This document discusses various legal issues related to the use of social data, including copyright, right of publicity, trademarks, defamation, content regulation, marketing, workplace issues, and due diligence. It notes that many businesses and individuals lack an understanding of the applicable legal requirements and risks, such as content removal, penalties, and lost opportunities. It provides an overview of key areas of law and encourages learning the "rules of the road" to avoid these risks when creating, commercializing, and enforcing rights related to content and speech online or in other digital contexts.
TechWeek Chicago 2012 was great success. Packed room with entrepreneurs eager to understand legal issues facing their business. If you were unable to attend, here is my portion of the presentation.
This presentation talks about the Legal instrumentation in e-commerce industry in International market. It draws attention towards major legal issues in this industry and I have tried to find out the best solutions of some of them
TechWeek Chicago 2012 was great success. Packed room with entrepreneurs eager to understand legal issues facing their business. If you were unable to attend, here is my portion of the presentation.
This presentation talks about the Legal instrumentation in e-commerce industry in International market. It draws attention towards major legal issues in this industry and I have tried to find out the best solutions of some of them
Privacy and Security in Mobile E-CommerceNow Dentons
In this presentation, FMC’s Timothy Banks describes the important issues to consider when thinking about privacy and security in mobile e-commerce. The presentation includes a discussion of the following topics:
- Outlines for M-Commerce
- Overview of Guidelines
- Special Issues (address book information, online behavioral tracking and analytics, geolocation data, children, and ongoing emerging issues)
- Transparency and Accountability in Design (consent, representations and disclaimers and applying Canada’s Anti-Spam Legislation)
- The three dimensions of M-Commerce
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
Although cloud computing presents a compelling business case for companies looking to reduce spending, streamline processes, and increase accessibility, the very idea of trans-border data flows raises the hackles of privacy advocates all over the globe. In Canada, government and members of the public have expressed serious concern over the potential misuse of personal information gone offshore. Join Else for an overview of those concerns and what they might mean for your organization.
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold3Play Media
This webinar will be presented by Lainey Feingold, an internationally recognized disability rights lawyer and pioneer of Structured Negotiation known for negotiating landmark accessibility agreements. In this webinar, Lainey will take us through key cases, government agency activity, settlements, and other developments in the digital accessibility legal landscape since her last 3Play Media webinar in September 2016.
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
This legally focused MENGinar will educate you on the risks of using Social Media along with other digital businesses. It will provide ways to help highlight:
What is social media law?
What are the more common legal issues related to businesses using social media?
How social media law can impact businesses?
What can be done to minimize the risks of those potential legal problems related to using social media?
Do the potential issues raised by using social media mean that it is better for my company to not use social media?
Shawn Tuma is a partner at the law firm BrittonTuma, a full service boutique business law firm that helps clients with all civil matters, including a full range of transaction, litigation, technology, and general counseling services. Shawn’s own broad based experience centers on business, technology, civil litigation, intellectual property litigation, and a unique expertise with cutting-edge legal issues such as computer fraud, information security, and cyber and information law.
Shawn is a frequent speaker on digital business risk issues such as computer fraud, data security, and social media law.
Data Privacy: What you should know, what you should do!
CSMFO Data Privacy in the Governmental Sector, Local Government. Data Privacy Laws, PCI, Breaches, AICPA – Generally Accepted Privacy Principles
Privacy and Security in Mobile E-CommerceNow Dentons
In this presentation, FMC’s Timothy Banks describes the important issues to consider when thinking about privacy and security in mobile e-commerce. The presentation includes a discussion of the following topics:
- Outlines for M-Commerce
- Overview of Guidelines
- Special Issues (address book information, online behavioral tracking and analytics, geolocation data, children, and ongoing emerging issues)
- Transparency and Accountability in Design (consent, representations and disclaimers and applying Canada’s Anti-Spam Legislation)
- The three dimensions of M-Commerce
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
Although cloud computing presents a compelling business case for companies looking to reduce spending, streamline processes, and increase accessibility, the very idea of trans-border data flows raises the hackles of privacy advocates all over the globe. In Canada, government and members of the public have expressed serious concern over the potential misuse of personal information gone offshore. Join Else for an overview of those concerns and what they might mean for your organization.
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold3Play Media
This webinar will be presented by Lainey Feingold, an internationally recognized disability rights lawyer and pioneer of Structured Negotiation known for negotiating landmark accessibility agreements. In this webinar, Lainey will take us through key cases, government agency activity, settlements, and other developments in the digital accessibility legal landscape since her last 3Play Media webinar in September 2016.
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
This legally focused MENGinar will educate you on the risks of using Social Media along with other digital businesses. It will provide ways to help highlight:
What is social media law?
What are the more common legal issues related to businesses using social media?
How social media law can impact businesses?
What can be done to minimize the risks of those potential legal problems related to using social media?
Do the potential issues raised by using social media mean that it is better for my company to not use social media?
Shawn Tuma is a partner at the law firm BrittonTuma, a full service boutique business law firm that helps clients with all civil matters, including a full range of transaction, litigation, technology, and general counseling services. Shawn’s own broad based experience centers on business, technology, civil litigation, intellectual property litigation, and a unique expertise with cutting-edge legal issues such as computer fraud, information security, and cyber and information law.
Shawn is a frequent speaker on digital business risk issues such as computer fraud, data security, and social media law.
Data Privacy: What you should know, what you should do!
CSMFO Data Privacy in the Governmental Sector, Local Government. Data Privacy Laws, PCI, Breaches, AICPA – Generally Accepted Privacy Principles
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
Following the adoption of GDPR in the European Union, the United States has seen their own privacy regulatory landscape evolve and develop. Beginning in California and expanding to Nevada, Maine, and beyond, ensuing organizational and technical compliance with these stringent regulations has become a priority for many organizations. These regulations have come with additional reputational and regulatory risk (e.g. fines), increased consumer rights, and an enhanced focus on how companies use data as a commodity. This webinar will unpack the key complexities surrounding those regulations, speak to how technology advancements can assist in compliance and overall privacy program maturity, and discuss how Internal Audit can prepare for and drive a proactive approach to privacy.
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
Affiliate marketing thrives on valuable data, such as lead gen, email marketing and campaign results/statistics. Privacy, data and security issues are critical today, especially in an industry where valuable data is a competitive advantage.
Gary Kibel, Partner, Davis & Gilbert LLP (Twitter @GaryKibel_law)
Recovering from a Cyber Attack was delivered on February 7, 2018, at the Texas Bar CLE Cybersecurity Workshop course by Todd Hindman, Global Director, Data Breach Response Services of ID Experts Corp. and Shawn Tuma, Cybersecurity & Data Privacy Attorney at Scheef & Stone.
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
Similar to Gagnier's Portion of TechWeek Chicago Presentation (20)
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
On July 25, 2017, the United States Securities and Exchange Commission (SEC) issued an investigative report regarding the sales of digital assets by virtual organizations through offers and sales that have come to be known as “Initial Coin Offerings” and “Token Sales.”
In Release No. 81207, “Report of Investigation Pursuant to Section 21(a) of the Securities and Exchange Commission Act of 1934: The DAO,” the SEC gives its first guidance as to whether or not it may view initial coin offerings and token sales as a security offering. The following provides a brief overview of the SEC’s report.
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
Our firm has prepared an overview of the prospective European Union – United States Privacy Shield program. As of today’s date, this program has yet to go into effect. Original projections had this program slated to begin in Summer 2016, as detailed below, but the Privacy Shield was formally adopted as of July 11, 2016.
As our firm receives further information about the approval and implementation of this program, our firm is ready to work with your company to execute the proper procedures for compliance.
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
Get ready for GDPR compliance. Our firm has created this European Union Privacy Law - General Data Protection Regulation Checklist to jumpstart the process. Contact @gamallp or Christina Gagnier at gagnier@gamallp.com to learn more.
Borrow GAMA's privacy team as your CPO for the evening with a review of compliance with domestic and international privacy and security law. Get your company ready for changes in California in 2014 as well as what may be on the horizon in the privacy and security space.
Check out our presentation on everything you need to know to start your business. Part of the workshop was covered in this Inc.com piece: http://www.inc.com/laura-montini/why-you-should-consider-a-founders-agreement.html
The move by many schools to adopt cloud-based data storage and data analytics solutions is unsurprising, since schools can generate significant pedagogical value through use of these technologies. With these rewards come broad risks associated with legal and regulatory data privacy compliance. Given the slew of recent retail industry data breaches making national headlines, the risks of data collection and storage are immediately apparent. With data privacy on everyone’s mind, there has never been a better time for school administrators to fully evaluate and address their student data privacy policies.
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
Technology in the classroom is nothing new, but with the rise of smartphones, smart boards and tablet computing, the way teachers and students use and engage with media continues to grow and evolve. Any time educational content is used, shared or created, whether by teachers or by students, IP laws and, specifically, copyright laws, are implicated. Administrators, teachers and students must all be aware of what activity is freely permissible under U.S. Copyright Law, and what sort of activities might run afoul of the law.
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)Christina Gagnier
3D printing has been around since the early 1980s, but over the last several years has gained widespread attention as costs have dropped and access to the technology has grown. While it is possible to surmise what areas of law may be most implicated by broad adoption of 3D printing, one can only guess how their application might shape the future of manufacturing.
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
Tax season is just around the corner and changes to the capital gains tax rates will affect taxpayers filing their returns at the beginning of 2014. If you sold capital assets during 2013, you might be subject to the increased rates. This brief provides important information on preparing for the capital gains tax hike.
Capital gains tax is the tax on capital asset profits—the profit made from selling an item bought for personal investment. On January 1, 2013, the government passed the American Taxpayer Relief Act of 2012 (ATRA). The ATRA added a top federal income bracket of 39.6% and increased the long-term capital gains tax rate to 20% starting in the 2013 tax year.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Gagnier's Portion of TechWeek Chicago Presentation
1. YouSued.com
Law & Social Data
By: David M. Adler
Leavens, Strand, Glover & Adler, LLC
203 North LaSalle Street, Suite 2550
Chicago, Illinois 60601
@adlerlaw
3. Overview
Many Businesses & Individuals Lack Resources
Inadequate understanding of legal and regulatory
requirements
Rights owners and Users can benefit
Ignorance = Risk
content removed
civil and criminal penalties
Lost time, money and business opportunities
Learn the “Rules of the Road” for creation,
commercialization and enforcement of the rights and
5. Right of Publicity
Right to control and to choose whether and
how to use an individual’s identity for
commercial purposes
Personal Identity Attributes: (i) name, (ii)
signature, (iii) photograph, (iv) image, (v)
likeness, or (vi) voice
19 states with Rt. Of Publicity Statutes, 28
states recognize common law right
Defenses: identity not used (Question of fact),
7. Defamation
Definition:
slander (statements) and libel (written, broadcast, or
published)
FALSE claim, either express or implied
Per Se (crime, disease, integrity, sexual conduct) & Per
Quod
Defamation In Cyberspace (Section 230)
Former Head / VP Indian Cricketing League fined US$140,000
for Libelous Tweet.
Selected Defenses:
IL: (i) fair report privilege, (ii) substantial truth, & (iii)
8. Content & Speech Regulation
Obscenity / Communications Decency Act - Obscene
Materials
Children: Children's Online Privacy Protection Act
(COPPA) & Children's Internet Protection Act (CIPA)
State Regulation
First Amendment
State Laws
NY bills S6779 A8688 - would ban “anonymous”
speech
AZ bill 2529 – criminalizes any speech that could be
construed as cyber-bullying
WA SB 6251 – criminalizes providing access to third
parties' “offensive” materials by online service
10. Workplace Issues
The NLRB released 3 Reports, the latest May 30, 2012
An employer violates the Act if a rule “would reasonably tend
to chill employees in the exercise of their Section 7 rights.”
Practical Applications
No Policy. According to Grant Thornton, as of Nov. 2011, 79%
of companies surveyed did not have social media policies
Policy Unenforceable. In 2011, the NLRB had received 129
cases involving social media
Policy Unclear. Training employees is just the beginning; AU
telecom co. Telstra (40,000+ employees) mandates training
“3Rs” – responsibility, respect and representation
Policy Outdated. Oct. 2011 FTC settles with Frostwire,
developer of p2p file-sharing application over the default
privacy settings
Loss of Trade Secrets. Phonedog. Christou v. Betaport
11. Due Diligence
Contracts/Policies/Procedures
Social Media & Privacy
BYOD
Affiliates/Sponsors/Contractors
Clearance
Copyright/Trademark/Right of Publicity
Compliance
State & Federal Regulations
12. Thank You!
David M. Adler | Leavens, Strand, Glover & Adler, LLC
203 North LaSalle Street, Suite 2550
Chicago, Illinois 60601
Direct: (866) 734-2568
Fax: (312) 275-7534
www.ecommerceattorney.com
www.lsglegal.com
adlerlaw.wordpress.com
@adlerlaw
22. “Personally identifiable information” is information that
identifies a particular person. “Pii” includes:
• Full name;
• National identification number;
• IP address;
• Vehicle registration plate number;
• Driver’s license number;
• Face;
• Fingerprints;
• Handwriting;
• Credit card numbers;
• Digital identity;
• Date of birth;
• Birthplace; and
• Genetic information.
23. federal movement on privacy
I just want to build cool stuff.
Why should I care?
27. Few pieces of key legislation:
Do Not Track Act
Commercial Privacy Bill of Rights Act of 2011
Personal Data Privacy and Security Act
Secure and Fortify Electronics Data Act (SAFE)
Data Security and Breach Notification Act
51. Children’s Online Privacy Protection Act
Requires websites to get parental consent
before collecting or sharing info for children
under 13
Enforced by the Federal Trade Commission
Applies to commercial websites and other
online services
If you know you have minors on your site, close
the accounts
52. Children’s Online Privacy Protection Act
To comply:
Post a privacy policy/advise whenever
personal information collected
Parental notice, consent, access to
information
Can’t condition participation on providing
more info
Confidentiality & security of information
53. keeping all things “cyber” secure.
super duper uncharted legal territory.
54.
55. Current Legal Regime Applied:
Computer Fraud and Abuse Act
Economic Espionage Act
State Level Regulation
How we define user experience is going to change. \n
I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
There are host of laws on privacy, they have just been created to address issues industry by industry. Consumer privacy and security online is just part of the newest set of considerations. Also, laws vary dramatically from country to country. \n
\n
This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
By they, I refer to Congress. \n
There is a disconnect between what happens in the private and public sector. Huge chasm between Silicon Valley and Washington, DC.\n
\n
This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
\n
First, start by considering what your users care about, the types of things that drive complaints on the company level and to regulatory agencies like the Federal Trade Commission. Mention Social Network Users’ Bill of Rights.\n
I am going to run through a few things you can do to think about this holistically from a strategic perspective.\n
Do an impact analysis. Figure out what you’re doing, your strengths and weaknesses. This is essential before taking any active measures. When I do this, I dissect the platform before I give an analysis of what’s going on or needs to be changed.\n
Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
Building with privacy in mine. Granular controls. Opt in v. opt out. Making privacy and security part of the enrollment process.\n
After the solutions you can consider around the build, you can also look at your policies and response mechanisms.\n
No one reads them. They may need to be there. Come up with a better more experiential alternative. \n
\n
\n
\n
\n
We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
\n
\n
US, make DoS attacks illegal and punishable by up to 10 years of imprisonment, through the National Information Infrastructure Protection Act of 1996 \n\n