SlideShare a Scribd company logo
1 of 36
Fraud, Infringement, HIPAA and Treble Damages:
      Creating Compliance Strategies That Work

Moderator:   David Snead: Attorney, W. David Snead, P.C.

Panelists:   Dev Chanchani: CEO, INetU, Inc.
             Tom Chernaik: CEO, Cmp.ly
             Dan Ushman: Founder/CMO, SingleHop, Inc.
             Mike Witty: Director of Network Compliance, ServInt Inc.
Roadmap

•   Why is compliance important?
•   DMCA and compliance strategy.
•   FTC and regulatory compliance.
•   HIPAA / HITECH compliance.
•   Question and answer
DMCA and compliance strategy.
Mike Witty: Director of Network
   Compliance, ServInt Inc.
Establishing a
      DMCA
compliance Strategy &
     procedure
READ THE DMCA


             Digital Millennium Copyright Act



      http://en.wikipedia.org/wiki/DMCA


Online Copyright Infringement Liability Limitation Act (OCILLA)

                       “Safe Harbor”



http://en.wikipedia.org/wiki/Online_Copyri
ght_Infringement_Liability_Limitation_Act
Designate an agent

               U.S. Copyright Office

       http://www.copyright.gov/onlinesp/


Interim Designation of Agent to Receive Notification of
Claimed Infringement


Amended Interim Designation of Agent to Receive
Notification of Claimed Infringement


   Directory of Agents
Processing a COMPLAINT
 Verify that all DMCA requirements are present
- Location of original content
- Location of infringing content
- Contact Information
Name
Address
Phone Number(s)
E-Mail Address
- “I have a good faith belief...”
- “I swear, under penalty of perjury, that the information...”
- Signature

   Respond to the complainant

 Present the complaint to your             customer
- 3 days to comply (24-hour grace period)

   Verify that the content has been removed

   Respond to the complainant

   Close the case and archive
COUNTER-NOTICEs
Your customer must still comply with the DMCA notice
and remove the content

A counter-notice may only be filed after your customer
has removed the content
- Identification and location of previously-removed content
- Contact Information
- “I swear, under penalty of perjury, that the content...”
- Consent to the jurisdiction of a federal court
- Consent to accept service of process from the complainant
- Signature


   The complainant has 10-14 days to file a law suit

   The content may be restored

   Notify the complainant

   Close the case and archive
CHALLENGES
 Ignorance of DMCA law               and procedure
- Canned text with links
- Links on your website in your AUP



 Resistance to compliance
- “Guilty before innocence”



 Repeated DMCA complaints                received
- Your obligation is unchanged
- Customer should seek legal counsel



   Repeat Infringers


   Language Barriers
FTC and regulatory
      compliance.
Tom Chernaik: CEO, Cmp.ly
How Prepared Are You?
   Create & Implement Process
   Ensure Disclosure in all SM Formats
    Monitor Influencers for Compliance
   Follow Up & Takedown
   Manage Compliance Actions
    Document Audit Trail
   Scale Efforts Across Brands & Programs
   Make Efficient Use of Human Resources
Regulatory Environment

  "As a practical matter, social media is now a regulated
     industry; and all stakeholders are responsible for
      compliance with the FTC Guides. As a result, all
   marketers, agencies, and brands must develop a 'culture of
   compliance' where the vocabulary of risk management is a
           central aspect of an advertising strategy.”
                                    – Tony DiResta, Partner at Winston & Strawn
                                                   General Counsel of WOMMA


 "If law enforcement becomes necessary, our focus will be
      advertisers, not endorsers – just as it’s always been.”
                              – FTC Factsheet on Update to Endorsement Guides
Notable Regulatory Events
       • FTC action
         (endorsements)


       • FTC action
         (astroturfing)

       • FTC action (affiliate
         marketing)

       • State action (NY State)



       • TBD (SEC/FTC)


       • UK OFT action (foreign
         jurisdictions)
Risks of Non-Compliance
               Regulatory Action /
                  Investigations
                    Significant legal costs
               Penalties and settlement terms
              Potential for erosion of brand trust

             Court of Public Opinion
                    Consumers, Bloggers,
                    Social media backlash
                          Blacklisting

                  PR Nightmares
                           Scandals
                   Reports & investigations
               Bad press & negative opinions
AVOID THE CALL
What Should We Consider?
      • Platforms



      • Programs
        – Sampling / Reviews / Gifting / Fly Aways / Haul
          Video
        – Paid Review / Endorsement / Mentions
        – Contests / Promotions
        – Blogs / Posts / Status / Videos

      • Influencers
        – Blogger / Influencer Outreach
        – Employee influencers
        – Agencies / Partners / Affiliates
Your Message Here




                    Include:
        Your complete marketing message
                Link to content
                 Call to action
           Contest & promotion rules
             Required disclosures
The Challenges of Compliance
         Short, Simple, Clear & Conspicuous
                   Space limitations - 140 Characters or less
                    Universal, standardized & recognizable
                         Fine print, terms, rules, etc.

                   Management Challenges
         Communicate policies and document participant acceptance
         Multiple programs, brands, agencies, stakeholders, platforms
              Maintain control across multiple influencer channels

                         Scale Challenges
              Ensure proper use of disclosures – enforce policies
         Monitor for omitted disclosures / compliance at influencer level
          Understand the context of specific messages/posts/tweets
                           Document follow up actions
                 Archive audit trail data of all program activities
Disclosure Challenges
Ad Hoc Compliance Solutions
What About Hashtags?
       • #AD     What is wrong with that?
     • #SPON       • Not standardized
    • #Endorse    • Tracking is limited
                    • Does not scale
Managing Scale
     6/3




     6/13




     7/8
Social Media & Microblogging
Blogs & Web Sites
Contests & Promotions
Contests & Promotions
Preparedness Checklist
  ✔ Create & Implement Process
  ✔ Ensure Disclosure in all SM Formats
  ✔ Document Compliance
  ✔ Monitor Influencers for Compliance
  ✔ Follow Up & Takedown
  ✔ Audit & Archive
  ✔ Scale Efforts Across Brands & Programs
  ✔ Efficient Use of Human Resources
HIPAA / HITECH compliance
Dev Chanchani: CEO, INetU, Inc.
Today’s Topics
     • HIPAA = LAW = Ambiguous

• HITECH draws HIPAA Law into the Our
           Technology Arena

         • Take a “Time Out”

    • Real Risks = Real Challenges
HIPAA is LAW
… you need to treat it differently than
  you do a “compliance standard”
             Whom does HIPAA affect?
        • Anyone who uses health care or health
                         insurance
                   • Health insurers
                       • Doctors
                      • Hospitals
       • Employers who provide health insurance
                     • Life insurers
               • Public health authorities
                   • Billing agencies
             • Information system vendors
            • Health service organizations
HIPAA safeguards PHI
(Protected Health Information)

Simply: You can’t know about
my personal medical history
unless I give you my express
         permission.
…and if you view it without my permission, you
           need to tell me about it!
HITECH
HITECH augments HIPAA

  …by placing business
   associates, such as
hosting providers and data
 centers, squarely on the
    “compliance hook”
TIME OUT !
RISK Management
   The hosting provider is a point of
 compliance – do not underestimate this.

    Understand Whistleblower Laws

 Expect federal funding for enforcement
               (HIPAA Police)


    Don’t be scared – Be prepared
Question and answer
Thanks for coming!
Moderator:   David Snead
             david.snead@dsnead.com

Panelists:   Dev Chanchani
             dev@inetu.net

             Tom Chernaik
             tom@cmp.ly

             Dan Ushman
             dushman@singlehop.com

             Mike Witty
             witty@servint.com

More Related Content

Viewers also liked

Viewers also liked (9)

Just the way u are
Just the way u areJust the way u are
Just the way u are
 
Qumiqa (1)
Qumiqa (1)Qumiqa (1)
Qumiqa (1)
 
002 numeración decimal
002 numeración decimal002 numeración decimal
002 numeración decimal
 
Konsep Dasar Biostatistik
Konsep Dasar BiostatistikKonsep Dasar Biostatistik
Konsep Dasar Biostatistik
 
Tabla de-sumar alumno-1
Tabla de-sumar alumno-1Tabla de-sumar alumno-1
Tabla de-sumar alumno-1
 
001_Numeración y operaciones básicas
001_Numeración y operaciones básicas001_Numeración y operaciones básicas
001_Numeración y operaciones básicas
 
Transparency & the Impact of BEPS
Transparency & the Impact of BEPSTransparency & the Impact of BEPS
Transparency & the Impact of BEPS
 
International Tax Planning as Viewed through the Eyes of BEPS
International Tax Planning as Viewed through the Eyes of BEPSInternational Tax Planning as Viewed through the Eyes of BEPS
International Tax Planning as Viewed through the Eyes of BEPS
 
VULCANS15
VULCANS15VULCANS15
VULCANS15
 

Similar to Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies That Work

Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer FirstVivastream
 
CMP.LY overview WOMMAUK 061812
CMP.LY overview WOMMAUK 061812CMP.LY overview WOMMAUK 061812
CMP.LY overview WOMMAUK 061812CMP.LY, Inc.
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare OrganizationsAvePoint
 
How to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity ClientsHow to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity ClientsID Experts
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1jhietala
 
Compliance. It' More Than A Buzz Word
Compliance. It' More Than A Buzz WordCompliance. It' More Than A Buzz Word
Compliance. It' More Than A Buzz WordAffiliate Summit
 
Social Media Best Practices: Pacific New Media, April 2017
Social Media Best Practices: Pacific New Media, April 2017Social Media Best Practices: Pacific New Media, April 2017
Social Media Best Practices: Pacific New Media, April 2017Gwen Woltz
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
Social Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & InsuranceSocial Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & InsuranceDeborah Gonzalez, Esq.
 
Best Practices For Advertisers and Affiliates
Best Practices For Advertisers and AffiliatesBest Practices For Advertisers and Affiliates
Best Practices For Advertisers and AffiliatesAffiliate Summit
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
PRSA Ethics Panel 10-26-11
PRSA Ethics Panel 10-26-11PRSA Ethics Panel 10-26-11
PRSA Ethics Panel 10-26-11liampalooza
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 
Mobile Ad Fraud Wikileaks: Exposing the Threats
Mobile Ad Fraud Wikileaks: Exposing the ThreatsMobile Ad Fraud Wikileaks: Exposing the Threats
Mobile Ad Fraud Wikileaks: Exposing the ThreatsAffiliate Summit
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknownsLisa Marie Martinez
 
Instilling Quality in Promotional Materials from Start to Finish: Effective C...
Instilling Quality in Promotional Materials from Start to Finish: Effective C...Instilling Quality in Promotional Materials from Start to Finish: Effective C...
Instilling Quality in Promotional Materials from Start to Finish: Effective C...Center for Communication Compliance
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Screening the web2.0
Screening the web2.0Screening the web2.0
Screening the web2.0ID_Media
 

Similar to Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies That Work (20)

Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
CMP.LY overview WOMMAUK 061812
CMP.LY overview WOMMAUK 061812CMP.LY overview WOMMAUK 061812
CMP.LY overview WOMMAUK 061812
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
How to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity ClientsHow to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity Clients
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
Compliance. It' More Than A Buzz Word
Compliance. It' More Than A Buzz WordCompliance. It' More Than A Buzz Word
Compliance. It' More Than A Buzz Word
 
Social Media Best Practices: Pacific New Media, April 2017
Social Media Best Practices: Pacific New Media, April 2017Social Media Best Practices: Pacific New Media, April 2017
Social Media Best Practices: Pacific New Media, April 2017
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
Social Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & InsuranceSocial Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & Insurance
 
Best Practices For Advertisers and Affiliates
Best Practices For Advertisers and AffiliatesBest Practices For Advertisers and Affiliates
Best Practices For Advertisers and Affiliates
 
Abaethicspapers1104
Abaethicspapers1104Abaethicspapers1104
Abaethicspapers1104
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
PRSA Ethics Panel 10-26-11
PRSA Ethics Panel 10-26-11PRSA Ethics Panel 10-26-11
PRSA Ethics Panel 10-26-11
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Mobile Ad Fraud Wikileaks: Exposing the Threats
Mobile Ad Fraud Wikileaks: Exposing the ThreatsMobile Ad Fraud Wikileaks: Exposing the Threats
Mobile Ad Fraud Wikileaks: Exposing the Threats
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
Instilling Quality in Promotional Materials from Start to Finish: Effective C...
Instilling Quality in Promotional Materials from Start to Finish: Effective C...Instilling Quality in Promotional Materials from Start to Finish: Effective C...
Instilling Quality in Promotional Materials from Start to Finish: Effective C...
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Screening the web2.0
Screening the web2.0Screening the web2.0
Screening the web2.0
 

More from HostingCon

Unlocking the Cloud -- The Case for Open Standards
Unlocking the Cloud -- The Case for Open StandardsUnlocking the Cloud -- The Case for Open Standards
Unlocking the Cloud -- The Case for Open StandardsHostingCon
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
Mobilizing the Hosting Industry
Mobilizing the Hosting IndustryMobilizing the Hosting Industry
Mobilizing the Hosting IndustryHostingCon
 
Situation Normal, Everything Must Change
Situation Normal, Everything Must ChangeSituation Normal, Everything Must Change
Situation Normal, Everything Must ChangeHostingCon
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?HostingCon
 
What Do New TLDs Mean for your Hosting Business?
What Do New TLDs Mean for your Hosting Business?What Do New TLDs Mean for your Hosting Business?
What Do New TLDs Mean for your Hosting Business?HostingCon
 
Keeping the Trolls at Bay: Effective Legal Strategies for your Business
Keeping the Trolls at Bay: Effective Legal Strategies for your BusinessKeeping the Trolls at Bay: Effective Legal Strategies for your Business
Keeping the Trolls at Bay: Effective Legal Strategies for your BusinessHostingCon
 

More from HostingCon (7)

Unlocking the Cloud -- The Case for Open Standards
Unlocking the Cloud -- The Case for Open StandardsUnlocking the Cloud -- The Case for Open Standards
Unlocking the Cloud -- The Case for Open Standards
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
Mobilizing the Hosting Industry
Mobilizing the Hosting IndustryMobilizing the Hosting Industry
Mobilizing the Hosting Industry
 
Situation Normal, Everything Must Change
Situation Normal, Everything Must ChangeSituation Normal, Everything Must Change
Situation Normal, Everything Must Change
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
 
What Do New TLDs Mean for your Hosting Business?
What Do New TLDs Mean for your Hosting Business?What Do New TLDs Mean for your Hosting Business?
What Do New TLDs Mean for your Hosting Business?
 
Keeping the Trolls at Bay: Effective Legal Strategies for your Business
Keeping the Trolls at Bay: Effective Legal Strategies for your BusinessKeeping the Trolls at Bay: Effective Legal Strategies for your Business
Keeping the Trolls at Bay: Effective Legal Strategies for your Business
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies That Work

  • 1. Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies That Work Moderator: David Snead: Attorney, W. David Snead, P.C. Panelists: Dev Chanchani: CEO, INetU, Inc. Tom Chernaik: CEO, Cmp.ly Dan Ushman: Founder/CMO, SingleHop, Inc. Mike Witty: Director of Network Compliance, ServInt Inc.
  • 2. Roadmap • Why is compliance important? • DMCA and compliance strategy. • FTC and regulatory compliance. • HIPAA / HITECH compliance. • Question and answer
  • 3. DMCA and compliance strategy. Mike Witty: Director of Network Compliance, ServInt Inc.
  • 4. Establishing a DMCA compliance Strategy & procedure
  • 5. READ THE DMCA Digital Millennium Copyright Act http://en.wikipedia.org/wiki/DMCA Online Copyright Infringement Liability Limitation Act (OCILLA) “Safe Harbor” http://en.wikipedia.org/wiki/Online_Copyri ght_Infringement_Liability_Limitation_Act
  • 6. Designate an agent U.S. Copyright Office http://www.copyright.gov/onlinesp/ Interim Designation of Agent to Receive Notification of Claimed Infringement Amended Interim Designation of Agent to Receive Notification of Claimed Infringement  Directory of Agents
  • 7. Processing a COMPLAINT  Verify that all DMCA requirements are present - Location of original content - Location of infringing content - Contact Information Name Address Phone Number(s) E-Mail Address - “I have a good faith belief...” - “I swear, under penalty of perjury, that the information...” - Signature  Respond to the complainant  Present the complaint to your customer - 3 days to comply (24-hour grace period)  Verify that the content has been removed  Respond to the complainant  Close the case and archive
  • 8. COUNTER-NOTICEs Your customer must still comply with the DMCA notice and remove the content A counter-notice may only be filed after your customer has removed the content - Identification and location of previously-removed content - Contact Information - “I swear, under penalty of perjury, that the content...” - Consent to the jurisdiction of a federal court - Consent to accept service of process from the complainant - Signature  The complainant has 10-14 days to file a law suit  The content may be restored  Notify the complainant  Close the case and archive
  • 9. CHALLENGES  Ignorance of DMCA law and procedure - Canned text with links - Links on your website in your AUP  Resistance to compliance - “Guilty before innocence”  Repeated DMCA complaints received - Your obligation is unchanged - Customer should seek legal counsel  Repeat Infringers  Language Barriers
  • 10. FTC and regulatory compliance. Tom Chernaik: CEO, Cmp.ly
  • 11. How Prepared Are You? Create & Implement Process Ensure Disclosure in all SM Formats Monitor Influencers for Compliance Follow Up & Takedown Manage Compliance Actions Document Audit Trail Scale Efforts Across Brands & Programs Make Efficient Use of Human Resources
  • 12. Regulatory Environment "As a practical matter, social media is now a regulated industry; and all stakeholders are responsible for compliance with the FTC Guides. As a result, all marketers, agencies, and brands must develop a 'culture of compliance' where the vocabulary of risk management is a central aspect of an advertising strategy.” – Tony DiResta, Partner at Winston & Strawn General Counsel of WOMMA "If law enforcement becomes necessary, our focus will be advertisers, not endorsers – just as it’s always been.” – FTC Factsheet on Update to Endorsement Guides
  • 13. Notable Regulatory Events • FTC action (endorsements) • FTC action (astroturfing) • FTC action (affiliate marketing) • State action (NY State) • TBD (SEC/FTC) • UK OFT action (foreign jurisdictions)
  • 14. Risks of Non-Compliance Regulatory Action / Investigations Significant legal costs Penalties and settlement terms Potential for erosion of brand trust Court of Public Opinion Consumers, Bloggers, Social media backlash Blacklisting PR Nightmares Scandals Reports & investigations Bad press & negative opinions
  • 16. What Should We Consider? • Platforms • Programs – Sampling / Reviews / Gifting / Fly Aways / Haul Video – Paid Review / Endorsement / Mentions – Contests / Promotions – Blogs / Posts / Status / Videos • Influencers – Blogger / Influencer Outreach – Employee influencers – Agencies / Partners / Affiliates
  • 17. Your Message Here Include:  Your complete marketing message  Link to content  Call to action  Contest & promotion rules  Required disclosures
  • 18. The Challenges of Compliance Short, Simple, Clear & Conspicuous Space limitations - 140 Characters or less Universal, standardized & recognizable Fine print, terms, rules, etc. Management Challenges Communicate policies and document participant acceptance Multiple programs, brands, agencies, stakeholders, platforms Maintain control across multiple influencer channels Scale Challenges Ensure proper use of disclosures – enforce policies Monitor for omitted disclosures / compliance at influencer level Understand the context of specific messages/posts/tweets Document follow up actions Archive audit trail data of all program activities
  • 20. Ad Hoc Compliance Solutions
  • 21. What About Hashtags? • #AD What is wrong with that? • #SPON • Not standardized • #Endorse • Tracking is limited • Does not scale
  • 22. Managing Scale 6/3 6/13 7/8
  • 23. Social Media & Microblogging
  • 24. Blogs & Web Sites
  • 27. Preparedness Checklist ✔ Create & Implement Process ✔ Ensure Disclosure in all SM Formats ✔ Document Compliance ✔ Monitor Influencers for Compliance ✔ Follow Up & Takedown ✔ Audit & Archive ✔ Scale Efforts Across Brands & Programs ✔ Efficient Use of Human Resources
  • 28. HIPAA / HITECH compliance Dev Chanchani: CEO, INetU, Inc.
  • 29. Today’s Topics • HIPAA = LAW = Ambiguous • HITECH draws HIPAA Law into the Our Technology Arena • Take a “Time Out” • Real Risks = Real Challenges
  • 30. HIPAA is LAW … you need to treat it differently than you do a “compliance standard” Whom does HIPAA affect? • Anyone who uses health care or health insurance • Health insurers • Doctors • Hospitals • Employers who provide health insurance • Life insurers • Public health authorities • Billing agencies • Information system vendors • Health service organizations
  • 31. HIPAA safeguards PHI (Protected Health Information) Simply: You can’t know about my personal medical history unless I give you my express permission. …and if you view it without my permission, you need to tell me about it!
  • 32. HITECH HITECH augments HIPAA …by placing business associates, such as hosting providers and data centers, squarely on the “compliance hook”
  • 34. RISK Management  The hosting provider is a point of compliance – do not underestimate this.  Understand Whistleblower Laws  Expect federal funding for enforcement (HIPAA Police)  Don’t be scared – Be prepared
  • 36. Thanks for coming! Moderator: David Snead david.snead@dsnead.com Panelists: Dev Chanchani dev@inetu.net Tom Chernaik tom@cmp.ly Dan Ushman dushman@singlehop.com Mike Witty witty@servint.com

Editor's Notes

  1. The Challenges of ComplianceSocial media environment makes inclusion of disclosures and fine print a challenge140 charactersReal time & Ad HocViral nature (hard to control/easy for things to get out of control)Scale Challenges Required to monitor at the influencer level , how do you scale this?Management challenges – multiple programs, scaling influencer programs, multiple agencies, multiple stakeholders [CAN WE GET QUOTES]