SlideShare a Scribd company logo
1 of 63
LEGAL ISSUES IN RUNNING A
NEWS BUSINESS
Law School for Digital Journalists
October 18, 2013

Scott Dailard
Dow Lohnes PLLC
sdailard@dowlohnes.com

1

Deirdre Sullivan
The New York Times Company
deirdresullivan@nytimes.com
Roadmap
•

Your Brand Online: Trademarks and Domain Names

•

Privacy Primer

•

Mastering the Fine Print
• Terms of Use, Click-throughs and Other Contracts

•

Engaging Your Audience
• Native Advertising, Mobile Services & Promotions

•

Mitigating Your Risks
• Insurance

2

2
Your Brand Online:
Trademarks and Domain Names

3

3
4

4
New York Times Trademarks

5

5
When should you think about
trademarks?
Early.
In the weeks before you launch a new product,
choose a
strong, distinctive name and logo
and then
do a knock-out search.

6

6
Picking a Name
Distinctive marks are strong marks.
And strong marks are easier to protect.
• Fanciful: Kodak, Exxon
• Arbitrary: Apple, Omega
• Suggestive: Coppertone, Microsoft

7

7
To register or not to regi$ter?
You have rights in your trademark without going
through the registration process.
You may not want to register every trademark.
But if you don't register a trademark, it becomes
very difficult (thus expensive) to protect.

8

8
Trademark Registration Process
〉Conduct a search on uspto.gov
〉File an Application based on either:
• Intent to Use
• Use in Commerce
〉Use your trademark in commerce.
〉Update your registration with use case samples.
If you expand the products or services covered
by your trademark, update the registration.

9

9
Trademark Infringement
What is the "likelihood of confusion" as to the source, sponsorship or
approval of the goods or services?
OK: Using a trademark to identify the true owner’s goods or services, even
if use is unflattering to owner.
Not OK: Using mark to identify goods or services or to falsely imply an
association between the trademark owner and a third party. Infringement!
If you forget all this, ask yourself one question:
How would you like it if your trademark were used this way?

10

10
Domain Registration Process
1. Conduct a search online.
2. Register the name through a domain name
registrar, e.g. GoDaddy.com, Register.com.
3. If you are also using it as a trademark, go through
the trademark registration process.

11

11
Domain Names

12

12
Privacy Primer

13

13
The Basics: PII and Non-PII
In the US, there is no comprehensive legal regime for
privacy.
PII is regulated.
Non-PII is not. *
〉 Personally Identifiable Information (PII): Information that
on its own or combined with other information can identify an
individual person.
〉 Non-Personally Identifiable Information (Non-PII):
Anything that is not PII. Non-PII includes cookies information,
clickstream or log file data and, for now at least, IP address.

14
Consumer Privacy:The Easy Part
Ask yourself: What does your site or app do?
• Examine your four main consumer data activities:
〉Collection
〉Storage
〉Use
〉Sharing of customer information

15
Consumer Privacy:The Hard Part
Much more difficult: What do your vendors do?
• Ad networks, ad servers, analytics vendors, push notification
service providers, etc., all rely on putting a tag or pixel on your
page or building some of their software code into your app.
• Ask them about collection, storage, use and sharing.
• Review SDKs (software development kits) carefully before
building it into your app.
When you are using a cheap or free product, your users are
subsidizing your use of the service with their data.

16
Your Mini Privacy Program:
〉 Build privacy and security into your product roadmap.
〉 Provide users with notice and choice/consent.
• Notice: Have a privacy policy. Link to it early and often.
• Consent: Allow users to opt-out and control what you
share about them.
〉 Make sure you understand who is on your site and in your
app. Don’t put a tag on your site or an SDK into your app
until you know exactly what it does.

17
Good Questions: Mobile
〉 Is it really Non-PII when your GPS location is combined with your
telephone?
〉 Small screens challenge clear and conspicuous disclosure of privacy
practices.
〉 Complicated concepts and constantly changing background
technology mean only very broad privacy statements will not become
obsolete with each new version release or software upgrade.
〉 Mobile apps often integrate third party software (software
development kits, or “SDKs”) that we cannot control, and in some
instances, cannot even monitor.

18
Good Questions:
International
〉 The European Union considers US sites to be
subject to the jurisdiction of the EU.
〉 Unlike the US, the EU regulates both PII and
Non-PII.
〉 The EU prohibits transferring information on
“data subjects” outside their boarder unless
you meet certain Safe Harbor requirements.

19
Good Questions:
Big Data and the Deletion
Conundrum
〉 The best practice is to delete data that you don’t
have a business purpose for. But:
〉 What if you don’t know how to use it now, but
can reasonably expect to need it in the future?
〉 What are reasonable uses of Non-PII data? How
much Non-PII can you have on a user before it
actually can identify her? How do you store it?
Who has access?  How long can you justify
keeping the information?
20
Mastering the Fine Print
- Terms of Use, Click-throughs and Other Contracts

21

21
Terms of Use
Terms and conditions for access to and use of a
website, drafted from the website owner's perspective.

22

22
Terms of Use: Enforceability
The user must have
〉Actual or constructive notice of the terms of use.
〉Affirmatively or impliedly assented to the terms of use.
〉Meaning: click-wrap usually is held as enforceable, but
browse-wrap is less certain.

Enforceability also depends on applicable federal and
state law.

23

23
Terms of Use: Practical Advice
〉 Make them modular.
〉 Not everything has to apply to every element of your site.
〉 Include the usual intellectual property statements about your ownership of the
content, as well as restrictions on the use of your content. You're giving a
license to enter the site, not a license to use the content.
〉 Have clear and reasonable rules, especially around UGC. Get a broad license
to UGC.
〉 Make sure you can cease providing “the Service”, change it, or shut it down at
any time.
〉 Be clear that you can remove a user at any time in your sole discretion. (You
likely won't be able to enforce this from a tech perspective, but you'll be glad
you have the threat in your pocket). If you have a pay component, the refund
section of your Terms of Purchase should contemplate this instance.
〉 Include age restrictions.

24

24
Terms of Use:
User Generated Content
Take advantage of the DMCA Safe Harbor. If you accept and post third party
materials, including UGC (and who doesn’t?), the DMCA's safe harbor provisions can
protect your site from copyright infringement liability based on the actions of users.
Section 512(c)(2). 
To qualify, a site must:
1.Designate an agent to receive notifications of claimed infringement (copyright.gov)
2.Make the contact information of such designated agent available
• on your site including on its website in a location accessible to the public and
• to the Copyright Office (see above).  
• Act promptly and consistently. None of the Section 512 safe harbors are
available unless the service provider has implemented) a policy that provides
for the termination in appropriate circumstances of repeat infringers.  Section
512(i)(1)(A).

25

25
Negotiating Contracts
〉 You can’t really negotiate if you won’t walk away.
〉 Risk is money. If you're accepting a lot of risk, don't
overpay for it.
〉 Ask. You may have leverage. You may not. You won't
know until you ask.
Intimidated by the contract? Reformat it.
〉 THE LANGUAGE IN ALL-CAPS IS CONFUSING
AND SHRILL BUT IF SOMETHING GOES WRONG
IT WILL PROBABLY BE THE MOST EXPENSIVE PART
OF THE CONTRACT.

26

26
Click-through Contracts
You almost certainly have a contract for one of
these services:
Google Maps. Gmail. Adsense. Google Analytics.
Facebook. Instagram. Pinterest. Mobile app
development platforms. Flickr. iTunes. Amazon.
What does it say?

27

27
Contracts: Business Terms
Three great provisions that provide a lot of
protection:
1.Payment upon Acceptance.
2.Termination for Convenience (or a short term).
3.Robust Product or Services description.

28

28
Contracts: Indemnification
Indemnification is “an undertaking by one party to
compensate the other party for certain costs and
expenses.” It protects against claims made by
third parties.

29

29
Contracts: Ad Sales
Whose IO and T&Cs?
〉Yours?
〉The agency’s?
〉IAB’s?
• IAB 3.0 is better for publishers than
2.0.
• …so most agencies will start with 2.0.

30

30
Contracts:
Ad Sales and Insertion Orders
Terms to consider:
〉 No liability for failing to complete a campaign other than a make-good.
〉 Advertisers should indemnify for any creative they provide:
• To the extent your team provides creative services, you should
expect to be responsible for your work
• …unless you submit it to them for approval?
〉 Timing on any campaign should be subject to news preemption.
• Advertisers will likely be happy with this: no one wants to run next
to the photo of a plane crash.
〉 Have a data discussion before they send the tags.
• Best practice is to have a posted data policy.
• Expect pushback. Your point of contact probably won't know what
you're talking about: often, the person is two or three degrees away
from your account executive.

31

31
Engaging Your Audience
-

32

Native Advertising, Mobile Message Programs and
Promotions

32
Native Advertising and Sponsored
Content – Rules of the Road

33

33
The Past: bright Line Separation between
advertising and editorial (“Bento Box”
model)

34

34
But consumers developed “banner
blindness”

Advertising and Marketing Law Casebook, Tushnet & Goldman, 2012.

35

35
Native Advertising – What is it?
•

Content provided by or created with or for an advertiser.

•

Integrated with site design and presented within editorial stream.

•

Has same value to reader as editorial content – and can be experienced,
discovered through search and shared through social media in the same
ways.

•

Integration v. transparency: requires clear labeling of native advertising.

36

36
Stricter Liability Standards Govern Sponsored
Content
•

Stricter liability standards for false or unsubstantiated claims.

•

As a general rule, publisher cannot be held liable for publication of nondefamatory false statements in editorial content “absent proof of knowing
falsity or reckless disregard for the truth.” Daniel v. Dow Jones, 520 N.Y. S.2d
334, 339 (Civ. Ct. 1987).

•

By contrast, if a publisher creates sponsored content for an advertiser, both
the publisher and the advertiser would be liable for any misleading or
deceptive statements under FTC Act and State UDAP laws.

37

37
Stricter Liability Standards Govern
Sponsored Content (Cont.)
• When creating sponsored content, publishers share the
duty with the advertiser to substantiate factual claims
about the advertiser’s products prior to publication.
• Creating sponsored content can also trigger sectorspecific advertising regulations in highly-regulated
categories (e.g., financial, insurance, automotive).

38

38
Endorsers Must Disclose Material
Non-obvious Connections with Advertisers
•

“When there exists a connection between the endorser and the
seller of the advertised product that might materially affect the
weight or credibility of the endorsement (i.e., the connection is not
reasonably expected by the audience), such connection must be fully
disclosed.” FTC Testimonials and Endorsements Guide § 255.5.

•

Advertisers and endorsers share duty of disclosure.

•

An “endorsement” is any advertising message that consumers are
“likely to believe reflects the opinions, beliefs, findings, or
experiences of a party other than the sponsoring advertiser . . . .”

39

39
What Counts as an Endorsement?
•

The FTC investigated Hyundai when an
ad agency gave gift cards to bloggers for
linking to and writing reviews of Hyundai’s
Super Bowl television ads.

•

FTC said that gifts for posting any
“specific content promoting the
advertiser’s products or services is likely
to constitute a material connection that
would not reasonably be expected by
readers of the blog.”

40

40
Testimonial Guidelines & Social Media
•

Required disclosures should
be made in each social media
post where the author has a
material connection to the
advertiser, and should not be
hidden behind a link.

•

Disclosures should be
understood by consumers.
For example, the FTC says
“#spon” may not be
understood, and recommends
“Ad:” instead.

〉

41

41
Third Rule: Don’t Pass off Advertising Content
as Journalism
•

An advertising message is deceptive if it “represent[s], directly or by
implication, that [it is] something other than paid commercial
advertising.” In re Twin Star Productions, Inc., 1990 FTC LEXIS 87 (Mar.
13, 1990).

•

“Advertorials” that mimicked the structure or format of a news
show or an independent journalism or research website have been
targeted in more than a dozen FTC actions.

•

For example, it is deceptive to format an advertorial video with
“commercial breaks” because they imply that advertorial itself is
editorial programming.

42

42
• Marking these ads
as“advertorials” did
not cure deceptive
format.
• Banner ad on
legitimate news
sites, among other
sites, would link to
extended “news”
article.

43

43
FTC Action Against Fake News Sites
• The FTC also charged that these affiliates’ failure to
disclose that they received a commission each time a
consumer bought supplements or signed up for a free
trial through their ads was a deceptive omission.
• $5 million paid to settle with the FTC.

44

44
Identify Paid Inclusion and Paid
Placement Relationships in Search
Results and Rankings
•

Paid Placement: But for payment, the merchant’s listing would not appear as
high in search results.

•

Paid Inclusion: In exchange for payment, the merchant’s listing is guaranteed to
be included in the index for a search engine, and/or its website is spidered more
frequently or reviewed at a deeper level than non-paid sites.

•

The FTC says that because consumers expect search results to be based on
relevancy or other objective criteria, paid placement listings should be clearly
labeled and segregated from organic results. A search engine that operates a paid
inclusion program should conspicuously disclose the existence of the program if it
distorts rankings.

45

45
Paid Placement Labeling
In addition to labeling
its paid placement
results, Google also
includes the following
explanation in a
rollover:

46

46
Paid Inclusion With Explanation

47

The explanation suggests that both paid
inclusion and paid placement are at work in
the display of results.

47
Don’t Use Names, Likenesses or Other
Personal Indicia in
Advertising Without Consent.
•

The unauthorized use of a person’s identity for commercial
advertising purposes generally violates statutory and common law
rights of publicity.

•

Very different rules apply for the use of individuals’ names,
likenesses and identities in purely editorial content.

•

Integrating advertising with editorial photo layouts may also violate
agreements under which photos were licensed – i.e., terms may
restrict use to editorial purposes or require more money for
advertising.

48

48
Rights of Publicity and Prohibition
Against False Endorsements
•

Whether a publisher can use a plaintiff’s identity without consent often
turns on whether the speech is non-commercial or, in some states, whether
it is in the “public interest” even if it is published to make a profit. These
robust First Amendment defenses that are not available for commercial
advertising.

Pixazza, now called Luminate,
sells in-image advertising.

49

49
Reputational Considerations
2012 Survey By MediaBrix & Harris Interactive

50

50
Select American Society of Magazine
Editors (ASME) Best Practices for Digital
Media
〉
“Websites should not accept payment from advertisers to place or promote
products in editorial content.”
〉 “Marketing messages should be visually separated from editorial content—by
rules, for example, or background colors—and easily identifiable as
advertising.”

51

51
Google Page Rank Policy on Paid Links
•

Google’s Page Rank factors in the number of external websites
linking to a site to determine its relevance for purposes of
calculating search rank. Calculations exclude paid links.

•

A publisher or advertiser may drop in Google’s rankings if it
publishes links in exchange for payment and does not tag them with
the required HTML attribute rel="nofollow".

•

Google recently announced that it dropped a newspaper significantly
in its search rankings for this practice.

52

52
Text Messaging
〉 Federal law prohibits use of any automated technology
to send text messages to a phone number for a
wireless device without the “prior express permission”
of the wireless subscriber.
〉 Higher “prior express written consent” required for
advertising texts (broadly construed)
〉 Severe FCC penalties (up to $16,000 per violation)
〉 Severe class action risk -- consumers can sue for up to
$1,500 in statutory damages (per message).

53

53
Text Messaging
〉 Before sending any text messages to a mobile device, document
consumer’s consent using a physical or online form that:
• Identifies your company as the sender by name
• Requires the user to input his or her mobile number
• Describes the content/purpose and frequency of messages that
will be sent
• Discloses that texts may be “autodialed” or sent using
“automatic telephone dialing system”
• Requires user’s affirmative opt-in consent (e.g., by checking an
empty box)
• For advertising texts (e.g., sponsored news alerts), discloses
that consent is not a condition of making any purchase.

54

54
Promotions
〉 Federal and state criminal laws prohibit private
lotteries.
〉 Lottery = prize + chance + consideration
〉 Must eliminate one of these 3 lottery elements
to run a lawful prize promotion.
〉 Legal sweepstakes = prize + chance (no
consideration)

55

55
Promotions
〉 Consideration = a payment or purchase, or in
some jurisdictions, substantial time and effort.
• If entry is bundled with purchase, eliminate
consideration by also offering an alternate free
method of entry (e.g., postcard, toll-free call).

56

56
Promotions
〉 AMOE must offer same relative chance of winning.
〉 Beware of:
• Different entry deadlines
• Different limitations on the number of free and paid entries
• Separate prize pools for paid and free entries
〉 AMOE must be clearly and conspicuously disclosed.
〉 AMOE will not cure lottery problem created by a pure “pay to
play” entry channel.

57

57
Sweepstakes: Special State Registration
Requirements
〉 Sweepstakes must be registered and bonded in
Florida and New York if total retail value of all
prizes offered is exceeds $5,000.
〉 Rhode Island requires registration (but not
bonding) for retail sweepstakes with prizes
over $500.

58

58
Mitigating Your Risks
-

59

Insurance

59
Media Perils Insurance
〉 What is “media perils insurance”?
• A media perils policy typically covers lawsuits based
on libel, slander, defamation, privacy torts, IP
infringement and newsgathering activities.
〉 Media perils coverage may be less expensive than you
think.
• You can potentially obtain $1 million in coverage for
several thousand dollars as your annual premium.

60

60
Media Perils Insurance
〉 Do you need it?
• Not necessary for everyone
〉E.g., if you publish a personal blog about knitting chances of
facing a lawsuit based on your content will be remote.

• But, important to obtain coverage if you operate a
news website, do any kind of investigative journalism
or rely on fair use.
• Ask: Is there a realistic risk of such lawsuits?

61

61
Media Perils Insurance
〉 Be a smart shopper. These features should not
increase your premium:
• Coverage for suits based on newsgathering activities
as well as suits based on content.
• Coverage for defense costs.
• Worldwide coverage.
• Coverage that extends to your freelancers, stringers
or other independent contractors.

62

62
Media Perils Insurance
〉 Other tips for choosing a policy:
• If you have counsel you would want to use in
litigation, seek to have that counsel pre-approved by
the insurer when buying coverage.
• Try to avoid a “hammer clause” that would allow
insurer to settle claims without your approval.
• Consider separate endorsement for the costs of
fighting third-party subpoenas.

63

63

More Related Content

What's hot

Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal IssuesIkuo Takahashi
 
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
 
How Affiliate Marketers Can Avoid Legal Pitfalls
How Affiliate Marketers Can Avoid Legal PitfallsHow Affiliate Marketers Can Avoid Legal Pitfalls
How Affiliate Marketers Can Avoid Legal PitfallsAffiliate Summit
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)RobertMachin
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesLilian Edwards
 
The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActShawn Tuma
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommerceNow Dentons
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Jason Haislmaier
 
Blockchain: Future Legal Issues
Blockchain: Future Legal IssuesBlockchain: Future Legal Issues
Blockchain: Future Legal IssuesMark Radcliffe
 
Clare Lanigan - Copyright and digital preservation
Clare Lanigan - Copyright and digital preservationClare Lanigan - Copyright and digital preservation
Clare Lanigan - Copyright and digital preservationdri_ireland
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to knowCrafted
 

What's hot (20)

Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
 
How Affiliate Marketers Can Avoid Legal Pitfalls
How Affiliate Marketers Can Avoid Legal PitfallsHow Affiliate Marketers Can Avoid Legal Pitfalls
How Affiliate Marketers Can Avoid Legal Pitfalls
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse Act
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
 
Blockchain: Future Legal Issues
Blockchain: Future Legal IssuesBlockchain: Future Legal Issues
Blockchain: Future Legal Issues
 
Clare Lanigan - Copyright and digital preservation
Clare Lanigan - Copyright and digital preservationClare Lanigan - Copyright and digital preservation
Clare Lanigan - Copyright and digital preservation
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
 

Similar to Nytlegal #56866-v3-ona 2013-_ds_draft

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageJudy Yen
 
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-AdvertisingTrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-AdvertisingTrustArc
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling OnlineRob Blamires
 
How to begin regulating a digital reality world
How to begin regulating a digital reality worldHow to begin regulating a digital reality world
How to begin regulating a digital reality worldDeloitte United States
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer FirstVivastream
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer FirstVivastream
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotated10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotatedwdsnead
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersSpain-Holiday.com
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionResellerClub
 
Capital network keep your company close and your ip closer (i sgc 06.02.14)
Capital network   keep your company close and your ip closer (i sgc 06.02.14)Capital network   keep your company close and your ip closer (i sgc 06.02.14)
Capital network keep your company close and your ip closer (i sgc 06.02.14)The Capital Network
 

Similar to Nytlegal #56866-v3-ona 2013-_ds_draft (20)

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital age
 
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-AdvertisingTrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling Online
 
How to begin regulating a digital reality world
How to begin regulating a digital reality worldHow to begin regulating a digital reality world
How to begin regulating a digital reality world
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
 
The DMA conference 2012
The DMA conference 2012The DMA conference 2012
The DMA conference 2012
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
 
GDPR for US Companies: A Primer
GDPR for US Companies: A PrimerGDPR for US Companies: A Primer
GDPR for US Companies: A Primer
 
Brands, Trademarks, and Advertising
Brands, Trademarks, and AdvertisingBrands, Trademarks, and Advertising
Brands, Trademarks, and Advertising
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Legal aspect of IT contracts
Legal aspect of IT contractsLegal aspect of IT contracts
Legal aspect of IT contracts
 
10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotated10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotated
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2Coalition
 
Capital network keep your company close and your ip closer (i sgc 06.02.14)
Capital network   keep your company close and your ip closer (i sgc 06.02.14)Capital network   keep your company close and your ip closer (i sgc 06.02.14)
Capital network keep your company close and your ip closer (i sgc 06.02.14)
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Nytlegal #56866-v3-ona 2013-_ds_draft

  • 1. LEGAL ISSUES IN RUNNING A NEWS BUSINESS Law School for Digital Journalists October 18, 2013 Scott Dailard Dow Lohnes PLLC sdailard@dowlohnes.com 1 Deirdre Sullivan The New York Times Company deirdresullivan@nytimes.com
  • 2. Roadmap • Your Brand Online: Trademarks and Domain Names • Privacy Primer • Mastering the Fine Print • Terms of Use, Click-throughs and Other Contracts • Engaging Your Audience • Native Advertising, Mobile Services & Promotions • Mitigating Your Risks • Insurance 2 2
  • 3. Your Brand Online: Trademarks and Domain Names 3 3
  • 4. 4 4
  • 5. New York Times Trademarks 5 5
  • 6. When should you think about trademarks? Early. In the weeks before you launch a new product, choose a strong, distinctive name and logo and then do a knock-out search. 6 6
  • 7. Picking a Name Distinctive marks are strong marks. And strong marks are easier to protect. • Fanciful: Kodak, Exxon • Arbitrary: Apple, Omega • Suggestive: Coppertone, Microsoft 7 7
  • 8. To register or not to regi$ter? You have rights in your trademark without going through the registration process. You may not want to register every trademark. But if you don't register a trademark, it becomes very difficult (thus expensive) to protect. 8 8
  • 9. Trademark Registration Process 〉Conduct a search on uspto.gov 〉File an Application based on either: • Intent to Use • Use in Commerce 〉Use your trademark in commerce. 〉Update your registration with use case samples. If you expand the products or services covered by your trademark, update the registration. 9 9
  • 10. Trademark Infringement What is the "likelihood of confusion" as to the source, sponsorship or approval of the goods or services? OK: Using a trademark to identify the true owner’s goods or services, even if use is unflattering to owner. Not OK: Using mark to identify goods or services or to falsely imply an association between the trademark owner and a third party. Infringement! If you forget all this, ask yourself one question: How would you like it if your trademark were used this way? 10 10
  • 11. Domain Registration Process 1. Conduct a search online. 2. Register the name through a domain name registrar, e.g. GoDaddy.com, Register.com. 3. If you are also using it as a trademark, go through the trademark registration process. 11 11
  • 14. The Basics: PII and Non-PII In the US, there is no comprehensive legal regime for privacy. PII is regulated. Non-PII is not. * 〉 Personally Identifiable Information (PII): Information that on its own or combined with other information can identify an individual person. 〉 Non-Personally Identifiable Information (Non-PII): Anything that is not PII. Non-PII includes cookies information, clickstream or log file data and, for now at least, IP address. 14
  • 15. Consumer Privacy:The Easy Part Ask yourself: What does your site or app do? • Examine your four main consumer data activities: 〉Collection 〉Storage 〉Use 〉Sharing of customer information 15
  • 16. Consumer Privacy:The Hard Part Much more difficult: What do your vendors do? • Ad networks, ad servers, analytics vendors, push notification service providers, etc., all rely on putting a tag or pixel on your page or building some of their software code into your app. • Ask them about collection, storage, use and sharing. • Review SDKs (software development kits) carefully before building it into your app. When you are using a cheap or free product, your users are subsidizing your use of the service with their data. 16
  • 17. Your Mini Privacy Program: 〉 Build privacy and security into your product roadmap. 〉 Provide users with notice and choice/consent. • Notice: Have a privacy policy. Link to it early and often. • Consent: Allow users to opt-out and control what you share about them. 〉 Make sure you understand who is on your site and in your app. Don’t put a tag on your site or an SDK into your app until you know exactly what it does. 17
  • 18. Good Questions: Mobile 〉 Is it really Non-PII when your GPS location is combined with your telephone? 〉 Small screens challenge clear and conspicuous disclosure of privacy practices. 〉 Complicated concepts and constantly changing background technology mean only very broad privacy statements will not become obsolete with each new version release or software upgrade. 〉 Mobile apps often integrate third party software (software development kits, or “SDKs”) that we cannot control, and in some instances, cannot even monitor. 18
  • 19. Good Questions: International 〉 The European Union considers US sites to be subject to the jurisdiction of the EU. 〉 Unlike the US, the EU regulates both PII and Non-PII. 〉 The EU prohibits transferring information on “data subjects” outside their boarder unless you meet certain Safe Harbor requirements. 19
  • 20. Good Questions: Big Data and the Deletion Conundrum 〉 The best practice is to delete data that you don’t have a business purpose for. But: 〉 What if you don’t know how to use it now, but can reasonably expect to need it in the future? 〉 What are reasonable uses of Non-PII data? How much Non-PII can you have on a user before it actually can identify her? How do you store it? Who has access?  How long can you justify keeping the information? 20
  • 21. Mastering the Fine Print - Terms of Use, Click-throughs and Other Contracts 21 21
  • 22. Terms of Use Terms and conditions for access to and use of a website, drafted from the website owner's perspective. 22 22
  • 23. Terms of Use: Enforceability The user must have 〉Actual or constructive notice of the terms of use. 〉Affirmatively or impliedly assented to the terms of use. 〉Meaning: click-wrap usually is held as enforceable, but browse-wrap is less certain. Enforceability also depends on applicable federal and state law. 23 23
  • 24. Terms of Use: Practical Advice 〉 Make them modular. 〉 Not everything has to apply to every element of your site. 〉 Include the usual intellectual property statements about your ownership of the content, as well as restrictions on the use of your content. You're giving a license to enter the site, not a license to use the content. 〉 Have clear and reasonable rules, especially around UGC. Get a broad license to UGC. 〉 Make sure you can cease providing “the Service”, change it, or shut it down at any time. 〉 Be clear that you can remove a user at any time in your sole discretion. (You likely won't be able to enforce this from a tech perspective, but you'll be glad you have the threat in your pocket). If you have a pay component, the refund section of your Terms of Purchase should contemplate this instance. 〉 Include age restrictions. 24 24
  • 25. Terms of Use: User Generated Content Take advantage of the DMCA Safe Harbor. If you accept and post third party materials, including UGC (and who doesn’t?), the DMCA's safe harbor provisions can protect your site from copyright infringement liability based on the actions of users. Section 512(c)(2).  To qualify, a site must: 1.Designate an agent to receive notifications of claimed infringement (copyright.gov) 2.Make the contact information of such designated agent available • on your site including on its website in a location accessible to the public and • to the Copyright Office (see above).   • Act promptly and consistently. None of the Section 512 safe harbors are available unless the service provider has implemented) a policy that provides for the termination in appropriate circumstances of repeat infringers.  Section 512(i)(1)(A). 25 25
  • 26. Negotiating Contracts 〉 You can’t really negotiate if you won’t walk away. 〉 Risk is money. If you're accepting a lot of risk, don't overpay for it. 〉 Ask. You may have leverage. You may not. You won't know until you ask. Intimidated by the contract? Reformat it. 〉 THE LANGUAGE IN ALL-CAPS IS CONFUSING AND SHRILL BUT IF SOMETHING GOES WRONG IT WILL PROBABLY BE THE MOST EXPENSIVE PART OF THE CONTRACT. 26 26
  • 27. Click-through Contracts You almost certainly have a contract for one of these services: Google Maps. Gmail. Adsense. Google Analytics. Facebook. Instagram. Pinterest. Mobile app development platforms. Flickr. iTunes. Amazon. What does it say? 27 27
  • 28. Contracts: Business Terms Three great provisions that provide a lot of protection: 1.Payment upon Acceptance. 2.Termination for Convenience (or a short term). 3.Robust Product or Services description. 28 28
  • 29. Contracts: Indemnification Indemnification is “an undertaking by one party to compensate the other party for certain costs and expenses.” It protects against claims made by third parties. 29 29
  • 30. Contracts: Ad Sales Whose IO and T&Cs? 〉Yours? 〉The agency’s? 〉IAB’s? • IAB 3.0 is better for publishers than 2.0. • …so most agencies will start with 2.0. 30 30
  • 31. Contracts: Ad Sales and Insertion Orders Terms to consider: 〉 No liability for failing to complete a campaign other than a make-good. 〉 Advertisers should indemnify for any creative they provide: • To the extent your team provides creative services, you should expect to be responsible for your work • …unless you submit it to them for approval? 〉 Timing on any campaign should be subject to news preemption. • Advertisers will likely be happy with this: no one wants to run next to the photo of a plane crash. 〉 Have a data discussion before they send the tags. • Best practice is to have a posted data policy. • Expect pushback. Your point of contact probably won't know what you're talking about: often, the person is two or three degrees away from your account executive. 31 31
  • 32. Engaging Your Audience - 32 Native Advertising, Mobile Message Programs and Promotions 32
  • 33. Native Advertising and Sponsored Content – Rules of the Road 33 33
  • 34. The Past: bright Line Separation between advertising and editorial (“Bento Box” model) 34 34
  • 35. But consumers developed “banner blindness” Advertising and Marketing Law Casebook, Tushnet & Goldman, 2012. 35 35
  • 36. Native Advertising – What is it? • Content provided by or created with or for an advertiser. • Integrated with site design and presented within editorial stream. • Has same value to reader as editorial content – and can be experienced, discovered through search and shared through social media in the same ways. • Integration v. transparency: requires clear labeling of native advertising. 36 36
  • 37. Stricter Liability Standards Govern Sponsored Content • Stricter liability standards for false or unsubstantiated claims. • As a general rule, publisher cannot be held liable for publication of nondefamatory false statements in editorial content “absent proof of knowing falsity or reckless disregard for the truth.” Daniel v. Dow Jones, 520 N.Y. S.2d 334, 339 (Civ. Ct. 1987). • By contrast, if a publisher creates sponsored content for an advertiser, both the publisher and the advertiser would be liable for any misleading or deceptive statements under FTC Act and State UDAP laws. 37 37
  • 38. Stricter Liability Standards Govern Sponsored Content (Cont.) • When creating sponsored content, publishers share the duty with the advertiser to substantiate factual claims about the advertiser’s products prior to publication. • Creating sponsored content can also trigger sectorspecific advertising regulations in highly-regulated categories (e.g., financial, insurance, automotive). 38 38
  • 39. Endorsers Must Disclose Material Non-obvious Connections with Advertisers • “When there exists a connection between the endorser and the seller of the advertised product that might materially affect the weight or credibility of the endorsement (i.e., the connection is not reasonably expected by the audience), such connection must be fully disclosed.” FTC Testimonials and Endorsements Guide § 255.5. • Advertisers and endorsers share duty of disclosure. • An “endorsement” is any advertising message that consumers are “likely to believe reflects the opinions, beliefs, findings, or experiences of a party other than the sponsoring advertiser . . . .” 39 39
  • 40. What Counts as an Endorsement? • The FTC investigated Hyundai when an ad agency gave gift cards to bloggers for linking to and writing reviews of Hyundai’s Super Bowl television ads. • FTC said that gifts for posting any “specific content promoting the advertiser’s products or services is likely to constitute a material connection that would not reasonably be expected by readers of the blog.” 40 40
  • 41. Testimonial Guidelines & Social Media • Required disclosures should be made in each social media post where the author has a material connection to the advertiser, and should not be hidden behind a link. • Disclosures should be understood by consumers. For example, the FTC says “#spon” may not be understood, and recommends “Ad:” instead. 〉 41 41
  • 42. Third Rule: Don’t Pass off Advertising Content as Journalism • An advertising message is deceptive if it “represent[s], directly or by implication, that [it is] something other than paid commercial advertising.” In re Twin Star Productions, Inc., 1990 FTC LEXIS 87 (Mar. 13, 1990). • “Advertorials” that mimicked the structure or format of a news show or an independent journalism or research website have been targeted in more than a dozen FTC actions. • For example, it is deceptive to format an advertorial video with “commercial breaks” because they imply that advertorial itself is editorial programming. 42 42
  • 43. • Marking these ads as“advertorials” did not cure deceptive format. • Banner ad on legitimate news sites, among other sites, would link to extended “news” article. 43 43
  • 44. FTC Action Against Fake News Sites • The FTC also charged that these affiliates’ failure to disclose that they received a commission each time a consumer bought supplements or signed up for a free trial through their ads was a deceptive omission. • $5 million paid to settle with the FTC. 44 44
  • 45. Identify Paid Inclusion and Paid Placement Relationships in Search Results and Rankings • Paid Placement: But for payment, the merchant’s listing would not appear as high in search results. • Paid Inclusion: In exchange for payment, the merchant’s listing is guaranteed to be included in the index for a search engine, and/or its website is spidered more frequently or reviewed at a deeper level than non-paid sites. • The FTC says that because consumers expect search results to be based on relevancy or other objective criteria, paid placement listings should be clearly labeled and segregated from organic results. A search engine that operates a paid inclusion program should conspicuously disclose the existence of the program if it distorts rankings. 45 45
  • 46. Paid Placement Labeling In addition to labeling its paid placement results, Google also includes the following explanation in a rollover: 46 46
  • 47. Paid Inclusion With Explanation 47 The explanation suggests that both paid inclusion and paid placement are at work in the display of results. 47
  • 48. Don’t Use Names, Likenesses or Other Personal Indicia in Advertising Without Consent. • The unauthorized use of a person’s identity for commercial advertising purposes generally violates statutory and common law rights of publicity. • Very different rules apply for the use of individuals’ names, likenesses and identities in purely editorial content. • Integrating advertising with editorial photo layouts may also violate agreements under which photos were licensed – i.e., terms may restrict use to editorial purposes or require more money for advertising. 48 48
  • 49. Rights of Publicity and Prohibition Against False Endorsements • Whether a publisher can use a plaintiff’s identity without consent often turns on whether the speech is non-commercial or, in some states, whether it is in the “public interest” even if it is published to make a profit. These robust First Amendment defenses that are not available for commercial advertising. Pixazza, now called Luminate, sells in-image advertising. 49 49
  • 50. Reputational Considerations 2012 Survey By MediaBrix & Harris Interactive 50 50
  • 51. Select American Society of Magazine Editors (ASME) Best Practices for Digital Media 〉 “Websites should not accept payment from advertisers to place or promote products in editorial content.” 〉 “Marketing messages should be visually separated from editorial content—by rules, for example, or background colors—and easily identifiable as advertising.” 51 51
  • 52. Google Page Rank Policy on Paid Links • Google’s Page Rank factors in the number of external websites linking to a site to determine its relevance for purposes of calculating search rank. Calculations exclude paid links. • A publisher or advertiser may drop in Google’s rankings if it publishes links in exchange for payment and does not tag them with the required HTML attribute rel="nofollow". • Google recently announced that it dropped a newspaper significantly in its search rankings for this practice. 52 52
  • 53. Text Messaging 〉 Federal law prohibits use of any automated technology to send text messages to a phone number for a wireless device without the “prior express permission” of the wireless subscriber. 〉 Higher “prior express written consent” required for advertising texts (broadly construed) 〉 Severe FCC penalties (up to $16,000 per violation) 〉 Severe class action risk -- consumers can sue for up to $1,500 in statutory damages (per message). 53 53
  • 54. Text Messaging 〉 Before sending any text messages to a mobile device, document consumer’s consent using a physical or online form that: • Identifies your company as the sender by name • Requires the user to input his or her mobile number • Describes the content/purpose and frequency of messages that will be sent • Discloses that texts may be “autodialed” or sent using “automatic telephone dialing system” • Requires user’s affirmative opt-in consent (e.g., by checking an empty box) • For advertising texts (e.g., sponsored news alerts), discloses that consent is not a condition of making any purchase. 54 54
  • 55. Promotions 〉 Federal and state criminal laws prohibit private lotteries. 〉 Lottery = prize + chance + consideration 〉 Must eliminate one of these 3 lottery elements to run a lawful prize promotion. 〉 Legal sweepstakes = prize + chance (no consideration) 55 55
  • 56. Promotions 〉 Consideration = a payment or purchase, or in some jurisdictions, substantial time and effort. • If entry is bundled with purchase, eliminate consideration by also offering an alternate free method of entry (e.g., postcard, toll-free call). 56 56
  • 57. Promotions 〉 AMOE must offer same relative chance of winning. 〉 Beware of: • Different entry deadlines • Different limitations on the number of free and paid entries • Separate prize pools for paid and free entries 〉 AMOE must be clearly and conspicuously disclosed. 〉 AMOE will not cure lottery problem created by a pure “pay to play” entry channel. 57 57
  • 58. Sweepstakes: Special State Registration Requirements 〉 Sweepstakes must be registered and bonded in Florida and New York if total retail value of all prizes offered is exceeds $5,000. 〉 Rhode Island requires registration (but not bonding) for retail sweepstakes with prizes over $500. 58 58
  • 60. Media Perils Insurance 〉 What is “media perils insurance”? • A media perils policy typically covers lawsuits based on libel, slander, defamation, privacy torts, IP infringement and newsgathering activities. 〉 Media perils coverage may be less expensive than you think. • You can potentially obtain $1 million in coverage for several thousand dollars as your annual premium. 60 60
  • 61. Media Perils Insurance 〉 Do you need it? • Not necessary for everyone 〉E.g., if you publish a personal blog about knitting chances of facing a lawsuit based on your content will be remote. • But, important to obtain coverage if you operate a news website, do any kind of investigative journalism or rely on fair use. • Ask: Is there a realistic risk of such lawsuits? 61 61
  • 62. Media Perils Insurance 〉 Be a smart shopper. These features should not increase your premium: • Coverage for suits based on newsgathering activities as well as suits based on content. • Coverage for defense costs. • Worldwide coverage. • Coverage that extends to your freelancers, stringers or other independent contractors. 62 62
  • 63. Media Perils Insurance 〉 Other tips for choosing a policy: • If you have counsel you would want to use in litigation, seek to have that counsel pre-approved by the insurer when buying coverage. • Try to avoid a “hammer clause” that would allow insurer to settle claims without your approval. • Consider separate endorsement for the costs of fighting third-party subpoenas. 63 63

Editor's Notes

  1. patchwork of FTC Regulation of “unfair or deceptive practices” and state laws which often conflict and certainly create confusion.
  2. … they rely on us to ask these questions. -- Flurry story -- Patch app -- should be open code, NOT a black box
  3. Under promise, over-deliver.” A good privacy policy will provide wide latitude for your use of customer information.
  4. Small screens challenge clear and conspicuous disclosure of privacy practices. -- California mobile privacy requirements.
  5. News organizations are creating a greater digital (and sometimes physical) presence in countries with comprehensive but inconsistent privacy regimes. The E.U. data authority reasons that a cookie dropped onto the browser of a European user turns that machine into a data processing facility located in the E.U. do French data authorities have jurisdiction over a U.S. website because a French resident accesses that site?
  6. Then again, in an era of cheap and free storage and a data scientist around every corner, just because you can’t use the data now, doesn’t mean you aren’t 6 months from a very real use of that data Not every publisher today has a recommendation engine. But soon, more and more publishers will begin to have the storage, technology, internal expertise and business imperatives to mine troves of user, log files
  7. Click-wrap: you “clicked” Browse-wrap: less certain