SlideShare a Scribd company logo
1 of 3
Download to read offline
Privacy & Security
                                       Law Report                                    ®




                              Reproduced with permission from Privacy & Security
                              Law Report, 10 PVLR 1163, 08/15/2011. Copyright
                              2011 by The Bureau of National Affairs, Inc. (800-372-
                              1033) http://www.bna.com


Getting It Right: Five Must-Have Provisions for Your Social Media Policy

                                                             Common Provisions of Social Media Policies
                                                                Certain provisions are common in social media poli-
                                                             cies. Based on a review of company social media poli-
                                                             cies, including the publicly available policies of six pub-
                                                             lic companies (i.e., Best Buy, Coca-Cola, IBM, Intel,
                                                             Nordstrom and Wells Fargo),3 these provisions include:
                                                             (1) use common sense and do not be misleading, (2) do
                                                             not disclose confidential or proprietary information, (3)
                                                             do not disclose material nonpublic information, (4)
                                                             comply with company policies and applicable law and
                                                             (5) identify yourself and fully disclose your affiliation
                                                             when you communicate about the company.

                                                             Use Common Sense and Do Not Be
                                                             Misleading
                                                              A number of policies advised employees to use com-
BY MELISSA J. KRASNOW                                        mon sense and exercise judgment when using social

                                                                 1
                                                                  See nCircle 2011 Social Media Security Trends Survey,
Prevalence of Social Media Policies                          March       2011,      at   http://www.ncircle.com/index.php?
     ccording to a recent survey1 of technology, federal     s=resources_surveys_Survey-SocialMedia-2011.

A    government, financial services, health care, educa-
     tion and other organizations, 68 percent of respon-
dents have social media policies. In a 2009 survey2 by
                                                                 2
                                                                  See ‘‘Social Networks vs. Management? Harness the
                                                             Power of Social Media, Manpower, January 2010, at https://
                                                             candidate.manpower.com/wps/wcm/connect/
                                                             97091280420bb140a9bbeda17e379a88/MANP_285779_
Manpower, 29 percent of companies in the Americas            WHITE_1up.pdf?MOD=AJPERES
had a social media policy. Companies that do not have           3
                                                                  See Best Buy Social Media Policy, last updated April 13,
social media policies likely are preparing them or at a      2011 at http://forums.bestbuy.com/t5/Welcome-News/Best-
minimum considering them.                                    Buy-Social-Media-Policy/td-p/20492; Coca-Cola Online Social
                                                             Media Principles, Dec. 15, 2009 at http://www.thecoca-
                                                             colacompany.com/socialmedia/; IBM Social Computing Guide-
    Melissa J. Krasnow, a partner in the Corpo-              lines, 2010 at http://www.ibm.com/blogs/zz/en/guidelines.html;
    rate Group of Dorsey & Whitney LLP in Min-               Intel Social Media Guidelines, last update March 2010, at
    neapolis, is a Certified Information Privacy              http://www.intel.com/content/www/us/en/legal/intel-social-
                                                             media-guidelines.html; Nordstrom Social Networking Guide-
    Professional and serves on the International
                                                             lines, Feb. 25, 2011 at http://shop.nordstrom.com/c/social-
    Association of Privacy Professionals Publica-            networking-guidelines and Wells Fargo Blogs and Social Me-
    tion Advisory Board.                                     dia Community Guidelines at http://blog.wellsfargo.com/
                                                             community-guidelines.html.



COPYRIGHT   2011 BY THE BUREAU OF NATIONAL AFFAIRS, INC.   ISSN 1538-3423
2

media, and said that individuals were responsible for               material nonpublic information (e.g., insider trading
their postings. Negative communications about the                   policy and disclosure policy) should be reviewed to
company or other companies (such as competitors or                  make sure they are consistent and integrated with a
vendors or their products and services) or certain indi-            policy covering social media. Such other policies also
viduals (such as customers), should be avoided, accord-             may be cross-referenced in a policy covering social me-
ing to numerous policies. Many policies also advised                dia.
not to use social media in a false or misleading way. The
Federal Trade Commission’s 2009 Guides Concerning                   Comply with Company Policies and Applicable
the Use of Endorsements and Testimonials in Advertis-               Law
ing4 (the FTC Guides), which prohibit making false or                  This provision is important because other company
unsubstantiated statements, is a basis for this provision.          policies should be reviewed in preparing a social media
See 16 C.F.R. Part 255.                                             policy. Does another policy cover aspects of social me-
   A virtual world example of being misleading that oc-             dia and could such policy be amended and updated in-
curs with frequency is being an impostor. It is neither             stead of preparing a stand-alone social media policy?
difficult nor uncommon for a person to establish an ac-             The answer will depend on the situation of the particu-
count at a social media website and claim to be some-               lar company.
one else (e.g., an executive officer of a company) or                  For example, many companies have an electronic
claim that the account is on behalf of a company. Im-               communications policy to address appropriate uses of
personating another through an account at a social me-              the company’s computer system and to reduce em-
dia website typically violates the terms of use of the              ployee expectations of privacy and a company’s risk.
website.5 See the Facebook Statement of Rights and Re-              Often, an electronic communications policy is amended
sponsibilities and the Twitter Impersonation Policy.                to address the use of social media.
                                                                       However, if a company does not have an electronic
Do Not Disclose Confidential or Proprietar y                         communications policy, the following provisions can be
Information                                                         included in a social media policy where the company:
   A key concern of companies is that the use of social             (1) expressly reserves the right to access and monitor
media increases the risk of disclosing confidential or              the use of the company’s computer network, equipment
proprietary information, even unintentionally. As a re-             and communications systems and the contents of files
sult, many policies contain a provision broadly prohib-             and communications created, stored, sent or received
iting this on behalf of the company and often specifying            on the systems; (2) notes that the computer network,
what confidential or proprietary information is. Some               equipment and communications systems are company
companies add financial or other sensitive information              property and; (3) states that there should be no expec-
to confidential or proprietary information. In addition             tation of privacy in anything created, stored, sent or re-
to company confidential information, the prohibition of-            ceived through the company’s computer network,
ten extends to the confidential information of the com-             equipment, communications systems or the internet.
pany’s competitors, business partners, customers and                Court cases considering employers’ right to monitor or
employees. Finally, policies may provide examples for               review material sent or received on a company com-
illustrative purposes.                                              puter are fact-specific and consider, among other
                                                                    things, the language of the policy at issue and the extent
Do Not Disclose Material Nonpublic                                  to which it has been used or enforced in the past.8 See,
                                                                    for example, City of Ontario v. Quon, 130 S. Ct. 2619
Information                                                         (2010) and Stengart v. Loving Care Agency, Inc., 990
   For public companies, there is the additional category           A.2d 650 (N.J. 2010).
of material nonpublic information. A company or a per-                 An electronic communications policy also often ad-
son acting on behalf of the company that intentionally              dresses the extent of personal use of the company’s
or unintentionally selectively discloses material non-              computer network, equipment, and communications
public information must make simultaneous or prompt                 systems. Many policies limit personal use or keep per-
public disclosure of that information. See the Security             sonal use to a minimum. Such a policy should be rea-
and Exchange Commission’s Rule 100 of Regulation                    sonable and enforceable and enforced consistently.
FD.6 Public disclosure of material nonpublic informa-                  Regardless of which approach is taken, a policy cov-
tion can be made by (1) furnishing or filing a report on            ering social media should be drafted to be consistent
the SEC’s Form 8-K or (2) disseminating the informa-                and integrated with other company policies (e.g., elec-
tion through another method of disclosure reasonably                tronic communications policy, code of ethics, code of
designed to provide broad, non-exclusionary distribu-               conduct, record retention policy, privacy policy, em-
tion of the information to the public.7 See Rule 101(e)             ployee handbook, insider trading policy and disclosure
of Regulation FD. Other company policies that cover                 policy, etc.). In addition to company policies, if com-
                                                                    pany agreement provisions could be implicated (e.g.,
   4
     The FTC Guides Concerning the Use of Endorsements              confidentiality provisions), they should be reviewed as
and Testimonials in Advertising are at http://ftc.gov/os/2009/10/   well. If there is any inconsistency between the policy
091005revisedendorsementguides.pdf.                                 covering social media and another company policy or
   5
     The Facebook Statement of Rights and Responsibilities is       agreement, the one that will govern should be noted. In
at http://www.facebook.com/terms.php. The Twitter Imperson-
ation Policy is at http://support.twitter.com/entries/18366-
                                                                       8
impersonation-policy.                                                    The U.S. Supreme Court’s 2010 decision in City of Ontario
   6
     Rule 100 of Regulation FD is at http://www.sec.gov/            v. Quon is at http://www.supremecourt.gov/opinions/09pdf/08-
divisions/corpfin/guidance/regfd-interp.htm.                        1332.pdf. The New Jersey Supreme Court’s 2010 decision in
   7
     Rule 101(e) of Regulation FD is at http://taft.law.uc.edu/     Stengart    v.   Loving    Care   Agency     is    at   http://
CCL/regFD/FD101.html.                                               pdfserver.amlaw.com/nj/Stengart-A16-09.pdf.

8-15-11                                    COPYRIGHT     2011 BY THE BUREAU OF NATIONAL AFFAIRS, INC.      PVLR    ISSN 1538-3423
3

addition, policies often include a provision about com-              agency from misrepresenting that the user or endorser
plying with applicable law (e.g., intellectual property              is an independent, ordinary consumer, and from mak-
law).                                                                ing endorsement or user claims about a product or ser-
                                                                     vice unless they disclose any relevant connections that
Identify Yourself and Fully Disclose Your                            they have with the seller or the product or service and
Affiliation When You Communicate about the                            (ii) requires the public relations agency to remove any
                                                                     previously posted endorsements that misrepresent the
Company                                                              authors as independent users or ordinary consumers
   The FTC Guides require full disclosure of a material              and that fail to disclose a connection between the pub-
connection between an advertiser and an endorser that                lic relations agency and the seller of a product or ser-
might materially affect the weight or credibility of the             vice.
endorsement. See 16 C.F.R. § 255.5.9 Employees of a                     David Vladeck, director of the Bureau of Consumer
company who make comments about the company or                       Protection of the FTC, said in May 19 testimony to the
its products or services, particularly in a positive man-            Senate Committee on Commerce, Science, and Trans-
ner, must fully disclose that they are employees of the              portation: ‘‘The Reverb settlement demonstrates that
company. The FTC issued Frequently Asked Questions                   the FTC’s well-settled truth-in-advertising principles
for the FTC Guides in June 2010,10 which address ma-                 apply to new forms of mobile marketing . . . as in the of-
terial connections, among other things. In addition, the             fline world, companies must be able to substantiate
Word of Mouth Marketing Association, an organization                 claims made about their products. Developers may not
dedicated to advancing and advocating credible word of               make misrepresentations or unsubstantiated claims
mouth marketing (WOMMA), issued the WOMMA                            about their mobile apps, whether those claims are in
Guide to Disclosure in Social Media Marketing in the                 banner ads, on a mobile website, in an app, or in app
wake of the FTC Guides in February 2010.11 This                      store descriptions. FTC staff is working to identify other
WOMMA Guide describes disclosure practices regard-                   violations of these well-established principles in the mo-
ing material connections.                                            bile context.’’13
   It is important to note that the FTC has enforced the                A number of policies also require that employees ex-
requirement to fully disclose a material connection un-              pressly state when they are communicating for them-
der the FTC Guides. See In the Matter of Reverb Com-                 selves and not on behalf of the company and when their
munications, Inc., FTC File No. 092 3199, Nov. 26, 2010;             views are their own and do not necessarily represent
In the Matter of Legacy Learning Systems, Inc. FTC File              those of the company. Best Buy’s Chief Ethics Officer
No. 102 3055, June 10, 2011; and Closing Letter,                     recently blogged about the following interesting real-
AnnTaylor Stores Corporation, FTC File No. 102-3147,                 life situation: ‘‘Among the do’s and don’ts described in
April 20, 2010.12 For example, in Reverb Communica-                  [Best Buy’s Social Media] Policy: [(1)] Always disclose
tions, a public relations agency hired by video game ap-             your affiliation to Best Buy when talking about topics
plication (including mobile gaming application) devel-               related to your job . . . . [(2)] Make it clear it’s YOUR
opers settled charges of engaging in deceptive advertis-             opinion that is being expressed, not necessarily Best
ing where its employees posed as ordinary consumers,                 Buy’s official point of view on the matter. . . . [(3)] Pro-
posted game reviews at the online iTunes store and                   tect yourself, our customers and the company by
failed to disclose that the reviews came from paid em-               never disclosing personal information, customer data or
ployees working on behalf of the developers.                         proprietary company secrets. . . . [and (4)] Act ethically
   The FTC approved a final order settling charges that,             and responsibly at all times, embodying the very best
among other things, (i) prohibits the public relations               of our company values. Despite these ethical guidelines,
                                                                     we occasionally encounter situations where an em-
    9
      16 C.F.R. § 255.5 is at http://op.bna.com/pl.nsf/r?
                                                                     ployee shares more than is appropriate while using the
Open=byul-8kmkls.                                                    social media du jour. For example, a customer recently
    10
       The FAQs are at http://business.ftc.gov/documents/            vented her frustration on one of our vendor’s tech sup-
bus71-ftcs-revised-endorsement-guideswhat-people-are-                port websites, explaining in detail how the television
asking.pdf.                                                          manufactured by Vendor X did not operate properly.
    11
       The WOMMA Guide to Disclosure in Social Media Mar-            Unfortunately, the post also included this phrase: ‘‘I am
keting is at http://womma.org/ethics/disclosure/.
    12
                                                                     a Best Buy employee and should have known better!’’14
       In the Matter of Reverb Communications, Inc., FTC File
No. 092 3199, Nov. 26, 2010, is at http://www.ftc.gov/os/
                                                                        13
caselist/0923199/index.shtm; In the Matter of Legacy Learning              See FTC statement on Consumer Privacy and Protection
Systems, Inc., FTC File No. 102 3055, June 10, 2011, is at http://   in the Mobile Marketplace before the Senate Committee on
www.ftc.gov/os/caselist/1023055/index.shtm; Closing Letter,          Commerce,      Science,   and   Transportation, at   http://
AnnTaylor Stores Corporation, FTC File No. 102-3147, April           www.ftc.gov/os/testimony/110519mobilemarketplace.pdf
                                                                        14
20,       2010      is    at     http://www.ftc.gov/os/closings/           The blog post is at http://www.kathleenedmond.com/
100420anntaylorclosingletter.pdf.                                    2011/07/15/is-she-a-customer-or-an-employee/.




PRIVACY & SECURITY LAW REPORT          ISSN 1538-3423                                                              BNA    8-15-11

More Related Content

What's hot

Developing a Social Media Policy
Developing a Social Media PolicyDeveloping a Social Media Policy
Developing a Social Media PolicyEric Schwartzman
 
FINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web Sites
FINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web SitesFINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web Sites
FINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web SitesClara Shih
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 
The State of Online Privacy
The State of Online PrivacyThe State of Online Privacy
The State of Online PrivacyColin Hogan
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Notes Version: The New Face of Online Advertising OBA & Compliance
Notes Version: The New Face of Online Advertising OBA & ComplianceNotes Version: The New Face of Online Advertising OBA & Compliance
Notes Version: The New Face of Online Advertising OBA & ComplianceVivastream
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Nielsen social-media-report
Nielsen social-media-reportNielsen social-media-report
Nielsen social-media-reportJennifer Pricci
 
State of the social media: The social media report- 3º Trimestre 2011 (Nielse...
State of the social media: The social media report- 3º Trimestre 2011 (Nielse...State of the social media: The social media report- 3º Trimestre 2011 (Nielse...
State of the social media: The social media report- 3º Trimestre 2011 (Nielse...Retelur Marketing
 
Nielsen social-media-report
Nielsen social-media-reportNielsen social-media-report
Nielsen social-media-reportIAB México
 
Nielsen Social Media Report - Q3 2011 US
Nielsen Social Media Report - Q3 2011 USNielsen Social Media Report - Q3 2011 US
Nielsen Social Media Report - Q3 2011 USTanmay Shanishchara
 

What's hot (14)

Developing a Social Media Policy
Developing a Social Media PolicyDeveloping a Social Media Policy
Developing a Social Media Policy
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
FINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web Sites
FINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web SitesFINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web Sites
FINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Web Sites
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
The State of Online Privacy
The State of Online PrivacyThe State of Online Privacy
The State of Online Privacy
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Notes Version: The New Face of Online Advertising OBA & Compliance
Notes Version: The New Face of Online Advertising OBA & ComplianceNotes Version: The New Face of Online Advertising OBA & Compliance
Notes Version: The New Face of Online Advertising OBA & Compliance
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Nielsen social-media-report
Nielsen social-media-reportNielsen social-media-report
Nielsen social-media-report
 
State of the social media: The social media report- 3º Trimestre 2011 (Nielse...
State of the social media: The social media report- 3º Trimestre 2011 (Nielse...State of the social media: The social media report- 3º Trimestre 2011 (Nielse...
State of the social media: The social media report- 3º Trimestre 2011 (Nielse...
 
Nielsen social-media-report
Nielsen social-media-reportNielsen social-media-report
Nielsen social-media-report
 
Nielsen Social Media Report - Q3 2011 US
Nielsen Social Media Report - Q3 2011 USNielsen Social Media Report - Q3 2011 US
Nielsen Social Media Report - Q3 2011 US
 
Social media-report
Social media-reportSocial media-report
Social media-report
 

Similar to Session B: Handout 3

Session B: Handout 2
Session B: Handout 2 Session B: Handout 2
Session B: Handout 2 feitwincities
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Dave Shannon
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarNICSA
 
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaStanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaSarah Larcker
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
 
Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy
Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy
Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy Patton Boggs LLP
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA PresentationRaidious
 
Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Barbara Richman, SPHR
 
Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media Ogilvy Consulting
 
Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Morgan
 
Ethics In DW & DM
Ethics In DW & DMEthics In DW & DM
Ethics In DW & DMabethan
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docxtamicawaysmith
 
The State Of Online Privacy
The State Of Online PrivacyThe State Of Online Privacy
The State Of Online Privacycrhogan
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social MediaDavid Cain
 
FDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaFDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaSerge Milman
 

Similar to Session B: Handout 3 (20)

Session B: Handout 2
Session B: Handout 2 Session B: Handout 2
Session B: Handout 2
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaStanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 
Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy
Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy
Privacy Client Alert: FTC Issues Preliminary Staff Report on Privacy
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA Presentation
 
Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10
 
Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media
 
Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011
 
Ethics In DW & DM
Ethics In DW & DMEthics In DW & DM
Ethics In DW & DM
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
The State Of Online Privacy
The State Of Online PrivacyThe State Of Online Privacy
The State Of Online Privacy
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
FDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaFDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social media
 

More from feitwincities

Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"
Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"
Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"feitwincities
 
Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"
Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"
Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"feitwincities
 
Afternoon Keynote: Renewing Your Business Via Strategic Innovation
Afternoon Keynote: Renewing Your Business Via Strategic InnovationAfternoon Keynote: Renewing Your Business Via Strategic Innovation
Afternoon Keynote: Renewing Your Business Via Strategic Innovationfeitwincities
 
Session A: Diversity in the 21st Century: The Way Forward
Session A: Diversity in the 21st Century: The Way Forward  Session A: Diversity in the 21st Century: The Way Forward
Session A: Diversity in the 21st Century: The Way Forward feitwincities
 
Session E: Scantron's Innovation Movement: "Think Differently"
Session E: Scantron's Innovation Movement: "Think Differently"Session E: Scantron's Innovation Movement: "Think Differently"
Session E: Scantron's Innovation Movement: "Think Differently"feitwincities
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1feitwincities
 

More from feitwincities (6)

Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"
Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"
Sessions D & J: Main Presentation for "Igniting Innovative Thinking & Action"
 
Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"
Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"
Sessions D & J: Group Report for "Igniting Innovative Thinking & Action"
 
Afternoon Keynote: Renewing Your Business Via Strategic Innovation
Afternoon Keynote: Renewing Your Business Via Strategic InnovationAfternoon Keynote: Renewing Your Business Via Strategic Innovation
Afternoon Keynote: Renewing Your Business Via Strategic Innovation
 
Session A: Diversity in the 21st Century: The Way Forward
Session A: Diversity in the 21st Century: The Way Forward  Session A: Diversity in the 21st Century: The Way Forward
Session A: Diversity in the 21st Century: The Way Forward
 
Session E: Scantron's Innovation Movement: "Think Differently"
Session E: Scantron's Innovation Movement: "Think Differently"Session E: Scantron's Innovation Movement: "Think Differently"
Session E: Scantron's Innovation Movement: "Think Differently"
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Session B: Handout 3

  • 1. Privacy & Security Law Report ® Reproduced with permission from Privacy & Security Law Report, 10 PVLR 1163, 08/15/2011. Copyright 2011 by The Bureau of National Affairs, Inc. (800-372- 1033) http://www.bna.com Getting It Right: Five Must-Have Provisions for Your Social Media Policy Common Provisions of Social Media Policies Certain provisions are common in social media poli- cies. Based on a review of company social media poli- cies, including the publicly available policies of six pub- lic companies (i.e., Best Buy, Coca-Cola, IBM, Intel, Nordstrom and Wells Fargo),3 these provisions include: (1) use common sense and do not be misleading, (2) do not disclose confidential or proprietary information, (3) do not disclose material nonpublic information, (4) comply with company policies and applicable law and (5) identify yourself and fully disclose your affiliation when you communicate about the company. Use Common Sense and Do Not Be Misleading A number of policies advised employees to use com- BY MELISSA J. KRASNOW mon sense and exercise judgment when using social 1 See nCircle 2011 Social Media Security Trends Survey, Prevalence of Social Media Policies March 2011, at http://www.ncircle.com/index.php? ccording to a recent survey1 of technology, federal s=resources_surveys_Survey-SocialMedia-2011. A government, financial services, health care, educa- tion and other organizations, 68 percent of respon- dents have social media policies. In a 2009 survey2 by 2 See ‘‘Social Networks vs. Management? Harness the Power of Social Media, Manpower, January 2010, at https:// candidate.manpower.com/wps/wcm/connect/ 97091280420bb140a9bbeda17e379a88/MANP_285779_ Manpower, 29 percent of companies in the Americas WHITE_1up.pdf?MOD=AJPERES had a social media policy. Companies that do not have 3 See Best Buy Social Media Policy, last updated April 13, social media policies likely are preparing them or at a 2011 at http://forums.bestbuy.com/t5/Welcome-News/Best- minimum considering them. Buy-Social-Media-Policy/td-p/20492; Coca-Cola Online Social Media Principles, Dec. 15, 2009 at http://www.thecoca- colacompany.com/socialmedia/; IBM Social Computing Guide- Melissa J. Krasnow, a partner in the Corpo- lines, 2010 at http://www.ibm.com/blogs/zz/en/guidelines.html; rate Group of Dorsey & Whitney LLP in Min- Intel Social Media Guidelines, last update March 2010, at neapolis, is a Certified Information Privacy http://www.intel.com/content/www/us/en/legal/intel-social- media-guidelines.html; Nordstrom Social Networking Guide- Professional and serves on the International lines, Feb. 25, 2011 at http://shop.nordstrom.com/c/social- Association of Privacy Professionals Publica- networking-guidelines and Wells Fargo Blogs and Social Me- tion Advisory Board. dia Community Guidelines at http://blog.wellsfargo.com/ community-guidelines.html. COPYRIGHT 2011 BY THE BUREAU OF NATIONAL AFFAIRS, INC. ISSN 1538-3423
  • 2. 2 media, and said that individuals were responsible for material nonpublic information (e.g., insider trading their postings. Negative communications about the policy and disclosure policy) should be reviewed to company or other companies (such as competitors or make sure they are consistent and integrated with a vendors or their products and services) or certain indi- policy covering social media. Such other policies also viduals (such as customers), should be avoided, accord- may be cross-referenced in a policy covering social me- ing to numerous policies. Many policies also advised dia. not to use social media in a false or misleading way. The Federal Trade Commission’s 2009 Guides Concerning Comply with Company Policies and Applicable the Use of Endorsements and Testimonials in Advertis- Law ing4 (the FTC Guides), which prohibit making false or This provision is important because other company unsubstantiated statements, is a basis for this provision. policies should be reviewed in preparing a social media See 16 C.F.R. Part 255. policy. Does another policy cover aspects of social me- A virtual world example of being misleading that oc- dia and could such policy be amended and updated in- curs with frequency is being an impostor. It is neither stead of preparing a stand-alone social media policy? difficult nor uncommon for a person to establish an ac- The answer will depend on the situation of the particu- count at a social media website and claim to be some- lar company. one else (e.g., an executive officer of a company) or For example, many companies have an electronic claim that the account is on behalf of a company. Im- communications policy to address appropriate uses of personating another through an account at a social me- the company’s computer system and to reduce em- dia website typically violates the terms of use of the ployee expectations of privacy and a company’s risk. website.5 See the Facebook Statement of Rights and Re- Often, an electronic communications policy is amended sponsibilities and the Twitter Impersonation Policy. to address the use of social media. However, if a company does not have an electronic Do Not Disclose Confidential or Proprietar y communications policy, the following provisions can be Information included in a social media policy where the company: A key concern of companies is that the use of social (1) expressly reserves the right to access and monitor media increases the risk of disclosing confidential or the use of the company’s computer network, equipment proprietary information, even unintentionally. As a re- and communications systems and the contents of files sult, many policies contain a provision broadly prohib- and communications created, stored, sent or received iting this on behalf of the company and often specifying on the systems; (2) notes that the computer network, what confidential or proprietary information is. Some equipment and communications systems are company companies add financial or other sensitive information property and; (3) states that there should be no expec- to confidential or proprietary information. In addition tation of privacy in anything created, stored, sent or re- to company confidential information, the prohibition of- ceived through the company’s computer network, ten extends to the confidential information of the com- equipment, communications systems or the internet. pany’s competitors, business partners, customers and Court cases considering employers’ right to monitor or employees. Finally, policies may provide examples for review material sent or received on a company com- illustrative purposes. puter are fact-specific and consider, among other things, the language of the policy at issue and the extent Do Not Disclose Material Nonpublic to which it has been used or enforced in the past.8 See, for example, City of Ontario v. Quon, 130 S. Ct. 2619 Information (2010) and Stengart v. Loving Care Agency, Inc., 990 For public companies, there is the additional category A.2d 650 (N.J. 2010). of material nonpublic information. A company or a per- An electronic communications policy also often ad- son acting on behalf of the company that intentionally dresses the extent of personal use of the company’s or unintentionally selectively discloses material non- computer network, equipment, and communications public information must make simultaneous or prompt systems. Many policies limit personal use or keep per- public disclosure of that information. See the Security sonal use to a minimum. Such a policy should be rea- and Exchange Commission’s Rule 100 of Regulation sonable and enforceable and enforced consistently. FD.6 Public disclosure of material nonpublic informa- Regardless of which approach is taken, a policy cov- tion can be made by (1) furnishing or filing a report on ering social media should be drafted to be consistent the SEC’s Form 8-K or (2) disseminating the informa- and integrated with other company policies (e.g., elec- tion through another method of disclosure reasonably tronic communications policy, code of ethics, code of designed to provide broad, non-exclusionary distribu- conduct, record retention policy, privacy policy, em- tion of the information to the public.7 See Rule 101(e) ployee handbook, insider trading policy and disclosure of Regulation FD. Other company policies that cover policy, etc.). In addition to company policies, if com- pany agreement provisions could be implicated (e.g., 4 The FTC Guides Concerning the Use of Endorsements confidentiality provisions), they should be reviewed as and Testimonials in Advertising are at http://ftc.gov/os/2009/10/ well. If there is any inconsistency between the policy 091005revisedendorsementguides.pdf. covering social media and another company policy or 5 The Facebook Statement of Rights and Responsibilities is agreement, the one that will govern should be noted. In at http://www.facebook.com/terms.php. The Twitter Imperson- ation Policy is at http://support.twitter.com/entries/18366- 8 impersonation-policy. The U.S. Supreme Court’s 2010 decision in City of Ontario 6 Rule 100 of Regulation FD is at http://www.sec.gov/ v. Quon is at http://www.supremecourt.gov/opinions/09pdf/08- divisions/corpfin/guidance/regfd-interp.htm. 1332.pdf. The New Jersey Supreme Court’s 2010 decision in 7 Rule 101(e) of Regulation FD is at http://taft.law.uc.edu/ Stengart v. Loving Care Agency is at http:// CCL/regFD/FD101.html. pdfserver.amlaw.com/nj/Stengart-A16-09.pdf. 8-15-11 COPYRIGHT 2011 BY THE BUREAU OF NATIONAL AFFAIRS, INC. PVLR ISSN 1538-3423
  • 3. 3 addition, policies often include a provision about com- agency from misrepresenting that the user or endorser plying with applicable law (e.g., intellectual property is an independent, ordinary consumer, and from mak- law). ing endorsement or user claims about a product or ser- vice unless they disclose any relevant connections that Identify Yourself and Fully Disclose Your they have with the seller or the product or service and Affiliation When You Communicate about the (ii) requires the public relations agency to remove any previously posted endorsements that misrepresent the Company authors as independent users or ordinary consumers The FTC Guides require full disclosure of a material and that fail to disclose a connection between the pub- connection between an advertiser and an endorser that lic relations agency and the seller of a product or ser- might materially affect the weight or credibility of the vice. endorsement. See 16 C.F.R. § 255.5.9 Employees of a David Vladeck, director of the Bureau of Consumer company who make comments about the company or Protection of the FTC, said in May 19 testimony to the its products or services, particularly in a positive man- Senate Committee on Commerce, Science, and Trans- ner, must fully disclose that they are employees of the portation: ‘‘The Reverb settlement demonstrates that company. The FTC issued Frequently Asked Questions the FTC’s well-settled truth-in-advertising principles for the FTC Guides in June 2010,10 which address ma- apply to new forms of mobile marketing . . . as in the of- terial connections, among other things. In addition, the fline world, companies must be able to substantiate Word of Mouth Marketing Association, an organization claims made about their products. Developers may not dedicated to advancing and advocating credible word of make misrepresentations or unsubstantiated claims mouth marketing (WOMMA), issued the WOMMA about their mobile apps, whether those claims are in Guide to Disclosure in Social Media Marketing in the banner ads, on a mobile website, in an app, or in app wake of the FTC Guides in February 2010.11 This store descriptions. FTC staff is working to identify other WOMMA Guide describes disclosure practices regard- violations of these well-established principles in the mo- ing material connections. bile context.’’13 It is important to note that the FTC has enforced the A number of policies also require that employees ex- requirement to fully disclose a material connection un- pressly state when they are communicating for them- der the FTC Guides. See In the Matter of Reverb Com- selves and not on behalf of the company and when their munications, Inc., FTC File No. 092 3199, Nov. 26, 2010; views are their own and do not necessarily represent In the Matter of Legacy Learning Systems, Inc. FTC File those of the company. Best Buy’s Chief Ethics Officer No. 102 3055, June 10, 2011; and Closing Letter, recently blogged about the following interesting real- AnnTaylor Stores Corporation, FTC File No. 102-3147, life situation: ‘‘Among the do’s and don’ts described in April 20, 2010.12 For example, in Reverb Communica- [Best Buy’s Social Media] Policy: [(1)] Always disclose tions, a public relations agency hired by video game ap- your affiliation to Best Buy when talking about topics plication (including mobile gaming application) devel- related to your job . . . . [(2)] Make it clear it’s YOUR opers settled charges of engaging in deceptive advertis- opinion that is being expressed, not necessarily Best ing where its employees posed as ordinary consumers, Buy’s official point of view on the matter. . . . [(3)] Pro- posted game reviews at the online iTunes store and tect yourself, our customers and the company by failed to disclose that the reviews came from paid em- never disclosing personal information, customer data or ployees working on behalf of the developers. proprietary company secrets. . . . [and (4)] Act ethically The FTC approved a final order settling charges that, and responsibly at all times, embodying the very best among other things, (i) prohibits the public relations of our company values. Despite these ethical guidelines, we occasionally encounter situations where an em- 9 16 C.F.R. § 255.5 is at http://op.bna.com/pl.nsf/r? ployee shares more than is appropriate while using the Open=byul-8kmkls. social media du jour. For example, a customer recently 10 The FAQs are at http://business.ftc.gov/documents/ vented her frustration on one of our vendor’s tech sup- bus71-ftcs-revised-endorsement-guideswhat-people-are- port websites, explaining in detail how the television asking.pdf. manufactured by Vendor X did not operate properly. 11 The WOMMA Guide to Disclosure in Social Media Mar- Unfortunately, the post also included this phrase: ‘‘I am keting is at http://womma.org/ethics/disclosure/. 12 a Best Buy employee and should have known better!’’14 In the Matter of Reverb Communications, Inc., FTC File No. 092 3199, Nov. 26, 2010, is at http://www.ftc.gov/os/ 13 caselist/0923199/index.shtm; In the Matter of Legacy Learning See FTC statement on Consumer Privacy and Protection Systems, Inc., FTC File No. 102 3055, June 10, 2011, is at http:// in the Mobile Marketplace before the Senate Committee on www.ftc.gov/os/caselist/1023055/index.shtm; Closing Letter, Commerce, Science, and Transportation, at http:// AnnTaylor Stores Corporation, FTC File No. 102-3147, April www.ftc.gov/os/testimony/110519mobilemarketplace.pdf 14 20, 2010 is at http://www.ftc.gov/os/closings/ The blog post is at http://www.kathleenedmond.com/ 100420anntaylorclosingletter.pdf. 2011/07/15/is-she-a-customer-or-an-employee/. PRIVACY & SECURITY LAW REPORT ISSN 1538-3423 BNA 8-15-11