Presentation of a paper co-authored with Christophe Roquilly on the protection of brand image on social media, University of Strathclyde, Center for Internet Law and Policy, March 1, 2012
Visual Resources Association Annual Conference
March 27-30, 2018, Philadelphia
Session: The Brave New Media of Visual Resources: Managing Intellectual Property Rights on the Frontier
Presenter: Lael Ensor-Bennett, Assistant Curator, Johns Hopkins University
Workshop Mesh up Presentation of the Alumni Portal Deutschland in Jakarta. Almost all slides originate from Slideshare.com. Please see the last chart for links to the presentations I used. Anybody should read the original documents to get the whole story. Thanks to all the brilliant people out there, who published their presentations on slideshare.com.
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
An updated version of my previous presentation, providing some social media basics, an overview of intellectual property issues in the use of social media for marketing, and ethics/professional responsibility concerns for attorneys utilizing social media to market themselves
Revisiting enterprise social media risks; managing risks from an enterprise perspective, when companies and their employees venture into social media and networking. Delivered at the IAPP Global Privacy Summit (Washington DC) on April 20 and 21, 2010.
Visual Resources Association Annual Conference
March 27-30, 2018, Philadelphia
Session: The Brave New Media of Visual Resources: Managing Intellectual Property Rights on the Frontier
Presenter: Lael Ensor-Bennett, Assistant Curator, Johns Hopkins University
Workshop Mesh up Presentation of the Alumni Portal Deutschland in Jakarta. Almost all slides originate from Slideshare.com. Please see the last chart for links to the presentations I used. Anybody should read the original documents to get the whole story. Thanks to all the brilliant people out there, who published their presentations on slideshare.com.
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
An updated version of my previous presentation, providing some social media basics, an overview of intellectual property issues in the use of social media for marketing, and ethics/professional responsibility concerns for attorneys utilizing social media to market themselves
Revisiting enterprise social media risks; managing risks from an enterprise perspective, when companies and their employees venture into social media and networking. Delivered at the IAPP Global Privacy Summit (Washington DC) on April 20 and 21, 2010.
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...lorrainefleck
Presentation to the inaugural lawTechcamp on key elements for social media policies. For a more in-depth discussion on key elements for social media policies, please see my June 7, 2011 presentation to the MyCharityConnects 2011 with the same title.
Final fleck law techcamp 2011_social media_jun 18 11smahboobani
Social media has revolutionized marketing and how businesses can promote their brands. While social media presents a novel marketing channel, as with any innovation, there are risks. A comprehensive social media policy can assist businesses in managing risk exposure from using social media by addressing key issues such as privacy and intellectual property law. This presentation will address and provide practical tips on risk management in social media by addressing why social media policies matter, and the key issues that a social media policy should address.
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
Les noms des personnes publiques en droit de l'internetCedric Manara
Intervention lors du colloque "Le nom. Aspects de droit administratif", Faculté de droit de Grenoble, 20 mars 2015 (http://www.idpsp.univ-rennes1.fr/digitalAssets/319/319463_Nomprogramme.pdf),
More Related Content
Similar to Protecting assets on social media. The example of trademarks
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...lorrainefleck
Presentation to the inaugural lawTechcamp on key elements for social media policies. For a more in-depth discussion on key elements for social media policies, please see my June 7, 2011 presentation to the MyCharityConnects 2011 with the same title.
Final fleck law techcamp 2011_social media_jun 18 11smahboobani
Social media has revolutionized marketing and how businesses can promote their brands. While social media presents a novel marketing channel, as with any innovation, there are risks. A comprehensive social media policy can assist businesses in managing risk exposure from using social media by addressing key issues such as privacy and intellectual property law. This presentation will address and provide practical tips on risk management in social media by addressing why social media policies matter, and the key issues that a social media policy should address.
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
Similar to Protecting assets on social media. The example of trademarks (20)
Les noms des personnes publiques en droit de l'internetCedric Manara
Intervention lors du colloque "Le nom. Aspects de droit administratif", Faculté de droit de Grenoble, 20 mars 2015 (http://www.idpsp.univ-rennes1.fr/digitalAssets/319/319463_Nomprogramme.pdf),
Exception pedagogique : le e learning hors-jeuCedric Manara
Présentation faite à Lyon lors des journées internationales du e-learning, sur l'inadaptation de l'exception pédagogique.
Vidéo ici : http://www.journees-elearning.com/index.php/edition-2012/les-videos-des-conferences/e-learning-hors-jeu
Dirigeants : comment gerer sa reputation en ligne ?Cedric Manara
"Your brand is not what you say it is, it is what Google says it is". Fait en 2009 à propos des marques, ce constat est aussi valable pour les dirigeants ! Chasseurs de têtes, partenaires commerciaux, collaborateurs actuels ou futurs… se font une idée de la réputation d’un manager au travers des outils de recherche et des réseaux sociaux.
Comment Facebook, YouTube ou Twitter transforment-ils la perception que l’on a d’un chef d’entreprise… ou d’un candidat à ce poste ? Comment se forme l’identité numérique d’un dirigeant en fonction de ce qu’il publie, ou de ce que l’on écrit sur lui ? La réputation numérique d’un manager peut-elle rejaillir sur l’entreprise qu’il représente ? Jusqu’à quel point doit-il se soucier de son image en ligne et de quels outils dispose-t-il pour agir ou réagir ?
Présentation faite le 14 juin 2013 à Paris (EDHEC Management Institute)
Explication du phénomène Big Data et son impact possible sur le métier de juriste (en particulier en droit des marques) et la création de nouveaux services
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineCedric Manara
Presentazione di questo articolo: http://professoral.edhec.com/recherche/publications-edhec/2012/attaccare-le-forniture-di-denaro-per-combattere-i-contenuti-illeciti-online--183336.kjsp
Les enjeux de la e-reputation pour les enseignants-chercheursCedric Manara
L'enseignant-chercheur est une personnalité publique : il est connu de ses étudiants, de ses pairs, du grand public... Ses activités suscitent la critique, classiquement dans les revues spécialisées, plus récemment sur les réseaux sociaux. On assiste à la création de groupes Facebook d'élèves se moquant d'un prof, les conférences font l'objet de tweets désapprobateurs, des blogs négatifs concurrencent les plaquettes de ses formations, etc. En d'autres termes, la critique a quitté l'espace universitaire (revues et campus) pour se développer, sous des formes plus ou moins sournoises, sur internet, notamment les réseaux sociaux. Quels sont les effets de ce glissement progressif ? Y a-t-il des risques pour les enseignants-chercheurs ? Certains sont-ils plus exposés que d'autres ? Faut-il investir ces nouveaux espaces électroniques et, si oui, comment ?
(intervention à l'Université de Paris-Dauphine, Centre d'Ingénierie Pédagogique, 26 mars 2013)
Sites de distribution illégale, noms de domaine et intermédiaires de paiementCedric Manara
Intervention faite lors du colloque "Droit d'auteur et numérique : l'HADOPI et après ?", 14 février 2013, Paris (CEJEM)
Création de l'affiche figurant en page de garde : Caroline Laverdet
L'exception culturelle : acte 2 et au-delàCedric Manara
Synthèse de la journée annuelle Cyberlex du 3 décembre 2012. Diapos réalisées "en direct" pendant l'après-midi pour résumer les propos des intervenants. Elles ne reflètent toutefois pas, malheureusement, la richesse des points de vue et la complexité des questions !
Conférence donnée dans le cadre du parrainage de la promotion sortante du Magistère Droit des TIC de Poitiers (16 novembre 2012).
Revisiter l'histoire du droit de l'internet sous cet angle particulier montre à quel point la régulation des contenus "adultes" a un effet miroir sur la régulation de l'internet tout entier.
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Cedric Manara
Diapositives utilisées pour la présentation de l'étude du même nom, présentée à l'EDHEC Business School le 13 novembre 2012 et prochainement disponible en ligne ici : http://professoral.edhec.com/recherche/publications-edhec/par-type-de-publication/les-publications-des-poles-de-recherche-edhec-position-papers-73517.kjsp#.UKJeEYe7PoI
Droit des marques et referencement sur les moteurs de recherche Cedric Manara
Journée d'actualité du droit des marques (LexisNexis), organisée le 16 octobre 2012.
Extrait des diapositives utilisées pour mon intervention relative aux problèmes juridiques posés par le référencement (payant ou naturel) en droit des marques.
Internet Intermediaries - Does one definition fit all ?Cedric Manara
The expression 'internet intermediary' is broadly used to describe operators offering various services on the Internet. However, these services can differ considerably and depending on the specific service offered, the operator may be more or less actively involved in treating data. During this WIPO conference, I was invited to describe some of the existing forms of internet intermediaries, to what extent they actively or passively handle data and how this potentially impacts on trademark rights.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Essentials of Automations: The Art of Triggers and Actions in FME
Protecting assets on social media. The example of trademarks
1. Protecting assets on social media
The example of trademarks
University of Strathclyde, Center for Internet Law and Policy,
March 1, 2012
Cédric Manara, PhD
EDHEC Business School / LegalEDHEC Research Center
<www.cedricmanara.com>
2. Observation #0
France: 3rd State in the world for the
number of trademark registrations
Uderzo & Goscinny, Fish fight
5. Do not buy this car ; you will
get into trouble ; the day after I
got it: broken carter pissing
oil, gearshift always going
back in neutral, etc. ; and as a
bonus, a seller of bad faith
5
6. Nanterre court of first instance,
February 9, 1979
Is it lawful to criticize a company with
posters?
Court ordered the removal of posters
• One cannot generalize from a specific
situation that all cars of the same model have
problems
… but court observes that it is not
forbidden to post the rest of the message
• A consumer can publicly reveal facts putting
posters on a car
6
17. Observation #3
Actions to protect trademarks / brand
image on social media are increasing
Empirical observation: success is relative
17
18. Research question
Consumers express negative opinions or
feelings on social media
Brand image/value crumbling risk
Efficiency of legal tools to protect
trademark?
18
19. "Social media" ?
“a group of Internet-based applications
that build on the ideological and
technological foundations of Web 2.0, and
that allow the creation and exchange
of user-generated content” – Kaplan &
Haenlein, 2010
19
20. Outline
Empirical study of
• Social media ToS [1]
• Cease & desist letters [2]
• Caselaw [3]
Findings / Managerial implications [4]
20
21. 1. Social media Terms of Service
Are they an efficient tool to protect
brands?
Sample of 10 social media
21
22. ToS in practice
youtube.com/apple – March 21, 2009 :
"squat"
Today:
22
26. Exorbitant provisions
Most of the ToS expressly forbid the use a
of a third party trademark
• or any behavior which may violate third
parties rights
ToS often go beyond legal provisions
26
27. Provisions sometimes vague
“It is often difficult to tell what may or may
not be trademarked”
“However, use of designer logos and
brand names without permission, such as
Gucci, Nike, Louis Vuiton [sic !], etc., is
usually not acceptable”
27
28. Social media police
Twitter [internal source]
• 10,000 notifications / month
• 24 people
Facebook
• ~30 lawyers (mainly working on patents)
28
29. ToS Leverage effect
For trademark protection
… but also for consequences of an action
29
30. ‘Spillover effect’
A Facebook group was using this logo:
NorthwesTel complained to Facebook
30
31.
32. "... Linda Hillier March 7 at 8:56pm
Hi George,
I had to take your photo down because I received this notice: "We have removed or disabled access to the following
content that you have posted on Facebook because we received a notice from a third party that the content infringes or
otherwise violates their rights:
[Main page image:"Northwestel abuses yukoners, and exploits its monopoly"]
We strongly encourage you to review the content you have posted to Facebook to make sure that you have not posted
any other infringing content, as it is our policy to terminate the accounts of repeat infringers when appropriate.
If you believe that we have made a mistake in removing this content, then please visit
http://www.facebook.com/help/?page=1108 for more information."
This is the info from the page it leads to: "We have removed or disabled access to content that you posted to Facebook
because we received a notice from a third party that it infringes or otherwise violates their rights. If you believe that we
have made a mistake in removing this content, you are not obligated to respond, but if you wish to follow up, you can
contact us at ip@facebook.com.
If we have also disabled your Facebook account, possible reasons include, but are not restricted to:
• Repeated infringing behavior after receiving one or more warnings from Facebook
• Alleged trademark infringement
• Impersonation of an entity
• Misrepresentation of identity - Facebook profiles are meant to represent a single individual. Groups, clubs, businesses
and other types of organizations are not permitted to maintain an account.
For more information, please visit our Intellectual Property Help Center page."
I had to acknowledge the notice in order to proceed. I am not willing to put my Facebook account on the line for this photo,
but you mentioned that you would be willing to fight with them. Please feel free all of the information is above, including an
email address you can forward your complaint to.
Thanks!
Linda..."
32
33. Proposal for a Council Framework Decision amending
Framework Decision 2002/475/JHA on combating terrorism -
Impact Assessment {COM(2007) 650 final}
“when a website is successfully removed
from a host server, it reappears very easily
under another name”
33
34. "Streisand Effect"
Any attempt to remove something online
leads to publication at a larger scale
Less visible when it comes to trademarks
• Less sensitive content
34
35. 2. Cease & desist letters
Study of 394 notices [Oct. 2004 – Dec. 2010]
35
36. Fate of a disputed content after a
C & D letter is sent?
Effective in 90% of the cases
• 10% of the content stays online…
(100 % republished on ChillingEffects)
99.2 % republished elsewhere
36
38. 3. Caselaw
Study of ~200 decisions
• 25 relevant
Success of brand owners in
33% of the cases (!)
• Removal of the disputed content
38
39. First findings
Limited efficiency of „traditional‟ legal tools
• Apparent efficiency of ToS
• Possible undesired effect of C & D
• Low success rate of lawsuits
39
40. Mix between marketing & legal tools
Excessive use of legal tools
•Brand image crumbling by lack of •Possible acceleration of viral
maintenance negative effect
•Acceleration of viral negative •Possible hostile reaction of
effect consumers which may crumble
brand image
Excessive use of marketing tools
Insufficient use of marketing tools
•Loss of right on the trademark •Loss of right on the trademark
•Brand image erosion by lack of •Non transparent advertising
maintenance •Hostile reaction of consumers
which may weaken brand image
Insufficient use of legal tools
41. CRITERION ASSESSMENT ELEMENTS
Avatar in a virtual world / How it behaves / Substantiated
Content nature blog post / Comment on a blog / Discussion about a
Wikipedia article / Facebook group / Parodic video…
Use of a sign identical to a TM? / Similar? / TM parody? /
Intrinsic nature of the content Opinion expressed in a subjective form? Tone? /
Obvious bad faith of the author?
Contextual analysis of the Visibility on open search tools? / On closed search tools
content in relation to the (FB)? / Sociology of participants to a discussion or a
trademark target group? / Their psychology? / Their number?
Social media policy with respect Do ToS have specific provisions regarding the use of
to trademark infringement third parties TM? What are the usual practices of this
social media?
Is it a regular client regular? / occasional? / prospective?
Person who posted the content / A competitor? / Is this person influent?
Strategic importance of the social Sociology of the social media users / Main interests of its
media members / Geographic scope / Intrinsic power
Lasting impact on the brand image? / Alleged
Content effect
dangerousness of a product? / Effect on stocks price?
41
42. Research limits
Geographic
• Legal grounds
• Social media
Temporal
Data availability
• on actual social media practices
• on actual firms practices
42
43. Future research
Renew the study in n years
Autoregulation / Governance of social
media
Pluridisciplinary study
43