Social Technology
Points of Practice
Amy Larrimore | Managing Partner
Meet Amy Larrimore
@AmyAllStar
#140 Speaker
2013
New York, NY
Advisor to Three
Heads of State,
including the USA
Pennsylva...
Agenda
Today, we work on understanding:
Mechanics
Impact
What you don’t know
What they don’t know
Limitations
How events o...
Social Media the Noun? Or the Verb?
Or something else entirely.
All the Legal Disciplines
Plus regulations that are
industry specific.
• Employment Law
• Litigation
• IP Issues
• Contrac...
Technology:
What’s Your Goal?
Selection, Setup and Management
Litigation
Business Risk Management
It all starts with
under...
Username
(begins with @)Display Name
(link to profile)
Avatar
(Photo)
See related
tweets
(blue line)
Types of Interactions...
Stop Thinking It’s One Monster
One brand technology
(“Facebook”) is actually a
combination of many
separate products with
...
Technology Architecture
Domain
Website + Web Hosting
Ecommerce Platform
Financial System
Shopping Cart
Payment Gateway
Mer...
The New Real Estate
http://dodynamic.com/latest-news/a-website-is-like-a-house/
Domains
ICANN regulates Ownership
and Use of Domain Names
• empirebuilders.com (TLD)
• teaching.empirebuilders.com (SLD)
...
Integrations
Social Media
Planning or Scheduling Tools
Email Marketing
Customer Service and Support
CRM
Invoicing
D...
Understanding Impact
Social Media is CAUSAL
It’s not about breakfast cereal and grandkids pics.
• Anonymous
• Instant
• Global
Government Overthrow
• 2009 Moldova civil unrest
• 2009 Iranian election protests
• 2010 Tunisian Jasmine Revolution
• 201...
Big Data & Research
Predict Disease
Outbreak Locations
Profound
Statistically
Significant
Global Pulse
Messaging is Viral – No Relationship Required
Understanding What You Don’t Know
Technology is built on trickery and most people try extra hard to trick the lawyers.
The Myth of Opt In
• SaaS forces the user to agree to
terms to proceed.
• It is outside of regular contract
negotiation.
•...
The Mirage of User Experience
“The Redirect - Masked”
The Mirage of User Experience
“The Redirect - Obvious”
The MIRAGE of USER EXPERIENCE
“The Jigsaw Puzzle”
Understanding What They Don’t Know
Don’t Bet on the IT Department
If you think hiring an
expert is expensive,
wait until you see the
cost of an amateur.
• Requirements Creation
• Sourcing/...
Where exactly is our
CONTENT?
The Jurisdiction of
“Everywhere”
Uzbekistan
Inventory of States and Countries Whose Regulations May
Apply or Where Jurisdiction May Be Established
The sales chat rep says it’s just
three easy steps:
1. Enter company credit card
2. Upload all company data
3. Watch a six...
Stored
Communications Act
Courts are moving in a more protective
direction regarding Fourth Amendment
and electronically-...
Understanding Your
Limitations
Contract Management vs.
Risk Management
Contract Law is
backwards now.
Understanding how
events actually occur
McMillen is Zimmerman
v. Weis Markets, Inc.
(2011 Pa. Dist. & Cnty. –
May 19, 2011...
The Business Unit Can’t Help You Either.
The green software or the blue one
mentioned in a Linkedin Group?
I really like the green one…
The Data Keepers – Enforcing Destruction Policy
Understanding risks, probabilities and severity
“Resume Generating Events”
Suddenly Toy Planes Have
Everyone Talking….
The Theft of @N
 A story of how
hacking, extortion &
bad vendor practices
can lose $50,000 in 7
hours.
Social Media
setup...
The Theft of @N
A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
The Theft of @N
A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
What @N teaches us
Phone Staff are the largest risk for breach.
Not understanding how it all works together
is the largest...
Establishing
Controls
Protection of Trade Secrets
What is unauthorized access?
Employees, Third Party Providers,
Social...
You Can’t Make Me Be
Friends!
Piccolo v. Paterson (Pa.
Common Pleas 2011)
The SCA applies to
entities
Largent v. Reed (Court of
Common Pleas of the 39th
Judicial District of PA –
Franklin County –...
Understanding Opportunity
Get your head out of the sand and get out of the way.
Provide Good
Customer Service
Pissed off people take to
the web and businesses
who don’t react quickly
pay dearly.
Proactive
Crisis Management
•Haitian Earthquake
•Mumbai Shootings
•Boston Marathon
Recruitment…
Management
Get fired and almost lose your company a few billions in funding.
…Termination
Inspire and Fundraise
#FLPRevolution
Showcase Your Work
When “Going Viral” is cause for celebration.
Understanding Content Involvement
Digital Millennium Copyright Act
Computer maintenance
DVDs
Ebooks
Distance learning
Interoperability
are only a few c...
Is staff creating content
the company can own?
Getty will come after you for
licensing.
Did the theme go home with the
ass...
Protecting company IP
Staff Training and Policies – Trade
Secrets
Understanding Provider Recourse
– Copyright and Trademar...
Are you paying attention?
www.google.com/alerts
www.twitter.com/search
www.addictomatic.com
www.whois.com
WHAT DO WE DO?
Evolve or Die.
Think Differently
Approving NOTHING is the worst
strategy
Avoid the BRAND trap
Focus on the DATA and the
PROCESS, not the ...
Make some POLICIES
Mainly, because it requires you to review
the process.
Secondly, because it requires
documentation in a...
Vanquish the Luddite
Basic operational know how of how the interwebs works is the best risk management.
Index and Resources
Resource Guides, Case Law, Regulations, Standards
CFAA
U.S. v. Nosal, 642 F. 3d
781 (9th Cir. 2011)
U.S. v. Tolliver, 2011 U.S.
App. LEXIS 19090 (3rd Cir.
2011)
Copyright and Trademark
 The Copyright Act of 1976
 Crossfit, Inc. v. Alvies 2014 U.S. Dist
LEXIS 7930 (N.D. Cal. Jan. 2...
Data Breach
Anderson v. Hannaford
Bros. Co., 659 F.3d 151
(1st Cir. 2011)
HIPAA
Resnick v. AvMed Inc.,
693 F.3d 1317 (1...
E-Discovery
 Columbia Pictures, Inc. v. Bunnell, 245
F.R.D. 443 (C.D. Cal. 2007)
 Consol. Edison Co. of New York, Inc.
v...
Jurisdiction
Business Software Alliance
The EU Data Protection
Directive
Forward Foods LLC v. Next
Proteins, Inc., 2008...
Privacy
Crispin v. Christian Audigier,
Inc., 717 F. Supp. 2d 965 (C.D.
Cal, 2010)
Matter of United States, 770 F.
Supp. ...
Questions?
Amy Larrimore
@AmyAllStar
datatechprocess.com
#FLPRevolution
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
Upcoming SlideShare
Loading in …5
×

Everything Attorneys Need to Know About Web Based Technology

564 views

Published on

Presented in original form for CLE credits with accompanying handouts, this presentation covers everything attorneys need to understand in order to work and practice in the world of web based technology. I cover where the risks are, and aren't and how a "digital" practice is different from what you've always known. The risks are in a different place and the practice of contract law is flipped on it's head. The IT Department and the business unit can't help you to the level you're relying upon them and you might be doing a disservice by not helping them to the level that you can. The presentation includes references to case law, statutes, applicable regulations and other useful goodies.

Published in: Law
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
564
On SlideShare
0
From Embeds
0
Number of Embeds
79
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • The most interesting aspect of the court’s decision was in addressing whether the privacy requirement was also met. In addition to examining whether the requirement was met under Pennsylvania law, the court analyzed whether the requirement was met under federal law, namely The Stored Communications Act. As part of the Electronic Communications Privacy Act, The Stored Communications Act (SCA) limits the government’s ability to force Internet Service Providers (ISPs) to reveal information about their users and limits the right of ISPs to voluntarily reveal information about their users. The court noted only one case thus far has addressed whether Facebook is covered by the SCA, Crispin v. Christian Audigier, Inc. In that case, a subpoena was served directly on Facebook to obtain information about the plaintiff’s status postings. The Crispin Court held Facebook was covered by the Act and concluded subpoenas are never allowed under the SCA. The Largent Court distinguished the facts of the Crispin case, noting the defendant was seeking information directly from the plaintiff, not from Facebook. As an individual, the plaintiff was not an entity regulated by the SCA. Finding the privacy requirement was satisfied, the court ordered the plaintiff to turn over her user names, log-in names and passwords for Facebook and MySpace.
  • Everything Attorneys Need to Know About Web Based Technology

    1. 1. Social Technology Points of Practice Amy Larrimore | Managing Partner
    2. 2. Meet Amy Larrimore @AmyAllStar #140 Speaker 2013 New York, NY Advisor to Three Heads of State, including the USA Pennsylvania Bar Institute Faculty and Course Planner Managing Partner, The Empire Builders Group $43.25 = average daily web revenue generated her first cup of coffee
    3. 3. Agenda Today, we work on understanding: Mechanics Impact What you don’t know What they don’t know Limitations How events occur Risks, Probability and Severity Opportunities What to do now Resources and References
    4. 4. Social Media the Noun? Or the Verb? Or something else entirely.
    5. 5. All the Legal Disciplines Plus regulations that are industry specific. • Employment Law • Litigation • IP Issues • Contract Law • Family Law • Privacy and Security • Defamation
    6. 6. Technology: What’s Your Goal? Selection, Setup and Management Litigation Business Risk Management It all starts with understanding.
    7. 7. Username (begins with @)Display Name (link to profile) Avatar (Photo) See related tweets (blue line) Types of Interactions • Reply (Respond to all, into conversation view) • Retweet (Republish to your followers) • Favorite (Bookmark or save – public) Content limited to 140 characters including usernames, spaces and links. #funny Understanding Mechanics
    8. 8. Stop Thinking It’s One Monster One brand technology (“Facebook”) is actually a combination of many separate products with separate terms managed by separate entities in separate places.
    9. 9. Technology Architecture Domain Website + Web Hosting Ecommerce Platform Financial System Shopping Cart Payment Gateway Merchant Processing MRP or ERP Order Fulfillment Shipping CRM Email Host Email Client SEM & Social Hootsuite Google Analytics There are so many secret terms and conditions, your head might explode.
    10. 10. The New Real Estate http://dodynamic.com/latest-news/a-website-is-like-a-house/
    11. 11. Domains ICANN regulates Ownership and Use of Domain Names • empirebuilders.com (TLD) • teaching.empirebuilders.com (SLD) • empirebuilders.technology (gTLD) Inclusion on DPML requires an application to TMCH. Recourse for domain names held hostage via URS. ICANN: Internet Corporation for Assigned Names and Numbers TLD and SLD: Top and second level domain (respectively) gTLD: (new!) Generic top level domain which shows as a suffix at the end of a domain name DPML: Domains Protected Marks List TMCH: Trademark Clearinghouse URS: Uniform Rapid Suspension System
    12. 12. Integrations Social Media Planning or Scheduling Tools Email Marketing Customer Service and Support CRM Invoicing Document Management Affiliate Tools & Sponsored Content Google Analytics/Forms/Adwords Example: Plugins are foreign code embedded into your website to run executable scripts.
    13. 13. Understanding Impact
    14. 14. Social Media is CAUSAL It’s not about breakfast cereal and grandkids pics.
    15. 15. • Anonymous • Instant • Global
    16. 16. Government Overthrow • 2009 Moldova civil unrest • 2009 Iranian election protests • 2010 Tunisian Jasmine Revolution • 2011 Egyptian Revolution
    17. 17. Big Data & Research Predict Disease Outbreak Locations
    18. 18. Profound Statistically Significant Global Pulse
    19. 19. Messaging is Viral – No Relationship Required
    20. 20. Understanding What You Don’t Know Technology is built on trickery and most people try extra hard to trick the lawyers.
    21. 21. The Myth of Opt In • SaaS forces the user to agree to terms to proceed. • It is outside of regular contract negotiation. • Good user experience designs trickery to deliver a “seamless experience”
    22. 22. The Mirage of User Experience “The Redirect - Masked”
    23. 23. The Mirage of User Experience “The Redirect - Obvious”
    24. 24. The MIRAGE of USER EXPERIENCE “The Jigsaw Puzzle”
    25. 25. Understanding What They Don’t Know Don’t Bet on the IT Department
    26. 26. If you think hiring an expert is expensive, wait until you see the cost of an amateur. • Requirements Creation • Sourcing/Due Diligence • Deployment • Management
    27. 27. Where exactly is our CONTENT? The Jurisdiction of “Everywhere”
    28. 28. Uzbekistan Inventory of States and Countries Whose Regulations May Apply or Where Jurisdiction May Be Established
    29. 29. The sales chat rep says it’s just three easy steps: 1. Enter company credit card 2. Upload all company data 3. Watch a six minute video
    30. 30. Stored Communications Act Courts are moving in a more protective direction regarding Fourth Amendment and electronically-stored information Privacy rights in electronically-stored information are not lost solely because that data is stored in a medium owned by another. SCA provides a potential loophole in most jurisdictions that may allow the government to issue a subpoena for past emails in the possession of the service provider but also future emails. Are Facebook Messages Email?
    31. 31. Understanding Your Limitations Contract Management vs. Risk Management Contract Law is backwards now.
    32. 32. Understanding how events actually occur McMillen is Zimmerman v. Weis Markets, Inc. (2011 Pa. Dist. & Cnty. – May 19, 2011) I miss my ivory tower…
    33. 33. The Business Unit Can’t Help You Either.
    34. 34. The green software or the blue one mentioned in a Linkedin Group? I really like the green one…
    35. 35. The Data Keepers – Enforcing Destruction Policy
    36. 36. Understanding risks, probabilities and severity
    37. 37. “Resume Generating Events”
    38. 38. Suddenly Toy Planes Have Everyone Talking….
    39. 39. The Theft of @N  A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours. Social Media setup with company email and connected to website Website content stored on a Host Empirebuilders.com Domain registered at a Registrar
    40. 40. The Theft of @N A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
    41. 41. The Theft of @N A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
    42. 42. What @N teaches us Phone Staff are the largest risk for breach. Not understanding how it all works together is the largest risk for exposure. Company security policies need to be sensible. Company case review policies need to consider exposure. Both the business unit and IT needed proactive legal and risk management help that they didn’t receive. Not embracing new technology (two factor authentication) is a serious exposure.
    43. 43. Establishing Controls Protection of Trade Secrets What is unauthorized access? Employees, Third Party Providers, Social Media Importance of policy vs. hardware controls Social media Use or Excessive Use Social Media Policy CFAA: Computer Fraud and Abuse Act U.S. v. Nosal, 676 F.3d 854 (9th Cir. 2012)
    44. 44. You Can’t Make Me Be Friends! Piccolo v. Paterson (Pa. Common Pleas 2011)
    45. 45. The SCA applies to entities Largent v. Reed (Court of Common Pleas of the 39th Judicial District of PA – Franklin County – November 8, 2011)
    46. 46. Understanding Opportunity Get your head out of the sand and get out of the way.
    47. 47. Provide Good Customer Service Pissed off people take to the web and businesses who don’t react quickly pay dearly.
    48. 48. Proactive Crisis Management •Haitian Earthquake •Mumbai Shootings •Boston Marathon
    49. 49. Recruitment…
    50. 50. Management Get fired and almost lose your company a few billions in funding.
    51. 51. …Termination
    52. 52. Inspire and Fundraise #FLPRevolution
    53. 53. Showcase Your Work When “Going Viral” is cause for celebration.
    54. 54. Understanding Content Involvement
    55. 55. Digital Millennium Copyright Act Computer maintenance DVDs Ebooks Distance learning Interoperability are only a few carve out examples.
    56. 56. Is staff creating content the company can own? Getty will come after you for licensing. Did the theme go home with the assistant web developer? Source of Inspiration? Employment Agreements
    57. 57. Protecting company IP Staff Training and Policies – Trade Secrets Understanding Provider Recourse – Copyright and Trademark Proactively securing brands online – Copyright and Trademark
    58. 58. Are you paying attention? www.google.com/alerts www.twitter.com/search www.addictomatic.com www.whois.com
    59. 59. WHAT DO WE DO? Evolve or Die.
    60. 60. Think Differently Approving NOTHING is the worst strategy Avoid the BRAND trap Focus on the DATA and the PROCESS, not the tool. Start the conversation with IT now and support funding for experts.
    61. 61. Make some POLICIES Mainly, because it requires you to review the process. Secondly, because it requires documentation in accordance with regulation, standards and best practice. http://socialmediagovernance.com/polici es/ http://www.womma.org/ethics
    62. 62. Vanquish the Luddite Basic operational know how of how the interwebs works is the best risk management.
    63. 63. Index and Resources Resource Guides, Case Law, Regulations, Standards
    64. 64. CFAA U.S. v. Nosal, 642 F. 3d 781 (9th Cir. 2011) U.S. v. Tolliver, 2011 U.S. App. LEXIS 19090 (3rd Cir. 2011)
    65. 65. Copyright and Trademark  The Copyright Act of 1976  Crossfit, Inc. v. Alvies 2014 U.S. Dist LEXIS 7930 (N.D. Cal. Jan. 22, 2014)  Digital Millennium Copyright Act, 17 U.S.C. §512 (DMCA)  Edelman v. N2H2  Flava Works Inc. v. Gunter  IO Group, Inc. v. Veoh Networks, Inc  Lenz v. Universal Music Corp.  Ouellette v. Viacom International Inc.  RealNetworks, Inc. v. DVD Copy Control Association, Inc.  Sony v. George Hotz  Viacom Inc. v. YouTube, Google Inc.  Vernor v. Autodesk, Inc.
    66. 66. Data Breach Anderson v. Hannaford Bros. Co., 659 F.3d 151 (1st Cir. 2011) HIPAA Resnick v. AvMed Inc., 693 F.3d 1317 (11th Cir. 2012) Sony Gaming Networks and Customer Data Sec. Breach Litig., No.11md2258, 2012 U.S. Dist. LEXIS 14691 (S.D. Cal Oct. 11, 2012) PCI
    67. 67. E-Discovery  Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007)  Consol. Edison Co. of New York, Inc. v. United States, 90 Fed. Cl 228, 231 (Fed. Cl. 2009)  FRCP  FACTA  Largent v. Reed (Court of Common Pleas of the 39th Judicial District of PA – Franklin County – November 8, 2011)  McMillen v. Hummingbird Speedway, Inc. (2010 Pa Dist. & Cnty. – September 9, 2010)  Piccolo v. Paterson (Pa. Common Pleas 2011)  Stored Communications Act (SCA) (SEE ALSO PRIVACY)
    68. 68. Jurisdiction Business Software Alliance The EU Data Protection Directive Forward Foods LLC v. Next Proteins, Inc., 2008 BL 238516 (N.Y. Sup. 2008) Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS 133612 (E.D. Tex. Nov. 18, 2011)
    69. 69. Privacy Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965 (C.D. Cal, 2010) Matter of United States, 770 F. Supp. 2d 1138 (W.D. Wash. 2011) McMillen is Zimmerman v. Weis Markets, Inc. (2011 Pa. Dist. & Cnty. – May 19, 2011) State v. Bellar, 217 P.3rd 1094 (Or. App. Sept. 30, 2009) Stored Communications Act (SCA) U.S. v. Warshak, 631 F. 3d 266 (6th Circ. 2010)
    70. 70. Questions? Amy Larrimore @AmyAllStar datatechprocess.com #FLPRevolution

    ×