This document summarizes key issues around confronting social media at depositions and discovery. It discusses how lawyers should advise clients on social media use related to legal cases. Lawyers need to discuss privacy risks with clients and get agreements about preserving and not deleting social media information, as it could be considered evidence. The document also reviews cases where courts have ordered parties to turn over social media login information or limited the scope of access depending on the relevance of the information requested.
Social Lawyers (slide deck to accompany hypotheticals)Nicole Hyland
This is an alternative version of my Social Lawyers slide deck. It is formatted to accompany a series of social media and legal ethics hypotheticals, which can be found here: http://www.jdsupra.com/legalnews/hypotheticals-legal-ethics-and-social-57583/
Presentation on mobile phone-only social networks, photo sharing apps and consumer data for "Law of the Smartphone" Symposium, Whittier Law School, October 2011
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
What liabilities do companies face when using social media platforms?
Kraig Baker, Chair of the Technology, e-Business and Digital Media Practice at Davis Wright Tremaine LLP delivers an enlightening and timely discussion to SMB Seattle about legal issues surrounding the corporate use of social media.
Social Lawyers (slide deck to accompany hypotheticals)Nicole Hyland
This is an alternative version of my Social Lawyers slide deck. It is formatted to accompany a series of social media and legal ethics hypotheticals, which can be found here: http://www.jdsupra.com/legalnews/hypotheticals-legal-ethics-and-social-57583/
Presentation on mobile phone-only social networks, photo sharing apps and consumer data for "Law of the Smartphone" Symposium, Whittier Law School, October 2011
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
What liabilities do companies face when using social media platforms?
Kraig Baker, Chair of the Technology, e-Business and Digital Media Practice at Davis Wright Tremaine LLP delivers an enlightening and timely discussion to SMB Seattle about legal issues surrounding the corporate use of social media.
Social Media Content and Discovery Practice Kevin O'Shea
Social Media Content and Discovery Practice: Entitlement, Scope, Technical Issues in Production, Ethics, and Authentication. (Edited Materials. Not offered for CLE credit).
Benjamin Wright, Texas attorney and Senior Instructor at the SANS Institute, shares tips for gathering social media evidence in an investigation. Check out the webinar recording: http://i-sight.com/gathering-social-media-evidence/
Information on avoiding slander and libel claims. Provides a general overview of the law of defamation and invasion of privacy, with tips to avoid such claims.
1 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CA.docxjoyjonna282
1
UNITED STATES DISTRICT COURT
EASTERN DISTRICT OF CALIFORNIA
------------------------------------------------------X
DOUGLAS SMITH,
Plaintiff
Against DECISION
ON MOTION TO
DISMISS
JANE JOHNSON,
PISSEDPRODUCER.COM, INC,
Defendants
------------------------------------------------------X
Haas, J.,
Defendant Jane Johnson (“Johnson”) lives in Portland, Oregon, and operates
defendant corporation, pissedproducer.com (the “website”). The website is devoted to
allowing service providers to complain about actions of consumers. According to the
website’s terms, business owners or service providers are allowed to post feedback about
consumers “that other producers should be wary of.” The website also allows aggrieved
producers to publish the names, addresses and other personal information about
consumers, along with audio and video files that relate to the transaction.
On June 12, YR-01, Brenda James (“James”) posted a story regarding plaintiff,
Douglas Smith (“Smith”) in which she accused him of, inter alia, lying about his
conversations with her, behaving antagonistically towards her and unjustifiably
complaining about her business. She also posted information about Smith’s name,
address and license plate number and a video that showed a confrontation between her
and Smith.
Johnson knowingly allowed this information to remain on her site in spite of
Smith’s protest.
2
Smith brought the present action against Johnson and the corporation that holds
the website alleging defamation, invasion of privacy for intrusion upon seclusion,
invasion of privacy for misappropriation of name and likeness and intentional infliction
of emotional distress against all three defendants.
Subject matter jurisdiction is established under 28 U.S.C. § 1332 (diversity
jurisdiction) because plaintiff is a resident of California and defendants are residents of
Oregon and the amount in controversy is more than $75,000. This is undisputed.
Johnson and the website have moved to dismiss the complaint based on FRCP
Rule 12(b)(2), alleging that this court does not have personal jurisdiction over her and
under FRCP Rule 12(b)(6) for failure to state a claim upon which relief can be granted
with respect to each of the four counts of the complaint.
For the reasons set forth below, I deny the defendant’s motion to dismiss with
respect to each count.
Personal Jurisdiction
Defendant argues that this court lacks personal jurisdiction over Johnson and the
website because they operate exclusively in the state of Oregon and have insufficient
contacts with California to subject them to personal jurisdiction in the state of California.
Under the due process clause of the 14th amendment to the United States
Constitution, a state may exercise long arm jurisdiction over an out-of-state defendant
only if the defendant has “certain minimum contacts with it s ...
Former employee fires back after being sued by Community Health AllianceThis Is Reno
James Fleming, who is being sued by his former employer, Community Health Alliance, fired back at the health nonprofit in court filings last week.
He denies wrongdoing and accuses CHA of interfering with the federal investigation into Fleming’s allegations that CHA committed fraud.
Fleming responded to the complaint Feb. 4 after CHA applied for a temporary protective order seeking to prevent Fleming from talking about CHA negatively.
CHA also filed an amended complaint that removed most mentions of Reno City Council member, also CHA’s CEO, Oscar Delgado.
This new publication, Cyber Claims Insight from Aon Benfield’s Cyber Practice Group, empowers readers with the resources and tools they need to understand the cyber landscape, including legal trends, claims and insurance coverage disputes.
Balancing an employer's right to know vs. privacy; wireless devices and employee's privacy violations; monitoring and creating policies regarding internet, email, tesxting and other electronic communications; wireless devices and employee's and employer's privacy violations; off the job behavior;
An overview of the way the law profession's rules of professional responsibility/conduct apply to the use of social media platforms and tools, including advertising, searching, and use of social media information in investigation, discovery, and at trial.
Privacy & Security of Consumer and Employee Information - Conference MaterialsRachel Hamilton
The ever increasing use of social media by employees in the workforce, privacy violations with online behavioral advertising,and potential privacy and security risks associated with social media sites have prompted federal and state regulators to create stricter enforcement initiatives to protect the privacy of consumer and employee information. The industry is one step closer to a national cyber notification law which will not only pre-empt state notification bills but permanently change how companies and organizations respond to data breaches.
Social Media Content and Discovery Practice Kevin O'Shea
Social Media Content and Discovery Practice: Entitlement, Scope, Technical Issues in Production, Ethics, and Authentication. (Edited Materials. Not offered for CLE credit).
Benjamin Wright, Texas attorney and Senior Instructor at the SANS Institute, shares tips for gathering social media evidence in an investigation. Check out the webinar recording: http://i-sight.com/gathering-social-media-evidence/
Information on avoiding slander and libel claims. Provides a general overview of the law of defamation and invasion of privacy, with tips to avoid such claims.
1 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CA.docxjoyjonna282
1
UNITED STATES DISTRICT COURT
EASTERN DISTRICT OF CALIFORNIA
------------------------------------------------------X
DOUGLAS SMITH,
Plaintiff
Against DECISION
ON MOTION TO
DISMISS
JANE JOHNSON,
PISSEDPRODUCER.COM, INC,
Defendants
------------------------------------------------------X
Haas, J.,
Defendant Jane Johnson (“Johnson”) lives in Portland, Oregon, and operates
defendant corporation, pissedproducer.com (the “website”). The website is devoted to
allowing service providers to complain about actions of consumers. According to the
website’s terms, business owners or service providers are allowed to post feedback about
consumers “that other producers should be wary of.” The website also allows aggrieved
producers to publish the names, addresses and other personal information about
consumers, along with audio and video files that relate to the transaction.
On June 12, YR-01, Brenda James (“James”) posted a story regarding plaintiff,
Douglas Smith (“Smith”) in which she accused him of, inter alia, lying about his
conversations with her, behaving antagonistically towards her and unjustifiably
complaining about her business. She also posted information about Smith’s name,
address and license plate number and a video that showed a confrontation between her
and Smith.
Johnson knowingly allowed this information to remain on her site in spite of
Smith’s protest.
2
Smith brought the present action against Johnson and the corporation that holds
the website alleging defamation, invasion of privacy for intrusion upon seclusion,
invasion of privacy for misappropriation of name and likeness and intentional infliction
of emotional distress against all three defendants.
Subject matter jurisdiction is established under 28 U.S.C. § 1332 (diversity
jurisdiction) because plaintiff is a resident of California and defendants are residents of
Oregon and the amount in controversy is more than $75,000. This is undisputed.
Johnson and the website have moved to dismiss the complaint based on FRCP
Rule 12(b)(2), alleging that this court does not have personal jurisdiction over her and
under FRCP Rule 12(b)(6) for failure to state a claim upon which relief can be granted
with respect to each of the four counts of the complaint.
For the reasons set forth below, I deny the defendant’s motion to dismiss with
respect to each count.
Personal Jurisdiction
Defendant argues that this court lacks personal jurisdiction over Johnson and the
website because they operate exclusively in the state of Oregon and have insufficient
contacts with California to subject them to personal jurisdiction in the state of California.
Under the due process clause of the 14th amendment to the United States
Constitution, a state may exercise long arm jurisdiction over an out-of-state defendant
only if the defendant has “certain minimum contacts with it s ...
Former employee fires back after being sued by Community Health AllianceThis Is Reno
James Fleming, who is being sued by his former employer, Community Health Alliance, fired back at the health nonprofit in court filings last week.
He denies wrongdoing and accuses CHA of interfering with the federal investigation into Fleming’s allegations that CHA committed fraud.
Fleming responded to the complaint Feb. 4 after CHA applied for a temporary protective order seeking to prevent Fleming from talking about CHA negatively.
CHA also filed an amended complaint that removed most mentions of Reno City Council member, also CHA’s CEO, Oscar Delgado.
This new publication, Cyber Claims Insight from Aon Benfield’s Cyber Practice Group, empowers readers with the resources and tools they need to understand the cyber landscape, including legal trends, claims and insurance coverage disputes.
Balancing an employer's right to know vs. privacy; wireless devices and employee's privacy violations; monitoring and creating policies regarding internet, email, tesxting and other electronic communications; wireless devices and employee's and employer's privacy violations; off the job behavior;
An overview of the way the law profession's rules of professional responsibility/conduct apply to the use of social media platforms and tools, including advertising, searching, and use of social media information in investigation, discovery, and at trial.
Privacy & Security of Consumer and Employee Information - Conference MaterialsRachel Hamilton
The ever increasing use of social media by employees in the workforce, privacy violations with online behavioral advertising,and potential privacy and security risks associated with social media sites have prompted federal and state regulators to create stricter enforcement initiatives to protect the privacy of consumer and employee information. The industry is one step closer to a national cyber notification law which will not only pre-empt state notification bills but permanently change how companies and organizations respond to data breaches.
Similar to Confronting social media at depositions and discovery njaj (20)
NCAA CONCUSSION MDL, ORDER AND PLAINTIFFS EXECUTIVE COMMITTEEmzamoralaw
The NCAA will also provide concussion education to athletes, coaches and trainers before each season. And medical personnel will be present at each “contact sport,” including football, lacrosse, wrestling, ice hockey, field hockey, soccer and basketball.
The $70 million figure could include as much as $15 million in attorney fees and up to $750,000 in out-of-pocket expenses. NCAA insurers are expected to pay at least part of the settlement, NCAA Chief Legal Officer Donald Remy said on the association’s website.
attorneys listed in the settlement as counsel for the plaintiff class are Seattle-based Steve W. Berman of Hagens, and Mark Zamora of The Orlando Law Firm P.C. in Decatur, Ga. AMONG OTHERS
First LowT Complaint filed in Georgia Punitive Damagesmzamoralaw
Court documents filed in the U.S. District Court, Northern District of Illinois indicate that four testosterone treatment lawsuits were filed on February 4, 2014, on behalf of men who allegedly suffered serious heart problems due to the use of AndroGel. Among other things, the complaints raise questions about the marketing of prescription testosterone therapies, and accuse the manufacturers of the medications of promoting them as treatments for fatigue, low libido, and other problems associated with the aging process. The complaints further allege that these marketing tactics led to many patients being prescribed testosterone therapy, despite having normal levels of the hormone. (Case Nos: 1:14-cv-00776, 1:14-cv-00780, 1:14-cv-00777, and 1:14-cv-00772)
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
3. Where do you start?
(Hint: It’s not with your client)
Rule 1.1 Model Rules: ABA voted to amend the comment to Model
Rule 1.1, governing lawyer competence. In addition to keeping abreast
of changes in the law and its practice, a lawyer should keep abreast of
the benefits and risks associated with relevant technology.
4. Does your Contract/Letter Cover it?
We strongly encourage you not to participate in social media
(Facebook, Pinterest, Tumblr, Instagram, and the like) while
your case is ongoing.
Information found on social media websites is not private, can
be discovered by the at fault party who hurt you, and if
used as evidence may be potentially damaging to your
interests.
Understand that information shared with others in writing by
email, text message or even posted anywhere online could
result in a waiver of the€attorney client privilege were that
information to relate in any way to the legal matter that we
are handling for you.
In addition, you should not delete or remove information from
any social media website as that could be considered
destruction of evidence.
13. What is your plan?
Two tracks: Plaintiff and Defendant
Defendant: LOR :
1)Preservation Letter
2)Request for Copies
3)Request to Mirror Hard Drives
Plan for the Battle in front of Judge
Tailor your requests:
*Don't ask for the company's 265,000 page website or 5000
employee intranet
*Do ask for information you believe you will need logically –
prior iterations of the company mission statement; white
papers previously posted
14.
15. Attorney Misconduct
1. 2012: Cope v. Prince. Def firm an insurer hired investigator to
access P’s “private” Facebook page.
2. 2012- NJ Attorney Ethics: Charges against two lawyers
claimed to have directed a paralegal to friend a party in
litigation. Claimed violation of contact with a represented
person. NEW 209:10 Jersey LJ (Aug. 30, 2012).
3. Ohio: Prosecutor fired, Facebook chats violated Ohio’s
requirement for truthfulness in the course of representation
because lawyer conducted the chats using a fake profile.
16. Test -Relevancy
Whether or not evidence might be admissible, or
reasonably calculated to lead to any evidence that
might be found material, or relevant in
determination of issues involved in proceeding.
Resisting party must show that the information sought
is of “such marginal relevance that the potential
harm occasioned by discovery would outweigh the
ordinary presumption in favor of broad disclosure.
17. Defendant's Most Common Discovery
a. Name and uniform resource locator (URL) address of the site;
b. The specific URL address of your account profile on the site;
c. Your account name and real names or pseudonyms you have used to identify yourself
on the site;
d. Your user ID or logon and password used to access your account on the site;
e. The dates that you used the site;
*****OR****
Any profiles, postings, or messages (including status updates, wall comments,
causes joined, groups joined, activity streams, blog entries) from socialnetworking sites from October 2009 (the approximate date Plaintiff claims she
first was discriminated against by Home Depot), through the present, that
reveal, refer, or relate to any emotion, feeling, or mental state of Plaintiff, as
well as communications by or from Plaintiff that reveal, refer, or relate to
events that could reasonably be expected to produce a significant emotion,
feeling, or mental state.
18. In Litigation
Any expectation of complete privacy? You know the
Answer
What must be shared? This is the frontline of the battle
Passwords: Must be turned over ? Yes say these cases
Gallion v. Gallion 2011 Conn. Super. Ct. Sept 30, 2011 (Divorce)
Gallagher v. Urbanovich, Pa. Ct. Common Pleas (PI)
Defendant assailant in a civil case ordered to turn over login and password
Mazzarella adv. Mt. Airy Casino Resort: 2009 PA State Court: Premises liability
case. Plaintiff ordered to turn over password and lo in info.
19. Gatto v. United Airlines and Allied Aviation Services., et al., No. 10-CV1090 (D.N.J. March 25, 2013)
Lesson of Gatto: Don't delete or modify if at all possible.
U.S. Magistrate Judge Steven Mannion ruled that the deletion of data in
Gatto’s Facebook account constituted “spoliation of evidence,” defined as
the negligent or intentional destruction, alteration, or withholding of
evidence relevant to a legal proceeding. This resulted in an adverse
inference against Gatto – the inference that when a party destroys
evidence relevant to a legal case, they did so because that evidence was
unfavorable to them.
20. Limiting Access- Cases
Tompkins v. Detroit Metro. Airport, No. 10-10413, 2012 WL 179320, at *2 (E.D.
Mich. Jan. 18, 2012) (denying access to the plaintiff’s entire Facebook
account because the defendant had failed to show that all information was
relevant);
Mailhoit v. Home Depot CA, No. CV 11-03892 DOC (SSx), 2012 U.S. Dist.
LEXIS 131095 (C.D. Cal. Sept. 7, 2012)
Judge Segal reviewed a comprehensive request for social media discovery.
The Court concluded that the requests failed to comply with the Federal
Rules of Civil Procedure. Segal specifically noted that “several courts
have found that even though certain [social media] content may be
available for public view, the Federal Rules do not grant a requesting party
‘a generalized right to rummage at will through information that [the
responding party] has limited from public view’ but instead require ‘a
threshold showing that the requested information is reasonably calculated
to lead to the discovery of admissible evidence.’”
21.
22. Limiting Access
Chauvin v. State Farm Mutual:2011 U.S. Dist. LEXIS 121600 (Oct. 20, 2011)
Defendant failed to meet the initial threshold of showing that the requested information was
reasonably calculated to lead to the discovery of admissible evidence as the public portions of
the plaintiff’s Facebook account contained no evidence that she was engaging in activities
inconsistent with her injury claim.
Caraballo v. City of New York,
http://www.courts.state.ny.us/Reporter/pdfs/2011/2011_30605.pdf
Defendant sought “current and historical Facebook and Twitter pages and accounts, including
all deleted pages and related information” In the opinion of this Court, digital “fishing
expeditions” are no less objectionable than their analog antecedents
Richards v. Hertz Corp.
http://www.courts.state.ny.us/courts/ad2/calendar/webcal/decisions/2012/D34155.pdf
Due to the likely presence in McCarthy's Facebook profile of material of a private nature that is
not relevant to this action, the Court should conduct an in camera inspection of all status
reports, emails, photographs, and videos posted on McCarthy's Facebook profile.