SlideShare une entreprise Scribd logo
1  sur  30
Geeks, Tweets, & The Law TAG Webinar 2011 Deborah Gonzalez, Esq.
Overview Welcome and Introduction The Technical of Social Media The Legal of the Tech: Social Media Platforms Employment/IP Mobile Applications Search Engine Optimization Cloud Computing Contracts/Liability Q&A
Introduction Deborah Gonzalez, Esq. Founder of Law2sm, LLC New legal consulting firm     focused on helping its     clients navigate the legal     issues relating to the new     digital and social media     world.
The Technical of Social Media Hardware – invention/patents (ex. Smartphones) Software – development/copyrights/trademarks (ex. Mobile applications) Peopleware - vendors/developers/clients
Social Media Platforms Social communication platform     Interactive, two-way communication Facebook, Twitter, FourSquare, LinkedIn, etc. How many are you on?
Social Media Platforms Employment Issues Hiring/firing Social Media Policies/Training Access to Social Media via Company  Company vs. personal time Freedom of Speech Defamation/Reputation
Social Media Platforms Intellectual Property Patents Smartphone Patent Battle – Apple vs. Samsung (Patent & TM Infringement over phone & tablet) Patent auction – Nortel Patents $4.5 billion bid (July 2011 Apple/MS)
Social Media Platforms Intellectual Property Copyrights Infringement vs. fair use Creative Commons License Trademarks Facebook vs. Lamebook
Mobile Apps App Name – Branding/TM Due Diligence – Competitive Research Functionality & Claims
Mobile Apps Case Study 1: Health Care Apps “Mobile heath care technology is out pacing FDA regulations” Who will be liable? (WebMD disclaimer) “This tool does not provide medical advice. It is intended for informational purposes only. It is not a substitute for professional medical advice, diagnosis or treatment.”
Mobile Apps Case Study 1: Health Care Apps Global Concern Health standards different in other countries Health Privacy Laws 1974 The National Research Act 1998 Health Insurance Portability & Accountability Act (HIPAA)
Mobile Apps Case Study 2: Higher Ed & Accessibility American Disabilities Act * 1974 Family Educational Rights and Privacy Act (FERPA)
Mobile Apps Case Study 3: Privacy A person's right to control access to his or her personal information. http://www.duhaime.org/LegalDictionary/P/Privacy.aspx Invasion of Privacy: encompasses workplace monitoring, Internet privacy, data collection, and other means of disseminating private information.
Privacy ,[object Object]
As much as you give them
Browsing behavior (patterns/history sniffing)
User preferences
User credentials
User location (geolocation, 4Sqaure)
How is that information collected?
Surveys, Registration, Permission Allowances, Open Graph, Flash cookies, Mobile Apps??,[object Object]
Privacy Spokeo.com – Enter a name and out comes: name, age, address, email addresses, gender, photos, videos, hobbies, economic health, estimated wealth, review of 86 social media sites, blog posts, family household make up, property details, maps, estimated value of property, politics, religion, education and occupation, family tree and neighborhood information.
Privacy Geotagging Hallmark of cybercasing routine process of embedding digital photos with time and location information. camera phones have geotagging enabled by default
Cloud Computing Software Licensing Service Level Agreements * Intellectual Property/Trade Secrets Privacy**/Data Security (access/authentication/encryption/ privileged data) * Termination/Suspension of Accounts ** Electronic Privacy Information Center/FTC Complaint about Google’s cloud computing services (bk in 2009)
Cloud Computing Compliance w/Federal & State Laws Jurisdiction – Location – where is your data?  Whose law governs where your data is stored? Third party access Subpoenas E-discovery Accountability is the issue.
Search Engine Optimization What is SEO? Roger Cleveland Golf Company vs. Price, SC, 2010
Search Engine Optimization
Contracts/Liability Who are you?  Vendor, Developer, Client Developer vs. Programmer Employee or Work for Hire Independent Contractor Crowdsourcing
Contracts/Liability Crowdsourcing To outsource work to an unspecified group of people, typically by making an appeal to the general public on the internet
Contracts/Liability What are you doing? Blogging  “Expert” Links Astroturfing

Contenu connexe

Tendances

The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sddsarthakgarg97
 
How Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual PropertyHow Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual PropertyWhitefordTaylor
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLEJonathan Ezor
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Intellectual Property and Technology
Intellectual Property and TechnologyIntellectual Property and Technology
Intellectual Property and TechnologyWhitefordTaylor
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingDan Michaluk
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentationICCNS
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
Social Media and Employee Privacy
Social Media and Employee PrivacySocial Media and Employee Privacy
Social Media and Employee PrivacyDan Michaluk
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 

Tendances (19)

The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sdd
 
How Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual PropertyHow Associations Can Protect their Intellectual Property
How Associations Can Protect their Intellectual Property
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Intellectual Property and Technology
Intellectual Property and TechnologyIntellectual Property and Technology
Intellectual Property and Technology
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Issues related to ict
Issues related to ictIssues related to ict
Issues related to ict
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
Social media
Social mediaSocial media
Social media
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Social Media and Employee Privacy
Social Media and Employee PrivacySocial Media and Employee Privacy
Social Media and Employee Privacy
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 

En vedette (9)

Binders Revised July2011
Binders Revised July2011Binders Revised July2011
Binders Revised July2011
 
Opera Cake
Opera CakeOpera Cake
Opera Cake
 
Siege2011 Social Games
Siege2011 Social GamesSiege2011 Social Games
Siege2011 Social Games
 
Get Attachment.Aspx
Get Attachment.AspxGet Attachment.Aspx
Get Attachment.Aspx
 
04 19 09 Prayer Sheet Don
04 19 09 Prayer Sheet Don04 19 09 Prayer Sheet Don
04 19 09 Prayer Sheet Don
 
titol
titoltitol
titol
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Probiotics and your health
Probiotics and your healthProbiotics and your health
Probiotics and your health
 
Gmia Augu202011
Gmia Augu202011Gmia Augu202011
Gmia Augu202011
 

Similaire à Tag August2011

Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptxJeydeeeYhudieee
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxwalterl4
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010mleyden
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)Matthew Asbell
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethicsdordunureubenmawukok
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...Leigh-Chantelle
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011amystewart
 

Similaire à Tag August2011 (20)

Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Review questions
Review questionsReview questions
Review questions
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011
 

Plus de Deborah Gonzalez, Esq.

Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldDeborah Gonzalez, Esq.
 
Protect Your Art: Copyrights/Trademarks for Artists
Protect Your Art: Copyrights/Trademarks for ArtistsProtect Your Art: Copyrights/Trademarks for Artists
Protect Your Art: Copyrights/Trademarks for ArtistsDeborah Gonzalez, Esq.
 
Understanding Digital Revenue Streams (for Musicians)
Understanding Digital Revenue Streams (for Musicians)Understanding Digital Revenue Streams (for Musicians)
Understanding Digital Revenue Streams (for Musicians)Deborah Gonzalez, Esq.
 
Social Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & CollegesSocial Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & CollegesDeborah Gonzalez, Esq.
 
Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)Deborah Gonzalez, Esq.
 
Bark World Blogger Conference (2013): Contracts and Negotiation
Bark World Blogger Conference (2013): Contracts and NegotiationBark World Blogger Conference (2013): Contracts and Negotiation
Bark World Blogger Conference (2013): Contracts and NegotiationDeborah Gonzalez, Esq.
 
Straight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social MediaStraight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social MediaDeborah Gonzalez, Esq.
 
Digital Immortality, Digital Atlanta 2012
Digital Immortality, Digital Atlanta 2012Digital Immortality, Digital Atlanta 2012
Digital Immortality, Digital Atlanta 2012Deborah Gonzalez, Esq.
 
Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!Deborah Gonzalez, Esq.
 
Top Ten Legal Issues for Game Developers
Top Ten Legal Issues for Game DevelopersTop Ten Legal Issues for Game Developers
Top Ten Legal Issues for Game DevelopersDeborah Gonzalez, Esq.
 
Social Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & InsuranceSocial Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & InsuranceDeborah Gonzalez, Esq.
 

Plus de Deborah Gonzalez, Esq. (20)

Presentation: Social Media & HR
Presentation: Social Media & HRPresentation: Social Media & HR
Presentation: Social Media & HR
 
Legal Cosplay Fandom
Legal Cosplay FandomLegal Cosplay Fandom
Legal Cosplay Fandom
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital World
 
D gonzalez issa_wis_2014
D gonzalez issa_wis_2014D gonzalez issa_wis_2014
D gonzalez issa_wis_2014
 
Cobb Photo Society:
Cobb Photo Society: Cobb Photo Society:
Cobb Photo Society:
 
Protect Your Art: Copyrights/Trademarks for Artists
Protect Your Art: Copyrights/Trademarks for ArtistsProtect Your Art: Copyrights/Trademarks for Artists
Protect Your Art: Copyrights/Trademarks for Artists
 
Reality TV Law 101
Reality TV Law 101Reality TV Law 101
Reality TV Law 101
 
Film Law 101
Film Law 101Film Law 101
Film Law 101
 
Documentary Film Law 101
Documentary Film Law 101Documentary Film Law 101
Documentary Film Law 101
 
Understanding Digital Revenue Streams (for Musicians)
Understanding Digital Revenue Streams (for Musicians)Understanding Digital Revenue Streams (for Musicians)
Understanding Digital Revenue Streams (for Musicians)
 
Social Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & CollegesSocial Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & Colleges
 
Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
 
Bark World Blogger Conference (2013): Contracts and Negotiation
Bark World Blogger Conference (2013): Contracts and NegotiationBark World Blogger Conference (2013): Contracts and Negotiation
Bark World Blogger Conference (2013): Contracts and Negotiation
 
Straight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social MediaStraight Talk for Lawyers Using Social Media
Straight Talk for Lawyers Using Social Media
 
Digital Immortality, Digital Atlanta 2012
Digital Immortality, Digital Atlanta 2012Digital Immortality, Digital Atlanta 2012
Digital Immortality, Digital Atlanta 2012
 
Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012
 
Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!
 
Top Ten Legal Issues for Game Developers
Top Ten Legal Issues for Game DevelopersTop Ten Legal Issues for Game Developers
Top Ten Legal Issues for Game Developers
 
Social Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & InsuranceSocial Media Ethical Use for Finance & Insurance
Social Media Ethical Use for Finance & Insurance
 

Tag August2011

  • 1. Geeks, Tweets, & The Law TAG Webinar 2011 Deborah Gonzalez, Esq.
  • 2. Overview Welcome and Introduction The Technical of Social Media The Legal of the Tech: Social Media Platforms Employment/IP Mobile Applications Search Engine Optimization Cloud Computing Contracts/Liability Q&A
  • 3. Introduction Deborah Gonzalez, Esq. Founder of Law2sm, LLC New legal consulting firm focused on helping its clients navigate the legal issues relating to the new digital and social media world.
  • 4. The Technical of Social Media Hardware – invention/patents (ex. Smartphones) Software – development/copyrights/trademarks (ex. Mobile applications) Peopleware - vendors/developers/clients
  • 5. Social Media Platforms Social communication platform Interactive, two-way communication Facebook, Twitter, FourSquare, LinkedIn, etc. How many are you on?
  • 6. Social Media Platforms Employment Issues Hiring/firing Social Media Policies/Training Access to Social Media via Company Company vs. personal time Freedom of Speech Defamation/Reputation
  • 7. Social Media Platforms Intellectual Property Patents Smartphone Patent Battle – Apple vs. Samsung (Patent & TM Infringement over phone & tablet) Patent auction – Nortel Patents $4.5 billion bid (July 2011 Apple/MS)
  • 8. Social Media Platforms Intellectual Property Copyrights Infringement vs. fair use Creative Commons License Trademarks Facebook vs. Lamebook
  • 9. Mobile Apps App Name – Branding/TM Due Diligence – Competitive Research Functionality & Claims
  • 10. Mobile Apps Case Study 1: Health Care Apps “Mobile heath care technology is out pacing FDA regulations” Who will be liable? (WebMD disclaimer) “This tool does not provide medical advice. It is intended for informational purposes only. It is not a substitute for professional medical advice, diagnosis or treatment.”
  • 11. Mobile Apps Case Study 1: Health Care Apps Global Concern Health standards different in other countries Health Privacy Laws 1974 The National Research Act 1998 Health Insurance Portability & Accountability Act (HIPAA)
  • 12. Mobile Apps Case Study 2: Higher Ed & Accessibility American Disabilities Act * 1974 Family Educational Rights and Privacy Act (FERPA)
  • 13. Mobile Apps Case Study 3: Privacy A person's right to control access to his or her personal information. http://www.duhaime.org/LegalDictionary/P/Privacy.aspx Invasion of Privacy: encompasses workplace monitoring, Internet privacy, data collection, and other means of disseminating private information.
  • 14.
  • 15. As much as you give them
  • 20. How is that information collected?
  • 21.
  • 22. Privacy Spokeo.com – Enter a name and out comes: name, age, address, email addresses, gender, photos, videos, hobbies, economic health, estimated wealth, review of 86 social media sites, blog posts, family household make up, property details, maps, estimated value of property, politics, religion, education and occupation, family tree and neighborhood information.
  • 23. Privacy Geotagging Hallmark of cybercasing routine process of embedding digital photos with time and location information. camera phones have geotagging enabled by default
  • 24. Cloud Computing Software Licensing Service Level Agreements * Intellectual Property/Trade Secrets Privacy**/Data Security (access/authentication/encryption/ privileged data) * Termination/Suspension of Accounts ** Electronic Privacy Information Center/FTC Complaint about Google’s cloud computing services (bk in 2009)
  • 25. Cloud Computing Compliance w/Federal & State Laws Jurisdiction – Location – where is your data? Whose law governs where your data is stored? Third party access Subpoenas E-discovery Accountability is the issue.
  • 26. Search Engine Optimization What is SEO? Roger Cleveland Golf Company vs. Price, SC, 2010
  • 28. Contracts/Liability Who are you? Vendor, Developer, Client Developer vs. Programmer Employee or Work for Hire Independent Contractor Crowdsourcing
  • 29. Contracts/Liability Crowdsourcing To outsource work to an unspecified group of people, typically by making an appeal to the general public on the internet
  • 30. Contracts/Liability What are you doing? Blogging “Expert” Links Astroturfing
  • 31. Contracts/Liability What are you doing? Programming Deliver what you promise/deliver what you agreed to in the contract
  • 32. Contracts/Liability What are you doing? Programming Because you can, should you? Video Glasses Stream Everything you Do to Social Media Sites Mashable.com June, 2011
  • 33. Contracts/Liability What are you doing? Programming Security Flaw Liability – Malware No malicious code Failure to notice malware during testing Failure to notice malware during release process Sloppy testing/abbreviated analysis
  • 34. Questions for Geeks to Ask What am I developing? Who am I developing for? What is the relationship? (Employee or work for hire?) Is there a contract? Who owns the intellectual property rights of the app?
  • 35. Questions for Geeks to Ask What industry am I developing for? Will the app collect data? What kind? Is it restricted data? What will be my liability as a programmer? Is there an indemnity clause in the contract? Who do I ask if I have a concern?
  • 36. Q&A Email: deborah@law2sm.com Twitter: law2smdeborah

Notes de l'éditeur

  1. Old School – Old MediaBuy attention (paid advertising)Beg for attention (free PR)Bug for attention (sales)New School – Social MediaCurrency (what is important at this moment)Authenticity (credibility)Relevance (to who is reading)
  2. Blurred lines between company and personal timeSpeaking on behalf of the company vs. personal opinionConfidentiality concerns
  3. TM – name/symbol; likelihood of confusion
  4. App Name = Social Media Account Names (branding)
  5. Apple iTunes – over 10,000 medical & health apps available for downloadEx. CPR app – oral instructions for CPR – reliability – oversight of apps?
  6. Many physicians, Kairys and Kim agreed, are already familiar with some applications, such as Epocrates, which provides information on drug interactions, pricing and dosing via BlackBerry, Android, iPhone or Palm.But how conversant, Kim asked, are physicians with the many off-the-shelf medical apps for consumers?
  7. Two UFL blind students have sued because of e-learning systemsNYU civil rights complaint over Google Apps
  8. Experts estimate that a single tweet can violate 17 different federal privacy laws, as well as a number of state laws.
  9. Flash cookies – December 2010 – FTC settlement $2.4 million against defendants – online advertising companies Quantcast Corp and Clearspring Technologies, Inc + popular tv netowrks, a major movie studio and a major record label
  10. Google Chief Information Privacy Officer – Peter Fleischer March 2011 Post “Foggy Thinking about the Right to Oblivion”
  11. All of the information is publicly available, but the aggregator pulls from sources not routinely viewed or thought of when research is conducted on potential suspects.http://www.lawofficer.com/article/technology-and-communications/social-media-primer-investigat-0
  12. All of the information is publicly available, but the aggregator pulls from sources not routinely viewed or thought of when research is conducted on potential suspects.http://www.lawofficer.com/article/technology-and-communications/social-media-primer-investigat-0
  13. Signing the contract – electronic signatures
  14. No guarantees that your work will win the contest – transfer of copyrights to the contest holderBegan with Wikipedia and now crowdsourcing.org – thousands of companies ex. 99Designs
  15. Malware attacks – corporate responsibility