SlideShare a Scribd company logo
Protecting assets on social media
The example of         trademarks

    University of Strathclyde, Center for Internet Law and Policy,
                            March 1, 2012


                        Cédric Manara, PhD
           EDHEC Business School / LegalEDHEC Research Center
                       <www.cedricmanara.com>
Observation #0
 France: 3rd State in the world for the
  number of trademark registrations




                Uderzo & Goscinny, Fish fight
3
4
Do not buy this car ; you will
get into trouble ; the day after I
got it: broken carter pissing
oil, gearshift always going
back in neutral, etc. ; and as a
bonus, a seller of bad faith



                5
Nanterre court of first instance,
        February 9, 1979
 Is it lawful to criticize a company with
  posters?
 Court ordered the removal of posters
  • One cannot generalize from a specific
    situation that all cars of the same model have
    problems
 … but court observes that it is not
  forbidden to post the rest of the message
  • A consumer can publicly reveal facts putting
    posters on a car

                         6
7
8
9
10
11
Observation #1
 Costs to criticize or disparage brands have
  decreased




                      12
Surveillance tools




        13
14
Observation #2
 Firms have hyper acuteness on how their
  trademarks are used by third parties




                     15
Paris Court of
First Instance,
April 30, 2008,
H2EPS /
Google




                  16
Observation #3
 Actions to protect trademarks / brand
  image on social media are increasing

 Empirical observation: success is relative




                      17
Research question
 Consumers express negative opinions or
  feelings on social media
 Brand image/value crumbling risk
 Efficiency of legal tools to protect
  trademark?




                    18
"Social media" ?
 “a group of Internet-based applications
  that build on the ideological and
  technological foundations of Web 2.0, and
  that allow the creation and exchange
  of user-generated content” – Kaplan &
 Haenlein, 2010




                     19
Outline
 Empirical study of
  • Social media ToS [1]
  • Cease & desist letters [2]
  • Caselaw [3]
 Findings / Managerial implications [4]




                         20
1. Social media Terms of Service
 Are they an efficient tool to protect
  brands?

 Sample of 10 social media




                        21
ToS in practice
 youtube.com/apple – March 21, 2009 :
  "squat"
 Today:




                    22
Diverging policies [1]




          23
Diverging policies [2]




          24
Exorbitant provisions
 Most of the ToS expressly forbid the use a
  of a third party trademark
  • or any behavior which may violate third
    parties rights


 ToS often go beyond legal provisions



                        26
Provisions sometimes vague


 “It is often difficult to tell what may or may
  not be trademarked”
 “However, use of designer logos and
  brand names without permission, such as
  Gucci, Nike, Louis Vuiton [sic !], etc., is
  usually not acceptable”


                        27
Social media police
 Twitter [internal source]
  • 10,000 notifications / month
  • 24 people
 Facebook
  • ~30 lawyers (mainly working on patents)




                         28
ToS  Leverage effect
 For trademark protection
 … but also for consequences of an action




                     29
‘Spillover effect’
 A Facebook group was using this logo:




 NorthwesTel complained to Facebook

                     30
"... Linda Hillier March 7 at 8:56pm
Hi George,
I had to take your photo down because I received this notice: "We have removed or disabled access to the following
content that you have posted on Facebook because we received a notice from a third party that the content infringes or
otherwise violates their rights:
[Main page image:"Northwestel abuses yukoners, and exploits its monopoly"]
We strongly encourage you to review the content you have posted to Facebook to make sure that you have not posted
any other infringing content, as it is our policy to terminate the accounts of repeat infringers when appropriate.
If you believe that we have made a mistake in removing this content, then please visit
http://www.facebook.com/help/?page=1108 for more information."
This is the info from the page it leads to: "We have removed or disabled access to content that you posted to Facebook
because we received a notice from a third party that it infringes or otherwise violates their rights. If you believe that we
have made a mistake in removing this content, you are not obligated to respond, but if you wish to follow up, you can
contact us at ip@facebook.com.
If we have also disabled your Facebook account, possible reasons include, but are not restricted to:
• Repeated infringing behavior after receiving one or more warnings from Facebook
• Alleged trademark infringement
• Impersonation of an entity
• Misrepresentation of identity - Facebook profiles are meant to represent a single individual. Groups, clubs, businesses
and other types of organizations are not permitted to maintain an account.
For more information, please visit our Intellectual Property Help Center page."
I had to acknowledge the notice in order to proceed. I am not willing to put my Facebook account on the line for this photo,
but you mentioned that you would be willing to fight with them. Please feel free all of the information is above, including an
email address you can forward your complaint to.
Thanks!
Linda..."




                                                         32
Proposal for a Council Framework Decision amending
Framework Decision 2002/475/JHA on combating terrorism -
        Impact Assessment {COM(2007) 650 final}

 “when a website is successfully removed
  from a host server, it reappears very easily
  under another name”




                           33
"Streisand Effect"
 Any attempt to remove something online
  leads to publication at a larger scale



 Less visible when it comes to trademarks
  • Less sensitive content




                        34
2. Cease & desist letters
 Study of 394 notices [Oct. 2004 – Dec. 2010]




                         35
Fate of a disputed content after a
       C & D letter is sent?
 Effective in 90% of the cases
   • 10% of the content stays online…

 (100 % republished on ChillingEffects)
 99.2 % republished elsewhere




                             36
Unicorn




          37
3. Caselaw
 Study of ~200 decisions
  • 25 relevant
 Success of brand owners in
  33% of the cases (!)
  • Removal of the disputed content




                       38
First findings
 Limited efficiency of „traditional‟ legal tools
  • Apparent efficiency of ToS
  • Possible undesired effect of C & D
  • Low success rate of lawsuits




                        39
Mix between marketing & legal tools
                                       Excessive use of legal tools



         •Brand image crumbling by lack of                        •Possible acceleration of viral
         maintenance                                              negative effect
         •Acceleration of viral negative                          •Possible hostile reaction of
         effect                                                   consumers which may crumble
                                                                  brand image


                                                                          Excessive use of marketing tools
Insufficient use of marketing tools


         •Loss of right on the trademark                         •Loss of right on the trademark
         •Brand image erosion by lack of                         •Non transparent advertising
         maintenance                                             •Hostile reaction of consumers
                                                                 which may weaken brand image



                                      Insufficient use of legal tools
CRITERION                               ASSESSMENT ELEMENTS
                                    Avatar in a virtual world / How it behaves / Substantiated
         Content nature             blog post / Comment on a blog / Discussion about a
                                    Wikipedia article / Facebook group / Parodic video…
                                    Use of a sign identical to a TM? / Similar? / TM parody? /
  Intrinsic nature of the content   Opinion expressed in a subjective form? Tone? /
                                    Obvious bad faith of the author?
   Contextual analysis of the       Visibility on open search tools? / On closed search tools
    content in relation to the      (FB)? / Sociology of participants to a discussion or a
       trademark target             group? / Their psychology? / Their number?

Social media policy with respect    Do ToS have specific provisions regarding the use of
  to trademark infringement         third parties TM? What are the usual practices of this
                                    social media?
                                    Is it a regular client regular? / occasional? / prospective?
 Person who posted the content      / A competitor? / Is this person influent?
Strategic importance of the social Sociology of the social media users / Main interests of its
             media                 members / Geographic scope / Intrinsic power
                                    Lasting impact on the brand image? / Alleged
          Content effect
                                    dangerousness of a product? / Effect on stocks price?

                                              41
Research limits
 Geographic
  • Legal grounds
  • Social media
 Temporal
 Data availability
  • on actual social media practices
  • on actual firms practices


                        42
Future research
 Renew the study in n years
 Autoregulation / Governance of social
  media
 Pluridisciplinary study




                     43

More Related Content

Similar to Protecting assets on social media. The example of trademarks

Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?
Cedric Manara
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
Endcode_org
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
Marc Vael
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
iohann Le Frapper
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
"What General Counsel Need to Know About Protecting Their Company's Trademark...
"What General Counsel Need to Know About Protecting Their Company's Trademark..."What General Counsel Need to Know About Protecting Their Company's Trademark...
"What General Counsel Need to Know About Protecting Their Company's Trademark...Dinsmore & Shohl LLP
 
Meltwater Buzz: Social Media Monitoring
Meltwater Buzz: Social Media MonitoringMeltwater Buzz: Social Media Monitoring
Meltwater Buzz: Social Media MonitoringMeltwater Group
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)
Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)
Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)Frankfurt Kurnit Klein + Selz PC
 
Ceramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social MediaCeramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social Media
Jeff Risley
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social Media Reputation Management
Social Media Reputation ManagementSocial Media Reputation Management
Social Media Reputation Management
smibevents
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling Online
Rob Blamires
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
famudal
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
lorrainefleck
 
Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11
smahboobani
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
Pod Legal
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy termsCOMP 113
 
Deloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationsDeloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerations
kamalesl
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
ESI Attorneys LLC
 

Similar to Protecting assets on social media. The example of trademarks (20)

Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
"What General Counsel Need to Know About Protecting Their Company's Trademark...
"What General Counsel Need to Know About Protecting Their Company's Trademark..."What General Counsel Need to Know About Protecting Their Company's Trademark...
"What General Counsel Need to Know About Protecting Their Company's Trademark...
 
Meltwater Buzz: Social Media Monitoring
Meltwater Buzz: Social Media MonitoringMeltwater Buzz: Social Media Monitoring
Meltwater Buzz: Social Media Monitoring
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)
Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)
Hot Topics in Digital Advertising – Guidance for In-house Counsel (Part 1)
 
Ceramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social MediaCeramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social Media
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social media-assessment
 
Social Media Reputation Management
Social Media Reputation ManagementSocial Media Reputation Management
Social Media Reputation Management
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling Online
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
 
Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy terms
 
Deloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationsDeloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerations
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 

More from Cedric Manara

Brève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneBrève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligne
Cedric Manara
 
Les noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetLes noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internet
Cedric Manara
 
Propriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxPropriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociaux
Cedric Manara
 
Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)
Cedric Manara
 
Exception pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuException pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeu
Cedric Manara
 
Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?
Cedric Manara
 
Droit des marques & Big Data
Droit des marques & Big DataDroit des marques & Big Data
Droit des marques & Big Data
Cedric Manara
 
Attaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineAttaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti online
Cedric Manara
 
Les enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursLes enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheurs
Cedric Manara
 
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementSites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
Cedric Manara
 
Enseigner le droit en anglais en France
Enseigner le droit en anglais en FranceEnseigner le droit en anglais en France
Enseigner le droit en anglais en France
Cedric Manara
 
Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?
Cedric Manara
 
Les noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeLes noms de domaine après la fin du monde
Les noms de domaine après la fin du monde
Cedric Manara
 
L'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàL'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delà
Cedric Manara
 
Sexe, internet et droit
Sexe, internet et droitSexe, internet et droit
Sexe, internet et droit
Cedric Manara
 
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Cedric Manara
 
Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche
Cedric Manara
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?
Cedric Manara
 
Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012
Cedric Manara
 
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deComparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
Cedric Manara
 

More from Cedric Manara (20)

Brève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneBrève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligne
 
Les noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetLes noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internet
 
Propriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxPropriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociaux
 
Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)
 
Exception pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuException pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeu
 
Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?
 
Droit des marques & Big Data
Droit des marques & Big DataDroit des marques & Big Data
Droit des marques & Big Data
 
Attaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineAttaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti online
 
Les enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursLes enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheurs
 
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementSites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
 
Enseigner le droit en anglais en France
Enseigner le droit en anglais en FranceEnseigner le droit en anglais en France
Enseigner le droit en anglais en France
 
Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?
 
Les noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeLes noms de domaine après la fin du monde
Les noms de domaine après la fin du monde
 
L'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàL'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delà
 
Sexe, internet et droit
Sexe, internet et droitSexe, internet et droit
Sexe, internet et droit
 
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
 
Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?
 
Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012
 
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deComparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Protecting assets on social media. The example of trademarks

  • 1. Protecting assets on social media The example of trademarks University of Strathclyde, Center for Internet Law and Policy, March 1, 2012 Cédric Manara, PhD EDHEC Business School / LegalEDHEC Research Center <www.cedricmanara.com>
  • 2. Observation #0  France: 3rd State in the world for the number of trademark registrations Uderzo & Goscinny, Fish fight
  • 3. 3
  • 4. 4
  • 5. Do not buy this car ; you will get into trouble ; the day after I got it: broken carter pissing oil, gearshift always going back in neutral, etc. ; and as a bonus, a seller of bad faith 5
  • 6. Nanterre court of first instance, February 9, 1979  Is it lawful to criticize a company with posters?  Court ordered the removal of posters • One cannot generalize from a specific situation that all cars of the same model have problems  … but court observes that it is not forbidden to post the rest of the message • A consumer can publicly reveal facts putting posters on a car 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. Observation #1  Costs to criticize or disparage brands have decreased 12
  • 14. 14
  • 15. Observation #2  Firms have hyper acuteness on how their trademarks are used by third parties 15
  • 16. Paris Court of First Instance, April 30, 2008, H2EPS / Google 16
  • 17. Observation #3  Actions to protect trademarks / brand image on social media are increasing  Empirical observation: success is relative 17
  • 18. Research question  Consumers express negative opinions or feelings on social media  Brand image/value crumbling risk  Efficiency of legal tools to protect trademark? 18
  • 19. "Social media" ?  “a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content” – Kaplan & Haenlein, 2010 19
  • 20. Outline  Empirical study of • Social media ToS [1] • Cease & desist letters [2] • Caselaw [3]  Findings / Managerial implications [4] 20
  • 21. 1. Social media Terms of Service  Are they an efficient tool to protect brands?  Sample of 10 social media 21
  • 22. ToS in practice  youtube.com/apple – March 21, 2009 : "squat"  Today: 22
  • 25.
  • 26. Exorbitant provisions  Most of the ToS expressly forbid the use a of a third party trademark • or any behavior which may violate third parties rights  ToS often go beyond legal provisions 26
  • 27. Provisions sometimes vague  “It is often difficult to tell what may or may not be trademarked”  “However, use of designer logos and brand names without permission, such as Gucci, Nike, Louis Vuiton [sic !], etc., is usually not acceptable” 27
  • 28. Social media police  Twitter [internal source] • 10,000 notifications / month • 24 people  Facebook • ~30 lawyers (mainly working on patents) 28
  • 29. ToS  Leverage effect  For trademark protection  … but also for consequences of an action 29
  • 30. ‘Spillover effect’  A Facebook group was using this logo:  NorthwesTel complained to Facebook 30
  • 31.
  • 32. "... Linda Hillier March 7 at 8:56pm Hi George, I had to take your photo down because I received this notice: "We have removed or disabled access to the following content that you have posted on Facebook because we received a notice from a third party that the content infringes or otherwise violates their rights: [Main page image:"Northwestel abuses yukoners, and exploits its monopoly"] We strongly encourage you to review the content you have posted to Facebook to make sure that you have not posted any other infringing content, as it is our policy to terminate the accounts of repeat infringers when appropriate. If you believe that we have made a mistake in removing this content, then please visit http://www.facebook.com/help/?page=1108 for more information." This is the info from the page it leads to: "We have removed or disabled access to content that you posted to Facebook because we received a notice from a third party that it infringes or otherwise violates their rights. If you believe that we have made a mistake in removing this content, you are not obligated to respond, but if you wish to follow up, you can contact us at ip@facebook.com. If we have also disabled your Facebook account, possible reasons include, but are not restricted to: • Repeated infringing behavior after receiving one or more warnings from Facebook • Alleged trademark infringement • Impersonation of an entity • Misrepresentation of identity - Facebook profiles are meant to represent a single individual. Groups, clubs, businesses and other types of organizations are not permitted to maintain an account. For more information, please visit our Intellectual Property Help Center page." I had to acknowledge the notice in order to proceed. I am not willing to put my Facebook account on the line for this photo, but you mentioned that you would be willing to fight with them. Please feel free all of the information is above, including an email address you can forward your complaint to. Thanks! Linda..." 32
  • 33. Proposal for a Council Framework Decision amending Framework Decision 2002/475/JHA on combating terrorism - Impact Assessment {COM(2007) 650 final}  “when a website is successfully removed from a host server, it reappears very easily under another name” 33
  • 34. "Streisand Effect"  Any attempt to remove something online leads to publication at a larger scale  Less visible when it comes to trademarks • Less sensitive content 34
  • 35. 2. Cease & desist letters  Study of 394 notices [Oct. 2004 – Dec. 2010] 35
  • 36. Fate of a disputed content after a C & D letter is sent?  Effective in 90% of the cases • 10% of the content stays online…  (100 % republished on ChillingEffects)  99.2 % republished elsewhere 36
  • 37. Unicorn 37
  • 38. 3. Caselaw  Study of ~200 decisions • 25 relevant  Success of brand owners in 33% of the cases (!) • Removal of the disputed content 38
  • 39. First findings  Limited efficiency of „traditional‟ legal tools • Apparent efficiency of ToS • Possible undesired effect of C & D • Low success rate of lawsuits 39
  • 40. Mix between marketing & legal tools Excessive use of legal tools •Brand image crumbling by lack of •Possible acceleration of viral maintenance negative effect •Acceleration of viral negative •Possible hostile reaction of effect consumers which may crumble brand image Excessive use of marketing tools Insufficient use of marketing tools •Loss of right on the trademark •Loss of right on the trademark •Brand image erosion by lack of •Non transparent advertising maintenance •Hostile reaction of consumers which may weaken brand image Insufficient use of legal tools
  • 41. CRITERION ASSESSMENT ELEMENTS Avatar in a virtual world / How it behaves / Substantiated Content nature blog post / Comment on a blog / Discussion about a Wikipedia article / Facebook group / Parodic video… Use of a sign identical to a TM? / Similar? / TM parody? / Intrinsic nature of the content Opinion expressed in a subjective form? Tone? / Obvious bad faith of the author? Contextual analysis of the Visibility on open search tools? / On closed search tools content in relation to the (FB)? / Sociology of participants to a discussion or a trademark target group? / Their psychology? / Their number? Social media policy with respect Do ToS have specific provisions regarding the use of to trademark infringement third parties TM? What are the usual practices of this social media? Is it a regular client regular? / occasional? / prospective? Person who posted the content / A competitor? / Is this person influent? Strategic importance of the social Sociology of the social media users / Main interests of its media members / Geographic scope / Intrinsic power Lasting impact on the brand image? / Alleged Content effect dangerousness of a product? / Effect on stocks price? 41
  • 42. Research limits  Geographic • Legal grounds • Social media  Temporal  Data availability • on actual social media practices • on actual firms practices 42
  • 43. Future research  Renew the study in n years  Autoregulation / Governance of social media  Pluridisciplinary study 43