SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
SOCIAL MEDIA AND
CONFIDENTIALITY:
The Ease of
Intentional (and
Unintentional)
Disclosures
Prof. Jonathan I. Ezor
Touro Law Center for Innovation in Business, Law and Technology
jezor@tourolaw.edu
@ProfJonathan on Twitter
Nassau County Bar Association
Intellectual Property Law Committee
October 30, 2013
Confidentiality Key
to Business
• Confidentiality crucial to many business contexts
–
–
–
–
–

Due diligence
Joint ventures
Employment
Technology
Media

• Many professions have confidentiality obligations
• Law relevant as well
• Can be necessary to preserve trade secret
protection
jezor@tourolaw.edu
NDA:
Prohibition ≠
Prevention
• Non-disclosure agreements key tool for
preserving confidentiality
• Standalone or included in other
agreements/policy documents
• Set forth obligations for/limitations on
confidentiality
• Cannot prevent disclosure

jezor@tourolaw.edu
Risk Management
for Sensitive
Information
• Those sharing confidentiality information must
assess, manage risks
–
–
–
–

Selective disclosure
Redaction/anonymizing data
Access restrictions
Agreements

• Mobile devices, Internet add to concerns

jezor@tourolaw.edu
Social Media:
Antithesis of
Confidentiality
• Social media designed to enable, encourage
information sharing
• May be accessed via Web, mobile, even text
messages
• Brevity balanced by links, metadata
– GPS/location info
– EXIF data in photos

• Difficult to separate personal/professional,
public/private
jezor@tourolaw.edu
http://shankman.com/be-careful-what-youpost/

Many of my peers and I feel this is inappropriate. We
do not know the total millions of dollars FedEx
Corporation pays Ketchum annually for the valuable
and important work your company does for us
around the globe. We are confident however, it is
enough to expect a greater level of respect and
awareness from someone in your position as a vice
president at a major global player in your industry. A
hazard of social networking is people will read what
you write.
The visitor had recently learned that Tocquigny was wooing
one of his company's competitors—by seeing a message that
one of Tocquigny's employees had posted to Twitter. "It took
me by surprise," says Tocquigny. "I realized that we needed
to be more cautious about what we throw out there in to the
universe."
Apple's code of silence extends to
140-character messages on the
microblogging site Twitter. During an
in-person meeting with Apple
representatives in February, Wall
Street Journal Deputy Managing Editor
Alan Murray posted a short message
to Twitter that announced he was
using the device. The tweet was later
removed from the site.
Risk Management
Approaches for
Social Media
• Policies
• Training
– Tools
– Best practices

• Industry-specific requirements
• Monitoring
– Self
– Others

• Insurance
jezor@tourolaw.edu
QUESTIONS?

jezor@tourolaw.edu

Contenu connexe

Tendances

Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
stephanieprovitt
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
Nicole Black
 

Tendances (20)

Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Safe shipley 2 upload
Safe shipley 2 uploadSafe shipley 2 upload
Safe shipley 2 upload
 
TrendsintheIndustry (1)
TrendsintheIndustry (1)TrendsintheIndustry (1)
TrendsintheIndustry (1)
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellows
 

En vedette

«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»
Maria1808
 
Psychology and Architecture in Cities: Phallic Architecture
Psychology and Architecture in Cities:  Phallic ArchitecturePsychology and Architecture in Cities:  Phallic Architecture
Psychology and Architecture in Cities: Phallic Architecture
Ulaş Başar Gezgin
 

En vedette (7)

Privacy (architectural behaviour)
Privacy (architectural behaviour)Privacy (architectural behaviour)
Privacy (architectural behaviour)
 
How Does Architecture Affect Behavior?
How Does Architecture Affect Behavior?How Does Architecture Affect Behavior?
How Does Architecture Affect Behavior?
 
Cognitive perspective
Cognitive perspectiveCognitive perspective
Cognitive perspective
 
Structure, Space and the Mind
Structure, Space and the MindStructure, Space and the Mind
Structure, Space and the Mind
 
«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»
 
Psychology and Architecture
Psychology and ArchitecturePsychology and Architecture
Psychology and Architecture
 
Psychology and Architecture in Cities: Phallic Architecture
Psychology and Architecture in Cities:  Phallic ArchitecturePsychology and Architecture in Cities:  Phallic Architecture
Psychology and Architecture in Cities: Phallic Architecture
 

Similaire à 10-30-13 Social Media and Confidentiality Presentation

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
YogeshIJTSRD
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
seadeloitte
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 

Similaire à 10-30-13 Social Media and Confidentiality Presentation (20)

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Team black
Team blackTeam black
Team black
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Issues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptxIssues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptx
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 

Plus de Jonathan Ezor

Plus de Jonathan Ezor (11)

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 

Dernier

NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Dubai Multi Commodity Centre
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
srcw2322l101
 

Dernier (20)

Global Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdfGlobal Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdf
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdf
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)
 
A Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettA Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob Badgett
 
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.docGuide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
 
NFS- Operations Presentation - Recurrent
NFS- Operations Presentation - RecurrentNFS- Operations Presentation - Recurrent
NFS- Operations Presentation - Recurrent
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
 
WAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdfWAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdf
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings release
 
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 

10-30-13 Social Media and Confidentiality Presentation

  • 1. SOCIAL MEDIA AND CONFIDENTIALITY: The Ease of Intentional (and Unintentional) Disclosures Prof. Jonathan I. Ezor Touro Law Center for Innovation in Business, Law and Technology jezor@tourolaw.edu @ProfJonathan on Twitter Nassau County Bar Association Intellectual Property Law Committee October 30, 2013
  • 2. Confidentiality Key to Business • Confidentiality crucial to many business contexts – – – – – Due diligence Joint ventures Employment Technology Media • Many professions have confidentiality obligations • Law relevant as well • Can be necessary to preserve trade secret protection jezor@tourolaw.edu
  • 3. NDA: Prohibition ≠ Prevention • Non-disclosure agreements key tool for preserving confidentiality • Standalone or included in other agreements/policy documents • Set forth obligations for/limitations on confidentiality • Cannot prevent disclosure jezor@tourolaw.edu
  • 4. Risk Management for Sensitive Information • Those sharing confidentiality information must assess, manage risks – – – – Selective disclosure Redaction/anonymizing data Access restrictions Agreements • Mobile devices, Internet add to concerns jezor@tourolaw.edu
  • 5. Social Media: Antithesis of Confidentiality • Social media designed to enable, encourage information sharing • May be accessed via Web, mobile, even text messages • Brevity balanced by links, metadata – GPS/location info – EXIF data in photos • Difficult to separate personal/professional, public/private jezor@tourolaw.edu
  • 6. http://shankman.com/be-careful-what-youpost/ Many of my peers and I feel this is inappropriate. We do not know the total millions of dollars FedEx Corporation pays Ketchum annually for the valuable and important work your company does for us around the globe. We are confident however, it is enough to expect a greater level of respect and awareness from someone in your position as a vice president at a major global player in your industry. A hazard of social networking is people will read what you write.
  • 7.
  • 8. The visitor had recently learned that Tocquigny was wooing one of his company's competitors—by seeing a message that one of Tocquigny's employees had posted to Twitter. "It took me by surprise," says Tocquigny. "I realized that we needed to be more cautious about what we throw out there in to the universe."
  • 9. Apple's code of silence extends to 140-character messages on the microblogging site Twitter. During an in-person meeting with Apple representatives in February, Wall Street Journal Deputy Managing Editor Alan Murray posted a short message to Twitter that announced he was using the device. The tweet was later removed from the site.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Risk Management Approaches for Social Media • Policies • Training – Tools – Best practices • Industry-specific requirements • Monitoring – Self – Others • Insurance jezor@tourolaw.edu