SlideShare uma empresa Scribd logo
1 de 44
Social Media: Now You “Like” It, Now You
Don’t
Social Media as a Claims Tool in Claims Handling & Litigation | Pitfalls and
Advantages for Companies | Securing Access | Discovery | Ethical Considerations
Emerging& Complex
InsuranceClaims Forum
February 25-26, 2016
Speakers
Mollie E. Werwas
Kopon Airdo, LLC
233 S. Wacker Dr., Suite 4450
Chicago, Illinois 60606
P: 312.506.4450
www.koponairdo.com
Jeanne M. Sheahan
Senior Corporate Counsel, Privacy & Regulatory
Groupon, Inc.
jsheahan@groupon.com
 Any “form[] of electronic communication . . .
through which users create online communities
to share information, ideas, personal messages,
and other content” -- Merriam-Webster
 Users can interact with the website to create
and share information and ideas with other
visitors
Social Media – What is It?
 Websites for social networking
 Wikis (websites that allow collaborative editing)
 Open content encyclopedia
 Blogging
 Microblogging
 Videos
Social Media – Examples
Extensive social media beyond
Facebook…
Social Media – Companies
Delicious – social bookmarking service
Digg – social news and curation
Reddit – online bulletin board system
Last.fm – music discovery & social networking site
Flickr – social image and video hosting
Foursquare – social media site focusing on geolocation
Tumblr – microblogging and social platform
Social Media – Companies
…and they are constantly
evolving and growing in
numbers!
Social Media – Companies
• Umbrella term for the second wave
of the world wide web
• Websites that focus on user-
generated content, collaboration,
and social networking
• Shift to cloud computing
Web 2.0 – What Is It?
 Social media websites
 Blogs
 Wikis
 Folksonomies (collaborative/social tagging)
 Video sharing
 Mashups (content combined from multiple sources)
Web 2.0 – Examples
Just the beginning
of the explosion of
data and big data…
Social Media & Web 2.0
Network sensors embedded in
physical objects, which enable the
objects to collect and exchange
data
Devices, vehicles, buildings that
are embedded with electronics
Internet of Things – What is It?
 Cisco predicts that by 2020 there will be around 50 billion internet-
connected objects
 The Digital Universe (“DU”) – all digital data that is created, replicated,
and consumed in a single year – by 2013 was already estimated to be
4.4 ZB
 A zetabyte is 1 trillion gigabytes
 One stack of iPads reaching two-thirds the way to the moon
Internet of Things – What is It?
 Smart Homes – cell phones,
coffee makers, washing
machines, security systems
 Smart Transportation – bikes,
cars, public transport, airplane
jets
 Smart Cities – traffic
congestion, water leakages,
smart parking
Internet of Things - Examples
Data Points / Information –
What Can Be Learned
 Name
 Race
 Gender
 Age
 Income Bracket
 Likeness
 Birthday
 Address
Data Points / Information –
What Can Be Learned
 Geographic
Coordinates
 Destinations
 Speed of Travel
 Frequency of Visits
 Political Affiliation
 Hobbies
 Organizational
Membership
Data Points / Information –
What Can Be Learned
 Health Status
 Diet
 Relationship Status
 Sexual orientation
 Personal Network
 Professional
Network
 Employer
 Job History
 Education History
Data Points / Information –
What Can Be Learned
…and these categories are constantly
evolving & expanding
 Popularity of Social Media Platforms Influenced by Age
 Millennial teens are spending on average 11.7 hours a
day using connected devices
 Bellwether of future landscape in social media sphere
Social Media / Demographics
Social Media / Demographics
 Vine
 Social media app that lets users post
looping six-second video clips
 Founded in June 2012
 Twitter-owned company
 As of December 2015, Vine has 200
million active users
Social Media / Demographics - Examples
 Kik
 Instant messenger
 Allows users to find and share content
 Known for ability to preserve user anonymity
 Founded in 2009
 Has approximately 240 million users as of
December 2015
 Used by approximately 40% of US teenagers
Social Media / Demographics - Examples
 Yik Yak
 Allows people to pseudo-anonymously create
discussion threats within a 5-mile radius
(which are termed “Yaks” by the application)
 Launched in 2013
 All users have the ability to contribute to the
stream by writing, responding, and “voting
up” or “voting down” (liking or disliking) Yaks
 Millions of users (exact number has not been
disclosed)
Social Media / Demographics - Examples
European Law: Important Distinctions
 In general, regulations in the EU are much more strict & robust in the area of
privacy and security
 Privacy in the EU is protected as a “fundamental right” under the EU’s Charter
of Fundamental Rights
 EU has comprehensive data protection regulations, unlike the US, which is
governed by a patchwork of federal and state regulations that apply a sectoral
approach (e.g., finance, health care)
 In the EU, personal data only can be collected under strict conditions and for a
legitimate purpose
European Law: Important Distinctions
 EU privacy landscape if rapidly changing
 Safe Harbor  Privacy Shield
 Data Protection Directive (95/46/EC)  General Data Protection
Regulation (GDPR)
• Expected to come into force in 2018
 Right to Erasure (“Right to be Forgotten”)
 Data subjects will have the right to request the deletion of his/her data
from data controller in specified circumstances
Social Media: The New
Surveillance
Key Take-Aways for Claim Professionals
Social Media Investigations are Essential to
Effective Claim Handling
Public Leads to Private
Claimants are Strangers No More
Data is the new Eye Witness
Social Media in Litigation
• No Fishing Expeditions
• Targeted Requests Based on
Known Information
• Examine Public Info First
Guidance from Recent Court Decision
Personal Injury Decision
Zimmerman v. Weis Markets, Inc., 2011 WL 2065410 (Pa. Com. Pl. May 19, 2011).
Plaintiff injured his leg in a forklift accident
Sought damages for scarring and
embarrassment, a serious impairment of
health, and a diminished ability to enjoy life
Pictures on Facebook revealed plaintiff
riding a motorcycle and wearing shorts
where scar is clearly visible
Court allowed the discovery of the
materials
Personal Injury Decision
Tompkins v. Detroit Metro Airport., 278 F.R.D. 387 (E.D. Mich. 2012).
Slip and fall case
Defendant moved to compel entire
Facebook account
Motion Denied because public
Facebook information not inconsistent
with claimed injury
No Fishing Expeditions
Need an initial showing of relevant
information
Personal Injury Decision
Thompson v. Autoliv ASP, Inc., 2012 WL 23442928 (D. Nev.)
Motor Vehicle Case
Defendant moved to compel
Plaintiff’s social media accounts
Prior to filing Motion,
Defendant obtained public
information that Plaintiff’s
profile showed post-accident
lifestyle
Motion Granted
Employment Claim
Ex-Mai-Trang Thi Nguyen v. Starbucks Coffee Corp., 2009 U.S. Dist. LEXIS 113461 (N.D. Cal. 2009)
Employee fired for inappropriate behavior and
threats to other employees.
Sued for sexual harassment, retaliation,
religious discrimination.
“Starbucks is in deep shit with GOD!!! …I will
now have 2 to turn 2 my revenge side (GOD’S
REVENGE SIDE) 2 teach da world a lesson about
stepping on GOD. I thank GOD 4 pot 2 calm down
my frustrations and worries or else I will go
beserk and shoot everyone….”
Summary judgment for the defendant.
By a Plaintiff: The FitBit
 Recent Canadian Case
 Plaintiff – Personal Trainer
 Presented Pre-Accident & Post-
Accident FitBit
 Data to support reduced
activity after injury
Social Media You Can Use!
Capture the Information
Don’t Lose the Results of Your Investigation!
• Check all applicable social media for
public pages
• Start with web engine searches
• Look for information around date of loss
• Examine other linked or connected
accounts and personal connections
Effective Social Media Investigations
Preserve the Evidence
• Print/Save the Findings
• Do not assume it will be there later
• Save on paper and electronically
• Check early and often!
Formal Discovery Requests
• Specific Requests
• Targeted Based on Public Information
• Initial Requests / Follow-Up Inquiries
• Deposition Questions
Other Data Sources
• Web 2.0
• Fitness Trackers
• Health Apps, Diaries, Logs
• Linked to Social Media
• Texts, Photos, Apps, Etc.
Ethical Considerations
BEWARE OF “FRIENDING”
 Cannot “friend” someone under a
false pretext
 Do NOT try to obtain private social
media information by pretending to
be a disinterested party
 Use public information to establish a
basis for requesting private
information
Questions?

Mais conteúdo relacionado

Mais procurados

Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policybarbeejl
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0Amy Senger
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastLogikcull.com
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsResilient Systems
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policysuhlingse
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 

Mais procurados (20)

Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Hacking back in self defense
Hacking back in self defenseHacking back in self defense
Hacking back in self defense
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 

Destaque

segementacion de mercado
segementacion  de mercadosegementacion  de mercado
segementacion de mercadoJose Reyna
 
Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)Ulrich Krause
 

Destaque (6)

Why DIGGS
Why DIGGSWhy DIGGS
Why DIGGS
 
segementacion de mercado
segementacion  de mercadosegementacion  de mercado
segementacion de mercado
 
Allocation oct2013 defense allocation final
Allocation oct2013 defense allocation finalAllocation oct2013 defense allocation final
Allocation oct2013 defense allocation final
 
Model epsteins
Model epsteinsModel epsteins
Model epsteins
 
Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)Compact, Compress, De-Duplicate (DAOS)
Compact, Compress, De-Duplicate (DAOS)
 
GMO | HB EMERGING COMPLEX CLAIMS
GMO | HB EMERGING COMPLEX CLAIMSGMO | HB EMERGING COMPLEX CLAIMS
GMO | HB EMERGING COMPLEX CLAIMS
 

Semelhante a SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS

RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social MediaSocial Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social MediaNicole Hyland
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 

Semelhante a SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS (20)

RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social MediaSocial Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
Social Lawyers by Nicole Hyland
Social Lawyers by Nicole HylandSocial Lawyers by Nicole Hyland
Social Lawyers by Nicole Hyland
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 

Mais de HB Litigation Conferences

LEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMS
LEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMSLEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMS
LEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
PRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMS
PRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMSPRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMS
PRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
State of Litigation: Data Breach & Coverage Litigation
State of Litigation: Data Breach & Coverage Litigation State of Litigation: Data Breach & Coverage Litigation
State of Litigation: Data Breach & Coverage Litigation HB Litigation Conferences
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyHB Litigation Conferences
 
Attorneys General Perspectives on Data Breaches
Attorneys General Perspectives on Data BreachesAttorneys General Perspectives on Data Breaches
Attorneys General Perspectives on Data BreachesHB Litigation Conferences
 
"Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc...
"Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc..."Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc...
"Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc...HB Litigation Conferences
 
Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...
Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...
Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...HB Litigation Conferences
 

Mais de HB Litigation Conferences (20)

LEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMS
LEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMSLEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMS
LEGALIZED MARIJUANA | HB EMERGING COMPLEX CLAIMS
 
PRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMS
PRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMSPRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMS
PRIMARY - EXCESS | THE BUSINESS OF LAYERS | HB EMERGING COMPLEX CLAIMS
 
ACAM webinar presentation final v4
ACAM webinar presentation final v4ACAM webinar presentation final v4
ACAM webinar presentation final v4
 
Vendor Contracts & Cyber Risks
Vendor Contracts & Cyber RisksVendor Contracts & Cyber Risks
Vendor Contracts & Cyber Risks
 
Technology to Mitigate Risk
Technology to Mitigate RiskTechnology to Mitigate Risk
Technology to Mitigate Risk
 
Small Entity Cyber Liability
Small Entity Cyber LiabilitySmall Entity Cyber Liability
Small Entity Cyber Liability
 
Payment Card Industry Adjudication Process
Payment Card Industry Adjudication ProcessPayment Card Industry Adjudication Process
Payment Card Industry Adjudication Process
 
London Cyber Risk Perspectives
London Cyber Risk PerspectivesLondon Cyber Risk Perspectives
London Cyber Risk Perspectives
 
State of Litigation: Data Breach & Coverage Litigation
State of Litigation: Data Breach & Coverage Litigation State of Litigation: Data Breach & Coverage Litigation
State of Litigation: Data Breach & Coverage Litigation
 
Dissecting a Data Breach
Dissecting a Data BreachDissecting a Data Breach
Dissecting a Data Breach
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
 
Data Breach Claims & Loss Update
Data Breach Claims & Loss UpdateData Breach Claims & Loss Update
Data Breach Claims & Loss Update
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
 
Attorneys General Perspectives on Data Breaches
Attorneys General Perspectives on Data BreachesAttorneys General Perspectives on Data Breaches
Attorneys General Perspectives on Data Breaches
 
Advanced Level Cyber Insurance Coverage
Advanced Level Cyber Insurance CoverageAdvanced Level Cyber Insurance Coverage
Advanced Level Cyber Insurance Coverage
 
"Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc...
"Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc..."Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc...
"Who's Ox is Being Gored? A Comparison of ConsensusDOCS and AIA Form Construc...
 
Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...
Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...
Additional Insured Issues in the Construction Industry" - Dnjcon14 session 2 ...
 
Reicon14 session 6 ppt final
Reicon14 session 6 ppt finalReicon14 session 6 ppt final
Reicon14 session 6 ppt final
 
Reicon14 session 4 ppt final
Reicon14 session 4 ppt finalReicon14 session 4 ppt final
Reicon14 session 4 ppt final
 
Reicon14 session 5 ppt final
Reicon14 session 5 ppt finalReicon14 session 5 ppt final
Reicon14 session 5 ppt final
 

Último

The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理e9733fc35af6
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 

Último (20)

The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 

SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS

  • 1. Social Media: Now You “Like” It, Now You Don’t Social Media as a Claims Tool in Claims Handling & Litigation | Pitfalls and Advantages for Companies | Securing Access | Discovery | Ethical Considerations
  • 3. Speakers Mollie E. Werwas Kopon Airdo, LLC 233 S. Wacker Dr., Suite 4450 Chicago, Illinois 60606 P: 312.506.4450 www.koponairdo.com Jeanne M. Sheahan Senior Corporate Counsel, Privacy & Regulatory Groupon, Inc. jsheahan@groupon.com
  • 4.  Any “form[] of electronic communication . . . through which users create online communities to share information, ideas, personal messages, and other content” -- Merriam-Webster  Users can interact with the website to create and share information and ideas with other visitors Social Media – What is It?
  • 5.  Websites for social networking  Wikis (websites that allow collaborative editing)  Open content encyclopedia  Blogging  Microblogging  Videos Social Media – Examples
  • 6. Extensive social media beyond Facebook… Social Media – Companies
  • 7. Delicious – social bookmarking service Digg – social news and curation Reddit – online bulletin board system Last.fm – music discovery & social networking site Flickr – social image and video hosting Foursquare – social media site focusing on geolocation Tumblr – microblogging and social platform Social Media – Companies
  • 8. …and they are constantly evolving and growing in numbers! Social Media – Companies
  • 9.
  • 10. • Umbrella term for the second wave of the world wide web • Websites that focus on user- generated content, collaboration, and social networking • Shift to cloud computing Web 2.0 – What Is It?
  • 11.  Social media websites  Blogs  Wikis  Folksonomies (collaborative/social tagging)  Video sharing  Mashups (content combined from multiple sources) Web 2.0 – Examples
  • 12. Just the beginning of the explosion of data and big data… Social Media & Web 2.0
  • 13. Network sensors embedded in physical objects, which enable the objects to collect and exchange data Devices, vehicles, buildings that are embedded with electronics Internet of Things – What is It?
  • 14.  Cisco predicts that by 2020 there will be around 50 billion internet- connected objects  The Digital Universe (“DU”) – all digital data that is created, replicated, and consumed in a single year – by 2013 was already estimated to be 4.4 ZB  A zetabyte is 1 trillion gigabytes  One stack of iPads reaching two-thirds the way to the moon Internet of Things – What is It?
  • 15.  Smart Homes – cell phones, coffee makers, washing machines, security systems  Smart Transportation – bikes, cars, public transport, airplane jets  Smart Cities – traffic congestion, water leakages, smart parking Internet of Things - Examples
  • 16. Data Points / Information – What Can Be Learned  Name  Race  Gender  Age  Income Bracket  Likeness  Birthday  Address
  • 17. Data Points / Information – What Can Be Learned  Geographic Coordinates  Destinations  Speed of Travel  Frequency of Visits  Political Affiliation  Hobbies  Organizational Membership
  • 18. Data Points / Information – What Can Be Learned  Health Status  Diet  Relationship Status  Sexual orientation  Personal Network  Professional Network  Employer  Job History  Education History
  • 19. Data Points / Information – What Can Be Learned …and these categories are constantly evolving & expanding
  • 20.  Popularity of Social Media Platforms Influenced by Age  Millennial teens are spending on average 11.7 hours a day using connected devices  Bellwether of future landscape in social media sphere Social Media / Demographics
  • 21. Social Media / Demographics
  • 22.  Vine  Social media app that lets users post looping six-second video clips  Founded in June 2012  Twitter-owned company  As of December 2015, Vine has 200 million active users Social Media / Demographics - Examples
  • 23.  Kik  Instant messenger  Allows users to find and share content  Known for ability to preserve user anonymity  Founded in 2009  Has approximately 240 million users as of December 2015  Used by approximately 40% of US teenagers Social Media / Demographics - Examples
  • 24.  Yik Yak  Allows people to pseudo-anonymously create discussion threats within a 5-mile radius (which are termed “Yaks” by the application)  Launched in 2013  All users have the ability to contribute to the stream by writing, responding, and “voting up” or “voting down” (liking or disliking) Yaks  Millions of users (exact number has not been disclosed) Social Media / Demographics - Examples
  • 25. European Law: Important Distinctions  In general, regulations in the EU are much more strict & robust in the area of privacy and security  Privacy in the EU is protected as a “fundamental right” under the EU’s Charter of Fundamental Rights  EU has comprehensive data protection regulations, unlike the US, which is governed by a patchwork of federal and state regulations that apply a sectoral approach (e.g., finance, health care)  In the EU, personal data only can be collected under strict conditions and for a legitimate purpose
  • 26. European Law: Important Distinctions  EU privacy landscape if rapidly changing  Safe Harbor  Privacy Shield  Data Protection Directive (95/46/EC)  General Data Protection Regulation (GDPR) • Expected to come into force in 2018  Right to Erasure (“Right to be Forgotten”)  Data subjects will have the right to request the deletion of his/her data from data controller in specified circumstances
  • 27. Social Media: The New Surveillance
  • 28. Key Take-Aways for Claim Professionals Social Media Investigations are Essential to Effective Claim Handling Public Leads to Private Claimants are Strangers No More Data is the new Eye Witness
  • 29. Social Media in Litigation
  • 30. • No Fishing Expeditions • Targeted Requests Based on Known Information • Examine Public Info First Guidance from Recent Court Decision
  • 31. Personal Injury Decision Zimmerman v. Weis Markets, Inc., 2011 WL 2065410 (Pa. Com. Pl. May 19, 2011). Plaintiff injured his leg in a forklift accident Sought damages for scarring and embarrassment, a serious impairment of health, and a diminished ability to enjoy life Pictures on Facebook revealed plaintiff riding a motorcycle and wearing shorts where scar is clearly visible Court allowed the discovery of the materials
  • 32. Personal Injury Decision Tompkins v. Detroit Metro Airport., 278 F.R.D. 387 (E.D. Mich. 2012). Slip and fall case Defendant moved to compel entire Facebook account Motion Denied because public Facebook information not inconsistent with claimed injury No Fishing Expeditions Need an initial showing of relevant information
  • 33. Personal Injury Decision Thompson v. Autoliv ASP, Inc., 2012 WL 23442928 (D. Nev.) Motor Vehicle Case Defendant moved to compel Plaintiff’s social media accounts Prior to filing Motion, Defendant obtained public information that Plaintiff’s profile showed post-accident lifestyle Motion Granted
  • 34. Employment Claim Ex-Mai-Trang Thi Nguyen v. Starbucks Coffee Corp., 2009 U.S. Dist. LEXIS 113461 (N.D. Cal. 2009) Employee fired for inappropriate behavior and threats to other employees. Sued for sexual harassment, retaliation, religious discrimination. “Starbucks is in deep shit with GOD!!! …I will now have 2 to turn 2 my revenge side (GOD’S REVENGE SIDE) 2 teach da world a lesson about stepping on GOD. I thank GOD 4 pot 2 calm down my frustrations and worries or else I will go beserk and shoot everyone….” Summary judgment for the defendant.
  • 35. By a Plaintiff: The FitBit  Recent Canadian Case  Plaintiff – Personal Trainer  Presented Pre-Accident & Post- Accident FitBit  Data to support reduced activity after injury
  • 36. Social Media You Can Use!
  • 37. Capture the Information Don’t Lose the Results of Your Investigation!
  • 38. • Check all applicable social media for public pages • Start with web engine searches • Look for information around date of loss • Examine other linked or connected accounts and personal connections Effective Social Media Investigations
  • 39. Preserve the Evidence • Print/Save the Findings • Do not assume it will be there later • Save on paper and electronically • Check early and often!
  • 40. Formal Discovery Requests • Specific Requests • Targeted Based on Public Information • Initial Requests / Follow-Up Inquiries • Deposition Questions
  • 41. Other Data Sources • Web 2.0 • Fitness Trackers • Health Apps, Diaries, Logs • Linked to Social Media • Texts, Photos, Apps, Etc.
  • 43. BEWARE OF “FRIENDING”  Cannot “friend” someone under a false pretext  Do NOT try to obtain private social media information by pretending to be a disinterested party  Use public information to establish a basis for requesting private information