SlideShare ist ein Scribd-Unternehmen logo
1 von 46
SOCIAL MEDIA LAW
  The Legal Do’s and Don’ts
       of Social Media

           Presented for
   TrustPoint Management Group
          August 10, 2012
Tweet it up:

           #socialmedialaw

www.brittontuma.com                  #socialmedialaw   2
Notes
    1. Add Pictures

    2. Streamline sections – 45 minutes

    3. Insert Copyright




www.brittontuma.com                       #socialmedialaw   3
4
WHAT IS
SOCIAL MEDIA LAW?




             #socialmedialaw   5
Social Media Law:
            The law that applies to and
            governs the use of social media.

                          (was that all you really wanted to know?)




www.brittontuma.com                                  #socialmedialaw   6
Social Media Law:
         inherent risks
         natural tension between legal and marketing
         BUT!!!
         I am “sold out” on social media and an avid
          user … and I don’t want to get sued either …

www.brittontuma.com                           #socialmedialaw   7
My Goal:
        find an acceptable balance
        educate you on risks of using social media, along
         with other digital business risks
        help show you some ways to minimize those risks
        Remember: social media is a tool – what you say and
         do is much like “real life”
        “Real life” rules still apply – use your common sense!

www.brittontuma.com                                   #socialmedialaw   8
 what is social media law
              traditional areas of law incorporated
              practical examples of how they arise

        how to minimize the risk
              can’t eliminate, only minimize
              social media policies
              workplace training and guidance
              cyber-insurance

        other digital business risks
              data breach & hacking
              computer fraud / Computer Fraud and Abuse Act

        Q&A
www.brittontuma.com                                            #socialmedialaw   9
2 General Types of Law

             Codes: legislatures create specific laws to
              address specific problems

             Common Law: judges look to general
              principles of law and, by using
              reason, apply those principles to resolve
              previously unforeseen problems
www.brittontuma.com                              #socialmedialaw   10
Legislatures want to keep up
              impossible
              speed technology is evolving
              speed culture and business environment changing
              legislature too slow
                    example:
                        last spring the big ruckus was prospective
                        employers asking for social media logins –
                        the massive public outcry made it such that
                        nobody in their right mind would do that now
                        this past week, Illinois became one of 2 states
                        to enact a law prohibiting this; eff. date:
                        1/1/13

www.brittontuma.com                                            #socialmedialaw   11
www.brittontuma.com   #socialmedialaw   12
Look to Common Law
             contract law
             intellectual property law
             torts – defamation
             regulatory law
             employment law
             evidence law

www.brittontuma.com                       #socialmedialaw   13
You can’t protect against what you
        don’t know, so …




www.brittontuma.com                     #socialmedialaw   14
Who uses social media for marketing?
             do you want to give your marketing efforts to
              your competitor?
             who really owns your account
             followers / connections?
             “an ounce of prevention is worth a pound of
              cure”: PhoneDog v. Kravitz (7/15/11)
             each service or site has a contract
             contract law
www.brittontuma.com                                 #socialmedialaw   15
Who has trade secrets, confidential and
        proprietary information?
             do you want to tell your competitors?
             customer / vendor lists
                     who are you talking to or following?

             secret business alliances and strategies
             secret business initiatives and plans
             business situational awareness
             intellectual property law: trade secrets
www.brittontuma.com                                          #socialmedialaw   16
Who wants to get sued?
             infringement of trademark
             infringement of copyright
                     DMCA Takedown Request

             right to publicity
                     name, voice, signature, photo, likeness (statutory after death)
                     common law while living if for value

             must have a license or use creative commons
             intellectual property law

www.brittontuma.com                                                     #socialmedialaw   17
Who wants to get sued some more?
             what you (and your employees) say can hurt you!
             business disparagement
             tortious interference
             defamation (libel & slander)
             false advertising & false warranties
             fraud & negligent misrepresentation
             harassment and cyber-bullying
             “puffery” of facts
www.brittontuma.com                                  #socialmedialaw   18
Who wants to get investigated by the
        Feds?
               FTC – Investigated Hyundai for not disclosing incentives
                given to bloggers for endorsements.
               HHS & OCR – could have investigated hospital employee
                who posted patient pictures and “PHI” on Facebook (“it’s
                just Facebook!”)
               SEC – false statements made in raising funds (SEC v.
                Imperia Invest. IBC) or wrongful disclosures of information
               regulatory law


www.brittontuma.com                                            #socialmedialaw   19
What are some real trouble spots?
             Giveaways and contests can be trouble for many
              reasons – do not do them on social media
              without having it thoroughly vetted
                     many sites’ TOS prohibit
                     jurisdiction gambling and contest rules
             Employment issues are one of the main areas in
              which legal and general business problems arise
                     Discussed in next section



www.brittontuma.com                                             #socialmedialaw   20
Can you guess what will be used against you if
        any of these problems arise?
             social media is evidence – very powerful evidence!
             electronically stored information (“ESI”) is quickly
              becoming the most useful form of evidence
              available
             evidence from social media is now obtained and
              used in virtually every kind of lawsuit and
              investigation
             we now have complete records of 2-way
              communication stream – like all calls recorded!
www.brittontuma.com                                     #socialmedialaw   21
MINIMIZING THE
 RISKS OF SOCIAL
MEDIA IN BUSINESS




             #socialmedialaw   22
Social media policies are a “must have”
                ounce of prevention: less than 1 day of litigation
                if have, must enforce
                trying to predict issues – but evolving – can’t get all
                contractually resolve issues such as ownership and
                 authority
                great opportunity to set rules and document expectations
                greater opportunity to explain and ensure understanding
                 of expectations
                put on notice of monitoring – and actually monitor!
                should address employment issues


www.brittontuma.com                                         #socialmedialaw   23
Employment Issues
             using social media in hiring
                 best to have set criteria with neutral third
                  party investigate for criteria
                 not use to discriminate
                         e.g., snooping to find
                          race, gender, age, disability, pregnancy
                         e.g., search for candidates on Twitter where
                          disproportionate number of people <40 yrs. on
                          Twitter, may violate the Age Discrimination in
                          Employment Act

                 requesting social media login information
www.brittontuma.com                                                  #socialmedialaw   24
Employment Issues
             using social media for the company
                     scope of work for duties and times
                         e.g., overtime for weekend “Facebooking”
                     personal or company owned accounts / followers
                     familiarity and compliance with site Agreement / TOS
                     what is authorized / prohibited
                     responsibility for statements / disclosures
                     monitored
                     saying “use good judgment” is not enough!
www.brittontuma.com                                                  #socialmedialaw   25
Employment Issues
             using personal social media during work
                     can be prohibited
                     may prohibit using or disclosing company IP for
                      personal SM
                     may prohibit using company info for setting up
                      personal SM accounts




www.brittontuma.com                                             #socialmedialaw   26
You need social media policies but the National
        Labor Relations Board is making it difficult
               NLRB jurisdiction = impacts interstate commerce
               National Labor Relations Act (NLRA) sec. 7 gives employees
                right to engage in “concerted activities for the purpose of …
                mutual aid and protection”
               NLRB finds illegal any policy provision that (a) restricts or (b)
                an employee would reasonably construe to chill concerted
                activities
               On 5/30/12 NLRB General Counsel issued its 3rd Report on
                Social Media Policies in 1 year period (8/11 & 1/12)


www.brittontuma.com                                               #socialmedialaw   27
Can you guess who the NLRB is pulling for?
             making it very difficult for businesses to protect
              themselves
             social media policies must now be carefully tailored
              to
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             Examples of provisions found illegal by NLRB


www.brittontuma.com                                                 #socialmedialaw   28
www.brittontuma.com   #socialmedialaw   29
www.brittontuma.com   #socialmedialaw   30
www.brittontuma.com   #socialmedialaw   31
What is the NLRB really looking for?
             clarity and precision
             examples of do’s and don’ts that give
              context and real-life meaning to the rules




www.brittontuma.com                             #socialmedialaw   32
MINIMIZING OTHER
DIGITAL BUSINESS
      RISKS




            #socialmedialaw   33
Cyber-Insurance
               If you are doing anything in cyberspace, you need it.
                Period.
               Most traditional insurance does not cover cyber-
                events, even if you think it does (really!)
               Cyber-Insurance is relatively inexpensive
               Most policies come include a cyber-risk audit before the
                policies are underwritten
               Policies can cover social media risk, computer fraud
                risk, and data breach / hacking risk



www.brittontuma.com                                            #socialmedialaw   34
Customer Information – do you retain it on your
         system?
                 Data Breach
                 Effective 9/1/12, if you conduct business in Texas and your system
                  is breached and your customer’s unencrypted “sensitive personal
                  information” is, or is reasonably believed to have been
                  compromised, must notify all Texas residents of breach.
                 The notice must be given “as quickly as possible” and failure or
                  delay in doing so results in a fine of $100.00 per individual per day
                  (not to exceed $250,000)
                Notice may be made through written or electronic means though
                 it can be given by major media outlets if the cost of providing
                 notice exceeds $250,000 or the number of persons exceeds
                 500,000
www.brittontuma.com                                                    #socialmedialaw    35
www.brittontuma.com   #socialmedialaw   36
www.brittontuma.com   #socialmedialaw   37
Why is the Computer Fraud
                      and Abuse Act important?


       Primary Law for Misuse of Computers
       Computers …



www.brittontuma.com                       #socialmedialaw   38
“Everything has a
          computer in it nowadays.”
                            -Steve Jobs




www.brittontuma.com             #socialmedialaw   39
The CFAA says
          has a processor or stores data

               “the term ‘computer’ means an
               electronic, magnetic, optical, electrochemical, or other high
               speed data processing device performing logical, arithmetic, or
               storage functions, and includes any data storage facility or
               communications facility directly related to or operating in
               conjunction with such device, but …”

          “such term does not include an automated typewriter or
          typesetter, a portable hand held calculator, or other similar
          device;”

www.brittontuma.com                                              #socialmedialaw   40
What about




www.brittontuma.com   #socialmedialaw   41
The CFAA applies only to “protected” computers

         This may limit the problem of applying it to alarm
         clocks, toasters, and coffee makers

         Protected = connected to the Internet

        Any situations where these devices are connected?



www.brittontuma.com                                   #socialmedialaw   42
• TI-99               • Leap Frog Leapster   • iPhone 4
    • 3.3 MHz Processor   • 96 MHz Processor     • 800 MHz Processer
    • 16 KB of RAM        • 128 MB of RAM        • 512 MB of RAM



www.brittontuma.com                                   #socialmedialaw   43
The CFAA prohibits wrongfully accessing
     a computer where the access
            Obtains information
            Commits a fraud
            Obtains something of value
            Transmits damaging information
            Causes damage
            Traffics in passwords
            Commits extortion


www.brittontuma.com                           #socialmedialaw   44
 social media is wonderful!
             must find proper balance
             need a social media policy
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             need to enforce social media policy
             need to spend time with employees to help them
              understand and possibly collaborate on the rules
             need to look at cyber-insurance!
www.brittontuma.com                                                 #socialmedialaw   45
www.brittontuma.com   #socialmedialaw   46

Weitere ähnliche Inhalte

Was ist angesagt?

Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
RaquelPG96
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
smartins7
 
Censorship
CensorshipCensorship
Censorship
HHSome
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
HannahMorrell
 
Social-media-powerpoint-presentation-ORG.pptx
Social-media-powerpoint-presentation-ORG.pptxSocial-media-powerpoint-presentation-ORG.pptx
Social-media-powerpoint-presentation-ORG.pptx
HonGudBoi
 

Was ist angesagt? (20)

Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Exposicion redes sociales
Exposicion redes socialesExposicion redes sociales
Exposicion redes sociales
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Censorship
CensorshipCensorship
Censorship
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Censorship
CensorshipCensorship
Censorship
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Social-media-powerpoint-presentation-ORG.pptx
Social-media-powerpoint-presentation-ORG.pptxSocial-media-powerpoint-presentation-ORG.pptx
Social-media-powerpoint-presentation-ORG.pptx
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 

Andere mochten auch

Social Media for Law Firms
Social Media for Law FirmsSocial Media for Law Firms
Social Media for Law Firms
6S Marketing
 
role of media in society
role of media in societyrole of media in society
role of media in society
Anamika Pandey
 

Andere mochten auch (18)

Social Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal IndustrySocial Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal Industry
 
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
 
Professionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth CurveProfessionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth Curve
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should Know
 
The Roles of Social Media Channels
The Roles of Social Media ChannelsThe Roles of Social Media Channels
The Roles of Social Media Channels
 
Healthcare, Social Media and Risk Management
Healthcare, Social Media and Risk ManagementHealthcare, Social Media and Risk Management
Healthcare, Social Media and Risk Management
 
Role of media in promoting tourism
Role of media in promoting tourismRole of media in promoting tourism
Role of media in promoting tourism
 
Social Media for Law Firms
Social Media for Law FirmsSocial Media for Law Firms
Social Media for Law Firms
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
01 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 101 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 1
 
Role of media in social awareness
Role of media in social awarenessRole of media in social awareness
Role of media in social awareness
 
role of media in society
role of media in societyrole of media in society
role of media in society
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
 
Future Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social MediaFuture Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social Media
 
Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
 

Ähnlich wie Social Media Law: The Legal Do's and Don'ts of Social Media

Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
Melfi Associates
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
shibrah76
 

Ähnlich wie Social Media Law: The Legal Do's and Don'ts of Social Media (20)

Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
Legal Risks of Social Media
Legal Risks of Social MediaLegal Risks of Social Media
Legal Risks of Social Media
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 

Mehr von Shawn Tuma

Mehr von Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Social Media Law: The Legal Do's and Don'ts of Social Media

  • 1. SOCIAL MEDIA LAW The Legal Do’s and Don’ts of Social Media Presented for TrustPoint Management Group August 10, 2012
  • 2. Tweet it up: #socialmedialaw www.brittontuma.com #socialmedialaw 2
  • 3. Notes 1. Add Pictures 2. Streamline sections – 45 minutes 3. Insert Copyright www.brittontuma.com #socialmedialaw 3
  • 4. 4
  • 5. WHAT IS SOCIAL MEDIA LAW? #socialmedialaw 5
  • 6. Social Media Law: The law that applies to and governs the use of social media. (was that all you really wanted to know?) www.brittontuma.com #socialmedialaw 6
  • 7. Social Media Law:  inherent risks  natural tension between legal and marketing  BUT!!!  I am “sold out” on social media and an avid user … and I don’t want to get sued either … www.brittontuma.com #socialmedialaw 7
  • 8. My Goal:  find an acceptable balance  educate you on risks of using social media, along with other digital business risks  help show you some ways to minimize those risks  Remember: social media is a tool – what you say and do is much like “real life”  “Real life” rules still apply – use your common sense! www.brittontuma.com #socialmedialaw 8
  • 9.  what is social media law  traditional areas of law incorporated  practical examples of how they arise  how to minimize the risk  can’t eliminate, only minimize  social media policies  workplace training and guidance  cyber-insurance  other digital business risks  data breach & hacking  computer fraud / Computer Fraud and Abuse Act  Q&A www.brittontuma.com #socialmedialaw 9
  • 10. 2 General Types of Law  Codes: legislatures create specific laws to address specific problems  Common Law: judges look to general principles of law and, by using reason, apply those principles to resolve previously unforeseen problems www.brittontuma.com #socialmedialaw 10
  • 11. Legislatures want to keep up  impossible  speed technology is evolving  speed culture and business environment changing  legislature too slow example: last spring the big ruckus was prospective employers asking for social media logins – the massive public outcry made it such that nobody in their right mind would do that now this past week, Illinois became one of 2 states to enact a law prohibiting this; eff. date: 1/1/13 www.brittontuma.com #socialmedialaw 11
  • 12. www.brittontuma.com #socialmedialaw 12
  • 13. Look to Common Law  contract law  intellectual property law  torts – defamation  regulatory law  employment law  evidence law www.brittontuma.com #socialmedialaw 13
  • 14. You can’t protect against what you don’t know, so … www.brittontuma.com #socialmedialaw 14
  • 15. Who uses social media for marketing?  do you want to give your marketing efforts to your competitor?  who really owns your account  followers / connections?  “an ounce of prevention is worth a pound of cure”: PhoneDog v. Kravitz (7/15/11)  each service or site has a contract  contract law www.brittontuma.com #socialmedialaw 15
  • 16. Who has trade secrets, confidential and proprietary information?  do you want to tell your competitors?  customer / vendor lists  who are you talking to or following?  secret business alliances and strategies  secret business initiatives and plans  business situational awareness  intellectual property law: trade secrets www.brittontuma.com #socialmedialaw 16
  • 17. Who wants to get sued?  infringement of trademark  infringement of copyright  DMCA Takedown Request  right to publicity  name, voice, signature, photo, likeness (statutory after death)  common law while living if for value  must have a license or use creative commons  intellectual property law www.brittontuma.com #socialmedialaw 17
  • 18. Who wants to get sued some more?  what you (and your employees) say can hurt you!  business disparagement  tortious interference  defamation (libel & slander)  false advertising & false warranties  fraud & negligent misrepresentation  harassment and cyber-bullying  “puffery” of facts www.brittontuma.com #socialmedialaw 18
  • 19. Who wants to get investigated by the Feds?  FTC – Investigated Hyundai for not disclosing incentives given to bloggers for endorsements.  HHS & OCR – could have investigated hospital employee who posted patient pictures and “PHI” on Facebook (“it’s just Facebook!”)  SEC – false statements made in raising funds (SEC v. Imperia Invest. IBC) or wrongful disclosures of information  regulatory law www.brittontuma.com #socialmedialaw 19
  • 20. What are some real trouble spots?  Giveaways and contests can be trouble for many reasons – do not do them on social media without having it thoroughly vetted  many sites’ TOS prohibit  jurisdiction gambling and contest rules  Employment issues are one of the main areas in which legal and general business problems arise  Discussed in next section www.brittontuma.com #socialmedialaw 20
  • 21. Can you guess what will be used against you if any of these problems arise?  social media is evidence – very powerful evidence!  electronically stored information (“ESI”) is quickly becoming the most useful form of evidence available  evidence from social media is now obtained and used in virtually every kind of lawsuit and investigation  we now have complete records of 2-way communication stream – like all calls recorded! www.brittontuma.com #socialmedialaw 21
  • 22. MINIMIZING THE RISKS OF SOCIAL MEDIA IN BUSINESS #socialmedialaw 22
  • 23. Social media policies are a “must have”  ounce of prevention: less than 1 day of litigation  if have, must enforce  trying to predict issues – but evolving – can’t get all  contractually resolve issues such as ownership and authority  great opportunity to set rules and document expectations  greater opportunity to explain and ensure understanding of expectations  put on notice of monitoring – and actually monitor!  should address employment issues www.brittontuma.com #socialmedialaw 23
  • 24. Employment Issues  using social media in hiring  best to have set criteria with neutral third party investigate for criteria  not use to discriminate  e.g., snooping to find race, gender, age, disability, pregnancy  e.g., search for candidates on Twitter where disproportionate number of people <40 yrs. on Twitter, may violate the Age Discrimination in Employment Act  requesting social media login information www.brittontuma.com #socialmedialaw 24
  • 25. Employment Issues  using social media for the company  scope of work for duties and times  e.g., overtime for weekend “Facebooking”  personal or company owned accounts / followers  familiarity and compliance with site Agreement / TOS  what is authorized / prohibited  responsibility for statements / disclosures  monitored  saying “use good judgment” is not enough! www.brittontuma.com #socialmedialaw 25
  • 26. Employment Issues  using personal social media during work  can be prohibited  may prohibit using or disclosing company IP for personal SM  may prohibit using company info for setting up personal SM accounts www.brittontuma.com #socialmedialaw 26
  • 27. You need social media policies but the National Labor Relations Board is making it difficult  NLRB jurisdiction = impacts interstate commerce  National Labor Relations Act (NLRA) sec. 7 gives employees right to engage in “concerted activities for the purpose of … mutual aid and protection”  NLRB finds illegal any policy provision that (a) restricts or (b) an employee would reasonably construe to chill concerted activities  On 5/30/12 NLRB General Counsel issued its 3rd Report on Social Media Policies in 1 year period (8/11 & 1/12) www.brittontuma.com #socialmedialaw 27
  • 28. Can you guess who the NLRB is pulling for?  making it very difficult for businesses to protect themselves  social media policies must now be carefully tailored to  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  Examples of provisions found illegal by NLRB www.brittontuma.com #socialmedialaw 28
  • 29. www.brittontuma.com #socialmedialaw 29
  • 30. www.brittontuma.com #socialmedialaw 30
  • 31. www.brittontuma.com #socialmedialaw 31
  • 32. What is the NLRB really looking for?  clarity and precision  examples of do’s and don’ts that give context and real-life meaning to the rules www.brittontuma.com #socialmedialaw 32
  • 33. MINIMIZING OTHER DIGITAL BUSINESS RISKS #socialmedialaw 33
  • 34. Cyber-Insurance  If you are doing anything in cyberspace, you need it. Period.  Most traditional insurance does not cover cyber- events, even if you think it does (really!)  Cyber-Insurance is relatively inexpensive  Most policies come include a cyber-risk audit before the policies are underwritten  Policies can cover social media risk, computer fraud risk, and data breach / hacking risk www.brittontuma.com #socialmedialaw 34
  • 35. Customer Information – do you retain it on your system?  Data Breach  Effective 9/1/12, if you conduct business in Texas and your system is breached and your customer’s unencrypted “sensitive personal information” is, or is reasonably believed to have been compromised, must notify all Texas residents of breach.  The notice must be given “as quickly as possible” and failure or delay in doing so results in a fine of $100.00 per individual per day (not to exceed $250,000)  Notice may be made through written or electronic means though it can be given by major media outlets if the cost of providing notice exceeds $250,000 or the number of persons exceeds 500,000 www.brittontuma.com #socialmedialaw 35
  • 36. www.brittontuma.com #socialmedialaw 36
  • 37. www.brittontuma.com #socialmedialaw 37
  • 38. Why is the Computer Fraud and Abuse Act important?  Primary Law for Misuse of Computers  Computers … www.brittontuma.com #socialmedialaw 38
  • 39. “Everything has a computer in it nowadays.” -Steve Jobs www.brittontuma.com #socialmedialaw 39
  • 40. The CFAA says has a processor or stores data “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …” “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;” www.brittontuma.com #socialmedialaw 40
  • 41. What about www.brittontuma.com #socialmedialaw 41
  • 42. The CFAA applies only to “protected” computers This may limit the problem of applying it to alarm clocks, toasters, and coffee makers Protected = connected to the Internet Any situations where these devices are connected? www.brittontuma.com #socialmedialaw 42
  • 43. • TI-99 • Leap Frog Leapster • iPhone 4 • 3.3 MHz Processor • 96 MHz Processor • 800 MHz Processer • 16 KB of RAM • 128 MB of RAM • 512 MB of RAM www.brittontuma.com #socialmedialaw 43
  • 44. The CFAA prohibits wrongfully accessing a computer where the access  Obtains information  Commits a fraud  Obtains something of value  Transmits damaging information  Causes damage  Traffics in passwords  Commits extortion www.brittontuma.com #socialmedialaw 44
  • 45.  social media is wonderful!  must find proper balance  need a social media policy  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  need to enforce social media policy  need to spend time with employees to help them understand and possibly collaborate on the rules  need to look at cyber-insurance! www.brittontuma.com #socialmedialaw 45
  • 46. www.brittontuma.com #socialmedialaw 46