SOCIAL MEDIA AND ONLINE FRAUD WELCOME TO: Social Media and Online Fraud: Protecting Yourself and Your Organization Please dial 1-800-950-7243 to connect to the audio portion of this webinar. Please note this call will be recorded 1
Social Media & Online Fraud: Trends, Tips and Best Practices For Dealing With Online Fraudsters Gina Durham
Social Media What are we talking about? No single or uniform definition of what it means. Our definition: online or web-based technologies, tools and platforms that allow for the creation and exchange of usergenerated content in a social setting. Includes: Social networking sites such as Facebook, Linked In, MySpace, and Twitter Blogging sites, including blogs on commercial news and other sites. Wikis Video content sharing sites such as YouTube and Flickr Social news sites such as Digg or Reddit 3
Social Media Fast Facts Facebook over 500 million users Twitter over 200 million users U.S. Dept. of Justice reported total online fraud losses of almost $560 million in 2009, more than doubled from 2008 (based on complaints received by Internet Crime Complaint Center) 4
Risks Posed by Explosion of Social Media Various Frauds and Impersonations Scams that can damage your reputation Scams that can harm your customers Challenges of user-generated content on company websites, or company-sponsored websites 5
Special Challenges Posed by Social Media Anonymity for the fraudsters Ability to know their victims access to individual data on a massive scale Interoperability Multiplies Challenges Tweet a message including a trademark infringement Retweet on Facebook Retweet on Linked-In Retweet on Blogger Blogger content republished via RSS on several sites RECYCLING OF HARMFUL CONTENT, VIRAL SPREAD 6
Specific Challenges Brandjacking Fraudsters take advantage of your brand to gain trust and make money Prevalent in social media because it is easy to set up accounts and find an audience E-mail scams targeting users of social media sites Unauthorized promotions Attempts to gather sensitive personal information Malicious software that infects victim s PC and steals passwords Phishing attacks using information on social networking sites Gripe pages and false and/or harmful user generated content 7
Examples of Recent Scams WHOLE FOODS $500 Gift Card Phishing Scam Fake Facebook Pages 8
Examples of Recent Scams Fake Facebook Pages Click on Like button, attempt to steal Facebook password 9
Examples of Recent Scams Impersonation on Twitter St Louis Cardinal s Manager Tony LaRussa case Trend- impersonation of company executive speaking on behalf of company 10
Examples of Recent Scams Social media-linked Ponzi scheme, in which scam artists use YouTube, Twitter and Facebook to promote investment opportunities with the promise of unrealistically high returns. Fake Blogging 11
Best Practices & Preventative Measures Preemptively register trademarks and common variations on major social media websites Educate your consumers/users & provide a means of authentication How do they know they are really communicating with you How do they know it is an authorized site, page, etc. Establish guidelines as to who is authorized to post on behalf of the brand and how they must identify themselves Drive traffic to and from the company s authorized website Monitor venues for abuse 12
Combating Scams On Social Media Outlets Educate Your Customers-How do they know it is really you? 13
Combating Scams On Social Media Outlets Quick Action Take advantage of Take Down Policies Twitter Impersonation Policy Pretending to be another person or entity Submit a ticket to http://twitter.com/help/escalate Twitter Trademark Policy Using a company or business name, logo, or other trademarkprotected materials in a manner that may mislead or confuse others or be used for financial gain may be considered a trademark policy violation. 14
Combating Scams On Social Media Outlets 15
Combating Scams On Social Media Outlets Facebook Trademark/Copyright Notice of Intellectual Property Infringement (copyright) and (noncopyright) http://www.facebook.com/legal/copyright.php?howto_report Remedies- Remove/Disable Content, but will also contact poster Poster s ability to appeal Facebook Impersonation Go to the impostor profile and click "Report this Person" in the left column. Check the "Report this Person" box, choose "Fake Account" as the reason, and add "Impersonating me or someone else" as the report type. Facebook Phishing Issues Go to the Security Page and report a phished account 16
Combating Scams On Social Media Outlets Report to Authorities/Law Enforcement Report to Other Relevant Organizations Better Business Bureau whistleblower@finra.org or by calling 1-866-96-FINRA 17
Combating Scams On Social Media Outlets Take Civil Action In Appropriate Situations Importance of investigation Understand the challenges and objectives Subpoenas Defendants outside U.S. Secondary liability Deterrence objectives Injunctions Statutory damages 18
Combating Scams On Social Media Outlets Helpful Legal Theories Federal Statutes Lanham Act, 15 U.S.C. 1114 and 15 U.S.C. 1125(a) Counterfeit Mark? Anti-Cybersquatting Consumer Protection Act, 15 U.S.C. 1125(d) Computer Fraud and Abuse Act, 18 U.S.C. 1030 Unauthorized access or exceeds authorized access Requisite showing of compensable loss Von Holdt v. A1 Tool Corp, 2010 U.S. Dist. Lexis 49071 (ND IL May 17, 2010) (damage, impairment, or interruption of services required) Copyright RICO 19
Combating Scams On Social Media Outlets Helpful Legal Theories State Laws State Anti-Spam Laws Right of Publicity Laws Breach of Contract Trespass Fraud 20
Combating Scams On Social Media Outlets Legislative Progress--More help on the way? Utah E-Commerce Integrity Act California SB 1411 Criminal E-Personation Previous Snowe Bill 21
Company Criticism- What to do about a Gripe Page Sometimes there are trademark, defamation, or other objections to be made against a gripe page BUT Use a rule of reason before asserting such claims Will taking action create more attention for the criticism than having simply ignored it? Anecdote-- Mr. Kurtz s Facebook page Kalamazoo Residents against T&J Towing T&J took action which resulted in thousands of followers to the gripe page and a story in the NY Times Careful Fair Use, Privileges and First Amendment Protections May Apply 22
Unauthorized Use of Company Web Forums Dealing with User Generated Content Mitigating Risks First Line of Defense: Terms of Use, House Rules, etc. Williams v. Life s Rad, 2010 U.S. Dist. LEXIS 46763 (N.D. Cal. May 11, 2010) Terms of Service and user agreement that reserved right to removed content plaintiff considered infringing or otherwise objectionable in its sole and absolute discretion online provider held not liable for removal of user content Put them on your Facebook page too! Communications Decency Act Immunity Note --Company is acting as ISP when it creates a website that interacts with the public and allows public comment or posting. 23
Unauthorized Use of Company Web Forums Tips for Successfully Enforcing Terms of Use Under Breach of Contract Carefully drafted terms of use Enforceability of click wrap and browse wrap form of assent Major v. McCallister, 302 S.W.3d 227 (Mo. Ct. App. Dec. 23, 2009) Notice Demand Letter enclosing Terms of Use Plausible Damage Claim Damage to Computer Systems Reputational Damage Lost Revenue/Sales Opportunities due to diversion 24
Unauthorized Use of Company Web Forums Communications Decency Act - Best Practices Trends Communications Decency Act (47 U.S.C. 230) No Section 230 immunity if responsible in whole or in part for the creation of development of information provided through the Internet or any other interactive computer service. Immunity preempts challenges based on state and local laws (but not challenges based on IP) Key Distinction ISP that allows access by multiple users (receive immunity) or ISP that provides content and retains responsibility for the creation or development of information provided through the internet (no immunity) 25
Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Doe v. Sexsearch.com, 502 F.Supp.2d 719 (ND OH 2007) Website simultaneously acts as interactive computer service and information content provider Critical issue whether site was acting as information provider on information plaintiff claims is false Barnes v. Yahoo! Inc., 570 F.3d 1096 (9 th Cir. 2009) Plaintiff survives CDA immunity for claim against web site operator for defamatory content posted by third party Separate promise by Yahoo! employee to remove false profiles (act was a separate undertaking beyond publisher of profiles) DO NOT make a promise you cannot keep 26
Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Doctor s Associates v. QIP Holder LLC, 2010 U.S. Dist. LEXIS 14687 (D. Conn. Feb. 19, 2010) Quizno s v. Subway Video Contest MCW v. Badbusinessbureau.com, 2004 U.S.Dist. LEXIS 6678 (ND Tex April 14, 2004) Actively soliciting disparaging materials, defendant went beyond publisher s role and incurred responsibility for the information developed and created by consumers The CDA "does not require a court to determine only whether a party creates or develops the information at issue. Being responsible for the creation or development is sufficient." 27
Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Scott P. v. Craigslist (Cal. Super. Ct. San Fran. Cty June 2, 2010) Nemet Chevrolet v. Consumeraffairs.com, 564 F.Supp.2d 544 (E.D. Va. 2008) Fair Housing Council of San Fernando Valley v. Roommates.com, LLC, 521 F.3d 1157 (9th Cir. 2008) Chicago Lawyers Committee for Civil Rights Under the Law, Inc. v. Craigslist, 519 F.3d 666 (7 th Cir. 2008). 28
Social Media Monitoring Interesting Links and Emerging Vendors Search engines to locate damaging content icerocket.com (searches blogs, Twitter, MySpace, news and images) Google.com/alerts (alerts for use of company names and brands on blogs, the Web, news, videos and discussion groups) technorati.com (searches blogs) TM.biz (free search to check brands registered as user names at top 500 social media sites) Vendors User Name Watching Content Watching in Major Forums 29
Social Media Monitoring Interesting Links and Emerging Vendors Vendors (Con t.) Attensity (http://www.attensity.com/); Attentio (http://attentio.com/); Cision (http://us.cision.com/media-monitoring/social-mediamonitoring.asp); Radian (http://www.radian6.com/) MarkMonitor, Thomson, Coresearch 30
Gina Durham DLA Piper LLP (US) (312) 368-7246 gina.durham@dlapiper.com