SlideShare uma empresa Scribd logo
1 de 17
What you don't
know, can hurt
    you!
Melfi & Associates, PC

 "I resolve legal issues for my clients and protect
their digital assets and valuable proprietary rights
     and provide results oriented and financially
  responsible legal services for forward thinking
    clients who operate within a Web 2.0 world.”



   Trademarks, Copyrights & Patents

   Intellectual Property Litigation

   Infringement & Enforcement Matters

   Document drafting (vendor contracts, Terms &
    Usages Agreements and Privacy Policies)

   Social Media Policies
WEB 2.0

   Web 2.0 is a term coined in 1999 to describe
    web sites that use technology beyond the
    static pages of earlier web sites.

   Web 2.0 sites may allow users to interact
    and collaborate with each other in a social
    media dialogue as creators of user-
    generated content in a virtual community, in
    contrast to websites where people are
    limited to the passive viewing of content.
Reputation Attacks/ Digital
       Defamation
   A libelous expression must be published to a third
    party, at minimum.

   A libelous expression must result in some harm to the
    plaintiff. (evidence you have been injured)

   The libel must specify an individual or entity in such a
    manner as to clearly indicate to the average reader
    who the individual or entity is.

   The libelous expression should be based on provable
    assertion.

   Defamation per se occurs when published libelous
    expressions are actionable at face value. (accusation
    of a crime, sexual misconduct, loathsome disease or
    unfit to run their business)
What it is not . . .

   Someone writes and publishes something
    negative about you that is improvable.
    Opinions are not defamatory.

   Someone writes and publishes something
    about you that is true. Age, race, beliefs
    etc. that are true are not defamatory.

   Someone writes and publishes something
    negative about you without malice –when
    you are a public figure or celebrity. Libel
    must be intentional and without
    justification or it is not defamatory.
Steve Wynn v. Joe Francis
Steve Wynn v. Joe Francis
                (con’t.)
   Francis: "Wynn threatened to kill me. He said he would hit me in
    the back of the head with a shovel and bury me in a hole in the
    desert.‖

   Wynn: ―Joe Francis represents a new kind of criminal type: the
    digital assassin. He takes advantage of the protection afforded
    by the Internet to issue intentionally destructive charges against
    someone’s reputation, knowing full well that in the age of the
    Internet those statements will live forever. His actions present a
    new challenge to society created by technology and the
    instantaneous news cycle. The inflammatory information goes
    up instantly and stays forever, unchallenged and unproven, to
    the misery and detriment of any citizen that is a victim. The only
    remedy is a long road, an expensive road, to a trial before 12
    fellow citizens. Most citizens don’t have the time or the
    resources to defend themselves and find the truth in a
    courtroom before a jury of their peers.
Right of Publicity (RoP)
   The Right of Publicity can be defined as the right to control
    the commercial use of one’s identity.

   The elements typically comprising the Right of Publicity are
    referred to as ―name, image and likeness.‖

   The majority view is that the Right of Publicity extends to
    every individual, not just those who are famous. But as a
    practical matter, Right of Publicity disputes usually involve
    celebrities, since it is they who possess the names and
    images that help hype advertisements and sell products.

   Right of Publicity and copyright considerations can
    simultaneously be implicated in a single usage. An
    advertisement featuring a celebrity’s picture may require
    authorization from the photographer for the copyright use,
    and from the celebrity for the Right of Publicity use.
RoP Examples
   Midler v. Ford Motor Co. 849 F.2d 460 (9th Cir. 1989) and Waits
    v. Frito-Lay, Inc. 978 F.2d 1093 (9th Cir. 1992) - Bette Midler
    and Tom Waits declined to lend their distinctive voices to
    advertising jingles. Advertisers found sound-alike performers.

   White v. Samsung Electronics America, Inc., 971 F.2d 1395 (9th
    Cir. 1992). Samsung utilized a robot that looked and acted like
    Vanna White of ―Wheel of Fortune.‖ This usage was an
    infringement because Samsung had deliberately pawned the
    image and popularity of White and because White was readily
    identifiable from the context of the use.

   Infringing a celebrity’s Right of Publicity can be a costly error

   the ability to control commercialization in the first place is as
    much a policy objective of the Right of Publicity as is providing
    revenue streams for the rightful recipient.
Social Media Policies

   A social media policy is a corporate code of
    conduct that provides guidelines for
    employees who post content on the Internet
    either as part of their job or as a private
    person.

   The goal of a social media policy is to set
    expectations for appropriate behavior and
    ensure that an employee's posts will not
    expose the company to legal problems or
    public embarrassment.

   Range from specific to general – depends
    on the culture of the organization
NLRB & Social Media
            Lawsuits
   According to the U.S. Chamber of Commerce, there is a
    rising number of cases before the NLRB questioning an
    employer’s ―overbroad‖ policies restricting use of social
    media and those of an employer that unlawfully discharged
    or disciplined an employee over contents of social media
    posts.

   Employers must take appropriate precautionary steps.
    Circulate and maintain an updated employee handbook that
    not only identifies the ground rules governing the
    workplace, but also addresses the new challenges
    presented by mobile technologies and social media.

   The considerable threats for employers posed by an
    employee’s use of social media include suits involving
    defamation, First Amendment
    considerations, privacy, confidentiality and trade
    secrets, hiring and training concerns, online harassment —
    not to mention potential loss of business or bad press.
Stolen Identity

   Identity theft is a form of stealing
    someone's identity in which someone
    pretends to be someone else by assuming
    that person's identity, typically in order to
    access resources or obtain credit and other
    benefits in that person's name.

   Identity theft occurs when someone uses
    your personally identifying information, like
    your name, Social Security number, or credit
    card number, without your permission, to
    commit fraud or other crimes.
Stolen Identity Remedies

According to the FTC:

   Place a fraud alert on your credit reports,
    and review your reports.

   Close the accounts that you know, or
    believe, have been tampered with or opened
    fraudulently.

   File a report with your local police or the
    police in the community where the identity
    theft took place.

   File a complaint with the Federal Trade
    Commission.
Impersonation/ Personality
         Theft

   An impersonator is someone who imitates or
    copies the behavior or actions of another.

   Examples might be illegal immigrants, people hiding
    from creditors or other individuals, or those who
    simply want to become "anonymous" for personal
    reasons.

   Another example are posers, a label given to people
    who use somebody else’s photos and information
    through social networking sites. Mostly, posers
    create believable stories involving friends of the real
    person they are imitating.

   No punishable crime, might just be classified as a
    ―hoax.‖
Cybersquatting

   Registering, trafficking in, or using a domain
    name with bad faith intent to profit from the
    goodwill of a trademark belonging to
    someone else. The cybersquatter then offers
    to sell the domain to the person or company
    who owns a trademark contained within the
    name at an inflated price.

   Some cybersquatters put up derogatory
    remarks about the person or company the
    domain is meant to represent in an effort to
    encourage the subject to buy the domain
    from them
Cybersquatting Remedies
   Domain name disputes involving alleged bad-faith
    registration are typically resolved using the Uniform
    Domain Name Resolution Policy (UDRP) process
    developed by the Internet Corporation for Assigned
    Names and Numbers (ICANN).

   Under UDRP policy, successful complainants can
    have the names deleted or transferred to their
    ownership.

   Under the ACPA (Anticybersquatting Consumer
    Protection Act) a cybersquatter can be held liable for
    actual damages or statutory damages in the amount
    of a maximum of $100,000 for each name found to be
    in violation, although application of this act in the form
    of actual fines assessed are few in number.
Question
   &
Answer

Mais conteúdo relacionado

Mais procurados

Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Shawn Tuma
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineAllen Matkins
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerDarren Chaker
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Monetizing the mobile social graph
Monetizing the mobile social graphMonetizing the mobile social graph
Monetizing the mobile social graphLisa Borodkin
 
You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingAffiliate Summit
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forMcPhearson TVHolden
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawChris Marsden
 
Social Media Influencers and Intellectual Property Rights
Social Media Influencers and Intellectual Property RightsSocial Media Influencers and Intellectual Property Rights
Social Media Influencers and Intellectual Property RightsKerdaSoftech
 
Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...
Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...
Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...Knobbe Martens - Intellectual Property Law
 
IPR,Copyrights & Content Ownership in Social Media
IPR,Copyrights & Content Ownership in Social MediaIPR,Copyrights & Content Ownership in Social Media
IPR,Copyrights & Content Ownership in Social MediaSocial Media Club Mumbai
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Lawkarenevanstm
 

Mais procurados (20)

Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-Chaker
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Monetizing the mobile social graph
Monetizing the mobile social graphMonetizing the mobile social graph
Monetizing the mobile social graph
 
You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social Media
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate Marketing
 
Vgl13 t6
Vgl13 t6Vgl13 t6
Vgl13 t6
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Mmcp merged
Mmcp mergedMmcp merged
Mmcp merged
 
SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet Law
 
Social Media Influencers and Intellectual Property Rights
Social Media Influencers and Intellectual Property RightsSocial Media Influencers and Intellectual Property Rights
Social Media Influencers and Intellectual Property Rights
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...
Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...
Using Pop Culture References in Advertisements? Just Do It Right | Orange Cou...
 
IPR,Copyrights & Content Ownership in Social Media
IPR,Copyrights & Content Ownership in Social MediaIPR,Copyrights & Content Ownership in Social Media
IPR,Copyrights & Content Ownership in Social Media
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 

Destaque

Southfield chamber of commerce presentation
Southfield chamber of commerce presentationSouthfield chamber of commerce presentation
Southfield chamber of commerce presentationMelfi Associates
 
Guyana Goldfields May 2013 Investor Presentation
Guyana Goldfields May 2013 Investor PresentationGuyana Goldfields May 2013 Investor Presentation
Guyana Goldfields May 2013 Investor Presentationjwagenaar734
 
Meet In The Middle Permission Form (Span)
Meet In The Middle Permission Form (Span)Meet In The Middle Permission Form (Span)
Meet In The Middle Permission Form (Span)Special Olympics Texas
 

Destaque (6)

Southfield chamber of commerce presentation
Southfield chamber of commerce presentationSouthfield chamber of commerce presentation
Southfield chamber of commerce presentation
 
Lintubongari
LintubongariLintubongari
Lintubongari
 
Guyana Goldfields May 2013 Investor Presentation
Guyana Goldfields May 2013 Investor PresentationGuyana Goldfields May 2013 Investor Presentation
Guyana Goldfields May 2013 Investor Presentation
 
Ceramic dessertsrubric
Ceramic dessertsrubricCeramic dessertsrubric
Ceramic dessertsrubric
 
Meet In The Middle Permission Form (Span)
Meet In The Middle Permission Form (Span)Meet In The Middle Permission Form (Span)
Meet In The Middle Permission Form (Span)
 
Intro Teaser
Intro TeaserIntro Teaser
Intro Teaser
 

Semelhante a Digital defamation presentation

Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxbartholomeocoombs
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Xcentric Ventures fails at injunction
Xcentric Ventures fails at injunctionXcentric Ventures fails at injunction
Xcentric Ventures fails at injunctionpaladinpi
 
Social Media
Social MediaSocial Media
Social Mediaclggibson
 
Phishing website method
Phishing website methodPhishing website method
Phishing website methodarelyf_7
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 

Semelhante a Digital defamation presentation (13)

Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
Unfair competition
Unfair competitionUnfair competition
Unfair competition
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Xcentric Ventures fails at injunction
Xcentric Ventures fails at injunctionXcentric Ventures fails at injunction
Xcentric Ventures fails at injunction
 
Social Media
Social MediaSocial Media
Social Media
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 

Digital defamation presentation

  • 1. What you don't know, can hurt you!
  • 2. Melfi & Associates, PC "I resolve legal issues for my clients and protect their digital assets and valuable proprietary rights and provide results oriented and financially responsible legal services for forward thinking clients who operate within a Web 2.0 world.”  Trademarks, Copyrights & Patents  Intellectual Property Litigation  Infringement & Enforcement Matters  Document drafting (vendor contracts, Terms & Usages Agreements and Privacy Policies)  Social Media Policies
  • 3. WEB 2.0  Web 2.0 is a term coined in 1999 to describe web sites that use technology beyond the static pages of earlier web sites.  Web 2.0 sites may allow users to interact and collaborate with each other in a social media dialogue as creators of user- generated content in a virtual community, in contrast to websites where people are limited to the passive viewing of content.
  • 4. Reputation Attacks/ Digital Defamation  A libelous expression must be published to a third party, at minimum.  A libelous expression must result in some harm to the plaintiff. (evidence you have been injured)  The libel must specify an individual or entity in such a manner as to clearly indicate to the average reader who the individual or entity is.  The libelous expression should be based on provable assertion.  Defamation per se occurs when published libelous expressions are actionable at face value. (accusation of a crime, sexual misconduct, loathsome disease or unfit to run their business)
  • 5. What it is not . . .  Someone writes and publishes something negative about you that is improvable. Opinions are not defamatory.  Someone writes and publishes something about you that is true. Age, race, beliefs etc. that are true are not defamatory.  Someone writes and publishes something negative about you without malice –when you are a public figure or celebrity. Libel must be intentional and without justification or it is not defamatory.
  • 6. Steve Wynn v. Joe Francis
  • 7. Steve Wynn v. Joe Francis (con’t.)  Francis: "Wynn threatened to kill me. He said he would hit me in the back of the head with a shovel and bury me in a hole in the desert.‖  Wynn: ―Joe Francis represents a new kind of criminal type: the digital assassin. He takes advantage of the protection afforded by the Internet to issue intentionally destructive charges against someone’s reputation, knowing full well that in the age of the Internet those statements will live forever. His actions present a new challenge to society created by technology and the instantaneous news cycle. The inflammatory information goes up instantly and stays forever, unchallenged and unproven, to the misery and detriment of any citizen that is a victim. The only remedy is a long road, an expensive road, to a trial before 12 fellow citizens. Most citizens don’t have the time or the resources to defend themselves and find the truth in a courtroom before a jury of their peers.
  • 8. Right of Publicity (RoP)  The Right of Publicity can be defined as the right to control the commercial use of one’s identity.  The elements typically comprising the Right of Publicity are referred to as ―name, image and likeness.‖  The majority view is that the Right of Publicity extends to every individual, not just those who are famous. But as a practical matter, Right of Publicity disputes usually involve celebrities, since it is they who possess the names and images that help hype advertisements and sell products.  Right of Publicity and copyright considerations can simultaneously be implicated in a single usage. An advertisement featuring a celebrity’s picture may require authorization from the photographer for the copyright use, and from the celebrity for the Right of Publicity use.
  • 9. RoP Examples  Midler v. Ford Motor Co. 849 F.2d 460 (9th Cir. 1989) and Waits v. Frito-Lay, Inc. 978 F.2d 1093 (9th Cir. 1992) - Bette Midler and Tom Waits declined to lend their distinctive voices to advertising jingles. Advertisers found sound-alike performers.  White v. Samsung Electronics America, Inc., 971 F.2d 1395 (9th Cir. 1992). Samsung utilized a robot that looked and acted like Vanna White of ―Wheel of Fortune.‖ This usage was an infringement because Samsung had deliberately pawned the image and popularity of White and because White was readily identifiable from the context of the use.  Infringing a celebrity’s Right of Publicity can be a costly error  the ability to control commercialization in the first place is as much a policy objective of the Right of Publicity as is providing revenue streams for the rightful recipient.
  • 10. Social Media Policies  A social media policy is a corporate code of conduct that provides guidelines for employees who post content on the Internet either as part of their job or as a private person.  The goal of a social media policy is to set expectations for appropriate behavior and ensure that an employee's posts will not expose the company to legal problems or public embarrassment.  Range from specific to general – depends on the culture of the organization
  • 11. NLRB & Social Media Lawsuits  According to the U.S. Chamber of Commerce, there is a rising number of cases before the NLRB questioning an employer’s ―overbroad‖ policies restricting use of social media and those of an employer that unlawfully discharged or disciplined an employee over contents of social media posts.  Employers must take appropriate precautionary steps. Circulate and maintain an updated employee handbook that not only identifies the ground rules governing the workplace, but also addresses the new challenges presented by mobile technologies and social media.  The considerable threats for employers posed by an employee’s use of social media include suits involving defamation, First Amendment considerations, privacy, confidentiality and trade secrets, hiring and training concerns, online harassment — not to mention potential loss of business or bad press.
  • 12. Stolen Identity  Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.  Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
  • 13. Stolen Identity Remedies According to the FTC:  Place a fraud alert on your credit reports, and review your reports.  Close the accounts that you know, or believe, have been tampered with or opened fraudulently.  File a report with your local police or the police in the community where the identity theft took place.  File a complaint with the Federal Trade Commission.
  • 14. Impersonation/ Personality Theft  An impersonator is someone who imitates or copies the behavior or actions of another.  Examples might be illegal immigrants, people hiding from creditors or other individuals, or those who simply want to become "anonymous" for personal reasons.  Another example are posers, a label given to people who use somebody else’s photos and information through social networking sites. Mostly, posers create believable stories involving friends of the real person they are imitating.  No punishable crime, might just be classified as a ―hoax.‖
  • 15. Cybersquatting  Registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.  Some cybersquatters put up derogatory remarks about the person or company the domain is meant to represent in an effort to encourage the subject to buy the domain from them
  • 16. Cybersquatting Remedies  Domain name disputes involving alleged bad-faith registration are typically resolved using the Uniform Domain Name Resolution Policy (UDRP) process developed by the Internet Corporation for Assigned Names and Numbers (ICANN).  Under UDRP policy, successful complainants can have the names deleted or transferred to their ownership.  Under the ACPA (Anticybersquatting Consumer Protection Act) a cybersquatter can be held liable for actual damages or statutory damages in the amount of a maximum of $100,000 for each name found to be in violation, although application of this act in the form of actual fines assessed are few in number.
  • 17. Question & Answer