How To Protect Your Reputation On Social Media

Size: px
Start display at page:

Download "How To Protect Your Reputation On Social Media"

Transcription

1 SOCIAL MEDIA AND ONLINE FRAUD WELCOME TO: Social Media and Online Fraud: Protecting Yourself and Your Organization Please dial to connect to the audio portion of this webinar. Please note this call will be recorded 1

2 Social Media & Online Fraud: Trends, Tips and Best Practices For Dealing With Online Fraudsters Gina Durham

3 Social Media What are we talking about? No single or uniform definition of what it means. Our definition: online or web-based technologies, tools and platforms that allow for the creation and exchange of usergenerated content in a social setting. Includes: Social networking sites such as Facebook, Linked In, MySpace, and Twitter Blogging sites, including blogs on commercial news and other sites. Wikis Video content sharing sites such as YouTube and Flickr Social news sites such as Digg or Reddit 3

4 Social Media Fast Facts Facebook over 500 million users Twitter over 200 million users U.S. Dept. of Justice reported total online fraud losses of almost $560 million in 2009, more than doubled from 2008 (based on complaints received by Internet Crime Complaint Center) 4

5 Risks Posed by Explosion of Social Media Various Frauds and Impersonations Scams that can damage your reputation Scams that can harm your customers Challenges of user-generated content on company websites, or company-sponsored websites 5

6 Special Challenges Posed by Social Media Anonymity for the fraudsters Ability to know their victims access to individual data on a massive scale Interoperability Multiplies Challenges Tweet a message including a trademark infringement Retweet on Facebook Retweet on Linked-In Retweet on Blogger Blogger content republished via RSS on several sites RECYCLING OF HARMFUL CONTENT, VIRAL SPREAD 6

7 Specific Challenges Brandjacking Fraudsters take advantage of your brand to gain trust and make money Prevalent in social media because it is easy to set up accounts and find an audience scams targeting users of social media sites Unauthorized promotions Attempts to gather sensitive personal information Malicious software that infects victim s PC and steals passwords Phishing attacks using information on social networking sites Gripe pages and false and/or harmful user generated content 7

8 Examples of Recent Scams WHOLE FOODS $500 Gift Card Phishing Scam Fake Facebook Pages 8

9 Examples of Recent Scams Fake Facebook Pages Click on Like button, attempt to steal Facebook password 9

10 Examples of Recent Scams Impersonation on Twitter St Louis Cardinal s Manager Tony LaRussa case Trend- impersonation of company executive speaking on behalf of company 10

11 Examples of Recent Scams Social media-linked Ponzi scheme, in which scam artists use YouTube, Twitter and Facebook to promote investment opportunities with the promise of unrealistically high returns. Fake Blogging 11

12 Best Practices & Preventative Measures Preemptively register trademarks and common variations on major social media websites Educate your consumers/users & provide a means of authentication How do they know they are really communicating with you How do they know it is an authorized site, page, etc. Establish guidelines as to who is authorized to post on behalf of the brand and how they must identify themselves Drive traffic to and from the company s authorized website Monitor venues for abuse 12

13 Combating Scams On Social Media Outlets Educate Your Customers-How do they know it is really you? 13

14 Combating Scams On Social Media Outlets Quick Action Take advantage of Take Down Policies Twitter Impersonation Policy Pretending to be another person or entity Submit a ticket to Twitter Trademark Policy Using a company or business name, logo, or other trademarkprotected materials in a manner that may mislead or confuse others or be used for financial gain may be considered a trademark policy violation. 14

15 Combating Scams On Social Media Outlets 15

16 Combating Scams On Social Media Outlets Facebook Trademark/Copyright Notice of Intellectual Property Infringement (copyright) and (noncopyright) Remedies- Remove/Disable Content, but will also contact poster Poster s ability to appeal Facebook Impersonation Go to the impostor profile and click "Report this Person" in the left column. Check the "Report this Person" box, choose "Fake Account" as the reason, and add "Impersonating me or someone else" as the report type. Facebook Phishing Issues Go to the Security Page and report a phished account 16

17 Combating Scams On Social Media Outlets Report to Authorities/Law Enforcement Report to Other Relevant Organizations Better Business Bureau or by calling FINRA 17

18 Combating Scams On Social Media Outlets Take Civil Action In Appropriate Situations Importance of investigation Understand the challenges and objectives Subpoenas Defendants outside U.S. Secondary liability Deterrence objectives Injunctions Statutory damages 18

19 Combating Scams On Social Media Outlets Helpful Legal Theories Federal Statutes Lanham Act, 15 U.S.C and 15 U.S.C. 1125(a) Counterfeit Mark? Anti-Cybersquatting Consumer Protection Act, 15 U.S.C. 1125(d) Computer Fraud and Abuse Act, 18 U.S.C Unauthorized access or exceeds authorized access Requisite showing of compensable loss Von Holdt v. A1 Tool Corp, 2010 U.S. Dist. Lexis (ND IL May 17, 2010) (damage, impairment, or interruption of services required) Copyright RICO 19

20 Combating Scams On Social Media Outlets Helpful Legal Theories State Laws State Anti-Spam Laws Right of Publicity Laws Breach of Contract Trespass Fraud 20

21 Combating Scams On Social Media Outlets Legislative Progress--More help on the way? Utah E-Commerce Integrity Act California SB 1411 Criminal E-Personation Previous Snowe Bill 21

22 Company Criticism- What to do about a Gripe Page Sometimes there are trademark, defamation, or other objections to be made against a gripe page BUT Use a rule of reason before asserting such claims Will taking action create more attention for the criticism than having simply ignored it? Anecdote-- Mr. Kurtz s Facebook page Kalamazoo Residents against T&J Towing T&J took action which resulted in thousands of followers to the gripe page and a story in the NY Times Careful Fair Use, Privileges and First Amendment Protections May Apply 22

23 Unauthorized Use of Company Web Forums Dealing with User Generated Content Mitigating Risks First Line of Defense: Terms of Use, House Rules, etc. Williams v. Life s Rad, 2010 U.S. Dist. LEXIS (N.D. Cal. May 11, 2010) Terms of Service and user agreement that reserved right to removed content plaintiff considered infringing or otherwise objectionable in its sole and absolute discretion online provider held not liable for removal of user content Put them on your Facebook page too! Communications Decency Act Immunity Note --Company is acting as ISP when it creates a website that interacts with the public and allows public comment or posting. 23

24 Unauthorized Use of Company Web Forums Tips for Successfully Enforcing Terms of Use Under Breach of Contract Carefully drafted terms of use Enforceability of click wrap and browse wrap form of assent Major v. McCallister, 302 S.W.3d 227 (Mo. Ct. App. Dec. 23, 2009) Notice Demand Letter enclosing Terms of Use Plausible Damage Claim Damage to Computer Systems Reputational Damage Lost Revenue/Sales Opportunities due to diversion 24

25 Unauthorized Use of Company Web Forums Communications Decency Act - Best Practices Trends Communications Decency Act (47 U.S.C. 230) No Section 230 immunity if responsible in whole or in part for the creation of development of information provided through the Internet or any other interactive computer service. Immunity preempts challenges based on state and local laws (but not challenges based on IP) Key Distinction ISP that allows access by multiple users (receive immunity) or ISP that provides content and retains responsibility for the creation or development of information provided through the internet (no immunity) 25

26 Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Doe v. Sexsearch.com, 502 F.Supp.2d 719 (ND OH 2007) Website simultaneously acts as interactive computer service and information content provider Critical issue whether site was acting as information provider on information plaintiff claims is false Barnes v. Yahoo! Inc., 570 F.3d 1096 (9 th Cir. 2009) Plaintiff survives CDA immunity for claim against web site operator for defamatory content posted by third party Separate promise by Yahoo! employee to remove false profiles (act was a separate undertaking beyond publisher of profiles) DO NOT make a promise you cannot keep 26

27 Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Doctor s Associates v. QIP Holder LLC, 2010 U.S. Dist. LEXIS (D. Conn. Feb. 19, 2010) Quizno s v. Subway Video Contest MCW v. Badbusinessbureau.com, 2004 U.S.Dist. LEXIS 6678 (ND Tex April 14, 2004) Actively soliciting disparaging materials, defendant went beyond publisher s role and incurred responsibility for the information developed and created by consumers The CDA "does not require a court to determine only whether a party creates or develops the information at issue. Being responsible for the creation or development is sufficient." 27

28 Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Scott P. v. Craigslist (Cal. Super. Ct. San Fran. Cty June 2, 2010) Nemet Chevrolet v. Consumeraffairs.com, 564 F.Supp.2d 544 (E.D. Va. 2008) Fair Housing Council of San Fernando Valley v. Roommates.com, LLC, 521 F.3d 1157 (9th Cir. 2008) Chicago Lawyers Committee for Civil Rights Under the Law, Inc. v. Craigslist, 519 F.3d 666 (7 th Cir. 2008). 28

29 Social Media Monitoring Interesting Links and Emerging Vendors Search engines to locate damaging content icerocket.com (searches blogs, Twitter, MySpace, news and images) Google.com/alerts (alerts for use of company names and brands on blogs, the Web, news, videos and discussion groups) technorati.com (searches blogs) TM.biz (free search to check brands registered as user names at top 500 social media sites) Vendors User Name Watching Content Watching in Major Forums 29

30 Social Media Monitoring Interesting Links and Emerging Vendors Vendors (Con t.) Attensity ( Attentio ( Cision ( Radian ( MarkMonitor, Thomson, Coresearch 30

31 Gina Durham DLA Piper LLP (US) (312)

By Janet M. Garetto. Trademark Issues in Social Media

By Janet M. Garetto. Trademark Issues in Social Media By Janet M. Garetto Trademark Issues in Social Media What Types of Trademark Misuse Can Occur on Social Media Sites? Backdrop = traditional trademark law New sources of problems General rule: activities

More information

UNSW Social Media communication guidelines

UNSW Social Media communication guidelines \ UNSW Social Media communication guidelines UNSW Marketing Services CONTENTS: 1. Purpose... 2 2. Definition of social media... 2 3. Risks associated with social media... 3 4. Social media branding...

More information

Privacy Policy and Terms of Use

Privacy Policy and Terms of Use Privacy Policy and Terms of Use Pencils of Promise, Inc. ( PoP, we, us or our ) shares your concern about the protection of your personal information online. This Privacy Policy and Terms of Use ( Policy

More information

Facts About Copyright Infringement Law

Facts About Copyright Infringement Law MARKETING AND ADVERTISING THROUGH SOCIAL MEDIA Ann H. Chen, Wm. Wrigley Jr. Company Gonzalo E. Mon, Kelley Drye & Warren LLP Sylvie G. Motz, Practical Law Company, Inc. Overview Endorsements Promotions

More information

Alec Christie and Rachel Jacqueline

Alec Christie and Rachel Jacqueline EVERYTHING MATTERS Alec Christie and Rachel Jacqueline Practical ways to deal with defamation and brand disparagement on the Web Recently the anonymous blogger that named Vogue cover girl Liskula Cohen

More information

Online Reputation Management Protecting your Brand & Reputation In The Digital Marketplace

Online Reputation Management Protecting your Brand & Reputation In The Digital Marketplace Online Reputation Management Protecting your Brand & Reputation In The Digital Marketplace POWERi Technologies Inc. Overview - Online Reputation Management Solutions: - Online Brand Protection Monitoring

More information

School District and Campus Web Sites: More than Meets the Eye

School District and Campus Web Sites: More than Meets the Eye School District and Campus Web Sites: More than Meets the Eye A surprising number of legal and policy issues are raised in the creation and maintenance of school district Web sites. Whether your school

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage? What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements July 14, 2015 Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Program Overview 1. How to Transfer Risk and

More information

ACCEPTABLE USE AND TAKEDOWN POLICY

ACCEPTABLE USE AND TAKEDOWN POLICY ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words

More information

Technological Evolution The Impact of Social Media, Big Data and Privacy on Business

Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Recent Developments at the Intersection of Social Media and Intellectual Property Law Christina Gensler Corporate Counsel

More information

CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013

CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013 CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013 I. PURPOSE The department endorses the secure use of social media to enhance communication, collaboration, and information

More information

Social Media Guidelines for School Board Members

Social Media Guidelines for School Board Members Social Media Guidelines for School Board Members Many school board members are active users of social media, including online platforms such as Facebook and Twitter, as well as other media such as blogs

More information

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer

More information

When Marketing Through Social Media, Legal Risks Can Go Viral

When Marketing Through Social Media, Legal Risks Can Go Viral white paper MAY 2010 When Marketing Through Social Media, Legal Risks Can Go Viral VENABLE LLP ON ONLINE MARKETING LAW CALIFORNIA MARYLAND NEW YORK VIRGINIA WASHINGTON, DC 1.888.VENABLE ww.venable.com

More information

BAD CONSUMER REVIEWS ONLINE: STRATEGIES FOR REMOVAL

BAD CONSUMER REVIEWS ONLINE: STRATEGIES FOR REMOVAL BAD CONSUMER REVIEWS ONLINE: STRATEGIES FOR REMOVAL By: Karl Kronenberger Marketing professionals often struggle to make the best decision regarding negative content about their business s brand on Yelp

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ). Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

Jozii LLC WEBSITE TERMS OF SERVICE

Jozii LLC WEBSITE TERMS OF SERVICE Jozii LLC WEBSITE TERMS OF SERVICE 1. Acceptance of Terms. Welcome to Jozii. By using our Internet website, you indicate your unconditional acceptance of the following Terms of Service. Please read them

More information

Model Policy for a Law Enforcement Agency s use of Social Networking

Model Policy for a Law Enforcement Agency s use of Social Networking Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model

More information

Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective

Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective Trade Secret Protection vs. Free Speech Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective Marc Martin, Partner K&LNG Any opinions, interpretations or viewpoints

More information

JPMA - Terms and Conditions

JPMA - Terms and Conditions Agreement to Terms By accessing the JPMA Website and Online Training System, you signify that you agree to these Terms and Conditions. In addition, you will be subject to any posted guidelines, rules,

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

Social Media Policy and Guidelines

Social Media Policy and Guidelines Social Media Policy and Guidelines This document governs the publication of and commentary on social media by REALTORS who are members of the North Bay Association of REALTORS (NorBAR), NAR and C.A.R.

More information

Social Media Marketing Series #5: Sweepstakes, Contests, and User Generated Content

Social Media Marketing Series #5: Sweepstakes, Contests, and User Generated Content American Bar Association Antitrust Division Private Advertising Litigation, Media and Technology, & Consumer Protection Committees Present: Social Media Marketing Series #5: Sweepstakes, Contests, and

More information

The New Frontier of Brand Enforcement on the Internet: A U.S. Perspective

The New Frontier of Brand Enforcement on the Internet: A U.S. Perspective The New Frontier of Brand Enforcement on the Internet: A U.S. Perspective Steven J. Wadyka, Jr. Shareholder Greenberg Traurig, LLP Washington, D.C. USA (202) 331-3105 wadykas@gtlaw.com GREENBERG TRAURIG,

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! 1 Running Sweepstakes, Contests and

More information

Electronic Discovery Rules & Social Media

Electronic Discovery Rules & Social Media Electronic Discovery Rules & Social Media What is ESI? ESI is any information stored in electronic form All ESI is discoverable if relevant and reasonably accessible Privileges and other exceptions to

More information

BYLAW 26. Skate Australia Social Media Usage Policy

BYLAW 26. Skate Australia Social Media Usage Policy BYLAW 26 Skate Australia Social Media Usage Policy Adopted August 12, 2012 1.0 Definitions For the purposes of this policy the following definitions apply: Skate Australia (or SA) broadly includes all

More information

Corporate Risks and Remedies

Corporate Risks and Remedies COMMERCIAL LITIGATION Internet Defamation Corporate Risks and Remedies By Frederick E. Blakelock and Kevin W. Weber One s good name can too easily be harmed through publication of false and defaming statements

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

Social Media - 10 Fundamental Questions All Businesses Consider

Social Media - 10 Fundamental Questions All Businesses Consider January 2015 Practice Group(s): Corporate/ M&A Technology Transactions Social Media: 10 Fundamental Questions All Businesses Should Consider About Their Online Presence By Holly K. Towle, Kendra H. Nickel-Nguy

More information

Internet investment scams in China

Internet investment scams in China Internet investment scams in China How to protect your business s reputation in China You get a call. Your offices in Beijing and Shanghai have been inundated with complaints from distressed members of

More information

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy DISTRICT COUNCIL OF LOXTON WAIKERIE Social Media Policy Policy Identification: Adoption Date: 20 April 2012 Last Review: 17 April 2015 Next Review Date: April 2017 Every 2 years Responsible Officer(s):

More information

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics Best Practices for the Use of Social Media Summer 2011 Belmont University Athletics Overview The rapid growth of social media technologies combined with their ease of use and pervasiveness make them attractive

More information

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT JANE DOE NO. 14, Plaintiff-Appellant, v. INTERNET BRANDS, INC., DBA Modelmayhem.com, Defendant-Appellee. No. 12-56638 D.C. No. 2:12-cv-03626-

More information

Social Media Guidelines

Social Media Guidelines Northern Virginia Community College Social Media Guidelines social networks, social media, blogs, wikis and virtual worlds April 2013 (revised) 04.11.13 Page 1 Table of Contents Introduction 3 Connect

More information

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating

More information

The New World of Social Media: Business and Legal Risks

The New World of Social Media: Business and Legal Risks March 2, 2010 The New World of Social Media: Business and Legal Risks Call-In Details: United States/Canada: 1-800-214-0694 All other countries: 1-719-955-1425 Participant Passcode: 165381 www.marsh.com

More information

Acceptable Use (Anti-Abuse) Policy

Acceptable Use (Anti-Abuse) Policy Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY Dedicated Server Store s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what Dedicated Server Store expects of them while using

More information

Insurance Issues in e-commerce Contracting

Insurance Issues in e-commerce Contracting Insurance Issues in e-commerce Contracting Presentation to ACC IT Privacy & ecommerce Committee February 4, 2010 Ann V. Kramer, Esq. Catherine Chaskin, Esq. Who Pays? Outline Indemnities v. Insurance Which

More information

Social and Digital Media Policy

Social and Digital Media Policy Social and Digital Media Policy October 2012 Version 1.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

ONLINE DEFAMATION & REPUTATION MANAGEMENT

ONLINE DEFAMATION & REPUTATION MANAGEMENT ONLINE DEFAMATION & REPUTATION MANAGEMENT Presented by Russell Davis www.sandiegobusinesslaw.com Actual email-received March 28, 2011 Dear, It appears that your business is under attack from a malicious

More information

Ways Manufacturers Can Shut Down Unauthorized Resellers

Ways Manufacturers Can Shut Down Unauthorized Resellers Ways Manufacturers Can Shut Down Unauthorized Resellers Law360, New York (July 26, 2016, 4:54 PM ET) -- The internet has become a dominant marketplace for consumer products and services. Historically,

More information

Social Networking and the Public Employer. Should Governments be in the Social Network Business? Agenda

Social Networking and the Public Employer. Should Governments be in the Social Network Business? Agenda Social Networking and the Public Employer Should Governments be in the Social Network Business? Jeanine Hummer City Attorney City of Upper Arlington Agenda Should Governments be in the Social Network Business?

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

www.yourchoicecounselling.co.uk (the "Website") is provided by Your Choice Counselling.

www.yourchoicecounselling.co.uk (the Website) is provided by Your Choice Counselling. Your Choice Counselling. Website Legal Notice Important - this is a legal agreement between you and Your Choice Counselling. Registered office: 2 Seaford Close, Burseldon, Southampton, Hampshire SO31 8GL

More information

GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010

GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010 GUIDELINES FOR THE USE OF SOCIAL MEDIA January 2010 Revised July 2010 Prepared by: The Voices Technology and Best Practice Team TABLE OF CONTENTS Overview of Document...2 General Rules to Follow...3 Social

More information

Art-list License Agreement

Art-list License Agreement Art-list License Agreement 1. General 1.1. The Agreement herein is made between you and Art list (or by any other name), the owner of the site: www.art list.io, and it settles the terms and conditions

More information

Top Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities

Top Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities Top Issues for Safeguarding Brand Reputation When Engaging In Social Media By: Alan L. Friel, Akash Sachdeva, Jesse Brody and Jatinder Bahra Social media has changed the way people communicate, and enabled

More information

TERMS OF USE. Last Updated: October 8, 2015

TERMS OF USE. Last Updated: October 8, 2015 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org TERMS OF USE Last Updated: October 8, 2015 This Terms of Use Agreement (this "Agreement") is

More information

Bonita Springs Estero Association of REALTORS Policy: Member s Use of Social Media in the Real Estate Business

Bonita Springs Estero Association of REALTORS Policy: Member s Use of Social Media in the Real Estate Business Bonita Springs Estero Association of REALTORS Policy: Member s Use of Social Media in the Real Estate Business As used in this policy Broker shall refer to the Broker. REALTOR or Agent shall mean a licensed

More information

Credit Reports and the Fair Credit Reporting Act. The Credit Bureaus

Credit Reports and the Fair Credit Reporting Act. The Credit Bureaus Credit Reports and the Consumer Law Eric E. Johnson eejlaw.com Konomark Most rights sharable. The Credit Bureaus 1 State law causes of action against credit bureaus Defamation Invasion of privacy State

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

Terms of Use Gateway Clipper Website

Terms of Use Gateway Clipper Website Terms of Use Gateway Clipper Website General Information Regarding These Terms of Use Master terms: Unless otherwise noted on a particular site or service, these master terms of use ( Master Terms ) apply

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

'Safe Harbor' For Online Service Providers

'Safe Harbor' For Online Service Providers Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com 'Safe Harbor' For Online Service Providers

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

SOCIAL MEDIA GUIDELINES For employees at Southeast Regional College

SOCIAL MEDIA GUIDELINES For employees at Southeast Regional College SOCIAL MEDIA GUIDELINES For employees at Southeast Regional College Why do we need guidelines for social media? This document outlines the guidelines for Southeast Regional College employees communicating

More information

Avoiding Medicaid Fraud. Odyssey House of Utah Questions? Contact your Program Director or Emily Capito, Director of Operations

Avoiding Medicaid Fraud. Odyssey House of Utah Questions? Contact your Program Director or Emily Capito, Director of Operations Avoiding Medicaid Fraud Odyssey House of Utah Questions? Contact your Program Director or Emily Capito, Director of Operations MEDICAID FRAUD OVERVIEW Medicaid Fraud The Medicaid Program provides medical

More information

Terms and Conditions

Terms and Conditions Below are the first 5 pages of our 11-page attorney-drafted WEBSITE AND BLOG TERMS AND CONDITIONS AGREEMENT (TERMS OF USE) Most terms of use agreements being offered on the Internet are only 3-5 pages

More information

PIPER S INTERNET CAFÉ, LLC END USER AGREEMENT

PIPER S INTERNET CAFÉ, LLC END USER AGREEMENT PIPER S INTERNET CAFÉ, LLC END USER AGREEMENT 1. SUMMARY: The full End User Agreement consists of, an End User Agreement, a Privacy Policy, a Terms of Service, the Time Warner Cable Business Class agreement,

More information

Website Terms and Conditions

Website Terms and Conditions Website Terms and Conditions In these terms and conditions, "we", "us" and "our" means Southern Cross Austereo Pty Limited ACN 109 243 110 and its related bodies corporate and any successors or assigns..

More information

Social Media: Risks and Rewards

Social Media: Risks and Rewards Social Media: Risks and Rewards Nilesh (Neal) Patel Member Frost Brown Todd LLC 3300 Great American Tower Cincinnati, OH 45202 513.369.4805 npatel@fbtlaw.com Linkedin.com/in/nealpatel1/ 2013 Frost Brown

More information

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup 2012 Email and Text Message Campaigns Justine Young Gottshall Partner, InfoLawGroup What s the Risk? Effective and active marketing area This makes it a target for litigation and enforcement action Consumer

More information

Personal Injury Laws

Personal Injury Laws CHAPTER 6 Chapter 6 Slide 1 Personal Injury Laws Lessons 6-1 Offenses Against Individuals 6-2 Intentional Torts, Negligence, and Strict Liability 6-3 Civil Procedure LESSON 6-1 Chapter 6 Slide 2 Offenses

More information

Guidance on the Use of Social Networking

Guidance on the Use of Social Networking Guidance on the Use of Social Networking Version 1 - January 2012 Reviewed: September 2013 Version 2 Approved by SM: November 2013 Version 2 modified and approved by the PCC Board: April 2014 Overview

More information

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms

More information

Social Media is Pervasive

Social Media is Pervasive HR Liabilities of The Digital Age ABC Webinar September 29, 2010 Social Media is Pervasive Facebook 500+ million users Blogs 200 million bloggers Twitter 75 million users LinkedIn 50 million users Results

More information

ICM Registry White Paper Legal Analysis of.xxx Registry Trademark Liability. Executive Summary

ICM Registry White Paper Legal Analysis of.xxx Registry Trademark Liability. Executive Summary ICM Registry White Paper Legal Analysis of.xxx Registry Trademark Liability As a part of the launch of the.xxx top-level domain ( TLD ), a number of questions arose regarding the protections for existing

More information

DATA CENTER UNIVERSITY by AMERICAN POWER CONVERSION (APC) CANDIDATE AGREEMENT

DATA CENTER UNIVERSITY by AMERICAN POWER CONVERSION (APC) CANDIDATE AGREEMENT DATA CENTER UNIVERSITY by AMERICAN POWER CONVERSION (APC) CANDIDATE AGREEMENT 1. DEFINITIONS For purposes of this Agreement, the terms defined in this Section shall have the meanings set forth below: 1.1

More information

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. FAQs - Harmful Digital Communications Bill What are harmful digital communications? Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. Examples include sending

More information

Auburn University at Montgomery Policies and Procedures

Auburn University at Montgomery Policies and Procedures Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created

More information

The Do s and Don ts of Utilizing Social Media in Claims Investigation

The Do s and Don ts of Utilizing Social Media in Claims Investigation The Do s and Don ts of Utilizing Social Media in Claims Investigation Benjamin R. Messing, Esquire 2012 SIR Annual Conference October 15, 2012 Nelson Levine de Luca & Hamilton, LLC Understanding Social

More information

SOCIAL MEDIA IN PERSONAL INJURY LAW

SOCIAL MEDIA IN PERSONAL INJURY LAW David K. Inscho Kline and Specter, P.C. SOCIAL MEDIA IN PERSONAL INJURY LAW The Internet isn t written in pencil Mark Social Media Issues Discovery of Social Media Social Media in Investigation Social

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

YWCA Metro St. Louis Social Media Policy

YWCA Metro St. Louis Social Media Policy YWCA Metro St. Louis Social Media Policy I. Purpose Social media encompasses a growing collection of online technologies and tools that allow and encourage users to interact and build relationships by

More information

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy. CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services

More information

YU General Guidelines for Use of Social Media

YU General Guidelines for Use of Social Media INTRODUCTION AND SCOPE General Guidelines for Use of Social Media Social media can be a valuable and powerful means of communication. Yeshiva University and its constituent schools (collectively, the University

More information

Introduction to Social Media

Introduction to Social Media Introduction to Social Media Today s Discussion Overview of Web 2.0 and social media tools How EPA and other agencies are using these tools Agency and governmentwide policies governing use of tools Case

More information

Website Terms of Use

Website Terms of Use 1. OUR TERMS OF USE Website Terms of Use May 2016 1.1 The website and domain (www.lendingworks.co.uk) and each and every page hosted on this domain (the "Website") is owned and operated by Lending Works

More information

OFFICE OF EXTERNAL RELATIONS

OFFICE OF EXTERNAL RELATIONS OFFICE OF EXTERNAL RELATIONS Social Media Policy I. Purpose Social media encompass a wide variety of Internet networking and communication tools, including but not limited to sites such as Facebook and

More information

General Photographer Terms and Conditions

General Photographer Terms and Conditions General Photographer Terms and Conditions Last updated: February 14, 2014 These Terms of Use govern the use of the services offered by Boutique Photo Pros, Inc. hereinafter referred to as the "Service."

More information

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

Chapter 4 Crimes (Review)

Chapter 4 Crimes (Review) Chapter 4 Crimes (Review) On a separate sheet of paper, write down the answer to the following Q s; if you do not know the answer, write down the Q. 1. What is a crime? 2. There are elements of a crime.

More information

Global: Defamation and social media

Global: Defamation and social media 20 Global Media and Communications Quarterly Spring Issue 2013 Global: Defamation and social media Across the globe, social networking via the internet is on the rise. In 2012, on average, there were 850

More information

TRADEMARK AND COPYRIGHT NOTICES

TRADEMARK AND COPYRIGHT NOTICES TRADEMARK AND COPYRIGHT NOTICES The Sites on which these Terms and Conditions are located ("Sites") contain many of the valuable trademarks and service marks owned and used by U.S. Taco Co. throughout

More information