SlideShare uma empresa Scribd logo
1 de 22
The Legal Traps and Pitfalls
   Introduction
   Fundraising
   Social media
    ◦ Trademark
    ◦ Defamation
   Minors
   CAN SPAM Act
    ◦ E-mail Marketing
   Online giving accounted for $4-6 billion in
    donations last year in US alone
   Social networks and blogs/websites are the
    fourth most popular online activities
   Email is falling behind Social networks as
    method of exchanging and sharing
    information
   Average age of online donors is rising each
    year
   The average gift size among nonprofits grew
    from $56 to $60


   Online gifts are larger than the average gift
    from traditional channels
“Organizations and web designers must be
   aware that the traditional rules with respect
      to prohibitions on providing particular
    services, treatment of advertising income,
  sales activity, as well as lobbying restrictions
          still apply to website activities.”

2000 EO CPE at 140.
   Tax-exempts are not exempt from all taxes, only
    from those taxes that would otherwise apply to
    income received from activities that are substantially
    related to their exempt purposes.
   On-line Charity Malls
    ◦ % of purchase price goes to charity



   Virtual Storefronts
    ◦ Section 513(c) Fragmentation Rule
      IRS will review each piece of merchandise
◦ Trademark
  Seek permission
  Avoid using other’s trademarks

◦ Copyright
  Who owns the work
  Monitor for misuse
  Use symbols
   Obtain Licenses from All Authors and
    Speakers
    ◦ Video
    ◦ Text

   Applies to All Intellectual Property
    ◦ Text, Graphics, Photos, Video
   Adopt a standard policy and practice for all to
    sign

   All authors sign standard agreements
    ◦ Obtain right to publish AND post online

   Speakers grant rights to post online
   Defamation
    ◦ Comments made by others can be attributed to
      organization (Cisco Systems lawsuit)
    ◦ Protections
        Federal Communications Decency Act §230
        Disclaimers and terms of use
        Take-down policy
        Refrain from commenting on third-party posts
        Consider available screening capabilities
   Develop club policy that addresses permissible use
   Monitoring
   Reserve right to remove content and comments,
    block users, etc


   Our community is an echo of our voice…we
    must set the tone.
◦   Antitrust
◦   Defamation
◦   Contributory Copyright Infringement
◦   Political Activity
◦   Providing or promoting “Professional” Advice
   Emails that advertise or promote a
    commercial product or service, such as
    membership in the organization or the sale of
    organization publications, events, etc.

   Members generally excluded
   Give clear notice of opportunity to opt-out.

    ◦ MUST be in every email message.
   Provide a functioning opt-out in every email message. This
    can be a return email address or other Internet-based
    mechanism that is capable of receiving opt-out requests for
    at least 30 days after the transmission of the original
    message.
   Further, if the recipient has opted-out, the sender may not
    exchange or otherwise transfer or release the email address
    of the recipient even within the club.
   Email service protects Club from fines and other liabilities.
   Constant Contact, easy to use, protects us.
   Provide a valid physical postal address of the
    sender.

   Clear and conspicuous notice that email is a
    solicitation

   Make sure the "from" line accurately and
    clearly reflects the sender.

   Use a valid subject line directly related to
    content.
   Photo Subject holds rights of publicity
•   get release from parent or guardian before use
    photo beyond consent.
•   consider children’s issues on Internet.

   Gain rights for all future uses
1.   Children’s Online Privacy Protection Act of
     1998 (COPPA)
     • Collection of PII directly from a minor (children
       under 13)
     • Collecting and storing Personally Identifiable
       Information
1. Know when consent of the PARENT/GUARDIAN is
   required
2. Know when consent of the ANOTHER SUPERVISING
   ADULT is sufficient
3. Know when no parental/guardian consent is
   required
4. Disclose your privacy policy
5. Know the proper use of online communications
6. Allow for refusal to participate at any time
 Obtain from everyone in film/video.
     Make sure you have all people and possible, future rights needed.
     Photo participant release; Photographer release

   Privacy Rights: separate from commercial use (invasion of privacy
    could apply to putting someone’s picture on the Internet).
   Draft a privacy protection policy:
    What personal information is being gathered about user
    How the information will be used
    Who the information will be shared with, if anyone
    Choices available regarding how collected information is
    used
    Safeguards in place to protect the information from loss,
    misuse, or alteration
    How user can update or correct inaccuracies in his or
    her information.
    Provide mechanism for consent, access and correction.

Mais conteúdo relacionado

Mais procurados

Legal Ethics of Social Media (PA)
Legal Ethics of Social Media (PA)Legal Ethics of Social Media (PA)
Legal Ethics of Social Media (PA)Edward Lanza
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
Top 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsTop 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsDeborah Gonzalez, Esq.
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicyAnkit Juneja
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Crew
 
Int Safety
Int SafetyInt Safety
Int SafetyMrsMac9
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009Susan Lyon-Hintze
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaNiki Avraam
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Dave Shannon
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Mediajlipsey
 
Linkedin policy primer
Linkedin policy primerLinkedin policy primer
Linkedin policy primerAnna Dobos
 

Mais procurados (20)

Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Legal Ethics of Social Media (PA)
Legal Ethics of Social Media (PA)Legal Ethics of Social Media (PA)
Legal Ethics of Social Media (PA)
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
It act cases
It act casesIt act cases
It act cases
 
Top 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsTop 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent Consultants
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicy
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Int Safety
Int SafetyInt Safety
Int Safety
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social Media
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
My protection plan
My protection planMy protection plan
My protection plan
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Media
 
Linkedin policy primer
Linkedin policy primerLinkedin policy primer
Linkedin policy primer
 

Destaque

Internet Intermediaries Liability
Internet Intermediaries LiabilityInternet Intermediaries Liability
Internet Intermediaries LiabilityCedric Manara
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider LiabilityAndres Guadamuz
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Likan Patra
 
Internet service provider
Internet service providerInternet service provider
Internet service providerloizazeptania
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider pptPutri Sanuria
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Providerhazirma
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Cedric Manara
 
Media law for today
Media law for todayMedia law for today
Media law for todayMartin Hirst
 
The Evolution of Social Media
The Evolution of Social MediaThe Evolution of Social Media
The Evolution of Social MediaJoshua Lyons
 
Internet Viral Marketing
Internet Viral MarketingInternet Viral Marketing
Internet Viral MarketingNextBee Media
 
Internet Bad Honnef 2010
Internet Bad Honnef 2010Internet Bad Honnef 2010
Internet Bad Honnef 2010Jan Schmidt
 
Josema Cavanillas: An industry view on Future Internet Businesses
Josema Cavanillas: An industry view on Future Internet BusinessesJosema Cavanillas: An industry view on Future Internet Businesses
Josema Cavanillas: An industry view on Future Internet BusinessesFIA2010
 
Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...
Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...
Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...Gerd Leonhard
 
A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceIJCNCJournal
 

Destaque (20)

Internet Intermediaries Liability
Internet Intermediaries LiabilityInternet Intermediaries Liability
Internet Intermediaries Liability
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
 
Internet services
Internet servicesInternet services
Internet services
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?
 
Isp
IspIsp
Isp
 
Media law for today
Media law for todayMedia law for today
Media law for today
 
Liabilities management
Liabilities managementLiabilities management
Liabilities management
 
The Evolution of Social Media
The Evolution of Social MediaThe Evolution of Social Media
The Evolution of Social Media
 
Media law
Media lawMedia law
Media law
 
Internet segura 2010
Internet segura 2010Internet segura 2010
Internet segura 2010
 
Internet Viral Marketing
Internet Viral MarketingInternet Viral Marketing
Internet Viral Marketing
 
Internet Bad Honnef 2010
Internet Bad Honnef 2010Internet Bad Honnef 2010
Internet Bad Honnef 2010
 
Josema Cavanillas: An industry view on Future Internet Businesses
Josema Cavanillas: An industry view on Future Internet BusinessesJosema Cavanillas: An industry view on Future Internet Businesses
Josema Cavanillas: An industry view on Future Internet Businesses
 
Blackstock wo t 2011
Blackstock wo t 2011Blackstock wo t 2011
Blackstock wo t 2011
 
Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...
Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...
Next 5 years in Social Media / Naechsten 5 Jahre in Social Media (in German l...
 
A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performance
 

Semelhante a Internet Liabilities Presentation

Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...iof_events
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationKerry Rego
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email MarketingBlue Sky Factory
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...lorrainefleck
 
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff SchultzThe Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff SchultzThe Net Impact
 
Legislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowLegislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowKaley Perkins, MA
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStart Pad
 
Privacy Policy FAQ
Privacy Policy FAQPrivacy Policy FAQ
Privacy Policy FAQtermsfeed
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeStacey Burke
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace AlphaStaff
 
eec Global_Compliance_Jan_27_2016-Final
eec Global_Compliance_Jan_27_2016-Finaleec Global_Compliance_Jan_27_2016-Final
eec Global_Compliance_Jan_27_2016-FinalTokusoudeka
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media PolicyMRDC1230
 
Com 558_Internet Privacy Concerns
Com 558_Internet Privacy ConcernsCom 558_Internet Privacy Concerns
Com 558_Internet Privacy Concernsmbuitrago13
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdfAbel Mutize
 

Semelhante a Internet Liabilities Presentation (20)

Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
 
Fundraising On The Internet
Fundraising On The InternetFundraising On The Internet
Fundraising On The Internet
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email Marketing
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
 
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff SchultzThe Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Legislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowLegislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to Know
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Privacy Policy FAQ
Privacy Policy FAQPrivacy Policy FAQ
Privacy Policy FAQ
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace
 
eec Global_Compliance_Jan_27_2016-Final
eec Global_Compliance_Jan_27_2016-Finaleec Global_Compliance_Jan_27_2016-Final
eec Global_Compliance_Jan_27_2016-Final
 
E commerce
E commerce E commerce
E commerce
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media Policy
 
Com 558_Internet Privacy Concerns
Com 558_Internet Privacy ConcernsCom 558_Internet Privacy Concerns
Com 558_Internet Privacy Concerns
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdf
 

Mais de Shannon Evans

Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...
Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...
Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...Shannon Evans
 
Waypoint Project Update - Sept 2012
Waypoint Project Update - Sept 2012Waypoint Project Update - Sept 2012
Waypoint Project Update - Sept 2012Shannon Evans
 
Rotary website slides pre capital campaign
Rotary website slides pre   capital campaignRotary website slides pre   capital campaign
Rotary website slides pre capital campaignShannon Evans
 
The Waypoint Project Brochure
The Waypoint Project BrochureThe Waypoint Project Brochure
The Waypoint Project BrochureShannon Evans
 
Bainbridge Rotary and Our History on the Island - 1960's
Bainbridge Rotary and Our History on the Island - 1960'sBainbridge Rotary and Our History on the Island - 1960's
Bainbridge Rotary and Our History on the Island - 1960'sShannon Evans
 
International Projects in Central America - Bainbridge Island Rotary
International Projects in Central America - Bainbridge Island RotaryInternational Projects in Central America - Bainbridge Island Rotary
International Projects in Central America - Bainbridge Island RotaryShannon Evans
 
Auction 1960 feature article
Auction  1960 feature articleAuction  1960 feature article
Auction 1960 feature articleShannon Evans
 
Facebook: How to follow club pages
Facebook: How to follow club pagesFacebook: How to follow club pages
Facebook: How to follow club pagesShannon Evans
 
Rotary Bainbridge Island and Social Media
Rotary Bainbridge Island and Social MediaRotary Bainbridge Island and Social Media
Rotary Bainbridge Island and Social MediaShannon Evans
 
Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11Shannon Evans
 
Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11Shannon Evans
 
Bi rotary in ethiopia
Bi rotary in ethiopiaBi rotary in ethiopia
Bi rotary in ethiopiaShannon Evans
 

Mais de Shannon Evans (15)

Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...
Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...
Bainbridge Island Library and Bainbridge Island Rotary Auction - a 50 Year Fr...
 
Waypoint Project Update - Sept 2012
Waypoint Project Update - Sept 2012Waypoint Project Update - Sept 2012
Waypoint Project Update - Sept 2012
 
Rotary website slides pre capital campaign
Rotary website slides pre   capital campaignRotary website slides pre   capital campaign
Rotary website slides pre capital campaign
 
The Waypoint Project Brochure
The Waypoint Project BrochureThe Waypoint Project Brochure
The Waypoint Project Brochure
 
Bainbridge Rotary and Our History on the Island - 1960's
Bainbridge Rotary and Our History on the Island - 1960'sBainbridge Rotary and Our History on the Island - 1960's
Bainbridge Rotary and Our History on the Island - 1960's
 
International Projects in Central America - Bainbridge Island Rotary
International Projects in Central America - Bainbridge Island RotaryInternational Projects in Central America - Bainbridge Island Rotary
International Projects in Central America - Bainbridge Island Rotary
 
Auction 1960 feature article
Auction  1960 feature articleAuction  1960 feature article
Auction 1960 feature article
 
Facebook: How to follow club pages
Facebook: How to follow club pagesFacebook: How to follow club pages
Facebook: How to follow club pages
 
Rotary Bainbridge Island and Social Media
Rotary Bainbridge Island and Social MediaRotary Bainbridge Island and Social Media
Rotary Bainbridge Island and Social Media
 
Path to Presidency
Path to PresidencyPath to Presidency
Path to Presidency
 
Electing a congress
Electing a congressElecting a congress
Electing a congress
 
Preemie hat pattern
Preemie hat patternPreemie hat pattern
Preemie hat pattern
 
Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11
 
Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11Pals space promo flyer 10 20-11
Pals space promo flyer 10 20-11
 
Bi rotary in ethiopia
Bi rotary in ethiopiaBi rotary in ethiopia
Bi rotary in ethiopia
 

Último

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Internet Liabilities Presentation

  • 1. The Legal Traps and Pitfalls
  • 2. Introduction  Fundraising  Social media ◦ Trademark ◦ Defamation  Minors  CAN SPAM Act ◦ E-mail Marketing
  • 3. Online giving accounted for $4-6 billion in donations last year in US alone  Social networks and blogs/websites are the fourth most popular online activities  Email is falling behind Social networks as method of exchanging and sharing information  Average age of online donors is rising each year
  • 4. The average gift size among nonprofits grew from $56 to $60  Online gifts are larger than the average gift from traditional channels
  • 5. “Organizations and web designers must be aware that the traditional rules with respect to prohibitions on providing particular services, treatment of advertising income, sales activity, as well as lobbying restrictions still apply to website activities.” 2000 EO CPE at 140.
  • 6. Tax-exempts are not exempt from all taxes, only from those taxes that would otherwise apply to income received from activities that are substantially related to their exempt purposes.
  • 7. On-line Charity Malls ◦ % of purchase price goes to charity  Virtual Storefronts ◦ Section 513(c) Fragmentation Rule  IRS will review each piece of merchandise
  • 8. ◦ Trademark  Seek permission  Avoid using other’s trademarks ◦ Copyright  Who owns the work  Monitor for misuse  Use symbols
  • 9. Obtain Licenses from All Authors and Speakers ◦ Video ◦ Text  Applies to All Intellectual Property ◦ Text, Graphics, Photos, Video
  • 10. Adopt a standard policy and practice for all to sign  All authors sign standard agreements ◦ Obtain right to publish AND post online  Speakers grant rights to post online
  • 11. Defamation ◦ Comments made by others can be attributed to organization (Cisco Systems lawsuit) ◦ Protections  Federal Communications Decency Act §230  Disclaimers and terms of use  Take-down policy  Refrain from commenting on third-party posts  Consider available screening capabilities
  • 12. Develop club policy that addresses permissible use  Monitoring  Reserve right to remove content and comments, block users, etc  Our community is an echo of our voice…we must set the tone.
  • 13. Antitrust ◦ Defamation ◦ Contributory Copyright Infringement ◦ Political Activity ◦ Providing or promoting “Professional” Advice
  • 14.
  • 15. Emails that advertise or promote a commercial product or service, such as membership in the organization or the sale of organization publications, events, etc.  Members generally excluded
  • 16. Give clear notice of opportunity to opt-out. ◦ MUST be in every email message.  Provide a functioning opt-out in every email message. This can be a return email address or other Internet-based mechanism that is capable of receiving opt-out requests for at least 30 days after the transmission of the original message.  Further, if the recipient has opted-out, the sender may not exchange or otherwise transfer or release the email address of the recipient even within the club.  Email service protects Club from fines and other liabilities.  Constant Contact, easy to use, protects us.
  • 17. Provide a valid physical postal address of the sender.  Clear and conspicuous notice that email is a solicitation  Make sure the "from" line accurately and clearly reflects the sender.  Use a valid subject line directly related to content.
  • 18. Photo Subject holds rights of publicity • get release from parent or guardian before use photo beyond consent. • consider children’s issues on Internet.  Gain rights for all future uses
  • 19. 1. Children’s Online Privacy Protection Act of 1998 (COPPA) • Collection of PII directly from a minor (children under 13) • Collecting and storing Personally Identifiable Information
  • 20. 1. Know when consent of the PARENT/GUARDIAN is required 2. Know when consent of the ANOTHER SUPERVISING ADULT is sufficient 3. Know when no parental/guardian consent is required 4. Disclose your privacy policy 5. Know the proper use of online communications 6. Allow for refusal to participate at any time
  • 21.  Obtain from everyone in film/video.  Make sure you have all people and possible, future rights needed.  Photo participant release; Photographer release  Privacy Rights: separate from commercial use (invasion of privacy could apply to putting someone’s picture on the Internet).
  • 22. Draft a privacy protection policy: What personal information is being gathered about user How the information will be used Who the information will be shared with, if anyone Choices available regarding how collected information is used Safeguards in place to protect the information from loss, misuse, or alteration How user can update or correct inaccuracies in his or her information. Provide mechanism for consent, access and correction.