This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
Digital Age: Changes and Challenges in CommunicationZigurds Zakis
Supporting slides of my presentation in Art Director Club Russia (ADCR) Campus. In fact, a modification of ideas from few of my previous digital presentations adapted to particual audience and task.
The Dark Side of Social Media: Legal Issues
Legal Aspects of Abuse and Misuse of Social Media
(Facebook, Twitter, etc.)
Final project of Legal Aspects of Information Systems courses
By mprabuw & Said Altinsik
According to the Delhi Police, crimes by children in the 16-18 year age category are on the rise. This indeed is going to be a common phenomenon in the years to come by, particularly because there is very little being done in terms of reaching out the young and the adolescent with ways that help them deal with themselves and their situation better. Once into crime, getting out is not easy for anyone, including children. But the very purpose of the juvenile justice legislation in India is to provide these young people with opportunities to change before it is too late.
HAQ: Center for Child Rights
B1/2, Ground Floor,
Malviya Nagar
New Delhi - 110017
Tel: +91-26677412,26673599
Fax: +91-26674688
Website: www.haqcrc.org
FaceBook Page: https://www.facebook.com/HaqCentreForChildRights
Digital Age: Changes and Challenges in CommunicationZigurds Zakis
Supporting slides of my presentation in Art Director Club Russia (ADCR) Campus. In fact, a modification of ideas from few of my previous digital presentations adapted to particual audience and task.
The Dark Side of Social Media: Legal Issues
Legal Aspects of Abuse and Misuse of Social Media
(Facebook, Twitter, etc.)
Final project of Legal Aspects of Information Systems courses
By mprabuw & Said Altinsik
According to the Delhi Police, crimes by children in the 16-18 year age category are on the rise. This indeed is going to be a common phenomenon in the years to come by, particularly because there is very little being done in terms of reaching out the young and the adolescent with ways that help them deal with themselves and their situation better. Once into crime, getting out is not easy for anyone, including children. But the very purpose of the juvenile justice legislation in India is to provide these young people with opportunities to change before it is too late.
HAQ: Center for Child Rights
B1/2, Ground Floor,
Malviya Nagar
New Delhi - 110017
Tel: +91-26677412,26673599
Fax: +91-26674688
Website: www.haqcrc.org
FaceBook Page: https://www.facebook.com/HaqCentreForChildRights
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
Public Speaking
Topic : Cyberbullying
Subject: English
I use this powerpoint as visual to my public speaking. Feel free to leave your comments :) Thank you
ERHS
G10 ZIRCON
16'-17'
Powerpoint 2016
A presentation given by LIFARS at a conference MEPA EU Police Academy conference on May 2016. It covers the dangers that the internet and social media pose to children and adolescents. More and more, we're seeing that social media are opening the gates to cyberbullying, cyber extortion, sextortion, cyber stalking and more. Any parts of this presentation can be adopted and reused as long as attribution is given. For inquiries, please contact pr@lifars.com.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
with Melissa Morgan (www.ememdesign.com)
An introduction to gauging the impact of social-media on society in this media saturated, hyper-networked, über-techie, digitally innovative world.
This powerpoint provides an overview of the scope of the problem of the sexual abuse of minors, a profile of child predators and the grooming of their victims, and promotes the necessity of developing laws and sexual predator registries worldwide.
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
Public Speaking
Topic : Cyberbullying
Subject: English
I use this powerpoint as visual to my public speaking. Feel free to leave your comments :) Thank you
ERHS
G10 ZIRCON
16'-17'
Powerpoint 2016
A presentation given by LIFARS at a conference MEPA EU Police Academy conference on May 2016. It covers the dangers that the internet and social media pose to children and adolescents. More and more, we're seeing that social media are opening the gates to cyberbullying, cyber extortion, sextortion, cyber stalking and more. Any parts of this presentation can be adopted and reused as long as attribution is given. For inquiries, please contact pr@lifars.com.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
with Melissa Morgan (www.ememdesign.com)
An introduction to gauging the impact of social-media on society in this media saturated, hyper-networked, über-techie, digitally innovative world.
This powerpoint provides an overview of the scope of the problem of the sexual abuse of minors, a profile of child predators and the grooming of their victims, and promotes the necessity of developing laws and sexual predator registries worldwide.
Keeping client confidences secure in the digital age is not always easy, but it certainly is necessary. It seems like there’s always some new technology tool or gadget that lawyers are told they “have to” learn. This program covers how to ethically use today’s technology and what emerging tools are important for lawyers to consider.
Social media is the modern Pandora’s box: it has had a meteoric rise as a tool to interact and engage with customers, but also a dark underside exposing companies to new types of risk. Almost two-thirds of companies surveyed say that social media is a significant or critical risk to their brand reputation, yet 60% of companies either never train their employees about their corporate social media policies or do so only upon hiring. This report outlines how to be more proactive about managing social media risk through following a detailed four-step process: Identify, Assess, Mitigate, and Evaluate.
Priming the Economic Engine: How Social Media is Driving Growth for Small and...LinkedIn
8 out of 10 small and medium businesses (SMBs) use social media, and 68% of them are using it to inform financial decisions — presenting a golden opportunity for finance marketers to deliver relevant, useful content. Find out how in this research study from LinkedIn and TNS.
Download the full whitepaper at http://lnkd.in/SMB-research
The social media landscape is changing so fast that most marketers struggle to keep up. To make things easier, we've distilled the many conversations we've been having with clients in recent months into 10 key trends you need to understand in order to improve your social ROI. To read our extensive write-up to accompany these slides, please visit http://bit.ly/wasfs10
Publish. Share Your Expertise. Drive Engagement.LinkedIn
Maya Pope-Chappell talks about how university leaders, faculty and administrators are using LinkedIn's publishing platform to share their insights, perspectives and expertise.
How to Use Social Media to Influence the WorldSean Si
Here's the deck to my talk for the 23rd ASA Congress which was at The Grand Ballroom of Marriott Hotel. It was an awesome experience and I only had two points:
1) Use social media for good and
2) You have to have authority to use social media influentially.
My company: https://seo-hacker.net
Social Media Law - Marketing Executives Networking Group (MENG)Shawn Tuma
This presentation was made to Marketing Executives Networking Group (MENG) - Dallas on November 9, 2012.
The presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
This legally focused MENGinar will educate you on the risks of using Social Media along with other digital businesses. It will provide ways to help highlight:
What is social media law?
What are the more common legal issues related to businesses using social media?
How social media law can impact businesses?
What can be done to minimize the risks of those potential legal problems related to using social media?
Do the potential issues raised by using social media mean that it is better for my company to not use social media?
Shawn Tuma is a partner at the law firm BrittonTuma, a full service boutique business law firm that helps clients with all civil matters, including a full range of transaction, litigation, technology, and general counseling services. Shawn’s own broad based experience centers on business, technology, civil litigation, intellectual property litigation, and a unique expertise with cutting-edge legal issues such as computer fraud, information security, and cyber and information law.
Shawn is a frequent speaker on digital business risk issues such as computer fraud, data security, and social media law.
Turnson Point Risks and Reputation Management presentationKerry Rego
Judith Delaney of TurnsonPoint Consulting spoke at Kerry Rego Consulting hosted event "Risks and Reputation Management: Using Social Media to Protect Your Brand" on March 13, 2012. She covered legals risks for individuals and businesses when using the internet and social media. Posted with Turnson Point permission. Visit http://www.turnsonpoint.com or http://kerryregoconsulting.com/2011/12/22/risks-reputation-management-using-social-media-to-protect-your-brand/
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Social networking tools are used by advertisers and marketers, by human resources departments, and of course by job-seekers and employees.
For many companies, the question now is not whether to use social media in its business, but how.
And as with any new aspect of doing business, there are several potential pitfalls that a company must be aware of to avoid running into legal difficulties.
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Bernard Marr
Where politics and technology intersect was the topic of barrister, speaker and author Jamie Susskind’s book Future Politics: Living Together in a World Transformed by Tech. In a recent conversation, I discussed with Susskind the power of technology and its relationship with politics to transform our future.
Social media can create relevance and connect you to your audience, but does it create legal issues for your organization as well? Learn more about social media and what legal issues you need to be aware of.
Social media is redefining the relationships between organizations and their audiences, and it introduces new ethical, privacy, and legal issues. As an organization, an employee and an individual user, we need to have a better understanding of the ethics, and also the law, as it applies in these new contexts. Pre-existing media law about copyright and fair use was not written with social media in mind, so changes and interpretations are necessary.
A global Digital Magna Carta that lays the foundation for everyone’s access to internet is beneficial for trade and social exchange. Since internet is very accessible to all, privacy concerns for people and companies is important to protect. However, there will be exemptions to privacy concerns when technology increases the user experience and make it easier to use internet. Other cases of exemptions will be when it greatly benefit the functioning of society and such examples includes the health sector and the rescue services.
Similar to Social Media Law: The Legal Do's and Don'ts of Social Media (20)
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
Shawn Tuma, a professional "breach guide" (aka, breach quarterback, coach, privacy counsel, etc), is an attorney who has practiced in cyber law since 1999. His day job as Co-Chair of Spencer Fane LLP's Data Privacy and Cybersecurity Practice is leading companies through the cyber incident response and recovery process. In this presentation, he provides a virtual tabletop exercise explaining the lifecycle of responding to a typical ransomware attack through a detailed timeline.
The audio for this presentation, in podcast form, is here: https://www.secureworldexpo.com/resources/podcast-ransomware-attack-lifecycle
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, was a guest lecturer on this topic at Southern Methodist University Digital Branding Class on October 27, 2020.
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, was a guest lecturer on this topic at Columbia University for the Executive Masters of Technology Management Program on November 21, 2020.
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, presented on this topic at the 2020 Northwestern State University's Fall Continuing Legal Education Conference on November 18, 2020.
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, presented on this topic at the 2020 Dallas Baptist University Reimagine Technology Conference course in Dallas, Texas on November 18, 2020.
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, presented on this topic at the 2020 Texas Bar CLE's Making and Breaking Iron-Clad Contracts course in Austin, Texas on March 6, 2020.
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
Shawn Tuma delivered this presentation on April 9, 2019, at the Oklahoma State University 4th Annual Cyber Security Conference in Oklahoma City, Oklahoma.
In twenty years of practicing cyber law, Shawn Tuma has seen a multitude of cybersecurity and data breach cases that have helped him understand the real-world risks companies face and the practical things they can do to prioritize their resources and effectively manage cyber risk. In this presentation, he will share his experience on issues such as:
· Why cybersecurity is an overall business risk issue that must be properly managed to comply with laws and regulations
· Why strategic leadership is critical in cybersecurity
· Why teams are critical for cybersecurity and how to personalities and psychology can impact that team
· The most likely real-world risks that most companies face
· How to prioritize limited resources to effectively manage the most likely real-world risks
· What is reasonable cybersecurity
· How to develop, implement, and mature a cyber risk management program
· Why cyber insurance is a critical component of the cyber risk management process
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
Renaissance Executive Forums 2019 CEO Summit presentation by Shawn E. Tuma, Co-Chair, Data Privacy & Cybersecurity Group, Spencer Fane, LLP
March 7, 2019
Dallas, Texas
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
Spencer Fane LLP Cybersecurity and Data Privacy attorney Shawn Tuma delivered "The Legal Case for Cyber Risk Management Programs and What They Should Include" at the Texas Society of Certified Public Accountants' TSCPA CPE 2018 CPE Expo Conference on November 30, 2018, in Addison, Texas.
As an attorney serving as a guide for companies that have data breaches, I regularly advise clients through the data breach incident response process. Here is a checklist that I developed to give them a roadmap for how this process works, on a single page. While this is not an exhaustive list, these are the items that most often need to be performed in the cases in which I guide clients through the incident response and remediation process. Of course, there will be exceptions, additions, and omissions — take this for what it is, a starting point. Another important point to remember is that this is just a checklist, it is not a cybersecurity incident response plan. Fore more information see https://shawnetuma.com/incident-response-checklist/
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
Shawn E. Tuma, cybersecurity and data privacy attorney at Spencer Fane, LLP, delivered the presentation titled "Cybersecurity: Cyber Risk Management for Lawyers and Clients" at the Texas Bar CLE's 16th Annual Advanced Business Law Course on November 8, 2018.
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
Cybersecurity is a Team Sport: Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams.
This presentation was a discussion of issues such as:
* Who should be on the team and what should they know?
* How should the team be organized?
* Who is responsible for developing the strategy and seeing the whole playing field?
* What are the team members responsibilities?
* How do team members personalities affect their roles and performance?
* Is there a role for lawyers if the "privilege" "magic wand" turns out to be more fairy-tale than reality?
The presentation was delivered by cybersecurity and data privacy attorney Shawn Tuma, Co-Chair of the Cybersecurity and Data Privacy Practice Group of Spencer Fane LLP, on October 10, 2018, at SecureWorld - Dallas.
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
Everyone should now understand that no bank or financial institution is immune from cyber risk. Many are now ready to move forward with improving their cyber risk posture but do not know what to do next or how to prioritize their resources. Recognizing that cybersecurity is an overall business risk issue that must be properly managed to comply with many laws and regulations governing banks and financial institutions, this presentation will provide a strategy for how to better understand and manage such risks by:
(1) Providing an overview of the legal and regulatory framework;
(2) Examining the most likely real-world risks; and
(3) Providing strategies for how to manage such risks, including cyber insurance and the development and implementation of an appropriate cyber risk management program (which is not as difficult as it sounds).
Shawn E. Tuma, cybersecurity and data privacy attorney at Spencer Fane, LLP, delivered the presentation titled Cybersecurity: Cyber Risk Management for Banks & Financial Institutions (and Attorneys Who Represent Them) at the Southwest Association of Bank Counsel 42nd Annual Convention on September 20, 2018 (formerly, Texas Association of Bank Counsel).
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
Reginald A. Hirsch and Shawn E. Tuma presented this talk at the Annual Meeting of the State Bar of Texas for the Law Practice Management Section of the State Bar of Texas. The date of the talk was June 22, 2018, and the location was Houston, Texas.
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
Cybersecurity & Data Privacy attorney Shawn Tuma delivered this presentation to the Mid-Year Meeting of the State Bar of Oklahoma's Intellectual Property Law Section on June 2, 2018. For more information visit www.shawnetuma.com
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
6. Social Media Law:
The law that applies to and
governs the use of social media.
(was that all you really wanted to know?)
www.brittontuma.com #socialmedialaw 6
7. Social Media Law:
inherent risks
natural tension between legal and marketing
BUT!!!
I am “sold out” on social media and an avid
user … and I don’t want to get sued either …
www.brittontuma.com #socialmedialaw 7
8. My Goal:
find an acceptable balance
educate you on risks of using social media, along
with other digital business risks
help show you some ways to minimize those risks
Remember: social media is a tool – what you say and
do is much like “real life”
“Real life” rules still apply – use your common sense!
www.brittontuma.com #socialmedialaw 8
9. what is social media law
traditional areas of law incorporated
practical examples of how they arise
how to minimize the risk
can’t eliminate, only minimize
social media policies
workplace training and guidance
cyber-insurance
other digital business risks
data breach & hacking
computer fraud / Computer Fraud and Abuse Act
Q&A
www.brittontuma.com #socialmedialaw 9
10. 2 General Types of Law
Codes: legislatures create specific laws to
address specific problems
Common Law: judges look to general
principles of law and, by using
reason, apply those principles to resolve
previously unforeseen problems
www.brittontuma.com #socialmedialaw 10
11. Legislatures want to keep up
impossible
speed technology is evolving
speed culture and business environment changing
legislature too slow
example:
last spring the big ruckus was prospective
employers asking for social media logins –
the massive public outcry made it such that
nobody in their right mind would do that now
this past week, Illinois became one of 2 states
to enact a law prohibiting this; eff. date:
1/1/13
www.brittontuma.com #socialmedialaw 11
13. Look to Common Law
contract law
intellectual property law
torts – defamation
regulatory law
employment law
evidence law
www.brittontuma.com #socialmedialaw 13
14. You can’t protect against what you
don’t know, so …
www.brittontuma.com #socialmedialaw 14
15. Who uses social media for marketing?
do you want to give your marketing efforts to
your competitor?
who really owns your account
followers / connections?
“an ounce of prevention is worth a pound of
cure”: PhoneDog v. Kravitz (7/15/11)
each service or site has a contract
contract law
www.brittontuma.com #socialmedialaw 15
16. Who has trade secrets, confidential and
proprietary information?
do you want to tell your competitors?
customer / vendor lists
who are you talking to or following?
secret business alliances and strategies
secret business initiatives and plans
business situational awareness
intellectual property law: trade secrets
www.brittontuma.com #socialmedialaw 16
17. Who wants to get sued?
infringement of trademark
infringement of copyright
DMCA Takedown Request
right to publicity
name, voice, signature, photo, likeness (statutory after death)
common law while living if for value
must have a license or use creative commons
intellectual property law
www.brittontuma.com #socialmedialaw 17
18. Who wants to get sued some more?
what you (and your employees) say can hurt you!
business disparagement
tortious interference
defamation (libel & slander)
false advertising & false warranties
fraud & negligent misrepresentation
harassment and cyber-bullying
“puffery” of facts
www.brittontuma.com #socialmedialaw 18
19. Who wants to get investigated by the
Feds?
FTC – Investigated Hyundai for not disclosing incentives
given to bloggers for endorsements.
HHS & OCR – could have investigated hospital employee
who posted patient pictures and “PHI” on Facebook (“it’s
just Facebook!”)
SEC – false statements made in raising funds (SEC v.
Imperia Invest. IBC) or wrongful disclosures of information
regulatory law
www.brittontuma.com #socialmedialaw 19
20. What are some real trouble spots?
Giveaways and contests can be trouble for many
reasons – do not do them on social media
without having it thoroughly vetted
many sites’ TOS prohibit
jurisdiction gambling and contest rules
Employment issues are one of the main areas in
which legal and general business problems arise
Discussed in next section
www.brittontuma.com #socialmedialaw 20
21. Can you guess what will be used against you if
any of these problems arise?
social media is evidence – very powerful evidence!
electronically stored information (“ESI”) is quickly
becoming the most useful form of evidence
available
evidence from social media is now obtained and
used in virtually every kind of lawsuit and
investigation
we now have complete records of 2-way
communication stream – like all calls recorded!
www.brittontuma.com #socialmedialaw 21
23. Social media policies are a “must have”
ounce of prevention: less than 1 day of litigation
if have, must enforce
trying to predict issues – but evolving – can’t get all
contractually resolve issues such as ownership and
authority
great opportunity to set rules and document expectations
greater opportunity to explain and ensure understanding
of expectations
put on notice of monitoring – and actually monitor!
should address employment issues
www.brittontuma.com #socialmedialaw 23
24. Employment Issues
using social media in hiring
best to have set criteria with neutral third
party investigate for criteria
not use to discriminate
e.g., snooping to find
race, gender, age, disability, pregnancy
e.g., search for candidates on Twitter where
disproportionate number of people <40 yrs. on
Twitter, may violate the Age Discrimination in
Employment Act
requesting social media login information
www.brittontuma.com #socialmedialaw 24
25. Employment Issues
using social media for the company
scope of work for duties and times
e.g., overtime for weekend “Facebooking”
personal or company owned accounts / followers
familiarity and compliance with site Agreement / TOS
what is authorized / prohibited
responsibility for statements / disclosures
monitored
saying “use good judgment” is not enough!
www.brittontuma.com #socialmedialaw 25
26. Employment Issues
using personal social media during work
can be prohibited
may prohibit using or disclosing company IP for
personal SM
may prohibit using company info for setting up
personal SM accounts
www.brittontuma.com #socialmedialaw 26
27. You need social media policies but the National
Labor Relations Board is making it difficult
NLRB jurisdiction = impacts interstate commerce
National Labor Relations Act (NLRA) sec. 7 gives employees
right to engage in “concerted activities for the purpose of …
mutual aid and protection”
NLRB finds illegal any policy provision that (a) restricts or (b)
an employee would reasonably construe to chill concerted
activities
On 5/30/12 NLRB General Counsel issued its 3rd Report on
Social Media Policies in 1 year period (8/11 & 1/12)
www.brittontuma.com #socialmedialaw 27
28. Can you guess who the NLRB is pulling for?
making it very difficult for businesses to protect
themselves
social media policies must now be carefully tailored
to
address unique business and legal needs of your business
be enforceable and lawful in a court of law
be legal in the eyes of the NLRB
Examples of provisions found illegal by NLRB
www.brittontuma.com #socialmedialaw 28
32. What is the NLRB really looking for?
clarity and precision
examples of do’s and don’ts that give
context and real-life meaning to the rules
www.brittontuma.com #socialmedialaw 32
34. Cyber-Insurance
If you are doing anything in cyberspace, you need it.
Period.
Most traditional insurance does not cover cyber-
events, even if you think it does (really!)
Cyber-Insurance is relatively inexpensive
Most policies come include a cyber-risk audit before the
policies are underwritten
Policies can cover social media risk, computer fraud
risk, and data breach / hacking risk
www.brittontuma.com #socialmedialaw 34
35. Customer Information – do you retain it on your
system?
Data Breach
Effective 9/1/12, if you conduct business in Texas and your system
is breached and your customer’s unencrypted “sensitive personal
information” is, or is reasonably believed to have been
compromised, must notify all Texas residents of breach.
The notice must be given “as quickly as possible” and failure or
delay in doing so results in a fine of $100.00 per individual per day
(not to exceed $250,000)
Notice may be made through written or electronic means though
it can be given by major media outlets if the cost of providing
notice exceeds $250,000 or the number of persons exceeds
500,000
www.brittontuma.com #socialmedialaw 35
38. Why is the Computer Fraud
and Abuse Act important?
Primary Law for Misuse of Computers
Computers …
www.brittontuma.com #socialmedialaw 38
39. “Everything has a
computer in it nowadays.”
-Steve Jobs
www.brittontuma.com #socialmedialaw 39
40. The CFAA says
has a processor or stores data
“the term ‘computer’ means an
electronic, magnetic, optical, electrochemical, or other high
speed data processing device performing logical, arithmetic, or
storage functions, and includes any data storage facility or
communications facility directly related to or operating in
conjunction with such device, but …”
“such term does not include an automated typewriter or
typesetter, a portable hand held calculator, or other similar
device;”
www.brittontuma.com #socialmedialaw 40
42. The CFAA applies only to “protected” computers
This may limit the problem of applying it to alarm
clocks, toasters, and coffee makers
Protected = connected to the Internet
Any situations where these devices are connected?
www.brittontuma.com #socialmedialaw 42
44. The CFAA prohibits wrongfully accessing
a computer where the access
Obtains information
Commits a fraud
Obtains something of value
Transmits damaging information
Causes damage
Traffics in passwords
Commits extortion
www.brittontuma.com #socialmedialaw 44
45. social media is wonderful!
must find proper balance
need a social media policy
address unique business and legal needs of your business
be enforceable and lawful in a court of law
be legal in the eyes of the NLRB
need to enforce social media policy
need to spend time with employees to help them
understand and possibly collaborate on the rules
need to look at cyber-insurance!
www.brittontuma.com #socialmedialaw 45