SlideShare a Scribd company logo
1 of 20
THE LAW ONLINE
POSTING GONE WILD!
Presented for

Parenting Paper<less Conference
Technology and Single Parenting Conference 2013
October 19, 2013
#parenttech
www.brittontuma.com

2
I am a lawyer

(please don’t hold it against me!)

 educational purposes only
 not intended to be legal advice and should
not be relied on as such
 no attorney-client relationship

 but why am I really happy about being here?

www.brittontuma.com

3
4
1. Can I be sued for [x, y, or z]?

Yes!

2. Is the risk of being online and using social
media worth the risks?

www.brittontuma.com

5
 inform you of some risks of using social media,
email, other online activities
 show you some ways to help minimize those risks
 Remember: the Internet and social media are tools
– what you say and do is much like “real life”
 common sense and thinking, above all else!

www.brittontuma.com

6
What is “social media law” and “digital
information law”?
 the rules that apply to life online
 statutes, common law, contracts
 federal and state governments enact laws
 traditional legal rules apply online
 everything online has a contract
 a few maxims
www.brittontuma.com

7
What can others learn from your
online activity?
 personal
 you, your children, home, stuff?

 professional
 your job, employer’s secrets?

 never anonymous, everything is trackable
 situational awareness
www.brittontuma.com

8
Just because it is on the Internet does
not mean you can have it!







intellectual property rights
infringement of trademark
right to publicity
infringement of copyright
need license or use creative commons
example 

www.brittontuma.com

9
Copyright Example

License:
Creative Commons
Attribution 3.0

Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html

www.brittontuma.com

10
www.brittontuma.com

11









stolen access codes / programs
“sharing” logins to online services
misusing online resources
taking employer info / deleting info
using computers for fraud or theft
using computers to damage others
false accounts
logging in to snoop, spy

www.brittontuma.com

12
Who wants to get sued?
 what you (and your children) say can hurt you!

Bland v. Roberts – “Like” case = 1st Amend.







www.brittontuma.com

tortious interference
defamation (libel, slander, bus. defamation)
false promises
online impersonation
harassment and cyber-bullying
“puffery” of facts – selling on Craigslist, etc.
13
Do unto others as you would have …
 cyberbullying, online threats,
harassment
 harassing telephone calls
 breach of private information
 false impersonation & identity theft
 unlawful interception of
communications
www.brittontuma.com

14
What if someone is talking bad
about you on social media?
 defamation rules apply online
 but … be careful
 the “Streisand Effect”  Dallas
law firm
 anti-SLAPP (Strategic Lawsuits
Against Public Participation)

www.brittontuma.com

15
Social Media + Work = Oil + Water
 online activity is used for hiring and firing
 requesting social media login information
 will read and find everything you say and do –
especially the pictures!
 what only your “friends” can see is still not
protected under privacy laws – it is fair game
 be careful of tone of posts, email, etc.
 if you don’t want it on a billboard, don’t put it out
electronically
www.brittontuma.com

16
If you have legal cases or issues, guess what will
be used against you?


social media is evidence – very powerful evidence!



electronically stored information (“ESI”) is becoming the most
useful form of evidence in virtually every kind of lawsuit and
investigation



we now have complete records of 2-way communication stream
– like all calls recorded!



you don’t “own” your tweets! (“If you post a tweet, just like if you
scream it out the window, there is no reasonable expectation of
privacy.” State of N.Y. v. Harris)



4th Am. ≠ protect Facebook or Twitter posts / tweets

www.brittontuma.com

17
Discuss rules and guidelines with your kids
– understanding works!
 teach to think and understand situations, reasons why

 recognize and appreciate potential issues
 plan how to handle those situations
 use examples to educate on those issues

 follow your kids’ online activity
 everyone screws up – it’s ok
www.brittontuma.com

18
1.
2.
3.
4.
5.
6.
7.
8.

maintain situational awareness
be honest
if you don’t have something nice to say …
the Golden Rule
turn the other cheek
use good judgment
it will come back to bite you
prepare and plan ahead

www.brittontuma.com

19
www.brittontuma.com

20

More Related Content

Viewers also liked

Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Wil van der Aalst
 

Viewers also liked (6)

Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
 
Sights, Sounds and Tastes at the Ballard Farmers Market
Sights, Sounds and Tastes at the Ballard Farmers MarketSights, Sounds and Tastes at the Ballard Farmers Market
Sights, Sounds and Tastes at the Ballard Farmers Market
 
The future business phone
The future business phoneThe future business phone
The future business phone
 
US Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David MertzUS Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David Mertz
 
Protecting Open Innovation with the Defensive Patent License
Protecting Open Innovation with the Defensive Patent LicenseProtecting Open Innovation with the Defensive Patent License
Protecting Open Innovation with the Defensive Patent License
 
How to Design for the Future - Cross Channel Experience Design
How to Design for the Future - Cross Channel Experience DesignHow to Design for the Future - Cross Channel Experience Design
How to Design for the Future - Cross Channel Experience Design
 

More from Shawn Tuma

More from Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

The Law Online - Posting Gone Wild!

  • 1. THE LAW ONLINE POSTING GONE WILD! Presented for Parenting Paper<less Conference Technology and Single Parenting Conference 2013 October 19, 2013
  • 3. I am a lawyer (please don’t hold it against me!)  educational purposes only  not intended to be legal advice and should not be relied on as such  no attorney-client relationship  but why am I really happy about being here? www.brittontuma.com 3
  • 4. 4
  • 5. 1. Can I be sued for [x, y, or z]? Yes! 2. Is the risk of being online and using social media worth the risks? www.brittontuma.com 5
  • 6.  inform you of some risks of using social media, email, other online activities  show you some ways to help minimize those risks  Remember: the Internet and social media are tools – what you say and do is much like “real life”  common sense and thinking, above all else! www.brittontuma.com 6
  • 7. What is “social media law” and “digital information law”?  the rules that apply to life online  statutes, common law, contracts  federal and state governments enact laws  traditional legal rules apply online  everything online has a contract  a few maxims www.brittontuma.com 7
  • 8. What can others learn from your online activity?  personal  you, your children, home, stuff?  professional  your job, employer’s secrets?  never anonymous, everything is trackable  situational awareness www.brittontuma.com 8
  • 9. Just because it is on the Internet does not mean you can have it!       intellectual property rights infringement of trademark right to publicity infringement of copyright need license or use creative commons example  www.brittontuma.com 9
  • 10. Copyright Example License: Creative Commons Attribution 3.0 Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html www.brittontuma.com 10
  • 12.         stolen access codes / programs “sharing” logins to online services misusing online resources taking employer info / deleting info using computers for fraud or theft using computers to damage others false accounts logging in to snoop, spy www.brittontuma.com 12
  • 13. Who wants to get sued?  what you (and your children) say can hurt you! Bland v. Roberts – “Like” case = 1st Amend.       www.brittontuma.com tortious interference defamation (libel, slander, bus. defamation) false promises online impersonation harassment and cyber-bullying “puffery” of facts – selling on Craigslist, etc. 13
  • 14. Do unto others as you would have …  cyberbullying, online threats, harassment  harassing telephone calls  breach of private information  false impersonation & identity theft  unlawful interception of communications www.brittontuma.com 14
  • 15. What if someone is talking bad about you on social media?  defamation rules apply online  but … be careful  the “Streisand Effect”  Dallas law firm  anti-SLAPP (Strategic Lawsuits Against Public Participation) www.brittontuma.com 15
  • 16. Social Media + Work = Oil + Water  online activity is used for hiring and firing  requesting social media login information  will read and find everything you say and do – especially the pictures!  what only your “friends” can see is still not protected under privacy laws – it is fair game  be careful of tone of posts, email, etc.  if you don’t want it on a billboard, don’t put it out electronically www.brittontuma.com 16
  • 17. If you have legal cases or issues, guess what will be used against you?  social media is evidence – very powerful evidence!  electronically stored information (“ESI”) is becoming the most useful form of evidence in virtually every kind of lawsuit and investigation  we now have complete records of 2-way communication stream – like all calls recorded!  you don’t “own” your tweets! (“If you post a tweet, just like if you scream it out the window, there is no reasonable expectation of privacy.” State of N.Y. v. Harris)  4th Am. ≠ protect Facebook or Twitter posts / tweets www.brittontuma.com 17
  • 18. Discuss rules and guidelines with your kids – understanding works!  teach to think and understand situations, reasons why  recognize and appreciate potential issues  plan how to handle those situations  use examples to educate on those issues  follow your kids’ online activity  everyone screws up – it’s ok www.brittontuma.com 18
  • 19. 1. 2. 3. 4. 5. 6. 7. 8. maintain situational awareness be honest if you don’t have something nice to say … the Golden Rule turn the other cheek use good judgment it will come back to bite you prepare and plan ahead www.brittontuma.com 19