SlideShare ist ein Scribd-Unternehmen logo
1 von 13
YouSued.com

Law & Social Data


         By: David M. Adler
Leavens, Strand, Glover & Adler, LLC
 203 North LaSalle Street, Suite 2550
       Chicago, Illinois 60601
             @adlerlaw
Use
of
Social
Overview
Many Businesses & Individuals Lack Resources

Inadequate understanding of legal and regulatory requirements

Rights owners and Users can benefit

Ignorance = Risk
    content removed
    civil and criminal penalties
    Lost time, money and business opportunities

Learn the “Rules of the Road” for creation, commercialization and
enforcement of the rights and obligations

Disclaimer: While I’d be delighted to represent you, this is NOT legal
advice and I am not your lawyer.
Copyright
Protects Content
Rights
   Acquired Automatically 17 USC §201(a)
   Employees/Work-Made-For-Hire

Infringement Issues
Digital Millennium Copyright Act (DMCA)
Non-Preemptable Common Law Claims
   Hot news, Breach of Contract, Digital Trespass

Fair Use = After the Fact Defense; Highly Facts &
Circumstances Dependent; ≠Permission
Right of Publicity

Right to control and to choose whether and how
to use an individual’s identity for commercial
purposes

Personal Identity Attributes: (i) name, (ii)
signature, (iii) photograph, (iv) image, (v)
likeness, or (vi) voice

19 states with Rt. Of Publicity Statutes, 28 states
recognize common law right

Defenses: identity not used (Question of fact), de
minims use, transformative use
Trademarks
Scope

Copycats: Brandjacking / Cybersquatting

Comparative Advertising

Liability For Trademark Infringement

Defenses

Product Placement
Defamation
Definition:
    Slander (statements) and libel (written, broadcast, or
    published)
    FALSE claim, either express or implied
    Per Se (crime, disease, integrity, sexual conduct) & Per
    Quod

Defamation In Cyberspace (Section 230)
    Former Head / VP Indian Cricketing League fined
    US$140,000 for Libelous Tweet.

Selected Defenses:
IL: (i) fair report privilege, (ii) substantial truth, & (iii)
opinion and fair comment
Content & Speech Regulation
Obscenity / Communications Decency Act - Obscene
Materials
Children: Children's Online Privacy Protection Act
(COPPA) & Children's Internet Protection Act (CIPA)
State Regulation
First Amendment
State Laws
   NY bills S6779 A8688 - would ban “anonymous”
   speech
   AZ bill 2529 – criminalizes any speech that could be
   construed as cyber-bullying
   WA SB 6251 – criminalizes providing access to third
   parties' “offensive” materials by online service
   providers
Marketing Issues

CAN-SPAM
   Email
   Text/Mobile Messaging

Promotions
   Sweepstakes / Contests Governed by State Laws

FTC
   Endorsement / Testimonial Guidelines

Regulate Industries: FTC, FDA, FINRA, SEC, NLRB
Platforms/Transmedia
Workplace Issues
The NLRB released 3 Reports, the latest May 30, 2012
    An employer violates the Act if a rule “would reasonably
    tend to chill employees in the exercise of their Section 7
    rights.”

Practical Applications. Top 5 Mistakes:
    No Policy. According to Grant Thornton, as of Nov. 2011,
    79% of companies surveyed did not have social media
    policies
    Policy Unenforceable. In 2011, the NLRB had received
    129 cases involving social media
    Policy Unclear. Training employees is just the beginning;
    AU telecom co. Telstra (40,000+ employees) mandates
    training “3Rs” – responsibility, respect and representation
    Policy Outdated. Oct. 2011 FTC settles with Frostwire,
    developer of p2p file-sharing application over the default
    privacy settings
    Loss of Trade Secrets. Phonedog. Christou v. Betaport
Privacy
Internet/Connected Devices/Social Media create
HUGE Privacy Risks
   Collection/Analysis/Sharing personal data is driving the
   digital economy.
   Industry & Government Initiatives: Do Not Track;
   Privacy Bill of Rights; GPS/Geo-location Data
   Guidelines:
      No Surprises: Disclose What, With Whom Shared &
      Why
      Real Choices: Opt-in v. Opt Out
      User Control: Ability to change one’s mind
      Trusted Third Parties: Know with Whom Data is shared
      Sensible Settings
      Limited Data
Due Diligence
Contracts/Policies/Procedures
   Social Media & Privacy
   BYOD
   Affiliates/Sponsors/Contractors

Clearance
   Copyright/Trademark/Right of Publicity

Compliance
   State & Federal Regulations
Thank You!
David M. Adler | Leavens, Strand, Glover & Adler, LLC

         203 North LaSalle Street, Suite 2550

                Chicago, Illinois 60601

                Direct: (866) 734-2568

                 Fax: (312) 275-7534

            www.ecommerceattorney.com

                  www.lsglegal.com

               adlerlaw.wordpress.com

                      @adlerlaw

Weitere ähnliche Inhalte

Was ist angesagt?

Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
Sheetal Verma
 

Was ist angesagt? (20)

Cyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in ReviewCyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in Review
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
SOPA
SOPASOPA
SOPA
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
Ppt by
Ppt by Ppt by
Ppt by
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
2018 Legal Update on Digital Access Cases with Lainey Feingold
2018 Legal Update on Digital Access Cases with Lainey Feingold2018 Legal Update on Digital Access Cases with Lainey Feingold
2018 Legal Update on Digital Access Cases with Lainey Feingold
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Daniel E Dekoter
Daniel E DekoterDaniel E Dekoter
Daniel E Dekoter
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 

Ähnlich wie Tech Week Chicago 2012: Law & Social Data

httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
bartholomeocoombs
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
 
Avoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingAvoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in Marketing
Tokusoudeka
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Vivastream
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
Dmcenter
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
walterl4
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
Vivastream
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
Act-On Software
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Vivastream
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
GiannisBasa
 

Ähnlich wie Tech Week Chicago 2012: Law & Social Data (20)

Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR Implications
 
Avoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingAvoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in Marketing
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
 

Mehr von Adler Law Group

Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Adler Law Group
 

Mehr von Adler Law Group (13)

Using Privacy to Enhance Your Brand ClickZLive SF via Adlerlaw
Using Privacy to Enhance Your Brand ClickZLive SF via AdlerlawUsing Privacy to Enhance Your Brand ClickZLive SF via Adlerlaw
Using Privacy to Enhance Your Brand ClickZLive SF via Adlerlaw
 
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
 
ISBA Privacy CLE “special areas”
ISBA Privacy CLE “special areas”ISBA Privacy CLE “special areas”
ISBA Privacy CLE “special areas”
 
Privacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location DataPrivacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location Data
 
Identifying Intellectual Property Issues in Startups 2014
Identifying Intellectual Property Issues in Startups 2014Identifying Intellectual Property Issues in Startups 2014
Identifying Intellectual Property Issues in Startups 2014
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
Entertainment Law & Technology: Trends in Media & Advertising
Entertainment Law & Technology:  Trends in Media & AdvertisingEntertainment Law & Technology:  Trends in Media & Advertising
Entertainment Law & Technology: Trends in Media & Advertising
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
Facebook Marketing Legal & Regulatory Compliance
Facebook Marketing Legal & Regulatory ComplianceFacebook Marketing Legal & Regulatory Compliance
Facebook Marketing Legal & Regulatory Compliance
 
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
Rosetta Stone, Ltd. v. Google, Inc., No. 10-2007 (4th Cir. April 9, 2012)
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
Social Media Legal, Regulatory & Compliance: Risks & Issues
Social Media Legal, Regulatory & Compliance: Risks & IssuesSocial Media Legal, Regulatory & Compliance: Risks & Issues
Social Media Legal, Regulatory & Compliance: Risks & Issues
 
Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Tech Week Chicago 2012: Law & Social Data

  • 1. YouSued.com Law & Social Data By: David M. Adler Leavens, Strand, Glover & Adler, LLC 203 North LaSalle Street, Suite 2550 Chicago, Illinois 60601 @adlerlaw
  • 3. Overview Many Businesses & Individuals Lack Resources Inadequate understanding of legal and regulatory requirements Rights owners and Users can benefit Ignorance = Risk content removed civil and criminal penalties Lost time, money and business opportunities Learn the “Rules of the Road” for creation, commercialization and enforcement of the rights and obligations Disclaimer: While I’d be delighted to represent you, this is NOT legal advice and I am not your lawyer.
  • 4. Copyright Protects Content Rights Acquired Automatically 17 USC §201(a) Employees/Work-Made-For-Hire Infringement Issues Digital Millennium Copyright Act (DMCA) Non-Preemptable Common Law Claims Hot news, Breach of Contract, Digital Trespass Fair Use = After the Fact Defense; Highly Facts & Circumstances Dependent; ≠Permission
  • 5. Right of Publicity Right to control and to choose whether and how to use an individual’s identity for commercial purposes Personal Identity Attributes: (i) name, (ii) signature, (iii) photograph, (iv) image, (v) likeness, or (vi) voice 19 states with Rt. Of Publicity Statutes, 28 states recognize common law right Defenses: identity not used (Question of fact), de minims use, transformative use
  • 6. Trademarks Scope Copycats: Brandjacking / Cybersquatting Comparative Advertising Liability For Trademark Infringement Defenses Product Placement
  • 7. Defamation Definition: Slander (statements) and libel (written, broadcast, or published) FALSE claim, either express or implied Per Se (crime, disease, integrity, sexual conduct) & Per Quod Defamation In Cyberspace (Section 230) Former Head / VP Indian Cricketing League fined US$140,000 for Libelous Tweet. Selected Defenses: IL: (i) fair report privilege, (ii) substantial truth, & (iii) opinion and fair comment
  • 8. Content & Speech Regulation Obscenity / Communications Decency Act - Obscene Materials Children: Children's Online Privacy Protection Act (COPPA) & Children's Internet Protection Act (CIPA) State Regulation First Amendment State Laws NY bills S6779 A8688 - would ban “anonymous” speech AZ bill 2529 – criminalizes any speech that could be construed as cyber-bullying WA SB 6251 – criminalizes providing access to third parties' “offensive” materials by online service providers
  • 9. Marketing Issues CAN-SPAM Email Text/Mobile Messaging Promotions Sweepstakes / Contests Governed by State Laws FTC Endorsement / Testimonial Guidelines Regulate Industries: FTC, FDA, FINRA, SEC, NLRB Platforms/Transmedia
  • 10. Workplace Issues The NLRB released 3 Reports, the latest May 30, 2012 An employer violates the Act if a rule “would reasonably tend to chill employees in the exercise of their Section 7 rights.” Practical Applications. Top 5 Mistakes: No Policy. According to Grant Thornton, as of Nov. 2011, 79% of companies surveyed did not have social media policies Policy Unenforceable. In 2011, the NLRB had received 129 cases involving social media Policy Unclear. Training employees is just the beginning; AU telecom co. Telstra (40,000+ employees) mandates training “3Rs” – responsibility, respect and representation Policy Outdated. Oct. 2011 FTC settles with Frostwire, developer of p2p file-sharing application over the default privacy settings Loss of Trade Secrets. Phonedog. Christou v. Betaport
  • 11. Privacy Internet/Connected Devices/Social Media create HUGE Privacy Risks Collection/Analysis/Sharing personal data is driving the digital economy. Industry & Government Initiatives: Do Not Track; Privacy Bill of Rights; GPS/Geo-location Data Guidelines: No Surprises: Disclose What, With Whom Shared & Why Real Choices: Opt-in v. Opt Out User Control: Ability to change one’s mind Trusted Third Parties: Know with Whom Data is shared Sensible Settings Limited Data
  • 12. Due Diligence Contracts/Policies/Procedures Social Media & Privacy BYOD Affiliates/Sponsors/Contractors Clearance Copyright/Trademark/Right of Publicity Compliance State & Federal Regulations
  • 13. Thank You! David M. Adler | Leavens, Strand, Glover & Adler, LLC 203 North LaSalle Street, Suite 2550 Chicago, Illinois 60601 Direct: (866) 734-2568 Fax: (312) 275-7534 www.ecommerceattorney.com www.lsglegal.com adlerlaw.wordpress.com @adlerlaw