How To Protect Your Reputation On Social Media



Similar documents
By Janet M. Garetto. Trademark Issues in Social Media

UNSW Social Media communication guidelines

Privacy Policy and Terms of Use

Facts About Copyright Infringement Law

Alec Christie and Rachel Jacqueline

Online Reputation Management Protecting your Brand & Reputation In The Digital Marketplace

School District and Campus Web Sites: More than Meets the Eye

Covered California. Terms and Conditions of Use

Acceptable Use Policy ("AUP")

Social Media Guidelines

[Example] Social Media Acceptable Use Policy

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?

Acceptable Use of Information Technology

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP

ACCEPTABLE USE AND TAKEDOWN POLICY

Technological Evolution The Impact of Social Media, Big Data and Privacy on Business

CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013

Social Media Guidelines for School Board Members

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

When Marketing Through Social Media, Legal Risks Can Go Viral

BAD CONSUMER REVIEWS ONLINE: STRATEGIES FOR REMOVAL

Website Privacy Policy Statement

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE Social Media Policy

Jozii LLC WEBSITE TERMS OF SERVICE

Model Policy for a Law Enforcement Agency s use of Social Networking

Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective

JPMA - Terms and Conditions

Social Media In the Workplace

Social Media Policy and Guidelines

Social Media Marketing Series #5: Sweepstakes, Contests, and User Generated Content

The New Frontier of Brand Enforcement on the Internet: A U.S. Perspective

Website Privacy Policy Statement York Rd Lutherville, MD We may be reached via at

This Webcast Will Begin Shortly

Electronic Discovery Rules & Social Media

BYLAW 26. Skate Australia Social Media Usage Policy

Corporate Risks and Remedies

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

Social Media - 10 Fundamental Questions All Businesses Consider

Internet investment scams in China

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy

Best Practices for the Use of Social Media Summer Belmont University Athletics

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

Social Media Guidelines

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

The New World of Social Media: Business and Legal Risks

Acceptable Use (Anti-Abuse) Policy

ACCEPTABLE USE POLICY

Insurance Issues in e-commerce Contracting

Social and Digital Media Policy

ONLINE DEFAMATION & REPUTATION MANAGEMENT

Ways Manufacturers Can Shut Down Unauthorized Resellers

Social Networking and the Public Employer. Should Governments be in the Social Network Business? Agenda

What are the common online dangers?

(the "Website") is provided by Your Choice Counselling.

GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010

Art-list License Agreement

Top Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities

TERMS OF USE. Last Updated: October 8, 2015

Bonita Springs Estero Association of REALTORS Policy: Member s Use of Social Media in the Real Estate Business

Credit Reports and the Fair Credit Reporting Act. The Credit Bureaus

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Terms of Use Gateway Clipper Website

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

'Safe Harbor' For Online Service Providers

OIG Fraud Alert Phishing

region16.net Acceptable Use Policy ( AUP )

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

SOCIAL MEDIA GUIDELINES For employees at Southeast Regional College

Avoiding Medicaid Fraud. Odyssey House of Utah Questions? Contact your Program Director or Emily Capito, Director of Operations

Terms and Conditions

PIPER S INTERNET CAFÉ, LLC END USER AGREEMENT

Website Terms and Conditions

Social Media: Risks and Rewards

and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup

Personal Injury Laws

Guidance on the Use of Social Networking

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of will always be

Social Media is Pervasive

ICM Registry White Paper Legal Analysis of.xxx Registry Trademark Liability. Executive Summary

DATA CENTER UNIVERSITY by AMERICAN POWER CONVERSION (APC) CANDIDATE AGREEMENT

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.

Auburn University at Montgomery Policies and Procedures

The Do s and Don ts of Utilizing Social Media in Claims Investigation

SOCIAL MEDIA IN PERSONAL INJURY LAW

How To Help Protect Yourself From Identity Theft

Protecting Yourself from Identity Theft

YWCA Metro St. Louis Social Media Policy

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.

YU General Guidelines for Use of Social Media

Introduction to Social Media

Website Terms of Use

OFFICE OF EXTERNAL RELATIONS

General Photographer Terms and Conditions

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; (COLLECTIVELY BROADVOX )

Malware & Botnets. Botnets

Market Intelligence Cell. Fighting Financial Crime

Chapter 4 Crimes (Review)

Global: Defamation and social media

TRADEMARK AND COPYRIGHT NOTICES

Transcription:

SOCIAL MEDIA AND ONLINE FRAUD WELCOME TO: Social Media and Online Fraud: Protecting Yourself and Your Organization Please dial 1-800-950-7243 to connect to the audio portion of this webinar. Please note this call will be recorded 1

Social Media & Online Fraud: Trends, Tips and Best Practices For Dealing With Online Fraudsters Gina Durham

Social Media What are we talking about? No single or uniform definition of what it means. Our definition: online or web-based technologies, tools and platforms that allow for the creation and exchange of usergenerated content in a social setting. Includes: Social networking sites such as Facebook, Linked In, MySpace, and Twitter Blogging sites, including blogs on commercial news and other sites. Wikis Video content sharing sites such as YouTube and Flickr Social news sites such as Digg or Reddit 3

Social Media Fast Facts Facebook over 500 million users Twitter over 200 million users U.S. Dept. of Justice reported total online fraud losses of almost $560 million in 2009, more than doubled from 2008 (based on complaints received by Internet Crime Complaint Center) 4

Risks Posed by Explosion of Social Media Various Frauds and Impersonations Scams that can damage your reputation Scams that can harm your customers Challenges of user-generated content on company websites, or company-sponsored websites 5

Special Challenges Posed by Social Media Anonymity for the fraudsters Ability to know their victims access to individual data on a massive scale Interoperability Multiplies Challenges Tweet a message including a trademark infringement Retweet on Facebook Retweet on Linked-In Retweet on Blogger Blogger content republished via RSS on several sites RECYCLING OF HARMFUL CONTENT, VIRAL SPREAD 6

Specific Challenges Brandjacking Fraudsters take advantage of your brand to gain trust and make money Prevalent in social media because it is easy to set up accounts and find an audience E-mail scams targeting users of social media sites Unauthorized promotions Attempts to gather sensitive personal information Malicious software that infects victim s PC and steals passwords Phishing attacks using information on social networking sites Gripe pages and false and/or harmful user generated content 7

Examples of Recent Scams WHOLE FOODS $500 Gift Card Phishing Scam Fake Facebook Pages 8

Examples of Recent Scams Fake Facebook Pages Click on Like button, attempt to steal Facebook password 9

Examples of Recent Scams Impersonation on Twitter St Louis Cardinal s Manager Tony LaRussa case Trend- impersonation of company executive speaking on behalf of company 10

Examples of Recent Scams Social media-linked Ponzi scheme, in which scam artists use YouTube, Twitter and Facebook to promote investment opportunities with the promise of unrealistically high returns. Fake Blogging 11

Best Practices & Preventative Measures Preemptively register trademarks and common variations on major social media websites Educate your consumers/users & provide a means of authentication How do they know they are really communicating with you How do they know it is an authorized site, page, etc. Establish guidelines as to who is authorized to post on behalf of the brand and how they must identify themselves Drive traffic to and from the company s authorized website Monitor venues for abuse 12

Combating Scams On Social Media Outlets Educate Your Customers-How do they know it is really you? 13

Combating Scams On Social Media Outlets Quick Action Take advantage of Take Down Policies Twitter Impersonation Policy Pretending to be another person or entity Submit a ticket to http://twitter.com/help/escalate Twitter Trademark Policy Using a company or business name, logo, or other trademarkprotected materials in a manner that may mislead or confuse others or be used for financial gain may be considered a trademark policy violation. 14

Combating Scams On Social Media Outlets 15

Combating Scams On Social Media Outlets Facebook Trademark/Copyright Notice of Intellectual Property Infringement (copyright) and (noncopyright) http://www.facebook.com/legal/copyright.php?howto_report Remedies- Remove/Disable Content, but will also contact poster Poster s ability to appeal Facebook Impersonation Go to the impostor profile and click "Report this Person" in the left column. Check the "Report this Person" box, choose "Fake Account" as the reason, and add "Impersonating me or someone else" as the report type. Facebook Phishing Issues Go to the Security Page and report a phished account 16

Combating Scams On Social Media Outlets Report to Authorities/Law Enforcement Report to Other Relevant Organizations Better Business Bureau whistleblower@finra.org or by calling 1-866-96-FINRA 17

Combating Scams On Social Media Outlets Take Civil Action In Appropriate Situations Importance of investigation Understand the challenges and objectives Subpoenas Defendants outside U.S. Secondary liability Deterrence objectives Injunctions Statutory damages 18

Combating Scams On Social Media Outlets Helpful Legal Theories Federal Statutes Lanham Act, 15 U.S.C. 1114 and 15 U.S.C. 1125(a) Counterfeit Mark? Anti-Cybersquatting Consumer Protection Act, 15 U.S.C. 1125(d) Computer Fraud and Abuse Act, 18 U.S.C. 1030 Unauthorized access or exceeds authorized access Requisite showing of compensable loss Von Holdt v. A1 Tool Corp, 2010 U.S. Dist. Lexis 49071 (ND IL May 17, 2010) (damage, impairment, or interruption of services required) Copyright RICO 19

Combating Scams On Social Media Outlets Helpful Legal Theories State Laws State Anti-Spam Laws Right of Publicity Laws Breach of Contract Trespass Fraud 20

Combating Scams On Social Media Outlets Legislative Progress--More help on the way? Utah E-Commerce Integrity Act California SB 1411 Criminal E-Personation Previous Snowe Bill 21

Company Criticism- What to do about a Gripe Page Sometimes there are trademark, defamation, or other objections to be made against a gripe page BUT Use a rule of reason before asserting such claims Will taking action create more attention for the criticism than having simply ignored it? Anecdote-- Mr. Kurtz s Facebook page Kalamazoo Residents against T&J Towing T&J took action which resulted in thousands of followers to the gripe page and a story in the NY Times Careful Fair Use, Privileges and First Amendment Protections May Apply 22

Unauthorized Use of Company Web Forums Dealing with User Generated Content Mitigating Risks First Line of Defense: Terms of Use, House Rules, etc. Williams v. Life s Rad, 2010 U.S. Dist. LEXIS 46763 (N.D. Cal. May 11, 2010) Terms of Service and user agreement that reserved right to removed content plaintiff considered infringing or otherwise objectionable in its sole and absolute discretion online provider held not liable for removal of user content Put them on your Facebook page too! Communications Decency Act Immunity Note --Company is acting as ISP when it creates a website that interacts with the public and allows public comment or posting. 23

Unauthorized Use of Company Web Forums Tips for Successfully Enforcing Terms of Use Under Breach of Contract Carefully drafted terms of use Enforceability of click wrap and browse wrap form of assent Major v. McCallister, 302 S.W.3d 227 (Mo. Ct. App. Dec. 23, 2009) Notice Demand Letter enclosing Terms of Use Plausible Damage Claim Damage to Computer Systems Reputational Damage Lost Revenue/Sales Opportunities due to diversion 24

Unauthorized Use of Company Web Forums Communications Decency Act - Best Practices Trends Communications Decency Act (47 U.S.C. 230) No Section 230 immunity if responsible in whole or in part for the creation of development of information provided through the Internet or any other interactive computer service. Immunity preempts challenges based on state and local laws (but not challenges based on IP) Key Distinction ISP that allows access by multiple users (receive immunity) or ISP that provides content and retains responsibility for the creation or development of information provided through the internet (no immunity) 25

Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Doe v. Sexsearch.com, 502 F.Supp.2d 719 (ND OH 2007) Website simultaneously acts as interactive computer service and information content provider Critical issue whether site was acting as information provider on information plaintiff claims is false Barnes v. Yahoo! Inc., 570 F.3d 1096 (9 th Cir. 2009) Plaintiff survives CDA immunity for claim against web site operator for defamatory content posted by third party Separate promise by Yahoo! employee to remove false profiles (act was a separate undertaking beyond publisher of profiles) DO NOT make a promise you cannot keep 26

Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Doctor s Associates v. QIP Holder LLC, 2010 U.S. Dist. LEXIS 14687 (D. Conn. Feb. 19, 2010) Quizno s v. Subway Video Contest MCW v. Badbusinessbureau.com, 2004 U.S.Dist. LEXIS 6678 (ND Tex April 14, 2004) Actively soliciting disparaging materials, defendant went beyond publisher s role and incurred responsibility for the information developed and created by consumers The CDA "does not require a court to determine only whether a party creates or develops the information at issue. Being responsible for the creation or development is sufficient." 27

Unauthorized Use of Company Web Forums Communications Decency Act (47 U.S.C. 230) Cases Scott P. v. Craigslist (Cal. Super. Ct. San Fran. Cty June 2, 2010) Nemet Chevrolet v. Consumeraffairs.com, 564 F.Supp.2d 544 (E.D. Va. 2008) Fair Housing Council of San Fernando Valley v. Roommates.com, LLC, 521 F.3d 1157 (9th Cir. 2008) Chicago Lawyers Committee for Civil Rights Under the Law, Inc. v. Craigslist, 519 F.3d 666 (7 th Cir. 2008). 28

Social Media Monitoring Interesting Links and Emerging Vendors Search engines to locate damaging content icerocket.com (searches blogs, Twitter, MySpace, news and images) Google.com/alerts (alerts for use of company names and brands on blogs, the Web, news, videos and discussion groups) technorati.com (searches blogs) TM.biz (free search to check brands registered as user names at top 500 social media sites) Vendors User Name Watching Content Watching in Major Forums 29

Social Media Monitoring Interesting Links and Emerging Vendors Vendors (Con t.) Attensity (http://www.attensity.com/); Attentio (http://attentio.com/); Cision (http://us.cision.com/media-monitoring/social-mediamonitoring.asp); Radian (http://www.radian6.com/) MarkMonitor, Thomson, Coresearch 30

Gina Durham DLA Piper LLP (US) (312) 368-7246 gina.durham@dlapiper.com