David Cuillier prepared this presentation on making better use of public records for journalists attending APME's Phoenix NewsTrain on April 6-7, 2018. Cuillier is associate professor at and director of the University of Arizona School of Journalism. His seven steps include: 1) Get in a document state of mind. 2) Find the records. 3) Know the law. 4) Order records effectively.
5) Overcome denials. 6) Be unafraid of suing. 7) Just do it! The presentation is accompanied by a 39-page handout of the same name that was produced by Cuillier, Charles N. Davis from the University of Georgia and Joel Campbell from Brigham Young University, all three Society of Professional Journalists trainers in freedom of information. A second handout with the presentation is a pop quiz on Arizona public records. NewsTrain is a training initiative of Associated Press Media Editors (APME). More info: http://bit.ly/NewsTrain
David Cuillier prepared this presentation on making better use of public records for journalists attending APME's Phoenix NewsTrain on April 6-7, 2018. Cuillier is associate professor at and director of the University of Arizona School of Journalism. His seven steps include: 1) Get in a document state of mind. 2) Find the records. 3) Know the law. 4) Order records effectively.
5) Overcome denials. 6) Be unafraid of suing. 7) Just do it! The presentation is accompanied by a 39-page handout of the same name that was produced by Cuillier, Charles N. Davis from the University of Georgia and Joel Campbell from Brigham Young University, all three Society of Professional Journalists trainers in freedom of information. A second handout with the presentation is a pop quiz on Arizona public records. NewsTrain is a training initiative of Associated Press Media Editors (APME). More info: http://bit.ly/NewsTrain
Hate crime (also known as a bias-motivated crime or bias crime)[1] is a prejudice-motivated crime which occurs when a perpetrator targets a victim because of their membership (or perceived membership) of a certain social group or racial demographic.
Examples of such groups can include, and are almost exclusively limited to ethnicity, disability, language, nationality, physical appearance, religion, gender identity or sexual orientation.[2][3][4] Non-criminal actions that are motivated by these reasons are often called "bias incidents".
"Hate crime" generally refers to criminal acts which are seen to have been motivated by bias against one or more of the social groups listed above, or by bias against their derivatives. Incidents may involve physical assault, homicide, damage to property, bullying, harassment, verbal abuse (which includes slurs) or insults, mate crime or offensive graffiti or letters (hate mail).[5]
A hate crime law is a law intended to deter bias-motivated violence.[6] Hate crime laws are distinct from laws against hate speech: hate crime laws enhance the penalties associated with conduct which is already criminal under other laws, while hate speech laws criminalize a category of speech.
This ppt will help u in understanding hate crimes
This presentation offers an overview of the legislative and legal landscape of cyber bullying and sexting. It is meant for attorneys involved in these kinds of cases.
Subtitle: "The Growing Problem of Sexting Among School-Age Children." A presentation delivered to the Catawba County School District on July 28, 2010, in Conover, NC.
17 USC § 107 Limitations on Exclusive Rights – FAIR USE
SLAVERY IN AMERICA - EXPOSING THE UNITED STATES' DESPOTISM Government's PRISON System. . .
This is the 06/19/18 EMAIL sent providing a SYNOPSIS on the 06/18/18 Court Matter – In The Municipal Court Of Washington County, Mississippi – Case No. GP10037737 – Involving Cary Cornelius Johnson who WHITE SUPREMACISTS and/or KKKlan Members are engaging in CRIMINAL Acts, WAR Crimes, etc. in efforts of getting Johnson off of the streets to keep him from EXPOSING the 13TH Amendment PRISON Scams and more being carried out by the UNITED STATES’ DESPOTISM Government Empire – In The STATE OF MISSISSIPPI – In WASHINGTON County, Mississippi – In The CITY OF GREENVILLE, Mississippi.
The 13th Amendment PRISON Scams being OPERATED and RUN in the United States of America are a matter of INTERNATIONAL Interests, because they are a THREAT to Domestic and Foreign Governments (as the Utica International Embassy) and are a THREAT to HOMELAND Security as well as the Rights, Privileges and Immunities of SOVEREIGN Citizens (as Cary Cornelius Johnson).
Such abuses by the United States’ DESPOT’s Nazis and/or WHITE Jews/Zionists/Supremacists are COMMON Terrorist/Racist Attacks that are CRIMES AGAINST HUMANITY, CRIMES AGAINST PEACE, WAR OF AGGRESSION and WAR CRIMES, etc. for which the Utica International Embassy is in a Legal and/or Lawful position to address before the applicable International Tribunals and to seek PROSECUTION as in the NUREMBERG Trials against the United States’ DESPOTISM Government Officials (Executive/Legislative/Judicial) as well as its STATE Government Officials (as in the State of Mississippi), etc.
With Warmest Regards,
UTICA INTERNATIONAL EMBASSY
c/o Interim Prime Minister Vogel Denise Newsome
Post Office Box 31265
Jackson, Mississippi 39286
(888) 700-5056 / (601) 885-3358 / (513) 680-2922
Website: https://uticainternationalembassy.website
Social media is slowly changing the practice of law. Join our panel of experts as they discuss everything from social media in eDiscovery to the challenges of interpreting emoji.
Attendees will learn:
--Best practices for preserving and producing social media evidence in litigation.
--How social media is working its way into the discovery process and how courts are reacting.
--Ethical pitfalls that can arise when dealing with social media.
--How emojis are changing the legal practice today and how they’ll continue to alter the profession in the future.
Hate crime (also known as a bias-motivated crime or bias crime)[1] is a prejudice-motivated crime which occurs when a perpetrator targets a victim because of their membership (or perceived membership) of a certain social group or racial demographic.
Examples of such groups can include, and are almost exclusively limited to ethnicity, disability, language, nationality, physical appearance, religion, gender identity or sexual orientation.[2][3][4] Non-criminal actions that are motivated by these reasons are often called "bias incidents".
"Hate crime" generally refers to criminal acts which are seen to have been motivated by bias against one or more of the social groups listed above, or by bias against their derivatives. Incidents may involve physical assault, homicide, damage to property, bullying, harassment, verbal abuse (which includes slurs) or insults, mate crime or offensive graffiti or letters (hate mail).[5]
A hate crime law is a law intended to deter bias-motivated violence.[6] Hate crime laws are distinct from laws against hate speech: hate crime laws enhance the penalties associated with conduct which is already criminal under other laws, while hate speech laws criminalize a category of speech.
This ppt will help u in understanding hate crimes
This presentation offers an overview of the legislative and legal landscape of cyber bullying and sexting. It is meant for attorneys involved in these kinds of cases.
Subtitle: "The Growing Problem of Sexting Among School-Age Children." A presentation delivered to the Catawba County School District on July 28, 2010, in Conover, NC.
17 USC § 107 Limitations on Exclusive Rights – FAIR USE
SLAVERY IN AMERICA - EXPOSING THE UNITED STATES' DESPOTISM Government's PRISON System. . .
This is the 06/19/18 EMAIL sent providing a SYNOPSIS on the 06/18/18 Court Matter – In The Municipal Court Of Washington County, Mississippi – Case No. GP10037737 – Involving Cary Cornelius Johnson who WHITE SUPREMACISTS and/or KKKlan Members are engaging in CRIMINAL Acts, WAR Crimes, etc. in efforts of getting Johnson off of the streets to keep him from EXPOSING the 13TH Amendment PRISON Scams and more being carried out by the UNITED STATES’ DESPOTISM Government Empire – In The STATE OF MISSISSIPPI – In WASHINGTON County, Mississippi – In The CITY OF GREENVILLE, Mississippi.
The 13th Amendment PRISON Scams being OPERATED and RUN in the United States of America are a matter of INTERNATIONAL Interests, because they are a THREAT to Domestic and Foreign Governments (as the Utica International Embassy) and are a THREAT to HOMELAND Security as well as the Rights, Privileges and Immunities of SOVEREIGN Citizens (as Cary Cornelius Johnson).
Such abuses by the United States’ DESPOT’s Nazis and/or WHITE Jews/Zionists/Supremacists are COMMON Terrorist/Racist Attacks that are CRIMES AGAINST HUMANITY, CRIMES AGAINST PEACE, WAR OF AGGRESSION and WAR CRIMES, etc. for which the Utica International Embassy is in a Legal and/or Lawful position to address before the applicable International Tribunals and to seek PROSECUTION as in the NUREMBERG Trials against the United States’ DESPOTISM Government Officials (Executive/Legislative/Judicial) as well as its STATE Government Officials (as in the State of Mississippi), etc.
With Warmest Regards,
UTICA INTERNATIONAL EMBASSY
c/o Interim Prime Minister Vogel Denise Newsome
Post Office Box 31265
Jackson, Mississippi 39286
(888) 700-5056 / (601) 885-3358 / (513) 680-2922
Website: https://uticainternationalembassy.website
Social media is slowly changing the practice of law. Join our panel of experts as they discuss everything from social media in eDiscovery to the challenges of interpreting emoji.
Attendees will learn:
--Best practices for preserving and producing social media evidence in litigation.
--How social media is working its way into the discovery process and how courts are reacting.
--Ethical pitfalls that can arise when dealing with social media.
--How emojis are changing the legal practice today and how they’ll continue to alter the profession in the future.
How To Act As A Business In A World In Which User Feedback And Reviews Are Cr...Internet Law Center
Presentation to 12th Annual Stanford Law School E-Commerce Best Practices Conference addressing legal and business issues involved in consumer review sites.
Cyber harassment is an issue which can affect any internet user regardless of their age, gender or location. This presentation takes a look at what is cyber harassment using examples from #GamerGate
This presentation was developed as part of Curtin University's Power, politics and the Internet course.
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Brian Markle
Explore the complex underbelly of cyberbullying with Brian Markle Ottawa as we analyse actual incidents and their potential criminal ramifications. Come along on the journey to comprehend the changing strategies, the legal environment, and the psychology of cyber assault. This investigation seeks to shed light on the dark triad of behaviours and reveal the causes and effects of cyberbullying in our community.
Protecting your Members: Combating Online Threats (Credit Union Conference Se...NAFCU Services Corporation
With online technology use on the rise, so is the threat of online attacks that can affect consumer’s smartphones and computers. According to the March 2012 McAfee quarterly report, over 4.5 million computers have been infected worldwide with malware. In order to launch a successful attack, social engineers leverage the vulnerability of online users by accessing their digital footprint. So what can you do to arm your credit union members against cyber security attacks? Follow this presentation and you will learn how to keep your members at bay from these threats and educate them on how to be alert, aware and safe online. For more details: www.nafcu.org/cyveillance
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
Presentation on Cyber Harassment at 2009 Georgetown Law Reunion Weekend.
Some of the rantings made in response to his presentation are the work of Vanessa Kachadurian who is a defendant in a cyber harassment suit currently pending in federal court in Fresno. http://kachadurianlit.wordpress.com/
Frequently Asked Questions on the judgment of the Court
of Justice of the European Union in Case C-311/18 - Data
Protection Commissioner v Facebook Ireland Ltd and
Maximillian Schrems
A 53-count third-superseding indictment (the “Indictment”) was unsealed today in federal court in Brooklyn charging sports marketing executives Hernan Lopez and Carlos Martinez, formerly of 21st Century Fox, Inc. (“Fox”); Gerard Romy, former co-CEO of Spanish media company Imagina Media Audiovisual SL (“Imagina”); and Uruguayan sports marketing company Full Play Group S.A. (“Full Play”) (collectively, the “New Defendants”) with wire fraud, money laundering and related offenses – including, as to Romy and Full Play, racketeering conspiracy – in connection with the government’s long-running investigation and prosecution of corruption in organized soccer.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
Program Materials Excerpt From Lions, Tigers and Friends
1. Lions, Tigers & Friends:
Social Media Case Law Review
Francine Ward, Bennet Kelley, Heather Antoine
The State Bar of California 88th Annual
Meeting | October 8-11, 2015 | Anaheim, CA
2. BENNET KELLEY
Founder of the INTERNET LAW CENTER in Santa Monica
Host of CYBER LAW AND BUSINESS REPORT
Broadcast through Webmaster Radio and Podcast Channels
Nominated for LA Press Club Award for Best Public Affairs Talk Radio Show in 2014
Honors:
Named One of Most Influential Lawyers in Digital Media and
E-Commerce by Los Angeles Business Journal (2014)
Past Co-Chair of the California Bar Cyberspace Committee
Selected By US Dep’t of Commerce to Present on
U.S. E-Commerce Law as part of 2012 U.S.-China Legal Exchange
Website: InternetlLawCenter.net
Blog: ILCCyberReport.wordpress.com
Tw: @InternetLawCent
22
4. • 850,000 victims per year*
• 70 percent of victims were women†
• 60% of reported online harassment
escalated, and over 64% of victims
received threats of offline
harassment‡
• 20 percent of stalkers use social
media to track victims*
*Departmentof Justice
†Working to Halt Online Abuse
‡ National Center for Victims of Crime
5. . . . Speaking from
Experience
You f---ing Kelley .
. .you Kelley, we’re
going to kill you.
VOICEMAIL
7. PROCEDURAL RULING
▪ Threatening Communications
“Whoever transmits in interstate or foreign commerce
any communication containing any threat to kidnap any
person or any threat to injure the person of another,
shall be fined under this title or imprisoned not more
than five years, or both.” (18 U.S.C. § 875(c))
▪ Jury Instruction
Government need prove only that a reasonable person
would regard Elonis’s communications as threats, and
that was error. Federal criminal liability generally does
not turn solely on the results of an act without
considering the defendant’s mental state.
▪ Ruling
“There is no dispute that the mental state requirement
in Section 875(c) is satisfied if the defendant transmits a
communication for the purpose of issuing a threat, or
with knowledge that the communication will be viewed
as a threat.”
8. Harrel v State
Georgia Supreme Court (Oct. 5, 2015)
• Defendants Facebook posts
– threatened to post sex video of court clerk
– gave out clerk’s cell phone number and
urged people to call her to drop
proceedings against him
• He put a dead cat in another person’s
mailbox
• Convicted of threatening court
officer. Georgia Supreme Court
reversed under Virginia v Black, 538
U.S. 343 (2003), since no threat of
bodily harm or death.
He did
what?
Virginia v Black
Intimidation RequiresTrue Threat of Bodily Harm or Death
9.
10. Email to Utah State University re
Anita Sarkeesian Speaking
Appearance
Montreal Massacre style attack will be
carried out Against attendees as well as
students and staff at nearby women’s
center. I have at mydisposal a semi
automatic rifle, multiple pistols, and a
collection of pipe bombs. This will be
the Deadliest School Shooting in
American history.
. . .Plentyof feminist on campus . . .I’m
going tomake sure theydie . . .Anita
sarkeesian . . .Is going to diescreaming
like the craven littlewhore that she is I
will Write mymanifesto inher spilled
blood
Sample Twitter Threats
11. École Polytechnique Massacre, Montreal (Dec. 6, 1989).
Gunman shot 28 people, killing 14 women, before committing suicide. He began entered classrooms, separated the
men and women and then only shot the women since he was “fighting feminism.”
December 6th is now a National Day of Remembrance and Action on Violence Against Women in Canada.
13. Clark Amendment to
Justice Department Appropriations
• The Committee is concerned with the
increased instances of severe harassment,
stalking, and threats transmitted in
interstate commerce in violation of federal
law. These targeted attacks against Internet
users, particularly women, have resulted in
the release of personal information, forced
individuals to flee their homes, has had a
chilling effect on free expression, and are
limiting access to economic opportunity.
• The Committee strongly urges the
Department to intensify its efforts to
combat this destructive abuse and expects
to see increased investigations and
prosecutions of these crimes.
REP. KATHERINE CLARK
(D-MA)
14. 18 U.S.C. § 2261A. Stalking
(1) Stalking Elements
• Traveling in interstate/foreign commerce
• with the intent to kill, injure, harass, intimidate, or place
under surveillance with intent to kill, injure, harass, or
intimidate another person,
• and thereby places that person (or family member,
spouse, partner) in reasonable fear of the death of, or
serious bodily injury or causes or attempts to cause,
substantial emotional distress to a person.
(2) Cyber Stalking Elements
• with the intent to kill, injure, harass, intimidate, or place
under surveillance with intent to kill, injure, harass, or
intimidate another person,
• Uses the mail, any interactive computer service or
electronic communication service or electronic
communication system of interstate commerce, or any
other facility of interstate or foreign commerce
• and thereby places that person (or family member,
spouse, partner) in reasonable fear of the death of, or
serious bodily injury or causes or attempts to cause,
substantial emotional distress to a person.
First Introduced in 1990 by then Sen. Joe Biden
15. United States v. Matusiewicz
No. 13-83, 2015 U.S. Dist. LEXIS 38304 (D. Del. Mar. 26, 2015).
2007
Christine Belford filed for divorce
from David Matusiewicz, he kidnaps
kids and flees to Nicaragua.
2009
Matusiewicz found and convicted of
kidnapping.
He, along with father, mother and
sister commence cyber harassment
campaign through email, websites
and social media alleging child
abuse, mental illness.
2013
Father-in-law kills Belford, her friend
and self in courthouse.
Family indicted for conspiracy,
stalking and cyberstalking under
VAWA.
First case of charge involving
cyberstalking resulting in death and
conspiracy to cyberstalk.
16. Court Rejects Motion to Dismiss
• “There is one unifying theme to the circuit court decisions that have
rejected First Amendment challenges to cyberstalking prosecutions: in
each, it would be difficult to conceive of a legitimate purpose behind the
speech in question. . . . Turning to the indictment here, I have no trouble
finding that much of the speech alleged in this case could be defamation,
and therefore is not protected by the First Amendment.”
• In July 2015, Matusiewicz, along with his mother and sister, were convicted
and could face up to life in prison.
17. US v. Sergentakis
2015 U.S. Dist. LEXIS 777 (S.D..Y. June 15, 2015).
2006
Sergentakis, ran non-profit’s graphics department and pled guilty to bribery/mail fraud from kickback
scheme with charity’s vendors. Charity’s then-CFO provided assistance to law enforcement.
2007
Begins online harassment campaign that includes Facebook and websites alleging victim was a
pedophile, beat his wife, abused animals, misused charity funds and had been arrested.
2015
Indicted for witness retaliation (18 U.S.C. § 1513(e)) and cyberstalking (18 U.S.C. § 2261A(2)).
Court rejects First Amendment challenge in motion to dismiss.
“Any expressive aspects of [the defendant’s websites, letters, and emails described herein] were not
protected under the First Amendment because they were integral to criminal conduct in intentionally
harassing, intimidating or causing substantial emotional distress to” the defendant.
18. Commonwealth v Johnson
21 N.E. 3d 937 (Mass. 2014)
• Escalating campaign of
harassment by neighbor
• “Where the sole purpose of the
defendants’ speech was to
further their endeavor to
intentionally harass the Lyonses,
such speech is not protected by
the First Amendment.”
• “. . . .The defendants cannot
launder their harassment of the
Lyons family through the
Internet to escape liability.”
• $4.8M Awarded in Civil Case in
May 2015
19. facebook
Vincent Gambini
@YoutsLaw
Still looking for good Chinese food in Alabama.
Bensonhurst, NY
Wall Photos Boxes Logout
Frank Galvin @Verdict
A good suit beats preparation.
Expand
Ally McB @McBealSt
@Verdict As long as you keep it short. ;)
Atticus Finch @Mockingbird
Anybody read any good books lately?
Expand
Justice Clarence Thomas @JusticeCT
Expand
Internet Law Center @InternetLawCent
Hope you are enjoying the presentation. Follow our radio show
@CyberLawRadio.
335 TWEETS
988 FOLLOWING
1,256 FOLLOWERS
TweetsTweets
Following
Followers
Favorites
Lists
Recent Images
20. 96%
33%
8%
10%
0% 20% 40% 60% 80% 100% 120%
LinkedIn
Facebook
Blog
Twitter
Lawyers and Social Media
Percentage of Lawyers Using
Source: ABA
21. Recent Ethics Opinions
• New York Guidelines
The New York State Bar Association
has issued a 33-page Social Media
Ethics Guideline.
• Blogging
Attorney blog content is subject to
state legal ethics and advertising rules
if it communicates the attorney’s
availability to provide legal services,
and/or invites readers to hire the
attorney, either explicitly or through a
description of the lawyer’s services,
case results, or a combination of the
two. CA Proposed Opinion 12-0006
(2015)
22. Recent Ethics Opinions - 2
• Social Media “Clean Up”
Multiple jurisdictions have addressed
removing social media content and/or
changing privacy settings. Generally
permissible as long as no spoliation of
evidence. FL Bar Advisory Opinion 14-1
(2015)
• Client Criticism
May not disclose confidential client
information solely to respond to a former
client’s criticism of the lawyer posted on a
lawyer-rating website. NY State Bar Opinion
1032 (2014)
• Juror’s
May review internet presence but may not
communicate via social media. ABA Formal
Opinion 466 (2014).
24. A Streetcar Named Disbarred
• Louisiana Supreme Court: Improper to challenge judicial decisions by
social media rather than appeal process.
• Social media campaign not protected under First Amendment since it
was orchestrated to “inflame the public sensibility for the sole
purpose of influencing this Court and the judges presiding over the
pending litigation. As such it most assuredly threatened the
independence and integrity of the courts in the underlying sealed
domestic matters. Moreover, the testimony irrefutably establishes
both presiding judges perceived the campaign as a threat to their
personal security and as an attempt to intimidate and harass them
into ruling as the petitioners wanted.”
• Wide spread dissemination coupled with “her complete lack of
remorse and admitted refusal to simply allow our system of review to
work without seeking outside interference, respondent’s misconduct
reflects a horrifying lack of respect for the dignity, impartiality, and
authority of our courts and our judicial process as a whole.”
• Respondent’s social media campaign conducted outside the sealed
realm of the underlying judicial proceedings constitutes, in our view,
an intolerable disservice to these traditions and our judicial system,
which the constraints of our rules of professional conduct seek to
safeguard against. Accordingly, we find her ethical misconduct
warrants the highest of sanction—disbarment