SlideShare a Scribd company logo
1 of 15
1/30/2015Copyright 2010 TM.Biz
Protecting Trademarks
on Social Media
Topics Covered
1/30/2015Copyright 2010 TM.Biz
 Current Situation in Social Media
 Complications for Trademark Owners
 Approaches to Protection
Social Media is Exploding
1/30/2015Copyright 2010 TM.Biz
You’ve
heard of :
130 million120 million
120 million
120 million
120 million
But have
you heard
of….
100 million
…and the Thousands of “smaller” niche players
with millions of members each
500 million
160 million
200 million
Social Media is Mainstream
1/30/2015Copyright 2010 TM.Biz
• 60% of Internet users are members of Social Media
Networks – PC Advisor
• Social Media has overtaken porn as the #1 activity on
the Web – NY Times
• More than 21% of cell phone users visit social media
from their phones - Comscore
• Americans spend 25% of their time online on social
networks - Nielsen
• 25% of search results for the World’s Top 20 largest
brands are links to user-generated content - Nielsen
Usernames are the Internet’s New
Brand Identifiers
1/30/2015Copyright 2010 TM.Biz
Evolution Online for Trademark Professionals
 200 million domain names (90M are .com)
 2 billion usernames on top 20 social networks
 25% of search results… are links to user
generated content and this is growing
Complication – No Barriers to Obtain
Usernames are:
• Free to obtain
• First come - first served
• Typically have profile pages
• Indexed by search engines
• Receive traffic and can be monetized
• Typically NOT Reused
Complication - No Protection Mechanisms
Domain Names - Controlled
Today
• UDRP (Uniform Domain
Resolution Policy)
• WHOIS
• Anti-Cybersquatting
• In-Rem
• Sunrise periods
Coming Soon
• Uniform Rapid Suspension
• Trademark Clearinghouse
• IP Claims
Usernames – UNCONTROLLED
Usernames are the Wild West
when compared to Domain Names
Today
• No Dispute Policy
• No Gatekeepers
• No Group
Coming Soon
• Nothing
• Nothing
• Nothing
Complication - Everything Old is New
• Direct infringement
• Derogatory and defamatory speech
• Blatantly false information
• Impersonation of executives
Question
What should I do to protect my
Trademark’s Usernames in
Social Media?
Apply the lessons from Domain Names
1/30/2015Copyright 2010 TM.Biz
Best Practice – Be Proactive & Not Reactive
• Reserve your trademarks and key executives as
Usernames
• Identify infringement early
The Costs - Business Case
1/30/2015Copyright 2010 TM.Biz
 Proactive – Reserve Now
• Package cost ~ $ 349 one
time fee
• Trademark secured on 100
social networks
• Watch the rest
 Reactive - Do Nothing
• Assume 50 are taken
• Assume 10 are of concern
• Conduct Investigation
 Cost: $500 x 10 = $5000
• Send takedown letters
 Cost: $500 x 10 = $5000
• Sub-total cost: $10,000
• 50% success rate (5 of 10)
• Repeat as infractions occur
 Cost: $1,000/incident
Example: Secure house brand in top 100 social networks
Avoid “I think we have people handling this”
1/30/2015Copyright 2010 TM.Biz
Best Practices Dictates this should be owned by Legal
• This is a trademark protection and enforcement issue
 How is it being managed?
 Who are keeping the records?
 Is it anonymous or public?
 Who is ensuring the accounts remain active?
• Domain Name Registrars are not in this business
• Marketing Departments - may address some issues
(quick Free Search on TM.Biz and you’ll know)
Evaluate Benefits and Risks
1/30/2015Copyright 2010 TM.Biz
Proactive
 Avoid confusion
 Avoid loss of revenue
 Avoid embarrassment
 Avoid damage control
 Far less expensive than
recovery/clean-up efforts
Reactive
 Consumer confusion
 Loss of revenue
 Loss of reputation
 Legal fees
 Recovery may not be
successful
1/30/2015Copyright 2010 TM.Biz
• Reserve trademarks and key executives as
usernames
• Include social media availability searches for all
new name creation efforts
• Monitor for emerging social networks to avoid
surprises
• Investigate “taken” usernames for trademark
infringement
TM.Biz Allows you to
Sign-Up Now
1/30/2015Copyright 2010 TM.Biz
15
 Eligible trademark professionals and brand
managers can request a free account at:
http://www.tm.biz
 There are no set-up fees or subscription fees
 Unlimited searching – you pay only for
reports

More Related Content

Similar to Protecting Trademarks on Social Media

Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social MediaDoug Cornelius
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10lindseymgift
 
Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Cedric Manara
 
Community IT Innovators - BYOD for Nonprofits
Community IT Innovators - BYOD for NonprofitsCommunity IT Innovators - BYOD for Nonprofits
Community IT Innovators - BYOD for NonprofitsCommunity IT Innovators
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer FirstVivastream
 
Protecting Your Brand in a Social Media World
Protecting Your Brand in a Social Media WorldProtecting Your Brand in a Social Media World
Protecting Your Brand in a Social Media WorldTom Kulik
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStart Pad
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer FirstVivastream
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaHelen Levinson
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling OnlineRob Blamires
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the BadXavier Mertens
 
Social Media Management by Dominic Sparkes at SMWF
Social Media Management by Dominic Sparkes at SMWF Social Media Management by Dominic Sparkes at SMWF
Social Media Management by Dominic Sparkes at SMWF Social Media World Forum
 

Similar to Protecting Trademarks on Social Media (20)

Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social Media
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
 
Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?
 
Community IT Innovators - BYOD for Nonprofits
Community IT Innovators - BYOD for NonprofitsCommunity IT Innovators - BYOD for Nonprofits
Community IT Innovators - BYOD for Nonprofits
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
Protecting Your Brand in a Social Media World
Protecting Your Brand in a Social Media WorldProtecting Your Brand in a Social Media World
Protecting Your Brand in a Social Media World
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling Online
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Social Media Management by Dominic Sparkes at SMWF
Social Media Management by Dominic Sparkes at SMWF Social Media Management by Dominic Sparkes at SMWF
Social Media Management by Dominic Sparkes at SMWF
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Protecting Trademarks on Social Media

  • 1. 1/30/2015Copyright 2010 TM.Biz Protecting Trademarks on Social Media
  • 2. Topics Covered 1/30/2015Copyright 2010 TM.Biz  Current Situation in Social Media  Complications for Trademark Owners  Approaches to Protection
  • 3. Social Media is Exploding 1/30/2015Copyright 2010 TM.Biz You’ve heard of : 130 million120 million 120 million 120 million 120 million But have you heard of…. 100 million …and the Thousands of “smaller” niche players with millions of members each 500 million 160 million 200 million
  • 4. Social Media is Mainstream 1/30/2015Copyright 2010 TM.Biz • 60% of Internet users are members of Social Media Networks – PC Advisor • Social Media has overtaken porn as the #1 activity on the Web – NY Times • More than 21% of cell phone users visit social media from their phones - Comscore • Americans spend 25% of their time online on social networks - Nielsen • 25% of search results for the World’s Top 20 largest brands are links to user-generated content - Nielsen
  • 5. Usernames are the Internet’s New Brand Identifiers 1/30/2015Copyright 2010 TM.Biz Evolution Online for Trademark Professionals  200 million domain names (90M are .com)  2 billion usernames on top 20 social networks  25% of search results… are links to user generated content and this is growing
  • 6. Complication – No Barriers to Obtain Usernames are: • Free to obtain • First come - first served • Typically have profile pages • Indexed by search engines • Receive traffic and can be monetized • Typically NOT Reused
  • 7. Complication - No Protection Mechanisms Domain Names - Controlled Today • UDRP (Uniform Domain Resolution Policy) • WHOIS • Anti-Cybersquatting • In-Rem • Sunrise periods Coming Soon • Uniform Rapid Suspension • Trademark Clearinghouse • IP Claims Usernames – UNCONTROLLED Usernames are the Wild West when compared to Domain Names Today • No Dispute Policy • No Gatekeepers • No Group Coming Soon • Nothing • Nothing • Nothing
  • 8. Complication - Everything Old is New • Direct infringement • Derogatory and defamatory speech • Blatantly false information • Impersonation of executives
  • 9. Question What should I do to protect my Trademark’s Usernames in Social Media?
  • 10. Apply the lessons from Domain Names 1/30/2015Copyright 2010 TM.Biz Best Practice – Be Proactive & Not Reactive • Reserve your trademarks and key executives as Usernames • Identify infringement early
  • 11. The Costs - Business Case 1/30/2015Copyright 2010 TM.Biz  Proactive – Reserve Now • Package cost ~ $ 349 one time fee • Trademark secured on 100 social networks • Watch the rest  Reactive - Do Nothing • Assume 50 are taken • Assume 10 are of concern • Conduct Investigation  Cost: $500 x 10 = $5000 • Send takedown letters  Cost: $500 x 10 = $5000 • Sub-total cost: $10,000 • 50% success rate (5 of 10) • Repeat as infractions occur  Cost: $1,000/incident Example: Secure house brand in top 100 social networks
  • 12. Avoid “I think we have people handling this” 1/30/2015Copyright 2010 TM.Biz Best Practices Dictates this should be owned by Legal • This is a trademark protection and enforcement issue  How is it being managed?  Who are keeping the records?  Is it anonymous or public?  Who is ensuring the accounts remain active? • Domain Name Registrars are not in this business • Marketing Departments - may address some issues (quick Free Search on TM.Biz and you’ll know)
  • 13. Evaluate Benefits and Risks 1/30/2015Copyright 2010 TM.Biz Proactive  Avoid confusion  Avoid loss of revenue  Avoid embarrassment  Avoid damage control  Far less expensive than recovery/clean-up efforts Reactive  Consumer confusion  Loss of revenue  Loss of reputation  Legal fees  Recovery may not be successful
  • 14. 1/30/2015Copyright 2010 TM.Biz • Reserve trademarks and key executives as usernames • Include social media availability searches for all new name creation efforts • Monitor for emerging social networks to avoid surprises • Investigate “taken” usernames for trademark infringement TM.Biz Allows you to
  • 15. Sign-Up Now 1/30/2015Copyright 2010 TM.Biz 15  Eligible trademark professionals and brand managers can request a free account at: http://www.tm.biz  There are no set-up fees or subscription fees  Unlimited searching – you pay only for reports

Editor's Notes

  1. We all know Social Media is taking over online and we know the usual suspects There is a wave coming behind that gaining momentum even more quickly and then behind that there is another wave of new players and niche players. It can seem overwhelming and just like websites in the mid 90s something some folks would like to ignore but as we learned then that would be a mistake
  2. That would be a mistake because Social Media is already mainstream This final point is probably the most important to Trademark Professional because Social Media has now reached the tipping point
  3. So if you put all the pieces together its very clear that when compared to Domain Names Usernames are gaining parity as the Internet’s
  4. So this creates some now complications and issues for trademark professionals. T
  5. When compared to Domain Names what thi
  6. Finally everything old is new. The issues for usernames are the same issues you always face with trademarks
  7. Learn from the past
  8. It makes sense to be proactive…. Protecting yourself is simple and costs next to nothing when compared to doing nothing now and dealing with it downstream.
  9. It could also be a mistake delegating to others. We learned these lessons with Domain Names as well
  10. At the end of the day you need to look at the pros and the cons for your businesses and clients