SlideShare a Scribd company logo
1 of 158
PART 1

  Managing the Legal Risks:
  Social Media in the Workplace
  Andrew Allison, Quirk




Disclaimer: This presentation has been prepared for the sole use of the delegates who attended the
workshops held by Quirk Education in CT and JHB on 3 and 5 April 2012. Furthermore, no information
contained in this presentation shall be construed as advice – it is for educational and information purposes
only and is provided on an "as is" basis. You accordingly assume total responsibility and risk for your use of
and reliance on the presentation.
If you want to
  learn about
    risk, give
 mining a try
…and more
specifically, try
 gold mining
So what does gold mining have to do with
            social media?
Translating and applying the mining industry’s
         risk management framework
            to the office environment
International Organization for Standardization

ISO 31000: family of standards “to provide principles
    and generic guidelines on risk management”
What is risk?




“The effect of uncertainty on objectives,
     whether positive or negative”
Risk management steps




1. identify   2. assess   3. prioritise   4. treat
Risk treatment




1. eliminate   2. mitigate    3. share   4. accept
So what is the biggest single source of risk in
           the office environment?
these guys
Vicarious liability
(employer’s general risk)
What is
      vicarious
      liability?


Strict – or “no fault” - liability of an employer for
the conduct of an employee acting in the
course and scope of employment
Bezuidenhout NO
 v Eskom 2003
Managing the risks posed by
                  vicarious liability




1. identify      2. assess    3. prioritise   4. treat
Treating the risks posed by
                    vicarious liability




1. eliminate     2. mitigate    3. share     4. accept
…and so
what about
  social
 media?
Step 1. Identify
Conduct: use of social media in the workplace
Step 2. Assess
Defamation




             Confidentiality


4 specific
  risks
               Personal
              Information




               Intellectual
                Property
Defamation




           Confidentiality



1st risk
             Personal
            Information




             Intellectual
              Property
Defamation




“the intentional and wrongful publication of words or
behaviour to a third party which has the effect
(objectively viewed) of injuring or undermining a
person’s or entity’s good name, status or reputation”
Defamation




The internet has increased the scope of and risk
associated with defamation

There are now more ways in which publication may
occur
Remember




Defamation includes the repeating, confirmation or
proliferation of defamatory content…

…so beware of republishing, email forwarding, linking
and retweeting
Key criteria




Once publication has been established, it is
presumed that publication was:
> intentional
> wrongful or unlawful
Defences




Against wrongfulness: truth for public benefit, fair
comment, privilege, consent and necessity

Against intent: mistake, jest, intoxication and insanity
…and, of
 course,
vicarious
 liability
Defamation
eliminate > mitigate > share > accept
Eliminate




> Lock employees out of social media sites
> Limit access for work purposes only
Mitigate




> Training
> Internet usage and email policies
> Communications and brand guidelines
> Management pre-approval of publications
Share




> Disclaimers on digital properties
> Website terms and conditions
> Insurance
Accept




Hope for the best and deal with it if it happens
“psychotic, lying,
                    whoring, still-going-
                    to-clubs-at-her-age
                    skank”




This guy shot JFK
GOLDEN RULE FOR EMPLOYEES:
“IF YOU DON’T WANT TO SEE YOUR MESSAGE
IN THE NEWSPAPER TOMORROW, DON’T POST
IT!”
Defamation




           Confidentiality



2nd risk
             Personal
            Information




             Intellectual
              Property
Pretty much all well-drafted commercial
agreements these days contain
confidentiality – or non-disclosure –
provisions of some sort or another.
…once again,
 vicarious
  liability
Confidentiality
eliminate > mitigate > share > accept
Eliminate




> Do not accept confidential material
> Only accept what is strictly necessary
Mitigate




> Training
> Employment agreements and policies
> Secure networks and robust IT infrastructure
Share




> Well considered NDAs
> Insurance
Accept




Hope for the best and deal with it if it happens
Defamation




           Confidentiality



3rd risk
             Personal
            Information




             Intellectual
              Property
The right to privacy is protected by the
Constitution

However, there is currently no umbrella law
governing privacy of personal information in
South Africa
Chapter 8 of ECTA contains a data protection
“Code of Good Practice”, but compliance is
voluntary

If adopted, the principles should be included in
website privacy policy and consequences of
breach should be clearly stipulated
By contrast, the UK’s Data Protection Act has
been in effect since 1998 and gives effect to
the EU Data Protection Directive
Enter the Protection of Personal Information
Bill (POPI)

…to be discussed in more detail later
Direct Marketing
Opt-in versus opt-out
Direct
    marketing
       Opt out




ECTA (section 45) and the CPA (section 11) both require
direct marketers to provide recipients with an option to “opt
out”

The CPA envisages an “opt out” registry (like that of the
DMASA), but this has not yet been implemented
Direct
   marketing
      Opt out




DMASA and ISPA Codes of Good Practice both endorse an
“opt out” system
.
Direct
   marketing
       Opt in




POPI, however, will implement an “opt in” framework,
mirroring the approach being adopted in Europe
Direct
    marketing
         Opt in




Direct marketing will be prohibited except:
> with specific consent of the data subject
> to customers, where:
    > the processor has obtained personal information in the context of a
       sale
    > for marketing of processor’s similar products/services
    > if data subject has been given opportunity to object or opt out (free
       of charge)
Direct
   marketing
     Soft opt in




In the UK, the implied “opt in” is known as a “soft opt
in”

It applies also in the context of negotiations leading
up to a sale
…you know the
score by now
Personal Information
eliminate > mitigate > share > accept
Eliminate




> Do not collect/process personal information
> Only collect what is strictly necessary
Mitigate




> Training
> Internal policies and guidelines
> IT and online security
> Compliance with ECTA, CPA and POPI
> Regular audits
Share




> Detailed commercial agreements
> Website terms and conditions
> Insurance
Accept




Hope for the best and deal with it if it happens
Defamation




           Confidentiality



4th risk
             Personal
            Information




             Intellectual
              Property
What is IP?




“A work or invention that is the result of
creativity, such as a manuscript or a design,
to which one has rights and for which one may
apply for a patent, copyright, trademark, etc.”
Intellectual Property
      Copyright
      Trademark
        Patent
COPYRIGHT
What is
  copyright?




“A proprietary right which arises automatically
when an author reduces an idea to a material
form”
What is
   copyright?



No requirement for registration (in SA)

Copyright can be:
 > assigned (must be in writing and signed)
 > licenced
What is
   copyright?




Copyright persists for 50 years:
> from date of publication (for companies)
> from the death of the author (for natural persons)
Moral
     rights



Moral rights vest in the author/creator of copyrighted
works

Cannot be assigned, but can be waived
Moral
      rights




Moral rights include:
> the right to attribution (paternity)
> the right to integrity
Breach of
   copyright




Breach or infringement of copyright may be:
> direct (guilty knowledge is not a pre-requisite)
> secondary/indirect (unauthorised dealing)
> contributory (facilitation of infringement)
Important!




Copyright in work produced by employee in the
course of employment vests with employer

Online properties often comprise of many different
copyrighted assets
TRADEMARKS
What is a
  trademark?




A mark which distinguishes a person’s goods or
services (requirement of distinctiveness)

Must be registered with CIPC and renewed every 10
years
Breach of
       TM



Infringer’s mark is confusingly similar in respect of
the same goods/services (reasonable likelihood of
confusion)

Infringer’s mark is identical or similar to a registered
mark in respect of similar goods or services
Breach of
      TM



Dilution of trade mark:
> by blurring (dilution of uniqueness; may be
  different or non-competing goods/services)
> by tarnishment (negative/offensive use of TM)
Meta tags
   and PPC


A common sense approach should be employed
(certain bona fide uses protected under Trade Marks
Act)
> purely descriptive purposes (advertising
  products on an e-commerce site) would generally
  be ok
> use of a competitor’s marks to deceive or lure
  consumers would generally not be ok
In depth – trademark


      This is
    Terri Welles
Intellectual Property
eliminate > mitigate > share > accept
Eliminate




> Use only proprietary material
> Limit access to the internet / social media
Mitigate




> Training
> Internal policies and guidelines
> Provide access to stock content providers
> Regular audits and management sign-off
Share




> Detailed commercial agreements
> Limit liability for 3rd party IP infringements
> Insurance
Accept




Hope for the best and deal with it if it happens
“We’re comfortable with people using our images to
build traffic. The point in time when they have a
business model, they have to have some sort of
licence”.




                                 Jonathan Klein
                                    CEO, Getty
Who owns
your twitter
 account?
…or who is
using it??
…back to
 mining
Social Media Policy
• Guidelines for principle-based approach (Coca Cola)
• “Big stick” approach (Commonwealth Bank)
• Hybrid (educational and regulatory)
Risk management steps




1. identify   2. assess   3. prioritise   4. treat
Risk treatment




1. eliminate   2. mitigate    3. share   4. accept
the end
(of Part 1)
BREAK
Managing the Legal Risks:
Social Media in the Workplace
Andrew Allison, Quirk




                                PART 2
CONSUMER RIGHTS AND SOCIAL MEDIA
     IN THE NEW MILLENIUM
Electronic Communications & Transactions Act (ECTA)
Consumer Protection Act (CPA)
Protection of Personal Information Bill (POPI)
ELECTRONIC COMMUNICATIONS AND
TRANSACTIONS ACT
2002
Purpose:
     Why



To enable and facilitate electronic transactions by
creating legal certainty around transactions and
communications conducted electronically
Purpose:
     How



By:
> developing a national e-strategy for SA
> ensuring recognition and equivalence between
  electronic and paper-based transactions
> promoting confidence in electronic transactions
> providing supervision of certain service providers
ECTA and
  consumers




Chapter 7: Consumer Protection

Chapter 8: Personal Information & Privacy Protection
ECTA:
  Chapter 7
  Section 43


Must give consumers required information, including:
• the price of the product or service;
• contact details; and
• the right to withdraw from an electronic
   transaction before its completion,
or consumer can cancel within 14 days
ECTA:
  Chapter 7
  Section 44




Cooling-off period (7 days):
• for contract for goods, from date of receipt
• for contract of services, from date of contract
ECTA:
   Chapter 8




Voluntary data protection “Code of Good Practice”

Principles must be adopted in whole; cannot be
adopted in part
ECTA:
   Chapter 8
   Section 51



Principles for collecting personal info
> Must have written consent for processing of
  personal information
> May not collect unnecessary information
> Must disclose purpose(s) of processing, and may
  only process for such purpose(s)
ECTA:
  Chapter 8
  Section 51



> Must keep record of data and purpose for which it
  was processed for 1 year
> Must not disclose data (except as required by law)
> Must delete obsolete data
> May use data to compile statistical profiles for
  trade, but must not include personal info
ECTA:
  Chapter 8
  Section 50



If adopted, the principles should be included in
website privacy policy or terms and conditions and
consequences of breach should be clearly stipulated.

Remedies for breach of code are as agreed between
the parties.
CONSUMER PROTECTION ACT
2011
CPA:
     Why?




“To promote a fair, accessible and sustainable
marketplace for consumer products and services
and for that purpose to establish national norms and
standards relating to consumer protection…”
CPA:
     Who?



The Consumer:
> A person to whom goods or services are
  marketed in the ordinary course of business
> A user of goods or a recipient or beneficiary of
  services, irrespective of whether that person was
  party to a transaction concerning the supply of
  those goods or services
CPA:
     Who?




Excluded from the definition of “consumers” are
juristic persons with an asset value or annual
turnover of more than R2 million
“THANK GOD I DON’T SELL GOODS!!”
CPA:
    Goods



Includes any literature, music, photograph, motion
picture, game, information, data, software, code,
or other intangible product written or encoded on
any medium, or a licence to use any such intangible
product
CPA:
  Consumer
   Rights




The CPA recognises 8 fundamental rights of
consumers
CPA:
    Right #1




Protection against unfair discriminatory marketing (at
any step in the sales process)
CPA:
    Right #2




The right to privacy:
> Restrictions on direct marketing
> “Opt-out” registry to be established
> Already contained in ECTA
CPA:
    Right #3




The right to choose:
> The right to select suppliers (supply of
  goods/services must not be made conditional
  upon supply of other goods/services, unless it
  would be to the consumer’s benefit to do so)
CPA:
   Right #3



The right to choose – fixed term contracts:
> Does not apply to transactions between juristic
  persons
> Contracts may not exceed 24 months
> Consumer may cancel at any time on 20 business
  days’ notice
CPA:
    Right #3



The right to choose:
> Pre-authorisation of repairs/maintenance:
  where supplier takes possession of consumer’s
  property to provide repair/maintenance services,
  no cost may be incurred without consumer’s
  approval of estimate
CPA:
    Right #3



The right to choose:
> Cooling-off period (direct marketing): consumer
  may return goods within 5 business days from the
  date of contract or the date on which goods were
  delivered
> This does not apply to electronic transactions
  (7 day cooling-off period under ECTA)
CPA:
   Right #3




The right to choose:
> Right to cancel advance reservation, booking or
  order (reasonable deposit and cancellation
  charges may be levied)
CPA:
    Right #3




The right to choose:
> The right to choose/examine goods (must
  materially correspond with descriptions/samples)
CPA:
    Right #3



The right to choose:
> Unsolicited goods may be kept/returned unless:
  • supplier advises of error within 10 business days
    and collects goods within 20 business days; or
  • goods have clearly been misdelivered and
    supplier fails to collect after 20 business days
    notice by the recipient
CPA:
    Right #4



The right to plain/understandable language:
> To be aimed at the ordinary consumer of the
  class of persons for whom the information is
  intended (average literacy skills; minimal
  consumer experience of the particular
  goods/services)
CPA:
    Right #4




The right to plain/understandable language:
> Price must be disclosed (subject to s43 ECTA)
> Product labelling and trade descriptions must be
  accurate and not misleading
CPA:
    Right #5




The right to fair/responsible marketing:
> General standards (must not be false,
  misleading, deceptive, fraudulent)
> Bait marketing is prohibited
> Negative option marketing is prohibited
CPA:
    Right #5


The right to fair/responsible marketing:
> Competitions
  • Must be conducted fairly
  • Promoter may not require consideration to be
    paid for entry to a competition
  • Promoter must prepare competition rules
  • The competition and the draw must be audited
CPA:
    Right #5


The right to fair/responsible marketing:
> Competitions (ineligibility for prizes)
  • A winner to whom it is unlawful to supply the
    prize
  • A director/employee/consultant of the promoter
  • A supplier of goods/services in connection with
    competition
CPA:
    Right #5


The right to fair/responsible marketing:
> Competitions (offer requirements)
  • Benefit/prize and entry steps must be identified
  • Closing date and basis of draw must be defined
  • Must state how results will be announced
  • List person, place and date at/from which rules
    may be obtained and prize will be received
CPA:
    Right #6



The right to fair and honest dealing:
> Unconscionable conduct
> False, misleading or deceptive representations
> Fraudulent schemes and offers
> Pyramid schemes
> Over-selling and over-booking
CPA:
    Right #7



The right to fair, just and reasonable t’s and c’s:
> May not include unfair, unreasonable or unjust
  contract terms
> Notice of certain terms is required
> Certain prohibited transactions, agreements, terms
  and conditions
CPA:
    Right #8




The right to fair value, good quality and safety:
> Right to demand quality services
> Right to safe, good quality goods
CPA:
    Right #8


The right to fair value, good quality and safety:
> Implied warranty of quality (s56)
  • Irrelevant whether defect is patent or latent (no
     more voestoots for suppliers)
  • 6 month return period: repair, replace or refund
  • Further 3 month return period if goods or
     components have been replaced or repaired
CPA:
    Right #8


The right to fair value, good quality and safety:
> Liability for damage cause by goods (s61)
  • Strict product liability (i.e. no fault necessary)
  • Liability is joint and several
  • Applies to producer, importer, distributor, retailer
  • Relates to death, injury, illness, loss of or
     damage to property, and economic loss
CPA:
     Who can
     bring a
      claim?


>   Consumer in personal capacity
>   Groups of interested consumers (class actions)
>   A person acting in the public interest
>   Association acting on behalf of members
>   Authorised person acting on behalf of an
    incapacitated person
CPA:
   Penalties



> Damages claim
> Fine
> Imprisonment – up to 12 months (10 years for
  disclosure of private information)
> Administrative penalty: up to R1 million or 10% of
  annual turnover, whichever is greater
PROTECTION OF PERSONAL INFORMATION
BILL
2012
POPI
      Why?




> To give effect to the Constitutional right to privacy
> To regulate the collection/processing of personal
  information
> To provide individuals with rights and remedies
> To establish an Information Protection Commission
POPI
      Who?




“Data Subject” - a person to whom personal information
relates

“Responsible Party” – any person which, alone or with
others, determines the purpose of and means for processing
personal information
POPI
        What?



“Personal Information” includes:
> race, gender, sex, pregnancy, marital status, national, ethnic or social
  origin, colour, sexual orientation, age, physical health, disability,
  religion, belief, culture, language and birth;
> education, or medical, financial, criminal or employment history;
> identifying number, symbol, e-mail address, physical address,
  telephone, number or other particular assignment;
> personal opinions, view or preferences (or opinions about individual)
> confidential correspondence
POPI
    Principles




Like the CPA, POPI is based on 8 fundamental principles of
data protection
POPI
    Principle 1




Accountability

Responsible party must ensure compliance with Principles
and measures in Act.
POPI
    Principle 2




Processing Limitation

> Processing must be lawful and be done in a reasonable
  manner which doesn’t infringe privacy of data subject
> Processing must, for given purpose, be adequate, relevant
  and not excessive
POPI
    Principle 2




Processing Limitation

Personal information may only be processed (broadly):
> with the data subject’s consent
> if processing is necessary for completion of a contract
> if it protects a legitimate interest of the data subject
> if in compliance with an obligation imposed by law
POPI
    Principle 2



Processing Limitation

Information must be collected from the data subject,
except:
> where info is contained in public record or has been made
   public by the data subject;
> data consents to collection from another source;
> collection from another source would not prejudice
   legitimate interest of the data subject
POPI
    Principle 3



Purpose Specification

> Information must be collected for specific, explicitly
  defined and lawful purpose
> Data subject must be made aware of purpose
> Records of information must not be retained longer than
  is necessary for achieving purpose of
  collection/processing
POPI
    Principle 4



Further Processing Limitation

> Must be compatible with purpose of collection (Principle 3)

> Must consider relationship with data subject, the purpose
  and the further purpose, the consequences of further
  processing and the nature of the information
POPI
    Principle 4




Further Processing Limitation

Will be compatible with purpose of collection if:
> Data subject consents or info is publicly available
> Further processing is necessary to comply with law
> Information is used for historical, statistical or research
  purposes and will not be published in identified form.
POPI
    Principle 5




Quality of Information

Responsible party must take reasonably practicable steps
to ensure that information is complete, accurate, not
misleading and updated where necessary
POPI
    Principle 6




Openness

Responsible party must notify the Information Protection
Regulator before collecting information (need only be
given once)
POPI
    Principle 6




Openness

Responsible party must ensure data subject is aware of:
> information being collected and purpose of collection
> name and address of responsible party
> whether collection is voluntary or mandatory
> consequences of failure to provide information
POPI
    Principle 6



Openness

Responsible party must ensure awareness:
> where information is collected direct from data subject,
  before collection (unless data subject is already aware);
> in any other case, before information is collected or as
  soon as reasonable practicable after it has been
  collected
POPI
    Principle 7




Security Safeguards

> Responsible party must secure integrity of personal
  information in its possession or under its control
> Operators (who process personal information on behalf of a
  responsible party) must process information only with
  knowledge of responsible party and treat it as
  confidential
POPI
     Principle 8



Data Subject Participation

Data subject has the right:
> to request details of information held by a responsible party
> to request correction or deletion of personal information that is
   inaccurate, irrelevant, excessive, incomplete, out of date,
   misleading or unlawfully obtained
> to request deletion of a record that responsible party is no longer
   authorised to hold
POPI’S NET IS CAST VERY
         WIDE
…it’s ok to be afraid
Legalities of Social Media
Legalities of Social Media

More Related Content

Viewers also liked

You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
 
Social Media For Your Business
Social Media For Your BusinessSocial Media For Your Business
Social Media For Your BusinessMirum Africa
 
11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CF
11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CF11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CF
11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CFCatrin Froehlich
 
protective punitive laws
protective punitive lawsprotective punitive laws
protective punitive lawsgnpplus
 
Community perspectives on task-shifting/ sharing: a multi-country survey to i...
Community perspectives on task-shifting/ sharing: a multi-country survey to i...Community perspectives on task-shifting/ sharing: a multi-country survey to i...
Community perspectives on task-shifting/ sharing: a multi-country survey to i...gnpplus
 
Ncert-solutions-for-class9th-hindi-sparsh
Ncert-solutions-for-class9th-hindi-sparshNcert-solutions-for-class9th-hindi-sparsh
Ncert-solutions-for-class9th-hindi-sparshncertsolutions
 
Should Brands be Banned from Social Media?
Should Brands be Banned from Social Media?Should Brands be Banned from Social Media?
Should Brands be Banned from Social Media?Mirum Africa
 
Resume Presentation Wordpress
Resume Presentation WordpressResume Presentation Wordpress
Resume Presentation Wordpresssophiefr
 
Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)Sandra Rivas Mazuecos
 
RAMP - Your way out of the modernisation maze
RAMP - Your way out of the modernisation mazeRAMP - Your way out of the modernisation maze
RAMP - Your way out of the modernisation mazeLANSA
 

Viewers also liked (16)

You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social Media
 
Social Media For Your Business
Social Media For Your BusinessSocial Media For Your Business
Social Media For Your Business
 
11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CF
11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CF11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CF
11-11-20 No. 52 Entrepreneurship Celebrations and Rehabilitation - NBI-THT- CF
 
protective punitive laws
protective punitive lawsprotective punitive laws
protective punitive laws
 
Our earth the green planet
Our earth the green planetOur earth the green planet
Our earth the green planet
 
Mi poema
Mi poemaMi poema
Mi poema
 
Community perspectives on task-shifting/ sharing: a multi-country survey to i...
Community perspectives on task-shifting/ sharing: a multi-country survey to i...Community perspectives on task-shifting/ sharing: a multi-country survey to i...
Community perspectives on task-shifting/ sharing: a multi-country survey to i...
 
Ncert-solutions-for-class9th-hindi-sparsh
Ncert-solutions-for-class9th-hindi-sparshNcert-solutions-for-class9th-hindi-sparsh
Ncert-solutions-for-class9th-hindi-sparsh
 
Should Brands be Banned from Social Media?
Should Brands be Banned from Social Media?Should Brands be Banned from Social Media?
Should Brands be Banned from Social Media?
 
Resume Presentation Wordpress
Resume Presentation WordpressResume Presentation Wordpress
Resume Presentation Wordpress
 
About me
About meAbout me
About me
 
Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)
 
Depone global
Depone globalDepone global
Depone global
 
GPportfolio
GPportfolioGPportfolio
GPportfolio
 
Primers and sealers
Primers and sealersPrimers and sealers
Primers and sealers
 
RAMP - Your way out of the modernisation maze
RAMP - Your way out of the modernisation mazeRAMP - Your way out of the modernisation maze
RAMP - Your way out of the modernisation maze
 

Similar to Legalities of Social Media

Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11smahboobani
 
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...CanadaHelps / MyCharityConnects
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Michel Bitter
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...lorrainefleck
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationKerry Rego
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxbriancrawford30935
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxbartholomeocoombs
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Uel Risk Mgmt Bus Ins Pres July 13 2010 Final
Uel Risk Mgmt Bus Ins Pres July 13 2010 FinalUel Risk Mgmt Bus Ins Pres July 13 2010 Final
Uel Risk Mgmt Bus Ins Pres July 13 2010 Finaltodd6063
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011amystewart
 
The Risk of Social Media
The Risk of Social MediaThe Risk of Social Media
The Risk of Social Mediaassociation2580
 
Staying Legal, by Andrea martin
Staying Legal, by Andrea martin Staying Legal, by Andrea martin
Staying Legal, by Andrea martin safefood
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 

Similar to Legalities of Social Media (20)

Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11
 
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Uel Risk Mgmt Bus Ins Pres July 13 2010 Final
Uel Risk Mgmt Bus Ins Pres July 13 2010 FinalUel Risk Mgmt Bus Ins Pres July 13 2010 Final
Uel Risk Mgmt Bus Ins Pres July 13 2010 Final
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011
 
The Risk of Social Media
The Risk of Social MediaThe Risk of Social Media
The Risk of Social Media
 
Staying Legal, by Andrea martin
Staying Legal, by Andrea martin Staying Legal, by Andrea martin
Staying Legal, by Andrea martin
 
E commerce
E commerce E commerce
E commerce
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 

More from Mirum Africa

World Design Capital - Design Engine Concept
World Design Capital - Design Engine ConceptWorld Design Capital - Design Engine Concept
World Design Capital - Design Engine ConceptMirum Africa
 
Measuring Social Media is Easy
Measuring Social Media is Easy Measuring Social Media is Easy
Measuring Social Media is Easy Mirum Africa
 
Beyond reach and awareness: How the social nature of the web is reshaping the...
Beyond reach and awareness: How the social nature of the web is reshaping the...Beyond reach and awareness: How the social nature of the web is reshaping the...
Beyond reach and awareness: How the social nature of the web is reshaping the...Mirum Africa
 
Hr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.finalHr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.finalMirum Africa
 
Quirk's Picturebook
Quirk's Picturebook Quirk's Picturebook
Quirk's Picturebook Mirum Africa
 
Using Digital to market your business
Using Digital to market your businessUsing Digital to market your business
Using Digital to market your businessMirum Africa
 
What the Agency of 2020 Looks Like
What the Agency of 2020 Looks LikeWhat the Agency of 2020 Looks Like
What the Agency of 2020 Looks LikeMirum Africa
 
Brand building for the digital age: the Destination
Brand building for the digital age: the DestinationBrand building for the digital age: the Destination
Brand building for the digital age: the DestinationMirum Africa
 
Mobile: What it means for brands
Mobile: What it means for brandsMobile: What it means for brands
Mobile: What it means for brandsMirum Africa
 

More from Mirum Africa (12)

World Design Capital - Design Engine Concept
World Design Capital - Design Engine ConceptWorld Design Capital - Design Engine Concept
World Design Capital - Design Engine Concept
 
Art & Code
Art & CodeArt & Code
Art & Code
 
Measuring Social Media is Easy
Measuring Social Media is Easy Measuring Social Media is Easy
Measuring Social Media is Easy
 
Beyond reach and awareness: How the social nature of the web is reshaping the...
Beyond reach and awareness: How the social nature of the web is reshaping the...Beyond reach and awareness: How the social nature of the web is reshaping the...
Beyond reach and awareness: How the social nature of the web is reshaping the...
 
Personal Branding
Personal BrandingPersonal Branding
Personal Branding
 
Hr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.finalHr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.final
 
Jozi QuirkStation
Jozi QuirkStationJozi QuirkStation
Jozi QuirkStation
 
Quirk's Picturebook
Quirk's Picturebook Quirk's Picturebook
Quirk's Picturebook
 
Using Digital to market your business
Using Digital to market your businessUsing Digital to market your business
Using Digital to market your business
 
What the Agency of 2020 Looks Like
What the Agency of 2020 Looks LikeWhat the Agency of 2020 Looks Like
What the Agency of 2020 Looks Like
 
Brand building for the digital age: the Destination
Brand building for the digital age: the DestinationBrand building for the digital age: the Destination
Brand building for the digital age: the Destination
 
Mobile: What it means for brands
Mobile: What it means for brandsMobile: What it means for brands
Mobile: What it means for brands
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Legalities of Social Media

  • 1. PART 1 Managing the Legal Risks: Social Media in the Workplace Andrew Allison, Quirk Disclaimer: This presentation has been prepared for the sole use of the delegates who attended the workshops held by Quirk Education in CT and JHB on 3 and 5 April 2012. Furthermore, no information contained in this presentation shall be construed as advice – it is for educational and information purposes only and is provided on an "as is" basis. You accordingly assume total responsibility and risk for your use of and reliance on the presentation.
  • 2. If you want to learn about risk, give mining a try
  • 4. So what does gold mining have to do with social media?
  • 5. Translating and applying the mining industry’s risk management framework to the office environment
  • 6. International Organization for Standardization ISO 31000: family of standards “to provide principles and generic guidelines on risk management”
  • 7. What is risk? “The effect of uncertainty on objectives, whether positive or negative”
  • 8. Risk management steps 1. identify 2. assess 3. prioritise 4. treat
  • 9. Risk treatment 1. eliminate 2. mitigate 3. share 4. accept
  • 10. So what is the biggest single source of risk in the office environment?
  • 13. What is vicarious liability? Strict – or “no fault” - liability of an employer for the conduct of an employee acting in the course and scope of employment
  • 14. Bezuidenhout NO v Eskom 2003
  • 15. Managing the risks posed by vicarious liability 1. identify 2. assess 3. prioritise 4. treat
  • 16. Treating the risks posed by vicarious liability 1. eliminate 2. mitigate 3. share 4. accept
  • 17. …and so what about social media?
  • 18. Step 1. Identify Conduct: use of social media in the workplace
  • 20. Defamation Confidentiality 4 specific risks Personal Information Intellectual Property
  • 21. Defamation Confidentiality 1st risk Personal Information Intellectual Property
  • 22. Defamation “the intentional and wrongful publication of words or behaviour to a third party which has the effect (objectively viewed) of injuring or undermining a person’s or entity’s good name, status or reputation”
  • 23. Defamation The internet has increased the scope of and risk associated with defamation There are now more ways in which publication may occur
  • 24. Remember Defamation includes the repeating, confirmation or proliferation of defamatory content… …so beware of republishing, email forwarding, linking and retweeting
  • 25. Key criteria Once publication has been established, it is presumed that publication was: > intentional > wrongful or unlawful
  • 26. Defences Against wrongfulness: truth for public benefit, fair comment, privilege, consent and necessity Against intent: mistake, jest, intoxication and insanity
  • 29. Eliminate > Lock employees out of social media sites > Limit access for work purposes only
  • 30. Mitigate > Training > Internet usage and email policies > Communications and brand guidelines > Management pre-approval of publications
  • 31. Share > Disclaimers on digital properties > Website terms and conditions > Insurance
  • 32. Accept Hope for the best and deal with it if it happens
  • 33. “psychotic, lying, whoring, still-going- to-clubs-at-her-age skank” This guy shot JFK
  • 34. GOLDEN RULE FOR EMPLOYEES: “IF YOU DON’T WANT TO SEE YOUR MESSAGE IN THE NEWSPAPER TOMORROW, DON’T POST IT!”
  • 35. Defamation Confidentiality 2nd risk Personal Information Intellectual Property
  • 36. Pretty much all well-drafted commercial agreements these days contain confidentiality – or non-disclosure – provisions of some sort or another.
  • 39. Eliminate > Do not accept confidential material > Only accept what is strictly necessary
  • 40. Mitigate > Training > Employment agreements and policies > Secure networks and robust IT infrastructure
  • 41. Share > Well considered NDAs > Insurance
  • 42. Accept Hope for the best and deal with it if it happens
  • 43.
  • 44. Defamation Confidentiality 3rd risk Personal Information Intellectual Property
  • 45. The right to privacy is protected by the Constitution However, there is currently no umbrella law governing privacy of personal information in South Africa
  • 46. Chapter 8 of ECTA contains a data protection “Code of Good Practice”, but compliance is voluntary If adopted, the principles should be included in website privacy policy and consequences of breach should be clearly stipulated
  • 47. By contrast, the UK’s Data Protection Act has been in effect since 1998 and gives effect to the EU Data Protection Directive
  • 48. Enter the Protection of Personal Information Bill (POPI) …to be discussed in more detail later
  • 50. Direct marketing Opt out ECTA (section 45) and the CPA (section 11) both require direct marketers to provide recipients with an option to “opt out” The CPA envisages an “opt out” registry (like that of the DMASA), but this has not yet been implemented
  • 51. Direct marketing Opt out DMASA and ISPA Codes of Good Practice both endorse an “opt out” system .
  • 52. Direct marketing Opt in POPI, however, will implement an “opt in” framework, mirroring the approach being adopted in Europe
  • 53. Direct marketing Opt in Direct marketing will be prohibited except: > with specific consent of the data subject > to customers, where: > the processor has obtained personal information in the context of a sale > for marketing of processor’s similar products/services > if data subject has been given opportunity to object or opt out (free of charge)
  • 54. Direct marketing Soft opt in In the UK, the implied “opt in” is known as a “soft opt in” It applies also in the context of negotiations leading up to a sale
  • 56. Personal Information eliminate > mitigate > share > accept
  • 57. Eliminate > Do not collect/process personal information > Only collect what is strictly necessary
  • 58. Mitigate > Training > Internal policies and guidelines > IT and online security > Compliance with ECTA, CPA and POPI > Regular audits
  • 59. Share > Detailed commercial agreements > Website terms and conditions > Insurance
  • 60. Accept Hope for the best and deal with it if it happens
  • 61. Defamation Confidentiality 4th risk Personal Information Intellectual Property
  • 62. What is IP? “A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.”
  • 63. Intellectual Property Copyright Trademark Patent
  • 65. What is copyright? “A proprietary right which arises automatically when an author reduces an idea to a material form”
  • 66. What is copyright? No requirement for registration (in SA) Copyright can be: > assigned (must be in writing and signed) > licenced
  • 67. What is copyright? Copyright persists for 50 years: > from date of publication (for companies) > from the death of the author (for natural persons)
  • 68. Moral rights Moral rights vest in the author/creator of copyrighted works Cannot be assigned, but can be waived
  • 69. Moral rights Moral rights include: > the right to attribution (paternity) > the right to integrity
  • 70. Breach of copyright Breach or infringement of copyright may be: > direct (guilty knowledge is not a pre-requisite) > secondary/indirect (unauthorised dealing) > contributory (facilitation of infringement)
  • 71. Important! Copyright in work produced by employee in the course of employment vests with employer Online properties often comprise of many different copyrighted assets
  • 73. What is a trademark? A mark which distinguishes a person’s goods or services (requirement of distinctiveness) Must be registered with CIPC and renewed every 10 years
  • 74. Breach of TM Infringer’s mark is confusingly similar in respect of the same goods/services (reasonable likelihood of confusion) Infringer’s mark is identical or similar to a registered mark in respect of similar goods or services
  • 75. Breach of TM Dilution of trade mark: > by blurring (dilution of uniqueness; may be different or non-competing goods/services) > by tarnishment (negative/offensive use of TM)
  • 76. Meta tags and PPC A common sense approach should be employed (certain bona fide uses protected under Trade Marks Act) > purely descriptive purposes (advertising products on an e-commerce site) would generally be ok > use of a competitor’s marks to deceive or lure consumers would generally not be ok
  • 77.
  • 78. In depth – trademark This is Terri Welles
  • 79. Intellectual Property eliminate > mitigate > share > accept
  • 80. Eliminate > Use only proprietary material > Limit access to the internet / social media
  • 81. Mitigate > Training > Internal policies and guidelines > Provide access to stock content providers > Regular audits and management sign-off
  • 82. Share > Detailed commercial agreements > Limit liability for 3rd party IP infringements > Insurance
  • 83. Accept Hope for the best and deal with it if it happens
  • 84. “We’re comfortable with people using our images to build traffic. The point in time when they have a business model, they have to have some sort of licence”. Jonathan Klein CEO, Getty
  • 88. Social Media Policy • Guidelines for principle-based approach (Coca Cola) • “Big stick” approach (Commonwealth Bank) • Hybrid (educational and regulatory)
  • 89. Risk management steps 1. identify 2. assess 3. prioritise 4. treat
  • 90. Risk treatment 1. eliminate 2. mitigate 3. share 4. accept
  • 92.
  • 93. BREAK
  • 94. Managing the Legal Risks: Social Media in the Workplace Andrew Allison, Quirk PART 2
  • 95. CONSUMER RIGHTS AND SOCIAL MEDIA IN THE NEW MILLENIUM
  • 96. Electronic Communications & Transactions Act (ECTA) Consumer Protection Act (CPA) Protection of Personal Information Bill (POPI)
  • 98. Purpose: Why To enable and facilitate electronic transactions by creating legal certainty around transactions and communications conducted electronically
  • 99. Purpose: How By: > developing a national e-strategy for SA > ensuring recognition and equivalence between electronic and paper-based transactions > promoting confidence in electronic transactions > providing supervision of certain service providers
  • 100. ECTA and consumers Chapter 7: Consumer Protection Chapter 8: Personal Information & Privacy Protection
  • 101. ECTA: Chapter 7 Section 43 Must give consumers required information, including: • the price of the product or service; • contact details; and • the right to withdraw from an electronic transaction before its completion, or consumer can cancel within 14 days
  • 102. ECTA: Chapter 7 Section 44 Cooling-off period (7 days): • for contract for goods, from date of receipt • for contract of services, from date of contract
  • 103. ECTA: Chapter 8 Voluntary data protection “Code of Good Practice” Principles must be adopted in whole; cannot be adopted in part
  • 104. ECTA: Chapter 8 Section 51 Principles for collecting personal info > Must have written consent for processing of personal information > May not collect unnecessary information > Must disclose purpose(s) of processing, and may only process for such purpose(s)
  • 105. ECTA: Chapter 8 Section 51 > Must keep record of data and purpose for which it was processed for 1 year > Must not disclose data (except as required by law) > Must delete obsolete data > May use data to compile statistical profiles for trade, but must not include personal info
  • 106. ECTA: Chapter 8 Section 50 If adopted, the principles should be included in website privacy policy or terms and conditions and consequences of breach should be clearly stipulated. Remedies for breach of code are as agreed between the parties.
  • 108. CPA: Why? “To promote a fair, accessible and sustainable marketplace for consumer products and services and for that purpose to establish national norms and standards relating to consumer protection…”
  • 109. CPA: Who? The Consumer: > A person to whom goods or services are marketed in the ordinary course of business > A user of goods or a recipient or beneficiary of services, irrespective of whether that person was party to a transaction concerning the supply of those goods or services
  • 110. CPA: Who? Excluded from the definition of “consumers” are juristic persons with an asset value or annual turnover of more than R2 million
  • 111. “THANK GOD I DON’T SELL GOODS!!”
  • 112. CPA: Goods Includes any literature, music, photograph, motion picture, game, information, data, software, code, or other intangible product written or encoded on any medium, or a licence to use any such intangible product
  • 113. CPA: Consumer Rights The CPA recognises 8 fundamental rights of consumers
  • 114. CPA: Right #1 Protection against unfair discriminatory marketing (at any step in the sales process)
  • 115. CPA: Right #2 The right to privacy: > Restrictions on direct marketing > “Opt-out” registry to be established > Already contained in ECTA
  • 116. CPA: Right #3 The right to choose: > The right to select suppliers (supply of goods/services must not be made conditional upon supply of other goods/services, unless it would be to the consumer’s benefit to do so)
  • 117. CPA: Right #3 The right to choose – fixed term contracts: > Does not apply to transactions between juristic persons > Contracts may not exceed 24 months > Consumer may cancel at any time on 20 business days’ notice
  • 118. CPA: Right #3 The right to choose: > Pre-authorisation of repairs/maintenance: where supplier takes possession of consumer’s property to provide repair/maintenance services, no cost may be incurred without consumer’s approval of estimate
  • 119. CPA: Right #3 The right to choose: > Cooling-off period (direct marketing): consumer may return goods within 5 business days from the date of contract or the date on which goods were delivered > This does not apply to electronic transactions (7 day cooling-off period under ECTA)
  • 120. CPA: Right #3 The right to choose: > Right to cancel advance reservation, booking or order (reasonable deposit and cancellation charges may be levied)
  • 121. CPA: Right #3 The right to choose: > The right to choose/examine goods (must materially correspond with descriptions/samples)
  • 122. CPA: Right #3 The right to choose: > Unsolicited goods may be kept/returned unless: • supplier advises of error within 10 business days and collects goods within 20 business days; or • goods have clearly been misdelivered and supplier fails to collect after 20 business days notice by the recipient
  • 123. CPA: Right #4 The right to plain/understandable language: > To be aimed at the ordinary consumer of the class of persons for whom the information is intended (average literacy skills; minimal consumer experience of the particular goods/services)
  • 124. CPA: Right #4 The right to plain/understandable language: > Price must be disclosed (subject to s43 ECTA) > Product labelling and trade descriptions must be accurate and not misleading
  • 125. CPA: Right #5 The right to fair/responsible marketing: > General standards (must not be false, misleading, deceptive, fraudulent) > Bait marketing is prohibited > Negative option marketing is prohibited
  • 126. CPA: Right #5 The right to fair/responsible marketing: > Competitions • Must be conducted fairly • Promoter may not require consideration to be paid for entry to a competition • Promoter must prepare competition rules • The competition and the draw must be audited
  • 127. CPA: Right #5 The right to fair/responsible marketing: > Competitions (ineligibility for prizes) • A winner to whom it is unlawful to supply the prize • A director/employee/consultant of the promoter • A supplier of goods/services in connection with competition
  • 128. CPA: Right #5 The right to fair/responsible marketing: > Competitions (offer requirements) • Benefit/prize and entry steps must be identified • Closing date and basis of draw must be defined • Must state how results will be announced • List person, place and date at/from which rules may be obtained and prize will be received
  • 129. CPA: Right #6 The right to fair and honest dealing: > Unconscionable conduct > False, misleading or deceptive representations > Fraudulent schemes and offers > Pyramid schemes > Over-selling and over-booking
  • 130. CPA: Right #7 The right to fair, just and reasonable t’s and c’s: > May not include unfair, unreasonable or unjust contract terms > Notice of certain terms is required > Certain prohibited transactions, agreements, terms and conditions
  • 131. CPA: Right #8 The right to fair value, good quality and safety: > Right to demand quality services > Right to safe, good quality goods
  • 132. CPA: Right #8 The right to fair value, good quality and safety: > Implied warranty of quality (s56) • Irrelevant whether defect is patent or latent (no more voestoots for suppliers) • 6 month return period: repair, replace or refund • Further 3 month return period if goods or components have been replaced or repaired
  • 133. CPA: Right #8 The right to fair value, good quality and safety: > Liability for damage cause by goods (s61) • Strict product liability (i.e. no fault necessary) • Liability is joint and several • Applies to producer, importer, distributor, retailer • Relates to death, injury, illness, loss of or damage to property, and economic loss
  • 134. CPA: Who can bring a claim? > Consumer in personal capacity > Groups of interested consumers (class actions) > A person acting in the public interest > Association acting on behalf of members > Authorised person acting on behalf of an incapacitated person
  • 135. CPA: Penalties > Damages claim > Fine > Imprisonment – up to 12 months (10 years for disclosure of private information) > Administrative penalty: up to R1 million or 10% of annual turnover, whichever is greater
  • 136. PROTECTION OF PERSONAL INFORMATION BILL 2012
  • 137. POPI Why? > To give effect to the Constitutional right to privacy > To regulate the collection/processing of personal information > To provide individuals with rights and remedies > To establish an Information Protection Commission
  • 138. POPI Who? “Data Subject” - a person to whom personal information relates “Responsible Party” – any person which, alone or with others, determines the purpose of and means for processing personal information
  • 139. POPI What? “Personal Information” includes: > race, gender, sex, pregnancy, marital status, national, ethnic or social origin, colour, sexual orientation, age, physical health, disability, religion, belief, culture, language and birth; > education, or medical, financial, criminal or employment history; > identifying number, symbol, e-mail address, physical address, telephone, number or other particular assignment; > personal opinions, view or preferences (or opinions about individual) > confidential correspondence
  • 140. POPI Principles Like the CPA, POPI is based on 8 fundamental principles of data protection
  • 141. POPI Principle 1 Accountability Responsible party must ensure compliance with Principles and measures in Act.
  • 142. POPI Principle 2 Processing Limitation > Processing must be lawful and be done in a reasonable manner which doesn’t infringe privacy of data subject > Processing must, for given purpose, be adequate, relevant and not excessive
  • 143. POPI Principle 2 Processing Limitation Personal information may only be processed (broadly): > with the data subject’s consent > if processing is necessary for completion of a contract > if it protects a legitimate interest of the data subject > if in compliance with an obligation imposed by law
  • 144.
  • 145. POPI Principle 2 Processing Limitation Information must be collected from the data subject, except: > where info is contained in public record or has been made public by the data subject; > data consents to collection from another source; > collection from another source would not prejudice legitimate interest of the data subject
  • 146. POPI Principle 3 Purpose Specification > Information must be collected for specific, explicitly defined and lawful purpose > Data subject must be made aware of purpose > Records of information must not be retained longer than is necessary for achieving purpose of collection/processing
  • 147. POPI Principle 4 Further Processing Limitation > Must be compatible with purpose of collection (Principle 3) > Must consider relationship with data subject, the purpose and the further purpose, the consequences of further processing and the nature of the information
  • 148. POPI Principle 4 Further Processing Limitation Will be compatible with purpose of collection if: > Data subject consents or info is publicly available > Further processing is necessary to comply with law > Information is used for historical, statistical or research purposes and will not be published in identified form.
  • 149. POPI Principle 5 Quality of Information Responsible party must take reasonably practicable steps to ensure that information is complete, accurate, not misleading and updated where necessary
  • 150. POPI Principle 6 Openness Responsible party must notify the Information Protection Regulator before collecting information (need only be given once)
  • 151. POPI Principle 6 Openness Responsible party must ensure data subject is aware of: > information being collected and purpose of collection > name and address of responsible party > whether collection is voluntary or mandatory > consequences of failure to provide information
  • 152. POPI Principle 6 Openness Responsible party must ensure awareness: > where information is collected direct from data subject, before collection (unless data subject is already aware); > in any other case, before information is collected or as soon as reasonable practicable after it has been collected
  • 153. POPI Principle 7 Security Safeguards > Responsible party must secure integrity of personal information in its possession or under its control > Operators (who process personal information on behalf of a responsible party) must process information only with knowledge of responsible party and treat it as confidential
  • 154. POPI Principle 8 Data Subject Participation Data subject has the right: > to request details of information held by a responsible party > to request correction or deletion of personal information that is inaccurate, irrelevant, excessive, incomplete, out of date, misleading or unlawfully obtained > to request deletion of a record that responsible party is no longer authorised to hold
  • 155. POPI’S NET IS CAST VERY WIDE
  • 156. …it’s ok to be afraid