SlideShare a Scribd company logo
1 of 49
Ethics & Etiquette
Overview
• Transparency
• Fake Blogs & Ghost Blogging
• Astroturfing
• Netiquette
What Do You Need to Know?
• Transparency/Disclosure
• Be honest
• Get permission
• Think before you speak
• If someone shares your content, thank them
Ghost Blogging
• Paying someone to write blog posts
• Violation of transparency
• Once someone finds out, it shows that you (the company)
are disingenuous and makes people think you have
something to hide
• Example: Kanye West
• Blog posts kept getting published under his name when
he was in jail
• Difference between this and character blogs (Captain
Morgan)
Lying/Misrepresentation
• Lying
• Just because people may not be able to see who is on
the other side, social media has also been able to reveal
liars

• Misrepresentation
• Do not pretend to be someone you are not
• But does virtual reality sites like Second Life promote
this?
Scenario
Boss comes to you, the intern, and asks you to tweet for
him. Your boss is well-known in the industry with a
huge following. While at a large conference, he
wants to appear to be active, but doesn’t have time to
tweet himself. What do you do?
Scenario Solutions
• Multi-author
• Set reminder that team members may be tweeting
• Every so many number posts, reminder of team tweets
• If characters permit, add a hash tag to denote team post

• Learn his/her voice
Examples
Examples
Examples
Astroturfing
• Political, advertising, or public relations campaigns
that are formally planned by an organization, but
designed to mask its origins to create the impression
of being spontaneous, popular "grassroots" behavior.
Astroturfing: Example
• 2006
• Wal-Marting Across
America
• Jim & Laura
• Stories about their trips
around the U.S. in the RV
and staying in Wal-Mart
parking lots
Astroturfing: Example
• Turns out to be a fabrication/distorted view
• Funded by Wal-Mart & Edelman, public relations advisor
• Some form/sum of money was being sent to Jim & Laura to
say nice things

• Relevant info
• Same time controversies about low wages at Wal-Mart
• Wal-Mart accused of altering its Wikipedia entry in 2005 by
removing its wages being lower than min. wage (replace it
with they paid double min. wage)
Netiquette
• E-mail
•
•
•
•
•
•
•

Be brief
Clear subject line
Appropriate language
Proper signature
Ask permission to forward
Do not spam
Copyright laws

• Respect others Privacy
Best Practices: Twitter
•

Pick an appropriate photo of yourself

•

Private and company account? Be careful which you tweet too

•

Do not tweet during meetings or special events (unless asked or
encouraged too)

•

Do not overuse hash tags

•

Attempt to use proper grammar and avoid abbreviations

•

Use direct messages for private conversations

•

Use it for conversation, not venting (or when you are drunk)
Best Practices: How often?
• Some Guidelines
• Blog everyday or once per week – but remember, its not
all about selling, but providing valuable content
• Tweet as often as you want, but don’t get carried away
• Facebook status updates can be daily or a few times per
day
• If you are inspired by someone’s post, give them credit
by linking text or placing it at the end of the text
Future
• See a lot of employee handbooks that cover social
media
• Disclosure forms/interviews
References
• Tweeting Under False Circumstances
Legal Issues
“Internet today resembles the Old West of American history”
(Fertik and Thompson, 2010)
The Transparent Society
• David Brin book (1998)
• “Light is going to shine into nearly every corner of
our lives.”
• Brin’s focus was on surveillance technologies and his
call for a “reciprocal transparency” where
government was “Big Brother”
A Transparent Society
• Tapscott and Williams (2011) focus on social
media’s effect on privacy laws and regulations.
• “Privacy and data protection laws ensure that
organizations collect, use, retain and disclose our
personal information in a confidential manner. But
today the biggest threat is not other organizations, it’s
us.”

• Tapscott and Williams’ statement carried great
validity especially with the emergence of the Web
2.0 era.
YouTube
• To date, most legal issues revolve around YouTube
violating:
• defamation,
• privacy, or
• copyright law and the Digital Millennium Copyright
Act
• “strengthened the legal protection of intellectual property
rights in the wake of emerging new information
communication technologies, i.e., the Internet” (Indiana
University, 2009).
Comm Law Review (or Intro)
• Defamation
• Any intentional false communication, either written or
spoken, that harms a person's reputation; decreases the
respect, regard, or confidence in which a person is held;
or induces disparaging, hostile, or disagreeable opinions
or feelings against a person.
• Libel – written
• Slander – spoken

Legal Dictionary Online
Digital Millennium Copyright
Act (DMCA)
• Signed into law on October 28, 1998 by President
Clinton
• Made changes to US Copyright Act
• Penalizes copyright infringement on the Internet
• Criminalizes production and dissemination of
technology, devices, or services intended to
circumvent measures that control access to
copyrighted works
Wikipedia
Voluntary v. Involuntary
• Paradigm of openness
• Voluntary – providing information and participating
• Domino’s Case Study

• Involuntary – information becoming public, but not
by one’s choice
• Rathergate
So what happens when someone
discloses information or private
documents not intended to go public?
Wikileaks
•

Julian Assange, a transparency advocate, releasing confidential U.S.
foreign policy documents (involuntary transparency)

•

“Whether we like it or not, the new, involuntary transparency calls for
a new code of behavior, on dictated by the reality that we can never
assume we are alone or unwatched” (Bennis, Goleman, & O’Toole,
2008, p. 17-18).

•

An attempt to create a more open and transparent society in an effort
to drive greater ethical behavior among companies and government
with the belief that their efforts will bring more good than harm

•

These types of situations will force government and companies to
reassess their crisis communication plan to adopt policies and
strategies for dealing with instances where information about their
company may be leaked, and how they will respond to it in a timely
manner.
Legal Cases
• Dominick v. MySpace
• Corbett v. Twitter, Inc.
• La Russa v. Twitter, Inc.
• ONEOK v. Twitter, Inc.
Dominick v. MySpace
• May 12, 2008
• Location: Illinois
• Legal Claims: Defamation
• Larry Dominick, Town President of Cicero Illinois
• Filed a “Petition of Discovery” seeking the identity
of the MySpace user who had created two false
profiles of Dominick
Dominick v. MySpace
• Claiming “defamation, invasion of privacy, and related
torts arising from various statements on a social
networking website known as MySpace.”
• The petition continued: “These profiles falsely state that
they are profiles of the petitioner, falsely state that they
were created, posted, and published by the petitioner, and
include defamatory matter concerning the petitioner”
(Petition, 2008, 1).
• Although he provided no details to support his claim that
the statements about him were false, MySpace removed
the pages in question.
Dominick v. MySpace
• On June 4, 2008, the Electronic Freedom
Foundation (EFF) responded, arguing in an amicus
brief that the First Amendment protects anonymous
speech unless Dominick could demonstrate a viable
defamation claim
• Dominick withdrew his petition on June 13th without
stating his reasons for doing so
• EFF stated publically that Dominick failed to provide
specific allegations of defamation, or any proof that the
allegedly defamatory statements were false.
Corbett v. Twitter
• May 6, 2010
• Location: Pennsylvania
• Legal Claims: Other
• Tom Corbett, Pennsylvania Attorney General
• Requested an investigative grand jury to issue a subpoena
requesting Twitter respond by providing the identities of
two anonymous Twitter account users that had criticized
the Attorney General as he competed in the Republican
Primary for that party’s gubernatorial nomination
(Subpoena)
Corbett v. Twitter
• News reports indicated that the subpoenas may in
part be an attempt to unmask the authors of a blog
critical of Corbett (Citizen Media Law Project)
• Free speech advocates criticized Corbett as an abuse
of his official powers as attorney general to silence
critics through political retaliation
Corbett v. Twitter
• “Anonymous speech is a longstanding American right”
• Paul Alan Levy of the Public Citizen Litigation Group, a
Washington organization that has defended anonymous
commenters who have been sued by companies and
politicians

• “…any subpoena seeking to unmask the identity of
anonymous critics raises the specter of political
retaliation.”
• Witold Walczak, legal director for the A.C.L.U. of
Pennsylvania
Corbett v. Twitter
• The Attorney General withdrew the subpoena on
May 19, 2010
• Corbett offered no comment as to why the order had
withdrawn, responding only that the subpoena had
been part of a grand jury investigation and that he
could not offer comment beyond that
La Russa v. Twitter, Inc.
•

May 5, 2009

•

Location: California

•

Legal Claims: Cybersquatting; Right of Publicity; Trademark
Infringement; Trademark Dilution

•

Anthony (Tony) La Russa, manager of St. Louis Cardinals

•

Filed a complaint in the Superior Court of California against
Twitter, Inc., alleging that the defendant maintains a site
allegedly be owned by La Russa, containing his photograph
and written statements implied to have been made by the
plaintiff
La Russa v. Twitter, Inc.
• The statements are claimed to be highly derogatory,
suggesting alcohol abuse, and damaging to La
Russa’s reputation and his trademark rights
• The complaint contended that the domain name of
the site, and the use of the plaintiff ’s name dilute the
plaintiff ’s trademark, his name
• Creates the misleading impression that La Russa
authors the site
La Russa v. Twitter, Inc.
• In October 2009, the case was removed from the
Superior Court’s calendar, the media reporting
various conflicting terms of settlement
• PCWorld offered the following insights into the
weaknesses:
• First, La Russa should know that celebrity is going to
generate parody through imitation (similar to SNL)
• Twitter has an anti-imitation process for reporting and
removing attempts at impersonation, which La Russa did
not pursue
La Russa v. Twitter, Inc.
• Second, the same policy states that parody
impersonations are permissible if clearly labeled as
parody
• Third, online service providers are shielded from
responsibility for third-party expression
• Section 230 of the Communications Decency Act of 1996
prohibits a claim such as La Russas
ONEOK, Inc. v. Twitter
• September 15, 2009
• Location: Oklahoma
• Legal Claims: Trademark Infringement
• ONEOK Inc., a natural gas company in Oklahoma
• Filed suit against Twitter on counts of trademark
infringement and contributory infringement, alleging that
an anonymous user had created and employed an
imposter Twitter account using the name ONEOK and
the corporate trademark
ONEOK, Inc. v. Twitter
• Their complaint alleges that the imposter account had
tweeted corporate related information, which they held to
be potentially damaging to ONEOK’s public image in the
investor community and energy industry, and negatively
impact the company’s shareholders
• ONEOK sought to obtain the imposter’s identity and
contact information, and to have the ONEOK account
assigned to them
• Twitter refused to do so in both instances, at point which
ONEOK filed suit, seeking a permanent injunction
against further use of this account
ONEOK, Inc. v. Twitter
• The case was dropped by ONEOK, Inc., perhaps
following the removal of the site by Twitter.
• Issues such as this may be the motivation behind
Twitter’s decision to introduce “Verified Accounts”
• Celebrities, athletes, public officials, etc., can display
“verified account” status on their Twitter pages
• Allows those notables to distinguish their legitimate
sites from impersonators
What Do We Need to Know?
• Global computer-based technologies now ignore
traditional territorial boundaries and new boundaries
separated by usernames and passwords create the
boundaries of Cyberspace (Post & Johnson, 2006)
• New boundaries now threaten traditional laws
“There is no sheriff in town, and Internet
users have been left with rough frontier
justice” (Fertik & Johnson, 2010)
Online Regulation Today
• September 2009
• Texas enacted H.B. No. 2003, making it a third-degree
felony to impersonate individuals on social networking
websites “relating to the creation of the offense of online
harassment” (HB2003 Act)
• Also includes text messages:
• Section 33.07 states:
• “A person commits an offense if the person uses the name or
persona of another person to create a webpage on or to post
on or more messages on a commercial social networking site:
(1) without obtaining the other person’s consent; and (2) with
the intent to harm, defraud, intimidate, or threaten any
person”
Online Regulation Today
• January 1, 2011
• The state of California passed State Bill 1411, making it a
misdemeanor to impersonate another individual online
• “This bill would provide that any person who knowingly and
without consent credibly impersonates another actual person
through or on an Internet Web site or by other electronic
means, as specified, for purposes of harming, intimidating,
threatening, or defrauding another person is guilty of a
misdemeanor. The bill would, in addition to the specified
criminal penalties, authorize a person who suffers damage or
loss to bring a civil action against any person who violates
that provision, as specified.”
Online Regulation Raises
Questions
• Anonymous speech
• Parody and satire
• Commercial speech and trademark dilution
• Back to boarders, what happens when the violator is
not from the state of Texas or California?
Want to Learn More?
• Larry Lessig, Harvard Law Professor
• Code as Law
• American Bar Association Convention Keynote
References
Amicus Brief, Larry Dominick v. MySpace, Inc., Electronic Freedom Foundation, Circuit Court of Cook County,
Illinois County Department Law Division. June 4, 2008.
Bennis, W., Goleman, D., & O’Toole, J. (2008). Transparency: How Leaders Create a Culture of Candor. San Francisco, CA:
Jossey-Bass.
Brin, D. (1998). The transparent society: will technology force us to choose between privacy and freedom. Reading, MA: AddisonWesley.
Fertik, M., & Thompson, D. (2010). Wild west 2.0: how to protect and restore your online reputation on the untamed social
frontier. New York, NY: American Management Association.
Indiana University. (2009, July 20). What is the digital millennium copyright act?. Retrieved from
http://kb.iu.edu/data/alik.html 
Johnson, D. & Post, D. (1996). Law and borders--The rise of law in cyberspace. Stanford Law Review, May, pp. 1-20.
Tapscott, D., & Williams, A. D. (2011, January 1). Social media's unexpected threat [Web log message]. Retrieved from
http://www.theglobeandmail.com/report-on-business/commentary/don-tapscott/social-medias-unexpectedthreat/article1854656/

More Related Content

What's hot

Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet ageCliff Landis
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...Scott Mills
 
Technology - Elizah
Technology - Elizah Technology - Elizah
Technology - Elizah Marq2014
 
Networked Communication Part 1
Networked Communication Part 1Networked Communication Part 1
Networked Communication Part 1primeteacher32
 
Research Paper
Research PaperResearch Paper
Research Papermdhughley
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracySarah Uthoff
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad ideaPJG123
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarismHumanities10
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarismHumanities10
 
Managing your digital footprint
Managing your digital footprint  Managing your digital footprint
Managing your digital footprint Scott Hibberson
 
Hackers are people too
Hackers are people tooHackers are people too
Hackers are people tooAmanda Berlin
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Ryland Sherman
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InLegal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InCarol Spencer
 

What's hot (20)

Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet age
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
 
Harassment Investigations
Harassment InvestigationsHarassment Investigations
Harassment Investigations
 
Technology - Elizah
Technology - Elizah Technology - Elizah
Technology - Elizah
 
Networked Communication Part 1
Networked Communication Part 1Networked Communication Part 1
Networked Communication Part 1
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information Literacy
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad idea
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarism
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarism
 
Managing your digital footprint
Managing your digital footprint  Managing your digital footprint
Managing your digital footprint
 
Hackers are people too
Hackers are people tooHackers are people too
Hackers are people too
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InLegal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right In
 
Censorship
CensorshipCensorship
Censorship
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 

Similar to Ethics & Etiquette Online

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Martin Hirst
 
Social Media News Revolution 2014
Social Media News Revolution 2014Social Media News Revolution 2014
Social Media News Revolution 2014Sue Robinson
 
COM 101 Chapter 16
COM 101 Chapter 16COM 101 Chapter 16
COM 101 Chapter 16Val Bello
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal InvestigationsIan Tausig
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)Ian Tausig
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Seven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskSeven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskRyan Garcia
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United StatesFrederick Lane
 
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 SlideshowNewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 SlideshowDr. William J. Ward
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy EditorsCubReporters.org
 
10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)Damian Radcliffe
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open GovernmentMsifry
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseGateHouseMedia
 

Similar to Ethics & Etiquette Online (20)

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Blogging Law
Blogging LawBlogging Law
Blogging Law
 
Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?
 
Social Media News Revolution 2014
Social Media News Revolution 2014Social Media News Revolution 2014
Social Media News Revolution 2014
 
COM 101 Chapter 16
COM 101 Chapter 16COM 101 Chapter 16
COM 101 Chapter 16
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal Investigations
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Seven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskSeven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal Risk
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Press Law
Press LawPress Law
Press Law
 
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 SlideshowNewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
 
Journalism law
Journalism lawJournalism law
Journalism law
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy Editors
 
10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouse
 

More from Douglas Strahler

#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your IdentityDouglas Strahler
 
2016 Summer of Social Media
2016 Summer of Social Media2016 Summer of Social Media
2016 Summer of Social MediaDouglas Strahler
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDouglas Strahler
 
Extending the Classroom and Learning through Twitter
Extending the Classroom and Learning through TwitterExtending the Classroom and Learning through Twitter
Extending the Classroom and Learning through TwitterDouglas Strahler
 
Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...Douglas Strahler
 
Social Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your IdentitySocial Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your IdentityDouglas Strahler
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDouglas Strahler
 
Social U: Social Media in Higher Ed
Social U: Social Media in Higher EdSocial U: Social Media in Higher Ed
Social U: Social Media in Higher EdDouglas Strahler
 
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...Douglas Strahler
 
Microblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning OpportunitiesMicroblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning OpportunitiesDouglas Strahler
 
Assistive Technology & Ethics
Assistive Technology & EthicsAssistive Technology & Ethics
Assistive Technology & EthicsDouglas Strahler
 
Social Justice: Culture & Poverty
Social Justice: Culture & PovertySocial Justice: Culture & Poverty
Social Justice: Culture & PovertyDouglas Strahler
 
Culture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice OrganizationsCulture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice OrganizationsDouglas Strahler
 
The Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically SpecificThe Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically SpecificDouglas Strahler
 
The Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective PracticesThe Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective PracticesDouglas Strahler
 
Web 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich ClassroomWeb 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich ClassroomDouglas Strahler
 
Adobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 BasicsAdobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 BasicsDouglas Strahler
 
Twitter & Distance Learning
Twitter & Distance LearningTwitter & Distance Learning
Twitter & Distance LearningDouglas Strahler
 

More from Douglas Strahler (19)

#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity
 
2016 Summer of Social Media
2016 Summer of Social Media2016 Summer of Social Media
2016 Summer of Social Media
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital Narrative
 
Extending the Classroom and Learning through Twitter
Extending the Classroom and Learning through TwitterExtending the Classroom and Learning through Twitter
Extending the Classroom and Learning through Twitter
 
Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...
 
Social Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your IdentitySocial Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your Identity
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital Narrative
 
Social U: Social Media in Higher Ed
Social U: Social Media in Higher EdSocial U: Social Media in Higher Ed
Social U: Social Media in Higher Ed
 
Hypothetical IMC Degree
Hypothetical IMC DegreeHypothetical IMC Degree
Hypothetical IMC Degree
 
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
 
Microblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning OpportunitiesMicroblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning Opportunities
 
Assistive Technology & Ethics
Assistive Technology & EthicsAssistive Technology & Ethics
Assistive Technology & Ethics
 
Social Justice: Culture & Poverty
Social Justice: Culture & PovertySocial Justice: Culture & Poverty
Social Justice: Culture & Poverty
 
Culture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice OrganizationsCulture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice Organizations
 
The Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically SpecificThe Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically Specific
 
The Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective PracticesThe Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective Practices
 
Web 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich ClassroomWeb 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich Classroom
 
Adobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 BasicsAdobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 Basics
 
Twitter & Distance Learning
Twitter & Distance LearningTwitter & Distance Learning
Twitter & Distance Learning
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 

Ethics & Etiquette Online

  • 2. Overview • Transparency • Fake Blogs & Ghost Blogging • Astroturfing • Netiquette
  • 3. What Do You Need to Know? • Transparency/Disclosure • Be honest • Get permission • Think before you speak • If someone shares your content, thank them
  • 4. Ghost Blogging • Paying someone to write blog posts • Violation of transparency • Once someone finds out, it shows that you (the company) are disingenuous and makes people think you have something to hide • Example: Kanye West • Blog posts kept getting published under his name when he was in jail • Difference between this and character blogs (Captain Morgan)
  • 5. Lying/Misrepresentation • Lying • Just because people may not be able to see who is on the other side, social media has also been able to reveal liars • Misrepresentation • Do not pretend to be someone you are not • But does virtual reality sites like Second Life promote this?
  • 6. Scenario Boss comes to you, the intern, and asks you to tweet for him. Your boss is well-known in the industry with a huge following. While at a large conference, he wants to appear to be active, but doesn’t have time to tweet himself. What do you do?
  • 7. Scenario Solutions • Multi-author • Set reminder that team members may be tweeting • Every so many number posts, reminder of team tweets • If characters permit, add a hash tag to denote team post • Learn his/her voice
  • 11. Astroturfing • Political, advertising, or public relations campaigns that are formally planned by an organization, but designed to mask its origins to create the impression of being spontaneous, popular "grassroots" behavior.
  • 12. Astroturfing: Example • 2006 • Wal-Marting Across America • Jim & Laura • Stories about their trips around the U.S. in the RV and staying in Wal-Mart parking lots
  • 13. Astroturfing: Example • Turns out to be a fabrication/distorted view • Funded by Wal-Mart & Edelman, public relations advisor • Some form/sum of money was being sent to Jim & Laura to say nice things • Relevant info • Same time controversies about low wages at Wal-Mart • Wal-Mart accused of altering its Wikipedia entry in 2005 by removing its wages being lower than min. wage (replace it with they paid double min. wage)
  • 14. Netiquette • E-mail • • • • • • • Be brief Clear subject line Appropriate language Proper signature Ask permission to forward Do not spam Copyright laws • Respect others Privacy
  • 15. Best Practices: Twitter • Pick an appropriate photo of yourself • Private and company account? Be careful which you tweet too • Do not tweet during meetings or special events (unless asked or encouraged too) • Do not overuse hash tags • Attempt to use proper grammar and avoid abbreviations • Use direct messages for private conversations • Use it for conversation, not venting (or when you are drunk)
  • 16. Best Practices: How often? • Some Guidelines • Blog everyday or once per week – but remember, its not all about selling, but providing valuable content • Tweet as often as you want, but don’t get carried away • Facebook status updates can be daily or a few times per day • If you are inspired by someone’s post, give them credit by linking text or placing it at the end of the text
  • 17. Future • See a lot of employee handbooks that cover social media • Disclosure forms/interviews
  • 18. References • Tweeting Under False Circumstances
  • 19. Legal Issues “Internet today resembles the Old West of American history” (Fertik and Thompson, 2010)
  • 20. The Transparent Society • David Brin book (1998) • “Light is going to shine into nearly every corner of our lives.” • Brin’s focus was on surveillance technologies and his call for a “reciprocal transparency” where government was “Big Brother”
  • 21. A Transparent Society • Tapscott and Williams (2011) focus on social media’s effect on privacy laws and regulations. • “Privacy and data protection laws ensure that organizations collect, use, retain and disclose our personal information in a confidential manner. But today the biggest threat is not other organizations, it’s us.” • Tapscott and Williams’ statement carried great validity especially with the emergence of the Web 2.0 era.
  • 22. YouTube • To date, most legal issues revolve around YouTube violating: • defamation, • privacy, or • copyright law and the Digital Millennium Copyright Act • “strengthened the legal protection of intellectual property rights in the wake of emerging new information communication technologies, i.e., the Internet” (Indiana University, 2009).
  • 23. Comm Law Review (or Intro) • Defamation • Any intentional false communication, either written or spoken, that harms a person's reputation; decreases the respect, regard, or confidence in which a person is held; or induces disparaging, hostile, or disagreeable opinions or feelings against a person. • Libel – written • Slander – spoken Legal Dictionary Online
  • 24. Digital Millennium Copyright Act (DMCA) • Signed into law on October 28, 1998 by President Clinton • Made changes to US Copyright Act • Penalizes copyright infringement on the Internet • Criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works Wikipedia
  • 25. Voluntary v. Involuntary • Paradigm of openness • Voluntary – providing information and participating • Domino’s Case Study • Involuntary – information becoming public, but not by one’s choice • Rathergate
  • 26. So what happens when someone discloses information or private documents not intended to go public?
  • 27. Wikileaks • Julian Assange, a transparency advocate, releasing confidential U.S. foreign policy documents (involuntary transparency) • “Whether we like it or not, the new, involuntary transparency calls for a new code of behavior, on dictated by the reality that we can never assume we are alone or unwatched” (Bennis, Goleman, & O’Toole, 2008, p. 17-18). • An attempt to create a more open and transparent society in an effort to drive greater ethical behavior among companies and government with the belief that their efforts will bring more good than harm • These types of situations will force government and companies to reassess their crisis communication plan to adopt policies and strategies for dealing with instances where information about their company may be leaked, and how they will respond to it in a timely manner.
  • 28. Legal Cases • Dominick v. MySpace • Corbett v. Twitter, Inc. • La Russa v. Twitter, Inc. • ONEOK v. Twitter, Inc.
  • 29. Dominick v. MySpace • May 12, 2008 • Location: Illinois • Legal Claims: Defamation • Larry Dominick, Town President of Cicero Illinois • Filed a “Petition of Discovery” seeking the identity of the MySpace user who had created two false profiles of Dominick
  • 30. Dominick v. MySpace • Claiming “defamation, invasion of privacy, and related torts arising from various statements on a social networking website known as MySpace.” • The petition continued: “These profiles falsely state that they are profiles of the petitioner, falsely state that they were created, posted, and published by the petitioner, and include defamatory matter concerning the petitioner” (Petition, 2008, 1). • Although he provided no details to support his claim that the statements about him were false, MySpace removed the pages in question.
  • 31. Dominick v. MySpace • On June 4, 2008, the Electronic Freedom Foundation (EFF) responded, arguing in an amicus brief that the First Amendment protects anonymous speech unless Dominick could demonstrate a viable defamation claim • Dominick withdrew his petition on June 13th without stating his reasons for doing so • EFF stated publically that Dominick failed to provide specific allegations of defamation, or any proof that the allegedly defamatory statements were false.
  • 32. Corbett v. Twitter • May 6, 2010 • Location: Pennsylvania • Legal Claims: Other • Tom Corbett, Pennsylvania Attorney General • Requested an investigative grand jury to issue a subpoena requesting Twitter respond by providing the identities of two anonymous Twitter account users that had criticized the Attorney General as he competed in the Republican Primary for that party’s gubernatorial nomination (Subpoena)
  • 33. Corbett v. Twitter • News reports indicated that the subpoenas may in part be an attempt to unmask the authors of a blog critical of Corbett (Citizen Media Law Project) • Free speech advocates criticized Corbett as an abuse of his official powers as attorney general to silence critics through political retaliation
  • 34. Corbett v. Twitter • “Anonymous speech is a longstanding American right” • Paul Alan Levy of the Public Citizen Litigation Group, a Washington organization that has defended anonymous commenters who have been sued by companies and politicians • “…any subpoena seeking to unmask the identity of anonymous critics raises the specter of political retaliation.” • Witold Walczak, legal director for the A.C.L.U. of Pennsylvania
  • 35. Corbett v. Twitter • The Attorney General withdrew the subpoena on May 19, 2010 • Corbett offered no comment as to why the order had withdrawn, responding only that the subpoena had been part of a grand jury investigation and that he could not offer comment beyond that
  • 36. La Russa v. Twitter, Inc. • May 5, 2009 • Location: California • Legal Claims: Cybersquatting; Right of Publicity; Trademark Infringement; Trademark Dilution • Anthony (Tony) La Russa, manager of St. Louis Cardinals • Filed a complaint in the Superior Court of California against Twitter, Inc., alleging that the defendant maintains a site allegedly be owned by La Russa, containing his photograph and written statements implied to have been made by the plaintiff
  • 37. La Russa v. Twitter, Inc. • The statements are claimed to be highly derogatory, suggesting alcohol abuse, and damaging to La Russa’s reputation and his trademark rights • The complaint contended that the domain name of the site, and the use of the plaintiff ’s name dilute the plaintiff ’s trademark, his name • Creates the misleading impression that La Russa authors the site
  • 38. La Russa v. Twitter, Inc. • In October 2009, the case was removed from the Superior Court’s calendar, the media reporting various conflicting terms of settlement • PCWorld offered the following insights into the weaknesses: • First, La Russa should know that celebrity is going to generate parody through imitation (similar to SNL) • Twitter has an anti-imitation process for reporting and removing attempts at impersonation, which La Russa did not pursue
  • 39. La Russa v. Twitter, Inc. • Second, the same policy states that parody impersonations are permissible if clearly labeled as parody • Third, online service providers are shielded from responsibility for third-party expression • Section 230 of the Communications Decency Act of 1996 prohibits a claim such as La Russas
  • 40. ONEOK, Inc. v. Twitter • September 15, 2009 • Location: Oklahoma • Legal Claims: Trademark Infringement • ONEOK Inc., a natural gas company in Oklahoma • Filed suit against Twitter on counts of trademark infringement and contributory infringement, alleging that an anonymous user had created and employed an imposter Twitter account using the name ONEOK and the corporate trademark
  • 41. ONEOK, Inc. v. Twitter • Their complaint alleges that the imposter account had tweeted corporate related information, which they held to be potentially damaging to ONEOK’s public image in the investor community and energy industry, and negatively impact the company’s shareholders • ONEOK sought to obtain the imposter’s identity and contact information, and to have the ONEOK account assigned to them • Twitter refused to do so in both instances, at point which ONEOK filed suit, seeking a permanent injunction against further use of this account
  • 42. ONEOK, Inc. v. Twitter • The case was dropped by ONEOK, Inc., perhaps following the removal of the site by Twitter. • Issues such as this may be the motivation behind Twitter’s decision to introduce “Verified Accounts” • Celebrities, athletes, public officials, etc., can display “verified account” status on their Twitter pages • Allows those notables to distinguish their legitimate sites from impersonators
  • 43. What Do We Need to Know? • Global computer-based technologies now ignore traditional territorial boundaries and new boundaries separated by usernames and passwords create the boundaries of Cyberspace (Post & Johnson, 2006) • New boundaries now threaten traditional laws
  • 44. “There is no sheriff in town, and Internet users have been left with rough frontier justice” (Fertik & Johnson, 2010)
  • 45. Online Regulation Today • September 2009 • Texas enacted H.B. No. 2003, making it a third-degree felony to impersonate individuals on social networking websites “relating to the creation of the offense of online harassment” (HB2003 Act) • Also includes text messages: • Section 33.07 states: • “A person commits an offense if the person uses the name or persona of another person to create a webpage on or to post on or more messages on a commercial social networking site: (1) without obtaining the other person’s consent; and (2) with the intent to harm, defraud, intimidate, or threaten any person”
  • 46. Online Regulation Today • January 1, 2011 • The state of California passed State Bill 1411, making it a misdemeanor to impersonate another individual online • “This bill would provide that any person who knowingly and without consent credibly impersonates another actual person through or on an Internet Web site or by other electronic means, as specified, for purposes of harming, intimidating, threatening, or defrauding another person is guilty of a misdemeanor. The bill would, in addition to the specified criminal penalties, authorize a person who suffers damage or loss to bring a civil action against any person who violates that provision, as specified.”
  • 47. Online Regulation Raises Questions • Anonymous speech • Parody and satire • Commercial speech and trademark dilution • Back to boarders, what happens when the violator is not from the state of Texas or California?
  • 48. Want to Learn More? • Larry Lessig, Harvard Law Professor • Code as Law • American Bar Association Convention Keynote
  • 49. References Amicus Brief, Larry Dominick v. MySpace, Inc., Electronic Freedom Foundation, Circuit Court of Cook County, Illinois County Department Law Division. June 4, 2008. Bennis, W., Goleman, D., & O’Toole, J. (2008). Transparency: How Leaders Create a Culture of Candor. San Francisco, CA: Jossey-Bass. Brin, D. (1998). The transparent society: will technology force us to choose between privacy and freedom. Reading, MA: AddisonWesley. Fertik, M., & Thompson, D. (2010). Wild west 2.0: how to protect and restore your online reputation on the untamed social frontier. New York, NY: American Management Association. Indiana University. (2009, July 20). What is the digital millennium copyright act?. Retrieved from http://kb.iu.edu/data/alik.html  Johnson, D. & Post, D. (1996). Law and borders--The rise of law in cyberspace. Stanford Law Review, May, pp. 1-20. Tapscott, D., & Williams, A. D. (2011, January 1). Social media's unexpected threat [Web log message]. Retrieved from http://www.theglobeandmail.com/report-on-business/commentary/don-tapscott/social-medias-unexpectedthreat/article1854656/