SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Tweetspam, Spiders &  Other Privacy Issues In  Social Media Marketing  Susan L. Lyon Of Counsel Summer 2009
[object Object],[object Object]
Building Privacy, Building Community: 1. Think Reputation
 
 
 
Building Privacy, Building Community: 2. Create a Safe, Secure World
Member Security & Safety ,[object Object],[object Object],[object Object],[object Object]
Spiders & Harvesters ,[object Object],[object Object],[object Object]
Other Terms ,[object Object],[object Object],[object Object],[object Object]
Building Privacy, Building Community: 3. Stick to the Principles
Privacy Principles ,[object Object],[object Object],[object Object],[object Object]
Notice ,[object Object],[object Object],[object Object]
CHOICE ,[object Object],[object Object],[object Object]
COPPA –  Children's Online Privacy Protection Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forward to Friend ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contact Invites ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reporting & Info Requests ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Terms of Use ,[object Object],[object Object],[object Object]
No Masks ,[object Object],[object Object]
Publicly Available  ≠ No Privacy Use of User Generated Content
Are Wall Posts & Tweets Spam? ,[object Object],[object Object]
Marketing in Maine ,[object Object],[object Object],[object Object],[object Object]
Apps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Destaque

Privacy & Security of Consumer and Employee Information - Conference Materials
Privacy & Security of Consumer and Employee Information - Conference MaterialsPrivacy & Security of Consumer and Employee Information - Conference Materials
Privacy & Security of Consumer and Employee Information - Conference MaterialsRachel Hamilton
 
Social networking sites selling information to third parties
Social networking sites selling information to third partiesSocial networking sites selling information to third parties
Social networking sites selling information to third partiesjulia594
 
Facebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and DisadvantagesFacebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and DisadvantagesAseem R
 
ebay marketing
ebay marketingebay marketing
ebay marketingAnil Kumar
 
Powerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.comPowerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.commyclass08
 
Social media marketing ppt
Social media marketing pptSocial media marketing ppt
Social media marketing pptSean Joan
 

Destaque (6)

Privacy & Security of Consumer and Employee Information - Conference Materials
Privacy & Security of Consumer and Employee Information - Conference MaterialsPrivacy & Security of Consumer and Employee Information - Conference Materials
Privacy & Security of Consumer and Employee Information - Conference Materials
 
Social networking sites selling information to third parties
Social networking sites selling information to third partiesSocial networking sites selling information to third parties
Social networking sites selling information to third parties
 
Facebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and DisadvantagesFacebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and Disadvantages
 
ebay marketing
ebay marketingebay marketing
ebay marketing
 
Powerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.comPowerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.com
 
Social media marketing ppt
Social media marketing pptSocial media marketing ppt
Social media marketing ppt
 

Semelhante a Privacy & Social Media Marketing Bright Talk081009

The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Mediajlipsey
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
Data Protection Guidelines
Data Protection GuidelinesData Protection Guidelines
Data Protection GuidelinesDavid Scanlon
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social NetworkingHeather Grimes
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityJamie Hutt
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineemarlh
 
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...eldercomlaw
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate ItJanine Anthony Bowen, Esq.
 
Internet Liabilities Presentation
Internet Liabilities PresentationInternet Liabilities Presentation
Internet Liabilities PresentationShannon Evans
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security IssuesMangesh Gunjal
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationKerry Rego
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draftravichar
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesFaraedoon Farage
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityJamie Hutt
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustVivastream
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 

Semelhante a Privacy & Social Media Marketing Bright Talk081009 (20)

Protect Your Identity During Social Networking
Protect Your Identity During Social NetworkingProtect Your Identity During Social Networking
Protect Your Identity During Social Networking
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Media
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
Data Protection Guidelines
Data Protection GuidelinesData Protection Guidelines
Data Protection Guidelines
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social Networking
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
 
Internet Liabilities Presentation
Internet Liabilities PresentationInternet Liabilities Presentation
Internet Liabilities Presentation
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draft
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposes
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 

Privacy & Social Media Marketing Bright Talk081009