SlideShare a Scribd company logo
Social Technology
Points of Practice
Amy Larrimore | Managing Partner
Meet Amy Larrimore
@AmyAllStar
#140 Speaker
2013
New York, NY
Advisor to Three
Heads of State,
including the USA
Pennsylvania Bar Institute
Faculty and Course Planner
Managing Partner,
The Empire
Builders Group
$43.25 = average daily web revenue
generated her first cup of coffee
Agenda
Today, we work on understanding:
Mechanics
Impact
What you don’t know
What they don’t know
Limitations
How events occur
Risks, Probability and Severity
Opportunities
What to do now
Resources and References
Social Media the Noun? Or the Verb?
Or something else entirely.
All the Legal Disciplines
Plus regulations that are
industry specific.
• Employment Law
• Litigation
• IP Issues
• Contract Law
• Family Law
• Privacy and Security
• Defamation
Technology:
What’s Your Goal?
Selection, Setup and Management
Litigation
Business Risk Management
It all starts with
understanding.
Username
(begins with @)Display Name
(link to profile)
Avatar
(Photo)
See related
tweets
(blue line)
Types of Interactions
• Reply (Respond to all, into conversation view)
• Retweet (Republish to your followers)
• Favorite (Bookmark or save – public)
Content
limited to 140
characters including
usernames, spaces and
links.
#funny
Understanding
Mechanics
Stop Thinking It’s One Monster
One brand technology
(“Facebook”) is actually a
combination of many
separate products with
separate terms managed by
separate entities in separate
places.
Technology Architecture
Domain
Website + Web Hosting
Ecommerce Platform
Financial System
Shopping Cart
Payment Gateway
Merchant Processing
MRP or ERP
Order Fulfillment
Shipping
CRM Email Host
Email Client
SEM & Social
Hootsuite Google Analytics
There are so many secret terms and conditions, your head might explode.
The New Real Estate
http://dodynamic.com/latest-news/a-website-is-like-a-house/
Domains
ICANN regulates Ownership
and Use of Domain Names
• empirebuilders.com (TLD)
• teaching.empirebuilders.com (SLD)
• empirebuilders.technology (gTLD)
Inclusion on DPML requires an
application to TMCH.
Recourse for domain names
held hostage via URS.
ICANN: Internet Corporation for
Assigned Names and Numbers
TLD and SLD: Top and second level
domain (respectively)
gTLD: (new!) Generic top level
domain which shows as a suffix at
the end of a domain name
DPML: Domains Protected Marks
List
TMCH: Trademark Clearinghouse
URS: Uniform Rapid Suspension
System
Integrations
Social Media
Planning or Scheduling Tools
Email Marketing
Customer Service and Support
CRM
Invoicing
Document Management
Affiliate Tools & Sponsored Content
Google Analytics/Forms/Adwords
Example: Plugins are
foreign code embedded
into your website to run
executable scripts.
Understanding Impact
Social Media is CAUSAL
It’s not about breakfast cereal and grandkids pics.
• Anonymous
• Instant
• Global
Government Overthrow
• 2009 Moldova civil unrest
• 2009 Iranian election protests
• 2010 Tunisian Jasmine Revolution
• 2011 Egyptian Revolution
Big Data & Research
Predict Disease
Outbreak Locations
Profound
Statistically
Significant
Global Pulse
Messaging is Viral – No Relationship Required
Understanding What You Don’t Know
Technology is built on trickery and most people try extra hard to trick the lawyers.
The Myth of Opt In
• SaaS forces the user to agree to
terms to proceed.
• It is outside of regular contract
negotiation.
• Good user experience designs
trickery to deliver a “seamless
experience”
The Mirage of User Experience
“The Redirect - Masked”
The Mirage of User Experience
“The Redirect - Obvious”
The MIRAGE of USER EXPERIENCE
“The Jigsaw Puzzle”
Understanding What They Don’t Know
Don’t Bet on the IT Department
If you think hiring an
expert is expensive,
wait until you see the
cost of an amateur.
• Requirements Creation
• Sourcing/Due Diligence
• Deployment
• Management
Where exactly is our
CONTENT?
The Jurisdiction of
“Everywhere”
Uzbekistan
Inventory of States and Countries Whose Regulations May
Apply or Where Jurisdiction May Be Established
Everything Attorneys Need to Know About Web Based Technology
The sales chat rep says it’s just
three easy steps:
1. Enter company credit card
2. Upload all company data
3. Watch a six minute video
Stored
Communications Act
Courts are moving in a more protective
direction regarding Fourth Amendment
and electronically-stored information
Privacy rights in electronically-stored
information are not lost solely because
that data is stored in a medium owned
by another.
SCA provides a potential loophole in
most jurisdictions that may allow the
government to issue a subpoena for
past emails in the possession of the
service provider but also future emails.
Are Facebook Messages Email?
Understanding Your
Limitations
Contract Management vs.
Risk Management
Contract Law is
backwards now.
Understanding how
events actually occur
McMillen is Zimmerman
v. Weis Markets, Inc.
(2011 Pa. Dist. & Cnty. –
May 19, 2011)
I miss my
ivory tower…
The Business Unit Can’t Help You Either.
Everything Attorneys Need to Know About Web Based Technology
The green software or the blue one
mentioned in a Linkedin Group?
I really like the green one…
The Data Keepers – Enforcing Destruction Policy
Understanding risks, probabilities and severity
“Resume Generating Events”
Suddenly Toy Planes Have
Everyone Talking….
The Theft of @N
 A story of how
hacking, extortion &
bad vendor practices
can lose $50,000 in 7
hours.
Social Media
setup with
company email
and connected
to website
Website
content
stored on a
Host
Empirebuilders.com
Domain
registered at a
Registrar
The Theft of @N
A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
The Theft of @N
A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
What @N teaches us
Phone Staff are the largest risk for breach.
Not understanding how it all works together
is the largest risk for exposure.
Company security policies need to be
sensible.
Company case review policies need to
consider exposure.
Both the business unit and IT needed
proactive legal and risk management help
that they didn’t receive.
Not embracing new technology (two factor
authentication) is a serious exposure.
Everything Attorneys Need to Know About Web Based Technology
Establishing
Controls
Protection of Trade Secrets
What is unauthorized access?
Employees, Third Party Providers,
Social Media
Importance of policy vs.
hardware controls
Social media
Use or Excessive Use
Social Media Policy
CFAA: Computer Fraud
and Abuse Act
U.S. v. Nosal, 676 F.3d
854 (9th Cir. 2012)
You Can’t Make Me Be
Friends!
Piccolo v. Paterson (Pa.
Common Pleas 2011)
The SCA applies to
entities
Largent v. Reed (Court of
Common Pleas of the 39th
Judicial District of PA –
Franklin County –
November 8, 2011)
Understanding Opportunity
Get your head out of the sand and get out of the way.
Provide Good
Customer Service
Pissed off people take to
the web and businesses
who don’t react quickly
pay dearly.
Proactive
Crisis Management
•Haitian Earthquake
•Mumbai Shootings
•Boston Marathon
Recruitment…
Management
Get fired and almost lose your company a few billions in funding.
…Termination
Inspire and Fundraise
#FLPRevolution
Showcase Your Work
When “Going Viral” is cause for celebration.
Understanding Content Involvement
Digital Millennium Copyright Act
Computer maintenance
DVDs
Ebooks
Distance learning
Interoperability
are only a few carve out
examples.
Is staff creating content
the company can own?
Getty will come after you for
licensing.
Did the theme go home with the
assistant web developer?
Source of Inspiration?
Employment Agreements
Protecting company IP
Staff Training and Policies – Trade
Secrets
Understanding Provider Recourse
– Copyright and Trademark
Proactively securing brands online
– Copyright and Trademark
Are you paying attention?
www.google.com/alerts
www.twitter.com/search
www.addictomatic.com
www.whois.com
WHAT DO WE DO?
Evolve or Die.
Think Differently
Approving NOTHING is the worst
strategy
Avoid the BRAND trap
Focus on the DATA and the
PROCESS, not the tool.
Start the conversation with IT now
and support funding for experts.
Make some POLICIES
Mainly, because it requires you to review
the process.
Secondly, because it requires
documentation in accordance with
regulation, standards and best practice.
http://socialmediagovernance.com/polici
es/
http://www.womma.org/ethics
Vanquish the Luddite
Basic operational know how of how the interwebs works is the best risk management.
Index and Resources
Resource Guides, Case Law, Regulations, Standards
CFAA
U.S. v. Nosal, 642 F. 3d
781 (9th Cir. 2011)
U.S. v. Tolliver, 2011 U.S.
App. LEXIS 19090 (3rd Cir.
2011)
Copyright and Trademark
 The Copyright Act of 1976
 Crossfit, Inc. v. Alvies 2014 U.S. Dist
LEXIS 7930 (N.D. Cal. Jan. 22, 2014)
 Digital Millennium Copyright Act, 17
U.S.C. §512 (DMCA)
 Edelman v. N2H2
 Flava Works Inc. v. Gunter
 IO Group, Inc. v. Veoh Networks, Inc
 Lenz v. Universal Music Corp.
 Ouellette v. Viacom International Inc.
 RealNetworks, Inc. v. DVD Copy
Control Association, Inc.
 Sony v. George Hotz
 Viacom Inc. v. YouTube, Google Inc.
 Vernor v. Autodesk, Inc.
Data Breach
Anderson v. Hannaford
Bros. Co., 659 F.3d 151
(1st Cir. 2011)
HIPAA
Resnick v. AvMed Inc.,
693 F.3d 1317 (11th Cir.
2012)
Sony Gaming Networks
and Customer Data Sec.
Breach Litig.,
No.11md2258, 2012 U.S.
Dist. LEXIS 14691 (S.D. Cal
Oct. 11, 2012)
PCI
E-Discovery
 Columbia Pictures, Inc. v. Bunnell, 245
F.R.D. 443 (C.D. Cal. 2007)
 Consol. Edison Co. of New York, Inc.
v. United States, 90 Fed. Cl 228, 231
(Fed. Cl. 2009)
 FRCP
 FACTA
 Largent v. Reed (Court of Common
Pleas of the 39th Judicial District of PA
– Franklin County – November 8,
2011)
 McMillen v. Hummingbird Speedway,
Inc. (2010 Pa Dist. & Cnty. –
September 9, 2010)
 Piccolo v. Paterson (Pa. Common
Pleas 2011)
 Stored Communications Act (SCA)
(SEE ALSO PRIVACY)
Jurisdiction
Business Software Alliance
The EU Data Protection
Directive
Forward Foods LLC v. Next
Proteins, Inc., 2008 BL
238516 (N.Y. Sup. 2008)
Gelmato S.A. v. HTC Corp.,
2011 U.S. Dist. LEXIS
133612 (E.D. Tex. Nov. 18,
2011)
Privacy
Crispin v. Christian Audigier,
Inc., 717 F. Supp. 2d 965 (C.D.
Cal, 2010)
Matter of United States, 770 F.
Supp. 2d 1138 (W.D. Wash.
2011)
McMillen is Zimmerman v.
Weis Markets, Inc. (2011 Pa.
Dist. & Cnty. – May 19, 2011)
State v. Bellar, 217 P.3rd 1094
(Or. App. Sept. 30, 2009)
Stored Communications Act
(SCA)
U.S. v. Warshak, 631 F. 3d 266
(6th Circ. 2010)
Questions?
Amy Larrimore
@AmyAllStar
datatechprocess.com
#FLPRevolution

More Related Content

PDF
Social Media and the Law
PDF
IT_Cutter_Publication
PPT
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
PPTX
Cybersecurity & Computer Fraud - The Convergence
PDF
Mobile Privacy and Security - Study by Mobidigger
PPTX
Social media, staff policy and law legal
PPTX
Social Media Law: The Legal Do's and Don'ts of Social Media
PDF
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media and the Law
IT_Cutter_Publication
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity & Computer Fraud - The Convergence
Mobile Privacy and Security - Study by Mobidigger
Social media, staff policy and law legal
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...

What's hot (20)

PDF
The Technologist’s Guide to eDiscovery Law for Dummies
 
PPTX
Designing for Privacy in an Increasingly Public World
PPT
Legal Implications Of Social Media
PPT
The Legal Implications of Social Media
PDF
Social Media Privacy Laws and Legal Liabilities
PPT
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
PPT
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
PDF
Social Penetration - Mike Murray and Mike Bailey
PPT
Merit Event - Closing the Back Door in Your Systems
PDF
The Interwoven Complexities of Social Media, Privacy and Data Security
PPTX
Ethics piracy
PPT
Snia Eiw2007 Peter Mojica
PDF
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
PDF
kmd_hst_201312
PPTX
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
PDF
Cyber Harassment
PDF
Why computers will never be safe
PDF
Cyber Warfare
PDF
Cscu module 06 internet security
The Technologist’s Guide to eDiscovery Law for Dummies
 
Designing for Privacy in an Increasingly Public World
Legal Implications Of Social Media
The Legal Implications of Social Media
Social Media Privacy Laws and Legal Liabilities
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Social Penetration - Mike Murray and Mike Bailey
Merit Event - Closing the Back Door in Your Systems
The Interwoven Complexities of Social Media, Privacy and Data Security
Ethics piracy
Snia Eiw2007 Peter Mojica
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
kmd_hst_201312
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
Cyber Harassment
Why computers will never be safe
Cyber Warfare
Cscu module 06 internet security
Ad

Similar to Everything Attorneys Need to Know About Web Based Technology (20)

PPTX
Social media (american marketing association november 15, 2011)(wo images)
PPTX
Stacy Robin - The Degania Group - Technology and the Law
PPT
Social Media And The Law 2 23 10
PPT
Legal Issues In Social Media Oct. 2012
PDF
Turnson Point Risks and Reputation Management presentation
PPT
Information Ethics
PPTX
Risk Assessment of Social Media Use v3.01
PPTX
Protecting your business ideas including crowdfunding
KEY
Social media: Legal and business challenges
PDF
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
PPTX
Social Media Security 2011
PPTX
Actiance enabling social_networks
PPTX
Leveraging Online Social Networking For Business
PPTX
Navigating Social Media Legal Risks Featuring Author Robert McHale
PPTX
Internet & Social Media issues for brand owners
PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
PPTX
"What Could Go Wrong?" - We're Glad You Asked!
PPT
Business Impact of Online Social Networking
PDF
Session B: Handout 2
Social media (american marketing association november 15, 2011)(wo images)
Stacy Robin - The Degania Group - Technology and the Law
Social Media And The Law 2 23 10
Legal Issues In Social Media Oct. 2012
Turnson Point Risks and Reputation Management presentation
Information Ethics
Risk Assessment of Social Media Use v3.01
Protecting your business ideas including crowdfunding
Social media: Legal and business challenges
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
Social Media Security 2011
Actiance enabling social_networks
Leveraging Online Social Networking For Business
Navigating Social Media Legal Risks Featuring Author Robert McHale
Internet & Social Media issues for brand owners
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
"What Could Go Wrong?" - We're Glad You Asked!
Business Impact of Online Social Networking
Session B: Handout 2
Ad

More from Amy Larrimore (11)

PPTX
What Technology Can Do For You - The Nonprofit Edition
PPTX
How to Fool the Lawyers and Get Your SaaS Tool Approved
PPTX
Get Rich - Increase Your Revenue 80 Percent
PPTX
Twitter: How to Start a Revolution
PPTX
Increase Your Revenue 80% Using Technology
PPTX
Managing the Legal Concerns of Cloud Computing
PPTX
Cloud Computing Legal for Pennsylvania Bar Association
PPT
Applying technology to jumpstart your sales v092311
PPTX
Get Rich - Increase Your Revenue 80 Percent
PPTX
When a Website Makes Cents for your Craft Business
PPT
SCORE Peer Learning: Increasing your services with Technology
What Technology Can Do For You - The Nonprofit Edition
How to Fool the Lawyers and Get Your SaaS Tool Approved
Get Rich - Increase Your Revenue 80 Percent
Twitter: How to Start a Revolution
Increase Your Revenue 80% Using Technology
Managing the Legal Concerns of Cloud Computing
Cloud Computing Legal for Pennsylvania Bar Association
Applying technology to jumpstart your sales v092311
Get Rich - Increase Your Revenue 80 Percent
When a Website Makes Cents for your Craft Business
SCORE Peer Learning: Increasing your services with Technology

Recently uploaded (20)

PDF
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PDF
Kayla Coates Wins no-insurance case Against the Illinois Workers’ Benefit Fund
PDF
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
PDF
Analysis Childrens act Kenya for the year 2022
PPTX
Sexual Harassment Prevention training class
PPTX
Learning-Plan-4-Core-Principles.pptx htts
PDF
The Advocate, Vol. 34 No. 1 Fall 2024
DOCX
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PDF
Constitution of India and fundamental rights pdf
PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
PPT
Understanding the Impact of the Cyber Act
PPTX
Ethiopian Law of Contract short note.pptx
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
4-D...Preparation of Research Design.pptx
PDF
New York State Bar Association Journal, September 2014
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PDF
Louisiana Bar Foundation 2023-2024 Annual Report
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
Kayla Coates Wins no-insurance case Against the Illinois Workers’ Benefit Fund
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
Analysis Childrens act Kenya for the year 2022
Sexual Harassment Prevention training class
Learning-Plan-4-Core-Principles.pptx htts
The Advocate, Vol. 34 No. 1 Fall 2024
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
Constitution of India and fundamental rights pdf
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
Understanding the Impact of the Cyber Act
Ethiopian Law of Contract short note.pptx
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
4-D...Preparation of Research Design.pptx
New York State Bar Association Journal, September 2014
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
Louisiana Bar Foundation 2023-2024 Annual Report

Everything Attorneys Need to Know About Web Based Technology

  • 1. Social Technology Points of Practice Amy Larrimore | Managing Partner
  • 2. Meet Amy Larrimore @AmyAllStar #140 Speaker 2013 New York, NY Advisor to Three Heads of State, including the USA Pennsylvania Bar Institute Faculty and Course Planner Managing Partner, The Empire Builders Group $43.25 = average daily web revenue generated her first cup of coffee
  • 3. Agenda Today, we work on understanding: Mechanics Impact What you don’t know What they don’t know Limitations How events occur Risks, Probability and Severity Opportunities What to do now Resources and References
  • 4. Social Media the Noun? Or the Verb? Or something else entirely.
  • 5. All the Legal Disciplines Plus regulations that are industry specific. • Employment Law • Litigation • IP Issues • Contract Law • Family Law • Privacy and Security • Defamation
  • 6. Technology: What’s Your Goal? Selection, Setup and Management Litigation Business Risk Management It all starts with understanding.
  • 7. Username (begins with @)Display Name (link to profile) Avatar (Photo) See related tweets (blue line) Types of Interactions • Reply (Respond to all, into conversation view) • Retweet (Republish to your followers) • Favorite (Bookmark or save – public) Content limited to 140 characters including usernames, spaces and links. #funny Understanding Mechanics
  • 8. Stop Thinking It’s One Monster One brand technology (“Facebook”) is actually a combination of many separate products with separate terms managed by separate entities in separate places.
  • 9. Technology Architecture Domain Website + Web Hosting Ecommerce Platform Financial System Shopping Cart Payment Gateway Merchant Processing MRP or ERP Order Fulfillment Shipping CRM Email Host Email Client SEM & Social Hootsuite Google Analytics There are so many secret terms and conditions, your head might explode.
  • 10. The New Real Estate http://dodynamic.com/latest-news/a-website-is-like-a-house/
  • 11. Domains ICANN regulates Ownership and Use of Domain Names • empirebuilders.com (TLD) • teaching.empirebuilders.com (SLD) • empirebuilders.technology (gTLD) Inclusion on DPML requires an application to TMCH. Recourse for domain names held hostage via URS. ICANN: Internet Corporation for Assigned Names and Numbers TLD and SLD: Top and second level domain (respectively) gTLD: (new!) Generic top level domain which shows as a suffix at the end of a domain name DPML: Domains Protected Marks List TMCH: Trademark Clearinghouse URS: Uniform Rapid Suspension System
  • 12. Integrations Social Media Planning or Scheduling Tools Email Marketing Customer Service and Support CRM Invoicing Document Management Affiliate Tools & Sponsored Content Google Analytics/Forms/Adwords Example: Plugins are foreign code embedded into your website to run executable scripts.
  • 14. Social Media is CAUSAL It’s not about breakfast cereal and grandkids pics.
  • 16. Government Overthrow • 2009 Moldova civil unrest • 2009 Iranian election protests • 2010 Tunisian Jasmine Revolution • 2011 Egyptian Revolution
  • 17. Big Data & Research Predict Disease Outbreak Locations
  • 19. Messaging is Viral – No Relationship Required
  • 20. Understanding What You Don’t Know Technology is built on trickery and most people try extra hard to trick the lawyers.
  • 21. The Myth of Opt In • SaaS forces the user to agree to terms to proceed. • It is outside of regular contract negotiation. • Good user experience designs trickery to deliver a “seamless experience”
  • 22. The Mirage of User Experience “The Redirect - Masked”
  • 23. The Mirage of User Experience “The Redirect - Obvious”
  • 24. The MIRAGE of USER EXPERIENCE “The Jigsaw Puzzle”
  • 25. Understanding What They Don’t Know Don’t Bet on the IT Department
  • 26. If you think hiring an expert is expensive, wait until you see the cost of an amateur. • Requirements Creation • Sourcing/Due Diligence • Deployment • Management
  • 27. Where exactly is our CONTENT? The Jurisdiction of “Everywhere”
  • 28. Uzbekistan Inventory of States and Countries Whose Regulations May Apply or Where Jurisdiction May Be Established
  • 30. The sales chat rep says it’s just three easy steps: 1. Enter company credit card 2. Upload all company data 3. Watch a six minute video
  • 31. Stored Communications Act Courts are moving in a more protective direction regarding Fourth Amendment and electronically-stored information Privacy rights in electronically-stored information are not lost solely because that data is stored in a medium owned by another. SCA provides a potential loophole in most jurisdictions that may allow the government to issue a subpoena for past emails in the possession of the service provider but also future emails. Are Facebook Messages Email?
  • 32. Understanding Your Limitations Contract Management vs. Risk Management Contract Law is backwards now.
  • 33. Understanding how events actually occur McMillen is Zimmerman v. Weis Markets, Inc. (2011 Pa. Dist. & Cnty. – May 19, 2011) I miss my ivory tower…
  • 34. The Business Unit Can’t Help You Either.
  • 36. The green software or the blue one mentioned in a Linkedin Group? I really like the green one…
  • 37. The Data Keepers – Enforcing Destruction Policy
  • 40. Suddenly Toy Planes Have Everyone Talking….
  • 41. The Theft of @N  A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours. Social Media setup with company email and connected to website Website content stored on a Host Empirebuilders.com Domain registered at a Registrar
  • 42. The Theft of @N A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
  • 43. The Theft of @N A story of how hacking, extortion & bad vendor practices can lose $50,000 in 7 hours.
  • 44. What @N teaches us Phone Staff are the largest risk for breach. Not understanding how it all works together is the largest risk for exposure. Company security policies need to be sensible. Company case review policies need to consider exposure. Both the business unit and IT needed proactive legal and risk management help that they didn’t receive. Not embracing new technology (two factor authentication) is a serious exposure.
  • 46. Establishing Controls Protection of Trade Secrets What is unauthorized access? Employees, Third Party Providers, Social Media Importance of policy vs. hardware controls Social media Use or Excessive Use Social Media Policy CFAA: Computer Fraud and Abuse Act U.S. v. Nosal, 676 F.3d 854 (9th Cir. 2012)
  • 47. You Can’t Make Me Be Friends! Piccolo v. Paterson (Pa. Common Pleas 2011)
  • 48. The SCA applies to entities Largent v. Reed (Court of Common Pleas of the 39th Judicial District of PA – Franklin County – November 8, 2011)
  • 49. Understanding Opportunity Get your head out of the sand and get out of the way.
  • 50. Provide Good Customer Service Pissed off people take to the web and businesses who don’t react quickly pay dearly.
  • 53. Management Get fired and almost lose your company a few billions in funding.
  • 56. Showcase Your Work When “Going Viral” is cause for celebration.
  • 58. Digital Millennium Copyright Act Computer maintenance DVDs Ebooks Distance learning Interoperability are only a few carve out examples.
  • 59. Is staff creating content the company can own? Getty will come after you for licensing. Did the theme go home with the assistant web developer? Source of Inspiration? Employment Agreements
  • 60. Protecting company IP Staff Training and Policies – Trade Secrets Understanding Provider Recourse – Copyright and Trademark Proactively securing brands online – Copyright and Trademark
  • 61. Are you paying attention? www.google.com/alerts www.twitter.com/search www.addictomatic.com www.whois.com
  • 62. WHAT DO WE DO? Evolve or Die.
  • 63. Think Differently Approving NOTHING is the worst strategy Avoid the BRAND trap Focus on the DATA and the PROCESS, not the tool. Start the conversation with IT now and support funding for experts.
  • 64. Make some POLICIES Mainly, because it requires you to review the process. Secondly, because it requires documentation in accordance with regulation, standards and best practice. http://socialmediagovernance.com/polici es/ http://www.womma.org/ethics
  • 65. Vanquish the Luddite Basic operational know how of how the interwebs works is the best risk management.
  • 66. Index and Resources Resource Guides, Case Law, Regulations, Standards
  • 67. CFAA U.S. v. Nosal, 642 F. 3d 781 (9th Cir. 2011) U.S. v. Tolliver, 2011 U.S. App. LEXIS 19090 (3rd Cir. 2011)
  • 68. Copyright and Trademark  The Copyright Act of 1976  Crossfit, Inc. v. Alvies 2014 U.S. Dist LEXIS 7930 (N.D. Cal. Jan. 22, 2014)  Digital Millennium Copyright Act, 17 U.S.C. §512 (DMCA)  Edelman v. N2H2  Flava Works Inc. v. Gunter  IO Group, Inc. v. Veoh Networks, Inc  Lenz v. Universal Music Corp.  Ouellette v. Viacom International Inc.  RealNetworks, Inc. v. DVD Copy Control Association, Inc.  Sony v. George Hotz  Viacom Inc. v. YouTube, Google Inc.  Vernor v. Autodesk, Inc.
  • 69. Data Breach Anderson v. Hannaford Bros. Co., 659 F.3d 151 (1st Cir. 2011) HIPAA Resnick v. AvMed Inc., 693 F.3d 1317 (11th Cir. 2012) Sony Gaming Networks and Customer Data Sec. Breach Litig., No.11md2258, 2012 U.S. Dist. LEXIS 14691 (S.D. Cal Oct. 11, 2012) PCI
  • 70. E-Discovery  Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007)  Consol. Edison Co. of New York, Inc. v. United States, 90 Fed. Cl 228, 231 (Fed. Cl. 2009)  FRCP  FACTA  Largent v. Reed (Court of Common Pleas of the 39th Judicial District of PA – Franklin County – November 8, 2011)  McMillen v. Hummingbird Speedway, Inc. (2010 Pa Dist. & Cnty. – September 9, 2010)  Piccolo v. Paterson (Pa. Common Pleas 2011)  Stored Communications Act (SCA) (SEE ALSO PRIVACY)
  • 71. Jurisdiction Business Software Alliance The EU Data Protection Directive Forward Foods LLC v. Next Proteins, Inc., 2008 BL 238516 (N.Y. Sup. 2008) Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS 133612 (E.D. Tex. Nov. 18, 2011)
  • 72. Privacy Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965 (C.D. Cal, 2010) Matter of United States, 770 F. Supp. 2d 1138 (W.D. Wash. 2011) McMillen is Zimmerman v. Weis Markets, Inc. (2011 Pa. Dist. & Cnty. – May 19, 2011) State v. Bellar, 217 P.3rd 1094 (Or. App. Sept. 30, 2009) Stored Communications Act (SCA) U.S. v. Warshak, 631 F. 3d 266 (6th Circ. 2010)

Editor's Notes

  • #49: The most interesting aspect of the court’s decision was in addressing whether the privacy requirement was also met. In addition to examining whether the requirement was met under Pennsylvania law, the court analyzed whether the requirement was met under federal law, namely The Stored Communications Act. As part of the Electronic Communications Privacy Act, The Stored Communications Act (SCA) limits the government’s ability to force Internet Service Providers (ISPs) to reveal information about their users and limits the right of ISPs to voluntarily reveal information about their users. The court noted only one case thus far has addressed whether Facebook is covered by the SCA, Crispin v. Christian Audigier, Inc. In that case, a subpoena was served directly on Facebook to obtain information about the plaintiff’s status postings. The Crispin Court held Facebook was covered by the Act and concluded subpoenas are never allowed under the SCA. The Largent Court distinguished the facts of the Crispin case, noting the defendant was seeking information directly from the plaintiff, not from Facebook. As an individual, the plaintiff was not an entity regulated by the SCA. Finding the privacy requirement was satisfied, the court ordered the plaintiff to turn over her user names, log-in names and passwords for Facebook and MySpace.