SlideShare a Scribd company logo
1 of 52
Download to read offline
Spencer Fane LLP | spencerfane.com
The Dark Side of Digital Engagement
Shawn Tuma | Partner & Co-Chair, Data Privacy and Cybersecurity | Spencer Fane LLP
Spencer Fane LLP | spencerfane.com
Spencer Fane LLP | spencerfane.com
Branding  Overall Goal
Overall perception that
you create
Everything
about you
• social media is one tool, but others
• dress, present yourself
• office décor
• activities, events, sponsorships
• work quality, efficiency, craftsman v. mass producer
• work subject matter
Can be good or
can be bad
If your lawyer is
talking on a flip phone
and suit ≠ fit, = jail!
The Dark Side of Digital
One slip can destroy all good
How do we
protect our
brand?
Common
pitfalls
Spencer Fane LLP | spencerfane.com
Spencer Fane LLP | spencerfane.com
“An ounce of prevention is
cheaper than the first day of
litigation”
Spencer Fane LLP | spencerfane.com
OWNERSHIP / CONTROL
Spencer Fane LLP | spencerfane.com
Ownership: PhoneDog v. Kravitz
• PhoneDog (employer) / Kravitz (employee / blogger)
• @PhoneDog_Noah had 17,000 followers
• Kravitz resigned, refused to turn over his Twitter account, changed handle to
@noahkravitz and grew to 24,000 followers
• PhoneDog sued (7/15/11), heavy litigation, settled (12/12) = 1.5 yrs of fees &
Kravitz still has @noahkravitz
THE TAKEAWAY:
Every company needs a contractual agreement that clearly states who owns social media
accounts used on behalf of the company.
Spencer Fane LLP | spencerfane.com
Other Ownership / Control Issues
• Sale / M&A / Bankruptcy = company asset
• Personal – who updates when you pass?
– Facebook: designate legacy contact
– Google: designate up to 10 legacy contacts
– Twitter: delete account (lawful rep / family member)
– LinkedIn: delete account (lawful rep / family member)
– Pinterest: delete account (lawful rep / family member)
Spencer Fane LLP | spencerfane.com
INTELLECTUAL PROPERTY
Spencer Fane LLP | spencerfane.com
Your IP: Trade Secrets, Confidential and Proprietary
Information?
• Do you want to tell your competitors?
• Customer / vendor lists
– Who are you talking to or following?
• Secret business alliances, strategies, plans
• Business situational awareness
• Intellectual property law
Spencer Fane LLP | spencerfane.com
Others’ IP
• Infringement of trademark
• Right to publicity
– name, voice, signature, photo, likeness (statutory after death)
– common law while living if for value
– commercial v. educational or newsworthy
– audience picture v. company promo video
• Infringement of copyright
– attribution isn’t enough
– DMCA Takedown Request
– Google penalizes for too many
• Must have a license or use creative commons
Spencer Fane LLP | spencerfane.com
Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html
License: Creative Commons Attribution 3.0
Copyright Example
Spencer Fane LLP | spencerfane.com
Common Pitfalls
• IP Rights
– Others
– Yours
• Be proactive (client brand w/o TM)
Spencer Fane LLP | spencerfane.com
ONLINE SMACK TALKING
Spencer Fane LLP | spencerfane.com
Reputation Management
• Responding
– Sensitive information – HHS / healthcare
• Outing the Anonymous Defamer
– Email ping-back
– Communications Decency Act (must dispute)
• Be nice – if legit, address
• Best – pay good PR firm ≠ litigate
• Litigation???
Who
“are”
you ?
Church w/
TM
Bullyville?
– or –
Spencer Fane LLP | spencerfane.com
Someone Talking Bad About Your Business Online?
Defamation rules apply online but…
• The “Streisand Effect”
• Anti-SLAPP (Strategic Lawsuits
Against Public Participation)
• ≠ assign copyright of reviews
• ≠ charge $500 per bad review
Spencer Fane LLP | spencerfane.com
EVIDENCE
Spencer Fane LLP | spencerfane.com
Social Media as Evidence
• “The law has a right to every man’s evidence.”
• Courts look to social media for public posts, private messages, “Likes”, etc.
– Club’s SM before Cowboys’ Josh Brent wreck killing Jerry Brown: “I have 12
#Cowboys in theeee building!!!!!!!!!! #Privae” … “These fools buying Ace on top of
Ace!!!!!!!”
– Danielle Saxton’s Facebook “selfie” wearing stolen merchandise – easy evidence!
– Daughter’s $80,000 Facebook “brag”
• So, we had this trial recently …
Spencer Fane LLP | spencerfane.com
Social Media as Evidence Objection!
Overruled.
Spencer Fane LLP | spencerfane.com
Minimizing the Risk
• Monitor, Regulate & Archive SM
– Necessary if regulated industry
• finance, insurance, energy & utilities, healthcare, government, legal
• Do not delete if in or anticipating litigation
– Cannot permanently delete account, may be able to “take down”
– Cannot selectively delete posts
– Archiving may be an option
• Document Retention Policy
– Have it; follow it; comply with litigation holds
Spencer Fane LLP | spencerfane.com
CYBERSECURITY & DATA PRIVACY
Spencer Fane LLP | spencerfane.com
How I Am Using PR / Marketing / Branding in Practice
• PR / marketing / branding in Cybersecurity & Privacy
– Engaging in Controversial Issues = Anon DDoS Attack
– Privacy Policies & TOS
– PR critical in Incident Response
• Manage the message
• Ensure accuracy
• Engaging with critics after data breach
Spencer Fane LLP | spencerfane.com
While We’re Talking “Hacking”
No, your Facebook Account was not “hacked,” it was likely “cloned”
Spencer Fane LLP | spencerfane.com
Speaking of Not “Hacking”
No, the Russians did not “hack” the 2016 election, they did run a very
successful information warfare campaign using social media!
• Sun Tzu, The Art of War (512 B.C.)
– “The whole secret lies in confusing the enemy, so that he cannot fathom our real intent.”
– “If his forces are united, separate them. If sovereign and subject are in accord, put division
between them.”
– “Supreme excellence consists of breaking the enemy's resistance without fighting.”
• Dezinformatsia – why? How to we protect against?
• Greatest “cyber” threat?
• [Russia / Iran / China / N. Korea / Syria / et al] will likely try to actually “hack” aspects
of future elections.
Spencer Fane LLP | spencerfane.com
One More Thing About “Hacking”
If you are using ImADinosaur@aol.com for business and haven’t changed your
password since creating your account, was it really “hacked”?
• i.e,
– Message 1: “yes, please process my tax return like you did last year”
– Message 2: “oh, but send the refund to this bank account instead”
Spencer Fane LLP | spencerfane.com
One More One More Thing About “Hacking”
If you are using MS O365 – you had better be using Multi-Factor
Authentication!
TRUST ME!!!
Spencer Fane LLP | spencerfane.com
AGENCY ISSUES
Spencer Fane LLP | spencerfane.com
WHO IS RESPONSIBLE IF THE CONTRACT DOES NOT SAY?
The dispute in Travelers Casualty and Surety Co. of America v. Ignition Studio, Inc. reveals that their
contract did not address several important cybersecurity issues. This case began with Alpine Bank, a
financial institution, hiring Ignition Studio, a professional website design company, to design and host
its website.
Ignition Studio designed and, apparently, hosted the website for Alpine Bank. Some time later, hackers
attacked the website and caused a data breach that caused Alpine Bank to incur $154,711.34 in
expenses to comply with its data breach response obligations.
Spencer Fane LLP | spencerfane.com
TORTS & REGULATORY LIABILITY
Spencer Fane LLP | spencerfane.com
• What your company’s employees say or do can hurt you!
– communications
– tortious interference
– defamation (libel, slander, bus. defamation)
– false advertising & false warranties
– privacy / data breaches
– online impersonation
– harassment and cyber-bullying
– “puffery” of facts
Tort Claims
Spencer Fane LLP | spencerfane.com
Federal Agencies are Watching
• FTC – Investigated Hyundai for not disclosing incentives given to bloggers
for endorsements
– Google (Fed. Ct. in Oracle v. Google)
• HHS & OCR – could have investigated hospital worker who posted patient
“PHI” on Facebook  “Funny, but this patient came in to cure her VD and get
birth control.”
• SEC – false statements in raising funds (SEC v. Imperia Invest. IBC) or
insider information  “Board meeting. Good numbers = Happy Board.”
before official release
• Regulatory law
Spencer Fane LLP | spencerfane.com
CONTRACT LIABILITY
Spencer Fane LLP | spencerfane.com
Potential Trouble Spots?
• Giveaways and contests can be trouble for many reasons – do not do them
on social media without careful consideration and vetting
– Some sites’ TOS prohibit
– Jurisdiction gambling and contest rules
• Example: Facebook’s Page Terms
Spencer Fane LLP | spencerfane.com
WHAT CAN YOU DO?
Spencer Fane LLP | spencerfane.com
SHOW DILIGENCE
Spencer Fane LLP | spencerfane.com
SOCIAL MEDIA POLICIES
Spencer Fane LLP | spencerfane.com
General Strategy for Policies
• Recognize and appreciate potential issues
• Decide how to handle those issues
• Educate your team on those issues
• Collaborate and train on how to comply with and resolve issues
• Create and outline procedures for using social media
• Monitor (to some degree) to ensure compliance
Spencer Fane LLP | spencerfane.com
Social Media Policies Are a “Must Have”
• Ounce of prevention: less than 1 day of litigation
• If have, must enforce
• Trying to predict issues – but evolving – can’t get all
• Contractually resolve issues such as ownership and authority
• Great opportunity to set rules and document expectations
• Training – greater opportunity to explain and ensure understanding of
expectations
• Put on notice of monitoring – and actually monitor!
• Should address employment issues
Spencer Fane LLP | spencerfane.com
POLICY BUZZ-KILL
Spencer Fane LLP | spencerfane.com
Will the National Labor Relations Board Allow It?
• NLRB jurisdiction = impacts interstate commerce
• National Labor Relations Act (NLRA) sec. 7 gives employees right to engage
in “concerted activities for the purpose of … mutual aid and protection”
• NLRB finds illegal any policy provision that (a) restricts or (b) an employee
would reasonably construe to chill concerted activities
• On 5/30/12 NLRB General Counsel issued its 3rd Report on Social Media
Policies in 1 year period (8/11 & 1/12)
• Has continued – with several since then
Spencer Fane LLP | spencerfane.com
Can You Guess Who the NLRB is Pulling For?
• Making it very difficult for businesses to protect themselves
• Social media policies must now be carefully tailored to
– Address unique business and legal needs of your business
– Be enforceable and lawful in a court of law
– Be legal in the eyes of the NLRB
• Examples of provisions found illegal by NLRB
Spencer Fane LLP | spencerfane.com
Spencer Fane LLP | spencerfane.com
Spencer Fane LLP | spencerfane.com
Spencer Fane LLP | spencerfane.com
Richmond Dist. Neighborhood Center v. Callaghan
“The question is whether the
conduct is so egregious as to
take it outside the protection
of the Act, or of such
character as to render the
employee unfit for further
service.”
Spencer Fane LLP | spencerfane.com
56 Pier Sixty, LLC (NLRB March 31, 2015)
• Employee on Facebook: called his manager a “NASTY MOTHER F****R”
and a “LOSER,” said “f**k his mother and his entire f***ing family,” and ended
the post by saying “Vote Yes for the Union!”
• Company fired him.
• NLRB: Firing improper. Feeling of mistreatment motivated statements and
employees were simultaneously seeking redress through upcoming union
election which made statements protected, concerted activity.
• Comments not egregious enough.
Spencer Fane LLP | spencerfane.com
What is the NLRB Really Looking For?
• Clarity and precision
• Examples of do’s and don’ts that give context and real-life meaning to the
rules
• Implementation + training = 
Spencer Fane LLP | spencerfane.com
CYBER INSURANCE
Spencer Fane LLP | spencerfane.com
Cyber Insurance
• If you are doing anything in cyberspace, you need it. Period.
• Most traditional insurance does not cover cyber-events, even if you think it
does (really!)
• Cyber-Insurance is relatively inexpensive
• Many policies include a cyber-risk audit before being underwritten
• Policies can cover social media risk, computer fraud risk, and data breach /
hacking risk
• You must get your vendors / law firm’s pre-approved!
Spencer Fane LLP | spencerfane.com
SUMMARY
Spencer Fane LLP | spencerfane.com
• Social Media is wonderful!
• Must find proper balance within the rules
• Communicate – yep, just talk about it internally, like, over coffee!
• Spend time with employees to help them understand and possibly
collaborate on the rules
• Create a social media policy
– Address unique business and legal needs of your business
– Be enforceable and lawful in a court of law
– Be legal in the eyes of the NLRB
• Enforce your social media policy
• Seriously consider cyber-insurance!
Spencer Fane LLP | spencerfane.com
Shawn Tuma
Co-Chair, Cybersecurity & Data Privacy
Spencer Fane LLP
972.324.0317
stuma@spencerfane.com
• 20+ Years of Cyber Law Experience
• Practitioner Editor, Bloomberg BNA – Texas
Cybersecurity & Data Privacy Law
• Council Member, Southern Methodist University
Cybersecurity Advisory
• Board of Advisors, North Texas Cyber Forensics Lab
• Policy Council, National Technology Security Coalition
• Board of Advisors, Cyber Future Foundation
• Cybersecurity & Data Privacy Law Trailblazers,
National Law Journal (2016)
• SuperLawyers Top 100 Lawyers in Dallas (2016)
• SuperLawyers 2015-19
• Best Lawyers in Dallas 2014-19, D Magazine
• Chair-Elect, Computer & Technology Section, State Bar of
Texas
• Privacy and Data Security Committee of the State Bar of
Texas
• College of the State Bar of Texas
• Board of Directors, Collin County Bench Bar Conference
• Past Chair, Civil Litigation & Appellate Section, Collin
County Bar Association
• Information Security Committee of the Section on
Science & Technology Committee of the American Bar
Association
• North Texas Crime Commission, Cybercrime Committee
& Infragard (FBI)
• International Association of Privacy Professionals (IAPP)

More Related Content

What's hot

Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasShawn Tuma
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Shawn Tuma
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIBLECKWEN
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
Data Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingData Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingBradley Arant Boult Cummings LLP
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyErdo Deshiant Garnaby
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseShawn Tuma
 
Why i choose information system and osint learning
Why i choose information system and osint learningWhy i choose information system and osint learning
Why i choose information system and osint learningLaurensius Jeffrey Chandra
 
Top Tips For E-safety
Top Tips For E-safetyTop Tips For E-safety
Top Tips For E-safetyTj Falls
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 

What's hot (20)

Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
CYBER ATTACK RECOVERY GUIDE
CYBER ATTACK RECOVERY GUIDECYBER ATTACK RECOVERY GUIDE
CYBER ATTACK RECOVERY GUIDE
 
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
Data Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingData Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar Recording
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safety
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach Response
 
Why i choose information system and osint learning
Why i choose information system and osint learningWhy i choose information system and osint learning
Why i choose information system and osint learning
 
Top Tips For E-safety
Top Tips For E-safetyTop Tips For E-safety
Top Tips For E-safety
 
Online privacy
Online privacyOnline privacy
Online privacy
 

Similar to The Dark Side of Digital Engagement

Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalistsEllyn Angelotti
 
Social Media for ITSM
Social Media for ITSMSocial Media for ITSM
Social Media for ITSMChris Dancy
 
"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!Shawn Tuma
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceDave LaFontaine
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social mediaDave LaFontaine
 
Service Desk and Social Media -- Meet Your Users on Their Terms
Service Desk and Social Media -- Meet Your Users on Their TermsService Desk and Social Media -- Meet Your Users on Their Terms
Service Desk and Social Media -- Meet Your Users on Their TermsChris Dancy
 
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLC
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLCProtecting Yourself and Your Brand On Social Media | SPOKE Communications, LLC
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLCSPOKE Communications, LLC
 
Social Media Training with CARD – Collaborating Agencies Responding to Disasters
Social Media Training with CARD – Collaborating Agencies Responding to DisastersSocial Media Training with CARD – Collaborating Agencies Responding to Disasters
Social Media Training with CARD – Collaborating Agencies Responding to DisastersDan Cohen
 
HELP - Emerging Leaders Program - Social Media Webinar
HELP - Emerging Leaders Program - Social Media WebinarHELP - Emerging Leaders Program - Social Media Webinar
HELP - Emerging Leaders Program - Social Media WebinarDan Cohen
 
Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.
Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.
Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.Manzama
 
Reputation Management in the Chemical Distribution Industry
Reputation Management in the Chemical Distribution IndustryReputation Management in the Chemical Distribution Industry
Reputation Management in the Chemical Distribution IndustryTin Cans Unlimited
 
Caseivpresentation 090405211009-phpapp02(1)
Caseivpresentation 090405211009-phpapp02(1)Caseivpresentation 090405211009-phpapp02(1)
Caseivpresentation 090405211009-phpapp02(1)Mirzam86
 
Sport & Leisure Industry - Session 3 - Virality
Sport & Leisure Industry - Session 3 - ViralitySport & Leisure Industry - Session 3 - Virality
Sport & Leisure Industry - Session 3 - Viralitymjb87
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe OnlineMatt Smith
 
Iact social media mktg 102715
Iact social media mktg 102715Iact social media mktg 102715
Iact social media mktg 102715douglaslyon
 
Leveraging Social & Digital Media for Business Development
Leveraging Social & Digital Media for Business DevelopmentLeveraging Social & Digital Media for Business Development
Leveraging Social & Digital Media for Business DevelopmentAdam Stock
 

Similar to The Dark Side of Digital Engagement (20)

Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalists
 
Social Media for ITSM
Social Media for ITSMSocial Media for ITSM
Social Media for ITSM
 
"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!
 
370 april 25 libel
370 april 25 libel370 april 25 libel
370 april 25 libel
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social media
 
Service Desk and Social Media -- Meet Your Users on Their Terms
Service Desk and Social Media -- Meet Your Users on Their TermsService Desk and Social Media -- Meet Your Users on Their Terms
Service Desk and Social Media -- Meet Your Users on Their Terms
 
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLC
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLCProtecting Yourself and Your Brand On Social Media | SPOKE Communications, LLC
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLC
 
Social Media Training with CARD – Collaborating Agencies Responding to Disasters
Social Media Training with CARD – Collaborating Agencies Responding to DisastersSocial Media Training with CARD – Collaborating Agencies Responding to Disasters
Social Media Training with CARD – Collaborating Agencies Responding to Disasters
 
03 dllo davidlafontaine
03 dllo davidlafontaine03 dllo davidlafontaine
03 dllo davidlafontaine
 
Twitter libel for sxsw
Twitter libel for sxswTwitter libel for sxsw
Twitter libel for sxsw
 
HELP - Emerging Leaders Program - Social Media Webinar
HELP - Emerging Leaders Program - Social Media WebinarHELP - Emerging Leaders Program - Social Media Webinar
HELP - Emerging Leaders Program - Social Media Webinar
 
Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.
Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.
Content + Marketing = Revenue. Learn How, Why, Do's and Don'ts.
 
Reputation Management in the Chemical Distribution Industry
Reputation Management in the Chemical Distribution IndustryReputation Management in the Chemical Distribution Industry
Reputation Management in the Chemical Distribution Industry
 
Caseivpresentation 090405211009-phpapp02(1)
Caseivpresentation 090405211009-phpapp02(1)Caseivpresentation 090405211009-phpapp02(1)
Caseivpresentation 090405211009-phpapp02(1)
 
Sport & Leisure Industry - Session 3 - Virality
Sport & Leisure Industry - Session 3 - ViralitySport & Leisure Industry - Session 3 - Virality
Sport & Leisure Industry - Session 3 - Virality
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe Online
 
Iact social media mktg 102715
Iact social media mktg 102715Iact social media mktg 102715
Iact social media mktg 102715
 
Leveraging Social & Digital Media for Business Development
Leveraging Social & Digital Media for Business DevelopmentLeveraging Social & Digital Media for Business Development
Leveraging Social & Digital Media for Business Development
 

More from Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 
Effective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesEffective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesShawn Tuma
 
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitShawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...Shawn Tuma
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackShawn Tuma
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber AttackShawn Tuma
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 

More from Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 
Effective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesEffective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businesses
 
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber Attack
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 

Recently uploaded

Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 

Recently uploaded (20)

Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 

The Dark Side of Digital Engagement

  • 1. Spencer Fane LLP | spencerfane.com The Dark Side of Digital Engagement Shawn Tuma | Partner & Co-Chair, Data Privacy and Cybersecurity | Spencer Fane LLP
  • 2. Spencer Fane LLP | spencerfane.com
  • 3. Spencer Fane LLP | spencerfane.com Branding  Overall Goal Overall perception that you create Everything about you • social media is one tool, but others • dress, present yourself • office décor • activities, events, sponsorships • work quality, efficiency, craftsman v. mass producer • work subject matter Can be good or can be bad If your lawyer is talking on a flip phone and suit ≠ fit, = jail! The Dark Side of Digital One slip can destroy all good How do we protect our brand? Common pitfalls
  • 4. Spencer Fane LLP | spencerfane.com
  • 5. Spencer Fane LLP | spencerfane.com “An ounce of prevention is cheaper than the first day of litigation”
  • 6. Spencer Fane LLP | spencerfane.com OWNERSHIP / CONTROL
  • 7. Spencer Fane LLP | spencerfane.com Ownership: PhoneDog v. Kravitz • PhoneDog (employer) / Kravitz (employee / blogger) • @PhoneDog_Noah had 17,000 followers • Kravitz resigned, refused to turn over his Twitter account, changed handle to @noahkravitz and grew to 24,000 followers • PhoneDog sued (7/15/11), heavy litigation, settled (12/12) = 1.5 yrs of fees & Kravitz still has @noahkravitz THE TAKEAWAY: Every company needs a contractual agreement that clearly states who owns social media accounts used on behalf of the company.
  • 8. Spencer Fane LLP | spencerfane.com Other Ownership / Control Issues • Sale / M&A / Bankruptcy = company asset • Personal – who updates when you pass? – Facebook: designate legacy contact – Google: designate up to 10 legacy contacts – Twitter: delete account (lawful rep / family member) – LinkedIn: delete account (lawful rep / family member) – Pinterest: delete account (lawful rep / family member)
  • 9. Spencer Fane LLP | spencerfane.com INTELLECTUAL PROPERTY
  • 10. Spencer Fane LLP | spencerfane.com Your IP: Trade Secrets, Confidential and Proprietary Information? • Do you want to tell your competitors? • Customer / vendor lists – Who are you talking to or following? • Secret business alliances, strategies, plans • Business situational awareness • Intellectual property law
  • 11. Spencer Fane LLP | spencerfane.com Others’ IP • Infringement of trademark • Right to publicity – name, voice, signature, photo, likeness (statutory after death) – common law while living if for value – commercial v. educational or newsworthy – audience picture v. company promo video • Infringement of copyright – attribution isn’t enough – DMCA Takedown Request – Google penalizes for too many • Must have a license or use creative commons
  • 12. Spencer Fane LLP | spencerfane.com Attribution: prthugp @ http://www.officialpsds.com/prthugp-Profile9747.html License: Creative Commons Attribution 3.0 Copyright Example
  • 13. Spencer Fane LLP | spencerfane.com Common Pitfalls • IP Rights – Others – Yours • Be proactive (client brand w/o TM)
  • 14. Spencer Fane LLP | spencerfane.com ONLINE SMACK TALKING
  • 15. Spencer Fane LLP | spencerfane.com Reputation Management • Responding – Sensitive information – HHS / healthcare • Outing the Anonymous Defamer – Email ping-back – Communications Decency Act (must dispute) • Be nice – if legit, address • Best – pay good PR firm ≠ litigate • Litigation??? Who “are” you ? Church w/ TM Bullyville? – or –
  • 16. Spencer Fane LLP | spencerfane.com Someone Talking Bad About Your Business Online? Defamation rules apply online but… • The “Streisand Effect” • Anti-SLAPP (Strategic Lawsuits Against Public Participation) • ≠ assign copyright of reviews • ≠ charge $500 per bad review
  • 17. Spencer Fane LLP | spencerfane.com EVIDENCE
  • 18. Spencer Fane LLP | spencerfane.com Social Media as Evidence • “The law has a right to every man’s evidence.” • Courts look to social media for public posts, private messages, “Likes”, etc. – Club’s SM before Cowboys’ Josh Brent wreck killing Jerry Brown: “I have 12 #Cowboys in theeee building!!!!!!!!!! #Privae” … “These fools buying Ace on top of Ace!!!!!!!” – Danielle Saxton’s Facebook “selfie” wearing stolen merchandise – easy evidence! – Daughter’s $80,000 Facebook “brag” • So, we had this trial recently …
  • 19. Spencer Fane LLP | spencerfane.com Social Media as Evidence Objection! Overruled.
  • 20. Spencer Fane LLP | spencerfane.com Minimizing the Risk • Monitor, Regulate & Archive SM – Necessary if regulated industry • finance, insurance, energy & utilities, healthcare, government, legal • Do not delete if in or anticipating litigation – Cannot permanently delete account, may be able to “take down” – Cannot selectively delete posts – Archiving may be an option • Document Retention Policy – Have it; follow it; comply with litigation holds
  • 21. Spencer Fane LLP | spencerfane.com CYBERSECURITY & DATA PRIVACY
  • 22. Spencer Fane LLP | spencerfane.com How I Am Using PR / Marketing / Branding in Practice • PR / marketing / branding in Cybersecurity & Privacy – Engaging in Controversial Issues = Anon DDoS Attack – Privacy Policies & TOS – PR critical in Incident Response • Manage the message • Ensure accuracy • Engaging with critics after data breach
  • 23. Spencer Fane LLP | spencerfane.com While We’re Talking “Hacking” No, your Facebook Account was not “hacked,” it was likely “cloned”
  • 24. Spencer Fane LLP | spencerfane.com Speaking of Not “Hacking” No, the Russians did not “hack” the 2016 election, they did run a very successful information warfare campaign using social media! • Sun Tzu, The Art of War (512 B.C.) – “The whole secret lies in confusing the enemy, so that he cannot fathom our real intent.” – “If his forces are united, separate them. If sovereign and subject are in accord, put division between them.” – “Supreme excellence consists of breaking the enemy's resistance without fighting.” • Dezinformatsia – why? How to we protect against? • Greatest “cyber” threat? • [Russia / Iran / China / N. Korea / Syria / et al] will likely try to actually “hack” aspects of future elections.
  • 25. Spencer Fane LLP | spencerfane.com One More Thing About “Hacking” If you are using ImADinosaur@aol.com for business and haven’t changed your password since creating your account, was it really “hacked”? • i.e, – Message 1: “yes, please process my tax return like you did last year” – Message 2: “oh, but send the refund to this bank account instead”
  • 26. Spencer Fane LLP | spencerfane.com One More One More Thing About “Hacking” If you are using MS O365 – you had better be using Multi-Factor Authentication! TRUST ME!!!
  • 27. Spencer Fane LLP | spencerfane.com AGENCY ISSUES
  • 28. Spencer Fane LLP | spencerfane.com WHO IS RESPONSIBLE IF THE CONTRACT DOES NOT SAY? The dispute in Travelers Casualty and Surety Co. of America v. Ignition Studio, Inc. reveals that their contract did not address several important cybersecurity issues. This case began with Alpine Bank, a financial institution, hiring Ignition Studio, a professional website design company, to design and host its website. Ignition Studio designed and, apparently, hosted the website for Alpine Bank. Some time later, hackers attacked the website and caused a data breach that caused Alpine Bank to incur $154,711.34 in expenses to comply with its data breach response obligations.
  • 29. Spencer Fane LLP | spencerfane.com TORTS & REGULATORY LIABILITY
  • 30. Spencer Fane LLP | spencerfane.com • What your company’s employees say or do can hurt you! – communications – tortious interference – defamation (libel, slander, bus. defamation) – false advertising & false warranties – privacy / data breaches – online impersonation – harassment and cyber-bullying – “puffery” of facts Tort Claims
  • 31. Spencer Fane LLP | spencerfane.com Federal Agencies are Watching • FTC – Investigated Hyundai for not disclosing incentives given to bloggers for endorsements – Google (Fed. Ct. in Oracle v. Google) • HHS & OCR – could have investigated hospital worker who posted patient “PHI” on Facebook  “Funny, but this patient came in to cure her VD and get birth control.” • SEC – false statements in raising funds (SEC v. Imperia Invest. IBC) or insider information  “Board meeting. Good numbers = Happy Board.” before official release • Regulatory law
  • 32. Spencer Fane LLP | spencerfane.com CONTRACT LIABILITY
  • 33. Spencer Fane LLP | spencerfane.com Potential Trouble Spots? • Giveaways and contests can be trouble for many reasons – do not do them on social media without careful consideration and vetting – Some sites’ TOS prohibit – Jurisdiction gambling and contest rules • Example: Facebook’s Page Terms
  • 34. Spencer Fane LLP | spencerfane.com WHAT CAN YOU DO?
  • 35. Spencer Fane LLP | spencerfane.com SHOW DILIGENCE
  • 36. Spencer Fane LLP | spencerfane.com SOCIAL MEDIA POLICIES
  • 37. Spencer Fane LLP | spencerfane.com General Strategy for Policies • Recognize and appreciate potential issues • Decide how to handle those issues • Educate your team on those issues • Collaborate and train on how to comply with and resolve issues • Create and outline procedures for using social media • Monitor (to some degree) to ensure compliance
  • 38. Spencer Fane LLP | spencerfane.com Social Media Policies Are a “Must Have” • Ounce of prevention: less than 1 day of litigation • If have, must enforce • Trying to predict issues – but evolving – can’t get all • Contractually resolve issues such as ownership and authority • Great opportunity to set rules and document expectations • Training – greater opportunity to explain and ensure understanding of expectations • Put on notice of monitoring – and actually monitor! • Should address employment issues
  • 39. Spencer Fane LLP | spencerfane.com POLICY BUZZ-KILL
  • 40. Spencer Fane LLP | spencerfane.com Will the National Labor Relations Board Allow It? • NLRB jurisdiction = impacts interstate commerce • National Labor Relations Act (NLRA) sec. 7 gives employees right to engage in “concerted activities for the purpose of … mutual aid and protection” • NLRB finds illegal any policy provision that (a) restricts or (b) an employee would reasonably construe to chill concerted activities • On 5/30/12 NLRB General Counsel issued its 3rd Report on Social Media Policies in 1 year period (8/11 & 1/12) • Has continued – with several since then
  • 41. Spencer Fane LLP | spencerfane.com Can You Guess Who the NLRB is Pulling For? • Making it very difficult for businesses to protect themselves • Social media policies must now be carefully tailored to – Address unique business and legal needs of your business – Be enforceable and lawful in a court of law – Be legal in the eyes of the NLRB • Examples of provisions found illegal by NLRB
  • 42. Spencer Fane LLP | spencerfane.com
  • 43. Spencer Fane LLP | spencerfane.com
  • 44. Spencer Fane LLP | spencerfane.com
  • 45. Spencer Fane LLP | spencerfane.com Richmond Dist. Neighborhood Center v. Callaghan “The question is whether the conduct is so egregious as to take it outside the protection of the Act, or of such character as to render the employee unfit for further service.”
  • 46. Spencer Fane LLP | spencerfane.com 56 Pier Sixty, LLC (NLRB March 31, 2015) • Employee on Facebook: called his manager a “NASTY MOTHER F****R” and a “LOSER,” said “f**k his mother and his entire f***ing family,” and ended the post by saying “Vote Yes for the Union!” • Company fired him. • NLRB: Firing improper. Feeling of mistreatment motivated statements and employees were simultaneously seeking redress through upcoming union election which made statements protected, concerted activity. • Comments not egregious enough.
  • 47. Spencer Fane LLP | spencerfane.com What is the NLRB Really Looking For? • Clarity and precision • Examples of do’s and don’ts that give context and real-life meaning to the rules • Implementation + training = 
  • 48. Spencer Fane LLP | spencerfane.com CYBER INSURANCE
  • 49. Spencer Fane LLP | spencerfane.com Cyber Insurance • If you are doing anything in cyberspace, you need it. Period. • Most traditional insurance does not cover cyber-events, even if you think it does (really!) • Cyber-Insurance is relatively inexpensive • Many policies include a cyber-risk audit before being underwritten • Policies can cover social media risk, computer fraud risk, and data breach / hacking risk • You must get your vendors / law firm’s pre-approved!
  • 50. Spencer Fane LLP | spencerfane.com SUMMARY
  • 51. Spencer Fane LLP | spencerfane.com • Social Media is wonderful! • Must find proper balance within the rules • Communicate – yep, just talk about it internally, like, over coffee! • Spend time with employees to help them understand and possibly collaborate on the rules • Create a social media policy – Address unique business and legal needs of your business – Be enforceable and lawful in a court of law – Be legal in the eyes of the NLRB • Enforce your social media policy • Seriously consider cyber-insurance!
  • 52. Spencer Fane LLP | spencerfane.com Shawn Tuma Co-Chair, Cybersecurity & Data Privacy Spencer Fane LLP 972.324.0317 stuma@spencerfane.com • 20+ Years of Cyber Law Experience • Practitioner Editor, Bloomberg BNA – Texas Cybersecurity & Data Privacy Law • Council Member, Southern Methodist University Cybersecurity Advisory • Board of Advisors, North Texas Cyber Forensics Lab • Policy Council, National Technology Security Coalition • Board of Advisors, Cyber Future Foundation • Cybersecurity & Data Privacy Law Trailblazers, National Law Journal (2016) • SuperLawyers Top 100 Lawyers in Dallas (2016) • SuperLawyers 2015-19 • Best Lawyers in Dallas 2014-19, D Magazine • Chair-Elect, Computer & Technology Section, State Bar of Texas • Privacy and Data Security Committee of the State Bar of Texas • College of the State Bar of Texas • Board of Directors, Collin County Bench Bar Conference • Past Chair, Civil Litigation & Appellate Section, Collin County Bar Association • Information Security Committee of the Section on Science & Technology Committee of the American Bar Association • North Texas Crime Commission, Cybercrime Committee & Infragard (FBI) • International Association of Privacy Professionals (IAPP)