SlideShare uma empresa Scribd logo
1 de 46
SOCIAL MEDIA LAW
  The Legal Do’s and Don’ts
       of Social Media

           Presented for
   TrustPoint Management Group
          August 10, 2012
Tweet it up:

           #socialmedialaw

www.brittontuma.com                  #socialmedialaw   2
Notes
    1. Add Pictures

    2. Streamline sections – 45 minutes

    3. Insert Copyright




www.brittontuma.com                       #socialmedialaw   3
4
WHAT IS
SOCIAL MEDIA LAW?




             #socialmedialaw   5
Social Media Law:
            The law that applies to and
            governs the use of social media.

                          (was that all you really wanted to know?)




www.brittontuma.com                                  #socialmedialaw   6
Social Media Law:
         inherent risks
         natural tension between legal and marketing
         BUT!!!
         I am “sold out” on social media and an avid
          user … and I don’t want to get sued either …

www.brittontuma.com                           #socialmedialaw   7
My Goal:
        find an acceptable balance
        educate you on risks of using social media, along
         with other digital business risks
        help show you some ways to minimize those risks
        Remember: social media is a tool – what you say and
         do is much like “real life”
        “Real life” rules still apply – use your common sense!

www.brittontuma.com                                   #socialmedialaw   8
 what is social media law
              traditional areas of law incorporated
              practical examples of how they arise

        how to minimize the risk
              can’t eliminate, only minimize
              social media policies
              workplace training and guidance
              cyber-insurance

        other digital business risks
              data breach & hacking
              computer fraud / Computer Fraud and Abuse Act

        Q&A
www.brittontuma.com                                            #socialmedialaw   9
2 General Types of Law

             Codes: legislatures create specific laws to
              address specific problems

             Common Law: judges look to general
              principles of law and, by using
              reason, apply those principles to resolve
              previously unforeseen problems
www.brittontuma.com                              #socialmedialaw   10
Legislatures want to keep up
              impossible
              speed technology is evolving
              speed culture and business environment changing
              legislature too slow
                    example:
                        last spring the big ruckus was prospective
                        employers asking for social media logins –
                        the massive public outcry made it such that
                        nobody in their right mind would do that now
                        this past week, Illinois became one of 2 states
                        to enact a law prohibiting this; eff. date:
                        1/1/13

www.brittontuma.com                                            #socialmedialaw   11
www.brittontuma.com   #socialmedialaw   12
Look to Common Law
             contract law
             intellectual property law
             torts – defamation
             regulatory law
             employment law
             evidence law

www.brittontuma.com                       #socialmedialaw   13
You can’t protect against what you
        don’t know, so …




www.brittontuma.com                     #socialmedialaw   14
Who uses social media for marketing?
             do you want to give your marketing efforts to
              your competitor?
             who really owns your account
             followers / connections?
             “an ounce of prevention is worth a pound of
              cure”: PhoneDog v. Kravitz (7/15/11)
             each service or site has a contract
             contract law
www.brittontuma.com                                 #socialmedialaw   15
Who has trade secrets, confidential and
        proprietary information?
             do you want to tell your competitors?
             customer / vendor lists
                     who are you talking to or following?

             secret business alliances and strategies
             secret business initiatives and plans
             business situational awareness
             intellectual property law: trade secrets
www.brittontuma.com                                          #socialmedialaw   16
Who wants to get sued?
             infringement of trademark
             infringement of copyright
                     DMCA Takedown Request

             right to publicity
                     name, voice, signature, photo, likeness (statutory after death)
                     common law while living if for value

             must have a license or use creative commons
             intellectual property law

www.brittontuma.com                                                     #socialmedialaw   17
Who wants to get sued some more?
             what you (and your employees) say can hurt you!
             business disparagement
             tortious interference
             defamation (libel & slander)
             false advertising & false warranties
             fraud & negligent misrepresentation
             harassment and cyber-bullying
             “puffery” of facts
www.brittontuma.com                                  #socialmedialaw   18
Who wants to get investigated by the
        Feds?
               FTC – Investigated Hyundai for not disclosing incentives
                given to bloggers for endorsements.
               HHS & OCR – could have investigated hospital employee
                who posted patient pictures and “PHI” on Facebook (“it’s
                just Facebook!”)
               SEC – false statements made in raising funds (SEC v.
                Imperia Invest. IBC) or wrongful disclosures of information
               regulatory law


www.brittontuma.com                                            #socialmedialaw   19
What are some real trouble spots?
             Giveaways and contests can be trouble for many
              reasons – do not do them on social media
              without having it thoroughly vetted
                     many sites’ TOS prohibit
                     jurisdiction gambling and contest rules
             Employment issues are one of the main areas in
              which legal and general business problems arise
                     Discussed in next section



www.brittontuma.com                                             #socialmedialaw   20
Can you guess what will be used against you if
        any of these problems arise?
             social media is evidence – very powerful evidence!
             electronically stored information (“ESI”) is quickly
              becoming the most useful form of evidence
              available
             evidence from social media is now obtained and
              used in virtually every kind of lawsuit and
              investigation
             we now have complete records of 2-way
              communication stream – like all calls recorded!
www.brittontuma.com                                     #socialmedialaw   21
MINIMIZING THE
 RISKS OF SOCIAL
MEDIA IN BUSINESS




             #socialmedialaw   22
Social media policies are a “must have”
                ounce of prevention: less than 1 day of litigation
                if have, must enforce
                trying to predict issues – but evolving – can’t get all
                contractually resolve issues such as ownership and
                 authority
                great opportunity to set rules and document expectations
                greater opportunity to explain and ensure understanding
                 of expectations
                put on notice of monitoring – and actually monitor!
                should address employment issues


www.brittontuma.com                                         #socialmedialaw   23
Employment Issues
             using social media in hiring
                 best to have set criteria with neutral third
                  party investigate for criteria
                 not use to discriminate
                         e.g., snooping to find
                          race, gender, age, disability, pregnancy
                         e.g., search for candidates on Twitter where
                          disproportionate number of people <40 yrs. on
                          Twitter, may violate the Age Discrimination in
                          Employment Act

                 requesting social media login information
www.brittontuma.com                                                  #socialmedialaw   24
Employment Issues
             using social media for the company
                     scope of work for duties and times
                         e.g., overtime for weekend “Facebooking”
                     personal or company owned accounts / followers
                     familiarity and compliance with site Agreement / TOS
                     what is authorized / prohibited
                     responsibility for statements / disclosures
                     monitored
                     saying “use good judgment” is not enough!
www.brittontuma.com                                                  #socialmedialaw   25
Employment Issues
             using personal social media during work
                     can be prohibited
                     may prohibit using or disclosing company IP for
                      personal SM
                     may prohibit using company info for setting up
                      personal SM accounts




www.brittontuma.com                                             #socialmedialaw   26
You need social media policies but the National
        Labor Relations Board is making it difficult
               NLRB jurisdiction = impacts interstate commerce
               National Labor Relations Act (NLRA) sec. 7 gives employees
                right to engage in “concerted activities for the purpose of …
                mutual aid and protection”
               NLRB finds illegal any policy provision that (a) restricts or (b)
                an employee would reasonably construe to chill concerted
                activities
               On 5/30/12 NLRB General Counsel issued its 3rd Report on
                Social Media Policies in 1 year period (8/11 & 1/12)


www.brittontuma.com                                               #socialmedialaw   27
Can you guess who the NLRB is pulling for?
             making it very difficult for businesses to protect
              themselves
             social media policies must now be carefully tailored
              to
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             Examples of provisions found illegal by NLRB


www.brittontuma.com                                                 #socialmedialaw   28
www.brittontuma.com   #socialmedialaw   29
www.brittontuma.com   #socialmedialaw   30
www.brittontuma.com   #socialmedialaw   31
What is the NLRB really looking for?
             clarity and precision
             examples of do’s and don’ts that give
              context and real-life meaning to the rules




www.brittontuma.com                             #socialmedialaw   32
MINIMIZING OTHER
DIGITAL BUSINESS
      RISKS




            #socialmedialaw   33
Cyber-Insurance
               If you are doing anything in cyberspace, you need it.
                Period.
               Most traditional insurance does not cover cyber-
                events, even if you think it does (really!)
               Cyber-Insurance is relatively inexpensive
               Most policies come include a cyber-risk audit before the
                policies are underwritten
               Policies can cover social media risk, computer fraud
                risk, and data breach / hacking risk



www.brittontuma.com                                            #socialmedialaw   34
Customer Information – do you retain it on your
         system?
                 Data Breach
                 Effective 9/1/12, if you conduct business in Texas and your system
                  is breached and your customer’s unencrypted “sensitive personal
                  information” is, or is reasonably believed to have been
                  compromised, must notify all Texas residents of breach.
                 The notice must be given “as quickly as possible” and failure or
                  delay in doing so results in a fine of $100.00 per individual per day
                  (not to exceed $250,000)
                Notice may be made through written or electronic means though
                 it can be given by major media outlets if the cost of providing
                 notice exceeds $250,000 or the number of persons exceeds
                 500,000
www.brittontuma.com                                                    #socialmedialaw    35
www.brittontuma.com   #socialmedialaw   36
www.brittontuma.com   #socialmedialaw   37
Why is the Computer Fraud
                      and Abuse Act important?


       Primary Law for Misuse of Computers
       Computers …



www.brittontuma.com                       #socialmedialaw   38
“Everything has a
          computer in it nowadays.”
                            -Steve Jobs




www.brittontuma.com             #socialmedialaw   39
The CFAA says
          has a processor or stores data

               “the term ‘computer’ means an
               electronic, magnetic, optical, electrochemical, or other high
               speed data processing device performing logical, arithmetic, or
               storage functions, and includes any data storage facility or
               communications facility directly related to or operating in
               conjunction with such device, but …”

          “such term does not include an automated typewriter or
          typesetter, a portable hand held calculator, or other similar
          device;”

www.brittontuma.com                                              #socialmedialaw   40
What about




www.brittontuma.com   #socialmedialaw   41
The CFAA applies only to “protected” computers

         This may limit the problem of applying it to alarm
         clocks, toasters, and coffee makers

         Protected = connected to the Internet

        Any situations where these devices are connected?



www.brittontuma.com                                   #socialmedialaw   42
• TI-99               • Leap Frog Leapster   • iPhone 4
    • 3.3 MHz Processor   • 96 MHz Processor     • 800 MHz Processer
    • 16 KB of RAM        • 128 MB of RAM        • 512 MB of RAM



www.brittontuma.com                                   #socialmedialaw   43
The CFAA prohibits wrongfully accessing
     a computer where the access
            Obtains information
            Commits a fraud
            Obtains something of value
            Transmits damaging information
            Causes damage
            Traffics in passwords
            Commits extortion


www.brittontuma.com                           #socialmedialaw   44
 social media is wonderful!
             must find proper balance
             need a social media policy
                     address unique business and legal needs of your business
                     be enforceable and lawful in a court of law
                     be legal in the eyes of the NLRB
             need to enforce social media policy
             need to spend time with employees to help them
              understand and possibly collaborate on the rules
             need to look at cyber-insurance!
www.brittontuma.com                                                 #socialmedialaw   45
www.brittontuma.com   #socialmedialaw   46

Mais conteúdo relacionado

Mais procurados

Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
aligi
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 
Social Media: Then and Now
Social Media: Then and NowSocial Media: Then and Now
Social Media: Then and Now
rosawu
 

Mais procurados (20)

Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Fair use week at Carnegie Mellon University
Fair use week at Carnegie Mellon UniversityFair use week at Carnegie Mellon University
Fair use week at Carnegie Mellon University
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Child rights and the media
Child rights and the mediaChild rights and the media
Child rights and the media
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
Social media-policy-presentation
Social media-policy-presentationSocial media-policy-presentation
Social media-policy-presentation
 
social network
social networksocial network
social network
 
Social Media Ethics Quiz
Social Media Ethics QuizSocial Media Ethics Quiz
Social Media Ethics Quiz
 
Role of the Media in the Democratic Society
Role of the Media in the Democratic SocietyRole of the Media in the Democratic Society
Role of the Media in the Democratic Society
 
Social Media: Then and Now
Social Media: Then and NowSocial Media: Then and Now
Social Media: Then and Now
 
Debate Social networking & Social media
Debate Social networking & Social mediaDebate Social networking & Social media
Debate Social networking & Social media
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Privacy Issues in Social Media
Privacy Issues in Social MediaPrivacy Issues in Social Media
Privacy Issues in Social Media
 

Destaque

Social Media for Law Firms
Social Media for Law FirmsSocial Media for Law Firms
Social Media for Law Firms
6S Marketing
 
role of media in society
role of media in societyrole of media in society
role of media in society
Anamika Pandey
 

Destaque (18)

Social Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal IndustrySocial Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal Industry
 
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
 
Professionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth CurveProfessionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth Curve
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should Know
 
The Roles of Social Media Channels
The Roles of Social Media ChannelsThe Roles of Social Media Channels
The Roles of Social Media Channels
 
Healthcare, Social Media and Risk Management
Healthcare, Social Media and Risk ManagementHealthcare, Social Media and Risk Management
Healthcare, Social Media and Risk Management
 
Role of media in promoting tourism
Role of media in promoting tourismRole of media in promoting tourism
Role of media in promoting tourism
 
Social Media for Law Firms
Social Media for Law FirmsSocial Media for Law Firms
Social Media for Law Firms
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
01 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 101 Contemporary Media Issues Intro To Section B - Part 1
01 Contemporary Media Issues Intro To Section B - Part 1
 
Role of media in social awareness
Role of media in social awarenessRole of media in social awareness
Role of media in social awareness
 
role of media in society
role of media in societyrole of media in society
role of media in society
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
 
Future Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social MediaFuture Social: 10 Key Trends in Social Media
Future Social: 10 Key Trends in Social Media
 
Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.Publish. Share Your Expertise. Drive Engagement.
Publish. Share Your Expertise. Drive Engagement.
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
 

Semelhante a Social Media Law: The Legal Do's and Don'ts of Social Media

Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
Melfi Associates
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
shibrah76
 

Semelhante a Social Media Law: The Legal Do's and Don'ts of Social Media (20)

Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)Social Media Law - Marketing Executives Networking Group (MENG)
Social Media Law - Marketing Executives Networking Group (MENG)
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
Are Tech Giants With Their AIs And Algorithms Becoming Too Powerful?
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
Legal Risks of Social Media
Legal Risks of Social MediaLegal Risks of Social Media
Legal Risks of Social Media
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 

Mais de Shawn Tuma

Mais de Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Social Media Law: The Legal Do's and Don'ts of Social Media

  • 1. SOCIAL MEDIA LAW The Legal Do’s and Don’ts of Social Media Presented for TrustPoint Management Group August 10, 2012
  • 2. Tweet it up: #socialmedialaw www.brittontuma.com #socialmedialaw 2
  • 3. Notes 1. Add Pictures 2. Streamline sections – 45 minutes 3. Insert Copyright www.brittontuma.com #socialmedialaw 3
  • 4. 4
  • 5. WHAT IS SOCIAL MEDIA LAW? #socialmedialaw 5
  • 6. Social Media Law: The law that applies to and governs the use of social media. (was that all you really wanted to know?) www.brittontuma.com #socialmedialaw 6
  • 7. Social Media Law:  inherent risks  natural tension between legal and marketing  BUT!!!  I am “sold out” on social media and an avid user … and I don’t want to get sued either … www.brittontuma.com #socialmedialaw 7
  • 8. My Goal:  find an acceptable balance  educate you on risks of using social media, along with other digital business risks  help show you some ways to minimize those risks  Remember: social media is a tool – what you say and do is much like “real life”  “Real life” rules still apply – use your common sense! www.brittontuma.com #socialmedialaw 8
  • 9.  what is social media law  traditional areas of law incorporated  practical examples of how they arise  how to minimize the risk  can’t eliminate, only minimize  social media policies  workplace training and guidance  cyber-insurance  other digital business risks  data breach & hacking  computer fraud / Computer Fraud and Abuse Act  Q&A www.brittontuma.com #socialmedialaw 9
  • 10. 2 General Types of Law  Codes: legislatures create specific laws to address specific problems  Common Law: judges look to general principles of law and, by using reason, apply those principles to resolve previously unforeseen problems www.brittontuma.com #socialmedialaw 10
  • 11. Legislatures want to keep up  impossible  speed technology is evolving  speed culture and business environment changing  legislature too slow example: last spring the big ruckus was prospective employers asking for social media logins – the massive public outcry made it such that nobody in their right mind would do that now this past week, Illinois became one of 2 states to enact a law prohibiting this; eff. date: 1/1/13 www.brittontuma.com #socialmedialaw 11
  • 12. www.brittontuma.com #socialmedialaw 12
  • 13. Look to Common Law  contract law  intellectual property law  torts – defamation  regulatory law  employment law  evidence law www.brittontuma.com #socialmedialaw 13
  • 14. You can’t protect against what you don’t know, so … www.brittontuma.com #socialmedialaw 14
  • 15. Who uses social media for marketing?  do you want to give your marketing efforts to your competitor?  who really owns your account  followers / connections?  “an ounce of prevention is worth a pound of cure”: PhoneDog v. Kravitz (7/15/11)  each service or site has a contract  contract law www.brittontuma.com #socialmedialaw 15
  • 16. Who has trade secrets, confidential and proprietary information?  do you want to tell your competitors?  customer / vendor lists  who are you talking to or following?  secret business alliances and strategies  secret business initiatives and plans  business situational awareness  intellectual property law: trade secrets www.brittontuma.com #socialmedialaw 16
  • 17. Who wants to get sued?  infringement of trademark  infringement of copyright  DMCA Takedown Request  right to publicity  name, voice, signature, photo, likeness (statutory after death)  common law while living if for value  must have a license or use creative commons  intellectual property law www.brittontuma.com #socialmedialaw 17
  • 18. Who wants to get sued some more?  what you (and your employees) say can hurt you!  business disparagement  tortious interference  defamation (libel & slander)  false advertising & false warranties  fraud & negligent misrepresentation  harassment and cyber-bullying  “puffery” of facts www.brittontuma.com #socialmedialaw 18
  • 19. Who wants to get investigated by the Feds?  FTC – Investigated Hyundai for not disclosing incentives given to bloggers for endorsements.  HHS & OCR – could have investigated hospital employee who posted patient pictures and “PHI” on Facebook (“it’s just Facebook!”)  SEC – false statements made in raising funds (SEC v. Imperia Invest. IBC) or wrongful disclosures of information  regulatory law www.brittontuma.com #socialmedialaw 19
  • 20. What are some real trouble spots?  Giveaways and contests can be trouble for many reasons – do not do them on social media without having it thoroughly vetted  many sites’ TOS prohibit  jurisdiction gambling and contest rules  Employment issues are one of the main areas in which legal and general business problems arise  Discussed in next section www.brittontuma.com #socialmedialaw 20
  • 21. Can you guess what will be used against you if any of these problems arise?  social media is evidence – very powerful evidence!  electronically stored information (“ESI”) is quickly becoming the most useful form of evidence available  evidence from social media is now obtained and used in virtually every kind of lawsuit and investigation  we now have complete records of 2-way communication stream – like all calls recorded! www.brittontuma.com #socialmedialaw 21
  • 22. MINIMIZING THE RISKS OF SOCIAL MEDIA IN BUSINESS #socialmedialaw 22
  • 23. Social media policies are a “must have”  ounce of prevention: less than 1 day of litigation  if have, must enforce  trying to predict issues – but evolving – can’t get all  contractually resolve issues such as ownership and authority  great opportunity to set rules and document expectations  greater opportunity to explain and ensure understanding of expectations  put on notice of monitoring – and actually monitor!  should address employment issues www.brittontuma.com #socialmedialaw 23
  • 24. Employment Issues  using social media in hiring  best to have set criteria with neutral third party investigate for criteria  not use to discriminate  e.g., snooping to find race, gender, age, disability, pregnancy  e.g., search for candidates on Twitter where disproportionate number of people <40 yrs. on Twitter, may violate the Age Discrimination in Employment Act  requesting social media login information www.brittontuma.com #socialmedialaw 24
  • 25. Employment Issues  using social media for the company  scope of work for duties and times  e.g., overtime for weekend “Facebooking”  personal or company owned accounts / followers  familiarity and compliance with site Agreement / TOS  what is authorized / prohibited  responsibility for statements / disclosures  monitored  saying “use good judgment” is not enough! www.brittontuma.com #socialmedialaw 25
  • 26. Employment Issues  using personal social media during work  can be prohibited  may prohibit using or disclosing company IP for personal SM  may prohibit using company info for setting up personal SM accounts www.brittontuma.com #socialmedialaw 26
  • 27. You need social media policies but the National Labor Relations Board is making it difficult  NLRB jurisdiction = impacts interstate commerce  National Labor Relations Act (NLRA) sec. 7 gives employees right to engage in “concerted activities for the purpose of … mutual aid and protection”  NLRB finds illegal any policy provision that (a) restricts or (b) an employee would reasonably construe to chill concerted activities  On 5/30/12 NLRB General Counsel issued its 3rd Report on Social Media Policies in 1 year period (8/11 & 1/12) www.brittontuma.com #socialmedialaw 27
  • 28. Can you guess who the NLRB is pulling for?  making it very difficult for businesses to protect themselves  social media policies must now be carefully tailored to  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  Examples of provisions found illegal by NLRB www.brittontuma.com #socialmedialaw 28
  • 29. www.brittontuma.com #socialmedialaw 29
  • 30. www.brittontuma.com #socialmedialaw 30
  • 31. www.brittontuma.com #socialmedialaw 31
  • 32. What is the NLRB really looking for?  clarity and precision  examples of do’s and don’ts that give context and real-life meaning to the rules www.brittontuma.com #socialmedialaw 32
  • 33. MINIMIZING OTHER DIGITAL BUSINESS RISKS #socialmedialaw 33
  • 34. Cyber-Insurance  If you are doing anything in cyberspace, you need it. Period.  Most traditional insurance does not cover cyber- events, even if you think it does (really!)  Cyber-Insurance is relatively inexpensive  Most policies come include a cyber-risk audit before the policies are underwritten  Policies can cover social media risk, computer fraud risk, and data breach / hacking risk www.brittontuma.com #socialmedialaw 34
  • 35. Customer Information – do you retain it on your system?  Data Breach  Effective 9/1/12, if you conduct business in Texas and your system is breached and your customer’s unencrypted “sensitive personal information” is, or is reasonably believed to have been compromised, must notify all Texas residents of breach.  The notice must be given “as quickly as possible” and failure or delay in doing so results in a fine of $100.00 per individual per day (not to exceed $250,000)  Notice may be made through written or electronic means though it can be given by major media outlets if the cost of providing notice exceeds $250,000 or the number of persons exceeds 500,000 www.brittontuma.com #socialmedialaw 35
  • 36. www.brittontuma.com #socialmedialaw 36
  • 37. www.brittontuma.com #socialmedialaw 37
  • 38. Why is the Computer Fraud and Abuse Act important?  Primary Law for Misuse of Computers  Computers … www.brittontuma.com #socialmedialaw 38
  • 39. “Everything has a computer in it nowadays.” -Steve Jobs www.brittontuma.com #socialmedialaw 39
  • 40. The CFAA says has a processor or stores data “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …” “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;” www.brittontuma.com #socialmedialaw 40
  • 41. What about www.brittontuma.com #socialmedialaw 41
  • 42. The CFAA applies only to “protected” computers This may limit the problem of applying it to alarm clocks, toasters, and coffee makers Protected = connected to the Internet Any situations where these devices are connected? www.brittontuma.com #socialmedialaw 42
  • 43. • TI-99 • Leap Frog Leapster • iPhone 4 • 3.3 MHz Processor • 96 MHz Processor • 800 MHz Processer • 16 KB of RAM • 128 MB of RAM • 512 MB of RAM www.brittontuma.com #socialmedialaw 43
  • 44. The CFAA prohibits wrongfully accessing a computer where the access  Obtains information  Commits a fraud  Obtains something of value  Transmits damaging information  Causes damage  Traffics in passwords  Commits extortion www.brittontuma.com #socialmedialaw 44
  • 45.  social media is wonderful!  must find proper balance  need a social media policy  address unique business and legal needs of your business  be enforceable and lawful in a court of law  be legal in the eyes of the NLRB  need to enforce social media policy  need to spend time with employees to help them understand and possibly collaborate on the rules  need to look at cyber-insurance! www.brittontuma.com #socialmedialaw 45
  • 46. www.brittontuma.com #socialmedialaw 46