SlideShare uma empresa Scribd logo
1 de 17
Brandjacking and what steps should
companies take to safeguard against it.




                         Presented by –

                         Ronil Sinha
                         Sairam Ramkumar
                         Saurav Chaudhury
                         Shreya Sharma
                         Valene Varela
AND HOW TO STAY
SAFE FROM IT!
WHAT IS BRANDJACKING?

 Brandjacking is an activity whereby someone
  acquires or otherwise assumes
  the online identity of another entity for the
  purposes of acquiring that person's or
  business's brand equity
 The term combines the notions of 'branding'
  and 'hijacking', and has been used since at
  least 2007 when it appeared in a Business
  Week article
 The tactic is often associated with use of
TYPES OF BRANDJACKING

1) Identity
impersonation
   Facebook    and
    Twitter are breeding
    grounds for fake
    profiles
    impersonating
    celebrities and even
    regular people
   Done to gain
    personal information
    of users
TYPES OF BRANDJACKING

2) Cyber-squatting
   When     someone buys a URL (website
    address) in anticipation that you'll want to buy
    it off them at some point in the future
   Buying up URLs in the names of new limited
    companies or extensions that existing
    successful organisations did not have the
    presence of forethought to secure (such as
    .org, .com, .co.uk, .net) can be very profitable
   Definitely considered to be immoral
    profiteering
TYPES OF BRANDJACKING

3) Phishing
   Technical cat-burglars
    raid your database
    and glean personal or
    financial data that they
    can then use against
    you or your customers
   Biggest motive ->
    credit card information
   Secondary motive ->
    To steal passwords
    and access accounts
   Private information is
MOTIVE BEHIND BRANDJACKING

   A brandjacker may attempt to use the
    reputation of its target for:
     Free publicity
     to malign the reputation of its target

     “innovative marketing”

   The effects on the original brand-holder
     Financial  loss
     Credibility loss
SOME HIGH PROFILE HIJACKINGS –
BURGER KING

 Burger King’s official
  Twitter handle
  @BurgerKing was
  hijacked and
  adorned with
  McDonald’s
• Apparently their password was “whopperr123”
  branding on
• A faction of Anonymous claimed responsibility
  February 18
• After more than an hour, the handle was
  suspended
SOME HIGH PROFILE HIJACKINGS –
BP
   During the BP Deepwater Horizon oil spill in 2010
    the Twitter handle @BPGlobalPR gained a huge
    following – almost 10 times the number of followers
    of the official @BP_America account – and
    frequently parodied their response (and lack
    thereof) to the disaster.
8 STEPS TO PREVENT BRAND-
JACKING
   Sign-up for leading social media sites, which
    includes all well-known sites along with the
    ones which apply especially to the Line-of-
    Business e.g. Media, Entertainment , Travel.

   List out all brand names that need to be
    protected – company name, product-names,
    characters, spokespersons, other IP and sign-
    up for user names using each of these brand
    names. Wherever possible, create user
    communities on a site.
8 STEPS TO PREVENT BRAND-
JACKING
   Define the company department which is
    responsible for brand presence on Social Media
    and entrust them with active site-monitoring and
    creation and promotion of user communities
    around the brands.

   Engage customers, fans and users actively and
    positively on social media by having logos for
    approved fan sites, customer service sites and
    regular status updates. The goal is to create a
    sense of close-knit community to gain positive
8 STEPS TO PREVENT BRAND-
JACKING
   Always plan for the future. All products, brand
    names, characters or other public names that
    affect the IP of the organization should be
    registered everywhere before they become
    public.

   Supervise employees who are using the brand
    names or other IP in social media to keep a
    positive image, avoid misleading acts, and
    ensure that the marketing and legal
    departments are always kept in the loop.
8 STEPS TO PREVENT BRAND-
JACKING
   In case of an IP infringement, the fight to
    recover brand rights should be a low-key effort
    and the offender should be treated tactfully &
    facts should be validated extensively to prevent
    negative publicity and a potential PR disaster.

   Finally, the single most critical tip to prevent
    brand-jacking is “ETERNAL VIGILANCE” of the
    Intellectual Property on the Internet.
COMPANIES WHICH DID IT RIGHT -
COKE
             Coke has the highest brand equity among all
              the companies world wide. Every year it
              spends billions of dollars in order to maintain
              its brand value
             According to the page data Coca Cola fan
              page is the second most popular page on
              Facebook with over 3.3 Million fans, only
              second to Barack Obama
             However, this page wasn’t created by Coke,
              but by two Coke fans in Los Angeles, Dusty
              Sorg and Michael Jedrzejewski.
             Instead of acting against brand jacking – the
              officials at coke contacted them to partner
              with coke to manage their page
             Facebook made the decision to either close
              the page or let Coca-Cola take it over. Coca-
              Cola instead proposed an alternative: Let the
              creators keep the page but share it with a few
              of Coca-Cola’s senior interactive folks…
PINSTAGRAM
   Some times brandjacking helps both the
    parties. One of the latest example for this is
    the new application that is created –
    Pinstagram
   Pinstagram is a hybrid application that is half
    social pinning site Pinterest, and half photo-
    sharing app Instagram
   The simple combination of the two apps has
    created an entirely new offering, while
    hijacking both brands.
   instagram gets downloads as people
    respond to its unique product, while
    Instagram and Pinterest receive more traffic
    as a result.
   “Pinstagram has jacked Pinterest and
    Instagram in a way that’s complicit with the
    other two. It’s a homage to the other brands,
    and it’s useful to both brands as it drives
HOW TO SURVIVE A BRAND HIJACK?
   Notifying our customers immediately
   Reporting the phishing site to the company hosting
    it
   Putting out a press release
   Well defined plan to help affected customers
   Proper communication within the organization
   Filing a report to the Internet Authority of the
    respective country
SHELL’S STORY
   Generally oil companies get targeted by environment
    activist groups such as Greenpeace
   Shell was also not spared
   Problem for Shell was such activist groups took over
    Shell’s social media space
   The fake pages started getting more attention than
    Shell’s original pages
   How did Shell react to this accusations against some
    oil spills?
   Analyzed the situation, by not allowing itself to be the
    center of trolls

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

internet and its services
internet and its servicesinternet and its services
internet and its services
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Internet
InternetInternet
Internet
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Internet services
Internet servicesInternet services
Internet services
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Activity 14 Timeline History of Internet
Activity 14 Timeline History of InternetActivity 14 Timeline History of Internet
Activity 14 Timeline History of Internet
 
Internet
InternetInternet
Internet
 
Cybersquatting
CybersquattingCybersquatting
Cybersquatting
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
History of the personal computer
History of the personal computerHistory of the personal computer
History of the personal computer
 
HISTORY OF COMPUTER
HISTORY OF COMPUTERHISTORY OF COMPUTER
HISTORY OF COMPUTER
 
Netiquette
NetiquetteNetiquette
Netiquette
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
What is the internet
What is  the internetWhat is  the internet
What is the internet
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
HISTORY OF THE INTERNET
HISTORY OF THE INTERNETHISTORY OF THE INTERNET
HISTORY OF THE INTERNET
 

Semelhante a Brandjacking

Start up singapore - social media
Start up singapore - social mediaStart up singapore - social media
Start up singapore - social mediaIndependant
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Corporate reputation social age by john bell
Corporate reputation social age by john bellCorporate reputation social age by john bell
Corporate reputation social age by john bellJohn Bell
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bresslerhillarybressler
 
Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)Sameer Mathur
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Social Media Reputation Management
Social Media Reputation ManagementSocial Media Reputation Management
Social Media Reputation Managementsmibevents
 
Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4mtk4
 
IDEP Tourism Social Media Workshop
IDEP Tourism Social Media WorkshopIDEP Tourism Social Media Workshop
IDEP Tourism Social Media WorkshopMichael David
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10lindseymgift
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introductionsaltmedia
 
Corporate Reputation and Social Media
Corporate Reputation and Social MediaCorporate Reputation and Social Media
Corporate Reputation and Social MediaConverseon
 
Rpa m2 l2-common online channels
Rpa m2 l2-common online channelsRpa m2 l2-common online channels
Rpa m2 l2-common online channelsVikas Gaur
 
Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...Ian McCarthy
 
Enterprise Customer Relationship Management
Enterprise Customer Relationship ManagementEnterprise Customer Relationship Management
Enterprise Customer Relationship ManagementConvergeEnterprise
 
Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07Eric Weaver
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...Helen Levinson
 

Semelhante a Brandjacking (20)

Start up singapore - social media
Start up singapore - social mediaStart up singapore - social media
Start up singapore - social media
 
Corporate blogging
Corporate bloggingCorporate blogging
Corporate blogging
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Corporate reputation social age by john bell
Corporate reputation social age by john bellCorporate reputation social age by john bell
Corporate reputation social age by john bell
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bressler
 
Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Social Media Reputation Management
Social Media Reputation ManagementSocial Media Reputation Management
Social Media Reputation Management
 
Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4
 
IDEP Tourism Social Media Workshop
IDEP Tourism Social Media WorkshopIDEP Tourism Social Media Workshop
IDEP Tourism Social Media Workshop
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
 
Social Media Fitzwilliam22nd June09
Social Media Fitzwilliam22nd June09Social Media Fitzwilliam22nd June09
Social Media Fitzwilliam22nd June09
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introduction
 
Corporate Reputation and Social Media
Corporate Reputation and Social MediaCorporate Reputation and Social Media
Corporate Reputation and Social Media
 
Rpa m2 l2-common online channels
Rpa m2 l2-common online channelsRpa m2 l2-common online channels
Rpa m2 l2-common online channels
 
Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...
 
LMA We First slides
LMA We First slidesLMA We First slides
LMA We First slides
 
Enterprise Customer Relationship Management
Enterprise Customer Relationship ManagementEnterprise Customer Relationship Management
Enterprise Customer Relationship Management
 
Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 

Último

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Último (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Brandjacking

  • 1. Brandjacking and what steps should companies take to safeguard against it. Presented by – Ronil Sinha Sairam Ramkumar Saurav Chaudhury Shreya Sharma Valene Varela
  • 2. AND HOW TO STAY SAFE FROM IT!
  • 3. WHAT IS BRANDJACKING?  Brandjacking is an activity whereby someone acquires or otherwise assumes the online identity of another entity for the purposes of acquiring that person's or business's brand equity  The term combines the notions of 'branding' and 'hijacking', and has been used since at least 2007 when it appeared in a Business Week article  The tactic is often associated with use of
  • 4. TYPES OF BRANDJACKING 1) Identity impersonation  Facebook and Twitter are breeding grounds for fake profiles impersonating celebrities and even regular people  Done to gain personal information of users
  • 5. TYPES OF BRANDJACKING 2) Cyber-squatting  When someone buys a URL (website address) in anticipation that you'll want to buy it off them at some point in the future  Buying up URLs in the names of new limited companies or extensions that existing successful organisations did not have the presence of forethought to secure (such as .org, .com, .co.uk, .net) can be very profitable  Definitely considered to be immoral profiteering
  • 6. TYPES OF BRANDJACKING 3) Phishing  Technical cat-burglars raid your database and glean personal or financial data that they can then use against you or your customers  Biggest motive -> credit card information  Secondary motive -> To steal passwords and access accounts  Private information is
  • 7. MOTIVE BEHIND BRANDJACKING  A brandjacker may attempt to use the reputation of its target for:  Free publicity  to malign the reputation of its target  “innovative marketing”  The effects on the original brand-holder  Financial loss  Credibility loss
  • 8. SOME HIGH PROFILE HIJACKINGS – BURGER KING  Burger King’s official Twitter handle @BurgerKing was hijacked and adorned with McDonald’s • Apparently their password was “whopperr123” branding on • A faction of Anonymous claimed responsibility February 18 • After more than an hour, the handle was suspended
  • 9. SOME HIGH PROFILE HIJACKINGS – BP  During the BP Deepwater Horizon oil spill in 2010 the Twitter handle @BPGlobalPR gained a huge following – almost 10 times the number of followers of the official @BP_America account – and frequently parodied their response (and lack thereof) to the disaster.
  • 10. 8 STEPS TO PREVENT BRAND- JACKING  Sign-up for leading social media sites, which includes all well-known sites along with the ones which apply especially to the Line-of- Business e.g. Media, Entertainment , Travel.  List out all brand names that need to be protected – company name, product-names, characters, spokespersons, other IP and sign- up for user names using each of these brand names. Wherever possible, create user communities on a site.
  • 11. 8 STEPS TO PREVENT BRAND- JACKING  Define the company department which is responsible for brand presence on Social Media and entrust them with active site-monitoring and creation and promotion of user communities around the brands.  Engage customers, fans and users actively and positively on social media by having logos for approved fan sites, customer service sites and regular status updates. The goal is to create a sense of close-knit community to gain positive
  • 12. 8 STEPS TO PREVENT BRAND- JACKING  Always plan for the future. All products, brand names, characters or other public names that affect the IP of the organization should be registered everywhere before they become public.  Supervise employees who are using the brand names or other IP in social media to keep a positive image, avoid misleading acts, and ensure that the marketing and legal departments are always kept in the loop.
  • 13. 8 STEPS TO PREVENT BRAND- JACKING  In case of an IP infringement, the fight to recover brand rights should be a low-key effort and the offender should be treated tactfully & facts should be validated extensively to prevent negative publicity and a potential PR disaster.  Finally, the single most critical tip to prevent brand-jacking is “ETERNAL VIGILANCE” of the Intellectual Property on the Internet.
  • 14. COMPANIES WHICH DID IT RIGHT - COKE  Coke has the highest brand equity among all the companies world wide. Every year it spends billions of dollars in order to maintain its brand value  According to the page data Coca Cola fan page is the second most popular page on Facebook with over 3.3 Million fans, only second to Barack Obama  However, this page wasn’t created by Coke, but by two Coke fans in Los Angeles, Dusty Sorg and Michael Jedrzejewski.  Instead of acting against brand jacking – the officials at coke contacted them to partner with coke to manage their page  Facebook made the decision to either close the page or let Coca-Cola take it over. Coca- Cola instead proposed an alternative: Let the creators keep the page but share it with a few of Coca-Cola’s senior interactive folks…
  • 15. PINSTAGRAM  Some times brandjacking helps both the parties. One of the latest example for this is the new application that is created – Pinstagram  Pinstagram is a hybrid application that is half social pinning site Pinterest, and half photo- sharing app Instagram  The simple combination of the two apps has created an entirely new offering, while hijacking both brands.  instagram gets downloads as people respond to its unique product, while Instagram and Pinterest receive more traffic as a result.  “Pinstagram has jacked Pinterest and Instagram in a way that’s complicit with the other two. It’s a homage to the other brands, and it’s useful to both brands as it drives
  • 16. HOW TO SURVIVE A BRAND HIJACK?  Notifying our customers immediately  Reporting the phishing site to the company hosting it  Putting out a press release  Well defined plan to help affected customers  Proper communication within the organization  Filing a report to the Internet Authority of the respective country
  • 17. SHELL’S STORY  Generally oil companies get targeted by environment activist groups such as Greenpeace  Shell was also not spared  Problem for Shell was such activist groups took over Shell’s social media space  The fake pages started getting more attention than Shell’s original pages  How did Shell react to this accusations against some oil spills?  Analyzed the situation, by not allowing itself to be the center of trolls