SlideShare a Scribd company logo
YouSued.com

Law & Social Data

         By: David M. Adler
Leavens, Strand, Glover & Adler, LLC
 203 North LaSalle Street, Suite 2550
      Chicago, Illinois 60601
             @adlerlaw
Use
of
Social
Overview
Many Businesses & Individuals Lack Resources

Inadequate understanding of legal and regulatory
requirements

Rights owners and Users can benefit

Ignorance = Risk
  content removed
  civil and criminal penalties
  Lost time, money and business opportunities

Learn the “Rules of the Road” for creation,
commercialization and enforcement of the rights and
Copyright
Protects Content
Rights Acquisition
Infringement Issues
Digital Millennium Copyright Act
(DMCA)
Non-Preemptable Common Law
Claims
  Hot news, Breach of Contract, Digital
  Tresspass
Right of Publicity
Right to control and to choose whether and
how to use an individual’s identity for
commercial purposes

Personal Identity Attributes: (i) name, (ii)
signature, (iii) photograph, (iv) image, (v)
likeness, or (vi) voice

19 states with Rt. Of Publicity Statutes, 28
states recognize common law right

Defenses: identity not used (Question of fact),
Trademarks
Scope

Copycats: Brandjacking / Cybersquatting

Comparative Advertising

Liability For Trademark Infringement

Defenses

Product Placement
Defamation
Definition:
  slander (statements) and libel (written, broadcast, or
  published)
  FALSE claim, either express or implied
  Per Se (crime, disease, integrity, sexual conduct) & Per
  Quod

Defamation In Cyberspace (Section 230)
  Former Head / VP Indian Cricketing League fined US$140,000
  for Libelous Tweet.

Selected Defenses:
IL: (i) fair report privilege, (ii) substantial truth, & (iii)
Content & Speech Regulation
Obscenity / Communications Decency Act - Obscene
Materials
Children: Children's Online Privacy Protection Act
(COPPA) & Children's Internet Protection Act (CIPA)
State Regulation
First Amendment
State Laws
  NY bills S6779 A8688 - would ban “anonymous”
  speech
  AZ bill 2529 – criminalizes any speech that could be
  construed as cyber-bullying
  WA SB 6251 – criminalizes providing access to third
  parties' “offensive” materials by online service
Marketing Issues
CAN-SPAM

Promotions
  Sweepstakes / Contests

FTC
  Endorsement / Testimonial Guidelines

Regulate Industries: FTC, FDA, FINRA, SEC,
NLRB

Platforms/Transmedia
Workplace Issues
The NLRB released 3 Reports, the latest May 30, 2012
  An employer violates the Act if a rule “would reasonably tend
  to chill employees in the exercise of their Section 7 rights.”

Practical Applications
  No Policy. According to Grant Thornton, as of Nov. 2011, 79%
  of companies surveyed did not have social media policies
  Policy Unenforceable. In 2011, the NLRB had received 129
  cases involving social media
  Policy Unclear. Training employees is just the beginning; AU
  telecom co. Telstra (40,000+ employees) mandates training
  “3Rs” – responsibility, respect and representation
  Policy Outdated. Oct. 2011 FTC settles with Frostwire,
  developer of p2p file-sharing application over the default
  privacy settings
  Loss of Trade Secrets. Phonedog. Christou v. Betaport
Due Diligence
Contracts/Policies/Procedures
  Social Media & Privacy
  BYOD
  Affiliates/Sponsors/Contractors

Clearance
  Copyright/Trademark/Right of Publicity

Compliance
  State & Federal Regulations
Thank You!
David M. Adler | Leavens, Strand, Glover & Adler, LLC

         203 North LaSalle Street, Suite 2550

               Chicago, Illinois 60601

               Direct: (866) 734-2568

                Fax: (312) 275-7534

            www.ecommerceattorney.com

                  www.lsglegal.com

               adlerlaw.wordpress.com

                     @adlerlaw
LAW &


SOCIAL
DATA
Experience won’t just be about the tool you
build, but it will include how you manage
sensitive data and how you respect users.
This talk is not about Facebook.
This talk is about you.
uncharted legal territory




                   What do we mean by “privacy?”
Distinguishing Fourth Amendment from
privacy in the civil sense.
Electronic Communications Privacy Act
Personally Identifiable Information (Pii)
“Personally identifiable information” is information that
identifies a particular person. “Pii” includes:

  • Full name;
  • National identification number;
  • IP address;
  • Vehicle registration plate number;
  • Driver’s license number;
  • Face;
  • Fingerprints;
  • Handwriting;
  • Credit card numbers;
  • Digital identity;
  • Date of birth;
  • Birthplace; and
  • Genetic information.
federal movement on privacy




                  I just want to build cool stuff.
                              Why should I care?
Problem #1: The laws around data reside in
industry silos.
Few pieces of key legislation:

   Do Not Track Act

   Commercial Privacy Bill of Rights Act of 2011

   Personal Data Privacy and Security Act

   Secure and Fortify Electronics Data Act (SAFE)

   Data Security and Breach Notification Act
Problem #2: They aren’t getting it in DC.
Silicon Valley, Alley, Beach > DC
Problem #3: This isn’t going away.
FTC Action

   Opting Out = ScanScout

   Children’s Privacy = SkidKids
California

   Privacy Policy Required
oh crap.




           What Developers Can Do
What people care about:

Data control

Data minimization

Data portability

Data withdrawal
Here are a few places to start:
Conducting an assessment on privacy and
data security.
Audit:
type


Audit:
type

         amount
Audit:
type

         amount
Audit:
         use
type

         amount
Audit:
         use

         intake
Architectural solutions to privacy. Build with
privacy in mind.
Policy solutions to privacy.
Privacy policies and practices in their
current incarnation are not working.
kidz.




        yes, different rules apply.
Minors

Children’s Online Privacy Protection Act
Children’s Online Privacy Protection Act

Requires websites to get parental consent
before collecting or sharing info for children
under 13

Enforced by the Federal Trade Commission

Applies to commercial websites and other
online services

If you know you have minors on your site, close
the accounts
Children’s Online Privacy Protection Act

To comply:

   Post a privacy policy/advise whenever
   personal information collected

   Parental notice, consent, access to
   information

   Can’t condition participation on providing
   more info

   Confidentiality & security of information
keeping all things “cyber” secure.




            super duper uncharted legal territory.
Current Legal Regime Applied:


Computer Fraud and Abuse Act

Economic Espionage Act

State Level Regulation
Hillz? Send those files to China?
               Text




                  Shit.
We just scratched the surface.
Lawyer

         Christina Gagnier
         @gagnier
         gagnier@gamallp.co
         m
?
LAW &


SOCIAL
DATA
Gagnier's Portion of TechWeek Chicago Presentation

More Related Content

What's hot

social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
home based
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
Saiqa Hashmi
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
Lance Michalson
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
Kdnk Kiriti
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
Wisnu Dewobroto
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
Now Dentons
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
DMAI's Destinations Showcase
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
Trevor Fox
 
Legal Matters in E-commerce
Legal Matters in E-commerceLegal Matters in E-commerce
Legal Matters in E-commerce
E-commerce Course of Boğaziçi University
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
AIIM International
 
Cyber law
Cyber lawCyber law
Cyber law
Azmawati Lazim
 
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
3Play Media
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
University of Central Punjab
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
Azmawati Lazim
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 

What's hot (20)

social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
Legal Matters in E-commerce
Legal Matters in E-commerceLegal Matters in E-commerce
Legal Matters in E-commerce
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
Cyber law
Cyber lawCyber law
Cyber law
 
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 

Similar to Gagnier's Portion of TechWeek Chicago Presentation

Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
Largest Catholic University
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
Kenneth Riley
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
Ashish Jain
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...DDMA
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Affiliate Summit
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
Shawn Tuma
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
Act-On Software
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
Deborah Gonzalez, Esq.
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 

Similar to Gagnier's Portion of TechWeek Chicago Presentation (20)

Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 

More from Christina Gagnier

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
Christina Gagnier
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
Christina Gagnier
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
Christina Gagnier
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
Christina Gagnier
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
Christina Gagnier
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Christina Gagnier
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
Christina Gagnier
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
Christina Gagnier
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
Christina Gagnier
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
Christina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Christina Gagnier
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
Christina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
Christina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
Christina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
Christina Gagnier
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
Christina Gagnier
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
Christina Gagnier
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
Christina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
Christina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Christina Gagnier
 

More from Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Gagnier's Portion of TechWeek Chicago Presentation

  • 1. YouSued.com Law & Social Data By: David M. Adler Leavens, Strand, Glover & Adler, LLC 203 North LaSalle Street, Suite 2550 Chicago, Illinois 60601 @adlerlaw
  • 3. Overview Many Businesses & Individuals Lack Resources Inadequate understanding of legal and regulatory requirements Rights owners and Users can benefit Ignorance = Risk content removed civil and criminal penalties Lost time, money and business opportunities Learn the “Rules of the Road” for creation, commercialization and enforcement of the rights and
  • 4. Copyright Protects Content Rights Acquisition Infringement Issues Digital Millennium Copyright Act (DMCA) Non-Preemptable Common Law Claims Hot news, Breach of Contract, Digital Tresspass
  • 5. Right of Publicity Right to control and to choose whether and how to use an individual’s identity for commercial purposes Personal Identity Attributes: (i) name, (ii) signature, (iii) photograph, (iv) image, (v) likeness, or (vi) voice 19 states with Rt. Of Publicity Statutes, 28 states recognize common law right Defenses: identity not used (Question of fact),
  • 6. Trademarks Scope Copycats: Brandjacking / Cybersquatting Comparative Advertising Liability For Trademark Infringement Defenses Product Placement
  • 7. Defamation Definition: slander (statements) and libel (written, broadcast, or published) FALSE claim, either express or implied Per Se (crime, disease, integrity, sexual conduct) & Per Quod Defamation In Cyberspace (Section 230) Former Head / VP Indian Cricketing League fined US$140,000 for Libelous Tweet. Selected Defenses: IL: (i) fair report privilege, (ii) substantial truth, & (iii)
  • 8. Content & Speech Regulation Obscenity / Communications Decency Act - Obscene Materials Children: Children's Online Privacy Protection Act (COPPA) & Children's Internet Protection Act (CIPA) State Regulation First Amendment State Laws NY bills S6779 A8688 - would ban “anonymous” speech AZ bill 2529 – criminalizes any speech that could be construed as cyber-bullying WA SB 6251 – criminalizes providing access to third parties' “offensive” materials by online service
  • 9. Marketing Issues CAN-SPAM Promotions Sweepstakes / Contests FTC Endorsement / Testimonial Guidelines Regulate Industries: FTC, FDA, FINRA, SEC, NLRB Platforms/Transmedia
  • 10. Workplace Issues The NLRB released 3 Reports, the latest May 30, 2012 An employer violates the Act if a rule “would reasonably tend to chill employees in the exercise of their Section 7 rights.” Practical Applications No Policy. According to Grant Thornton, as of Nov. 2011, 79% of companies surveyed did not have social media policies Policy Unenforceable. In 2011, the NLRB had received 129 cases involving social media Policy Unclear. Training employees is just the beginning; AU telecom co. Telstra (40,000+ employees) mandates training “3Rs” – responsibility, respect and representation Policy Outdated. Oct. 2011 FTC settles with Frostwire, developer of p2p file-sharing application over the default privacy settings Loss of Trade Secrets. Phonedog. Christou v. Betaport
  • 11. Due Diligence Contracts/Policies/Procedures Social Media & Privacy BYOD Affiliates/Sponsors/Contractors Clearance Copyright/Trademark/Right of Publicity Compliance State & Federal Regulations
  • 12. Thank You! David M. Adler | Leavens, Strand, Glover & Adler, LLC 203 North LaSalle Street, Suite 2550 Chicago, Illinois 60601 Direct: (866) 734-2568 Fax: (312) 275-7534 www.ecommerceattorney.com www.lsglegal.com adlerlaw.wordpress.com @adlerlaw
  • 14.
  • 15. Experience won’t just be about the tool you build, but it will include how you manage sensitive data and how you respect users.
  • 16. This talk is not about Facebook. This talk is about you.
  • 17. uncharted legal territory What do we mean by “privacy?”
  • 18.
  • 19. Distinguishing Fourth Amendment from privacy in the civil sense.
  • 22. “Personally identifiable information” is information that identifies a particular person. “Pii” includes: • Full name; • National identification number; • IP address; • Vehicle registration plate number; • Driver’s license number; • Face; • Fingerprints; • Handwriting; • Credit card numbers; • Digital identity; • Date of birth; • Birthplace; and • Genetic information.
  • 23. federal movement on privacy I just want to build cool stuff. Why should I care?
  • 24.
  • 25. Problem #1: The laws around data reside in industry silos.
  • 26.
  • 27. Few pieces of key legislation: Do Not Track Act Commercial Privacy Bill of Rights Act of 2011 Personal Data Privacy and Security Act Secure and Fortify Electronics Data Act (SAFE) Data Security and Breach Notification Act
  • 28. Problem #2: They aren’t getting it in DC.
  • 30. Problem #3: This isn’t going away.
  • 31. FTC Action Opting Out = ScanScout Children’s Privacy = SkidKids
  • 32. California Privacy Policy Required
  • 33. oh crap. What Developers Can Do
  • 34.
  • 35. What people care about: Data control Data minimization Data portability Data withdrawal
  • 36. Here are a few places to start:
  • 37. Conducting an assessment on privacy and data security.
  • 40. type amount Audit:
  • 41. type amount Audit: use
  • 42. type amount Audit: use intake
  • 43. Architectural solutions to privacy. Build with privacy in mind.
  • 45. Privacy policies and practices in their current incarnation are not working.
  • 46.
  • 47.
  • 48. kidz. yes, different rules apply.
  • 49.
  • 51. Children’s Online Privacy Protection Act Requires websites to get parental consent before collecting or sharing info for children under 13 Enforced by the Federal Trade Commission Applies to commercial websites and other online services If you know you have minors on your site, close the accounts
  • 52. Children’s Online Privacy Protection Act To comply: Post a privacy policy/advise whenever personal information collected Parental notice, consent, access to information Can’t condition participation on providing more info Confidentiality & security of information
  • 53. keeping all things “cyber” secure. super duper uncharted legal territory.
  • 54.
  • 55. Current Legal Regime Applied: Computer Fraud and Abuse Act Economic Espionage Act State Level Regulation
  • 56. Hillz? Send those files to China? Text Shit.
  • 57. We just scratched the surface.
  • 58. Lawyer Christina Gagnier @gagnier gagnier@gamallp.co m
  • 59. ?

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. How we define user experience is going to change. \n
  16. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  17. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  18. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  19. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  20. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  21. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  22. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  23. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  24. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  25. There are host of laws on privacy, they have just been created to address issues industry by industry. Consumer privacy and security online is just part of the newest set of considerations. Also, laws vary dramatically from country to country. \n
  26. \n
  27. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  28. By they, I refer to Congress. \n
  29. There is a disconnect between what happens in the private and public sector. Huge chasm between Silicon Valley and Washington, DC.\n
  30. \n
  31. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  32. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  33. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  34. \n
  35. First, start by considering what your users care about, the types of things that drive complaints on the company level and to regulatory agencies like the Federal Trade Commission. Mention Social Network Users’ Bill of Rights.\n
  36. I am going to run through a few things you can do to think about this holistically from a strategic perspective.\n
  37. Do an impact analysis. Figure out what you’re doing, your strengths and weaknesses. This is essential before taking any active measures. When I do this, I dissect the platform before I give an analysis of what’s going on or needs to be changed.\n
  38. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  39. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  40. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  41. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  42. Building with privacy in mine. Granular controls. Opt in v. opt out. Making privacy and security part of the enrollment process.\n
  43. After the solutions you can consider around the build, you can also look at your policies and response mechanisms.\n
  44. No one reads them. They may need to be there. Come up with a better more experiential alternative. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  50. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  51. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  52. \n
  53. \n
  54. US, make DoS attacks illegal and punishable by up to 10 years of imprisonment, through the National Information Infrastructure Protection Act of 1996 \n\n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n