SlideShare a Scribd company logo
1 of 40
1
Brand Protection on Social
Media
Listen to your consumers, or to your lawyer?


Prof. Cédric Manara
LegalEDHEC Research Center
<www.cedricmanara.com/english>

Summary of a study co-authored with Prof. C. Roquilly




                                                        2
2001




       3
2011
• Fired after a negative tweet




                                 4
Time spent online 
 Complaint costs 




                      5
Complaint costs 
         [Gripe example]
• The Gripe app lets consumers post
  complaints about a business and
  warns businesses of each
  complainer's social media
  influence.




                                  6
Monitoring costs 
[KeepAlert examples]




                       7
Example 1 - Starbucks
• June 2011: 2,500+ „starbucks‟
  domain names, including




                                  8
9
Example 2 – Dr. Martens
• June 2011: 350+ mentions,
  including




                              10
11
Example 3 - Cadbury
• June 2011: 300+ mentions,
  including:




                              12
13
Starting point
• It has become easy to be aware of
  (possible) trademark infringement /
  brand image tarnishment
• Should each case be followed by
  legal action?
  – Costs
  – Legal duty

                                    14
Research question
• Brand protection online: Is there a
  good recipe (if any)?

• Empirical studies of:
  – Social media terms of use [1]
  – Cease & desist letters [2]
  – Caselaw [3]

                                        15
1. Social media ToS
• To which extent are brand owners
  granted protection on social
  media?

• Sample of 10
  – BG, FB, LI, MS, SL, SK, TW, WI,
    WoW, YT

                                      16
Notify… and grab
• youtube.com/apple – 21 mars
  2009 : "squat"
• Today:




                                17
Diverging platform policies [1]




                              18
Diverging platform policies   [2]




                                19
20
On the recipient‟s side
• Twitter (says it)
  – gets 10,000 complaints a month
  – has 24 people dealing with user
    complaints
• Facebook
  – ~30 lawyers, mainly focusing on
    patents

                                      21
Social media  Leverage
         effect
• For brand protection
• For consequences of action




                               22
« Spill over » effect
• Canadian telecom company
  NorthwesTel issued a takedown
  notice to Facebook over the logo
  this group was using to criticize it




                                         23
24
•   "... Linda Hillier March 7 at 8:56pm
•   Hi George,
    I had to take your photo down because I received this notice: "We have removed or disabled access to the
    following content that you have posted on Facebook because we received a notice from a third party that the
    content infringes or otherwise violates their rights:
    [Main page image:"Northwestel abuses yukoners, and exploits its monopoly"]
    We strongly encourage you to review the content you have posted to Facebook to make sure that you have not
    posted any other infringing content, as it is our policy to terminate the accounts of repeat infringers when
    appropriate.
    If you believe that we have made a mistake in removing this content, then please visit
    http://www.facebook.com/help/?page=1108 for more information."
    This is the info from the page it leads to: "We have removed or disabled access to content that you posted to
    Facebook because we received a notice from a third party that it infringes or otherwise violates their rights. If you
    believe that we have made a mistake in removing this content, you are not obligated to respond, but if you wish to
    follow up, you can contact us at ip@facebook.com.
    If we have also disabled your Facebook account, possible reasons include, but are not restricted to:
    • Repeated infringing behavior after receiving one or more warnings from Facebook
    • Alleged trademark infringement
    • Impersonation of an entity
    • Misrepresentation of identity - Facebook profiles are meant to represent a single individual. Groups, clubs,
    businesses and other types of organizations are not permitted to maintain an account.
    For more information, please visit our Intellectual Property Help Center page."
    I had to acknowledge the notice in order to proceed. I am not willing to put my Facebook account on the line for
    this photo, but you mentioned that you would be willing to fight with them. Please feel free all of the information is
    above, including an email address you can forward your complaint to.
    Thanks!
    Linda..."




                                                                                                                       25
Proposal for a Council Framework Decision
amending Framework Decision 2002/475/JHA on
   combating terrorism - Impact Assessment
            {COM(2007) 650 final}
• “when a website is successfully
  removed from a host server, it
  reappears very easily under
  another name”




                                         26
"Streisand effect"
• Online phenomenon in which an
  attempt to hide or remove a piece
  of information has the
  consequence of publicizing the
  information more widely




                                      27
2. Cease & desist letters
• 394 over TM (December 2010)




                                28
What happened after
   these C&D were sent?
• Effect in 90% of the cases
  – 10% remain

• (100 % republished on ChillingEffects)
• 99.2 % republished elsewhere



                                           29
Unicorn




          30
3. Cases
• ~200 cases studied
  – 25 relevant
• Success of brand owners in 33%
  of the cases
  – Removal of the disputed content




                                      31
4. What we learn
• Limited efficiency of legal action




                                       32
Noise
• Complaining customers who use
  social media receive
  disproportionate attention
• One always hear angry people first




                                   33
Regulation v. Feed
• Information flow
  – continuous / real time
     • mood, updates, etc.
  – voluminous
     • Passive consumption
• Legal (re)action contributes to the
  information flow
      Verba volent, scripta manent

             scripta volent (?)         34
Inaction may be a strategy




                         35
Questions before action

• Should one interfere in private
  space or conversations?
• Should one sue its own clients?
• What is the influence of the target?
• …
• Do social media get us paranoid?

                                     36
Legal response…
• Legal duty to « maintain »
  trademarks
• Boomerang effect of this duty




                                  37
… or communication
         response?
• "The answer to the machine is in
  the machine" [C. Clark, 1996]
   The answer to the use of a third
   machine is in your use of the
   machine (?)


• Hidden advertising is prohibited
  – Example: OFT
                                       38
39
Thank you




            40

More Related Content

Similar to Brand protection on social media: Listen to your consumers, or to your lawyer?

Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011iohann Le Frapper
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling OnlineRob Blamires
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)Pod Legal
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Pod Legal
 
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Now Dentons
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
How To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social MediaHow To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social MediaZuni
 
Ceramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social MediaCeramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social MediaJeff Risley
 
Introduction to Social Media & Business
Introduction to Social Media & BusinessIntroduction to Social Media & Business
Introduction to Social Media & BusinessMarcus Kuhn
 
05.Media relations and Crisis comms
05.Media relations and Crisis comms05.Media relations and Crisis comms
05.Media relations and Crisis commsJulian Matthews
 
Managing a crisis in the digital age
Managing a crisis in the digital ageManaging a crisis in the digital age
Managing a crisis in the digital ageAlexander Bayliss
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks Constantine Karbaliotis
 
Protecting Trademarks on Social Media
Protecting Trademarks on  Social MediaProtecting Trademarks on  Social Media
Protecting Trademarks on Social Mediatmdotbiz
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
ISOC: Crisis and online communications
ISOC: Crisis and online communicationsISOC: Crisis and online communications
ISOC: Crisis and online communicationsJulian Matthews
 
Protecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media EraProtecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media EraElder C. Marques
 
Digital Day Out New Zealand - TheOnlinecircle.com
Digital Day Out New Zealand - TheOnlinecircle.comDigital Day Out New Zealand - TheOnlinecircle.com
Digital Day Out New Zealand - TheOnlinecircle.comLucio Ribeiro
 
Crisis Communications in a Social Media Age
Crisis Communications in a Social Media AgeCrisis Communications in a Social Media Age
Crisis Communications in a Social Media AgeJim Rettew
 

Similar to Brand protection on social media: Listen to your consumers, or to your lawyer? (20)

Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
 
Keeping Your House In Order Getting It Right When Selling Online
Keeping Your House In Order   Getting It Right When Selling OnlineKeeping Your House In Order   Getting It Right When Selling Online
Keeping Your House In Order Getting It Right When Selling Online
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
 
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
How To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social MediaHow To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social Media
 
Ceramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social MediaCeramic Tile Distributors Association Social Media
Ceramic Tile Distributors Association Social Media
 
Introduction to Social Media & Business
Introduction to Social Media & BusinessIntroduction to Social Media & Business
Introduction to Social Media & Business
 
05.Media relations and Crisis comms
05.Media relations and Crisis comms05.Media relations and Crisis comms
05.Media relations and Crisis comms
 
Managing a crisis in the digital age
Managing a crisis in the digital ageManaging a crisis in the digital age
Managing a crisis in the digital age
 
The DMA conference 2012
The DMA conference 2012The DMA conference 2012
The DMA conference 2012
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
 
Protecting Trademarks on Social Media
Protecting Trademarks on  Social MediaProtecting Trademarks on  Social Media
Protecting Trademarks on Social Media
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
ISOC: Crisis and online communications
ISOC: Crisis and online communicationsISOC: Crisis and online communications
ISOC: Crisis and online communications
 
Protecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media EraProtecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media Era
 
Digital Day Out New Zealand - TheOnlinecircle.com
Digital Day Out New Zealand - TheOnlinecircle.comDigital Day Out New Zealand - TheOnlinecircle.com
Digital Day Out New Zealand - TheOnlinecircle.com
 
Crisis Communications in a Social Media Age
Crisis Communications in a Social Media AgeCrisis Communications in a Social Media Age
Crisis Communications in a Social Media Age
 

More from Cedric Manara

Brève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneBrève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneCedric Manara
 
Les noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetLes noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetCedric Manara
 
Propriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxPropriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxCedric Manara
 
Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Cedric Manara
 
Exception pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuException pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuCedric Manara
 
Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Cedric Manara
 
Droit des marques & Big Data
Droit des marques & Big DataDroit des marques & Big Data
Droit des marques & Big DataCedric Manara
 
Attaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineAttaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineCedric Manara
 
Les enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursLes enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursCedric Manara
 
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementSites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementCedric Manara
 
Enseigner le droit en anglais en France
Enseigner le droit en anglais en FranceEnseigner le droit en anglais en France
Enseigner le droit en anglais en FranceCedric Manara
 
Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Cedric Manara
 
Les noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeLes noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeCedric Manara
 
L'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàL'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàCedric Manara
 
Sexe, internet et droit
Sexe, internet et droitSexe, internet et droit
Sexe, internet et droitCedric Manara
 
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Cedric Manara
 
Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Cedric Manara
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Cedric Manara
 
Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Cedric Manara
 
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deComparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deCedric Manara
 

More from Cedric Manara (20)

Brève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneBrève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligne
 
Les noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetLes noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internet
 
Propriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxPropriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociaux
 
Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)
 
Exception pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuException pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeu
 
Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?
 
Droit des marques & Big Data
Droit des marques & Big DataDroit des marques & Big Data
Droit des marques & Big Data
 
Attaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineAttaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti online
 
Les enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursLes enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheurs
 
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementSites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
 
Enseigner le droit en anglais en France
Enseigner le droit en anglais en FranceEnseigner le droit en anglais en France
Enseigner le droit en anglais en France
 
Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?
 
Les noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeLes noms de domaine après la fin du monde
Les noms de domaine après la fin du monde
 
L'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàL'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delà
 
Sexe, internet et droit
Sexe, internet et droitSexe, internet et droit
Sexe, internet et droit
 
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
 
Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?
 
Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012
 
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deComparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Brand protection on social media: Listen to your consumers, or to your lawyer?

  • 1. 1
  • 2. Brand Protection on Social Media Listen to your consumers, or to your lawyer? Prof. Cédric Manara LegalEDHEC Research Center <www.cedricmanara.com/english> Summary of a study co-authored with Prof. C. Roquilly 2
  • 3. 2001 3
  • 4. 2011 • Fired after a negative tweet 4
  • 5. Time spent online  Complaint costs  5
  • 6. Complaint costs  [Gripe example] • The Gripe app lets consumers post complaints about a business and warns businesses of each complainer's social media influence. 6
  • 8. Example 1 - Starbucks • June 2011: 2,500+ „starbucks‟ domain names, including 8
  • 9. 9
  • 10. Example 2 – Dr. Martens • June 2011: 350+ mentions, including 10
  • 11. 11
  • 12. Example 3 - Cadbury • June 2011: 300+ mentions, including: 12
  • 13. 13
  • 14. Starting point • It has become easy to be aware of (possible) trademark infringement / brand image tarnishment • Should each case be followed by legal action? – Costs – Legal duty 14
  • 15. Research question • Brand protection online: Is there a good recipe (if any)? • Empirical studies of: – Social media terms of use [1] – Cease & desist letters [2] – Caselaw [3] 15
  • 16. 1. Social media ToS • To which extent are brand owners granted protection on social media? • Sample of 10 – BG, FB, LI, MS, SL, SK, TW, WI, WoW, YT 16
  • 17. Notify… and grab • youtube.com/apple – 21 mars 2009 : "squat" • Today: 17
  • 20. 20
  • 21. On the recipient‟s side • Twitter (says it) – gets 10,000 complaints a month – has 24 people dealing with user complaints • Facebook – ~30 lawyers, mainly focusing on patents 21
  • 22. Social media  Leverage effect • For brand protection • For consequences of action 22
  • 23. « Spill over » effect • Canadian telecom company NorthwesTel issued a takedown notice to Facebook over the logo this group was using to criticize it 23
  • 24. 24
  • 25. "... Linda Hillier March 7 at 8:56pm • Hi George, I had to take your photo down because I received this notice: "We have removed or disabled access to the following content that you have posted on Facebook because we received a notice from a third party that the content infringes or otherwise violates their rights: [Main page image:"Northwestel abuses yukoners, and exploits its monopoly"] We strongly encourage you to review the content you have posted to Facebook to make sure that you have not posted any other infringing content, as it is our policy to terminate the accounts of repeat infringers when appropriate. If you believe that we have made a mistake in removing this content, then please visit http://www.facebook.com/help/?page=1108 for more information." This is the info from the page it leads to: "We have removed or disabled access to content that you posted to Facebook because we received a notice from a third party that it infringes or otherwise violates their rights. If you believe that we have made a mistake in removing this content, you are not obligated to respond, but if you wish to follow up, you can contact us at ip@facebook.com. If we have also disabled your Facebook account, possible reasons include, but are not restricted to: • Repeated infringing behavior after receiving one or more warnings from Facebook • Alleged trademark infringement • Impersonation of an entity • Misrepresentation of identity - Facebook profiles are meant to represent a single individual. Groups, clubs, businesses and other types of organizations are not permitted to maintain an account. For more information, please visit our Intellectual Property Help Center page." I had to acknowledge the notice in order to proceed. I am not willing to put my Facebook account on the line for this photo, but you mentioned that you would be willing to fight with them. Please feel free all of the information is above, including an email address you can forward your complaint to. Thanks! Linda..." 25
  • 26. Proposal for a Council Framework Decision amending Framework Decision 2002/475/JHA on combating terrorism - Impact Assessment {COM(2007) 650 final} • “when a website is successfully removed from a host server, it reappears very easily under another name” 26
  • 27. "Streisand effect" • Online phenomenon in which an attempt to hide or remove a piece of information has the consequence of publicizing the information more widely 27
  • 28. 2. Cease & desist letters • 394 over TM (December 2010) 28
  • 29. What happened after these C&D were sent? • Effect in 90% of the cases – 10% remain • (100 % republished on ChillingEffects) • 99.2 % republished elsewhere 29
  • 30. Unicorn 30
  • 31. 3. Cases • ~200 cases studied – 25 relevant • Success of brand owners in 33% of the cases – Removal of the disputed content 31
  • 32. 4. What we learn • Limited efficiency of legal action 32
  • 33. Noise • Complaining customers who use social media receive disproportionate attention • One always hear angry people first 33
  • 34. Regulation v. Feed • Information flow – continuous / real time • mood, updates, etc. – voluminous • Passive consumption • Legal (re)action contributes to the information flow Verba volent, scripta manent scripta volent (?) 34
  • 35. Inaction may be a strategy 35
  • 36. Questions before action • Should one interfere in private space or conversations? • Should one sue its own clients? • What is the influence of the target? • … • Do social media get us paranoid? 36
  • 37. Legal response… • Legal duty to « maintain » trademarks • Boomerang effect of this duty 37
  • 38. … or communication response? • "The answer to the machine is in the machine" [C. Clark, 1996]  The answer to the use of a third machine is in your use of the machine (?) • Hidden advertising is prohibited – Example: OFT 38
  • 39. 39
  • 40. Thank you 40