SlideShare une entreprise Scribd logo
1  sur  15
Legal Issues Web 2.0 / User Generated Content Identifying and minimising key legal risks  Enterprise 2.0 - Wednesday 13 August 2008 Allison Manvell, Baker & McKenzie, Sydney
Overview ,[object Object],[object Object],[object Object],[object Object],Privacy UGC:   potential content problems - copyright, defamation, illegal content, trade marks, misleading and deceptive conduct, contempt, obscenity, privacy
Key differences ,[object Object],[object Object],Control of content - User Generated Content
A. Identify key risks B. Identify (and allocate) responsibility   Protection for intermediaries?   “Safe Harbour”?   “Innocent dissemination”?
[object Object],[object Object],[object Object],[object Object],[object Object],C. Practical steps to mitigate risk
1) Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1) Privacy  ,[object Object],[object Object],[object Object],[object Object],[object Object]
2) Copyright ,[object Object],[object Object],[object Object],[object Object],[object Object]
3) Defamation ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3) Defamation
4) “Content” regulation / Classification ,[object Object],[object Object],[object Object],[object Object],[object Object]
5) Other risks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk management ,[object Object],[object Object],[object Object],[object Object]
Risk management ,[object Object],[object Object],[object Object],[object Object],[object Object]
For further information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],? ? ?

Contenu connexe

Tendances

Privacy learning forum broadmeadows
Privacy learning forum broadmeadowsPrivacy learning forum broadmeadows
Privacy learning forum broadmeadowsbrentcarey
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Metamorphosis
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
Top 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsTop 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsDeborah Gonzalez, Esq.
 
Privacy morwell june 09
Privacy morwell june 09 Privacy morwell june 09
Privacy morwell june 09 brentcarey
 
Digital media policy presentation
Digital media policy presentationDigital media policy presentation
Digital media policy presentationRodika Tollefson
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)JNicholson
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson PresentationMediabistro
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?Stuart Bailey
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentationbrentcarey
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPTrilateral Research
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414Stewart Benger
 

Tendances (16)

Privacy learning forum broadmeadows
Privacy learning forum broadmeadowsPrivacy learning forum broadmeadows
Privacy learning forum broadmeadows
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Top 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent ConsultantsTop 10 Social Media Liability Issues for PR Independent Consultants
Top 10 Social Media Liability Issues for PR Independent Consultants
 
Privacy morwell june 09
Privacy morwell june 09 Privacy morwell june 09
Privacy morwell june 09
 
Digital media policy presentation
Digital media policy presentationDigital media policy presentation
Digital media policy presentation
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson Presentation
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentation
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOP
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
LO2 - Lesson 12 - Legislation
LO2 - Lesson 12 - LegislationLO2 - Lesson 12 - Legislation
LO2 - Lesson 12 - Legislation
 

En vedette

Penser à Vous ProtéGer
Penser à Vous ProtéGerPenser à Vous ProtéGer
Penser à Vous ProtéGergueste2e15
 
Skmbt C25007091416460
Skmbt C25007091416460Skmbt C25007091416460
Skmbt C25007091416460fredox
 
Living On A Cloud, Dr Keith Marlow
Living On A Cloud, Dr Keith MarlowLiving On A Cloud, Dr Keith Marlow
Living On A Cloud, Dr Keith Marlowguesta04b0
 
The Scope of Cloud Computing, Kevin Bloch
The Scope of Cloud Computing, Kevin BlochThe Scope of Cloud Computing, Kevin Bloch
The Scope of Cloud Computing, Kevin Blochguesta04b0
 
Innovating in the Clouds, Peter Williams
Innovating in the Clouds, Peter WilliamsInnovating in the Clouds, Peter Williams
Innovating in the Clouds, Peter Williamsguesta04b0
 
IBM Presentation, E2.0, Sydney
IBM Presentation, E2.0, SydneyIBM Presentation, E2.0, Sydney
IBM Presentation, E2.0, Sydneyguesta04b0
 
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0guesta04b0
 
Rural Services Workshop
Rural Services WorkshopRural Services Workshop
Rural Services Workshopsammayadams
 
Thinking Strategically about Cloud Computing
Thinking Strategically about Cloud ComputingThinking Strategically about Cloud Computing
Thinking Strategically about Cloud Computingguesta04b0
 
Chris Jake
Chris JakeChris Jake
Chris JakeFNian
 
JamáS Pie[1]..
JamáS Pie[1]..JamáS Pie[1]..
JamáS Pie[1]..masde30
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 

En vedette (13)

swot analysis
swot analysisswot analysis
swot analysis
 
Penser à Vous ProtéGer
Penser à Vous ProtéGerPenser à Vous ProtéGer
Penser à Vous ProtéGer
 
Skmbt C25007091416460
Skmbt C25007091416460Skmbt C25007091416460
Skmbt C25007091416460
 
Living On A Cloud, Dr Keith Marlow
Living On A Cloud, Dr Keith MarlowLiving On A Cloud, Dr Keith Marlow
Living On A Cloud, Dr Keith Marlow
 
The Scope of Cloud Computing, Kevin Bloch
The Scope of Cloud Computing, Kevin BlochThe Scope of Cloud Computing, Kevin Bloch
The Scope of Cloud Computing, Kevin Bloch
 
Innovating in the Clouds, Peter Williams
Innovating in the Clouds, Peter WilliamsInnovating in the Clouds, Peter Williams
Innovating in the Clouds, Peter Williams
 
IBM Presentation, E2.0, Sydney
IBM Presentation, E2.0, SydneyIBM Presentation, E2.0, Sydney
IBM Presentation, E2.0, Sydney
 
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
 
Rural Services Workshop
Rural Services WorkshopRural Services Workshop
Rural Services Workshop
 
Thinking Strategically about Cloud Computing
Thinking Strategically about Cloud ComputingThinking Strategically about Cloud Computing
Thinking Strategically about Cloud Computing
 
Chris Jake
Chris JakeChris Jake
Chris Jake
 
JamáS Pie[1]..
JamáS Pie[1]..JamáS Pie[1]..
JamáS Pie[1]..
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 

Similaire à Baker & McKenzie Presentation (E2.0)

Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptFranciscoJoaoVitug
 
Legalities of Social Media
Legalities of Social MediaLegalities of Social Media
Legalities of Social MediaMirum Africa
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Morgan
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011amystewart
 
Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content Maanit Zemel
 
Staying Legal, by Andrea martin
Staying Legal, by Andrea martin Staying Legal, by Andrea martin
Staying Legal, by Andrea martin safefood
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret LienFNian
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxbriancrawford30935
 
Managing the legal risks: Social Media in the workplace
Managing the legal risks: Social Media in the workplaceManaging the legal risks: Social Media in the workplace
Managing the legal risks: Social Media in the workplaceMirum Africa
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential informationAltacit Global
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 

Similaire à Baker & McKenzie Presentation (E2.0) (20)

Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
Social Media Law
Social Media LawSocial Media Law
Social Media Law
 
Legalities of Social Media
Legalities of Social MediaLegalities of Social Media
Legalities of Social Media
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011
 
Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
Staying Legal, by Andrea martin
Staying Legal, by Andrea martin Staying Legal, by Andrea martin
Staying Legal, by Andrea martin
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 
Managing the legal risks: Social Media in the workplace
Managing the legal risks: Social Media in the workplaceManaging the legal risks: Social Media in the workplace
Managing the legal risks: Social Media in the workplace
 
Review questions
Review questionsReview questions
Review questions
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 

Dernier

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Dernier (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Baker & McKenzie Presentation (E2.0)

  • 1. Legal Issues Web 2.0 / User Generated Content Identifying and minimising key legal risks Enterprise 2.0 - Wednesday 13 August 2008 Allison Manvell, Baker & McKenzie, Sydney
  • 2.
  • 3.
  • 4. A. Identify key risks B. Identify (and allocate) responsibility Protection for intermediaries? “Safe Harbour”? “Innocent dissemination”?
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.