SlideShare uma empresa Scribd logo
1 de 61
YouSued.com

Law & Social Data

         By: David M. Adler
Leavens, Strand, Glover & Adler, LLC
 203 North LaSalle Street, Suite 2550
      Chicago, Illinois 60601
             @adlerlaw
Use
of
Social
Overview
Many Businesses & Individuals Lack Resources

Inadequate understanding of legal and regulatory
requirements

Rights owners and Users can benefit

Ignorance = Risk
  content removed
  civil and criminal penalties
  Lost time, money and business opportunities

Learn the “Rules of the Road” for creation,
commercialization and enforcement of the rights and
Copyright
Protects Content
Rights Acquisition
Infringement Issues
Digital Millennium Copyright Act
(DMCA)
Non-Preemptable Common Law
Claims
  Hot news, Breach of Contract, Digital
  Tresspass
Right of Publicity
Right to control and to choose whether and
how to use an individual’s identity for
commercial purposes

Personal Identity Attributes: (i) name, (ii)
signature, (iii) photograph, (iv) image, (v)
likeness, or (vi) voice

19 states with Rt. Of Publicity Statutes, 28
states recognize common law right

Defenses: identity not used (Question of fact),
Trademarks
Scope

Copycats: Brandjacking / Cybersquatting

Comparative Advertising

Liability For Trademark Infringement

Defenses

Product Placement
Defamation
Definition:
  slander (statements) and libel (written, broadcast, or
  published)
  FALSE claim, either express or implied
  Per Se (crime, disease, integrity, sexual conduct) & Per
  Quod

Defamation In Cyberspace (Section 230)
  Former Head / VP Indian Cricketing League fined US$140,000
  for Libelous Tweet.

Selected Defenses:
IL: (i) fair report privilege, (ii) substantial truth, & (iii)
Content & Speech Regulation
Obscenity / Communications Decency Act - Obscene
Materials
Children: Children's Online Privacy Protection Act
(COPPA) & Children's Internet Protection Act (CIPA)
State Regulation
First Amendment
State Laws
  NY bills S6779 A8688 - would ban “anonymous”
  speech
  AZ bill 2529 – criminalizes any speech that could be
  construed as cyber-bullying
  WA SB 6251 – criminalizes providing access to third
  parties' “offensive” materials by online service
Marketing Issues
CAN-SPAM

Promotions
  Sweepstakes / Contests

FTC
  Endorsement / Testimonial Guidelines

Regulate Industries: FTC, FDA, FINRA, SEC,
NLRB

Platforms/Transmedia
Workplace Issues
The NLRB released 3 Reports, the latest May 30, 2012
  An employer violates the Act if a rule “would reasonably tend
  to chill employees in the exercise of their Section 7 rights.”

Practical Applications
  No Policy. According to Grant Thornton, as of Nov. 2011, 79%
  of companies surveyed did not have social media policies
  Policy Unenforceable. In 2011, the NLRB had received 129
  cases involving social media
  Policy Unclear. Training employees is just the beginning; AU
  telecom co. Telstra (40,000+ employees) mandates training
  “3Rs” – responsibility, respect and representation
  Policy Outdated. Oct. 2011 FTC settles with Frostwire,
  developer of p2p file-sharing application over the default
  privacy settings
  Loss of Trade Secrets. Phonedog. Christou v. Betaport
Due Diligence
Contracts/Policies/Procedures
  Social Media & Privacy
  BYOD
  Affiliates/Sponsors/Contractors

Clearance
  Copyright/Trademark/Right of Publicity

Compliance
  State & Federal Regulations
Thank You!
David M. Adler | Leavens, Strand, Glover & Adler, LLC

         203 North LaSalle Street, Suite 2550

               Chicago, Illinois 60601

               Direct: (866) 734-2568

                Fax: (312) 275-7534

            www.ecommerceattorney.com

                  www.lsglegal.com

               adlerlaw.wordpress.com

                     @adlerlaw
LAW &


SOCIAL
DATA
Experience won’t just be about the tool you
build, but it will include how you manage
sensitive data and how you respect users.
This talk is not about Facebook.
This talk is about you.
uncharted legal territory




                   What do we mean by “privacy?”
Distinguishing Fourth Amendment from
privacy in the civil sense.
Electronic Communications Privacy Act
Personally Identifiable Information (Pii)
“Personally identifiable information” is information that
identifies a particular person. “Pii” includes:

  • Full name;
  • National identification number;
  • IP address;
  • Vehicle registration plate number;
  • Driver’s license number;
  • Face;
  • Fingerprints;
  • Handwriting;
  • Credit card numbers;
  • Digital identity;
  • Date of birth;
  • Birthplace; and
  • Genetic information.
federal movement on privacy




                  I just want to build cool stuff.
                              Why should I care?
Problem #1: The laws around data reside in
industry silos.
Few pieces of key legislation:

   Do Not Track Act

   Commercial Privacy Bill of Rights Act of 2011

   Personal Data Privacy and Security Act

   Secure and Fortify Electronics Data Act (SAFE)

   Data Security and Breach Notification Act
Problem #2: They aren’t getting it in DC.
Silicon Valley, Alley, Beach > DC
Problem #3: This isn’t going away.
FTC Action

   Opting Out = ScanScout

   Children’s Privacy = SkidKids
California

   Privacy Policy Required
oh crap.




           What Developers Can Do
What people care about:

Data control

Data minimization

Data portability

Data withdrawal
Here are a few places to start:
Conducting an assessment on privacy and
data security.
Audit:
type


Audit:
type

         amount
Audit:
type

         amount
Audit:
         use
type

         amount
Audit:
         use

         intake
Architectural solutions to privacy. Build with
privacy in mind.
Policy solutions to privacy.
Privacy policies and practices in their
current incarnation are not working.
kidz.




        yes, different rules apply.
Minors

Children’s Online Privacy Protection Act
Children’s Online Privacy Protection Act

Requires websites to get parental consent
before collecting or sharing info for children
under 13

Enforced by the Federal Trade Commission

Applies to commercial websites and other
online services

If you know you have minors on your site, close
the accounts
Children’s Online Privacy Protection Act

To comply:

   Post a privacy policy/advise whenever
   personal information collected

   Parental notice, consent, access to
   information

   Can’t condition participation on providing
   more info

   Confidentiality & security of information
keeping all things “cyber” secure.




            super duper uncharted legal territory.
Current Legal Regime Applied:


Computer Fraud and Abuse Act

Economic Espionage Act

State Level Regulation
Hillz? Send those files to China?
               Text




                  Shit.
We just scratched the surface.
Lawyer

         Christina Gagnier
         @gagnier
         gagnier@gamallp.co
         m
?
LAW &


SOCIAL
DATA
Gagnier's Portion of TechWeek Chicago Presentation

Mais conteúdo relacionado

Mais procurados

Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
Nicholas Davis
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
Sheetal Verma
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
VALLOYD
 

Mais procurados (20)

social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
Legal Matters in E-commerce
Legal Matters in E-commerceLegal Matters in E-commerce
Legal Matters in E-commerce
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
Cyber law
Cyber lawCyber law
Cyber law
 
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
2017 Legal Update on Digital Accessibility Cases with Lainey Feingold
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 

Semelhante a Gagnier's Portion of TechWeek Chicago Presentation

CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
Dmcenter
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
Kimberly Verska
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Vivastream
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
DDMA
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Vivastream
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
Act-On Software
 

Semelhante a Gagnier's Portion of TechWeek Chicago Presentation (20)

Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 

Mais de Christina Gagnier

Mais de Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Gagnier's Portion of TechWeek Chicago Presentation

  • 1. YouSued.com Law & Social Data By: David M. Adler Leavens, Strand, Glover & Adler, LLC 203 North LaSalle Street, Suite 2550 Chicago, Illinois 60601 @adlerlaw
  • 3. Overview Many Businesses & Individuals Lack Resources Inadequate understanding of legal and regulatory requirements Rights owners and Users can benefit Ignorance = Risk content removed civil and criminal penalties Lost time, money and business opportunities Learn the “Rules of the Road” for creation, commercialization and enforcement of the rights and
  • 4. Copyright Protects Content Rights Acquisition Infringement Issues Digital Millennium Copyright Act (DMCA) Non-Preemptable Common Law Claims Hot news, Breach of Contract, Digital Tresspass
  • 5. Right of Publicity Right to control and to choose whether and how to use an individual’s identity for commercial purposes Personal Identity Attributes: (i) name, (ii) signature, (iii) photograph, (iv) image, (v) likeness, or (vi) voice 19 states with Rt. Of Publicity Statutes, 28 states recognize common law right Defenses: identity not used (Question of fact),
  • 6. Trademarks Scope Copycats: Brandjacking / Cybersquatting Comparative Advertising Liability For Trademark Infringement Defenses Product Placement
  • 7. Defamation Definition: slander (statements) and libel (written, broadcast, or published) FALSE claim, either express or implied Per Se (crime, disease, integrity, sexual conduct) & Per Quod Defamation In Cyberspace (Section 230) Former Head / VP Indian Cricketing League fined US$140,000 for Libelous Tweet. Selected Defenses: IL: (i) fair report privilege, (ii) substantial truth, & (iii)
  • 8. Content & Speech Regulation Obscenity / Communications Decency Act - Obscene Materials Children: Children's Online Privacy Protection Act (COPPA) & Children's Internet Protection Act (CIPA) State Regulation First Amendment State Laws NY bills S6779 A8688 - would ban “anonymous” speech AZ bill 2529 – criminalizes any speech that could be construed as cyber-bullying WA SB 6251 – criminalizes providing access to third parties' “offensive” materials by online service
  • 9. Marketing Issues CAN-SPAM Promotions Sweepstakes / Contests FTC Endorsement / Testimonial Guidelines Regulate Industries: FTC, FDA, FINRA, SEC, NLRB Platforms/Transmedia
  • 10. Workplace Issues The NLRB released 3 Reports, the latest May 30, 2012 An employer violates the Act if a rule “would reasonably tend to chill employees in the exercise of their Section 7 rights.” Practical Applications No Policy. According to Grant Thornton, as of Nov. 2011, 79% of companies surveyed did not have social media policies Policy Unenforceable. In 2011, the NLRB had received 129 cases involving social media Policy Unclear. Training employees is just the beginning; AU telecom co. Telstra (40,000+ employees) mandates training “3Rs” – responsibility, respect and representation Policy Outdated. Oct. 2011 FTC settles with Frostwire, developer of p2p file-sharing application over the default privacy settings Loss of Trade Secrets. Phonedog. Christou v. Betaport
  • 11. Due Diligence Contracts/Policies/Procedures Social Media & Privacy BYOD Affiliates/Sponsors/Contractors Clearance Copyright/Trademark/Right of Publicity Compliance State & Federal Regulations
  • 12. Thank You! David M. Adler | Leavens, Strand, Glover & Adler, LLC 203 North LaSalle Street, Suite 2550 Chicago, Illinois 60601 Direct: (866) 734-2568 Fax: (312) 275-7534 www.ecommerceattorney.com www.lsglegal.com adlerlaw.wordpress.com @adlerlaw
  • 14.
  • 15. Experience won’t just be about the tool you build, but it will include how you manage sensitive data and how you respect users.
  • 16. This talk is not about Facebook. This talk is about you.
  • 17. uncharted legal territory What do we mean by “privacy?”
  • 18.
  • 19. Distinguishing Fourth Amendment from privacy in the civil sense.
  • 22. “Personally identifiable information” is information that identifies a particular person. “Pii” includes: • Full name; • National identification number; • IP address; • Vehicle registration plate number; • Driver’s license number; • Face; • Fingerprints; • Handwriting; • Credit card numbers; • Digital identity; • Date of birth; • Birthplace; and • Genetic information.
  • 23. federal movement on privacy I just want to build cool stuff. Why should I care?
  • 24.
  • 25. Problem #1: The laws around data reside in industry silos.
  • 26.
  • 27. Few pieces of key legislation: Do Not Track Act Commercial Privacy Bill of Rights Act of 2011 Personal Data Privacy and Security Act Secure and Fortify Electronics Data Act (SAFE) Data Security and Breach Notification Act
  • 28. Problem #2: They aren’t getting it in DC.
  • 30. Problem #3: This isn’t going away.
  • 31. FTC Action Opting Out = ScanScout Children’s Privacy = SkidKids
  • 32. California Privacy Policy Required
  • 33. oh crap. What Developers Can Do
  • 34.
  • 35. What people care about: Data control Data minimization Data portability Data withdrawal
  • 36. Here are a few places to start:
  • 37. Conducting an assessment on privacy and data security.
  • 40. type amount Audit:
  • 41. type amount Audit: use
  • 42. type amount Audit: use intake
  • 43. Architectural solutions to privacy. Build with privacy in mind.
  • 45. Privacy policies and practices in their current incarnation are not working.
  • 46.
  • 47.
  • 48. kidz. yes, different rules apply.
  • 49.
  • 51. Children’s Online Privacy Protection Act Requires websites to get parental consent before collecting or sharing info for children under 13 Enforced by the Federal Trade Commission Applies to commercial websites and other online services If you know you have minors on your site, close the accounts
  • 52. Children’s Online Privacy Protection Act To comply: Post a privacy policy/advise whenever personal information collected Parental notice, consent, access to information Can’t condition participation on providing more info Confidentiality & security of information
  • 53. keeping all things “cyber” secure. super duper uncharted legal territory.
  • 54.
  • 55. Current Legal Regime Applied: Computer Fraud and Abuse Act Economic Espionage Act State Level Regulation
  • 56. Hillz? Send those files to China? Text Shit.
  • 57. We just scratched the surface.
  • 58. Lawyer Christina Gagnier @gagnier gagnier@gamallp.co m
  • 59. ?

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. How we define user experience is going to change. \n
  16. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  17. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  18. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  19. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  20. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  21. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  22. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  23. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  24. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  25. There are host of laws on privacy, they have just been created to address issues industry by industry. Consumer privacy and security online is just part of the newest set of considerations. Also, laws vary dramatically from country to country. \n
  26. \n
  27. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  28. By they, I refer to Congress. \n
  29. There is a disconnect between what happens in the private and public sector. Huge chasm between Silicon Valley and Washington, DC.\n
  30. \n
  31. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  32. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  33. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  34. \n
  35. First, start by considering what your users care about, the types of things that drive complaints on the company level and to regulatory agencies like the Federal Trade Commission. Mention Social Network Users’ Bill of Rights.\n
  36. I am going to run through a few things you can do to think about this holistically from a strategic perspective.\n
  37. Do an impact analysis. Figure out what you’re doing, your strengths and weaknesses. This is essential before taking any active measures. When I do this, I dissect the platform before I give an analysis of what’s going on or needs to be changed.\n
  38. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  39. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  40. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  41. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  42. Building with privacy in mine. Granular controls. Opt in v. opt out. Making privacy and security part of the enrollment process.\n
  43. After the solutions you can consider around the build, you can also look at your policies and response mechanisms.\n
  44. No one reads them. They may need to be there. Come up with a better more experiential alternative. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  50. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  51. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  52. \n
  53. \n
  54. US, make DoS attacks illegal and punishable by up to 10 years of imprisonment, through the National Information Infrastructure Protection Act of 1996 \n\n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n