“Funny, but this patient
                came in to cure her VD and get birth control.”)
               SEC – false statements in raising funds (SEC v. Imperia
                Invest. IBC) or insider information  “Board meeting.
                Good numbers=Happy Board.” before official release
               regulatory law
www.brittontuma.com                                                          19
What are some real trouble spots?
             Employment issues – next section
             Giveaways and contests can be trouble for many
              reasons – do not do them on social media
              without having it thoroughly vetted
                     many sites’ TOS prohibit
                     jurisdiction gambling and contest rules
             Have you read Facebook’s Page Terms?
                (https://www.facebook.com/24hfcastlehills/posts/403914059658181)




www.brittontuma.com                                                                20
www.brittontuma.com   21
What if someone is talking bad
  about your business on social
  media?
       defamation rules apply online
       but … be careful
       the “Streisand Effect”  Dallas
        law firm
       anti-SLAPP (Strategic Lawsuits
        Against Public Participation)

www.brittontuma.com                       22
Guess what will be used against you?
             social media is evidence – very powerful evidence!
             electronically stored information (“ESI”) is becoming
              the most useful form of evidence in virtually every
              kind of lawsuit and investigation
             we now have complete records of 2-way
              communication stream – like all calls recorded!
             you don’t “own” your tweets! (“If you post a tweet, just like
                if you scream it out the window, there is no reasonable
                expectation of privacy.” State of N.Y. v. Harris)

             4th Am. ≠ protect Facebook posts (U.S. v. Meregildon,
                Aug. 10, 2012)

www.brittontuma.com                                                           23
MINIMIZING THE
 RISKS OF SOCIAL
MEDIA IN BUSINESS




                    24
Monitor, Regulate & Archive SM
              Necessary if regulated industry
                     finance, insurance, energy &
                      utilities, healthcare, government, legal

              Wise for others
              Products
                     Barracuda Web Filter
                     DataSift
                     Actiance

www.brittontuma.com                                              25
In general you want to
              recognize and appreciate potential issues
              decide how to handle those issues
              educate your team on those issues
              collaborate and train on how to comply with and
               resolve issues
              create and outline procedures for using social
               media
              monitor (to some degree) to ensure compliance
www.brittontuma.com                                              26
Social media policies are a “must have”
                ounce of prevention: less than 1 day of litigation
                if have, must enforce
                trying to predict issues – but evolving – can’t get all
                contractually resolve issues such as ownership and
                 authority
                great opportunity to set rules and document expectations
                greater opportunity to explain and ensure understanding
                 of expectations
                put on notice of monitoring – and actually monitor!
                should address employment issues


www.brittontuma.com                                                         27
Employment Issues
             using social media in hiring
                 best to have set criteria with neutral third
                  party investigate for criteria
                 not use to discriminate
                         e.g., snooping to find race, gender, age, disability,
                          pregnancy
                         e.g., search for candidates on Twitter where
                          disproportionate number of people <40 yrs. on Twitter,
                          may violate the Age Discrimination in Employment Act

                 requesting social media login information
www.brittontuma.com                                                                28
Employment Issues
             using personal social media during work
                     can be prohibited
                     may prohibit using or disclosing company IP for
                      personal SM
                     may prohibit using company info for setting up
                      personal SM accounts




www.brittontuma.com                                                     29
You need social media policies but the National
        Labor Relations Board is making it difficult
               NLRB jurisdiction = impacts interstate commerce
               National Labor Relations Act (NLRA) sec. 7 gives employees
                right to engage in “concerted activities for the purpose of …
                mutual aid and protection”
               NLRB finds illegal any policy provision that (a) restricts or (b)
                an employee would reasonably construe to chill concerted
                activities
               On 5/30/12 NLRB General Counsel issued its 3rd Report on
                Social Media Policies in 1 year period (8/11 & 1/12)
               9/7/12 First NLRB Ruling; 9/20/12 first NLRB Admin.L.J.
www.brittontuma.com                                                                 30
Can you guess who the NLRB is pulling for?
             making it very difficult for businesses to protect
              themselves
             social media policies must now be carefully tailored
              to
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             Examples of provisions found illegal by NLRB


www.brittontuma.com                                                              31
www.brittontuma.com   32
www.brittontuma.com   33
www.brittontuma.com   34
What is the NLRB really looking for?
             clarity and precision
             examples of do’s and don’ts that give
              context and real-life meaning to the rules




www.brittontuma.com                                        35
Cyber Insurance
               If you are doing anything in cyberspace, you need it.
                Period.
               Most traditional insurance does not cover cyber-events,
                even if you think it does (really!)
               Cyber-Insurance is relatively inexpensive
               Most policies come include a cyber-risk audit before the
                policies are underwritten
               Policies can cover social media risk, computer fraud risk,
                and data breach / hacking risk



www.brittontuma.com                                                          36
 social media is wonderful!
             must find proper balance
             need a social media policy
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             need to enforce social media policy
             need to spend time with employees to help them
              understand and possibly collaborate on the rules
             need to look at cyber-insurance!
www.brittontuma.com                                                              37
www.brittontuma.com   38

More Related Content

What's hot

The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
The Selling of Counterfeit Goods on Social Media
The Selling of Counterfeit Goods on Social MediaThe Selling of Counterfeit Goods on Social Media
The Selling of Counterfeit Goods on Social MediaBrandBastion
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”IDology, Inc
 
Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012NGUYEN MINH QUOC
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commercemonchai sopitka
 
Web 2.0 Licensed to Kill
Web 2.0 Licensed to KillWeb 2.0 Licensed to Kill
Web 2.0 Licensed to KillMike Thornburg
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationKenneth Ronkowitz
 
Cover Your Ass(ets): Online Advertising Compliance Update
Cover Your Ass(ets): Online Advertising Compliance UpdateCover Your Ass(ets): Online Advertising Compliance Update
Cover Your Ass(ets): Online Advertising Compliance UpdateAffiliate Summit
 
Augmented legality-1.0-e-book
Augmented legality-1.0-e-bookAugmented legality-1.0-e-book
Augmented legality-1.0-e-bookKarlos Svoboda
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerDarren Chaker
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...
White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...
White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...Identive
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014Giovanni Maria Riccio
 
064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LDTed Roe
 

What's hot (19)

The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
The Selling of Counterfeit Goods on Social Media
The Selling of Counterfeit Goods on Social MediaThe Selling of Counterfeit Goods on Social Media
The Selling of Counterfeit Goods on Social Media
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
To Tweet or Not to Tweet - Social Media and Intellectual Property Issues
To Tweet or Not to Tweet - Social Media and Intellectual Property IssuesTo Tweet or Not to Tweet - Social Media and Intellectual Property Issues
To Tweet or Not to Tweet - Social Media and Intellectual Property Issues
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”
 
Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
Web 2.0 Licensed to Kill
Web 2.0 Licensed to KillWeb 2.0 Licensed to Kill
Web 2.0 Licensed to Kill
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Cover Your Ass(ets): Online Advertising Compliance Update
Cover Your Ass(ets): Online Advertising Compliance UpdateCover Your Ass(ets): Online Advertising Compliance Update
Cover Your Ass(ets): Online Advertising Compliance Update
 
Spokeo v Robins
Spokeo v RobinsSpokeo v Robins
Spokeo v Robins
 
Augmented legality-1.0-e-book
Augmented legality-1.0-e-bookAugmented legality-1.0-e-book
Augmented legality-1.0-e-book
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-Chaker
 
Social media in the workplace
Social media in the workplaceSocial media in the workplace
Social media in the workplace
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...
White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...
White Paper | Consumer Data Privacy in a Networked World: A Framework for Pro...
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014
 
064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD
 

Viewers also liked

Public broadcasting; what should it add, what should be its role and what are...
Public broadcasting; what should it add, what should be its role and what are...Public broadcasting; what should it add, what should be its role and what are...
Public broadcasting; what should it add, what should be its role and what are...Mark Boukes (University of Amsterdam)
 
Social media for law students & lawyers
Social media for law students & lawyersSocial media for law students & lawyers
Social media for law students & lawyersEmily Brennan
 
Lawyers and Social Media - Personal Branding for Law Students (University of...
Lawyers and Social Media  - Personal Branding for Law Students (University of...Lawyers and Social Media  - Personal Branding for Law Students (University of...
Lawyers and Social Media - Personal Branding for Law Students (University of...Brian Inkster
 
Film censorship, review and criticism
Film censorship, review and criticismFilm censorship, review and criticism
Film censorship, review and criticismkomalbhalani
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 

Viewers also liked (7)

Public broadcasting; what should it add, what should be its role and what are...
Public broadcasting; what should it add, what should be its role and what are...Public broadcasting; what should it add, what should be its role and what are...
Public broadcasting; what should it add, what should be its role and what are...
 
Social media for law students & lawyers
Social media for law students & lawyersSocial media for law students & lawyers
Social media for law students & lawyers
 
OUHK Comm6024 Lecture 9 - ethics in pr
OUHK Comm6024 Lecture 9 -  ethics in prOUHK Comm6024 Lecture 9 -  ethics in pr
OUHK Comm6024 Lecture 9 - ethics in pr
 
Lawyers and Social Media - Personal Branding for Law Students (University of...
Lawyers and Social Media  - Personal Branding for Law Students (University of...Lawyers and Social Media  - Personal Branding for Law Students (University of...
Lawyers and Social Media - Personal Branding for Law Students (University of...
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Film censorship, review and criticism
Film censorship, review and criticismFilm censorship, review and criticism
Film censorship, review and criticism
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 

Similar to Social Media Law - Marketing Executives Networking Group (MENG)

Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)Matthew Asbell
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyIFLP
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
Troy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docx
Troy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docxTroy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docx
Troy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docxturveycharlyn
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forMcPhearson TVHolden
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social MediaDavid Cain
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Social Media Legal Issues & Best Practices
Social Media Legal Issues & Best PracticesSocial Media Legal Issues & Best Practices
Social Media Legal Issues & Best Practicesskmarcus
 
A Legal Guide to the Commercial Risks and Rewards of the Social Media Phenomenon
A Legal Guide to the Commercial Risks and Rewards of the Social Media PhenomenonA Legal Guide to the Commercial Risks and Rewards of the Social Media Phenomenon
A Legal Guide to the Commercial Risks and Rewards of the Social Media PhenomenonElizabeth Lupfer
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Bryson Winfrey- Social Commerce and The Laws of Social Advertising
Bryson Winfrey- Social Commerce and The Laws of Social AdvertisingBryson Winfrey- Social Commerce and The Laws of Social Advertising
Bryson Winfrey- Social Commerce and The Laws of Social AdvertisingBryson Winfrey
 
F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4Gregory Birgé
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Bernard Marr
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 

Similar to Social Media Law - Marketing Executives Networking Group (MENG) (20)

Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Troy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docx
Troy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docxTroy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docx
Troy NealWednesdayMar 14 at 852pmManage Discussion EntryJRN41.docx
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Social Media Legal Issues & Best Practices
Social Media Legal Issues & Best PracticesSocial Media Legal Issues & Best Practices
Social Media Legal Issues & Best Practices
 
A Legal Guide to the Commercial Risks and Rewards of the Social Media Phenomenon
A Legal Guide to the Commercial Risks and Rewards of the Social Media PhenomenonA Legal Guide to the Commercial Risks and Rewards of the Social Media Phenomenon
A Legal Guide to the Commercial Risks and Rewards of the Social Media Phenomenon
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Bryson Winfrey- Social Commerce and The Laws of Social Advertising
Bryson Winfrey- Social Commerce and The Laws of Social AdvertisingBryson Winfrey- Social Commerce and The Laws of Social Advertising
Bryson Winfrey- Social Commerce and The Laws of Social Advertising
 
Unfair competition
Unfair competitionUnfair competition
Unfair competition
 
F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 

More from Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital EngagementShawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 

More from Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Social Media Law - Marketing Executives Networking Group (MENG)

  • 1. SOCIAL MEDIA LAW It is Real and, Yes, Really Can Impact Your Business Presented for MENG Marketing Executives Networking Group - Dallas November 9, 2012
  • 2. I am a lawyer  what I say today as well as the slide presentation are for educational purposes only and not intended to be legal advice and should not be relied on as such  this does not create an attorney-client relationship  why am I really happy about being here and what am I really trying to do? www.brittontuma.com 2
  • 3. 3
  • 4. 1. Can I be sued for [x, y, or z]? Yes! 2. Is the risk of using social media worth it? Law + Social Media = Peaceful Coexistence www.brittontuma.com 4
  • 5. Today I want to:  help find an acceptable balance  educate you on risks of using social media, along with other digital business risks  show you some ways to help minimize those risks  Remember: social media is a tool – what you say and do is much like “real life”  Use common sense!  Of course use social media – but use it properly! www.brittontuma.com 5
  • 7. Social Media Law: The law that applies to and governs the use of social media. (was that all you really wanted to know?) www.brittontuma.com 7
  • 8. Social Media Law:  inherent risks  natural tension between promoters v. risk management in business  BUT!!!  I am “sold out” on social media and an avid user … and I don’t want to get sued either … www.brittontuma.com 8
  • 9. 2 General Types of Law  Codes: legislatures create specific laws to address specific problems  Common Law: judges look to general principles of law and, by using reason, apply those principles to resolve previously unforeseen problems www.brittontuma.com 9
  • 10. Legislatures want to keep up  impossible  speed technology is evolving  speed culture and business environment changing  legislature too slow example: • last spring the big ruckus was prospective employers asking for social media logins – the massive public outcry made it such that nobody in their right mind would do that now • Aug 2012: Illinois became one of 2 states to enact a law to prohibit (eff. date: 1/1/13) www.brittontuma.com 10
  • 12. Look to Common Law  contract law  intellectual property law  torts – defamation  regulatory law  employment law  evidence law www.brittontuma.com 12
  • 13. You can’t protect against what you don’t know, so let’s apply this “law stuff” to the real world … www.brittontuma.com 13
  • 14. Who uses social media for marketing?  do you want to give your marketing efforts to your competitor?  who really owns your account  followers / connections?  “an ounce of prevention is worth a pound of cure”: PhoneDog v. Kravitz  each service or site has a contract  contract law www.brittontuma.com 14
  • 15. Who has trade secrets, confidential and proprietary information?  do you want to tell your competitors?  customer / vendor lists  who are you talking to or following?  secret business alliances, strategies, plans  business situational awareness  intellectual property law www.brittontuma.com 15
  • 16. Who wants to get sued?  infringement of trademark  right to publicity  name, voice, signature, photo, likeness (statutory after death)  common law while living if for value  commercial v. educational or newsworthy  audience picture v. company promo video  infringement of copyright  attribution isn’t always enough  DMCA Takedown Request  Google now penalizes for too many  must have a license or use creative commons  intellectual property law www.brittontuma.com 16
  • 17. Copyright Example License: Creative Commons Attribution 3.0 Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html www.brittontuma.com 17
  • 18. Who wants to get sued some more?  what you (and your employees) say can hurt you! Bland v. Roberts – “Like” case  tortious interference  defamation (libel, slander, bus. defamation)  false advertising & false warranties  fraud & negligent misrepresentation  online impersonation  harassment and cyber-bullying  “puffery” of facts www.brittontuma.com 18
  • 19. Who wants to get investigated by the Feds?  FTC – Investigated Hyundai for not disclosing incentives given to bloggers for endorsements.  Google recently. (Fed. Ct. in Oracle v. Google)  HHS & OCR – could have investigated hospital worker who posted patient “PHI” on Facebook (“Funny, but this patient came in to cure her VD and get birth control.”)  SEC – false statements in raising funds (SEC v. Imperia Invest. IBC) or insider information  “Board meeting. Good numbers=Happy Board.” before official release  regulatory law www.brittontuma.com 19
  • 20. What are some real trouble spots?  Employment issues – next section  Giveaways and contests can be trouble for many reasons – do not do them on social media without having it thoroughly vetted  many sites’ TOS prohibit  jurisdiction gambling and contest rules  Have you read Facebook’s Page Terms? (https://www.facebook.com/24hfcastlehills/posts/403914059658181) www.brittontuma.com 20
  • 22. What if someone is talking bad about your business on social media?  defamation rules apply online  but … be careful  the “Streisand Effect”  Dallas law firm  anti-SLAPP (Strategic Lawsuits Against Public Participation) www.brittontuma.com 22
  • 23. Guess what will be used against you?  social media is evidence – very powerful evidence!  electronically stored information (“ESI”) is becoming the most useful form of evidence in virtually every kind of lawsuit and investigation  we now have complete records of 2-way communication stream – like all calls recorded!  you don’t “own” your tweets! (“If you post a tweet, just like if you scream it out the window, there is no reasonable expectation of privacy.” State of N.Y. v. Harris)  4th Am. ≠ protect Facebook posts (U.S. v. Meregildon, Aug. 10, 2012) www.brittontuma.com 23
  • 24. MINIMIZING THE RISKS OF SOCIAL MEDIA IN BUSINESS 24
  • 25. Monitor, Regulate & Archive SM  Necessary if regulated industry  finance, insurance, energy & utilities, healthcare, government, legal  Wise for others  Products  Barracuda Web Filter  DataSift  Actiance www.brittontuma.com 25
  • 26. In general you want to  recognize and appreciate potential issues  decide how to handle those issues  educate your team on those issues  collaborate and train on how to comply with and resolve issues  create and outline procedures for using social media  monitor (to some degree) to ensure compliance www.brittontuma.com 26
  • 27. Social media policies are a “must have”  ounce of prevention: less than 1 day of litigation  if have, must enforce  trying to predict issues – but evolving – can’t get all  contractually resolve issues such as ownership and authority  great opportunity to set rules and document expectations  greater opportunity to explain and ensure understanding of expectations  put on notice of monitoring – and actually monitor!  should address employment issues www.brittontuma.com 27
  • 28. Employment Issues  using social media in hiring  best to have set criteria with neutral third party investigate for criteria  not use to discriminate  e.g., snooping to find race, gender, age, disability, pregnancy  e.g., search for candidates on Twitter where disproportionate number of people <40 yrs. on Twitter, may violate the Age Discrimination in Employment Act  requesting social media login information www.brittontuma.com 28
  • 29. Employment Issues  using personal social media during work  can be prohibited  may prohibit using or disclosing company IP for personal SM  may prohibit using company info for setting up personal SM accounts www.brittontuma.com 29
  • 30. You need social media policies but the National Labor Relations Board is making it difficult  NLRB jurisdiction = impacts interstate commerce  National Labor Relations Act (NLRA) sec. 7 gives employees right to engage in “concerted activities for the purpose of … mutual aid and protection”  NLRB finds illegal any policy provision that (a) restricts or (b) an employee would reasonably construe to chill concerted activities  On 5/30/12 NLRB General Counsel issued its 3rd Report on Social Media Policies in 1 year period (8/11 & 1/12)  9/7/12 First NLRB Ruling; 9/20/12 first NLRB Admin.L.J. www.brittontuma.com 30
  • 31. Can you guess who the NLRB is pulling for?  making it very difficult for businesses to protect themselves  social media policies must now be carefully tailored to  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  Examples of provisions found illegal by NLRB www.brittontuma.com 31
  • 35. What is the NLRB really looking for?  clarity and precision  examples of do’s and don’ts that give context and real-life meaning to the rules www.brittontuma.com 35
  • 36. Cyber Insurance  If you are doing anything in cyberspace, you need it. Period.  Most traditional insurance does not cover cyber-events, even if you think it does (really!)  Cyber-Insurance is relatively inexpensive  Most policies come include a cyber-risk audit before the policies are underwritten  Policies can cover social media risk, computer fraud risk, and data breach / hacking risk www.brittontuma.com 36
  • 37.  social media is wonderful!  must find proper balance  need a social media policy  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  need to enforce social media policy  need to spend time with employees to help them understand and possibly collaborate on the rules  need to look at cyber-insurance! www.brittontuma.com 37