SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
Shawn E. Tuma
Cybersecurity & Data Privacy Attorney
Scheef & Stone, LLP
Shawn.Tuma@solidcounsel.com
(214) 472-2135
@shawnetuma
What Could Go Wrong?
Avoiding the Legal Pitfalls of
Social Media Marketing
A smart man learns from his mistakes.
A wise man learns from the mistakes of others.
A fool never learns.
3@shawnetuma
“An ounce of prevention is cheaper than
the first day of litigation” – Shawn Tuma
@shawnetuma
OWNERSHIP / CONTROL / TRANSFER
@shawnetuma
PhoneDog v. Kravitz
• PhoneDog (employer) / Kravitz (employee /
blogger)
• @PhoneDog_Noah had 17,000 followers
• Kravitz resigned, refused to turn over his
Twitter account, changed handle to
@noahkravitz and grew to 24,000 followers
• PhoneDog sued (7/15/11), heavy litigation,
settled (12/12) = 1.5 yrs of fees & Kravitz still
has @noahkravitz
THE TAKEAWAY
Every company needs a contractual agreement that
clearly states who owns social media accounts used on
behalf of the company.
Ownership &
Control Over
Accounts
@shawnetuma
• Unauthorized Access = hacking!!!
• Sale / M&A / Bankruptcy = company asset
• Personal – who updates when you pass?
• Blogs / Subscriber Sites with consumer
information?
• → Privacy Policy?
Sales & Transfers
of Accounts
@shawnetuma
INTELLECTUAL PROPERTY
@shawnetuma
Intellectual Property
i.e., copyrights, trademarks, trade secrets,
confidential and proprietary information
• Protect your content and brand
• Copyright & trademarks
• Example: client brand w/o trademark, then
negotiating to obtain
• Tip: use unique phrases + Google Alerts! 
• Do you want to tell your competitors?
• Customer / vendor lists
• Who are you talking to or following?
• Departing employee’s LinkedIn?
• Secret business alliances, strategies, plans
• Business situational awareness
Your Intellectual
Property
@shawnetuma
• Infringement of trademark
• Right to publicity
• name, voice, signature, photo, likeness
(statutory after death)
• commercial v. educational or newsworthy
• audience picture v. company promo video
• Infringement of copyright
• attribution isn’t enough (this isn’t plagerism)
• DMCA Takedown Request
• Google penalizes for too many
• Must have a license or use creative
commons … but …
Other’s
Intellectual
Property
@shawnetuma
Copyright Example
Attribution: prthugp @
http://www.officialpsds.com/prthugp-Profile9747.html
License: Creative CommonsAttribution 3.0
@shawnetuma
@shawnetuma
ONLINE SMACK TALKING
@shawnetuma
Reputation management
• Be nice – if legit, address the problem
• i.e., “who” are you and what is your “brand”?
• Compare: church with TM vs. Bullyville
• Healthcare / PHI???
• Outing the anonymous defamer
• Beaconing / email ping-back
• DMCA takedown request if IP (must respond)
• Pay a good PR firm instead of paying
lawyers (best advice!)
• Litigation – but …
Dealing with
Smack Talk!
Someone talking bad
about your business
online?
• Defamation rules apply online
but …
• The “Streisand Effect”
• Anti-SLAPP (Strategic Lawsuits
Against Public Participation
• ≠ assign copyright of reviews
• ≠ charge $500 per bad review
@shawnetuma
AGENCY ISSUES
@shawnetuma
@shawnetuma
TORTS & REGULATORY LIABILITY
Tort Claims
What your company’s employees say or do can hurt you!
• communications
• tortious interference
• defamation (libel, slander, bus. disparagement)
• false advertising & false warranties
• privacy / data breaches
• online impersonation
• harassment and cyber-bullying
• “puffery” of facts
Regulatory Liability
Federal Agencies are Watching
• FTC – Investigated Hyundai for not disclosing incentives given to bloggers for
endorsements
• Big deal – FTC very active in this area
• Celebrity endorsements of ICOs = FTC, SEC & CFTC oversight!
• HHS & OCR – could have investigated hospital worker who posted patient
“PHI” on Facebook → “Funny, but this patient came in to cure her VD and get
birth control.”
• SEC – false statements in raising funds (SEC v. Imperia Invest. IBC) or insider
information → “Board meeting. Good numbers = Happy Board.” before official
release
@shawnetuma
CONTRACT LIABILITY
Terms of Service / Use – Potential Trouble Spots
• Giveaways and contests can be trouble for many reasons – do not do
them on social media without careful consideration and vetting
• Service’s Terms of Service
• Jurisdiction gambling and contest rules
• Example: Facebook’s Terms of Service for Pages are very specific
about requirements for Promotions
• A complete release of Facebook by each entrant or participant
• Acknowledgement that Facebook is not sponsoring or affiliated
https://www.facebook.com/page_guidelines.php
Twitter Bots – On No, The Russians Did It!!!
#TwitterLockOut
Twitter’s Rules & Policies governing “Automated Activity”
@shawnetuma
Privacy & Data Security
@shawnetuma
Come on, people???
New York Department of Financial Services Cybersecurity (NYDFS)
Requirements for Financial Services Companies + [fill in]
• All NY “financial institutions” + third party service providers.
• Third party service providers – examine, obligate, audit.
• Establish Cybersecurity Program (w/ specifics):
• Logging, Data Classification, IDS, IPS;
• Pen Testing, Vulnerability Assessments, Risk Assessment; and
• Encryption, Access Controls.
• Adopt Cybersecurity Policies.
• Designate qualified CISO to be responsible.
• Adequate cybersecurity personnel and intelligence.
• Personnel Policies & Procedures, Training, Written IRP.
• Chairman or Senior Officer Certify Compliance.
EU – General Data Protection Regulation (GDPR)
• Goal: Protect all EU citizens from privacy and data breaches.
• When: May 25, 2018.
• Reach: Applies to all companies (controllers and processors):
• Processing data of EU residents (regardless of where processing),
• In the EU (regardless of where processing), or
• Offering goods or services to EU citizens or monitoring behavior in EU.
• Penalties: up to 4% global turnover or €20 Million (whichever is greater).
• Remedies: data subjects have judicial remedies, right to damages.
• Data subject rights:
• Breach notification – 72 hrs to DPA; “without undue delay” to data subjects.
• Right to access – provide confirmation of processing and electronic copy (free).
• Data erasure – right to be forgotten, erase, cease dissemination or processing.
• Data portability – receive previously provided data in common elect. format.
• Privacy by design – include data protection from the onset of designing systems.
@shawnetuma
EVIDENCE
“The law has a right to every man’s evidence”
• Courts look to social media for public posts, private messages, “Likes”, etc.
• Club’s SM before Cowboys’ Josh Brent wreck killing Jerry Brown: “I have 12
#Cowboys in theeee building!!!!!!!!!! #Privae” … “These fools buying Ace on top of
Ace!!!!!!!”
• Danielle Saxton’s Facebook “selfie” wearing stolen merchandise – easy evidence!
• Daughter’s $80,000 Facebook “brag”: "Mama and Papa Snay won the case against
Gulliver. Gulliver is now officially paying for my vacation to Europe this summer. SUCK
IT."
• Document Retention Policy
• No reasonable expectation of privacy (even private messages), usually
• If litigation is anticipated
• Cannot permanently delete account or posts; may be able to “take down”
• Cannot selectively delete posts
@shawnetuma
SOCIAL MEDIA POLICIES
General Strategy for Policies
• Recognize and appreciate potential issues
• Decide how to handle those issues
• Educate your team on those issues
• Collaborate and train on how to comply with and resolve issues
• Create and outline procedures for using social media
• Monitor (to some degree) to ensure compliance
• Know your industry requirements (i.e., healthcare)
• If a “form” is given by your regulator, use it!!!
Social media policies are a “MUST HAVE”
• Ounce of prevention: less than 1 day of litigation
• If have, must enforce
• Trying to predict issues – but evolving – can’t get all
• Contractually resolve issues such as ownership and authority
• Great opportunity to set rules and document expectations
• Training - greater opportunity to explain and ensure understanding of
expectations
• Put on notice of monitoring – and actually monitor!
• Should address employment issues
But, will the National Labor Relations Board allow it?
• NLRB jurisdiction = impacts interstate commerce
• National Labor Relations Act (NLRA) sec. 7 gives employees right to
engage in “concerted activities for the purpose of … mutual aid and
protection”
• NLRB finds illegal any policy provision that (a) restricts or (b) an
employee would reasonably construe to chill concerted activities
• NLRB General Counsel has issued multiple Reports on Social Media
Policies – extraordinary activity
Can you guess who the NLRB is pulling for?
• Making it very difficult for businesses to protect themselves
• Social media policies must now be carefully tailored to
• Address unique business and legal needs of your business
• Be enforceable and lawful in a court of law
• Be legal in the eyes of the NLRB
• Examples of provisions found illegal by NLRB
Can you guess who the NLRB is pulling for?
“Bob is such a NASTY MOTHER F***** don’t know how to talk to
people!!!!!! F*** his mother and his entire f****** family!!!! What a
LOSER!!!! Vote YES for the UNION!!!!!!!”
@shawnetuma
36
@shawnetuma
37
@shawnetuma
38
@shawnetuma
39
Richmond Dist. Neighborhood Center v. Callaghan
“The question is whether
the conduct is so egregious
as to take it outside the
protection of the Act, or of
such character as to render
the employee unfit for
further service.”
Can you guess who the NLRB is pulling for?
56 Pier Sixty, LLC (NLRB March 31, 2015)
• Employee on Facebook: called his manager a “NASTY MOTHER
F****R” and a “LOSER,” said “f**k his mother and his entire f***ing
family,” and ended the post by saying “Vote Yes for the Union!”
• Company fired him.
• NLRB: Firing improper. Feeling of mistreatment motivated statements
and employees were simultaneously seeking redress through
upcoming union election which made statements protected,
concerted activity.
• Comments not egregious enough.
What is the NLRB really looking for?
• Clarity and precision
• Examples of do’s and don’ts that give context and real-life meaning to
the rules
• Implementation + training =
@shawnetuma
CYBER / MEDIA INSURANCE
Cyber Liability Insurance
• If you are doing anything in cyber/digital, you need it. Period.
• Most traditional insurance does not cover cyber-events, even if you
think it does (really!)
• Cyber Insurance is relatively inexpensive
• Some policies include a cyber risk audit before being underwritten
• Policies can cover social media risk, computer fraud risk, data breach
/ hacking risk, and even social engineering
• But, they are tricky – you have to really know what you’re looking for
vis-à-vis your company’s risks
• Board of Directors & General Counsel, Cyber Future Foundation
• Board of Advisors, NorthTexas Cyber Forensics Lab
• Policy Council, NationalTechnology Security Coalition
• CybersecurityTask Force, IntelligentTransportationSociety of America
• Practitioner Editor, Bloomberg BNA –Texas Cybersecurity & Data Privacy Law
• Cybersecurity & Data Privacy LawTrailblazers, National Law Journal (2016)
• SuperLawyersTop 100 Lawyers in Dallas (2016)
• SuperLawyers 2015-17
• Best Lawyers in Dallas 2014-17, D Magazine (Cybersecurity Law)
• Council, Computer &Technology Section, State Bar ofTexas
• Privacy and Data Security Committee of the State Bar ofTexas
• College of the State Bar ofTexas
• Board of Directors, CollinCounty Bench Bar Conference
• Past Chair,Civil Litigation &Appellate Section, CollinCounty Bar Association
• Information Security Committee of the Section on Science &Technology
Committee of the American BarAssociation
• NorthTexas Crime Commission, Cybercrime Committee & Infragard (FBI)
• InternationalAssociation of Privacy Professionals (IAPP)
Shawn Tuma
Cybersecurity Partner
Scheef & Stone, L.L.P.
214.472.2135
shawn.tuma@solidcounsel.com
@shawnetuma
blog: www.shawnetuma.com
web: www.solidcounsel.com

Contenu connexe

Tendances

Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Brian Miller, Solicitor
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual PropertyPrimumMarketing
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
In house lawyers' forum, September 2017
In house lawyers' forum, September 2017In house lawyers' forum, September 2017
In house lawyers' forum, September 2017Browne Jacobson LLP
 
Ethics Final Paper
Ethics Final PaperEthics Final Paper
Ethics Final PaperPutri Balqis
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
Cooley Law Fall 09 Presentation
Cooley Law Fall 09 PresentationCooley Law Fall 09 Presentation
Cooley Law Fall 09 Presentationpriyamd
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy Laurent Liscia
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Employment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceEmployment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceThe Organic Agency
 
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...Browne Jacobson LLP
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalistsEllyn Angelotti
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusBarry Caplin
 
Gold Coast North Chamber of Commerce
Gold Coast North Chamber of CommerceGold Coast North Chamber of Commerce
Gold Coast North Chamber of CommercePod Legal
 
Lupton fawcett 'social media' seminar for the cipd 20 october 2011
Lupton fawcett 'social media' seminar for the cipd   20 october 2011Lupton fawcett 'social media' seminar for the cipd   20 october 2011
Lupton fawcett 'social media' seminar for the cipd 20 october 2011seclarkson
 

Tendances (20)

Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
In house lawyers' forum, September 2017
In house lawyers' forum, September 2017In house lawyers' forum, September 2017
In house lawyers' forum, September 2017
 
Ethics Final Paper
Ethics Final PaperEthics Final Paper
Ethics Final Paper
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Cooley Law Fall 09 Presentation
Cooley Law Fall 09 PresentationCooley Law Fall 09 Presentation
Cooley Law Fall 09 Presentation
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Employment Law - Social Media in the Workplace
Employment Law - Social Media in the WorkplaceEmployment Law - Social Media in the Workplace
Employment Law - Social Media in the Workplace
 
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalists
 
2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy
 
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your BusinessWebinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Gold Coast North Chamber of Commerce
Gold Coast North Chamber of CommerceGold Coast North Chamber of Commerce
Gold Coast North Chamber of Commerce
 
Lupton fawcett 'social media' seminar for the cipd 20 october 2011
Lupton fawcett 'social media' seminar for the cipd   20 october 2011Lupton fawcett 'social media' seminar for the cipd   20 october 2011
Lupton fawcett 'social media' seminar for the cipd 20 october 2011
 

Similaire à "What Could Go Wrong?" - We're Glad You Asked!

Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Employment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social MediaEmployment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social MediaThis account is closed
 
Social Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small FirmsSocial Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small FirmsInternet Law Center
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedStewart Norriss
 
Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Mirsky & Company, PLLC
 
50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and Ethics50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and EthicsFarra Trompeter, Big Duck
 
50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and Ethics 50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and Ethics Debra Askanase
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 
06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And LearnJeff Geoghan
 
Big data needs big protection
Big data needs big protectionBig data needs big protection
Big data needs big protectionNoel Hatch
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdfAbel Mutize
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Femke Goedhart
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Social Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller CoasterSocial Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller Coasterdebmourey
 
Deloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationsDeloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationskamalesl
 

Similaire à "What Could Go Wrong?" - We're Glad You Asked! (20)

Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Employment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social MediaEmployment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social Media
 
Social Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small FirmsSocial Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small Firms
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services
 
50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and Ethics50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and Ethics
 
50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and Ethics 50 Shades of Social Media: Navigating Policies, Laws, and Ethics
50 Shades of Social Media: Navigating Policies, Laws, and Ethics
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn
 
Big data needs big protection
Big data needs big protectionBig data needs big protection
Big data needs big protection
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdf
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
E commerce
E commerce E commerce
E commerce
 
(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...
(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...
(Webinar slides) Your client posted What!!? Top Social Media Concerns for Law...
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Social Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller CoasterSocial Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller Coaster
 
Deloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationsDeloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerations
 

Plus de Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital EngagementShawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 

Plus de Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Dernier

Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfVidit Agrawal
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...Dr. Oliver Massmann
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327bariajenne
 
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toirenelavilla52178
 
IOS PPT.pptx doctrine of stare decisiss
IOS PPT.pptx  doctrine of stare decisissIOS PPT.pptx  doctrine of stare decisiss
IOS PPT.pptx doctrine of stare decisissPothysVaran1
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Diamond959916
 
Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Jong Hyuk Choi
 

Dernier (13)

Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327
 
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
 
IOS PPT.pptx doctrine of stare decisiss
IOS PPT.pptx  doctrine of stare decisissIOS PPT.pptx  doctrine of stare decisiss
IOS PPT.pptx doctrine of stare decisiss
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
 
Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24
 

"What Could Go Wrong?" - We're Glad You Asked!

  • 1. Shawn E. Tuma Cybersecurity & Data Privacy Attorney Scheef & Stone, LLP Shawn.Tuma@solidcounsel.com (214) 472-2135 @shawnetuma What Could Go Wrong? Avoiding the Legal Pitfalls of Social Media Marketing
  • 2. A smart man learns from his mistakes. A wise man learns from the mistakes of others. A fool never learns.
  • 4. “An ounce of prevention is cheaper than the first day of litigation” – Shawn Tuma
  • 6. @shawnetuma PhoneDog v. Kravitz • PhoneDog (employer) / Kravitz (employee / blogger) • @PhoneDog_Noah had 17,000 followers • Kravitz resigned, refused to turn over his Twitter account, changed handle to @noahkravitz and grew to 24,000 followers • PhoneDog sued (7/15/11), heavy litigation, settled (12/12) = 1.5 yrs of fees & Kravitz still has @noahkravitz THE TAKEAWAY Every company needs a contractual agreement that clearly states who owns social media accounts used on behalf of the company. Ownership & Control Over Accounts
  • 7. @shawnetuma • Unauthorized Access = hacking!!! • Sale / M&A / Bankruptcy = company asset • Personal – who updates when you pass? • Blogs / Subscriber Sites with consumer information? • → Privacy Policy? Sales & Transfers of Accounts
  • 9. @shawnetuma Intellectual Property i.e., copyrights, trademarks, trade secrets, confidential and proprietary information • Protect your content and brand • Copyright & trademarks • Example: client brand w/o trademark, then negotiating to obtain • Tip: use unique phrases + Google Alerts!  • Do you want to tell your competitors? • Customer / vendor lists • Who are you talking to or following? • Departing employee’s LinkedIn? • Secret business alliances, strategies, plans • Business situational awareness Your Intellectual Property
  • 10. @shawnetuma • Infringement of trademark • Right to publicity • name, voice, signature, photo, likeness (statutory after death) • commercial v. educational or newsworthy • audience picture v. company promo video • Infringement of copyright • attribution isn’t enough (this isn’t plagerism) • DMCA Takedown Request • Google penalizes for too many • Must have a license or use creative commons … but … Other’s Intellectual Property
  • 11. @shawnetuma Copyright Example Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html License: Creative CommonsAttribution 3.0
  • 14. @shawnetuma Reputation management • Be nice – if legit, address the problem • i.e., “who” are you and what is your “brand”? • Compare: church with TM vs. Bullyville • Healthcare / PHI??? • Outing the anonymous defamer • Beaconing / email ping-back • DMCA takedown request if IP (must respond) • Pay a good PR firm instead of paying lawyers (best advice!) • Litigation – but … Dealing with Smack Talk!
  • 15. Someone talking bad about your business online? • Defamation rules apply online but … • The “Streisand Effect” • Anti-SLAPP (Strategic Lawsuits Against Public Participation • ≠ assign copyright of reviews • ≠ charge $500 per bad review
  • 19. Tort Claims What your company’s employees say or do can hurt you! • communications • tortious interference • defamation (libel, slander, bus. disparagement) • false advertising & false warranties • privacy / data breaches • online impersonation • harassment and cyber-bullying • “puffery” of facts
  • 20. Regulatory Liability Federal Agencies are Watching • FTC – Investigated Hyundai for not disclosing incentives given to bloggers for endorsements • Big deal – FTC very active in this area • Celebrity endorsements of ICOs = FTC, SEC & CFTC oversight! • HHS & OCR – could have investigated hospital worker who posted patient “PHI” on Facebook → “Funny, but this patient came in to cure her VD and get birth control.” • SEC – false statements in raising funds (SEC v. Imperia Invest. IBC) or insider information → “Board meeting. Good numbers = Happy Board.” before official release
  • 22. Terms of Service / Use – Potential Trouble Spots • Giveaways and contests can be trouble for many reasons – do not do them on social media without careful consideration and vetting • Service’s Terms of Service • Jurisdiction gambling and contest rules • Example: Facebook’s Terms of Service for Pages are very specific about requirements for Promotions • A complete release of Facebook by each entrant or participant • Acknowledgement that Facebook is not sponsoring or affiliated https://www.facebook.com/page_guidelines.php
  • 23. Twitter Bots – On No, The Russians Did It!!! #TwitterLockOut Twitter’s Rules & Policies governing “Automated Activity”
  • 26. New York Department of Financial Services Cybersecurity (NYDFS) Requirements for Financial Services Companies + [fill in] • All NY “financial institutions” + third party service providers. • Third party service providers – examine, obligate, audit. • Establish Cybersecurity Program (w/ specifics): • Logging, Data Classification, IDS, IPS; • Pen Testing, Vulnerability Assessments, Risk Assessment; and • Encryption, Access Controls. • Adopt Cybersecurity Policies. • Designate qualified CISO to be responsible. • Adequate cybersecurity personnel and intelligence. • Personnel Policies & Procedures, Training, Written IRP. • Chairman or Senior Officer Certify Compliance.
  • 27. EU – General Data Protection Regulation (GDPR) • Goal: Protect all EU citizens from privacy and data breaches. • When: May 25, 2018. • Reach: Applies to all companies (controllers and processors): • Processing data of EU residents (regardless of where processing), • In the EU (regardless of where processing), or • Offering goods or services to EU citizens or monitoring behavior in EU. • Penalties: up to 4% global turnover or €20 Million (whichever is greater). • Remedies: data subjects have judicial remedies, right to damages. • Data subject rights: • Breach notification – 72 hrs to DPA; “without undue delay” to data subjects. • Right to access – provide confirmation of processing and electronic copy (free). • Data erasure – right to be forgotten, erase, cease dissemination or processing. • Data portability – receive previously provided data in common elect. format. • Privacy by design – include data protection from the onset of designing systems.
  • 29. “The law has a right to every man’s evidence” • Courts look to social media for public posts, private messages, “Likes”, etc. • Club’s SM before Cowboys’ Josh Brent wreck killing Jerry Brown: “I have 12 #Cowboys in theeee building!!!!!!!!!! #Privae” … “These fools buying Ace on top of Ace!!!!!!!” • Danielle Saxton’s Facebook “selfie” wearing stolen merchandise – easy evidence! • Daughter’s $80,000 Facebook “brag”: "Mama and Papa Snay won the case against Gulliver. Gulliver is now officially paying for my vacation to Europe this summer. SUCK IT." • Document Retention Policy • No reasonable expectation of privacy (even private messages), usually • If litigation is anticipated • Cannot permanently delete account or posts; may be able to “take down” • Cannot selectively delete posts
  • 31. General Strategy for Policies • Recognize and appreciate potential issues • Decide how to handle those issues • Educate your team on those issues • Collaborate and train on how to comply with and resolve issues • Create and outline procedures for using social media • Monitor (to some degree) to ensure compliance • Know your industry requirements (i.e., healthcare) • If a “form” is given by your regulator, use it!!!
  • 32. Social media policies are a “MUST HAVE” • Ounce of prevention: less than 1 day of litigation • If have, must enforce • Trying to predict issues – but evolving – can’t get all • Contractually resolve issues such as ownership and authority • Great opportunity to set rules and document expectations • Training - greater opportunity to explain and ensure understanding of expectations • Put on notice of monitoring – and actually monitor! • Should address employment issues
  • 33. But, will the National Labor Relations Board allow it? • NLRB jurisdiction = impacts interstate commerce • National Labor Relations Act (NLRA) sec. 7 gives employees right to engage in “concerted activities for the purpose of … mutual aid and protection” • NLRB finds illegal any policy provision that (a) restricts or (b) an employee would reasonably construe to chill concerted activities • NLRB General Counsel has issued multiple Reports on Social Media Policies – extraordinary activity
  • 34. Can you guess who the NLRB is pulling for? • Making it very difficult for businesses to protect themselves • Social media policies must now be carefully tailored to • Address unique business and legal needs of your business • Be enforceable and lawful in a court of law • Be legal in the eyes of the NLRB • Examples of provisions found illegal by NLRB
  • 35. Can you guess who the NLRB is pulling for? “Bob is such a NASTY MOTHER F***** don’t know how to talk to people!!!!!! F*** his mother and his entire f****** family!!!! What a LOSER!!!! Vote YES for the UNION!!!!!!!”
  • 39. @shawnetuma 39 Richmond Dist. Neighborhood Center v. Callaghan “The question is whether the conduct is so egregious as to take it outside the protection of the Act, or of such character as to render the employee unfit for further service.”
  • 40. Can you guess who the NLRB is pulling for? 56 Pier Sixty, LLC (NLRB March 31, 2015) • Employee on Facebook: called his manager a “NASTY MOTHER F****R” and a “LOSER,” said “f**k his mother and his entire f***ing family,” and ended the post by saying “Vote Yes for the Union!” • Company fired him. • NLRB: Firing improper. Feeling of mistreatment motivated statements and employees were simultaneously seeking redress through upcoming union election which made statements protected, concerted activity. • Comments not egregious enough.
  • 41. What is the NLRB really looking for? • Clarity and precision • Examples of do’s and don’ts that give context and real-life meaning to the rules • Implementation + training =
  • 43. Cyber Liability Insurance • If you are doing anything in cyber/digital, you need it. Period. • Most traditional insurance does not cover cyber-events, even if you think it does (really!) • Cyber Insurance is relatively inexpensive • Some policies include a cyber risk audit before being underwritten • Policies can cover social media risk, computer fraud risk, data breach / hacking risk, and even social engineering • But, they are tricky – you have to really know what you’re looking for vis-à-vis your company’s risks
  • 44. • Board of Directors & General Counsel, Cyber Future Foundation • Board of Advisors, NorthTexas Cyber Forensics Lab • Policy Council, NationalTechnology Security Coalition • CybersecurityTask Force, IntelligentTransportationSociety of America • Practitioner Editor, Bloomberg BNA –Texas Cybersecurity & Data Privacy Law • Cybersecurity & Data Privacy LawTrailblazers, National Law Journal (2016) • SuperLawyersTop 100 Lawyers in Dallas (2016) • SuperLawyers 2015-17 • Best Lawyers in Dallas 2014-17, D Magazine (Cybersecurity Law) • Council, Computer &Technology Section, State Bar ofTexas • Privacy and Data Security Committee of the State Bar ofTexas • College of the State Bar ofTexas • Board of Directors, CollinCounty Bench Bar Conference • Past Chair,Civil Litigation &Appellate Section, CollinCounty Bar Association • Information Security Committee of the Section on Science &Technology Committee of the American BarAssociation • NorthTexas Crime Commission, Cybercrime Committee & Infragard (FBI) • InternationalAssociation of Privacy Professionals (IAPP) Shawn Tuma Cybersecurity Partner Scheef & Stone, L.L.P. 214.472.2135 shawn.tuma@solidcounsel.com @shawnetuma blog: www.shawnetuma.com web: www.solidcounsel.com