SlideShare ist ein Scribd-Unternehmen logo
1 von 16
IP ISSUES IN SOCIAL
       MEDIA


                     Divya Raman
            Corporate Department
            Altacit Global
  Email: info@altacit.com Website: www.altacit.com
Social Media
• Use of web-based and mobile
  technologies to turn communication
  into an interactive dialogue.
• Media for social interaction, as a
  superset          beyond       social
  communication.
• Eg:
  Facebook, Twitter, LinkedIn, Youtube
  etc.
Impact of social media
•Anti-government protesters in Tunisia
and Egypt used Twitter, Facebook and
other platforms to run rings around
attempts at censorship and organize
demonstrations that ousted presidents
Zine El Abidine Ben Ali and Hosni
Mubarak.
Impact of social media (contd…)

• US has also seen seen some modest
  signs of social media-organized
  protest, with hundreds of protesters
  occupying Wall Street in anger at
  perceived excesses by its banks.
Intellectual Property

•   Patent.
•   Design.
•   Copyright.
•   Geographical Indications.
•   Trademark.
IP Issues in Social Media
Social networking sites present several
risks, including trademark infringement
and copyright violation issues. For
example, a company's valuable trademarks
could appear without authorization on a
user's profile page or as part of a user
name ("name squatting") on a social
networking site.
Copyright
•Some social media websites claim copyright
over all items posted on its website.
•While others recognize that the copyright
remains with the owner.
•File sharing is one of the aspect in
infringement of copyright through social
website. Eg: sharing video clips of
movies, music, books being shared. All this
has posed copyright infringement through
social media.
Trademark
•Trademark can potentially be used to
protect competitors from selling goods or
services with confusingly similar marks.
•Scrabulous: Developed by two commerce
graduates in India – game application in
facebook. Features of this game is similar to
scrabble owned by Hasbro in Canada – only
difference is scrabulous is in electronic
format. Founders of scrabulous sued and
they withdrew the game from facebook.
Trade Secret
Social media can put at risk a company’s trade
secrets. Since the sine qua non of a trade secret is
that it is kept secret, the speed and ease in which
information can be rapidly (and permanently)
distributed with a click of a button in social media
and internet poses a clear risk for any company
seeking to maintain a trade secret. A simple posting
of a company’s secret information can destroy the
secret and leave that information to be available to
anyone.
Customer List - Trade Secret
Consider, for a second, a company that considers
its customer list to be a trade secret and seeks to
protect such information. A salesperson who
identifies those customers as “friends” on
Facebook, or “connections” on LinkedIn, or some
other similar status on another social media
website, could destroy the secret nature of such a
list. It also can lead to that salesperson, in
essence, appropriating that information should
he or she leave to go to work for a competitor.
Case Laws
One recently reported high-profile case involved Tony
La Russa, manager of the St. Louis Cardinals baseball
team, whose identity was hijacked on Twitter by an
imposter. The suit filed in the Superior Court of
California in San Francisco, which has since been
dismissed, claimed that someone created an account
under La Russa's name and posted tweets, giving the
false impression that the comments came from La
Russa. The suit also said that the comments were
"derogatory and demeaning" and thus damaged La
Russa's trademark rights.
There also have been reports of corporate
sabotage. For example, it was reported that
a public relations firm allegedly set up a
Twitter account in the name of a rival firm.
The firm then allegedly disseminated
malicious tweets for two months before the
competing firm realized that its identity had
been hijacked.
Protective Measures
•Companies can initiate a self-monitoring
program which include a weekly or monthly
review of a number of available social media
web sites.
•Companies may decide to hire an outside
service provider to monitor for negative
comments and infringements in the social
media websites.
Conclusion

Social networking sites can present difficult
enforcement and liability issues, but with
appropriate preventative measures, consistent
monitoring       and     carefully    designed
enforcement priorities and actions, companies
can "confirm" social networking sites and their
users as friends with few reservations.
To     minimize    the     risks  of   trademark
hijacking, trademark infringement and damage to
brand reputation that may occur on social media
networking sites, it is advisable to take
precautionary and proactive steps. Those steps
include reserving company names and key
permutations of company names with social
networking sites, developing a presence in social
networking communities, assigning company
employees who are responsible for overseeing the
monitoring process, understanding terms of use for
each of the major social networks and developing
consistent enforcement procedures.
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Social Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking SitesVarun Bhandari
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issuesAman Khanna
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Abdullah Mahboob
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?Phil Cryer
 
374 Arhan
374 Arhan374 Arhan
374 Arhanaci2008
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 

Was ist angesagt? (20)

Social Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking Sites
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
374 Arhan
374 Arhan374 Arhan
374 Arhan
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Facebook
FacebookFacebook
Facebook
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 

Andere mochten auch

Andere mochten auch (6)

Lisbon agreement
Lisbon agreementLisbon agreement
Lisbon agreement
 
Trademarking emotions
Trademarking emotionsTrademarking emotions
Trademarking emotions
 
Geographical indications: A marketing tool for unique goods from specific env...
Geographical indications: A marketing tool for unique goods from specific env...Geographical indications: A marketing tool for unique goods from specific env...
Geographical indications: A marketing tool for unique goods from specific env...
 
Geographical indications ppt
Geographical indications pptGeographical indications ppt
Geographical indications ppt
 
EUT440 LAW 4 (Intelectual Property)
EUT440 LAW 4 (Intelectual Property)EUT440 LAW 4 (Intelectual Property)
EUT440 LAW 4 (Intelectual Property)
 
Evolution Of IPR
Evolution Of IPREvolution Of IPR
Evolution Of IPR
 

Ähnlich wie Ip issues in social media

Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10lindseymgift
 
Twitter Ethics Team Competition
Twitter Ethics Team CompetitionTwitter Ethics Team Competition
Twitter Ethics Team Competitionknarkiew
 
Brand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking SitesBrand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking SitesKlemchuk LLP
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Mediajrfields
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introductionsaltmedia
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)Pod Legal
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 
Social Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingSocial Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingEarthbound Media Group
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks Constantine Karbaliotis
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Kirsten Thompson
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controlsMarc Vael
 

Ähnlich wie Ip issues in social media (20)

Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
 
Twitter Ethics Team Competition
Twitter Ethics Team CompetitionTwitter Ethics Team Competition
Twitter Ethics Team Competition
 
Brand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking SitesBrand Enforcement on Social Networking Sites
Brand Enforcement on Social Networking Sites
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Brandjacking
BrandjackingBrandjacking
Brandjacking
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introduction
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
Drawbacks of Social Networks
Drawbacks of Social NetworksDrawbacks of Social Networks
Drawbacks of Social Networks
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Social Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingSocial Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & Adapting
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 

Mehr von Altacit Global

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Altacit Global
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from homeAltacit Global
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Altacit Global
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection actAltacit Global
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn childAltacit Global
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in IndiaAltacit Global
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-IndiaAltacit Global
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Altacit Global
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemAltacit Global
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companiesAltacit Global
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyrightAltacit Global
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in IndiaAltacit Global
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in IndiaAltacit Global
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development BoardAltacit Global
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Altacit Global
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Altacit Global
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in IndiaAltacit Global
 

Mehr von Altacit Global (20)

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from home
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection act
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn child
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in India
 
Alimony laws in India
Alimony laws in IndiaAlimony laws in India
Alimony laws in India
 
Patent licensing
Patent licensingPatent licensing
Patent licensing
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-India
 
I r s form w-9
I r s form w-9I r s form w-9
I r s form w-9
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft system
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companies
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyright
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in India
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in India
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development Board
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in India
 

Kürzlich hochgeladen

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Ip issues in social media

  • 1. IP ISSUES IN SOCIAL MEDIA Divya Raman Corporate Department Altacit Global Email: info@altacit.com Website: www.altacit.com
  • 2. Social Media • Use of web-based and mobile technologies to turn communication into an interactive dialogue. • Media for social interaction, as a superset beyond social communication. • Eg: Facebook, Twitter, LinkedIn, Youtube etc.
  • 3. Impact of social media •Anti-government protesters in Tunisia and Egypt used Twitter, Facebook and other platforms to run rings around attempts at censorship and organize demonstrations that ousted presidents Zine El Abidine Ben Ali and Hosni Mubarak.
  • 4. Impact of social media (contd…) • US has also seen seen some modest signs of social media-organized protest, with hundreds of protesters occupying Wall Street in anger at perceived excesses by its banks.
  • 5. Intellectual Property • Patent. • Design. • Copyright. • Geographical Indications. • Trademark.
  • 6. IP Issues in Social Media Social networking sites present several risks, including trademark infringement and copyright violation issues. For example, a company's valuable trademarks could appear without authorization on a user's profile page or as part of a user name ("name squatting") on a social networking site.
  • 7. Copyright •Some social media websites claim copyright over all items posted on its website. •While others recognize that the copyright remains with the owner. •File sharing is one of the aspect in infringement of copyright through social website. Eg: sharing video clips of movies, music, books being shared. All this has posed copyright infringement through social media.
  • 8. Trademark •Trademark can potentially be used to protect competitors from selling goods or services with confusingly similar marks. •Scrabulous: Developed by two commerce graduates in India – game application in facebook. Features of this game is similar to scrabble owned by Hasbro in Canada – only difference is scrabulous is in electronic format. Founders of scrabulous sued and they withdrew the game from facebook.
  • 9. Trade Secret Social media can put at risk a company’s trade secrets. Since the sine qua non of a trade secret is that it is kept secret, the speed and ease in which information can be rapidly (and permanently) distributed with a click of a button in social media and internet poses a clear risk for any company seeking to maintain a trade secret. A simple posting of a company’s secret information can destroy the secret and leave that information to be available to anyone.
  • 10. Customer List - Trade Secret Consider, for a second, a company that considers its customer list to be a trade secret and seeks to protect such information. A salesperson who identifies those customers as “friends” on Facebook, or “connections” on LinkedIn, or some other similar status on another social media website, could destroy the secret nature of such a list. It also can lead to that salesperson, in essence, appropriating that information should he or she leave to go to work for a competitor.
  • 11. Case Laws One recently reported high-profile case involved Tony La Russa, manager of the St. Louis Cardinals baseball team, whose identity was hijacked on Twitter by an imposter. The suit filed in the Superior Court of California in San Francisco, which has since been dismissed, claimed that someone created an account under La Russa's name and posted tweets, giving the false impression that the comments came from La Russa. The suit also said that the comments were "derogatory and demeaning" and thus damaged La Russa's trademark rights.
  • 12. There also have been reports of corporate sabotage. For example, it was reported that a public relations firm allegedly set up a Twitter account in the name of a rival firm. The firm then allegedly disseminated malicious tweets for two months before the competing firm realized that its identity had been hijacked.
  • 13. Protective Measures •Companies can initiate a self-monitoring program which include a weekly or monthly review of a number of available social media web sites. •Companies may decide to hire an outside service provider to monitor for negative comments and infringements in the social media websites.
  • 14. Conclusion Social networking sites can present difficult enforcement and liability issues, but with appropriate preventative measures, consistent monitoring and carefully designed enforcement priorities and actions, companies can "confirm" social networking sites and their users as friends with few reservations.
  • 15. To minimize the risks of trademark hijacking, trademark infringement and damage to brand reputation that may occur on social media networking sites, it is advisable to take precautionary and proactive steps. Those steps include reserving company names and key permutations of company names with social networking sites, developing a presence in social networking communities, assigning company employees who are responsible for overseeing the monitoring process, understanding terms of use for each of the major social networks and developing consistent enforcement procedures.