SlideShare une entreprise Scribd logo
1  sur  83
Managing the Legal Risks:
social media in the workplace
If you want to
  learn about
    risk, give
 mining a try
…and more
specifically, try
 gold mining
So what does gold mining have to do with
            social media?
Translating and applying the mining industry’s
         risk management framework
            to the office environment
International Organization for Standardization

ISO 31000: family of standards “to provide principles
    and generic guidelines on risk management”
What is risk?




“The effect of uncertainty on objectives,
     whether positive or negative”
Risk management steps




1. identify   2. assess   3. prioritise   4. treat
Risk treatment




1. eliminate   2. mitigate    3. share   4. accept
So what is the biggest single source of risk in
           the office environment?
these guys
Vicarious liability
(employer’s general risk)
What is
      vicarious
      liability?


Strict – or “no fault” - liability of an employer for
the conduct of an employee acting in the
course and scope of employment.
Bezuidenhout NO
 v Eskom 2003
Managing the risks posed by
                  vicarious liability




1. identify      2. assess    3. prioritise   4. treat
Treating the risks posed by
                    vicarious liability




1. eliminate     2. mitigate    3. share     4. accept
…and so
what about
  social
 media?
Step 1. Identify
Conduct: use of social media in the workplace
Step 2. Assess
Defamation




             Confidentiality


4 specific
  risks
               Personal
              Information




               Intellectual
                Property
Defamation




           Confidentiality



1st risk
             Personal
            Information




             Intellectual
              Property
Defamation




“the intentional and wrongful publication of words or
behaviour to a third party which has the effect
(objectively viewed) of injuring or undermining a
person’s or entity’s good name, status or reputation”
Defamation




The internet has increased the scope of and risk
associated with defamation

There are now more ways in which publication may
occur
Remember



Defamation includes the repeating,
confirmation or proliferation of defamatory
content…

…so beware of republishing, email forwarding,
linking and retweeting.
…and, of
 course,
vicarious
 liability
Defamation
eliminate > mitigate > share > accept
Eliminate




> Lock employees out of social media sites
> Limit access for work purposes only
Mitigate




> Training
> Internet usage and email policies
> Communications and brand guidelines
> Management pre-approval of publications
Share




> Disclaimers on digital properties
> Website terms and conditions
> Insurance
Accept




Hope for the best and deal with it if it happens
“psychotic, lying,
                    whoring, still-going-
                    to-clubs-at-her-age
                    skank”




This guy shot JFK
Defamation




           Confidentiality



2nd risk
             Personal
            Information




             Intellectual
              Property
Pretty much all well-drafted commercial
agreements these days contain
confidentiality – or non-disclosure –
provisions of some sort or another.
…once again,
 vicarious
  liability
Confidentiality
eliminate > mitigate > share > accept
Eliminate




> Do not accept confidential material
> Only accept what is strictly necessary
Mitigate




> Training
> Employment agreements and policies
> Secure networks and robust IT infrastructure
Share




> Well considered NDAs
> Insurance
Accept




Hope for the best and deal with it if it happens
Defamation




           Confidentiality



3rd risk
             Personal
            Information




             Intellectual
              Property
The right to privacy is protected by the
Constitution

However, there is currently no umbrella law
governing privacy of personal information in
South Africa
Chapter 8 of ECTA contains a data protection
“Code of Good Practice”, but compliance is
voluntary.

If adopted, the principles should be included in
website privacy policy and consequences of
breach should be clearly stipulated.
Enter the Protection of Personal
Information Bill (POPIA)
POPI
      the intention




> To give effect to the Constitutional right to privacy
> To regulate the collection/processing of personal information
> To provide individuals with rights and remedies
> to establish an Information Protection Commission
POPI
       Section 10




Personal information may only be processed:
> with the data subject’s consent
> if processing is necessary for completion of a contract
> if it protects a legitimate interest of the data subject
> if in compliance with an obligation imposed by law
> if in pursuance of the legitimate interests of the processor
Direct Marketing
Opt-in versus opt-out
Direct
    marketing
       Opt out




ECTA (section 45) and the CPA (section 11) both require
direct marketers to provide recipients with an option to “opt
out”

The CPA envisages an “opt out” registry (like that of the
DMMA), but this has not yet been implemented.
Direct
   marketing
       Opt in




POPI, however, will implement an “opt in” framework,
mirroring the approach being adopted in Europe.
Direct
    marketing
         Opt in




Direct marketing is prohibited except:
> with specific consent of the data subject
> to customers, where:
    > the processor has obtained personal information in the context of a
       sale
    > for marketing of processor’s similar products/services
    > if data subject has been given opportunity to object or opt out (free
       of charge)
Direct
    marketing
      Soft opt in




In the UK, the implied “opt in” is known as a “soft opt in”.

It applies also in the context of negotiations leading up to a
sale.
…you know the
score by now
Personal Information
eliminate > mitigate > share > accept
Eliminate




> Do not collect/process personal information
> Only collect what is strictly necessary
Mitigate




> Training
> Internal policies and guidelines
> IT and online security
> Compliance with ECTA, CPA and POPIA
> Regular audits
Share




> Detailed commercial agreements
> Website terms and conditions
> Insurance
Accept




Hope for the best and deal with it if it happens
Defamation




           Confidentiality



4th risk
             Personal
            Information




             Intellectual
              Property
What is IP?




“A work or invention that is the result of
creativity, such as a manuscript or a design,
to which one has rights and for which one may
apply for a patent, copyright, trademark, etc.”
Intellectual Property
      Copyright
      Trademark
        Patent
COPYRIGHT
What is
  copyright?




“A proprietary right which arises automatically
when an author reduces an idea to a material
form.”
What is
   copyright?



No requirement for registration (in SA)

Copyright can be:
 > assigned (must be in writing and signed)
 > licenced
Breach of
    copyright




Breach or infringement of copyright may be:
> direct (guilty knowledge is not a pre-requisite)
> secondary/indirect (unauthorised dealing)
> contributory (facilitation of infringement)
Important!




Copyright in work produced by employee in the
course of employment vests with employer

Online properties often comprise of many different
copyrighted assets
TRADEMARKS
What is a
  trademark?



A mark which distinguishes a person’s goods
or services (requirement of distinctiveness)

Must be registered with CIPC and renewed
every 10 years
Breach of
       TM




Infringer’s mark is confusingly similar in respect of the same
goods/services (reasonable likelihood of confusion)

Infringer’s mark is identical or similar to a registered mark in
respect of similar goods or services
Breach of
       TM




Dilution of trade mark:
> by blurring (dilution of uniqueness; may be different or non-
  competing goods/services)
> by tarnishment (negative/offensive use of TM)
Meta tags
    and PPC



A common sense approach should be employed (certain bona
fide uses protected under Trade Marks Act)
> purely descriptive purposes (advertising products on an e-
   commerce site) would generally be ok
> use of a competitor’s marks to deceive or lure consumers
   would generally not be ok
In depth – trademark


      This is
    Terri Welles
Intellectual Property
eliminate > mitigate > share > accept
Who owns
your twitter
 account?
…or who is
using it??
Eliminate




> Use only proprietary material
> Limit access to the internet / social media
Mitigate




> Training
> Internal policies and guidelines
> Provide access to stock content providers
> Regular audits and management sign-off
Share




> Detailed commercial agreements
> Limit liability for 3rd party IP infringements
> Insurance
Accept




Hope for the best and deal with it if it happens
…back to
 mining
Risk management steps




1. identify   2. assess   3. prioritise   4. treat
Risk treatment




1. eliminate   2. mitigate    3. share   4. accept
the end

Contenu connexe

Similaire à Managing the legal risks: Social Media in the workplace

Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
bartholomeocoombs
 

Similaire à Managing the legal risks: Social Media in the workplace (20)

Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
E commerce
E commerce E commerce
E commerce
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Ss
SsSs
Ss
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
 
Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Cyber Safe Southwark
Cyber Safe SouthwarkCyber Safe Southwark
Cyber Safe Southwark
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 

Plus de Mirum Africa

Hr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.finalHr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.final
Mirum Africa
 
Using Digital to market your business
Using Digital to market your businessUsing Digital to market your business
Using Digital to market your business
Mirum Africa
 
What the Agency of 2020 Looks Like
What the Agency of 2020 Looks LikeWhat the Agency of 2020 Looks Like
What the Agency of 2020 Looks Like
Mirum Africa
 
Brand building for the digital age: the Destination
Brand building for the digital age: the DestinationBrand building for the digital age: the Destination
Brand building for the digital age: the Destination
Mirum Africa
 
Mobile: What it means for brands
Mobile: What it means for brandsMobile: What it means for brands
Mobile: What it means for brands
Mirum Africa
 

Plus de Mirum Africa (14)

World Design Capital - Design Engine Concept
World Design Capital - Design Engine ConceptWorld Design Capital - Design Engine Concept
World Design Capital - Design Engine Concept
 
Art & Code
Art & CodeArt & Code
Art & Code
 
Measuring Social Media is Easy
Measuring Social Media is Easy Measuring Social Media is Easy
Measuring Social Media is Easy
 
Social Media For Your Business
Social Media For Your BusinessSocial Media For Your Business
Social Media For Your Business
 
Beyond reach and awareness: How the social nature of the web is reshaping the...
Beyond reach and awareness: How the social nature of the web is reshaping the...Beyond reach and awareness: How the social nature of the web is reshaping the...
Beyond reach and awareness: How the social nature of the web is reshaping the...
 
Personal Branding
Personal BrandingPersonal Branding
Personal Branding
 
Hr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.finalHr Harnessing the Power of Social Media.final
Hr Harnessing the Power of Social Media.final
 
Jozi QuirkStation
Jozi QuirkStationJozi QuirkStation
Jozi QuirkStation
 
Quirk's Picturebook
Quirk's Picturebook Quirk's Picturebook
Quirk's Picturebook
 
Should Brands be Banned from Social Media?
Should Brands be Banned from Social Media?Should Brands be Banned from Social Media?
Should Brands be Banned from Social Media?
 
Using Digital to market your business
Using Digital to market your businessUsing Digital to market your business
Using Digital to market your business
 
What the Agency of 2020 Looks Like
What the Agency of 2020 Looks LikeWhat the Agency of 2020 Looks Like
What the Agency of 2020 Looks Like
 
Brand building for the digital age: the Destination
Brand building for the digital age: the DestinationBrand building for the digital age: the Destination
Brand building for the digital age: the Destination
 
Mobile: What it means for brands
Mobile: What it means for brandsMobile: What it means for brands
Mobile: What it means for brands
 

Dernier

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 

Dernier (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
 

Managing the legal risks: Social Media in the workplace

  • 1. Managing the Legal Risks: social media in the workplace
  • 2. If you want to learn about risk, give mining a try
  • 4. So what does gold mining have to do with social media?
  • 5. Translating and applying the mining industry’s risk management framework to the office environment
  • 6. International Organization for Standardization ISO 31000: family of standards “to provide principles and generic guidelines on risk management”
  • 7. What is risk? “The effect of uncertainty on objectives, whether positive or negative”
  • 8. Risk management steps 1. identify 2. assess 3. prioritise 4. treat
  • 9. Risk treatment 1. eliminate 2. mitigate 3. share 4. accept
  • 10. So what is the biggest single source of risk in the office environment?
  • 13. What is vicarious liability? Strict – or “no fault” - liability of an employer for the conduct of an employee acting in the course and scope of employment.
  • 14. Bezuidenhout NO v Eskom 2003
  • 15. Managing the risks posed by vicarious liability 1. identify 2. assess 3. prioritise 4. treat
  • 16. Treating the risks posed by vicarious liability 1. eliminate 2. mitigate 3. share 4. accept
  • 17. …and so what about social media?
  • 18. Step 1. Identify Conduct: use of social media in the workplace
  • 20. Defamation Confidentiality 4 specific risks Personal Information Intellectual Property
  • 21. Defamation Confidentiality 1st risk Personal Information Intellectual Property
  • 22. Defamation “the intentional and wrongful publication of words or behaviour to a third party which has the effect (objectively viewed) of injuring or undermining a person’s or entity’s good name, status or reputation”
  • 23. Defamation The internet has increased the scope of and risk associated with defamation There are now more ways in which publication may occur
  • 24. Remember Defamation includes the repeating, confirmation or proliferation of defamatory content… …so beware of republishing, email forwarding, linking and retweeting.
  • 27. Eliminate > Lock employees out of social media sites > Limit access for work purposes only
  • 28. Mitigate > Training > Internet usage and email policies > Communications and brand guidelines > Management pre-approval of publications
  • 29. Share > Disclaimers on digital properties > Website terms and conditions > Insurance
  • 30. Accept Hope for the best and deal with it if it happens
  • 31. “psychotic, lying, whoring, still-going- to-clubs-at-her-age skank” This guy shot JFK
  • 32. Defamation Confidentiality 2nd risk Personal Information Intellectual Property
  • 33. Pretty much all well-drafted commercial agreements these days contain confidentiality – or non-disclosure – provisions of some sort or another.
  • 36. Eliminate > Do not accept confidential material > Only accept what is strictly necessary
  • 37. Mitigate > Training > Employment agreements and policies > Secure networks and robust IT infrastructure
  • 38. Share > Well considered NDAs > Insurance
  • 39. Accept Hope for the best and deal with it if it happens
  • 40.
  • 41. Defamation Confidentiality 3rd risk Personal Information Intellectual Property
  • 42. The right to privacy is protected by the Constitution However, there is currently no umbrella law governing privacy of personal information in South Africa
  • 43. Chapter 8 of ECTA contains a data protection “Code of Good Practice”, but compliance is voluntary. If adopted, the principles should be included in website privacy policy and consequences of breach should be clearly stipulated.
  • 44. Enter the Protection of Personal Information Bill (POPIA)
  • 45. POPI the intention > To give effect to the Constitutional right to privacy > To regulate the collection/processing of personal information > To provide individuals with rights and remedies > to establish an Information Protection Commission
  • 46. POPI Section 10 Personal information may only be processed: > with the data subject’s consent > if processing is necessary for completion of a contract > if it protects a legitimate interest of the data subject > if in compliance with an obligation imposed by law > if in pursuance of the legitimate interests of the processor
  • 48. Direct marketing Opt out ECTA (section 45) and the CPA (section 11) both require direct marketers to provide recipients with an option to “opt out” The CPA envisages an “opt out” registry (like that of the DMMA), but this has not yet been implemented.
  • 49. Direct marketing Opt in POPI, however, will implement an “opt in” framework, mirroring the approach being adopted in Europe.
  • 50. Direct marketing Opt in Direct marketing is prohibited except: > with specific consent of the data subject > to customers, where: > the processor has obtained personal information in the context of a sale > for marketing of processor’s similar products/services > if data subject has been given opportunity to object or opt out (free of charge)
  • 51. Direct marketing Soft opt in In the UK, the implied “opt in” is known as a “soft opt in”. It applies also in the context of negotiations leading up to a sale.
  • 53. Personal Information eliminate > mitigate > share > accept
  • 54. Eliminate > Do not collect/process personal information > Only collect what is strictly necessary
  • 55. Mitigate > Training > Internal policies and guidelines > IT and online security > Compliance with ECTA, CPA and POPIA > Regular audits
  • 56. Share > Detailed commercial agreements > Website terms and conditions > Insurance
  • 57. Accept Hope for the best and deal with it if it happens
  • 58. Defamation Confidentiality 4th risk Personal Information Intellectual Property
  • 59. What is IP? “A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.”
  • 60. Intellectual Property Copyright Trademark Patent
  • 62. What is copyright? “A proprietary right which arises automatically when an author reduces an idea to a material form.”
  • 63. What is copyright? No requirement for registration (in SA) Copyright can be: > assigned (must be in writing and signed) > licenced
  • 64. Breach of copyright Breach or infringement of copyright may be: > direct (guilty knowledge is not a pre-requisite) > secondary/indirect (unauthorised dealing) > contributory (facilitation of infringement)
  • 65. Important! Copyright in work produced by employee in the course of employment vests with employer Online properties often comprise of many different copyrighted assets
  • 67. What is a trademark? A mark which distinguishes a person’s goods or services (requirement of distinctiveness) Must be registered with CIPC and renewed every 10 years
  • 68. Breach of TM Infringer’s mark is confusingly similar in respect of the same goods/services (reasonable likelihood of confusion) Infringer’s mark is identical or similar to a registered mark in respect of similar goods or services
  • 69. Breach of TM Dilution of trade mark: > by blurring (dilution of uniqueness; may be different or non- competing goods/services) > by tarnishment (negative/offensive use of TM)
  • 70. Meta tags and PPC A common sense approach should be employed (certain bona fide uses protected under Trade Marks Act) > purely descriptive purposes (advertising products on an e- commerce site) would generally be ok > use of a competitor’s marks to deceive or lure consumers would generally not be ok
  • 71.
  • 72. In depth – trademark This is Terri Welles
  • 73. Intellectual Property eliminate > mitigate > share > accept
  • 76. Eliminate > Use only proprietary material > Limit access to the internet / social media
  • 77. Mitigate > Training > Internal policies and guidelines > Provide access to stock content providers > Regular audits and management sign-off
  • 78. Share > Detailed commercial agreements > Limit liability for 3rd party IP infringements > Insurance
  • 79. Accept Hope for the best and deal with it if it happens
  • 81. Risk management steps 1. identify 2. assess 3. prioritise 4. treat
  • 82. Risk treatment 1. eliminate 2. mitigate 3. share 4. accept