Covers the ins and outs of ethically using social media to mine for evidence for litigation and also how to use social media to research jurors at trial.
6 Things Lawyers Should Know About Social MediaNicole Black
Slides from my presentation with Lisa Solomon, "6 Things Lawyers Should Know About Social Media." This presentation was given at the American Bar Association's Solo and Small Practice conference on 10/17/09 in Los Angeles.
6 Things Lawyers Should Know About Social MediaNicole Black
Slides from my presentation with Lisa Solomon, "6 Things Lawyers Should Know About Social Media." This presentation was given at the American Bar Association's Solo and Small Practice conference on 10/17/09 in Los Angeles.
A presentation given by LIFARS at a conference MEPA EU Police Academy conference on May 2016. It covers the dangers that the internet and social media pose to children and adolescents. More and more, we're seeing that social media are opening the gates to cyberbullying, cyber extortion, sextortion, cyber stalking and more. Any parts of this presentation can be adopted and reused as long as attribution is given. For inquiries, please contact pr@lifars.com.
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 29, 2020 to scholars, policy makers and civil society advocates convened by New York University’s Governance Lab (GovLab). He described findings from two canvassings of hundreds of technology and democracy experts that captured their views about the future of democracy and the future of social and civic innovation by the year 2030. Among other subjects, the experts looked at the impact of misinformation, “techlash” and trust in government institutions.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding Internet of Things.
Pew Internet Director Lee Rainie delivered the keynote presentation at WorldFuture 2012 in Toronto on Friday, July 27. The presentation, based on his latest book, Networked: The New Social Operating System (co-authored with Barry Wellman), discussed the findings of the most recent expert surveys on the future of teens’ brains, the future of universities, the future of money, the impact of Big Data, the battle between apps and the Web, the spread of gamification, and the impact of smart systems on consumers.
Lee Rainie discussed an extensive roster of expert predictions about the internet in the coming decade. He discussed what happens to people’s behavior when the internet is everywhere, how new social and cultural divides will emerge, how deeply education will be disrupted, and how a different mix of companies will influence the Internet.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Lee Rainie, Director of Internet, Science, and Technology research at the Pew Research Center, presented this material on December 12, 2016 to a working group at the National Academy of Sciences. The group is exploring how to think about creating an academic discipline around "data science."
Presented by Lee Rainie
An overview of the extensive roster of expert predictions about the coming decade that the Pew Internet Project recently gathered. Among other things, this keynote covers what happens to people’s behavior when the Internet is everywhere, how new social and cultural divides will emerge, how deeply education will be disrupted, and how a different mix of companies will influence the Internet.
Developing Social Networking Policies for the Legal Aid Office. June 11, 2009
Host: Kathleen Brockel
Special Guests: Stephanie Kimbro & Will Hornsby
Please see additional notes at http://lsntap.org/Executive_Roundtable_Jun2009_Social_Networking
INCREASING ACCESS THROUGH MOBILE LEARNING. A Socio-technical tale of mLearni...African Virtual University
By;
Dianah Nampijja
Department of Global Development and Planning
Dianah Nampijja is a PhD Research Fellow at University of Agder, Norway with a Msc in Development Management (University of Agder, Norway) and a Msc in Education for Sustainability (London South Bank University, UK). Her current research is on Mobile learning affordances for food security in Uganda.
A presentation given by LIFARS at a conference MEPA EU Police Academy conference on May 2016. It covers the dangers that the internet and social media pose to children and adolescents. More and more, we're seeing that social media are opening the gates to cyberbullying, cyber extortion, sextortion, cyber stalking and more. Any parts of this presentation can be adopted and reused as long as attribution is given. For inquiries, please contact pr@lifars.com.
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 29, 2020 to scholars, policy makers and civil society advocates convened by New York University’s Governance Lab (GovLab). He described findings from two canvassings of hundreds of technology and democracy experts that captured their views about the future of democracy and the future of social and civic innovation by the year 2030. Among other subjects, the experts looked at the impact of misinformation, “techlash” and trust in government institutions.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding Internet of Things.
Pew Internet Director Lee Rainie delivered the keynote presentation at WorldFuture 2012 in Toronto on Friday, July 27. The presentation, based on his latest book, Networked: The New Social Operating System (co-authored with Barry Wellman), discussed the findings of the most recent expert surveys on the future of teens’ brains, the future of universities, the future of money, the impact of Big Data, the battle between apps and the Web, the spread of gamification, and the impact of smart systems on consumers.
Lee Rainie discussed an extensive roster of expert predictions about the internet in the coming decade. He discussed what happens to people’s behavior when the internet is everywhere, how new social and cultural divides will emerge, how deeply education will be disrupted, and how a different mix of companies will influence the Internet.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Lee Rainie, Director of Internet, Science, and Technology research at the Pew Research Center, presented this material on December 12, 2016 to a working group at the National Academy of Sciences. The group is exploring how to think about creating an academic discipline around "data science."
Presented by Lee Rainie
An overview of the extensive roster of expert predictions about the coming decade that the Pew Internet Project recently gathered. Among other things, this keynote covers what happens to people’s behavior when the Internet is everywhere, how new social and cultural divides will emerge, how deeply education will be disrupted, and how a different mix of companies will influence the Internet.
Developing Social Networking Policies for the Legal Aid Office. June 11, 2009
Host: Kathleen Brockel
Special Guests: Stephanie Kimbro & Will Hornsby
Please see additional notes at http://lsntap.org/Executive_Roundtable_Jun2009_Social_Networking
INCREASING ACCESS THROUGH MOBILE LEARNING. A Socio-technical tale of mLearni...African Virtual University
By;
Dianah Nampijja
Department of Global Development and Planning
Dianah Nampijja is a PhD Research Fellow at University of Agder, Norway with a Msc in Development Management (University of Agder, Norway) and a Msc in Education for Sustainability (London South Bank University, UK). Her current research is on Mobile learning affordances for food security in Uganda.
LAEP Visions of the Future of Learning AnalyticsDoug Clow
Presentation on the LACE project's Visions of the Future of Learning Analytics work from the LAEP project's expert workshop in Amsterdam, 15-16 March 2016.
Visions of the Future of Learning AnalyticsDoug Clow
Eight visions of the future of learning analytics, created as a way of exploring possible futures by the LACE (Learning Analytics Community Exchange) Project, and presented at Bett 2016, London, 20 January 2016
SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...Bart Rienties
Jekaterina Rogaten1
, Bart Rienties1
, Denise Whitelock1
, Simon Cross1
, Allison Littlejohn1
, Rhona
Sharpe2
, Simon Lygo-Baker3
, Ian Scott2
, Steven Warburton3
, Ian Kinchin3
1The Open University UK, UK,
2Oxford Brooks University, UK,
3University of Surrey, UK
Research Domain: Learning, teaching and assessment (LTA)
In the UK, the introduction of the Teaching Excellence Framework (TEF) has increased interest in
appropriate and valid measurement approaches of learning gains in Higher Education. Usually
learning gains are measured using pre-post testing, but this study examines whether academic
performance can be effectively used as proxy to estimate students’ learning progress. Academic
performance of 21,192 online learners from two major faculties was retrieved from university
database. A three-level growth-curve model was estimated and results showed that 16% to 46% of
variance in students’ initial academic performance, and 51% to 77% of variance in their subsequent
learning gains was due to them studying at a particular module. In addition, the results illustrate that
students who studied in modules with initial high student achievements exhibited lower learning gains
than students learning in modules with low initial student achievements. The importance of
assessment and learning design for learning gains are outlined.
www.abclearninggains.com @learninggains
From watch to smart health watch: healthier lifestyle or fad? vigyanix
Wearables are almost becoming extension to our body. From obtrusive wearables i.e. Google Glass to almost invisible sensors, they are penetrating our lives. See more at: http://vgnx.co/smart-health-watch
Everyone seems to think that Big Social has made privacy a thing of the past. Think again. It's a human right and it's on the Endangered Species list, but there are ways to save it. Find out how.
Mathews Z. NKHOMA
Business Information Systems
RMIT International University
Vietnam
Ho Chi Minh City, Vietnam
Duy P. T. DANG
Business Information Systems
RMIT International University
Vietnam
Ho Chi Minh City, Vietnam
Kudakwashe Appolo Shamu
Software Engineering
FTMS College
Malaysia
Abstract—The Internet has been playing crucial roles
in our life for decades by opening a new separated and
free world that is capable of improving and bringing
benefits to our life in different areas such as economic,
education, governance and entertainment. Nevertheless,
due to being virtual and separated from the real living
world, plus the ability to expand throughout the globe,
the Internet has eventually become a tool for criminals
utilized for malicious purposes. The commitment of
those crimes by abusing the Internet with malicious
tools and methods is recognized widely as ‘cyber
crime’. In order to defend against the expansion of
cyber-crimes, several factors that affect cyber crime’s
development have been studied and determined by
prior and current researches. Apart from a nation’s
IT infrastructure and law and regulations of Internet
behaviors, the awareness of the Internet’s users is
considered as an imperative factor that helps the users
protect themselves against cyber crime as the very first
tier of the defense, thus prevents the development of
these notorious intentions.
The Dark Side of Social Media: Legal Issues
Legal Aspects of Abuse and Misuse of Social Media
(Facebook, Twitter, etc.)
Final project of Legal Aspects of Information Systems courses
By mprabuw & Said Altinsik
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Scott Mills
2:45pm Dec1/2012 From Osgoode Hall of York University, Toronto
Social Networking Media: Crowd Sourcing the Investigation
Cst. Scott Mills, Corporate Communications, Social Media Officer, Toronto Police Service
Steven Johnston, Crown Prosecutor, Special Prosecutions Branch, Alberta Justice
• Social networking as part of the electronic footprint of a criminal case
• Discovery of evidence
• Understanding the digital profile of your witness
• Using essential "old school" investigative techniques
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
Running Head: SOCIAL NETWORKS DATA PRIVACY POLICIES 1
Social networking data privacy policies
Information Governance
Summer 2020
Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodriguez, J. P. (2018). Privacy and Security Issues in Online Social Networks
Social media are networks used for communication between data owners and viewers in virtual communities. The world has hence become a small global village; as a result, accordingly, information is shared seamlessly regardless of the geographical distance between people. There are, therefore, numerous social networks such as Facebook, LinkedIn, and Twitter, just to name a few, and with the help of the internet, people can link and communicate in real-time. When connecting with people from mobile devices, there is data that could be retrieved, indicating the location information and metadata embedded in the machines. Malicious users can hence retrieve this information and leverage it against other users.
The author makes it clear that with the new technology, presently, there is a lot more information available with the growth of online virtual communication platforms. Virtual networking platforms have changed the way people interact. People are always on their mobile devices browsing through social media sites, which is progressively attracting hackers and other cybercriminals. Due to this high usage, there are serious data security and privacy threats are facing social media users. The author is affirmative that the majority of the users are always sharing a lot of their personal information online, putting them at significant risks of the numerous methods of attacks.
This article is rather informative as the author is rather vocal about the reasons why people are continually being targeted by cybercriminals and made victims of attacks. It, therefore, clear on specific policies and strategies which one may implement to prevent them from falling victim to cyberattacks. One should refrain from sharing too much information on social networks, using real names when creating online profiles, and accepting friend requests from suspiciously looking accounts. Social network users must be keen and take the time to read the privacy statement before agreeing to the network's terms and conditions when creating reports.
Sarikakis, K., & Winter, L. (2017). Social Media Users’ Legal Consciousness About Privacy. Social Media + Society
Social network sites are on the upward trajectory, and they are still continuously growing with every mobile user in the world having been connected to an average of more that one social network. Social networks are mainly common among young adults aged between 18 years and 29 years. Users are becoming more comfortable sharing most of their personal details, which significantly challenges the social norm of privacy. The social model has hence become somewhat obsolete. According to the Electronic Frontier Foundation (EFF), which is a non-profit or.
Does Social Media pose a threat to the judiciary? An outline of social media tools and their use in courts. Tips on defining a strategy, developing usage rules and selecting tactics to provide outreach about court programs.
1. Cyber Ethics and Cyber Crime
2. Security in Social Media & Risk of Child Internet
3. Social media in Schools and photo privacy
4. Risk of OSNs and Security, Privacy of Facebook
5. Risk and Security of Social Networking site Facebook and Twitter
6. Risk analysis of Government and Online Transaction
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
5 Ultimate Things You Should Know About Dark WebAmit Biwaal
If you're curious about accessing the dark web safely, then I suggest you take a look at these five things that can help you browse the dark web safely without any hassle. Check it out now.
Similar to Social Media Evidence: Ethics and Best Practices for Lawyers (20)
In this talk I share thoughts on how women in legal tech can support one another and help amplify each other's messages by using the hashtag #legaltechX2
These are the slides from my Keynote at the the Lexis Nexis 2011 Practice Management Annual Conference, which was held in Orlando, Florida (See: http://www.lexisnexis.com/pmac2011/).
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Social Media Evidence: Ethics and Best Practices for Lawyers
1. PRESENTED BY:
Nicole Black
Co-author | Social Media for Lawyers--The Next Frontier
Co-author | Criminal Law in New York
Author | Cloud Computing for Lawyers
Legal Technology Evangelist | MyCase.com | web-based law practice management
The Ethics of Using Social Media For Litigation
16. MINING FOR
EVIDENCE.
Two key themes:
1. Whether the social
media postings sought
are publicly viewable
2. Whether the person
being researched is
represented by
counsel.
.
THE GENERAL
CONCENSUS
General consensus:
1. Most jurisdictions agree
that it is improper to
attempt to connect with
an individual known to
be represented by
counsel but that
viewing publicly
viewable profiles is
fair game.
2. Majority of
jurisdictions hold that
lawyers must disclose
the reason for seeking
to connect with
unrepresented party.
.
19. RESEARCHING
JURORS.
Differing opinions on
passive notifications.
ABA Standing
Committee on Ethics &
Responsibility Opinion
466 (2014):
• Unethical to communicate
with jurors
• Attempts to access jurors’
social media information
behind a privacy walls
impermissible
• Publicly available
information is fair game, &
does not constitute improper
communication in violation of
Rule 3.5(b). It’s similar to
observing a juror from a car
while driving by the juror’s
home
• If improper juror conduct is
discovered, “lawyer must take
reasonable remedial
measures including, if
necessary, disclosure to the
tribunal.”
• Notably, ABA Committee
departed from the New York
Committee’s rationale
regarding passive online
notifications do not
constitute a communication
and thus are not problematic:
“The fact that a juror or a
potential juror may become
aware that the lawyer is
reviewing his Internet
presence when an ESM
network setting notifies the
juror of such review does not
constitute a communication
from the lawyer in violation of
Rule 3.5(b).”
THE NEW YORK
DECISIONS.
NYC Bar Committee
on Professional
Ethics Formal
Opinion 2012-2
(6/12):
• Lawyers can use social media
to research jurors, so long as
jurors unaware of research .
• Passive notification is
communication. If attorney
knew juror would be aware of
monitoring, then it’s unethical.
Even if attorney unaware
notification would be sent, if
juror later learns of
monitoring, then it could be
prohibited communication in
violation of RPE 3.5.
• Attorneys/agents must avoid
deception,
• “In the context of researching
jurors using social media
services, an attorney must
understand and analyze the
relevant technology, privacy
settings and policies of each
social media service used for
jury research.”
NY County
Lawyers
Association
Formal Opinion No.
743 (1/12):
• Attorney or agent may
monitor jurors’ public
postings and accounts on
social media, but connecting
with jurors in order to view
social media postings that are
not viewable by the public is
unethical
• Lawyers must have a
thorough understanding of
the workings of the different
social media platforms in
order to avoid improper
communication with jurors
• Passive notifications are
communications
• If improprieties on the part of
a juror are discovered, the
court must be notified and
the discovery of the
improprieties cannot be used
to gain a tactical advantage.
20. DON’T BE THAT GUY
YOUR OPPONENTS
ARE USING IT. SO
SHOULD YOU.
SOCIAL MEDIA
IS FOR KIDS!
26. Thanks for listening!
Nicole Black
Legal Technology Evangelist
MyCase.com | web-based law
practice management
www.nicoleblackesq.com
@nikiblack on Twitter
Author and co-author of: