SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Security: Identifying and Managing the Legal Risks of Development and Twitter Prof. Jonathan I. Ezor Touro Law Center 140: The Twitter Conference September 23, 2009 jezor@tourolaw.edu @ProfJonathan
Risk Management Key to Successful Business Risks come from many sources Financial Technological Legal “Silos” can lead to missed risks (and opportunities) Legal (hopefully) constructive part of team jezor@tourolaw.edu / @ProfJonathan
Software Development, Internet Both Have Unique Risks Each depends on other vendors, users for functionality Each also used for business-critical functions Combination adds to challenges jezor@tourolaw.edu / @ProfJonathan
Risks and Management for Twitter Software Developers Rights to their own code  Use and limits of contract language  General workplace risk from soc media use Unexpected legal issues  The Fail Whale Insurance jezor@tourolaw.edu / @ProfJonathan
Code and Copyright Software covered by copyright Under US law, copyright exists on creation Generally, creator (or employer) automatically owns copyright Otherwise, only transferred in writing Filing allows for litigation, increases remedies jezor@tourolaw.edu / @ProfJonathan
Licenses: Giving and Receiving Licenses how copyright holders control use by others Many types Cover variety of rights Freeware ≠ Public Domain (“libre” vs. “gratuit”) For software, license may be to object and/or source code jezor@tourolaw.edu / @ProfJonathan
Accidental Open Source “Infection” Open source licenses require devs to make source code avail to users May be free or commercial Different licenses (GNU, Creative Commons, Etc.) Issue when open source incorporated into intended closed source May turn entire project into open source Developer may not know about inclusion Must educate developers, monitor libraries/code jezor@tourolaw.edu / @ProfJonathan
Contract Language Contracts popular way to identify/manage risks Provide permitted uses State/limit warranties Limit liability Set applicable law May be provided in EULA, Terms of Use, etc Employee contracts also crucial (NDAs, non-competes, etc.) jezor@tourolaw.edu / @ProfJonathan
Contracts May Not Provide Expected Protection Contracts governed by state law Some language may be overbroad Clickthroughs may/may not be sufficient Copying others’ contracts could be problem As risks increase, need for signed contract does as well jezor@tourolaw.edu / @ProfJonathan
General Workplace Risks from Social Media Use As said yesterday, Twitter-focused companies “eat their own dog food” Also as said yesterday, humor in business doesn’t always work well Need to balance benefits and risks of Internet access/use in workplace Culture, business need, productivity all concerns jezor@tourolaw.edu / @ProfJonathan
http://shankman.com/be-careful-what-you-post/ Many of my peers and I feel this is inappropriate. We do not know the total millions of dollars FedEx Corporation pays Ketchum annually for the valuable and important work your company does for us around the globe. We are confident however, it is enough to expect a greater level of respect and awareness from someone in your position as a vice president at a major global player in your industry. A hazard of social networking is people will read what you write.
Additional Internet-Related Legal Risks to Consider Privacy International issues Consumer protection Prize promotions (http://bit.ly/ke7y5) Spam Overall marketing Others jezor@tourolaw.edu / @ProfJonathan
What if Twitter Fails? Building business on single vendor puts success in its hands Twitter a single company, single product Subject to technical issues, business risks of own When Twitter Ain’t Running, Ain’t Nobody Running: http://bit.ly/19gpb3 jezor@tourolaw.edu / @ProfJonathan
Appropriate Insurance a Key Risk Management Component Most businesses have some kind of insurance Question whether it covers Internet-related risks Many carriers offer appropriate policies Need to ask/find broker who also understands jezor@tourolaw.edu / @ProfJonathan
jezor@tourolaw.edu Knowledge, Policies and Procedures Must Work Together To Minimize Risks Create a “Social Media Policy” and enforce it (Good list at http://bit.ly/58oeQ) Adequate funding of IT staff, including training Make sure employees and outside professionals given proper education Set up systems with business concerns in mind Keep up with trade press Follow company on Twitter, FB, etc.
QUESTIONS?
Jonathan I. Ezorjezor@tourolaw.edu@ProfJonathan on Twitterhttp://www.mobilerisk.com

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyMike Murray
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsDave Tinker, CFRE
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
Uses,mis uses and risk of software
Uses,mis uses and risk of softwareUses,mis uses and risk of software
Uses,mis uses and risk of softwareAHSSAN AKHTAR
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital ParentsClint Hamada
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of softwareAbdulJabbar459
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

Was ist angesagt? (17)

Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Uses,mis uses and risk of software
Uses,mis uses and risk of softwareUses,mis uses and risk of software
Uses,mis uses and risk of software
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital Parents
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of software
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Andere mochten auch

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLEJonathan Ezor
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright PresentationJonathan Ezor
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practiceJonathan Ezor
 
3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentationJonathan Ezor
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsJonathan Ezor
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media RiskJonathan Ezor
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality PresentationJonathan Ezor
 

Andere mochten auch (9)

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 

Ähnlich wie 9 23 09 140tc Security Presentation

Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperJames Tanner
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Raul Colon
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymondspencerharry
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 

Ähnlich wie 9 23 09 140tc Security Presentation (20)

Iwamoto-Crews-Coe
Iwamoto-Crews-CoeIwamoto-Crews-Coe
Iwamoto-Crews-Coe
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 

Mehr von Jonathan Ezor

10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar CommitteeJonathan Ezor
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationJonathan Ezor
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsJonathan Ezor
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal EthicsJonathan Ezor
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics PresentationJonathan Ezor
 

Mehr von Jonathan Ezor (6)

10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal Ethics
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

9 23 09 140tc Security Presentation

  • 1. Security: Identifying and Managing the Legal Risks of Development and Twitter Prof. Jonathan I. Ezor Touro Law Center 140: The Twitter Conference September 23, 2009 jezor@tourolaw.edu @ProfJonathan
  • 2. Risk Management Key to Successful Business Risks come from many sources Financial Technological Legal “Silos” can lead to missed risks (and opportunities) Legal (hopefully) constructive part of team jezor@tourolaw.edu / @ProfJonathan
  • 3. Software Development, Internet Both Have Unique Risks Each depends on other vendors, users for functionality Each also used for business-critical functions Combination adds to challenges jezor@tourolaw.edu / @ProfJonathan
  • 4. Risks and Management for Twitter Software Developers Rights to their own code  Use and limits of contract language  General workplace risk from soc media use Unexpected legal issues  The Fail Whale Insurance jezor@tourolaw.edu / @ProfJonathan
  • 5. Code and Copyright Software covered by copyright Under US law, copyright exists on creation Generally, creator (or employer) automatically owns copyright Otherwise, only transferred in writing Filing allows for litigation, increases remedies jezor@tourolaw.edu / @ProfJonathan
  • 6. Licenses: Giving and Receiving Licenses how copyright holders control use by others Many types Cover variety of rights Freeware ≠ Public Domain (“libre” vs. “gratuit”) For software, license may be to object and/or source code jezor@tourolaw.edu / @ProfJonathan
  • 7. Accidental Open Source “Infection” Open source licenses require devs to make source code avail to users May be free or commercial Different licenses (GNU, Creative Commons, Etc.) Issue when open source incorporated into intended closed source May turn entire project into open source Developer may not know about inclusion Must educate developers, monitor libraries/code jezor@tourolaw.edu / @ProfJonathan
  • 8. Contract Language Contracts popular way to identify/manage risks Provide permitted uses State/limit warranties Limit liability Set applicable law May be provided in EULA, Terms of Use, etc Employee contracts also crucial (NDAs, non-competes, etc.) jezor@tourolaw.edu / @ProfJonathan
  • 9. Contracts May Not Provide Expected Protection Contracts governed by state law Some language may be overbroad Clickthroughs may/may not be sufficient Copying others’ contracts could be problem As risks increase, need for signed contract does as well jezor@tourolaw.edu / @ProfJonathan
  • 10. General Workplace Risks from Social Media Use As said yesterday, Twitter-focused companies “eat their own dog food” Also as said yesterday, humor in business doesn’t always work well Need to balance benefits and risks of Internet access/use in workplace Culture, business need, productivity all concerns jezor@tourolaw.edu / @ProfJonathan
  • 11. http://shankman.com/be-careful-what-you-post/ Many of my peers and I feel this is inappropriate. We do not know the total millions of dollars FedEx Corporation pays Ketchum annually for the valuable and important work your company does for us around the globe. We are confident however, it is enough to expect a greater level of respect and awareness from someone in your position as a vice president at a major global player in your industry. A hazard of social networking is people will read what you write.
  • 12.
  • 13.
  • 14. Additional Internet-Related Legal Risks to Consider Privacy International issues Consumer protection Prize promotions (http://bit.ly/ke7y5) Spam Overall marketing Others jezor@tourolaw.edu / @ProfJonathan
  • 15.
  • 16.
  • 17. What if Twitter Fails? Building business on single vendor puts success in its hands Twitter a single company, single product Subject to technical issues, business risks of own When Twitter Ain’t Running, Ain’t Nobody Running: http://bit.ly/19gpb3 jezor@tourolaw.edu / @ProfJonathan
  • 18. Appropriate Insurance a Key Risk Management Component Most businesses have some kind of insurance Question whether it covers Internet-related risks Many carriers offer appropriate policies Need to ask/find broker who also understands jezor@tourolaw.edu / @ProfJonathan
  • 19. jezor@tourolaw.edu Knowledge, Policies and Procedures Must Work Together To Minimize Risks Create a “Social Media Policy” and enforce it (Good list at http://bit.ly/58oeQ) Adequate funding of IT staff, including training Make sure employees and outside professionals given proper education Set up systems with business concerns in mind Keep up with trade press Follow company on Twitter, FB, etc.
  • 21. Jonathan I. Ezorjezor@tourolaw.edu@ProfJonathan on Twitterhttp://www.mobilerisk.com