SlideShare ist ein Scribd-Unternehmen logo
1 von 72
Downloaden Sie, um offline zu lesen
An Ounce of Prevention is
Worth a Pound of Cure: Key
Elements for Social Media
         Policies
        Lorraine M. Fleck
     MyCharityConnects 2011
          June 7, 2011
        These slides do not constitute legal advice.
Overview
1. Why do social media policies matter?

2. What should a social media policy address?

3. Can you use social media without being
   “anti-social”?
Why do social media policies
             matter?
Social media has changed the speed and control
of marketing…
Speed
 Your message can become viral.
 “Need for speed” – less time to formulate a
   reasoned and well-considered response.
 Your audience can respond instantaneously,
   self-organize and react quickly.
Why do social media policies
             matter?
Social media has changed the speed and control
of marketing…
Control
 Your audience is often linked to a large
   network (not necessarily of your choosing).
 Your audience may be able to seize control
   of/twist your message.
Why do social media policies
             matter?
Social media has changed the speed and control
of marketing…
Control
 Interest groups can use your social media
   infrastructure against your charity and/or
   brand.
Why do social media policies
             matter?
Social media policies can assist in protecting:
 Reputation;
 Privacy;
 Physical security; and
 Intellectual property (IP) and proprietary
  information.
Why do social media policies
             matter?
Reputation
Yours
 Key to developing trust in any organization.
 Especially important for charities and non-
  profits; no trust = no money!
Why do social media policies
             matter?
Reputation
Others
 Social media can be a conduit for defamation
  and/or depreciating the goodwill associated
  with a brand.
Why do social media policies
             matter?
Privacy
 Hot button issue; relates to your charity’s
   reputation.
 While the Personal Information Protection
   and Electronic Documents Act (PIPEDA) often
   does not apply to non-profits and charities,
   PIPEDA may apply in specific circumstances.
Why do social media policies
             matter?
Physical security
 Relates to privacy.
 Compromised if a person’s physical location
  is discovered (e.g. kidnapping, robbery,
  threats).
 “Digital exhaust” can reveal physical location.
 E.g. pleaserobme.com, “Creepy” app
pleaserobme.com
Creepy app
Why do social media policies
             matter?
Intellectual property (IP)
 Need to protect your charity or non-profit’s
   IP and proprietary info.
 Significant     legal     consequences   for
   unauthorized use of other’s IP and
   proprietary info; reputational damage could
   occur as well.
What are the sources of risk?
   User generated risks.
   Employee generated risks.
   Other sources of risks.
What are the sources of risk?
User generated risks
 Feedback from users, solicited by the
  advertiser (e.g. post your own video/photos
  at the request of or on a platform provided
  by the advertiser).
 Content posted by users that violates the IP
  rights and/or discloses the confidential or
  personal information of others.
What are the sources of risk?
User generated risks
 Unexpected user backlash.
 Users    hijacking    your   social   media
  account/site for an unintended purpose.
What are the sources of risk?
Employee generated risks
 Employers may be liable for representations
  made in the “scope of employment”.
 Statements made on an employee’s personal
  time/account may be attributed to employer.
 Employees       making   comments    about
  employer’s products and/or services without
  disclosing relationship.
What are the sources of risk?
Other risks
 Your organization may not exercise full
  control over content.
 ISP liability: Your organization could be liable
  if it hosts the online content.
 Violating social media network’s terms of use
  could result in your charity’s account being
  closed and/or your charity being banned.
What should a social media policy
            address?
For charities and non-profits, generally:
 Privacy;
 Intellectual property (IP);
 Employee’s internal and external use;
 Defamation;
 Contests; and
 Spam.
Privacy
Privacy laws are breached when a user’s
   personal information is collected, used or
   disclosed without the appropriate consent.
 Why is the personal information being
   collected?
 Will that information be only used internally
   or visible outside your charity (e.g. on a social
   media network)?
Privacy
 Is there the risk that a user will post someone
  else’s personal information?
 Is there adequate security and restricted
  access to the personal information?
Best Practices
 Consent is key!
 E.g. do not disclose a donor’s identity without
  express written consent.
Intellectual Property
Copyright
 Right to reproduce content and stop others
  from reproducing content.
 Applies to the Internet!
 Means that you must get others permission
  to use their content (e.g. articles, photos,
  logos) unless your activity falls within an
  exception to infringement.
Intellectual property
Copyright
 Exceptions to copyright infringement (“fair
  dealing”) under specific circumstances:
  1. Research/private study.
  2. Criticism/review
  3. News reporting.
 Exceptions do not apply to advertising.
Intellectual property
Copyright
 Parody, while an infringement exception in
  the U.S., is currently NOT an exception in
  Canada; may change.
Intellectual property
Copyright
 General copyright term = Life of the author +
  End of the calendar year in which the author
  died + 50 years after the year the author
  died.
 Usually, person who creates the content is
  the owner.
 Exceptions: employees, photographers.
Intellectual property
Copyright
 Moral rights (right of author attribution and
  integrity of copyrighted work) can prevent
  you from altering content.
 Ownership cannot be transferred, but can be
  waived.
Intellectual property
Copyright and User Generated Content (UGC)
 Because of copyright and moral rights, if you
  are using UGC, you must obtain the right to
  use/modify the content.
 Risk that UGC may not be truly “user
  generated”, and may violate other’s
  copyright.
Intellectual property
Copyright
Best Practices
 Remember that the same rules offline apply
  online.
 Remember that U.S. laws may not apply.
Intellectual property
Copyright
Best Practices
 Get written permission to use content unless
  your activity falls within an infringement
  exception.
 Moral rights may restrict what you can do
  with an image, even if an infringement
  exception applies.
Intellectual property
Copyright
Best Practices
 If dealing with UGC (e.g. in a contest), obtain
  the rights to use/modify the content by:
  1. Written transfer of ownership with moral
      rights waiver; OR
  2. Perpetual, royalty free license with moral
      rights waiver.
Intellectual property
Copyright
Best Practices
 Ensure that users warrant in term of use that
  content does not violate copyright, and will
  indemnify your organization if copyright is
  violated.
Intellectual property
Trade-marks
 Can be unregistered or registered.
 The owner of a registered trade-mark has the
   exclusive right to use that mark in respect of
   specific goods and/or services.
 One cannot “use” a trade-mark in a manner
   that depreciates its value or goodwill (e.g.
   posting disparaging/defamatory comments).
Intellectual property
Trade-marks
 Depending on the circumstances, displaying a
   trade-mark in social media may constitute
   “use”, meaning you could get sued for trade-
   mark infringement, passing off, or
   depreciation of goodwill.
 Copyright can also exist in logos. Using logos
   without permission can also be copyright
   infringement.
Intellectual property
Trade-marks
Best Practices
 If you are launching a campaign with new
   trade-marks, make sure the trade-marks are
   available to use.
 Obtain trade-mark registration(s) for long-
   term marks.
Intellectual property
Trade-marks
Best Practices
 Ensure that other’s marks are not “used” and
   disparaging/defamatory comments are not
   posted regarding other’s brands.
 See if you can register your trade-marks on
   the major social media platforms (e.g.
   Facebook, Twitter, MySpace) to avoid
   unauthorized accounts.
Employees
   Non-profits and charities could be liable for
    employee’s statements if made during scope
    of employment.
   Risk can come from employees use at and
    outside of work.
   In the event of a PR problem, overzealous
    employees trying to help out could end up
    unintentionally making a bad situation worse.
Employees
   Disgruntled current or former employees can
    defame your organization, causing damage.
   Employees may post comments about
    employer’s products and/or services without
    disclosing relationship.
   Employees       may      release confidential
    information without thinking of the
    consequences (e.g. Twitpics of visiting
    celebrities).
Employees
Best Practices
 Have a social media policy that applies to
  everyone – from the mailroom to the CEO.
 Have marketing and legal work together to
  draft the policy – no silos!
 Acknowledge that employees may use social
  media outside of the office, but make them
  aware of the risks to them and your non-
  profit/charity that could arise from such use.
Employees
Best Practices
 Acknowledge that employees may use social
  media outside of the office, but make them
  aware of the risks to them and your non-
  profit/charity that could arise from such use.
 Authorize a limited number of users to post
  on your organization’s behalf, who cannot
  respond to complaints unless authorized.
Employees
Best Practices
 Educate authorized users and all employees
  on what they can and cannot post.
 Have a list of social media user names and
  passwords in the event an employee leaves.
  Restrict access to that list on a “need to
  know” basis.
Employees
Best Practices
 Use the “mother” rule – if you wouldn’t want
  your mother to see the content – don’t post!
Defamation
What is defamation?
 Oral or written words which tend to lower a
  person in the estimation of others or cause a
  person to be shunned, avoided or exposed to
  hatred, contempt or ridicule.
Defamation
   What is required for a successful defamation
    claim?
    1. The words are defamatory;
    2. The defendant communicated the words
       to third persons (e.g. publication); AND
    3. The plaintiff is the one defamed.
   Damages can be significant e.g. $125,000
    damages in Barrick Gold Corp. v. Lopehandia.
Defamation
   What defences are there to a defamation
    claim?
    1. Truth.
    2. Fair comment: applies only if the
       statement is an honestly held expression
       of opinion on matters of public interest
       and has some factual basis.
Defamation
   What defences are there to a defamation
    claim?
    3. Responsible communication: statements/
        allegations in the public interest even if
        not true. Require some diligence to verify.
Defamation
4. Innocent disseminator: Merely distribute
   content and exercise little, if any, editorial
   control. Defendant must show that:
    Unaware of defamatory statement.
    No circumstances which ought to have
     resulted in knowledge of defamatory
     statement.
    Not negligent by remaining ignorant of
     defamation.
Defamation
 Host will still have some obligations and
  potential liability even if insufficient
  control e.g. Carter v. BC Federation of
  Foster Parents, 2006 BCCA.
Defamation
Best Practices
 If you don’t have anything nice to post…
  don’t post!
Contests
   The same laws that apply offline apply online.
   To avoid an illegal lottery – need to remove
    either chance or consideration (payment)
    from the contest. Need a skill testing
    question or no purchase option.
   Develop contest rules to protect your
    organization.
Contests
   Disclose any material facts that would affect
    chance of winning in contest rules.
   Do not unduly delay distributing prizes.
Contests
Best Practices
 Use “mini rules”.
 Rules should be readily accessible (no
  complicated website to navigate, purchase
  additional software, or visit additional
  website).
 Specify who the contest is open to, otherwise
  could be open to everyone in the world.
Contests
Best Practices
 Specify time zone applicable to any deadline
  in the rules.
 Anticipate children entering your contest.
  Have a parent/guardian click an “I Agree”
  button on the entry form to consent to the
  contest rules on child’s behalf.
Contests
Best Practices
 Anticipate computer glitches: contest rules
  allow for cancellation/contest modification.
 Privacy and disclosure of winner’s personal
  info.
Contests
Best Practices
 Anticipate children entering your contest.
  Have a parent/guardian click an “I Agree”
  button on the entry form to consent to the
  contest rules on child’s behalf.
 Assign copyright and waive moral rights in
  UGC via “I Agree” button.
Contests
Best Practices
 Have rules prohibit unauthorized third party
  IP use in UGC (e.g. music, photos, logos).
 If you receive an unauthorized IP use
  complaint, immediately remove offending
  content.
Contests
Best Practices
 If you are offering a contest via a social media
  platform, check to see if they have rules
  regulating such contests (e.g. Facebook,
  YouTube, Twitter).
Spam
   New Fighting Internet and Wireless Spam Act
    (FISA) may apply to messages sent over social
    media networks such as Facebook and
    Twitter.
   Under     FISA,    “commercial     electronic
    messages” must identify the sender and
    provide contact information, as well as
    provide an unsubscribe mechanism.
Spam
   “Commercial electronic messages” capture
    activity that may be performed without
    expectation of profit.
   Significant penalties: Fine up to $1 million for
    an individual; up to $10 million for
    corporations.
Spam
Best Practices
 Meet the requirements for express or implied
  consent.
Spam
Best Practices
 Express consent
  1. Provide the purpose for which consent is
     sought.
  2. Identify the person seeking the consent,
     and if different, the person on whose
     behalf consent is sought.
  3. Provide any other prescribed info.
Spam
Best Practices
 Implied consent
  1. Existing      business/      non-business
     relationship between sender and recipient,
     or
  2. Recipient has conspicuously published
     their address, or has disclosed it to the
     sender and…
Spam
Best Practices
 Implied consent
  2. Recipient has conspicuously published
      their address, or has disclosed it to the
      sender and…
     i. Has not indicated that they do not wish
         to receive commercial messages, and
     ii. Message is relevant to recipient’s
         business.
Is it possible to use social media
        without being “anti-social”?
    YES!
    But need to have in place to limit liability and
     mitigate risk.
    Two pronged approach:
     1. Legal measures
     2. Non-legal measures.
Using social media without being
             anti-social
Legal measures
 Comprehensive   social media policy and
  terms of use (TOU) if operating your own
  network.
   Specify permitted users and uses.
   Clearly prohibit the posting of problematic
    content, such as personal information (e.g.
    donor’s identity), content that violates IP,
    defamatory content, other confidential info.
Using social media without being
             anti-social
Legal measures
 Comprehensive social media policy and TOU.
   Consent for collection/use of personal
    information and other privacy issues.
   Use measures to ensure that user agrees to TOU
    to ensure enforceability (e.g. click-wrap
    agreements).
Using social media without being
             anti-social
Legal measures
 Comprehensive social media policy and TOU.
     Obtain copyright assignments/licenses plus
      moral rights waiver for UGC.
     Avoid disclosing physical location except where
      unavoidable.
Using social media without being
             anti-social
Legal measures
 Using an existing social media platform?
     Comply with social media platform’s TOU.
Using social media without being
             anti-social
Non-legal measures
 Fall into two categories: technical and
  administrative.
Using social media without being
             anti-social
Non-legal measures
1. Technical
     Verify user identity.
     Control access to the social media network
      (where possible).
     Control access to user’s personal information.
     Content filters.
Using social media without being
             anti-social
Non-legal measures
2. Administrative
         Respond to complaints about content.
         Respond to users posting problematic content.
         Monitor the site
           May lead to increased liability (law unclear).
           But if do not monitor, could hurt your charity’s image
            and brand. Uncertain whether lack of monitoring
            avoids liability.
Thank you…Questions?

            Lorraine M. Fleck
Barrister & Solicitor | Trade-mark Agent

   E-mail | lfleck@hofferadler.com
   Website | www.hofferadler.com
   Blog | www.ipaddressblog.com
           | @lorrainefleck
An Ounce of Prevention is
Worth a Pound of Cure: Key
Elements for Social Media
         Policies
        Lorraine M. Fleck
     MyCharityConnects 2011
          June 7, 2011
        These slides do not constitute legal advice.

Weitere ähnliche Inhalte

Was ist angesagt?

The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Dave Shannon
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineLegal Media Matters
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationKenneth Ronkowitz
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Claudia Romeo GurreaNozaleda
 
Tech@Work: How Employers Can Thrive in the Digital Workplace
Tech@Work: How Employers Can Thrive in the Digital WorkplaceTech@Work: How Employers Can Thrive in the Digital Workplace
Tech@Work: How Employers Can Thrive in the Digital WorkplaceElijah Yip
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Presentation dangers of social media
Presentation   dangers of social mediaPresentation   dangers of social media
Presentation dangers of social mediaRich Hughes
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity Digital-identity
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Managementtwhiteman
 
Top 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsTop 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsDeborah Gonzalez, Esq.
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social MediaJanet Johnson
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water coolerwychepa
 
Employee social media Toolbox Talk v1.0
Employee social media Toolbox Talk  v1.0 Employee social media Toolbox Talk  v1.0
Employee social media Toolbox Talk v1.0 Dave Shannon
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 

Was ist angesagt? (20)

The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Tech@Work: How Employers Can Thrive in the Digital Workplace
Tech@Work: How Employers Can Thrive in the Digital WorkplaceTech@Work: How Employers Can Thrive in the Digital Workplace
Tech@Work: How Employers Can Thrive in the Digital Workplace
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Presentation dangers of social media
Presentation   dangers of social mediaPresentation   dangers of social media
Presentation dangers of social media
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Management
 
Top 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsTop 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent Consultants
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water cooler
 
Employee social media Toolbox Talk v1.0
Employee social media Toolbox Talk  v1.0 Employee social media Toolbox Talk  v1.0
Employee social media Toolbox Talk v1.0
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 

Ähnlich wie An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Media Policies (MyCharityConnects 2011)

Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11smahboobani
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Oasis Solutions Group
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
Straight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social MediaStraight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social MediaDeborah Gonzalez, Esq.
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSmarsh
 
Developing a Social Media Policy For Your Business
Developing a Social Media Policy For Your BusinessDeveloping a Social Media Policy For Your Business
Developing a Social Media Policy For Your BusinessStacey Burke
 
Developing a Social Media Policy for Your Law Firm
Developing a Social Media Policy for Your Law FirmDeveloping a Social Media Policy for Your Law Firm
Developing a Social Media Policy for Your Law FirmLisa Hopkins
 
Unit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsUnit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsKeiko24
 
Risks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparencyRisks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparencyStan Skrabut, Ed.D.
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxbriancrawford30935
 
Social Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldSocial Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldThis account is closed
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA PresentationRaidious
 
Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Mirsky & Company, PLLC
 

Ähnlich wie An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Media Policies (MyCharityConnects 2011) (20)

Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Straight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social MediaStraight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social Media
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and Brokers
 
Presentation: Social Media & HR
Presentation: Social Media & HRPresentation: Social Media & HR
Presentation: Social Media & HR
 
Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Developing a Social Media Policy For Your Business
Developing a Social Media Policy For Your BusinessDeveloping a Social Media Policy For Your Business
Developing a Social Media Policy For Your Business
 
Developing a Social Media Policy for Your Law Firm
Developing a Social Media Policy for Your Law FirmDeveloping a Social Media Policy for Your Law Firm
Developing a Social Media Policy for Your Law Firm
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Unit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsUnit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltools
 
Risks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparencyRisks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparency
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media Policies
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 
Social Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldSocial Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New World
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA Presentation
 
Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services
 

Mehr von lorrainefleck

Trademark Licensing 101: Fundamentals for Brand Monetization & Protection
Trademark Licensing 101: Fundamentals for Brand Monetization & ProtectionTrademark Licensing 101: Fundamentals for Brand Monetization & Protection
Trademark Licensing 101: Fundamentals for Brand Monetization & Protectionlorrainefleck
 
Going Global: What Businesses Need to Know About Intellectual Property Laws A...
Going Global: What Businesses Need to Know About Intellectual Property Laws A...Going Global: What Businesses Need to Know About Intellectual Property Laws A...
Going Global: What Businesses Need to Know About Intellectual Property Laws A...lorrainefleck
 
Canadian Copyright Law: A Primer
Canadian Copyright Law: A PrimerCanadian Copyright Law: A Primer
Canadian Copyright Law: A Primerlorrainefleck
 
Copyright, Trade-marks & Social Media: A Primer
Copyright, Trade-marks & Social Media: A PrimerCopyright, Trade-marks & Social Media: A Primer
Copyright, Trade-marks & Social Media: A Primerlorrainefleck
 
Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...
Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...
Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...lorrainefleck
 
Canada and the Madrid Protocol: An Update
Canada and the Madrid Protocol: An UpdateCanada and the Madrid Protocol: An Update
Canada and the Madrid Protocol: An Updatelorrainefleck
 
Trade-marks & the Internet: Protecting Brands on the Internet and in Soc...
Trade-marks & the Internet: Protecting Brands on the Internet  and in Soc...Trade-marks & the Internet: Protecting Brands on the Internet  and in Soc...
Trade-marks & the Internet: Protecting Brands on the Internet and in Soc...lorrainefleck
 

Mehr von lorrainefleck (7)

Trademark Licensing 101: Fundamentals for Brand Monetization & Protection
Trademark Licensing 101: Fundamentals for Brand Monetization & ProtectionTrademark Licensing 101: Fundamentals for Brand Monetization & Protection
Trademark Licensing 101: Fundamentals for Brand Monetization & Protection
 
Going Global: What Businesses Need to Know About Intellectual Property Laws A...
Going Global: What Businesses Need to Know About Intellectual Property Laws A...Going Global: What Businesses Need to Know About Intellectual Property Laws A...
Going Global: What Businesses Need to Know About Intellectual Property Laws A...
 
Canadian Copyright Law: A Primer
Canadian Copyright Law: A PrimerCanadian Copyright Law: A Primer
Canadian Copyright Law: A Primer
 
Copyright, Trade-marks & Social Media: A Primer
Copyright, Trade-marks & Social Media: A PrimerCopyright, Trade-marks & Social Media: A Primer
Copyright, Trade-marks & Social Media: A Primer
 
Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...
Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...
Trade-mark Truisms: Best Practices for Acquiring and Managing Trade-marks in ...
 
Canada and the Madrid Protocol: An Update
Canada and the Madrid Protocol: An UpdateCanada and the Madrid Protocol: An Update
Canada and the Madrid Protocol: An Update
 
Trade-marks & the Internet: Protecting Brands on the Internet and in Soc...
Trade-marks & the Internet: Protecting Brands on the Internet  and in Soc...Trade-marks & the Internet: Protecting Brands on the Internet  and in Soc...
Trade-marks & the Internet: Protecting Brands on the Internet and in Soc...
 

Kürzlich hochgeladen

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 

Kürzlich hochgeladen (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 

An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Media Policies (MyCharityConnects 2011)

  • 1. An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Media Policies Lorraine M. Fleck MyCharityConnects 2011 June 7, 2011 These slides do not constitute legal advice.
  • 2. Overview 1. Why do social media policies matter? 2. What should a social media policy address? 3. Can you use social media without being “anti-social”?
  • 3. Why do social media policies matter? Social media has changed the speed and control of marketing… Speed  Your message can become viral.  “Need for speed” – less time to formulate a reasoned and well-considered response.  Your audience can respond instantaneously, self-organize and react quickly.
  • 4. Why do social media policies matter? Social media has changed the speed and control of marketing… Control  Your audience is often linked to a large network (not necessarily of your choosing).  Your audience may be able to seize control of/twist your message.
  • 5. Why do social media policies matter? Social media has changed the speed and control of marketing… Control  Interest groups can use your social media infrastructure against your charity and/or brand.
  • 6. Why do social media policies matter? Social media policies can assist in protecting:  Reputation;  Privacy;  Physical security; and  Intellectual property (IP) and proprietary information.
  • 7. Why do social media policies matter? Reputation Yours  Key to developing trust in any organization.  Especially important for charities and non- profits; no trust = no money!
  • 8. Why do social media policies matter? Reputation Others  Social media can be a conduit for defamation and/or depreciating the goodwill associated with a brand.
  • 9. Why do social media policies matter? Privacy  Hot button issue; relates to your charity’s reputation.  While the Personal Information Protection and Electronic Documents Act (PIPEDA) often does not apply to non-profits and charities, PIPEDA may apply in specific circumstances.
  • 10. Why do social media policies matter? Physical security  Relates to privacy.  Compromised if a person’s physical location is discovered (e.g. kidnapping, robbery, threats).  “Digital exhaust” can reveal physical location.  E.g. pleaserobme.com, “Creepy” app
  • 13. Why do social media policies matter? Intellectual property (IP)  Need to protect your charity or non-profit’s IP and proprietary info.  Significant legal consequences for unauthorized use of other’s IP and proprietary info; reputational damage could occur as well.
  • 14. What are the sources of risk?  User generated risks.  Employee generated risks.  Other sources of risks.
  • 15. What are the sources of risk? User generated risks  Feedback from users, solicited by the advertiser (e.g. post your own video/photos at the request of or on a platform provided by the advertiser).  Content posted by users that violates the IP rights and/or discloses the confidential or personal information of others.
  • 16. What are the sources of risk? User generated risks  Unexpected user backlash.  Users hijacking your social media account/site for an unintended purpose.
  • 17. What are the sources of risk? Employee generated risks  Employers may be liable for representations made in the “scope of employment”.  Statements made on an employee’s personal time/account may be attributed to employer.  Employees making comments about employer’s products and/or services without disclosing relationship.
  • 18. What are the sources of risk? Other risks  Your organization may not exercise full control over content.  ISP liability: Your organization could be liable if it hosts the online content.  Violating social media network’s terms of use could result in your charity’s account being closed and/or your charity being banned.
  • 19. What should a social media policy address? For charities and non-profits, generally:  Privacy;  Intellectual property (IP);  Employee’s internal and external use;  Defamation;  Contests; and  Spam.
  • 20. Privacy Privacy laws are breached when a user’s personal information is collected, used or disclosed without the appropriate consent.  Why is the personal information being collected?  Will that information be only used internally or visible outside your charity (e.g. on a social media network)?
  • 21. Privacy  Is there the risk that a user will post someone else’s personal information?  Is there adequate security and restricted access to the personal information? Best Practices  Consent is key!  E.g. do not disclose a donor’s identity without express written consent.
  • 22. Intellectual Property Copyright  Right to reproduce content and stop others from reproducing content.  Applies to the Internet!  Means that you must get others permission to use their content (e.g. articles, photos, logos) unless your activity falls within an exception to infringement.
  • 23. Intellectual property Copyright  Exceptions to copyright infringement (“fair dealing”) under specific circumstances: 1. Research/private study. 2. Criticism/review 3. News reporting.  Exceptions do not apply to advertising.
  • 24. Intellectual property Copyright  Parody, while an infringement exception in the U.S., is currently NOT an exception in Canada; may change.
  • 25. Intellectual property Copyright  General copyright term = Life of the author + End of the calendar year in which the author died + 50 years after the year the author died.  Usually, person who creates the content is the owner.  Exceptions: employees, photographers.
  • 26. Intellectual property Copyright  Moral rights (right of author attribution and integrity of copyrighted work) can prevent you from altering content.  Ownership cannot be transferred, but can be waived.
  • 27. Intellectual property Copyright and User Generated Content (UGC)  Because of copyright and moral rights, if you are using UGC, you must obtain the right to use/modify the content.  Risk that UGC may not be truly “user generated”, and may violate other’s copyright.
  • 28. Intellectual property Copyright Best Practices  Remember that the same rules offline apply online.  Remember that U.S. laws may not apply.
  • 29. Intellectual property Copyright Best Practices  Get written permission to use content unless your activity falls within an infringement exception.  Moral rights may restrict what you can do with an image, even if an infringement exception applies.
  • 30. Intellectual property Copyright Best Practices  If dealing with UGC (e.g. in a contest), obtain the rights to use/modify the content by: 1. Written transfer of ownership with moral rights waiver; OR 2. Perpetual, royalty free license with moral rights waiver.
  • 31. Intellectual property Copyright Best Practices  Ensure that users warrant in term of use that content does not violate copyright, and will indemnify your organization if copyright is violated.
  • 32. Intellectual property Trade-marks  Can be unregistered or registered.  The owner of a registered trade-mark has the exclusive right to use that mark in respect of specific goods and/or services.  One cannot “use” a trade-mark in a manner that depreciates its value or goodwill (e.g. posting disparaging/defamatory comments).
  • 33. Intellectual property Trade-marks  Depending on the circumstances, displaying a trade-mark in social media may constitute “use”, meaning you could get sued for trade- mark infringement, passing off, or depreciation of goodwill.  Copyright can also exist in logos. Using logos without permission can also be copyright infringement.
  • 34. Intellectual property Trade-marks Best Practices  If you are launching a campaign with new trade-marks, make sure the trade-marks are available to use.  Obtain trade-mark registration(s) for long- term marks.
  • 35. Intellectual property Trade-marks Best Practices  Ensure that other’s marks are not “used” and disparaging/defamatory comments are not posted regarding other’s brands.  See if you can register your trade-marks on the major social media platforms (e.g. Facebook, Twitter, MySpace) to avoid unauthorized accounts.
  • 36. Employees  Non-profits and charities could be liable for employee’s statements if made during scope of employment.  Risk can come from employees use at and outside of work.  In the event of a PR problem, overzealous employees trying to help out could end up unintentionally making a bad situation worse.
  • 37. Employees  Disgruntled current or former employees can defame your organization, causing damage.  Employees may post comments about employer’s products and/or services without disclosing relationship.  Employees may release confidential information without thinking of the consequences (e.g. Twitpics of visiting celebrities).
  • 38. Employees Best Practices  Have a social media policy that applies to everyone – from the mailroom to the CEO.  Have marketing and legal work together to draft the policy – no silos!  Acknowledge that employees may use social media outside of the office, but make them aware of the risks to them and your non- profit/charity that could arise from such use.
  • 39. Employees Best Practices  Acknowledge that employees may use social media outside of the office, but make them aware of the risks to them and your non- profit/charity that could arise from such use.  Authorize a limited number of users to post on your organization’s behalf, who cannot respond to complaints unless authorized.
  • 40. Employees Best Practices  Educate authorized users and all employees on what they can and cannot post.  Have a list of social media user names and passwords in the event an employee leaves. Restrict access to that list on a “need to know” basis.
  • 41. Employees Best Practices  Use the “mother” rule – if you wouldn’t want your mother to see the content – don’t post!
  • 42. Defamation What is defamation?  Oral or written words which tend to lower a person in the estimation of others or cause a person to be shunned, avoided or exposed to hatred, contempt or ridicule.
  • 43. Defamation  What is required for a successful defamation claim? 1. The words are defamatory; 2. The defendant communicated the words to third persons (e.g. publication); AND 3. The plaintiff is the one defamed.  Damages can be significant e.g. $125,000 damages in Barrick Gold Corp. v. Lopehandia.
  • 44. Defamation  What defences are there to a defamation claim? 1. Truth. 2. Fair comment: applies only if the statement is an honestly held expression of opinion on matters of public interest and has some factual basis.
  • 45. Defamation  What defences are there to a defamation claim? 3. Responsible communication: statements/ allegations in the public interest even if not true. Require some diligence to verify.
  • 46. Defamation 4. Innocent disseminator: Merely distribute content and exercise little, if any, editorial control. Defendant must show that:  Unaware of defamatory statement.  No circumstances which ought to have resulted in knowledge of defamatory statement.  Not negligent by remaining ignorant of defamation.
  • 47. Defamation  Host will still have some obligations and potential liability even if insufficient control e.g. Carter v. BC Federation of Foster Parents, 2006 BCCA.
  • 48. Defamation Best Practices  If you don’t have anything nice to post… don’t post!
  • 49. Contests  The same laws that apply offline apply online.  To avoid an illegal lottery – need to remove either chance or consideration (payment) from the contest. Need a skill testing question or no purchase option.  Develop contest rules to protect your organization.
  • 50. Contests  Disclose any material facts that would affect chance of winning in contest rules.  Do not unduly delay distributing prizes.
  • 51. Contests Best Practices  Use “mini rules”.  Rules should be readily accessible (no complicated website to navigate, purchase additional software, or visit additional website).  Specify who the contest is open to, otherwise could be open to everyone in the world.
  • 52. Contests Best Practices  Specify time zone applicable to any deadline in the rules.  Anticipate children entering your contest. Have a parent/guardian click an “I Agree” button on the entry form to consent to the contest rules on child’s behalf.
  • 53. Contests Best Practices  Anticipate computer glitches: contest rules allow for cancellation/contest modification.  Privacy and disclosure of winner’s personal info.
  • 54. Contests Best Practices  Anticipate children entering your contest. Have a parent/guardian click an “I Agree” button on the entry form to consent to the contest rules on child’s behalf.  Assign copyright and waive moral rights in UGC via “I Agree” button.
  • 55. Contests Best Practices  Have rules prohibit unauthorized third party IP use in UGC (e.g. music, photos, logos).  If you receive an unauthorized IP use complaint, immediately remove offending content.
  • 56. Contests Best Practices  If you are offering a contest via a social media platform, check to see if they have rules regulating such contests (e.g. Facebook, YouTube, Twitter).
  • 57. Spam  New Fighting Internet and Wireless Spam Act (FISA) may apply to messages sent over social media networks such as Facebook and Twitter.  Under FISA, “commercial electronic messages” must identify the sender and provide contact information, as well as provide an unsubscribe mechanism.
  • 58. Spam  “Commercial electronic messages” capture activity that may be performed without expectation of profit.  Significant penalties: Fine up to $1 million for an individual; up to $10 million for corporations.
  • 59. Spam Best Practices  Meet the requirements for express or implied consent.
  • 60. Spam Best Practices  Express consent 1. Provide the purpose for which consent is sought. 2. Identify the person seeking the consent, and if different, the person on whose behalf consent is sought. 3. Provide any other prescribed info.
  • 61. Spam Best Practices  Implied consent 1. Existing business/ non-business relationship between sender and recipient, or 2. Recipient has conspicuously published their address, or has disclosed it to the sender and…
  • 62. Spam Best Practices  Implied consent 2. Recipient has conspicuously published their address, or has disclosed it to the sender and… i. Has not indicated that they do not wish to receive commercial messages, and ii. Message is relevant to recipient’s business.
  • 63. Is it possible to use social media without being “anti-social”?  YES!  But need to have in place to limit liability and mitigate risk.  Two pronged approach: 1. Legal measures 2. Non-legal measures.
  • 64. Using social media without being anti-social Legal measures  Comprehensive social media policy and terms of use (TOU) if operating your own network.  Specify permitted users and uses.  Clearly prohibit the posting of problematic content, such as personal information (e.g. donor’s identity), content that violates IP, defamatory content, other confidential info.
  • 65. Using social media without being anti-social Legal measures  Comprehensive social media policy and TOU.  Consent for collection/use of personal information and other privacy issues.  Use measures to ensure that user agrees to TOU to ensure enforceability (e.g. click-wrap agreements).
  • 66. Using social media without being anti-social Legal measures  Comprehensive social media policy and TOU.  Obtain copyright assignments/licenses plus moral rights waiver for UGC.  Avoid disclosing physical location except where unavoidable.
  • 67. Using social media without being anti-social Legal measures  Using an existing social media platform?  Comply with social media platform’s TOU.
  • 68. Using social media without being anti-social Non-legal measures  Fall into two categories: technical and administrative.
  • 69. Using social media without being anti-social Non-legal measures 1. Technical  Verify user identity.  Control access to the social media network (where possible).  Control access to user’s personal information.  Content filters.
  • 70. Using social media without being anti-social Non-legal measures 2. Administrative  Respond to complaints about content.  Respond to users posting problematic content.  Monitor the site  May lead to increased liability (law unclear).  But if do not monitor, could hurt your charity’s image and brand. Uncertain whether lack of monitoring avoids liability.
  • 71. Thank you…Questions? Lorraine M. Fleck Barrister & Solicitor | Trade-mark Agent E-mail | lfleck@hofferadler.com Website | www.hofferadler.com Blog | www.ipaddressblog.com | @lorrainefleck
  • 72. An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Media Policies Lorraine M. Fleck MyCharityConnects 2011 June 7, 2011 These slides do not constitute legal advice.