SlideShare a Scribd company logo
1 of 43
Download to read offline
SOCIAL MEDIA LAW
Presented for
MENG
Marketing Executives Networking Group
It is Real and,Yes,
Really Can ImpactYour Business
2www.brittontuma.com
Shawn Tuma, Partner
BrittonTuma
Shops at Legacy, Plano,TX
469.635.1335
stuma@brittontuma.com
@shawnetuma
blog: shawnetuma.com
web: brittontuma.com
ShawnTuma is a lawyer whose practice is focused on cutting-edge cyber and
information law and includes issues like social media and emerging
technology and helping businesses defend their data and intellectual
property against computer fraud, data breaches, hacking, corporate
espionage, and insider theft. Shawn stays very active in the cyber and
information law communities:
 Best Lawyers in Dallas 2014, D Magazine (Digital Information Law)
 Chair, Collin County Bar AssociationCivil Litigation & Appellate Section
 Council Member, State Bar ofTexas Computer &Technology Section
 College of the State Bar ofTexas
 Privacy and Data Security Committee of the State Bar ofTexas
 Litigation, Intellectual Property, and Business Sections of the State Bar ofTexas
 Information Security Committee of the Section on Science &Technology
Committee of the American Bar Association
 Social Media Committee of the American Bar Association
 NorthTexas Crime Commission,Cybercrime Committee
 International Association of Privacy Professionals
The information provided is for educational purposes only, does not constitute legal
advice, and no attorney-client relationship is created by this presentation.
3www.brittontuma.com
I am a lawyer
 what I say today as well as the slide presentation are
for educational purposes only and not intended to
be legal advice and should not be relied on as such
 this does not create an attorney-client relationship
4
5
1. Can I be sued for [x, y, or z]?
2. Is the risk of using social media worth it?
www.brittontuma.com
Yes!
Law + Social Media = PeacefulCoexistence
6
Today I want to:
 help find an acceptable balance
 educate you on risks of using social media, along with
other digital business risks
 show you some ways to help minimize those risks
 Remember: social media is a tool – what you say and
do is much like “real life”
 Use common sense!
 Of course use social media – but use it properly!
www.brittontuma.com
7
WHAT IS
SOCIAL MEDIA LAW?
8
Social Media Law:
The law that applies to and
governs the use of social media.
(was that all you really wanted to know?)
www.brittontuma.com
9
Social Media Law:
 inherent risks
 natural tension between promoters v. risk
management in business
 BUT!!!
 I am “sold out” on social media and an avid
user … and I don’t want to get sued either …
www.brittontuma.com
10
2 GeneralTypes of Law
 Codes: legislatures create specific laws to
address specific problems
 Common Law: judges look to general
principles of law and, by using reason,
apply those principles to resolve
previously unforeseen problems
www.brittontuma.com
11
Legislatures want to keep up
 impossible
 speed technology is evolving
 speed culture and business environment changing
 legislature too slow
Example:
• Spring 2012 - big ruckus was prospective
employers asking for social media logins –
the massive public outcry made it such
that within months nobody in their right
mind would do that
• Aug 2014: 20+ state passed or pending
legislation prohibiting
www.brittontuma.com
12www.brittontuma.com
13
Look to Common Law
 contract law
 intellectual property law
 torts – defamation
 regulatory law
 employment law
 evidence law
www.brittontuma.com
14
You can’t protect against what you
don’t know, so let’s apply this “law
stuff” to the real world …
www.brittontuma.com
15
Who uses social media for marketing?
 do you want to give your marketing efforts to
your competitor?
 who really owns the accounts?
 followers / connections?
 each service or site has a contract
 contract law
 Case Study: PhoneDog v. Kravitz
www.brittontuma.com
16
“an ounce of prevention is worth a pound of cure”
 PhoneDog = employer; Kravitz = employee (product reviewer / blogger)
 Kravitz = @PhoneDog_Noah had 17,000 followers
 Kravitz resigned, refused to turn over hisTwitter account, changed handle
to @noahkravitz and grew to 24,000 followers
 PhoneDog sued (7/15/11), heavy litigation, settled (12/12) = 1.5 yrs of fees &
Kravitz still has @noahkravitz
 THETAKEAWAY: Every company needs a contractual agreement that
clearly states who owns social media accounts used on behalf of the
company. It is that simple. Such an agreement can usually be included in an
employee handbook, employment policies, or a social media policy.The
cost of such an agreement will likely be cheaper than the very first day of
litigation if a dispute arises over that issue.
www.brittontuma.com
17
Who has trade secrets, confidential and
proprietary information?
 do you want to tell your competitors?
 customer / vendor lists
 who are you talking to or following?
 secret business alliances, strategies, plans
 business situational awareness
 intellectual property law
 Case Study: Geolocation data
www.brittontuma.com
18
 2007 – fleet ofAH-64 Apache helicopters
 Soldiers’ photos had geotags with exact
coordinates
 Insurgents used geotag coordinates for a
mortar attack that destroyed 4
 US Military uses
 Malaysia Airlines Flight 17
 So do businesses!
www.brittontuma.com
source: http://defensetech.org/2012/03/15/insurgents-used-cell-phone-geotags-to-destroy-ah-64s-in-iraq/
20
Who wants to get sued?
 infringement of trademark
 right to publicity
 name, voice, signature, photo, likeness (statutory after death)
 common law while living if for value
 commercial v. educational or newsworthy
 audience picture v. company promo video
 infringement of copyright
 attribution isn’t enough
 DMCATakedown Request
 Google penalizes for too many
 must have a license or use creative commons
 intellectual property lawwww.brittontuma.com
21
Copyright Example
www.brittontuma.com
Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html
License:
Creative Commons
Attribution 3.0
22
Who wants to get sued some more?
 what you (and your employees) say can hurt you!
Case Study: Bland v. Roberts – “Like” = 1st Amendment
 tortious interference
 defamation (libel, slander, bus. defamation)
 false advertising & false warranties
 fraud & negligent misrepresentation
 online impersonation
 harassment and cyber-bullying
 “puffery” of facts
www.brittontuma.com
23
Who wants to be investigated by the Feds?
 FTC – deceptive trade practices
 Investigated Hyundai for not disclosing incentives given to
bloggers for endorsements.
 Google (Fed. Ct. in Oracle v. Google)
 HHS & OCR – could have investigated hospital worker who
posted patient “PHI” on Facebook (“Funny, but this patient
came in to cure herVD and get birth control.”)
 SEC – false statements in raising funds (SEC v. Imperia Invest.
IBC) or insider information  “Board meeting. Good
numbers=Happy Board.” before official release
 regulatory law
www.brittontuma.com
24
Specific trouble spots for marketers?
 Giveaways and contests can be trouble for many
reasons – do not do them on social media
without having it thoroughly vetted
 some sites’TOS prohibit
 jurisdiction gambling and contest rules
 Example: Facebook’s PageTerms
www.brittontuma.com
25www.brittontuma.com
26
What if someone is talking bad
about your business on social
media?
 defamation rules apply online
 but …
 the “Streisand Effect”
 anti-SLAPP (Strategic LawsuitsAgainst
Public Participation)
 ≠ assign copyright of reviews
 ≠ charge $500 per bad review
www.brittontuma.com
27
Guess what will be used against you?
 social media is evidence – very powerful evidence!
 electronically stored information (“ESI”) is becoming
the most useful form of evidence in virtually every
kind of lawsuit and investigation
 we now have complete records of 2-way
communication stream – like all calls recorded!
 you don’t “own” your tweets! (“If you post a tweet, just like
if you scream it out the window, there is no reasonable
expectation of privacy.” State of N.Y. v. Harris)
 4th Am. ≠ protect Facebook posts (U.S. v. Meregildon,
Aug. 10, 2012)
www.brittontuma.com
28www.brittontuma.com
• “The law has a right to every man’s evidence.”
• Courts look to social media for public posts, private
messages, “Likes”, etc.
• Club’s SM before Cowboys’ Josh Brent wreck killing Jerry Brown:
“I have 12 #Cowboys in theeee building!!!!!!!!!! #Privae” …
“These fools buying Ace on top of Ace!!!!!!!”
• Danielle Saxton’s Facebook “selfie” wearing stolen merchandise
– easy evidence!
• Daughter’s $80,000 Facebook “brag”
• If litigation is anticipated -
• cannot permanently delete account, may be able to “take down”
• cannot selectively delete posts
29
MINIMIZING THE
RISKS OF SOCIAL
MEDIA IN BUSINESS
30
• Monitor, Regulate & Archive SM
 Necessary if regulated industry
 finance, insurance, energy & utilities, healthcare,
government, legal
 Wise for others
• Do not delete if in litigation (archiving may
be an option)
• Document Retention Policy
www.brittontuma.com
31
In general you want to
 recognize and appreciate potential issues
 decide how to handle those issues
 educate your team on those issues
 collaborate and train on how to comply with and
resolve issues
 create and outline procedures for using social
media
 monitor (to some degree) to ensure compliance
www.brittontuma.com
32
Social media policies are a “must have”
 ounce of prevention: less than 1 day of litigation
 if have, must enforce
 trying to predict issues – but evolving – can’t get all
 contractually resolve issues such as ownership and
authority
 great opportunity to set rules and document expectations
 greater opportunity to explain and ensure understanding
of expectations
 put on notice of monitoring – and actually monitor!
 should address employment issues
www.brittontuma.com
33
Employment Issues
 using social media in hiring
 best to have set criteria with neutral third
party investigate for criteria
 not use to discriminate
 e.g., snooping to find race, gender, age, disability,
pregnancy
 e.g., search for candidates onTwitter where
disproportionate number of people <40 yrs. onTwitter,
may violate the Age Discrimination in EmploymentAct
 requesting social media login information
www.brittontuma.com
34
Employment Issues
 using personal social media during work
 can be prohibited
 may prohibit using or disclosing company IP for
personal SM
 may prohibit using company info for setting up
personal SM accounts
www.brittontuma.com
35
You need social media policies but the National
Labor Relations Board is making it difficult
 NLRB jurisdiction = impacts interstate commerce
 National Labor RelationsAct (NLRA) sec. 7 gives employees
right to engage in “concerted activities for the purpose of …
mutual aid and protection”
 NLRB finds illegal any policy provision that (a) restricts or (b)
an employee would reasonably construe to chill concerted
activities
 On 5/30/12 NLRB General Counsel issued its 3rd Report on
Social Media Policies in 1 year period (8/11 & 1/12)
 Has continued – with several since then
www.brittontuma.com
36
Can you guess who the NLRB is pulling for?
 making it very difficult for businesses to protect
themselves
 social media policies must now be carefully tailored
to
 address unique business and legal needs of your business
 be enforceable and lawful in a court of law
 be legal in the eyes of the NLRB
 Examples of provisions found illegal by NLRB
www.brittontuma.com
37www.brittontuma.com
38www.brittontuma.com
39www.brittontuma.com
40www.brittontuma.com
41
What is the NLRB really looking for?
 clarity and precision
 examples of do’s and don’ts that give
context and real-life meaning to the rules
www.brittontuma.com
42
Cyber Insurance
 If you are doing anything in cyberspace, you need it.
Period.
 Most traditional insurance does not cover cyber-events,
even if you think it does (really!)
 Cyber-Insurance is relatively inexpensive
 Most policies come include a cyber-risk audit before the
policies are underwritten
 Policies can cover social media risk, computer fraud risk,
and data breach / hacking risk
www.brittontuma.com
43www.brittontuma.com
 social media is wonderful!
 must find proper balance
 need a social media policy
 address unique business and legal needs of your business
 be enforceable and lawful in a court of law
 be legal in the eyes of the NLRB
 need to enforce social media policy
 need to spend time with employees to help them
understand and possibly collaborate on the rules
 need to look at cyber-insurance!
44www.brittontuma.com

More Related Content

What's hot

Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationKerry Rego
 
Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Shawn Tuma
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineAllen Matkins
 
Social Media
Social MediaSocial Media
Social Mediaclggibson
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationKenneth Ronkowitz
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsAmy Shriner
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadashibrah76
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and BeyondAlexNemiroff
 
Employment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceEmployment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceThe Organic Agency
 

What's hot (20)

Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Social media and intellectual property
Social media and intellectual propertySocial media and intellectual property
Social media and intellectual property
 
Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
 
Social Media
Social MediaSocial Media
Social Media
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Nokia LTA Web 20 Legal Issues
Nokia LTA Web 20 Legal IssuesNokia LTA Web 20 Legal Issues
Nokia LTA Web 20 Legal Issues
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data Security
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
Employment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceEmployment Law - Social Media in the Workplace
Employment Law - Social Media in the Workplace
 

Similar to Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - Webinar for MENG (Marketing Executives Networking Group)

Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentationMelfi Associates
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social MediaDavid Cain
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeStacey Burke
 
Stanford Supplement Essay What Matters To You
Stanford Supplement Essay What Matters To YouStanford Supplement Essay What Matters To You
Stanford Supplement Essay What Matters To YouJacqueline Simpson
 
8 Samples Of College Application Essay Format (
8 Samples Of College Application Essay Format (8 Samples Of College Application Essay Format (
8 Samples Of College Application Essay Format (Rajee Dent
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forMcPhearson TVHolden
 
Citizens United Presentation
Citizens United PresentationCitizens United Presentation
Citizens United Presentationpapease
 
"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!Shawn Tuma
 
My Father Influence Essays
My Father Influence EssaysMy Father Influence Essays
My Father Influence EssaysShannon Morris
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to KnowIronCore Labs
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)Matthew Asbell
 

Similar to Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - Webinar for MENG (Marketing Executives Networking Group) (20)

Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Stanford Supplement Essay What Matters To You
Stanford Supplement Essay What Matters To YouStanford Supplement Essay What Matters To You
Stanford Supplement Essay What Matters To You
 
8 Samples Of College Application Essay Format (
8 Samples Of College Application Essay Format (8 Samples Of College Application Essay Format (
8 Samples Of College Application Essay Format (
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...
(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...
(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Citizens United Presentation
Citizens United PresentationCitizens United Presentation
Citizens United Presentation
 
"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
My Father Influence Essays
My Father Influence EssaysMy Father Influence Essays
My Father Influence Essays
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 

More from Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital EngagementShawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 

More from Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Recently uploaded

Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理F La
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 

Recently uploaded (20)

Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 

Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - Webinar for MENG (Marketing Executives Networking Group)

  • 1. SOCIAL MEDIA LAW Presented for MENG Marketing Executives Networking Group It is Real and,Yes, Really Can ImpactYour Business
  • 2. 2www.brittontuma.com Shawn Tuma, Partner BrittonTuma Shops at Legacy, Plano,TX 469.635.1335 stuma@brittontuma.com @shawnetuma blog: shawnetuma.com web: brittontuma.com ShawnTuma is a lawyer whose practice is focused on cutting-edge cyber and information law and includes issues like social media and emerging technology and helping businesses defend their data and intellectual property against computer fraud, data breaches, hacking, corporate espionage, and insider theft. Shawn stays very active in the cyber and information law communities:  Best Lawyers in Dallas 2014, D Magazine (Digital Information Law)  Chair, Collin County Bar AssociationCivil Litigation & Appellate Section  Council Member, State Bar ofTexas Computer &Technology Section  College of the State Bar ofTexas  Privacy and Data Security Committee of the State Bar ofTexas  Litigation, Intellectual Property, and Business Sections of the State Bar ofTexas  Information Security Committee of the Section on Science &Technology Committee of the American Bar Association  Social Media Committee of the American Bar Association  NorthTexas Crime Commission,Cybercrime Committee  International Association of Privacy Professionals The information provided is for educational purposes only, does not constitute legal advice, and no attorney-client relationship is created by this presentation.
  • 3. 3www.brittontuma.com I am a lawyer  what I say today as well as the slide presentation are for educational purposes only and not intended to be legal advice and should not be relied on as such  this does not create an attorney-client relationship
  • 4. 4
  • 5. 5 1. Can I be sued for [x, y, or z]? 2. Is the risk of using social media worth it? www.brittontuma.com Yes! Law + Social Media = PeacefulCoexistence
  • 6. 6 Today I want to:  help find an acceptable balance  educate you on risks of using social media, along with other digital business risks  show you some ways to help minimize those risks  Remember: social media is a tool – what you say and do is much like “real life”  Use common sense!  Of course use social media – but use it properly! www.brittontuma.com
  • 8. 8 Social Media Law: The law that applies to and governs the use of social media. (was that all you really wanted to know?) www.brittontuma.com
  • 9. 9 Social Media Law:  inherent risks  natural tension between promoters v. risk management in business  BUT!!!  I am “sold out” on social media and an avid user … and I don’t want to get sued either … www.brittontuma.com
  • 10. 10 2 GeneralTypes of Law  Codes: legislatures create specific laws to address specific problems  Common Law: judges look to general principles of law and, by using reason, apply those principles to resolve previously unforeseen problems www.brittontuma.com
  • 11. 11 Legislatures want to keep up  impossible  speed technology is evolving  speed culture and business environment changing  legislature too slow Example: • Spring 2012 - big ruckus was prospective employers asking for social media logins – the massive public outcry made it such that within months nobody in their right mind would do that • Aug 2014: 20+ state passed or pending legislation prohibiting www.brittontuma.com
  • 13. 13 Look to Common Law  contract law  intellectual property law  torts – defamation  regulatory law  employment law  evidence law www.brittontuma.com
  • 14. 14 You can’t protect against what you don’t know, so let’s apply this “law stuff” to the real world … www.brittontuma.com
  • 15. 15 Who uses social media for marketing?  do you want to give your marketing efforts to your competitor?  who really owns the accounts?  followers / connections?  each service or site has a contract  contract law  Case Study: PhoneDog v. Kravitz www.brittontuma.com
  • 16. 16 “an ounce of prevention is worth a pound of cure”  PhoneDog = employer; Kravitz = employee (product reviewer / blogger)  Kravitz = @PhoneDog_Noah had 17,000 followers  Kravitz resigned, refused to turn over hisTwitter account, changed handle to @noahkravitz and grew to 24,000 followers  PhoneDog sued (7/15/11), heavy litigation, settled (12/12) = 1.5 yrs of fees & Kravitz still has @noahkravitz  THETAKEAWAY: Every company needs a contractual agreement that clearly states who owns social media accounts used on behalf of the company. It is that simple. Such an agreement can usually be included in an employee handbook, employment policies, or a social media policy.The cost of such an agreement will likely be cheaper than the very first day of litigation if a dispute arises over that issue. www.brittontuma.com
  • 17. 17 Who has trade secrets, confidential and proprietary information?  do you want to tell your competitors?  customer / vendor lists  who are you talking to or following?  secret business alliances, strategies, plans  business situational awareness  intellectual property law  Case Study: Geolocation data www.brittontuma.com
  • 18. 18  2007 – fleet ofAH-64 Apache helicopters  Soldiers’ photos had geotags with exact coordinates  Insurgents used geotag coordinates for a mortar attack that destroyed 4  US Military uses  Malaysia Airlines Flight 17  So do businesses! www.brittontuma.com source: http://defensetech.org/2012/03/15/insurgents-used-cell-phone-geotags-to-destroy-ah-64s-in-iraq/
  • 19. 20 Who wants to get sued?  infringement of trademark  right to publicity  name, voice, signature, photo, likeness (statutory after death)  common law while living if for value  commercial v. educational or newsworthy  audience picture v. company promo video  infringement of copyright  attribution isn’t enough  DMCATakedown Request  Google penalizes for too many  must have a license or use creative commons  intellectual property lawwww.brittontuma.com
  • 20. 21 Copyright Example www.brittontuma.com Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html License: Creative Commons Attribution 3.0
  • 21. 22 Who wants to get sued some more?  what you (and your employees) say can hurt you! Case Study: Bland v. Roberts – “Like” = 1st Amendment  tortious interference  defamation (libel, slander, bus. defamation)  false advertising & false warranties  fraud & negligent misrepresentation  online impersonation  harassment and cyber-bullying  “puffery” of facts www.brittontuma.com
  • 22. 23 Who wants to be investigated by the Feds?  FTC – deceptive trade practices  Investigated Hyundai for not disclosing incentives given to bloggers for endorsements.  Google (Fed. Ct. in Oracle v. Google)  HHS & OCR – could have investigated hospital worker who posted patient “PHI” on Facebook (“Funny, but this patient came in to cure herVD and get birth control.”)  SEC – false statements in raising funds (SEC v. Imperia Invest. IBC) or insider information  “Board meeting. Good numbers=Happy Board.” before official release  regulatory law www.brittontuma.com
  • 23. 24 Specific trouble spots for marketers?  Giveaways and contests can be trouble for many reasons – do not do them on social media without having it thoroughly vetted  some sites’TOS prohibit  jurisdiction gambling and contest rules  Example: Facebook’s PageTerms www.brittontuma.com
  • 25. 26 What if someone is talking bad about your business on social media?  defamation rules apply online  but …  the “Streisand Effect”  anti-SLAPP (Strategic LawsuitsAgainst Public Participation)  ≠ assign copyright of reviews  ≠ charge $500 per bad review www.brittontuma.com
  • 26. 27 Guess what will be used against you?  social media is evidence – very powerful evidence!  electronically stored information (“ESI”) is becoming the most useful form of evidence in virtually every kind of lawsuit and investigation  we now have complete records of 2-way communication stream – like all calls recorded!  you don’t “own” your tweets! (“If you post a tweet, just like if you scream it out the window, there is no reasonable expectation of privacy.” State of N.Y. v. Harris)  4th Am. ≠ protect Facebook posts (U.S. v. Meregildon, Aug. 10, 2012) www.brittontuma.com
  • 27. 28www.brittontuma.com • “The law has a right to every man’s evidence.” • Courts look to social media for public posts, private messages, “Likes”, etc. • Club’s SM before Cowboys’ Josh Brent wreck killing Jerry Brown: “I have 12 #Cowboys in theeee building!!!!!!!!!! #Privae” … “These fools buying Ace on top of Ace!!!!!!!” • Danielle Saxton’s Facebook “selfie” wearing stolen merchandise – easy evidence! • Daughter’s $80,000 Facebook “brag” • If litigation is anticipated - • cannot permanently delete account, may be able to “take down” • cannot selectively delete posts
  • 28. 29 MINIMIZING THE RISKS OF SOCIAL MEDIA IN BUSINESS
  • 29. 30 • Monitor, Regulate & Archive SM  Necessary if regulated industry  finance, insurance, energy & utilities, healthcare, government, legal  Wise for others • Do not delete if in litigation (archiving may be an option) • Document Retention Policy www.brittontuma.com
  • 30. 31 In general you want to  recognize and appreciate potential issues  decide how to handle those issues  educate your team on those issues  collaborate and train on how to comply with and resolve issues  create and outline procedures for using social media  monitor (to some degree) to ensure compliance www.brittontuma.com
  • 31. 32 Social media policies are a “must have”  ounce of prevention: less than 1 day of litigation  if have, must enforce  trying to predict issues – but evolving – can’t get all  contractually resolve issues such as ownership and authority  great opportunity to set rules and document expectations  greater opportunity to explain and ensure understanding of expectations  put on notice of monitoring – and actually monitor!  should address employment issues www.brittontuma.com
  • 32. 33 Employment Issues  using social media in hiring  best to have set criteria with neutral third party investigate for criteria  not use to discriminate  e.g., snooping to find race, gender, age, disability, pregnancy  e.g., search for candidates onTwitter where disproportionate number of people <40 yrs. onTwitter, may violate the Age Discrimination in EmploymentAct  requesting social media login information www.brittontuma.com
  • 33. 34 Employment Issues  using personal social media during work  can be prohibited  may prohibit using or disclosing company IP for personal SM  may prohibit using company info for setting up personal SM accounts www.brittontuma.com
  • 34. 35 You need social media policies but the National Labor Relations Board is making it difficult  NLRB jurisdiction = impacts interstate commerce  National Labor RelationsAct (NLRA) sec. 7 gives employees right to engage in “concerted activities for the purpose of … mutual aid and protection”  NLRB finds illegal any policy provision that (a) restricts or (b) an employee would reasonably construe to chill concerted activities  On 5/30/12 NLRB General Counsel issued its 3rd Report on Social Media Policies in 1 year period (8/11 & 1/12)  Has continued – with several since then www.brittontuma.com
  • 35. 36 Can you guess who the NLRB is pulling for?  making it very difficult for businesses to protect themselves  social media policies must now be carefully tailored to  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  Examples of provisions found illegal by NLRB www.brittontuma.com
  • 40. 41 What is the NLRB really looking for?  clarity and precision  examples of do’s and don’ts that give context and real-life meaning to the rules www.brittontuma.com
  • 41. 42 Cyber Insurance  If you are doing anything in cyberspace, you need it. Period.  Most traditional insurance does not cover cyber-events, even if you think it does (really!)  Cyber-Insurance is relatively inexpensive  Most policies come include a cyber-risk audit before the policies are underwritten  Policies can cover social media risk, computer fraud risk, and data breach / hacking risk www.brittontuma.com
  • 42. 43www.brittontuma.com  social media is wonderful!  must find proper balance  need a social media policy  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  need to enforce social media policy  need to spend time with employees to help them understand and possibly collaborate on the rules  need to look at cyber-insurance!