SlideShare a Scribd company logo
IP ISSUES IN SOCIAL
       MEDIA


                     Divya Raman
            Corporate Department
            Altacit Global
  Email: info@altacit.com Website: www.altacit.com
Social Media
• Use of web-based and mobile
  technologies to turn communication
  into an interactive dialogue.
• Media for social interaction, as a
  superset          beyond       social
  communication.
• Eg:
  Facebook, Twitter, LinkedIn, Youtube
  etc.
Impact of social media
•Anti-government protesters in Tunisia
and Egypt used Twitter, Facebook and
other platforms to run rings around
attempts at censorship and organize
demonstrations that ousted presidents
Zine El Abidine Ben Ali and Hosni
Mubarak.
Impact of social media (contd…)

• US has also seen seen some modest
  signs of social media-organized
  protest, with hundreds of protesters
  occupying Wall Street in anger at
  perceived excesses by its banks.
Intellectual Property

•   Patent.
•   Design.
•   Copyright.
•   Geographical Indications.
•   Trademark.
IP Issues in Social Media
Social networking sites present several
risks, including trademark infringement
and copyright violation issues. For
example, a company's valuable trademarks
could appear without authorization on a
user's profile page or as part of a user
name ("name squatting") on a social
networking site.
Copyright
•Some social media websites claim copyright
over all items posted on its website.
•While others recognize that the copyright
remains with the owner.
•File sharing is one of the aspect in
infringement of copyright through social
website. Eg: sharing video clips of
movies, music, books being shared. All this
has posed copyright infringement through
social media.
Trademark
•Trademark can potentially be used to
protect competitors from selling goods or
services with confusingly similar marks.
•Scrabulous: Developed by two commerce
graduates in India – game application in
facebook. Features of this game is similar to
scrabble owned by Hasbro in Canada – only
difference is scrabulous is in electronic
format. Founders of scrabulous sued and
they withdrew the game from facebook.
Trade Secret
Social media can put at risk a company’s trade
secrets. Since the sine qua non of a trade secret is
that it is kept secret, the speed and ease in which
information can be rapidly (and permanently)
distributed with a click of a button in social media
and internet poses a clear risk for any company
seeking to maintain a trade secret. A simple posting
of a company’s secret information can destroy the
secret and leave that information to be available to
anyone.
Customer List - Trade Secret
Consider, for a second, a company that considers
its customer list to be a trade secret and seeks to
protect such information. A salesperson who
identifies those customers as “friends” on
Facebook, or “connections” on LinkedIn, or some
other similar status on another social media
website, could destroy the secret nature of such a
list. It also can lead to that salesperson, in
essence, appropriating that information should
he or she leave to go to work for a competitor.
Case Laws
One recently reported high-profile case involved Tony
La Russa, manager of the St. Louis Cardinals baseball
team, whose identity was hijacked on Twitter by an
imposter. The suit filed in the Superior Court of
California in San Francisco, which has since been
dismissed, claimed that someone created an account
under La Russa's name and posted tweets, giving the
false impression that the comments came from La
Russa. The suit also said that the comments were
"derogatory and demeaning" and thus damaged La
Russa's trademark rights.
There also have been reports of corporate
sabotage. For example, it was reported that
a public relations firm allegedly set up a
Twitter account in the name of a rival firm.
The firm then allegedly disseminated
malicious tweets for two months before the
competing firm realized that its identity had
been hijacked.
Protective Measures
•Companies can initiate a self-monitoring
program which include a weekly or monthly
review of a number of available social media
web sites.
•Companies may decide to hire an outside
service provider to monitor for negative
comments and infringements in the social
media websites.
Conclusion

Social networking sites can present difficult
enforcement and liability issues, but with
appropriate preventative measures, consistent
monitoring       and     carefully    designed
enforcement priorities and actions, companies
can "confirm" social networking sites and their
users as friends with few reservations.
To     minimize    the     risks  of   trademark
hijacking, trademark infringement and damage to
brand reputation that may occur on social media
networking sites, it is advisable to take
precautionary and proactive steps. Those steps
include reserving company names and key
permutations of company names with social
networking sites, developing a presence in social
networking communities, assigning company
employees who are responsible for overseeing the
monitoring process, understanding terms of use for
each of the major social networks and developing
consistent enforcement procedures.
THANK YOU

More Related Content

What's hot

Social Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking Sites
Varun Bhandari
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
julia594
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
Phil Cryer
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
Aman Khanna
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
Anna Adel
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
Phil Cryer
 
Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites
Abdullah Mahboob
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
Nousheen Arshad
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
Phil Cryer
 
374 Arhan
374 Arhan374 Arhan
374 Arhanaci2008
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
DaliahSaper
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
blaine_5
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
is20090
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
Brenden Brown
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
Inflection Point Global
 

What's hot (20)

Social Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking Sites
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
374 Arhan
374 Arhan374 Arhan
374 Arhan
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Facebook
FacebookFacebook
Facebook
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 

Viewers also liked

Geographical indications: A marketing tool for unique goods from specific env...
Geographical indications: A marketing tool for unique goods from specific env...Geographical indications: A marketing tool for unique goods from specific env...
Geographical indications: A marketing tool for unique goods from specific env...
India Water Portal
 
Geographical indications ppt
Geographical indications pptGeographical indications ppt
Geographical indications pptAltacit Global
 
Evolution Of IPR
Evolution Of IPREvolution Of IPR
Evolution Of IPR
Lalit Ambastha
 

Viewers also liked (6)

Lisbon agreement
Lisbon agreementLisbon agreement
Lisbon agreement
 
Trademarking emotions
Trademarking emotionsTrademarking emotions
Trademarking emotions
 
Geographical indications: A marketing tool for unique goods from specific env...
Geographical indications: A marketing tool for unique goods from specific env...Geographical indications: A marketing tool for unique goods from specific env...
Geographical indications: A marketing tool for unique goods from specific env...
 
Geographical indications ppt
Geographical indications pptGeographical indications ppt
Geographical indications ppt
 
EUT440 LAW 4 (Intelectual Property)
EUT440 LAW 4 (Intelectual Property)EUT440 LAW 4 (Intelectual Property)
EUT440 LAW 4 (Intelectual Property)
 
Evolution Of IPR
Evolution Of IPREvolution Of IPR
Evolution Of IPR
 

Similar to Ip issues in social media

Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10lindseymgift
 
Twitter Ethics Team Competition
Twitter Ethics Team CompetitionTwitter Ethics Team Competition
Twitter Ethics Team Competitionknarkiew
 
Brand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking SitesBrand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking Sites
Klemchuk LLP
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Mediajrfields
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
scstatelibrary
 
Brandjacking
BrandjackingBrandjacking
Brandjacking
Valene Varela
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
Matthew Asbell
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
ESI Attorneys LLC
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introduction
saltmedia
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
Logikcull.com
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
SquareOne|Consulting
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
Pod Legal
 
Drawbacks of Social Networks
Drawbacks of Social NetworksDrawbacks of Social Networks
Drawbacks of Social Networks
University of Hertfordshire
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
Mary-Ellen Wyatt King
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
David Green
 
Social Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingSocial Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & Adapting
Earthbound Media Group
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
Kim Jensen
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
Constantine Karbaliotis
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
Kirsten Thompson
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
Marc Vael
 

Similar to Ip issues in social media (20)

Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
 
Twitter Ethics Team Competition
Twitter Ethics Team CompetitionTwitter Ethics Team Competition
Twitter Ethics Team Competition
 
Brand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking SitesBrand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking Sites
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Brandjacking
BrandjackingBrandjacking
Brandjacking
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introduction
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
Drawbacks of Social Networks
Drawbacks of Social NetworksDrawbacks of Social Networks
Drawbacks of Social Networks
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Social Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingSocial Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & Adapting
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 

More from Altacit Global

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020
Altacit Global
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from home
Altacit Global
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...
Altacit Global
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection act
Altacit Global
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn child
Altacit Global
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in India
Altacit Global
 
Alimony laws in India
Alimony laws in IndiaAlimony laws in India
Alimony laws in India
Altacit Global
 
Patent licensing
Patent licensingPatent licensing
Patent licensing
Altacit Global
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-India
Altacit Global
 
I r s form w-9
I r s form w-9I r s form w-9
I r s form w-9
Altacit Global
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Altacit Global
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft system
Altacit Global
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companies
Altacit Global
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyright
Altacit Global
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in India
Altacit Global
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in India
Altacit Global
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development Board
Altacit Global
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)
Altacit Global
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015
Altacit Global
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in India
Altacit Global
 

More from Altacit Global (20)

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from home
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection act
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn child
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in India
 
Alimony laws in India
Alimony laws in IndiaAlimony laws in India
Alimony laws in India
 
Patent licensing
Patent licensingPatent licensing
Patent licensing
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-India
 
I r s form w-9
I r s form w-9I r s form w-9
I r s form w-9
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft system
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companies
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyright
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in India
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in India
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development Board
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in India
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Ip issues in social media

  • 1. IP ISSUES IN SOCIAL MEDIA Divya Raman Corporate Department Altacit Global Email: info@altacit.com Website: www.altacit.com
  • 2. Social Media • Use of web-based and mobile technologies to turn communication into an interactive dialogue. • Media for social interaction, as a superset beyond social communication. • Eg: Facebook, Twitter, LinkedIn, Youtube etc.
  • 3. Impact of social media •Anti-government protesters in Tunisia and Egypt used Twitter, Facebook and other platforms to run rings around attempts at censorship and organize demonstrations that ousted presidents Zine El Abidine Ben Ali and Hosni Mubarak.
  • 4. Impact of social media (contd…) • US has also seen seen some modest signs of social media-organized protest, with hundreds of protesters occupying Wall Street in anger at perceived excesses by its banks.
  • 5. Intellectual Property • Patent. • Design. • Copyright. • Geographical Indications. • Trademark.
  • 6. IP Issues in Social Media Social networking sites present several risks, including trademark infringement and copyright violation issues. For example, a company's valuable trademarks could appear without authorization on a user's profile page or as part of a user name ("name squatting") on a social networking site.
  • 7. Copyright •Some social media websites claim copyright over all items posted on its website. •While others recognize that the copyright remains with the owner. •File sharing is one of the aspect in infringement of copyright through social website. Eg: sharing video clips of movies, music, books being shared. All this has posed copyright infringement through social media.
  • 8. Trademark •Trademark can potentially be used to protect competitors from selling goods or services with confusingly similar marks. •Scrabulous: Developed by two commerce graduates in India – game application in facebook. Features of this game is similar to scrabble owned by Hasbro in Canada – only difference is scrabulous is in electronic format. Founders of scrabulous sued and they withdrew the game from facebook.
  • 9. Trade Secret Social media can put at risk a company’s trade secrets. Since the sine qua non of a trade secret is that it is kept secret, the speed and ease in which information can be rapidly (and permanently) distributed with a click of a button in social media and internet poses a clear risk for any company seeking to maintain a trade secret. A simple posting of a company’s secret information can destroy the secret and leave that information to be available to anyone.
  • 10. Customer List - Trade Secret Consider, for a second, a company that considers its customer list to be a trade secret and seeks to protect such information. A salesperson who identifies those customers as “friends” on Facebook, or “connections” on LinkedIn, or some other similar status on another social media website, could destroy the secret nature of such a list. It also can lead to that salesperson, in essence, appropriating that information should he or she leave to go to work for a competitor.
  • 11. Case Laws One recently reported high-profile case involved Tony La Russa, manager of the St. Louis Cardinals baseball team, whose identity was hijacked on Twitter by an imposter. The suit filed in the Superior Court of California in San Francisco, which has since been dismissed, claimed that someone created an account under La Russa's name and posted tweets, giving the false impression that the comments came from La Russa. The suit also said that the comments were "derogatory and demeaning" and thus damaged La Russa's trademark rights.
  • 12. There also have been reports of corporate sabotage. For example, it was reported that a public relations firm allegedly set up a Twitter account in the name of a rival firm. The firm then allegedly disseminated malicious tweets for two months before the competing firm realized that its identity had been hijacked.
  • 13. Protective Measures •Companies can initiate a self-monitoring program which include a weekly or monthly review of a number of available social media web sites. •Companies may decide to hire an outside service provider to monitor for negative comments and infringements in the social media websites.
  • 14. Conclusion Social networking sites can present difficult enforcement and liability issues, but with appropriate preventative measures, consistent monitoring and carefully designed enforcement priorities and actions, companies can "confirm" social networking sites and their users as friends with few reservations.
  • 15. To minimize the risks of trademark hijacking, trademark infringement and damage to brand reputation that may occur on social media networking sites, it is advisable to take precautionary and proactive steps. Those steps include reserving company names and key permutations of company names with social networking sites, developing a presence in social networking communities, assigning company employees who are responsible for overseeing the monitoring process, understanding terms of use for each of the major social networks and developing consistent enforcement procedures.