SlideShare a Scribd company logo
WHEN CONVERSATION BECOMES PUBLICATION 
Understanding Social Media Risks and the Law 
DENISE FOUCHE 
ENDCODER/ ENDCODE.ORG
CONTEXT: 
Social Media as Enterprise Risk (internal and external) 
The law as navigator 
Brand Risk 
The Law 
Pre-empting risk, encouraging innovation 
Governance 
Social Media in Africa
Conversations are everywhere
Conversations are everywhere
Monetising attention 
“As wearable technology (Google Glass, fitness bands, Samsung Galaxy Gear) becomes ubiquitous in 2014, the 
amount of data created will provide a treasure trove of insights for marketers. Not only does it let marketers 
know where their customers are but when and how fast. Obviously there is a huge risk here given the sensitivity of 
the data but the trick here is for marketers to provide the right value in exchange for this invaluable data.” 
Aaron Strout, Managing Director at W2O Group, co-author of Location-Based Marketing for Dummies 
The most disruptive digital trend I am seeing that will really begin affecting marketers in 2014 is the ‘Internet 
of Things’. We already know that we don’t search for content now, content finds you. In 2014, we’re going 
to start seeing how brands and products find you. 
Ragy Thomas, CEO and founder of Sprinklr 
"Facebook is transformed from a public space to a behavioral laboratory,” it is possible to "deanonymize 
parts of the data set," or cross-reference anonymous data to make identification possible. 
psychologist Ilka Gleibs, an assistant professor at the London School of Economics in London 
So much content shared today is private, and it often disappears, so marketers aren’t readily able to track and 
target such consumers. Expect marketers to explore new, creative ways of reaching consumers who 
prioritize privacy. 
David Berkowitz, Chief Marketing Officer of MRY
Social Media as Personal Risk 
• What would you say? 
• What would you disclose? 
• Most SM profiles contain personal information : address, telephone number, date of 
birth 
• Information used by banks to verify customers - easily used to impersonate 
23% of those surveyed post information online, which they 
normally wouldn’t disclose in real life, while almost every tenth 
user discusses private information with strangers. 
2014 survey Kaspersky Lab and B2B International
Social Media as Enterprise Risk 
• Advertising & marketing 
• Promotional offers 
• Competitions 
• Customer relations 
• Electronic commerce 
• Blurring of professional and personal voices : staff and customers becoming brand 
ambassadors 
• External 
• Ease of access = ease of reputational risk 
• Commenting without using appropriate disclaimers 
• Irresponsible conduct of senior management 
• Lack of protocol and designated employee to administer 
• Breach of confidential information
Social Media as Enterprise Risk 
• Internal 
• Strained labour relations 
• Lack of corporate social media policy 
• Distinction between social and media 
• Engaging without policy backup 
• Tendency to hide social media as part of media policy 
• Companies should implement a social business governance plan 
• Social business : integration and operationalisation of social media 
• Social media strategy 
• Collaboration strategy 
• Escalation policy
Acknowledging legal risk 
The “chain of publication” 
“It is generally safe to assume that anything published on a social network is 
considered to be in the public domain. This does not absolve the poster (or 
anyone who forwards or reposts information) from any legal liability that might 
arise from posting content that is, for example, in contempt of court, is 
defamatory or in breach of copyright.”
The law as navigator
The laws that bind 
• Yes, the law as you know it (or not) applies 
• No legislation explicity dealing with SM 
• Defamation 
• Hate speech 
• Harassment 
• Intellectual Property 
• Privacy 
• Labour laws 
• Contempt of court : right to fair trial 
• “sub judice rule", which allows for contempt of court prosecutions if media reports could 
prejudice a trial. The question is whether there will be "real risk" of substantial prejudice to 
the administration of justice. 
• Concerns expressed regarding the threats and harsh criticism of Judge Thokozile Masipa – 
racism and contempt of court
Primary legal risks 
• Privacy infringement 
• Intellectual Property infringement 
• Defamation 
• Consumer rights infringement 
• Loss of sensitive information (clients, suppliers, employees) 
• Security compromise - issues of enterprise security 
POTENTIAL FOR LITIGATION 
BRAND RISK 
⏏ ⏏
Privacy 
• Reasonable expectation of privacy is being challenged by SM 
• Information captured without user’s knowledge or consent 
• Gathering social media intelligence through data mining: 
• re-purposing content 
• Data-driven, location based services (iBeacon & Nike Fuel Band) 
• Personalisation of brand experiences 
• Loyalty based experiences – building customer trust 
• Social media monitoring by employers 
• Policies that prohibit employee postings on SNS 
• Screening of prospective employees – discrimination?
Privacy 
• Identity theft is cited as the major complaint received by the FTC since 1999 
• Merging of SM websites – diligence about privacy and security during rapid 
growth phase 
• Single access sign-on – one log in to use multiple websites; single site can show 
actions and activities on other sites 
• Privacy controls and legislation are not universal 
• Location-based services – greater security and privacy concerns
Intellectual Property 
Top intellectual property risks: 
• Ownership of social media accounts, content and followers 
• Cybersquatting: trademark infringement 
• Loss of IP 
• Unauthorised use of third party IP 
• Unauthorised disclosures of trade secrets by employees : publishing of information 
that establishes competitive advantage 
• Brand damage 
• Inappropriate content licensing framework
Defamation 
• A statement that “has the effect of injuring a plaintiff’s reputation”. Reputation is 
injured if the statement lowers the plaintiff in the minds of others. 
• Falsity is not a consideration 
• Information is deemed to have been published once it reaches a third party 
• Once published, a presumption of unlawfulness and intention arises 
• Social Media content is subject to defamation law 
• A statement may be in the form of words, pictures, visual images or gestures 
• Companies have the right to good name 
• The common law right to a good name and reputation (right to dignity) can trump 
freedom of expression 
• Linking to material on third party sites that contain defamatory or objectionable 
material 
• Defamation laws are not universal
Freedom of expression vs defamation 
• A balancing of rights 
• Section 16 guarantees the right to freedom of expression 
• Section 36 (limitation clause) can limit the right to freedom of expression. 
Legal limitations on hate speech, speech infringing rights of others, violations of 
copyright 
• Increasingly the right to an opinion clashes with self-censorship imposed in the 
media space : radio, sport, TV personalities
Harassment 
• The Protection from Harassment Act 2013 
• Harassment on SM involves: 
• Threatening sms, private Twitter messages and emails to an individual, regardless of the platform 
• Threatening remarks made on SM about a person 
• Sending emails containing offensive content – pornographic images, sexual references 
• Sharing media that is offensive, abusive or embarrassing or have been manipulated that it embarrasses 
of offends the individual 
• Sexual advances made through SM platform 
• There is no need for the existence of a domestic relationship between parties 
• Apply for a protection order from the clerk of a court which will be issued to accused 
harasser 
• Contravention of order will be deemed guilty of an offence and liable to a fine or 
imprisonment for a period not exceeding five years 
• The person must believe they are being harassed
Brand risk 
December 2013 – InterActive Corp, Director of Corporate Communications 
fired over a tweet to her online account: "Going to Africa. Hope I don't get 
AIDS. Just kidding. I'm white!" 
14 February 2014 -- Automotive Business Review, motoring journalist fired 
over social media comment: “I don’t blame the guy that shot the motorcyclist. 
They are obnoxious and arrogant. I cannot wait for my day to come when I will 
open my door and a motorcyclist will fly off his bike and hopefully break his 
neck!”
Brand risk 
• Well-managed, responsible brand 
• Posting of innapropriate content 
• Publication of confidential information 
• Publication of personal and sensitive information 
• Disclosures and complaints by customers 
• Defamatory comments about the company 
• Anonymous defamatory comments about the company 
• Dealing with objectionable comments 
• Duty to shareholders 
• In tune with its customers 
= building trust in the channel and the brand
TWheh ola iws sw tahtacth biningd over your brand? 
http://www.npr.org
The laws that bind 
• Constitution 
• Statute 
• Electronic Communications and Transactions Act 
• Consumer Protection Act 
• Regulation of Interception of Communications Act 
• Labour Relations Act 
• Protection of Personal Information Act 
• Promotion of Equality and Prevention of Unfair Discrimination Act 
• Protection from Harassment Act 
• Copyright, Trademark, Patent & Designs Act 
• Film & Publications Act 
• Self-regulatory mechanisms 
• Industry Charters and Codes: iab, ISPA, WASPA, ASA, FSB,BCCSA 
• Directives, Standards 
• Case Law 
• Contracts
The laws that bind 
• Common law : defamation, unfair competition 
• Criminal law : cyber crime 
• Contempt of court : right to fair trial 
• Harassment 
• Intellectual Property 
• Labour law : course of scope of employment; binding Terms of Service? 
• Terms of Service and Rules of SM platforms 
• Local law
Regulatory focus areas 
• Privacy : regulate the use and protection of PI 
• Content : regulate nature 
• Cybersecurity, Interception of Communications : regulate the detection and 
prosecution of offences in the digital space 
• Consumer Protection : regulate digital goods/services supplier relationship with 
consumers 
• Intellectual Property : regulate and administer rights protection of IP generators 
• Information Management : regulate availability of records, evidence, access to 
information, classification of information 
• Data protection : regulate data protection and privacy
Digital engagement and enterprise risk 
• Electronic Communications electronic 
communications usage by an organisation ECT Act 
• Electronic Records Management the lifecycle management of electronic records 
ECT Act 
• Electronic Marketing 
the 
requirements for electronic marketing 
CPA 
• Access to Information procedures for accessing public documents PAIA 
• Electronic Evidence the requirements for validity and evidential weight 
of data
Legal developments 
• South African case law 
• Sedick and Another v Krisray (Pty) Ltd (2011) 8 BALR 879 (CCMA); and 
• Fredericks v Jo Barkett Fashions [2011] JOL 27923 (CCMA) 
• Media Workers Association of SA obo Mvemve v Kathorus Community Radio (2010) 31 ILJ 
2217 (CCMA) 
However, normal rules of substantive and procedural fairness do apply 
• Smith v Partners in Sexual Health (non-profit) (2011) 32 ILJ 1470 (CCMA) 
• LRA : employers may not prevent an employee from exercising rights it confers 
• The National Labour Relations Board regards SM policies as potentially chilling on 
employees’ rights to engage in activity to improve working conditions 
• In August the FPB announced it will be considering “mechanisms” to regulate online 
and new media content by 2017.
Pre-empting risk, encouraging innovation 
• Most risks are avoided by exercising COMMON SENSE 
• Observing existing codes of conduct 
• Employer duty 
• Social media Policy 
• Electronic Communications Policy 
• Appropriate Use of the Internet 
• Standards of Ethical Behaviour 
• Training : legal 
• Training : social 
• Include Terms of Use & Privacy Policy on websites 
• Social Media Disclaimers: “The postings on this site are my own and do not 
necessarily represent the company’s positions or opinions.” 
• Outsourcing of services to digital marketing specialists : governance of outsourcing 
agreement
Pre-empting risk, encouraging innovation 
• Build a culture of compliance 
• Define a strategy 
• Create policy : staff contribution guidelines, appropriate content guidelines 
• Implement policy 
• Monitor and evaluate 
• Appoint official SM spokesperson 
• Address employee activities, usage and monitoring 
• Ensure administration of sites 
• Draft Terms of Use for Users 
• Creative Commons licensing – open licensing framework 
• Protect personal information provided by customers and employees – ask permission to disclose in 
advance 
• Seek permission to save cookies 
• Public access to information and archiving practices 
• Create a response plan for posting of defamatory, offensive or obscene content 
• Evaluate SM practices 
• Evaluate Information Management practices 
• Enterprise risk evaluation 
• Pre-publicatoin moderation of content
Brand insulation 
• Who owns relationships, content, connections and communities created on SM 
platform? 
• Contractual pre-emption 
• Consistency of brand and content 
• Authorised employees to “speak” on behalf of the brand 
• Prior approval for disclosure of special projects 
• Prioritise quality of information
Governance 
• Leadership 
• Responsibility and Accountability 
• Resources 
• Policies 
• Training 
• Culture 
• Monitoring 
• Crisis Management
Governance 
• Strategy – Statement of Purpose 
• Statement of Programme Objectives 
• Statement on Risk and Mitigation of Liability 
• Statement on Legal Compliance 
• Statement on Ethics 
• Statement on e-Records Management 
• Privacy Principles 
• Confidentiality principles 
• Who owns what and why?
Policy solutions – best practice 
• Approval of social tools 
• Social media usage in an official capacity requires responsible conduct 
o Social Media Handbook for guidance on social media tools and services 
o Grant employees specific approval to use social media 
o When posting in an official capacity, remember that you represent the organisation 
o Catalogue of all personnel approved for social media 
o All sensitive, proprietary or classified information cannot be disclosed 
o Information posted on third party website should be provided on an official website 
o Follow all conduct guidelines 
• Social media usage in an unofficial/personal capacity 
o Present yourself in a manner consistent as an employee of the company 
o Use of a disclaimer – it should be clear that all views expressed are that of the 
individual and do not represent the views of the company 
o All sensitive, proprietary or classified information cannot be disclosed 
o ENSURE POLICIES ARE COMPLIANT WITH RELEVANT LEGISLATION AND INTERNAL 
POLICIES
SM Policy solutions – best practice 
• A notice and agreement that all social media accounts created or used on behalf of 
the company belong solely to the company; 
• An agreement that the company retains sole ownership of all login 
information, passwords, and the associated content of those social media accounts; 
• An agreement that the employee has no claim of ownership or 
interest in the content created and distributed through those social media accounts; 
• An agreement that the employee is responsible for managing the 
account, but that all followers, friends and social connections associated with the 
social media account belong to the company; 
• An agreement that the employees shall relinquish and not use 
social media accounts created or used on behalf of the company after termination of 
their employment.
Social Media in Africa 
• Arik Air “#ArikWhereIsMyIpad” 
• McKinsey & Company, places the continent’s internet contribution to GDP at $18 
billion. 
• Pew Research approximates 78 percent of internet usage in Africa is for social media 
• Africa’s estimated $14-billion social media industry 
• With the internet expected to contribute a minimum of $300 billion to Africa’s GDP 
by 2025, social media could contribute almost $230 billion to Africa’s growth by that 
time 
• Africa is projected to have the largest working population of any continent by 2020 
according to a 2012 report by Euromonitor International
Social Media in Africa 
• SM is impacting the way business is conducted in Africa 
• The 2012 Arab Spring provided a powerful tool for social causes in Egypt and Tunisia 
• African businesses and brands are acknowledging the communicative power and 
increased reach provided by SM 
• Jumia the leading ecommerce business in Africa reports social media networks 
generate 20% of daily traffic 
• Banks in Africa are rolling out tech-driven services on social media
Social Media in Africa 
• Thanks to SM communities have been able to speak up and pursue causes against 
governments. 
• The internet has witnessed a sustained increase in adoption rates in Africa 
• Penetration currently pegged at 16% 
• More than 167 million active users across the continent
African legal landscape 
• But the law is developing 
• Many African countries lack developed SM laws and guidance on SM 
• Developments are under way to enforce restrictions on social media 
• Nigeria : rollout of a framework for the regulation of SM 
• Malawi : warning to those exploiting absence of SM legislation to defame others 
• Ghana : call for regulations to be put in place 
• Kenya : hate speech laws blamed for violence following election of Dec 2007 
• Botswana : the army banned soldiers from FB, Twitter and other SM sites for security 
reasons 
• Initiatives to harmonise regional and international laws in the electronic commerce 
and data protection are vital 
• Africa’s voice in determining laws that will impact social and commercial mobile and 
online interactions
Denise Fouche 
denise.fouche@endcode.org 
endcode.org 
THANX, QUESTIONS?
References 
• http://www.ventures-africa.com/2014/06/africa-inside-the-continents-new-14-billion-social-media- 
industry/ 
• http://www.lexology.com/library/detail.aspx?g=7f2d55e1-27dd-44a1-92b7-5049ce542761 
• http://www.saflii.org/za/journals/DEREBUS/2012/80.html 
• http://www.ipu.org/splz-e/asgp12/guidelines.pdf 
• http://www.reputation.com/reputationwatch/articles/top-five-social-media-privacy-concerns

More Related Content

What's hot

Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
HELEN UBA-UGOCHUKWU
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
Wisnu Dewobroto
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
Ujjwal Joshi
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
LAURA VIVET
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
gallowayandcollens
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
Saiqa Hashmi
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management
CAMT
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
lilianedwards
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
gallowayandcollens
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
Atif Ghauri
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
monchai sopitka
 

What's hot (20)

Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 

Viewers also liked

Projektu ruosimo pagrindai
Projektu ruosimo pagrindaiProjektu ruosimo pagrindai
Projektu ruosimo pagrindai
valentina valentina
 
LE SQUADRE
LE SQUADRELE SQUADRE
LE SQUADREcamarbmi
 
Top 20: What Not To Do During An Interview
Top 20: What Not To Do During An InterviewTop 20: What Not To Do During An Interview
Top 20: What Not To Do During An Interview
gogohire
 
Ryan Eagle
Ryan EagleRyan Eagle
Ryan Eagle
MD Riyad Rana
 
2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool
2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool
2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool
Alain van Gool
 
презентация
презентацияпрезентация
презентацияsadas asdsad
 
2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, Helsinki2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, Helsinki
Alain van Gool
 
DEVNET-1116 IDEALondon - Energy management
DEVNET-1116	IDEALondon - Energy managementDEVNET-1116	IDEALondon - Energy management
DEVNET-1116 IDEALondon - Energy management
Cisco DevNet
 
Id 3 paredes ochoa, luz delia - mayo 21 - producto 1
Id 3 paredes ochoa, luz delia - mayo 21 - producto 1Id 3 paredes ochoa, luz delia - mayo 21 - producto 1
Id 3 paredes ochoa, luz delia - mayo 21 - producto 1
lparedeso
 
Fipp world media trends special report content
Fipp world media trends special report content Fipp world media trends special report content
Fipp world media trends special report content
Tuan Anh Nguyen
 
50 aniversario colegio 28 junio 2016 presentación claustro parte mario
50 aniversario colegio 28 junio 2016 presentación claustro parte mario 50 aniversario colegio 28 junio 2016 presentación claustro parte mario
50 aniversario colegio 28 junio 2016 presentación claustro parte mario
profesjcmario
 
CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ & MHM Phoenix
 
After Using Advisor Chat
After Using Advisor ChatAfter Using Advisor Chat
After Using Advisor Chat
RightFinAdvisor
 
2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers
Alain van Gool
 
The magic to think big
The magic to think bigThe magic to think big
The magic to think big
Tuan Anh Nguyen
 
3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams
3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams
3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams
valentina valentina
 
Cursos henrry
Cursos henrryCursos henrry
Cursos henrry
Alfredo Delfin
 
Newest products summer
Newest products summerNewest products summer
Newest products summer
Pattye255
 

Viewers also liked (19)

Projektu ruosimo pagrindai
Projektu ruosimo pagrindaiProjektu ruosimo pagrindai
Projektu ruosimo pagrindai
 
LE SQUADRE
LE SQUADRELE SQUADRE
LE SQUADRE
 
Top 20: What Not To Do During An Interview
Top 20: What Not To Do During An InterviewTop 20: What Not To Do During An Interview
Top 20: What Not To Do During An Interview
 
Ryan Eagle
Ryan EagleRyan Eagle
Ryan Eagle
 
2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool
2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool
2016-02-18 Innovation for Health 2016 conference, Rotterdam Alain van Gool
 
презентация
презентацияпрезентация
презентация
 
Ponto 11
Ponto 11Ponto 11
Ponto 11
 
2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, Helsinki2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, Helsinki
 
DEVNET-1116 IDEALondon - Energy management
DEVNET-1116	IDEALondon - Energy managementDEVNET-1116	IDEALondon - Energy management
DEVNET-1116 IDEALondon - Energy management
 
Id 3 paredes ochoa, luz delia - mayo 21 - producto 1
Id 3 paredes ochoa, luz delia - mayo 21 - producto 1Id 3 paredes ochoa, luz delia - mayo 21 - producto 1
Id 3 paredes ochoa, luz delia - mayo 21 - producto 1
 
Fipp world media trends special report content
Fipp world media trends special report content Fipp world media trends special report content
Fipp world media trends special report content
 
50 aniversario colegio 28 junio 2016 presentación claustro parte mario
50 aniversario colegio 28 junio 2016 presentación claustro parte mario 50 aniversario colegio 28 junio 2016 presentación claustro parte mario
50 aniversario colegio 28 junio 2016 presentación claustro parte mario
 
CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015
 
After Using Advisor Chat
After Using Advisor ChatAfter Using Advisor Chat
After Using Advisor Chat
 
2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers
 
The magic to think big
The magic to think bigThe magic to think big
The magic to think big
 
3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams
3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams
3 dalis. kas yra besimokantis miestas vaizdine medziaga svietejams
 
Cursos henrry
Cursos henrryCursos henrry
Cursos henrry
 
Newest products summer
Newest products summerNewest products summer
Newest products summer
 

Similar to Social Media & Legal Risk

E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
fatimagull32
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
Pod Legal
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
Matthew Asbell
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
Pod Legal
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media Rockstar
 
The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...
Insignia Communications
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
NishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
NishaTariq1
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
Legal Media Matters
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
Kerry Rego
 
Longmeadow 2012
Longmeadow 2012Longmeadow 2012
Longmeadow 2012
Tish Grier
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
Robert Stribley
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentationMelfi Associates
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
stirlingvwriters
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
Marc Vael
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
UNIVERSITAS TEKNOKRAT INDONESIA
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
Deborah Gonzalez, Esq.
 

Similar to Social Media & Legal Risk (20)

E commerce
E commerce E commerce
E commerce
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Longmeadow 2012
Longmeadow 2012Longmeadow 2012
Longmeadow 2012
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 

More from Endcode_org

Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
Endcode_org
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and Commerce
Endcode_org
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A Presentation
Endcode_org
 
Consumer Protection
Consumer ProtectionConsumer Protection
Consumer Protection
Endcode_org
 
Innovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyInnovator's Guide to the IP Galaxy
Innovator's Guide to the IP Galaxy
Endcode_org
 
Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)
Endcode_org
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 

More from Endcode_org (7)

Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and Commerce
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A Presentation
 
Consumer Protection
Consumer ProtectionConsumer Protection
Consumer Protection
 
Innovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyInnovator's Guide to the IP Galaxy
Innovator's Guide to the IP Galaxy
 
Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 

Recently uploaded

Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
Purushottam Jha
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
OmGod1
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 

Recently uploaded (20)

Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 

Social Media & Legal Risk

  • 1. WHEN CONVERSATION BECOMES PUBLICATION Understanding Social Media Risks and the Law DENISE FOUCHE ENDCODER/ ENDCODE.ORG
  • 2. CONTEXT: Social Media as Enterprise Risk (internal and external) The law as navigator Brand Risk The Law Pre-empting risk, encouraging innovation Governance Social Media in Africa
  • 5. Monetising attention “As wearable technology (Google Glass, fitness bands, Samsung Galaxy Gear) becomes ubiquitous in 2014, the amount of data created will provide a treasure trove of insights for marketers. Not only does it let marketers know where their customers are but when and how fast. Obviously there is a huge risk here given the sensitivity of the data but the trick here is for marketers to provide the right value in exchange for this invaluable data.” Aaron Strout, Managing Director at W2O Group, co-author of Location-Based Marketing for Dummies The most disruptive digital trend I am seeing that will really begin affecting marketers in 2014 is the ‘Internet of Things’. We already know that we don’t search for content now, content finds you. In 2014, we’re going to start seeing how brands and products find you. Ragy Thomas, CEO and founder of Sprinklr "Facebook is transformed from a public space to a behavioral laboratory,” it is possible to "deanonymize parts of the data set," or cross-reference anonymous data to make identification possible. psychologist Ilka Gleibs, an assistant professor at the London School of Economics in London So much content shared today is private, and it often disappears, so marketers aren’t readily able to track and target such consumers. Expect marketers to explore new, creative ways of reaching consumers who prioritize privacy. David Berkowitz, Chief Marketing Officer of MRY
  • 6. Social Media as Personal Risk • What would you say? • What would you disclose? • Most SM profiles contain personal information : address, telephone number, date of birth • Information used by banks to verify customers - easily used to impersonate 23% of those surveyed post information online, which they normally wouldn’t disclose in real life, while almost every tenth user discusses private information with strangers. 2014 survey Kaspersky Lab and B2B International
  • 7. Social Media as Enterprise Risk • Advertising & marketing • Promotional offers • Competitions • Customer relations • Electronic commerce • Blurring of professional and personal voices : staff and customers becoming brand ambassadors • External • Ease of access = ease of reputational risk • Commenting without using appropriate disclaimers • Irresponsible conduct of senior management • Lack of protocol and designated employee to administer • Breach of confidential information
  • 8. Social Media as Enterprise Risk • Internal • Strained labour relations • Lack of corporate social media policy • Distinction between social and media • Engaging without policy backup • Tendency to hide social media as part of media policy • Companies should implement a social business governance plan • Social business : integration and operationalisation of social media • Social media strategy • Collaboration strategy • Escalation policy
  • 9. Acknowledging legal risk The “chain of publication” “It is generally safe to assume that anything published on a social network is considered to be in the public domain. This does not absolve the poster (or anyone who forwards or reposts information) from any legal liability that might arise from posting content that is, for example, in contempt of court, is defamatory or in breach of copyright.”
  • 10. The law as navigator
  • 11. The laws that bind • Yes, the law as you know it (or not) applies • No legislation explicity dealing with SM • Defamation • Hate speech • Harassment • Intellectual Property • Privacy • Labour laws • Contempt of court : right to fair trial • “sub judice rule", which allows for contempt of court prosecutions if media reports could prejudice a trial. The question is whether there will be "real risk" of substantial prejudice to the administration of justice. • Concerns expressed regarding the threats and harsh criticism of Judge Thokozile Masipa – racism and contempt of court
  • 12. Primary legal risks • Privacy infringement • Intellectual Property infringement • Defamation • Consumer rights infringement • Loss of sensitive information (clients, suppliers, employees) • Security compromise - issues of enterprise security POTENTIAL FOR LITIGATION BRAND RISK ⏏ ⏏
  • 13. Privacy • Reasonable expectation of privacy is being challenged by SM • Information captured without user’s knowledge or consent • Gathering social media intelligence through data mining: • re-purposing content • Data-driven, location based services (iBeacon & Nike Fuel Band) • Personalisation of brand experiences • Loyalty based experiences – building customer trust • Social media monitoring by employers • Policies that prohibit employee postings on SNS • Screening of prospective employees – discrimination?
  • 14. Privacy • Identity theft is cited as the major complaint received by the FTC since 1999 • Merging of SM websites – diligence about privacy and security during rapid growth phase • Single access sign-on – one log in to use multiple websites; single site can show actions and activities on other sites • Privacy controls and legislation are not universal • Location-based services – greater security and privacy concerns
  • 15. Intellectual Property Top intellectual property risks: • Ownership of social media accounts, content and followers • Cybersquatting: trademark infringement • Loss of IP • Unauthorised use of third party IP • Unauthorised disclosures of trade secrets by employees : publishing of information that establishes competitive advantage • Brand damage • Inappropriate content licensing framework
  • 16. Defamation • A statement that “has the effect of injuring a plaintiff’s reputation”. Reputation is injured if the statement lowers the plaintiff in the minds of others. • Falsity is not a consideration • Information is deemed to have been published once it reaches a third party • Once published, a presumption of unlawfulness and intention arises • Social Media content is subject to defamation law • A statement may be in the form of words, pictures, visual images or gestures • Companies have the right to good name • The common law right to a good name and reputation (right to dignity) can trump freedom of expression • Linking to material on third party sites that contain defamatory or objectionable material • Defamation laws are not universal
  • 17. Freedom of expression vs defamation • A balancing of rights • Section 16 guarantees the right to freedom of expression • Section 36 (limitation clause) can limit the right to freedom of expression. Legal limitations on hate speech, speech infringing rights of others, violations of copyright • Increasingly the right to an opinion clashes with self-censorship imposed in the media space : radio, sport, TV personalities
  • 18. Harassment • The Protection from Harassment Act 2013 • Harassment on SM involves: • Threatening sms, private Twitter messages and emails to an individual, regardless of the platform • Threatening remarks made on SM about a person • Sending emails containing offensive content – pornographic images, sexual references • Sharing media that is offensive, abusive or embarrassing or have been manipulated that it embarrasses of offends the individual • Sexual advances made through SM platform • There is no need for the existence of a domestic relationship between parties • Apply for a protection order from the clerk of a court which will be issued to accused harasser • Contravention of order will be deemed guilty of an offence and liable to a fine or imprisonment for a period not exceeding five years • The person must believe they are being harassed
  • 19. Brand risk December 2013 – InterActive Corp, Director of Corporate Communications fired over a tweet to her online account: "Going to Africa. Hope I don't get AIDS. Just kidding. I'm white!" 14 February 2014 -- Automotive Business Review, motoring journalist fired over social media comment: “I don’t blame the guy that shot the motorcyclist. They are obnoxious and arrogant. I cannot wait for my day to come when I will open my door and a motorcyclist will fly off his bike and hopefully break his neck!”
  • 20. Brand risk • Well-managed, responsible brand • Posting of innapropriate content • Publication of confidential information • Publication of personal and sensitive information • Disclosures and complaints by customers • Defamatory comments about the company • Anonymous defamatory comments about the company • Dealing with objectionable comments • Duty to shareholders • In tune with its customers = building trust in the channel and the brand
  • 21. TWheh ola iws sw tahtacth biningd over your brand? http://www.npr.org
  • 22. The laws that bind • Constitution • Statute • Electronic Communications and Transactions Act • Consumer Protection Act • Regulation of Interception of Communications Act • Labour Relations Act • Protection of Personal Information Act • Promotion of Equality and Prevention of Unfair Discrimination Act • Protection from Harassment Act • Copyright, Trademark, Patent & Designs Act • Film & Publications Act • Self-regulatory mechanisms • Industry Charters and Codes: iab, ISPA, WASPA, ASA, FSB,BCCSA • Directives, Standards • Case Law • Contracts
  • 23. The laws that bind • Common law : defamation, unfair competition • Criminal law : cyber crime • Contempt of court : right to fair trial • Harassment • Intellectual Property • Labour law : course of scope of employment; binding Terms of Service? • Terms of Service and Rules of SM platforms • Local law
  • 24. Regulatory focus areas • Privacy : regulate the use and protection of PI • Content : regulate nature • Cybersecurity, Interception of Communications : regulate the detection and prosecution of offences in the digital space • Consumer Protection : regulate digital goods/services supplier relationship with consumers • Intellectual Property : regulate and administer rights protection of IP generators • Information Management : regulate availability of records, evidence, access to information, classification of information • Data protection : regulate data protection and privacy
  • 25. Digital engagement and enterprise risk • Electronic Communications electronic communications usage by an organisation ECT Act • Electronic Records Management the lifecycle management of electronic records ECT Act • Electronic Marketing the requirements for electronic marketing CPA • Access to Information procedures for accessing public documents PAIA • Electronic Evidence the requirements for validity and evidential weight of data
  • 26. Legal developments • South African case law • Sedick and Another v Krisray (Pty) Ltd (2011) 8 BALR 879 (CCMA); and • Fredericks v Jo Barkett Fashions [2011] JOL 27923 (CCMA) • Media Workers Association of SA obo Mvemve v Kathorus Community Radio (2010) 31 ILJ 2217 (CCMA) However, normal rules of substantive and procedural fairness do apply • Smith v Partners in Sexual Health (non-profit) (2011) 32 ILJ 1470 (CCMA) • LRA : employers may not prevent an employee from exercising rights it confers • The National Labour Relations Board regards SM policies as potentially chilling on employees’ rights to engage in activity to improve working conditions • In August the FPB announced it will be considering “mechanisms” to regulate online and new media content by 2017.
  • 27. Pre-empting risk, encouraging innovation • Most risks are avoided by exercising COMMON SENSE • Observing existing codes of conduct • Employer duty • Social media Policy • Electronic Communications Policy • Appropriate Use of the Internet • Standards of Ethical Behaviour • Training : legal • Training : social • Include Terms of Use & Privacy Policy on websites • Social Media Disclaimers: “The postings on this site are my own and do not necessarily represent the company’s positions or opinions.” • Outsourcing of services to digital marketing specialists : governance of outsourcing agreement
  • 28. Pre-empting risk, encouraging innovation • Build a culture of compliance • Define a strategy • Create policy : staff contribution guidelines, appropriate content guidelines • Implement policy • Monitor and evaluate • Appoint official SM spokesperson • Address employee activities, usage and monitoring • Ensure administration of sites • Draft Terms of Use for Users • Creative Commons licensing – open licensing framework • Protect personal information provided by customers and employees – ask permission to disclose in advance • Seek permission to save cookies • Public access to information and archiving practices • Create a response plan for posting of defamatory, offensive or obscene content • Evaluate SM practices • Evaluate Information Management practices • Enterprise risk evaluation • Pre-publicatoin moderation of content
  • 29. Brand insulation • Who owns relationships, content, connections and communities created on SM platform? • Contractual pre-emption • Consistency of brand and content • Authorised employees to “speak” on behalf of the brand • Prior approval for disclosure of special projects • Prioritise quality of information
  • 30. Governance • Leadership • Responsibility and Accountability • Resources • Policies • Training • Culture • Monitoring • Crisis Management
  • 31. Governance • Strategy – Statement of Purpose • Statement of Programme Objectives • Statement on Risk and Mitigation of Liability • Statement on Legal Compliance • Statement on Ethics • Statement on e-Records Management • Privacy Principles • Confidentiality principles • Who owns what and why?
  • 32. Policy solutions – best practice • Approval of social tools • Social media usage in an official capacity requires responsible conduct o Social Media Handbook for guidance on social media tools and services o Grant employees specific approval to use social media o When posting in an official capacity, remember that you represent the organisation o Catalogue of all personnel approved for social media o All sensitive, proprietary or classified information cannot be disclosed o Information posted on third party website should be provided on an official website o Follow all conduct guidelines • Social media usage in an unofficial/personal capacity o Present yourself in a manner consistent as an employee of the company o Use of a disclaimer – it should be clear that all views expressed are that of the individual and do not represent the views of the company o All sensitive, proprietary or classified information cannot be disclosed o ENSURE POLICIES ARE COMPLIANT WITH RELEVANT LEGISLATION AND INTERNAL POLICIES
  • 33. SM Policy solutions – best practice • A notice and agreement that all social media accounts created or used on behalf of the company belong solely to the company; • An agreement that the company retains sole ownership of all login information, passwords, and the associated content of those social media accounts; • An agreement that the employee has no claim of ownership or interest in the content created and distributed through those social media accounts; • An agreement that the employee is responsible for managing the account, but that all followers, friends and social connections associated with the social media account belong to the company; • An agreement that the employees shall relinquish and not use social media accounts created or used on behalf of the company after termination of their employment.
  • 34. Social Media in Africa • Arik Air “#ArikWhereIsMyIpad” • McKinsey & Company, places the continent’s internet contribution to GDP at $18 billion. • Pew Research approximates 78 percent of internet usage in Africa is for social media • Africa’s estimated $14-billion social media industry • With the internet expected to contribute a minimum of $300 billion to Africa’s GDP by 2025, social media could contribute almost $230 billion to Africa’s growth by that time • Africa is projected to have the largest working population of any continent by 2020 according to a 2012 report by Euromonitor International
  • 35. Social Media in Africa • SM is impacting the way business is conducted in Africa • The 2012 Arab Spring provided a powerful tool for social causes in Egypt and Tunisia • African businesses and brands are acknowledging the communicative power and increased reach provided by SM • Jumia the leading ecommerce business in Africa reports social media networks generate 20% of daily traffic • Banks in Africa are rolling out tech-driven services on social media
  • 36. Social Media in Africa • Thanks to SM communities have been able to speak up and pursue causes against governments. • The internet has witnessed a sustained increase in adoption rates in Africa • Penetration currently pegged at 16% • More than 167 million active users across the continent
  • 37. African legal landscape • But the law is developing • Many African countries lack developed SM laws and guidance on SM • Developments are under way to enforce restrictions on social media • Nigeria : rollout of a framework for the regulation of SM • Malawi : warning to those exploiting absence of SM legislation to defame others • Ghana : call for regulations to be put in place • Kenya : hate speech laws blamed for violence following election of Dec 2007 • Botswana : the army banned soldiers from FB, Twitter and other SM sites for security reasons • Initiatives to harmonise regional and international laws in the electronic commerce and data protection are vital • Africa’s voice in determining laws that will impact social and commercial mobile and online interactions
  • 38. Denise Fouche denise.fouche@endcode.org endcode.org THANX, QUESTIONS?
  • 39. References • http://www.ventures-africa.com/2014/06/africa-inside-the-continents-new-14-billion-social-media- industry/ • http://www.lexology.com/library/detail.aspx?g=7f2d55e1-27dd-44a1-92b7-5049ce542761 • http://www.saflii.org/za/journals/DEREBUS/2012/80.html • http://www.ipu.org/splz-e/asgp12/guidelines.pdf • http://www.reputation.com/reputationwatch/articles/top-five-social-media-privacy-concerns

Editor's Notes

  1. As technology legal advisors considering social media law and its impact on businesses, we’re particularly interested in the point at which conversation becomes publication. The very act of conversing online equates to publication which in the legal realm introduces a host of rights and obligations. Of even greater legal importance is the content that makes up that conversation and the implications it has for the creator, compiler, the poster, the hoster, the storer and the recipient of that content. In short, each link in what the law regards as “the chain of publication” carries legal implications.
  2. The pervasiveness of SM is a moot point– the ubiquity of SM, our engagement with and reliance on platforms is no longer unique. SM has seamlessly become an everyday, for some all day event in our lives. Yet for something we use so freely and often unquestioningly, we are still surprised to discover that the very laws that regulate our non-digital behaviours also govern our interactions on line. As users of SM we become publishers of information, and thereby subject to the laws that apply to traditional media.
  3. ZenithOptimedia estimated that total social media advertising spending will reach $4.6 billion this year, up 35% from $3.4 billion in 2012; looking ahead, ZO sees social media ad spending climbing to $8.22 billion by 2015, which suggests a cumulative annual growth rate of around 35% over the next two years.
  4. When pressed on the legal responsbilities and implications SM agencies are yet to provide satisfactory answers with regard to awareness and programs within their organisations. "Be aware it is a space that is watched," says social psychologist Ilka Gleibs, an assistant professor at the London School of Economics in London, whose study about social networking sites for research field studies has been drawing attention since it went online in January in the journal Analyses of Social Issues and Public Policy. RELATED: Facebook posts 'contagious,' research suggests "Facebook is transformed from a public space to a behavioral laboratory," says the study, which cites a Harvard-based research project of 1,700 college-based Facebook users in which it became possible to "deanonymize parts of the data set," or cross-reference anonymous data to make student identification possible.
  5. Organisations use SM in the following ways: But Blurring of lines between personal and professional creates a conversation of a special type. Although SM has presented business with new channels to reach customers on an unprecedented scale often enterprises lack an understanding of the risks that arise in the social media space. And while there is a need for the law to develop in line with technological developments, many of the laws that exist without amendment do apply.
  6. Citing concerns for the elderly and children the City of Chongqing created footpaths for ‘texters’ to use to prevent smartphone related accidents. In much the same way should we regard the laws that apply to social media as a protection mechanism, a safety lane for SM related accidents? We wonder whether laws are adapting sufficiently to deal with technologies and how people are using them.
  7. SM platforms are publications subject to the same laws that govern mainstream media The law governs human behaviour, digital or otherwise statutes and the common law determine social media law parameters Content that constitutes defamatory material, hate speech, harassment, ip infringement, privacy infringement Unfair labour practices Companies can be found vicariously liable for discrimination, harassment, defamation on SM where employee’s conduct occurs in course and scope of employment
  8. Ownership of social media accounts: Where an employee creates a social media account in the name of the company on, for instance, Twitter and uses Twitter to communicate (tweet) information about the company, does the company or the employee own the account? Does the company or employee own the contacts (followers)? Most importantly, does the company, employee or Twitter own the content posted? Cybersquatting: Cybersquatting traditionally referred to the bad faith registration of a domain name identical to the name (trademark) of a large company with intention to profit from the goodwill of a trademark belonging to someone else or to sell the domain to the trademark owner at an inflated price. This risk has trekked to social media sites and companies such as CNN have had to purchase social media accounts incorporating the company name from the first registrants. Loss of intellectual property: Often, companies will post content to social media sites assuming that such content will be available indefinitely. A closer inspection of the Terms and Conditions of Service of specific social media sites reveals that the site may shut down at any time, without notice to the account holder and in the event of such shut down, the site owner has no obligation to retain or pass on any content to the account holder. A failure to back up the content posted may result in the instant loss of significant intellectual property. Unauthorised disclosures of trade secrets by employees: This refers to the risk of employees who are not bound to appropriate internal policies sharing confidential information or trade secrets (formulas, know how) to their contacts through social media. Brand damage: There are numerous examples of companies that have invested millions in brand building losing brand power due to consumers’ bad ratings of the company, its employees, products or services on social media sites such as Facebook and Twitter. In addition consumers are posting comparisons of services or pricing of different companies. Whilst companies may control use of social media by employees, the reality is that companies cannot control what consumers do. With this in mind, the real risk is the inability to respond appropriately when the brand is ‘hit’. Licensing framework: copyright divisible rights, reproduction rights, exclusive licences, broadcast rights, commercial use, distribution rights, modification rights, remix rights, termination of service or account
  9. Liability for defamation involves the balancing of the right to freedom of expression with the right to dignity Limitation has to be justifiable.
  10. aims to protect vulnerable members of society
  11. The law provides a framework against which to devise SM policy
  12. ECT: The Act provides an enabling framework for the reliance on ICTs for operational purposes. The Act calls for an examination of the extent to which legal risks, including unauthorised access to communications, are enterprise risks. addresses the regulation of relationships between consumers and businesses across different areas of scope. The Act aims to promote fair business practices and establishes a control framework to ensure the fairness of contracts, introduces new protective mechanisms for consumers to exit from contractual obligations and has legislative provisions on marketing and marketing practices, including pricing transparency and restrictions over direct marketing. The Regulation of Interception of Communications and provision of communication-related Information Act 70 of 2002 regulates the interception of communications and deals specifically with the interception and monitoring of communications. Employers must ensure that they comply with the Act in relation to dealings with their employees. The Labour Relations Act 66 of 1996 governs the duty to engage in fair and appropriate practices within the workplace. The clear statement of sanctions in ICT policy documentation may promote substantive fairness whilst fair and consistent procedures for disciplinary measures associated with failure to observe ICT policies is necessary to promote procedural fairness.
  13. The regulations that make up Social media law controls conversations that occur online
  14. Employees dismissed for derogatory FB status updates. Employees had not restricted their FB privacy setting and updates could be viewed by anyone. CCMA found employer enttiled to access the posts as the employees had ‘open’ FB profiles MWA a radio station employee criticised the organisation’s board and claimed its station manager was a criminal. The CCMA found that the employee was fairly dismissed as he had posted unfounded allegations on Facebook without having addressed these internally first. Smith: chief executive officer accessed an employee’s private Gmail e-mail account while she was on leave and found e-mails between her and former employees, as well as persons outside the organisation, which made reference to internal matters. The employer initially gained access to the employee’s account accidentally but subsequent access was intentional. The employee was charged with a number of offences, including bringing the employer’s name into disrepute. In her defence at a disciplinary inquiry, the employee contended that the e-mails were accessed in violation of her right to privacy and in contravention of RICA. The CCMA found that the intentional access on the second occasion contravened RICA and the evidence obtained through this access was inadmissible on the basis of an infringement of the constitutional right to privacy. The CCMA held that the employee’s dismissal was procedurally and substantively unfair. The FPB’s Strategic Plan does recognise the enormity of the task and the need to expand its infrastructure to acheive this The FPB falls within the Department of Communications
  15. June 2012, Japheth Omojuwa, an economist by training who has become a prominent Nigerian political advocate and social media personality, went to battle over an iPad lost on a flight with Arik Air, Nigeria’s largest indigenous airline. Omojuwa won. He launched the “#ArikWhereIsMyIpad” trend from oneof his social media platforms – a Twitter account with over 100,000 followers. Other Arik Air passengers sympathetic to his plight used the same hashtag (#) to narrate their own experiences losing valuables onboard Arik Air flights. The resulting social media campaign damaged the airline’s reputation and ultimately led the company to suspend its Twitter account. “Lions go digital: The Internet’s transformative potential in Africa,” a 2013 report by According to the 2014 “Emerging Nations Embrace Internet, Mobile Technology” report by the Pew Research Global Attitudes Project, With the steady rise of its middle class and increasing income levels, internet usage across the region will only increase, making it potentially the largest social media growth market in the world.
  16. Tolu Ogunlesi, a renowned Nigerian political commentator and journalist with over 61,000 followers on Twitter: “In the early 90s, the government took control of almost everything, but now social media has changed everything. “Broadband capacity has probably quadrupled, in the last five years,” said Obi Asika, founder of Dragon Africa, and CEO of Storm 360, a Nigerian entertainment company. He attributed most of the increase in internet access to an influx of new and better mobile technologies. “Mobile internet access is now really what’s the key driver,”
  17. . Ghanaians monitored Supreme Court verdict in 2012 elections