SlideShare a Scribd company logo
SOCIAL MEDIA LAW
  The Legal Do’s and Don’ts
       of Social Media

           Presented for
   TrustPoint Management Group
          August 10, 2012
Tweet it up:

           #socialmedialaw

www.brittontuma.com                  #socialmedialaw   2
Notes
    1. Add Pictures

    2. Streamline sections – 45 minutes

    3. Insert Copyright




www.brittontuma.com                       #socialmedialaw   3
4
WHAT IS
SOCIAL MEDIA LAW?




             #socialmedialaw   5
Social Media Law:
            The law that applies to and
            governs the use of social media.

                          (was that all you really wanted to know?)




www.brittontuma.com                                  #socialmedialaw   6
Social Media Law:
         inherent risks
         natural tension between legal and marketing
         BUT!!!
         I am “sold out” on social media and an avid
          user … and I don’t want to get sued either …

www.brittontuma.com                           #socialmedialaw   7
My Goal:
        find an acceptable balance
        educate you on risks of using social media, along
         with other digital business risks
        help show you some ways to minimize those risks
        Remember: social media is a tool – what you say and
         do is much like “real life”
        “Real life” rules still apply – use your common sense!

www.brittontuma.com                                   #socialmedialaw   8
 what is social media law
              traditional areas of law incorporated
              practical examples of how they arise

        how to minimize the risk
              can’t eliminate, only minimize
              social media policies
              workplace training and guidance
              cyber-insurance

        other digital business risks
              data breach & hacking
              computer fraud / Computer Fraud and Abuse Act

        Q&A
www.brittontuma.com                                            #socialmedialaw   9
2 General Types of Law

             Codes: legislatures create specific laws to
              address specific problems

             Common Law: judges look to general
              principles of law and, by using
              reason, apply those principles to resolve
              previously unforeseen problems
www.brittontuma.com                              #socialmedialaw   10
Legislatures want to keep up
              impossible
              speed technology is evolving
              speed culture and business environment changing
              legislature too slow
                    example:
                        last spring the big ruckus was prospective
                        employers asking for social media logins –
                        the massive public outcry made it such that
                        nobody in their right mind would do that now
                        this past week, Illinois became one of 2 states
                        to enact a law prohibiting this; eff. date:
                        1/1/13

www.brittontuma.com                                            #socialmedialaw   11
www.brittontuma.com   #socialmedialaw   12
Look to Common Law
             contract law
             intellectual property law
             torts – defamation
             regulatory law
             employment law
             evidence law

www.brittontuma.com                       #socialmedialaw   13
You can’t protect against what you
        don’t know, so …




www.brittontuma.com                     #socialmedialaw   14
Who uses social media for marketing?
             do you want to give your marketing efforts to
              your competitor?
             who really owns your account
             followers / connections?
             “an ounce of prevention is worth a pound of
              cure”: PhoneDog v. Kravitz (7/15/11)
             each service or site has a contract
             contract law
www.brittontuma.com                                 #socialmedialaw   15
Who has trade secrets, confidential and
        proprietary information?
             do you want to tell your competitors?
             customer / vendor lists
                     who are you talking to or following?

             secret business alliances and strategies
             secret business initiatives and plans
             business situational awareness
             intellectual property law: trade secrets
www.brittontuma.com                                          #socialmedialaw   16
Who wants to get sued?
             infringement of trademark
             infringement of copyright
                     DMCA Takedown Request

             right to publicity
                     name, voice, signature, photo, likeness (statutory after death)
                     common law while living if for value

             must have a license or use creative commons
             intellectual property law

www.brittontuma.com                                                     #socialmedialaw   17
Who wants to get sued some more?
             what you (and your employees) say can hurt you!
             business disparagement
             tortious interference
             defamation (libel & slander)
             false advertising & false warranties
             fraud & negligent misrepresentation
             harassment and cyber-bullying
             “puffery” of facts
www.brittontuma.com                                  #socialmedialaw   18
Who wants to get investigated by the
        Feds?
               FTC – Investigated Hyundai for not disclosing incentives
                given to bloggers for endorsements.
               HHS & OCR – could have investigated hospital employee
                who posted patient pictures and “PHI” on Facebook (“it’s
                just Facebook!”)
               SEC – false statements made in raising funds (SEC v.
                Imperia Invest. IBC) or wrongful disclosures of information
               regulatory law


www.brittontuma.com                                            #socialmedialaw   19
What are some real trouble spots?
             Giveaways and contests can be trouble for many
              reasons – do not do them on social media
              without having it thoroughly vetted
                     many sites’ TOS prohibit
                     jurisdiction gambling and contest rules
             Employment issues are one of the main areas in
              which legal and general business problems arise
                     Discussed in next section



www.brittontuma.com                                             #socialmedialaw   20
Can you guess what will be used against you if
        any of these problems arise?
             social media is evidence – very powerful evidence!
             electronically stored information (“ESI”) is quickly
              becoming the most useful form of evidence
              available
             evidence from social media is now obtained and
              used in virtually every kind of lawsuit and
              investigation
             we now have complete records of 2-way
              communication stream – like all calls recorded!
www.brittontuma.com                                     #socialmedialaw   21
MINIMIZING THE
 RISKS OF SOCIAL
MEDIA IN BUSINESS




             #socialmedialaw   22
Social media policies are a “must have”
                ounce of prevention: less than 1 day of litigation
                if have, must enforce
                trying to predict issues – but evolving – can’t get all
                contractually resolve issues such as ownership and
                 authority
                great opportunity to set rules and document expectations
                greater opportunity to explain and ensure understanding
                 of expectations
                put on notice of monitoring – and actually monitor!
                should address employment issues


www.brittontuma.com                                         #socialmedialaw   23
Employment Issues
             using social media in hiring
                 best to have set criteria with neutral third
                  party investigate for criteria
                 not use to discriminate
                         e.g., snooping to find
                          race, gender, age, disability, pregnancy
                         e.g., search for candidates on Twitter where
                          disproportionate number of people <40 yrs. on
                          Twitter, may violate the Age Discrimination in
                          Employment Act

                 requesting social media login information
www.brittontuma.com                                                  #socialmedialaw   24
Employment Issues
             using social media for the company
                     scope of work for duties and times
                         e.g., overtime for weekend “Facebooking”
                     personal or company owned accounts / followers
                     familiarity and compliance with site Agreement / TOS
                     what is authorized / prohibited
                     responsibility for statements / disclosures
                     monitored
                     saying “use good judgment” is not enough!
www.brittontuma.com                                                  #socialmedialaw   25
Employment Issues
             using personal social media during work
                     can be prohibited
                     may prohibit using or disclosing company IP for
                      personal SM
                     may prohibit using company info for setting up
                      personal SM accounts




www.brittontuma.com                                             #socialmedialaw   26
You need social media policies but the National
        Labor Relations Board is making it difficult
               NLRB jurisdiction = impacts interstate commerce
               National Labor Relations Act (NLRA) sec. 7 gives employees
                right to engage in “concerted activities for the purpose of …
                mutual aid and protection”
               NLRB finds illegal any policy provision that (a) restricts or (b)
                an employee would reasonably construe to chill concerted
                activities
               On 5/30/12 NLRB General Counsel issued its 3rd Report on
                Social Media Policies in 1 year period (8/11 & 1/12)


www.brittontuma.com                                               #socialmedialaw   27
Can you guess who the NLRB is pulling for?
             making it very difficult for businesses to protect
              themselves
             social media policies must now be carefully tailored
              to
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             Examples of provisions found illegal by NLRB


www.brittontuma.com                                                 #socialmedialaw   28
www.brittontuma.com   #socialmedialaw   29
www.brittontuma.com   #socialmedialaw   30
www.brittontuma.com   #socialmedialaw   31
What is the NLRB really looking for?
             clarity and precision
             examples of do’s and don’ts that give
              context and real-life meaning to the rules




www.brittontuma.com                             #socialmedialaw   32
MINIMIZING OTHER
DIGITAL BUSINESS
      RISKS




            #socialmedialaw   33
Cyber-Insurance
               If you are doing anything in cyberspace, you need it.
                Period.
               Most traditional insurance does not cover cyber-
                events, even if you think it does (really!)
               Cyber-Insurance is relatively inexpensive
               Most policies come include a cyber-risk audit before the
                policies are underwritten
               Policies can cover social media risk, computer fraud
                risk, and data breach / hacking risk



www.brittontuma.com                                            #socialmedialaw   34
Customer Information – do you retain it on your
         system?
                 Data Breach
                 Effective 9/1/12, if you conduct business in Texas and your system
                  is breached and your customer’s unencrypted “sensitive personal
                  information” is, or is reasonably believed to have been
                  compromised, must notify all Texas residents of breach.
                 The notice must be given “as quickly as possible” and failure or
                  delay in doing so results in a fine of $100.00 per individual per day
                  (not to exceed $250,000)
                Notice may be made through written or electronic means though
                 it can be given by major media outlets if the cost of providing
                 notice exceeds $250,000 or the number of persons exceeds
                 500,000
www.brittontuma.com                                                    #socialmedialaw    35
www.brittontuma.com   #socialmedialaw   36
www.brittontuma.com   #socialmedialaw   37
Why is the Computer Fraud
                      and Abuse Act important?


       Primary Law for Misuse of Computers
       Computers …



www.brittontuma.com                       #socialmedialaw   38
“Everything has a
          computer in it nowadays.”
                            -Steve Jobs




www.brittontuma.com             #socialmedialaw   39
The CFAA says
          has a processor or stores data

               “the term ‘computer’ means an
               electronic, magnetic, optical, electrochemical, or other high
               speed data processing device performing logical, arithmetic, or
               storage functions, and includes any data storage facility or
               communications facility directly related to or operating in
               conjunction with such device, but …”

          “such term does not include an automated typewriter or
          typesetter, a portable hand held calculator, or other similar
          device;”

www.brittontuma.com                                              #socialmedialaw   40
What about




www.brittontuma.com   #socialmedialaw   41
The CFAA applies only to “protected” computers

         This may limit the problem of applying it to alarm
         clocks, toasters, and coffee makers

         Protected = connected to the Internet

        Any situations where these devices are connected?



www.brittontuma.com                                   #socialmedialaw   42
• TI-99               • Leap Frog Leapster   • iPhone 4
    • 3.3 MHz Processor   • 96 MHz Processor     • 800 MHz Processer
    • 16 KB of RAM        • 128 MB of RAM        • 512 MB of RAM



www.brittontuma.com                                   #socialmedialaw   43
The CFAA prohibits wrongfully accessing
     a computer where the access
            Obtains information
            Commits a fraud
            Obtains something of value
            Transmits damaging information
            Causes damage
            Traffics in passwords
            Commits extortion


www.brittontuma.com                           #socialmedialaw   44
 social media is wonderful!
             must find proper balance
             need a social media policy
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             need to enforce social media policy
             need to spend time with employees to help them
              understand and possibly collaborate on the rules
             need to look at cyber-insurance!
www.brittontuma.com                                                 #socialmedialaw   45
www.brittontuma.com   #socialmedialaw   46

More Related Content

What's hot

Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
jessy0121
 
Social Media & it's Impact in Today's World
Social Media & it's Impact in Today's WorldSocial Media & it's Impact in Today's World
Social Media & it's Impact in Today's World
Stephen Mokiwa
 
Power of social media
Power of social mediaPower of social media
Power of social media
karamnav
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
AyanaRukasar
 
The Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth PowerpointThe Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth Powerpoint
charmaine03
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
clifforddyyy
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
cyberbullyingisreal
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
LIFARS
 
The Psychology of Social Media
The Psychology of Social MediaThe Psychology of Social Media
The Psychology of Social Media
CLARENCE APOSTOL, CHRMP, CHRM, CIRS, IADT
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
DaliahSaper
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
disadvantages of Social networking
 disadvantages of Social networking  disadvantages of Social networking
disadvantages of Social networking
shrikant5
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
pamelazuley
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Communication-vs-social-media.pptxdd-2.pptx
Communication-vs-social-media.pptxdd-2.pptxCommunication-vs-social-media.pptxdd-2.pptx
Communication-vs-social-media.pptxdd-2.pptx
MontassarTayachi
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social media
ememdesign
 
Child protection (Sexual Abuse)
Child protection (Sexual Abuse)Child protection (Sexual Abuse)
Child protection (Sexual Abuse)
Paul Poore
 

What's hot (20)

Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Social Media & it's Impact in Today's World
Social Media & it's Impact in Today's WorldSocial Media & it's Impact in Today's World
Social Media & it's Impact in Today's World
 
Power of social media
Power of social mediaPower of social media
Power of social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
The Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth PowerpointThe Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth Powerpoint
 
What is Social Media
What is Social MediaWhat is Social Media
What is Social Media
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
The Psychology of Social Media
The Psychology of Social MediaThe Psychology of Social Media
The Psychology of Social Media
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
disadvantages of Social networking
 disadvantages of Social networking  disadvantages of Social networking
disadvantages of Social networking
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Communication-vs-social-media.pptxdd-2.pptx
Communication-vs-social-media.pptxdd-2.pptxCommunication-vs-social-media.pptxdd-2.pptx
Communication-vs-social-media.pptxdd-2.pptx
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social media
 
Child protection (Sexual Abuse)
Child protection (Sexual Abuse)Child protection (Sexual Abuse)
Child protection (Sexual Abuse)
 

Viewers also liked

Social Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal IndustrySocial Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal Industry
6S Marketing
 
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
Rakesh Manoharan
 
Professionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth CurveProfessionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth Curve
Michelle Smyth
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should Know
Srinath Srinivasa
 
The Roles of Social Media Channels
The Roles of Social Media ChannelsThe Roles of Social Media Channels
The Roles of Social Media Channels
Michelle Smyth
 
Healthcare, Social Media and Risk Management
Healthcare, Social Media and Risk ManagementHealthcare, Social Media and Risk Management
Healthcare, Social Media and Risk Management
Ed Bennett
 
Role of media in promoting tourism
Role of media in promoting tourismRole of media in promoting tourism
Role of media in promoting tourism
dilipkumar patil
 
Social Media for Law Firms
Social Media for Law FirmsSocial Media for Law Firms
Social Media for Law Firms6S Marketing
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
MyCase Legal Case and Practice Management Software
 
01 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 101 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 1
Alleyn's School Film Studies Department
 
Role of media in social awareness
Role of media in social awarenessRole of media in social awareness
Role of media in social awareness
shubham saini
 
role of media in society
role of media in societyrole of media in society
role of media in societyAnamika Pandey
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
Altimeter, a Prophet Company
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
Nicole Black
 
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
LinkedIn
 
Future Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social MediaFuture Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social Media
We Are Social Singapore
 
Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.
LinkedIn
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
Sean Si
 

Viewers also liked (18)

Social Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal IndustrySocial Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal Industry
 
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
 
Professionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth CurveProfessionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth Curve
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should Know
 
The Roles of Social Media Channels
The Roles of Social Media ChannelsThe Roles of Social Media Channels
The Roles of Social Media Channels
 
Healthcare, Social Media and Risk Management
Healthcare, Social Media and Risk ManagementHealthcare, Social Media and Risk Management
Healthcare, Social Media and Risk Management
 
Role of media in promoting tourism
Role of media in promoting tourismRole of media in promoting tourism
Role of media in promoting tourism
 
Social Media for Law Firms
Social Media for Law FirmsSocial Media for Law Firms
Social Media for Law Firms
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
01 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 101 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 1
 
Role of media in social awareness
Role of media in social awarenessRole of media in social awareness
Role of media in social awareness
 
role of media in society
role of media in societyrole of media in society
role of media in society
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
 
Future Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social MediaFuture Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social Media
 
Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
 

Similar to Social Media Law: The Legal Do's and Don'ts of Social Media

Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)
Shawn Tuma
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
Nexus Publishing
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentationMelfi Associates
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
Kerry Rego
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
Brian Huonker
 
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Bernard Marr
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
IFLP
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
David Cain
 
Legal Risks of Social Media
Legal Risks of Social MediaLegal Risks of Social Media
Legal Risks of Social Media
Andrew Tibber
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
Kenneth Ronkowitz
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
shibrah76
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
DMAI's Destinations Showcase
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
Stacey Burke
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
Glenn Manishin
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
McPhearson TVHolden
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
Somerco Research
 

Similar to Social Media Law: The Legal Do's and Don'ts of Social Media (20)

Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
Legal Risks of Social Media
Legal Risks of Social MediaLegal Risks of Social Media
Legal Risks of Social Media
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 

More from Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
Shawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Shawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
Shawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
Shawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
Shawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
Shawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Shawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
Shawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
Shawn Tuma
 

More from Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Social Media Law: The Legal Do's and Don'ts of Social Media

  • 1. SOCIAL MEDIA LAW The Legal Do’s and Don’ts of Social Media Presented for TrustPoint Management Group August 10, 2012
  • 2. Tweet it up: #socialmedialaw www.brittontuma.com #socialmedialaw 2
  • 3. Notes 1. Add Pictures 2. Streamline sections – 45 minutes 3. Insert Copyright www.brittontuma.com #socialmedialaw 3
  • 4. 4
  • 5. WHAT IS SOCIAL MEDIA LAW? #socialmedialaw 5
  • 6. Social Media Law: The law that applies to and governs the use of social media. (was that all you really wanted to know?) www.brittontuma.com #socialmedialaw 6
  • 7. Social Media Law:  inherent risks  natural tension between legal and marketing  BUT!!!  I am “sold out” on social media and an avid user … and I don’t want to get sued either … www.brittontuma.com #socialmedialaw 7
  • 8. My Goal:  find an acceptable balance  educate you on risks of using social media, along with other digital business risks  help show you some ways to minimize those risks  Remember: social media is a tool – what you say and do is much like “real life”  “Real life” rules still apply – use your common sense! www.brittontuma.com #socialmedialaw 8
  • 9.  what is social media law  traditional areas of law incorporated  practical examples of how they arise  how to minimize the risk  can’t eliminate, only minimize  social media policies  workplace training and guidance  cyber-insurance  other digital business risks  data breach & hacking  computer fraud / Computer Fraud and Abuse Act  Q&A www.brittontuma.com #socialmedialaw 9
  • 10. 2 General Types of Law  Codes: legislatures create specific laws to address specific problems  Common Law: judges look to general principles of law and, by using reason, apply those principles to resolve previously unforeseen problems www.brittontuma.com #socialmedialaw 10
  • 11. Legislatures want to keep up  impossible  speed technology is evolving  speed culture and business environment changing  legislature too slow example: last spring the big ruckus was prospective employers asking for social media logins – the massive public outcry made it such that nobody in their right mind would do that now this past week, Illinois became one of 2 states to enact a law prohibiting this; eff. date: 1/1/13 www.brittontuma.com #socialmedialaw 11
  • 12. www.brittontuma.com #socialmedialaw 12
  • 13. Look to Common Law  contract law  intellectual property law  torts – defamation  regulatory law  employment law  evidence law www.brittontuma.com #socialmedialaw 13
  • 14. You can’t protect against what you don’t know, so … www.brittontuma.com #socialmedialaw 14
  • 15. Who uses social media for marketing?  do you want to give your marketing efforts to your competitor?  who really owns your account  followers / connections?  “an ounce of prevention is worth a pound of cure”: PhoneDog v. Kravitz (7/15/11)  each service or site has a contract  contract law www.brittontuma.com #socialmedialaw 15
  • 16. Who has trade secrets, confidential and proprietary information?  do you want to tell your competitors?  customer / vendor lists  who are you talking to or following?  secret business alliances and strategies  secret business initiatives and plans  business situational awareness  intellectual property law: trade secrets www.brittontuma.com #socialmedialaw 16
  • 17. Who wants to get sued?  infringement of trademark  infringement of copyright  DMCA Takedown Request  right to publicity  name, voice, signature, photo, likeness (statutory after death)  common law while living if for value  must have a license or use creative commons  intellectual property law www.brittontuma.com #socialmedialaw 17
  • 18. Who wants to get sued some more?  what you (and your employees) say can hurt you!  business disparagement  tortious interference  defamation (libel & slander)  false advertising & false warranties  fraud & negligent misrepresentation  harassment and cyber-bullying  “puffery” of facts www.brittontuma.com #socialmedialaw 18
  • 19. Who wants to get investigated by the Feds?  FTC – Investigated Hyundai for not disclosing incentives given to bloggers for endorsements.  HHS & OCR – could have investigated hospital employee who posted patient pictures and “PHI” on Facebook (“it’s just Facebook!”)  SEC – false statements made in raising funds (SEC v. Imperia Invest. IBC) or wrongful disclosures of information  regulatory law www.brittontuma.com #socialmedialaw 19
  • 20. What are some real trouble spots?  Giveaways and contests can be trouble for many reasons – do not do them on social media without having it thoroughly vetted  many sites’ TOS prohibit  jurisdiction gambling and contest rules  Employment issues are one of the main areas in which legal and general business problems arise  Discussed in next section www.brittontuma.com #socialmedialaw 20
  • 21. Can you guess what will be used against you if any of these problems arise?  social media is evidence – very powerful evidence!  electronically stored information (“ESI”) is quickly becoming the most useful form of evidence available  evidence from social media is now obtained and used in virtually every kind of lawsuit and investigation  we now have complete records of 2-way communication stream – like all calls recorded! www.brittontuma.com #socialmedialaw 21
  • 22. MINIMIZING THE RISKS OF SOCIAL MEDIA IN BUSINESS #socialmedialaw 22
  • 23. Social media policies are a “must have”  ounce of prevention: less than 1 day of litigation  if have, must enforce  trying to predict issues – but evolving – can’t get all  contractually resolve issues such as ownership and authority  great opportunity to set rules and document expectations  greater opportunity to explain and ensure understanding of expectations  put on notice of monitoring – and actually monitor!  should address employment issues www.brittontuma.com #socialmedialaw 23
  • 24. Employment Issues  using social media in hiring  best to have set criteria with neutral third party investigate for criteria  not use to discriminate  e.g., snooping to find race, gender, age, disability, pregnancy  e.g., search for candidates on Twitter where disproportionate number of people <40 yrs. on Twitter, may violate the Age Discrimination in Employment Act  requesting social media login information www.brittontuma.com #socialmedialaw 24
  • 25. Employment Issues  using social media for the company  scope of work for duties and times  e.g., overtime for weekend “Facebooking”  personal or company owned accounts / followers  familiarity and compliance with site Agreement / TOS  what is authorized / prohibited  responsibility for statements / disclosures  monitored  saying “use good judgment” is not enough! www.brittontuma.com #socialmedialaw 25
  • 26. Employment Issues  using personal social media during work  can be prohibited  may prohibit using or disclosing company IP for personal SM  may prohibit using company info for setting up personal SM accounts www.brittontuma.com #socialmedialaw 26
  • 27. You need social media policies but the National Labor Relations Board is making it difficult  NLRB jurisdiction = impacts interstate commerce  National Labor Relations Act (NLRA) sec. 7 gives employees right to engage in “concerted activities for the purpose of … mutual aid and protection”  NLRB finds illegal any policy provision that (a) restricts or (b) an employee would reasonably construe to chill concerted activities  On 5/30/12 NLRB General Counsel issued its 3rd Report on Social Media Policies in 1 year period (8/11 & 1/12) www.brittontuma.com #socialmedialaw 27
  • 28. Can you guess who the NLRB is pulling for?  making it very difficult for businesses to protect themselves  social media policies must now be carefully tailored to  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  Examples of provisions found illegal by NLRB www.brittontuma.com #socialmedialaw 28
  • 29. www.brittontuma.com #socialmedialaw 29
  • 30. www.brittontuma.com #socialmedialaw 30
  • 31. www.brittontuma.com #socialmedialaw 31
  • 32. What is the NLRB really looking for?  clarity and precision  examples of do’s and don’ts that give context and real-life meaning to the rules www.brittontuma.com #socialmedialaw 32
  • 33. MINIMIZING OTHER DIGITAL BUSINESS RISKS #socialmedialaw 33
  • 34. Cyber-Insurance  If you are doing anything in cyberspace, you need it. Period.  Most traditional insurance does not cover cyber- events, even if you think it does (really!)  Cyber-Insurance is relatively inexpensive  Most policies come include a cyber-risk audit before the policies are underwritten  Policies can cover social media risk, computer fraud risk, and data breach / hacking risk www.brittontuma.com #socialmedialaw 34
  • 35. Customer Information – do you retain it on your system?  Data Breach  Effective 9/1/12, if you conduct business in Texas and your system is breached and your customer’s unencrypted “sensitive personal information” is, or is reasonably believed to have been compromised, must notify all Texas residents of breach.  The notice must be given “as quickly as possible” and failure or delay in doing so results in a fine of $100.00 per individual per day (not to exceed $250,000)  Notice may be made through written or electronic means though it can be given by major media outlets if the cost of providing notice exceeds $250,000 or the number of persons exceeds 500,000 www.brittontuma.com #socialmedialaw 35
  • 36. www.brittontuma.com #socialmedialaw 36
  • 37. www.brittontuma.com #socialmedialaw 37
  • 38. Why is the Computer Fraud and Abuse Act important?  Primary Law for Misuse of Computers  Computers … www.brittontuma.com #socialmedialaw 38
  • 39. “Everything has a computer in it nowadays.” -Steve Jobs www.brittontuma.com #socialmedialaw 39
  • 40. The CFAA says has a processor or stores data “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …” “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;” www.brittontuma.com #socialmedialaw 40
  • 41. What about www.brittontuma.com #socialmedialaw 41
  • 42. The CFAA applies only to “protected” computers This may limit the problem of applying it to alarm clocks, toasters, and coffee makers Protected = connected to the Internet Any situations where these devices are connected? www.brittontuma.com #socialmedialaw 42
  • 43. • TI-99 • Leap Frog Leapster • iPhone 4 • 3.3 MHz Processor • 96 MHz Processor • 800 MHz Processer • 16 KB of RAM • 128 MB of RAM • 512 MB of RAM www.brittontuma.com #socialmedialaw 43
  • 44. The CFAA prohibits wrongfully accessing a computer where the access  Obtains information  Commits a fraud  Obtains something of value  Transmits damaging information  Causes damage  Traffics in passwords  Commits extortion www.brittontuma.com #socialmedialaw 44
  • 45.  social media is wonderful!  must find proper balance  need a social media policy  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  need to enforce social media policy  need to spend time with employees to help them understand and possibly collaborate on the rules  need to look at cyber-insurance! www.brittontuma.com #socialmedialaw 45
  • 46. www.brittontuma.com #socialmedialaw 46