SlideShare uma empresa Scribd logo
1 de 51
Avoiding Legal Landmines in
Social Media
Ellyn Angelotti
Faculty, Digital trends & social media
Poynter Institute
What’s Changing?
Disclaimer
• This is not specific legal advice, but legal
information.
Some Rules of Thumb
• When it comes to the law, “it depends”
– Gray areas are common
– Different facts change how the law is applied
• Common questions
– What is reasonable?
– What is foreseeable?
– What are my/my audiences expectations?
Just because you can,
should you?
• Legal vs. Ethical issues
– Gut check
– What are your values?
– Do you have a decision-making process?
• Would you/could you share your process?
The new legal issues?
• Posting offensive/inappropriate content
– Badmouthing others
• Copying what people find on websites
• Privacy expectations
– Social media files, emails, etc.
What every site should have
• Terms of Use
– Set boundaries for your users
• Privacy Policy
– Let your users know what information you
collect and how you use it
– Potential opt out options
What every web users should
know
• Duty to read
– Terms of Service/
Privacy policies
– User agreements
Danger Areas
• Defamation
– Key Point: Falsity of Fact
• Copyright
– Key Point: Market Value
• Privacy
– Key Point: Consent
Defamation: Guiding Values
• Seek truth and report it
• Minimize harm
What is Defamation?
• Injury to reputation caused by publishing
a false statement of fact AND
– A publisher was careless, reckless or had
knowledge of falsity
– The defamed person can be identified
• Public vs. Private person
– Injures a person or business/exposes
someone to hatred, ridicule or contempt
What is NOT Defamation?
• Who
– Libelproof Defendants
• Someone with an already tarnished reputation
– Deceased
– *More difficult* Public Figures
• Must prove actual malice
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Content: Fact vs. Opinion
• Is it true?
• Can you determine if it is true or false?
• Context
What is not defamation?
• Content
– Opinions
• The “true or false” test
– Hyperbole
– Parody
Is it Defamatory?
• My neighbor John Smith is a stinking lush.
• In my opinion the mayor is an alcoholic.
• My attorney Dan Jackson is a crook.
• All Florida attorneys are crooks.
• Calling a TV show participant a “local
loser,” “chicken butt” and “big skank”
• Calling someone a pimp
Defamation Tips
• Create standards and follow them
– Accuracy (Check, double check and triple
check)
– Thoroughness (The more perspectives and
sources, the better)
– If you’re making a bold claim, make sure all
sides are represented (gives you more
credibility)
– Support opinions with on-the-record quotes
Defamation Tips
• We all make mistakes
– Promptly correcting or retracting inaccuracies
can boost your credibility with your audience
– Carefully investigate claims that you are
incorrect
Online Commenters
• Determine how you will moderate
comments
– Before or after publication
– Will you strike or edit comments?
• Thoughtfully craft your terms of service
• Authors: make your presence known
• Enable user comments only for stories
that will benefit from it/if you can handle it.
What is Copyright?
• Grants authors exclusive rights to works
and the rights to:
– Reproduce
– Distribute
– Perform
– Display
– Transfer rights
©
What Copyright Isn’t
• Not subject to copyright:
– Idea
– Concept
– Discovery
– Laws
– “Fair Use”
– “70 years rule”
Copyright Era vs.
Open-source World
• Copyright-era language
– Scoop, byline, beat, etc.
• Open-source language
– Collaboration, retweeting, embeddable
content, etc.
Copyright Issues in Linking
• Deep Linking: Putting a link on your site
that opens a specific page on another
site.
• Inline Linking: Embedding HTML code on
your site so it displays content directly
from another site.
Copyright Issues in Social Media
• Typically the original author owns the
copyright (should clarify this with
contract).
• Some posts do not meet minimal creative
threshold and may not have copyright
protection.
• Aggregation can bring up copyright issues
.
Fair Use Factors
• Subjective balancing test
• Four areas
– Purpose and character
– Nature of work
– Amount of work used
– Market value effect
Fair Use
• Purpose & character (in the public interest)
– News reporting
– Non-profit
– Adds a new meaning to the original work
Fair Use
• Nature of the work
– Creative work is more protected than fact-
based work
Fair Use
• Amount of work used (relative)
– Not necessarily based on proportion
– Look at the “heart” of the work
– Too little for fair use: “de minimis”
Fair Use
• Market value effect
– Most important factor
Attribution/Disclaimer
• Will not protect you from a copyright
claim*
* Unless the owner has granted rights via
Creative Commons
Online Commenters
• “Notice and takedown”
– DCMA protects publishers
• You will generally not be liable if you promptly
take down a comment after being notified by a
copyright owner
Copyright Tips
• Create your own work
• If you do use others’ work …
– Ask for permission
– Give credit
– Ensure that it is fair use
What is Privacy?
• Publishing personal information without
permission
• Intrusion into personal space
• False light (in some states)
• Right of publicity (commercial
misappropriation)
What is Privacy?
• Personally Identifiable
Information
• Personally
Embarrassing
Information
How Private Are You?
When is Privacy Violated?
• When an aggrieved person has a
– Reasonable expectation of privacy (no
established method to determine this)
Are Posts Private?
• Public postings on public sites (i.e.
Twitter) are not private.
• Secured Communication Act may protect
posts on:
– Password-protected sites
– If poster has deliberately prevented outside
users from viewing site
Elements of Intrusion
• Intentional invasion of someone’s private
affairs
• Reasonably offensive
• Private matter
• Mental Anguish
Privacy Tips
• Gather content from public places and
public sources
• Be cautious when technology lets you
intrude (lenses, microphones, etc)
• Get consent, when possible.
• Rely on public information
Is it Private?
• Who owns the tool or account being used?
• Where are the messages stored?
• What network is the information traveling
through?
• Are the messages being sent on employer
time?
• Does the employee affiliate with employer in
message?
What Can I Do?
• Have a process/ policy
– Coach people on how to use the tools and
the importance of good judgment
• If you’re posting content from others from
social media to your site, consider the
benefits of a moderator
#PrivChat
• Center for Democracy & Technology
FOIA Requests
Resources
• Electronic Frontier Foundation
– http://www.eff.org/
• Reporters Committee for the Freedom of the
Press
– http://www.rcfp.org/
• Online Media Law: The Basics for Bloggers and
Other Publishers
– http://www.newsu.org
• Citizen Media Law Project
– http://www.citmedialaw.org/
For More Information
• Section 512 of the Digital Millennium
Copyright Act
• CDA 230 (Section 230 of the
Communications Decency Act)

Mais conteúdo relacionado

Mais procurados

Plagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpointPlagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpointkelseygarris
 
Netiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & CopyrightNetiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & Copyrightrickyswervin
 
Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12nakyrahill915
 
Use and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and AppsUse and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and AppsQuarles & Brady
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationhjhteach
 
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.Steven Chau
 
Copyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismCopyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismJoshua197
 
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Quarles & Brady
 
Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Cheryl Vann
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy EditorsCubReporters.org
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrestShani Wolf
 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6Siegmeyer
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Katie Sunstrom
 
Edna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright PresentationEdna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright Presentationedniuchis
 

Mais procurados (20)

copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Big data; small print.
Big data; small print.Big data; small print.
Big data; small print.
 
Plagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpointPlagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpoint
 
Netiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & CopyrightNetiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & Copyright
 
Journalism law
Journalism lawJournalism law
Journalism law
 
Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12
 
Use and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and AppsUse and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and Apps
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
 
Copyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismCopyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarism
 
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
 
Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy Editors
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrest
 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.
 
Edna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright PresentationEdna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright Presentation
 
Plagiarism and How to Avoid It
Plagiarism and How to Avoid ItPlagiarism and How to Avoid It
Plagiarism and How to Avoid It
 

Semelhante a Legal issues facing journalists

Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Pod Legal
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)Pod Legal
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theoriesTobore Oshobe
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Brian Miller, Solicitor
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and uxEric Reiss
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and librariesDorothea Salo
 
Online Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOnline Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOmar Ha-Redeye
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?Stephen Rhind-Tutt
 
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward OnlineYou’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward OnlineRocket Matter, LLC
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 

Semelhante a Legal issues facing journalists (20)

Twitter libel for sxsw
Twitter libel for sxswTwitter libel for sxsw
Twitter libel for sxsw
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
370 april 25 libel
370 april 25 libel370 april 25 libel
370 april 25 libel
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better world
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and ux
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
Online Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOnline Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and Tactics
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
 
You’re not a dog
You’re not a dogYou’re not a dog
You’re not a dog
 
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward OnlineYou’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Legal issues facing journalists

  • 1. Avoiding Legal Landmines in Social Media Ellyn Angelotti Faculty, Digital trends & social media Poynter Institute
  • 3. Disclaimer • This is not specific legal advice, but legal information.
  • 4. Some Rules of Thumb • When it comes to the law, “it depends” – Gray areas are common – Different facts change how the law is applied • Common questions – What is reasonable? – What is foreseeable? – What are my/my audiences expectations?
  • 5. Just because you can, should you? • Legal vs. Ethical issues – Gut check – What are your values? – Do you have a decision-making process? • Would you/could you share your process?
  • 6. The new legal issues? • Posting offensive/inappropriate content – Badmouthing others • Copying what people find on websites • Privacy expectations – Social media files, emails, etc.
  • 7. What every site should have • Terms of Use – Set boundaries for your users • Privacy Policy – Let your users know what information you collect and how you use it – Potential opt out options
  • 8. What every web users should know • Duty to read – Terms of Service/ Privacy policies – User agreements
  • 9. Danger Areas • Defamation – Key Point: Falsity of Fact • Copyright – Key Point: Market Value • Privacy – Key Point: Consent
  • 10. Defamation: Guiding Values • Seek truth and report it • Minimize harm
  • 11. What is Defamation? • Injury to reputation caused by publishing a false statement of fact AND – A publisher was careless, reckless or had knowledge of falsity – The defamed person can be identified • Public vs. Private person – Injures a person or business/exposes someone to hatred, ridicule or contempt
  • 12. What is NOT Defamation? • Who – Libelproof Defendants • Someone with an already tarnished reputation – Deceased – *More difficult* Public Figures • Must prove actual malice
  • 13. Who Is A Public Figure?
  • 14. Who Is A Public Figure?
  • 15. Who Is A Public Figure?
  • 16. Who Is A Public Figure?
  • 17. Who Is A Public Figure?
  • 18. Who Is A Public Figure?
  • 19. Content: Fact vs. Opinion • Is it true? • Can you determine if it is true or false? • Context
  • 20. What is not defamation? • Content – Opinions • The “true or false” test – Hyperbole – Parody
  • 21. Is it Defamatory? • My neighbor John Smith is a stinking lush. • In my opinion the mayor is an alcoholic. • My attorney Dan Jackson is a crook. • All Florida attorneys are crooks. • Calling a TV show participant a “local loser,” “chicken butt” and “big skank” • Calling someone a pimp
  • 22. Defamation Tips • Create standards and follow them – Accuracy (Check, double check and triple check) – Thoroughness (The more perspectives and sources, the better) – If you’re making a bold claim, make sure all sides are represented (gives you more credibility) – Support opinions with on-the-record quotes
  • 23. Defamation Tips • We all make mistakes – Promptly correcting or retracting inaccuracies can boost your credibility with your audience – Carefully investigate claims that you are incorrect
  • 24. Online Commenters • Determine how you will moderate comments – Before or after publication – Will you strike or edit comments? • Thoughtfully craft your terms of service • Authors: make your presence known • Enable user comments only for stories that will benefit from it/if you can handle it.
  • 25. What is Copyright? • Grants authors exclusive rights to works and the rights to: – Reproduce – Distribute – Perform – Display – Transfer rights ©
  • 26. What Copyright Isn’t • Not subject to copyright: – Idea – Concept – Discovery – Laws – “Fair Use” – “70 years rule”
  • 27. Copyright Era vs. Open-source World • Copyright-era language – Scoop, byline, beat, etc. • Open-source language – Collaboration, retweeting, embeddable content, etc.
  • 28. Copyright Issues in Linking • Deep Linking: Putting a link on your site that opens a specific page on another site. • Inline Linking: Embedding HTML code on your site so it displays content directly from another site.
  • 29. Copyright Issues in Social Media • Typically the original author owns the copyright (should clarify this with contract). • Some posts do not meet minimal creative threshold and may not have copyright protection. • Aggregation can bring up copyright issues .
  • 30. Fair Use Factors • Subjective balancing test • Four areas – Purpose and character – Nature of work – Amount of work used – Market value effect
  • 31. Fair Use • Purpose & character (in the public interest) – News reporting – Non-profit – Adds a new meaning to the original work
  • 32. Fair Use • Nature of the work – Creative work is more protected than fact- based work
  • 33. Fair Use • Amount of work used (relative) – Not necessarily based on proportion – Look at the “heart” of the work – Too little for fair use: “de minimis”
  • 34. Fair Use • Market value effect – Most important factor
  • 35. Attribution/Disclaimer • Will not protect you from a copyright claim* * Unless the owner has granted rights via Creative Commons
  • 36. Online Commenters • “Notice and takedown” – DCMA protects publishers • You will generally not be liable if you promptly take down a comment after being notified by a copyright owner
  • 37. Copyright Tips • Create your own work • If you do use others’ work … – Ask for permission – Give credit – Ensure that it is fair use
  • 38. What is Privacy? • Publishing personal information without permission • Intrusion into personal space • False light (in some states) • Right of publicity (commercial misappropriation)
  • 39. What is Privacy? • Personally Identifiable Information • Personally Embarrassing Information
  • 41. When is Privacy Violated? • When an aggrieved person has a – Reasonable expectation of privacy (no established method to determine this)
  • 42. Are Posts Private? • Public postings on public sites (i.e. Twitter) are not private. • Secured Communication Act may protect posts on: – Password-protected sites – If poster has deliberately prevented outside users from viewing site
  • 43.
  • 44. Elements of Intrusion • Intentional invasion of someone’s private affairs • Reasonably offensive • Private matter • Mental Anguish
  • 45. Privacy Tips • Gather content from public places and public sources • Be cautious when technology lets you intrude (lenses, microphones, etc) • Get consent, when possible. • Rely on public information
  • 46. Is it Private? • Who owns the tool or account being used? • Where are the messages stored? • What network is the information traveling through? • Are the messages being sent on employer time? • Does the employee affiliate with employer in message?
  • 47. What Can I Do? • Have a process/ policy – Coach people on how to use the tools and the importance of good judgment • If you’re posting content from others from social media to your site, consider the benefits of a moderator
  • 48. #PrivChat • Center for Democracy & Technology
  • 50. Resources • Electronic Frontier Foundation – http://www.eff.org/ • Reporters Committee for the Freedom of the Press – http://www.rcfp.org/ • Online Media Law: The Basics for Bloggers and Other Publishers – http://www.newsu.org • Citizen Media Law Project – http://www.citmedialaw.org/
  • 51. For More Information • Section 512 of the Digital Millennium Copyright Act • CDA 230 (Section 230 of the Communications Decency Act)

Notas do Editor

  1. "[Name of website] will not collect any personal information about you except when you specifically and knowingly provide such information Privacy: When a user visits a website, he or she provides personal information to the website operator simply by virtue of browsing, reading, and downloading material. This information includes IP address, user configuration settings, and what website referred the user to the site, among other things. It is better to tell users that this type of information is being collected automatically on standard web server access logs. .
  2. Private Figures: the amount of research undertaken prior to publication; the trustworthiness of sources; attempts to verify questionable statements or solicit opposing views; and whether the defendant followed other good journalistic practices.
  3. Public Figure District 2 St. Pete Councilperson Calvin Harris
  4. High School wresting coach The case went all the way to the Supreme Court, which ruled 7-2 in favor of Milkovich in a landmark 1980 decision that he is not a public figure and therefore not subject to a published opinion. One reason is in his 27 years of coaching (1950-77), he had a dual meet record of 265-25-2. From 1963-72, his teams won 102 consecutive matches, which is still a state record. He also guided the Mustangs to 10 state team titles and nine state runners-up, and had 37 individual champions - the last being his nephew Jamie, who is the team's current coach. The other reason is for a landmark Supreme Court ruling. On Feb. 9, 1974, a brawl erupted among wrestlers at a match between Maple Heights High School and Mentor High School covered by J. Theodore Diadiun, who at the time was sports editor for the Willoughby News-Herald. Diadiun is now The Plain Dealer's reader representative. Milkovich filed a libel action against Diadiun and the News-Herald for what Diadiun wrote in a column following a Ohio High School Athletic Association hearing about the fracas.
  5. Cliff Lee’s wife Time, Inc. v. Firestone 1976 (Florida Supreme Court) (a) voluntarily participates in a discussion about a public controversy, and (b) has access to the media to get his or her own view across
  6. Limited: (a) voluntarily participates in a discussion about a public controversy, and (b) has access to the media to get his or her own view across
  7. Limited: (a) voluntarily participates in a discussion about a public controversy, and (b) has access to the media to get his or her own view across
  8. No such thing as a false idea.
  9. When false, these are defamatory (if they are true, then not defamatory) (in most state) No, yes, Yes, yes, no, maybe but probably no. 3: They concluded the term has "no generally recognized meaning." 2: “Our dad’s a pimp. . . . We’re interested in the underclass.” “dad dabbled in pimportial arts” –had to be false because he HAD been a pimp in the past, and that was good enough could not be used to support the truth of the statement. Vanity Fair mag, Allen Hughes and Albert Hughs Jr. Evil kenieval picture with his wife and another woman( No – not reasonbaly defamied)
  10. if you wish to criticize a novelist, you should have the freedom to quote a portion of the novelist's work without asking permission. Absent this freedom, copyright owners could stifle any negative comments about their work. if you wish to criticize a novelist, you should have the freedom to quote a portion of the novelist's work without asking permission. Absent this freedom, copyright owners could stifle any negative comments about their work.
  11. Benefit to the public- unpublished work gets more protection because author gets the first shot at publishing
  12. Does not typically apply to Parody WEIRD AL De minimis: Movie Seven: appear fleetingly and are obscured, severely out of focus, and virtually unidentifiable."
  13. Gather not necessarily publish
  14. Not for Facebook… but this is more for privates websites
  15. Phyiscial invasion, or electronic/optical invasion “ use of ultra-powerful or highly sensitive equipment was the only way you were able to obtain your information or recording. "
  16. Consent is implied if you tell them you are in the media All parties need to be aware a conversation is being recorded