SlideShare a Scribd company logo
1 of 49
Ethics & Etiquette
Overview
• Transparency
• Fake Blogs & Ghost Blogging
• Astroturfing
• Netiquette
What Do You Need to Know?
• Transparency/Disclosure
• Be honest
• Get permission
• Think before you speak
• If someone shares your content, thank them
Ghost Blogging
• Paying someone to write blog posts
• Violation of transparency
• Once someone finds out, it shows that you (the company)
are disingenuous and makes people think you have
something to hide
• Example: Kanye West
• Blog posts kept getting published under his name when
he was in jail
• Difference between this and character blogs (Captain
Morgan)
Lying/Misrepresentation
• Lying
• Just because people may not be able to see who is on
the other side, social media has also been able to reveal
liars

• Misrepresentation
• Do not pretend to be someone you are not
• But does virtual reality sites like Second Life promote
this?
Scenario
Boss comes to you, the intern, and asks you to tweet for
him. Your boss is well-known in the industry with a
huge following. While at a large conference, he
wants to appear to be active, but doesn’t have time to
tweet himself. What do you do?
Scenario Solutions
• Multi-author
• Set reminder that team members may be tweeting
• Every so many number posts, reminder of team tweets
• If characters permit, add a hash tag to denote team post

• Learn his/her voice
Examples
Examples
Examples
Astroturfing
• Political, advertising, or public relations campaigns
that are formally planned by an organization, but
designed to mask its origins to create the impression
of being spontaneous, popular "grassroots" behavior.
Astroturfing: Example
• 2006
• Wal-Marting Across
America
• Jim & Laura
• Stories about their trips
around the U.S. in the RV
and staying in Wal-Mart
parking lots
Astroturfing: Example
• Turns out to be a fabrication/distorted view
• Funded by Wal-Mart & Edelman, public relations advisor
• Some form/sum of money was being sent to Jim & Laura to
say nice things

• Relevant info
• Same time controversies about low wages at Wal-Mart
• Wal-Mart accused of altering its Wikipedia entry in 2005 by
removing its wages being lower than min. wage (replace it
with they paid double min. wage)
Netiquette
• E-mail
•
•
•
•
•
•
•

Be brief
Clear subject line
Appropriate language
Proper signature
Ask permission to forward
Do not spam
Copyright laws

• Respect others Privacy
Best Practices: Twitter
•

Pick an appropriate photo of yourself

•

Private and company account? Be careful which you tweet too

•

Do not tweet during meetings or special events (unless asked or
encouraged too)

•

Do not overuse hash tags

•

Attempt to use proper grammar and avoid abbreviations

•

Use direct messages for private conversations

•

Use it for conversation, not venting (or when you are drunk)
Best Practices: How often?
• Some Guidelines
• Blog everyday or once per week – but remember, its not
all about selling, but providing valuable content
• Tweet as often as you want, but don’t get carried away
• Facebook status updates can be daily or a few times per
day
• If you are inspired by someone’s post, give them credit
by linking text or placing it at the end of the text
Future
• See a lot of employee handbooks that cover social
media
• Disclosure forms/interviews
References
• Tweeting Under False Circumstances
Legal Issues
“Internet today resembles the Old West of American history”
(Fertik and Thompson, 2010)
The Transparent Society
• David Brin book (1998)
• “Light is going to shine into nearly every corner of
our lives.”
• Brin’s focus was on surveillance technologies and his
call for a “reciprocal transparency” where
government was “Big Brother”
A Transparent Society
• Tapscott and Williams (2011) focus on social
media’s effect on privacy laws and regulations.
• “Privacy and data protection laws ensure that
organizations collect, use, retain and disclose our
personal information in a confidential manner. But
today the biggest threat is not other organizations, it’s
us.”

• Tapscott and Williams’ statement carried great
validity especially with the emergence of the Web
2.0 era.
YouTube
• To date, most legal issues revolve around YouTube
violating:
• defamation,
• privacy, or
• copyright law and the Digital Millennium Copyright
Act
• “strengthened the legal protection of intellectual property
rights in the wake of emerging new information
communication technologies, i.e., the Internet” (Indiana
University, 2009).
Comm Law Review (or Intro)
• Defamation
• Any intentional false communication, either written or
spoken, that harms a person's reputation; decreases the
respect, regard, or confidence in which a person is held;
or induces disparaging, hostile, or disagreeable opinions
or feelings against a person.
• Libel – written
• Slander – spoken

Legal Dictionary Online
Digital Millennium Copyright
Act (DMCA)
• Signed into law on October 28, 1998 by President
Clinton
• Made changes to US Copyright Act
• Penalizes copyright infringement on the Internet
• Criminalizes production and dissemination of
technology, devices, or services intended to
circumvent measures that control access to
copyrighted works
Wikipedia
Voluntary v. Involuntary
• Paradigm of openness
• Voluntary – providing information and participating
• Domino’s Case Study

• Involuntary – information becoming public, but not
by one’s choice
• Rathergate
So what happens when someone
discloses information or private
documents not intended to go public?
Wikileaks
•

Julian Assange, a transparency advocate, releasing confidential U.S.
foreign policy documents (involuntary transparency)

•

“Whether we like it or not, the new, involuntary transparency calls for
a new code of behavior, on dictated by the reality that we can never
assume we are alone or unwatched” (Bennis, Goleman, & O’Toole,
2008, p. 17-18).

•

An attempt to create a more open and transparent society in an effort
to drive greater ethical behavior among companies and government
with the belief that their efforts will bring more good than harm

•

These types of situations will force government and companies to
reassess their crisis communication plan to adopt policies and
strategies for dealing with instances where information about their
company may be leaked, and how they will respond to it in a timely
manner.
Legal Cases
• Dominick v. MySpace
• Corbett v. Twitter, Inc.
• La Russa v. Twitter, Inc.
• ONEOK v. Twitter, Inc.
Dominick v. MySpace
• May 12, 2008
• Location: Illinois
• Legal Claims: Defamation
• Larry Dominick, Town President of Cicero Illinois
• Filed a “Petition of Discovery” seeking the identity
of the MySpace user who had created two false
profiles of Dominick
Dominick v. MySpace
• Claiming “defamation, invasion of privacy, and related
torts arising from various statements on a social
networking website known as MySpace.”
• The petition continued: “These profiles falsely state that
they are profiles of the petitioner, falsely state that they
were created, posted, and published by the petitioner, and
include defamatory matter concerning the petitioner”
(Petition, 2008, 1).
• Although he provided no details to support his claim that
the statements about him were false, MySpace removed
the pages in question.
Dominick v. MySpace
• On June 4, 2008, the Electronic Freedom
Foundation (EFF) responded, arguing in an amicus
brief that the First Amendment protects anonymous
speech unless Dominick could demonstrate a viable
defamation claim
• Dominick withdrew his petition on June 13th without
stating his reasons for doing so
• EFF stated publically that Dominick failed to provide
specific allegations of defamation, or any proof that the
allegedly defamatory statements were false.
Corbett v. Twitter
• May 6, 2010
• Location: Pennsylvania
• Legal Claims: Other
• Tom Corbett, Pennsylvania Attorney General
• Requested an investigative grand jury to issue a subpoena
requesting Twitter respond by providing the identities of
two anonymous Twitter account users that had criticized
the Attorney General as he competed in the Republican
Primary for that party’s gubernatorial nomination
(Subpoena)
Corbett v. Twitter
• News reports indicated that the subpoenas may in
part be an attempt to unmask the authors of a blog
critical of Corbett (Citizen Media Law Project)
• Free speech advocates criticized Corbett as an abuse
of his official powers as attorney general to silence
critics through political retaliation
Corbett v. Twitter
• “Anonymous speech is a longstanding American right”
• Paul Alan Levy of the Public Citizen Litigation Group, a
Washington organization that has defended anonymous
commenters who have been sued by companies and
politicians

• “…any subpoena seeking to unmask the identity of
anonymous critics raises the specter of political
retaliation.”
• Witold Walczak, legal director for the A.C.L.U. of
Pennsylvania
Corbett v. Twitter
• The Attorney General withdrew the subpoena on
May 19, 2010
• Corbett offered no comment as to why the order had
withdrawn, responding only that the subpoena had
been part of a grand jury investigation and that he
could not offer comment beyond that
La Russa v. Twitter, Inc.
•

May 5, 2009

•

Location: California

•

Legal Claims: Cybersquatting; Right of Publicity; Trademark
Infringement; Trademark Dilution

•

Anthony (Tony) La Russa, manager of St. Louis Cardinals

•

Filed a complaint in the Superior Court of California against
Twitter, Inc., alleging that the defendant maintains a site
allegedly be owned by La Russa, containing his photograph
and written statements implied to have been made by the
plaintiff
La Russa v. Twitter, Inc.
• The statements are claimed to be highly derogatory,
suggesting alcohol abuse, and damaging to La
Russa’s reputation and his trademark rights
• The complaint contended that the domain name of
the site, and the use of the plaintiff ’s name dilute the
plaintiff ’s trademark, his name
• Creates the misleading impression that La Russa
authors the site
La Russa v. Twitter, Inc.
• In October 2009, the case was removed from the
Superior Court’s calendar, the media reporting
various conflicting terms of settlement
• PCWorld offered the following insights into the
weaknesses:
• First, La Russa should know that celebrity is going to
generate parody through imitation (similar to SNL)
• Twitter has an anti-imitation process for reporting and
removing attempts at impersonation, which La Russa did
not pursue
La Russa v. Twitter, Inc.
• Second, the same policy states that parody
impersonations are permissible if clearly labeled as
parody
• Third, online service providers are shielded from
responsibility for third-party expression
• Section 230 of the Communications Decency Act of 1996
prohibits a claim such as La Russas
ONEOK, Inc. v. Twitter
• September 15, 2009
• Location: Oklahoma
• Legal Claims: Trademark Infringement
• ONEOK Inc., a natural gas company in Oklahoma
• Filed suit against Twitter on counts of trademark
infringement and contributory infringement, alleging that
an anonymous user had created and employed an
imposter Twitter account using the name ONEOK and
the corporate trademark
ONEOK, Inc. v. Twitter
• Their complaint alleges that the imposter account had
tweeted corporate related information, which they held to
be potentially damaging to ONEOK’s public image in the
investor community and energy industry, and negatively
impact the company’s shareholders
• ONEOK sought to obtain the imposter’s identity and
contact information, and to have the ONEOK account
assigned to them
• Twitter refused to do so in both instances, at point which
ONEOK filed suit, seeking a permanent injunction
against further use of this account
ONEOK, Inc. v. Twitter
• The case was dropped by ONEOK, Inc., perhaps
following the removal of the site by Twitter.
• Issues such as this may be the motivation behind
Twitter’s decision to introduce “Verified Accounts”
• Celebrities, athletes, public officials, etc., can display
“verified account” status on their Twitter pages
• Allows those notables to distinguish their legitimate
sites from impersonators
What Do We Need to Know?
• Global computer-based technologies now ignore
traditional territorial boundaries and new boundaries
separated by usernames and passwords create the
boundaries of Cyberspace (Post & Johnson, 2006)
• New boundaries now threaten traditional laws
“There is no sheriff in town, and Internet
users have been left with rough frontier
justice” (Fertik & Johnson, 2010)
Online Regulation Today
• September 2009
• Texas enacted H.B. No. 2003, making it a third-degree
felony to impersonate individuals on social networking
websites “relating to the creation of the offense of online
harassment” (HB2003 Act)
• Also includes text messages:
• Section 33.07 states:
• “A person commits an offense if the person uses the name or
persona of another person to create a webpage on or to post
on or more messages on a commercial social networking site:
(1) without obtaining the other person’s consent; and (2) with
the intent to harm, defraud, intimidate, or threaten any
person”
Online Regulation Today
• January 1, 2011
• The state of California passed State Bill 1411, making it a
misdemeanor to impersonate another individual online
• “This bill would provide that any person who knowingly and
without consent credibly impersonates another actual person
through or on an Internet Web site or by other electronic
means, as specified, for purposes of harming, intimidating,
threatening, or defrauding another person is guilty of a
misdemeanor. The bill would, in addition to the specified
criminal penalties, authorize a person who suffers damage or
loss to bring a civil action against any person who violates
that provision, as specified.”
Online Regulation Raises
Questions
• Anonymous speech
• Parody and satire
• Commercial speech and trademark dilution
• Back to boarders, what happens when the violator is
not from the state of Texas or California?
Want to Learn More?
• Larry Lessig, Harvard Law Professor
• Code as Law
• American Bar Association Convention Keynote
References
Amicus Brief, Larry Dominick v. MySpace, Inc., Electronic Freedom Foundation, Circuit Court of Cook County,
Illinois County Department Law Division. June 4, 2008.
Bennis, W., Goleman, D., & O’Toole, J. (2008). Transparency: How Leaders Create a Culture of Candor. San Francisco, CA:
Jossey-Bass.
Brin, D. (1998). The transparent society: will technology force us to choose between privacy and freedom. Reading, MA: AddisonWesley.
Fertik, M., & Thompson, D. (2010). Wild west 2.0: how to protect and restore your online reputation on the untamed social
frontier. New York, NY: American Management Association.
Indiana University. (2009, July 20). What is the digital millennium copyright act?. Retrieved from
http://kb.iu.edu/data/alik.html 
Johnson, D. & Post, D. (1996). Law and borders--The rise of law in cyberspace. Stanford Law Review, May, pp. 1-20.
Tapscott, D., & Williams, A. D. (2011, January 1). Social media's unexpected threat [Web log message]. Retrieved from
http://www.theglobeandmail.com/report-on-business/commentary/don-tapscott/social-medias-unexpectedthreat/article1854656/

More Related Content

What's hot

Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet ageCliff Landis
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...Scott Mills
 
Technology - Elizah
Technology - Elizah Technology - Elizah
Technology - Elizah Marq2014
 
Networked Communication Part 1
Networked Communication Part 1Networked Communication Part 1
Networked Communication Part 1primeteacher32
 
Research Paper
Research PaperResearch Paper
Research Papermdhughley
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracySarah Uthoff
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad ideaPJG123
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarismHumanities10
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarismHumanities10
 
Managing your digital footprint
Managing your digital footprint  Managing your digital footprint
Managing your digital footprint Scott Hibberson
 
Hackers are people too
Hackers are people tooHackers are people too
Hackers are people tooAmanda Berlin
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Ryland Sherman
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InLegal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InCarol Spencer
 

What's hot (20)

Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet age
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
 
Harassment Investigations
Harassment InvestigationsHarassment Investigations
Harassment Investigations
 
Technology - Elizah
Technology - Elizah Technology - Elizah
Technology - Elizah
 
Networked Communication Part 1
Networked Communication Part 1Networked Communication Part 1
Networked Communication Part 1
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information Literacy
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad idea
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarism
 
Lloyd brown plagiarism
Lloyd brown plagiarismLloyd brown plagiarism
Lloyd brown plagiarism
 
Managing your digital footprint
Managing your digital footprint  Managing your digital footprint
Managing your digital footprint
 
Hackers are people too
Hackers are people tooHackers are people too
Hackers are people too
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InLegal Issues in the Gov't Social Media World: The Dangers of Diving Right In
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right In
 
Censorship
CensorshipCensorship
Censorship
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 

Similar to Ethics & Etiquette Online

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Martin Hirst
 
Social Media News Revolution 2014
Social Media News Revolution 2014Social Media News Revolution 2014
Social Media News Revolution 2014Sue Robinson
 
COM 101 Chapter 16
COM 101 Chapter 16COM 101 Chapter 16
COM 101 Chapter 16Val Bello
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal InvestigationsIan Tausig
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)Ian Tausig
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Seven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskSeven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskRyan Garcia
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United StatesFrederick Lane
 
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 SlideshowNewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 SlideshowDr. William J. Ward
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy EditorsCubReporters.org
 
10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)Damian Radcliffe
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open GovernmentMsifry
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseGateHouseMedia
 

Similar to Ethics & Etiquette Online (20)

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Blogging Law
Blogging LawBlogging Law
Blogging Law
 
Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?
 
Social Media News Revolution 2014
Social Media News Revolution 2014Social Media News Revolution 2014
Social Media News Revolution 2014
 
COM 101 Chapter 16
COM 101 Chapter 16COM 101 Chapter 16
COM 101 Chapter 16
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal Investigations
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Seven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskSeven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal Risk
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Press Law
Press LawPress Law
Press Law
 
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 SlideshowNewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
NewhouseSU COM 107 Communications and Society #NH1074Ward - Ch. 15 Slideshow
 
Journalism law
Journalism lawJournalism law
Journalism law
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy Editors
 
10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)10 things you need to know this week (w/c 14th May 2018)
10 things you need to know this week (w/c 14th May 2018)
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouse
 

More from Douglas Strahler

#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your IdentityDouglas Strahler
 
2016 Summer of Social Media
2016 Summer of Social Media2016 Summer of Social Media
2016 Summer of Social MediaDouglas Strahler
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDouglas Strahler
 
Extending the Classroom and Learning through Twitter
Extending the Classroom and Learning through TwitterExtending the Classroom and Learning through Twitter
Extending the Classroom and Learning through TwitterDouglas Strahler
 
Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...Douglas Strahler
 
Social Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your IdentitySocial Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your IdentityDouglas Strahler
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDouglas Strahler
 
Social U: Social Media in Higher Ed
Social U: Social Media in Higher EdSocial U: Social Media in Higher Ed
Social U: Social Media in Higher EdDouglas Strahler
 
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...Douglas Strahler
 
Microblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning OpportunitiesMicroblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning OpportunitiesDouglas Strahler
 
Assistive Technology & Ethics
Assistive Technology & EthicsAssistive Technology & Ethics
Assistive Technology & EthicsDouglas Strahler
 
Social Justice: Culture & Poverty
Social Justice: Culture & PovertySocial Justice: Culture & Poverty
Social Justice: Culture & PovertyDouglas Strahler
 
Culture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice OrganizationsCulture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice OrganizationsDouglas Strahler
 
The Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically SpecificThe Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically SpecificDouglas Strahler
 
The Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective PracticesThe Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective PracticesDouglas Strahler
 
Web 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich ClassroomWeb 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich ClassroomDouglas Strahler
 
Adobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 BasicsAdobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 BasicsDouglas Strahler
 
Twitter & Distance Learning
Twitter & Distance LearningTwitter & Distance Learning
Twitter & Distance LearningDouglas Strahler
 

More from Douglas Strahler (19)

#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity
 
2016 Summer of Social Media
2016 Summer of Social Media2016 Summer of Social Media
2016 Summer of Social Media
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital Narrative
 
Extending the Classroom and Learning through Twitter
Extending the Classroom and Learning through TwitterExtending the Classroom and Learning through Twitter
Extending the Classroom and Learning through Twitter
 
Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...Educators' Perceptions of Twitter for Educational Technology Professional Dev...
Educators' Perceptions of Twitter for Educational Technology Professional Dev...
 
Social Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your IdentitySocial Media U: The Role of Social Media and your Identity
Social Media U: The Role of Social Media and your Identity
 
Digital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital NarrativeDigital Portfolios: Your Digital Narrative
Digital Portfolios: Your Digital Narrative
 
Social U: Social Media in Higher Ed
Social U: Social Media in Higher EdSocial U: Social Media in Higher Ed
Social U: Social Media in Higher Ed
 
Hypothetical IMC Degree
Hypothetical IMC DegreeHypothetical IMC Degree
Hypothetical IMC Degree
 
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
Technology Leaders Wanted: Acknowledging the Leadership Role of a Technology ...
 
Microblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning OpportunitiesMicroblogs in Higher Education: Enhancing Collaborative Learning Opportunities
Microblogs in Higher Education: Enhancing Collaborative Learning Opportunities
 
Assistive Technology & Ethics
Assistive Technology & EthicsAssistive Technology & Ethics
Assistive Technology & Ethics
 
Social Justice: Culture & Poverty
Social Justice: Culture & PovertySocial Justice: Culture & Poverty
Social Justice: Culture & Poverty
 
Culture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice OrganizationsCulture, Poverty, and Social Justice Organizations
Culture, Poverty, and Social Justice Organizations
 
The Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically SpecificThe Fourth Strand of Social Justice: Theoretically Specific
The Fourth Strand of Social Justice: Theoretically Specific
 
The Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective PracticesThe Teaching Portfolio: Best Reflective Practices
The Teaching Portfolio: Best Reflective Practices
 
Web 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich ClassroomWeb 2.0 & Active Learning: Creating a Digital-Rich Classroom
Web 2.0 & Active Learning: Creating a Digital-Rich Classroom
 
Adobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 BasicsAdobe Dreamweaver CS5 Basics
Adobe Dreamweaver CS5 Basics
 
Twitter & Distance Learning
Twitter & Distance LearningTwitter & Distance Learning
Twitter & Distance Learning
 

Recently uploaded

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 

Recently uploaded (20)

Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 

Ethics & Etiquette Online

  • 2. Overview • Transparency • Fake Blogs & Ghost Blogging • Astroturfing • Netiquette
  • 3. What Do You Need to Know? • Transparency/Disclosure • Be honest • Get permission • Think before you speak • If someone shares your content, thank them
  • 4. Ghost Blogging • Paying someone to write blog posts • Violation of transparency • Once someone finds out, it shows that you (the company) are disingenuous and makes people think you have something to hide • Example: Kanye West • Blog posts kept getting published under his name when he was in jail • Difference between this and character blogs (Captain Morgan)
  • 5. Lying/Misrepresentation • Lying • Just because people may not be able to see who is on the other side, social media has also been able to reveal liars • Misrepresentation • Do not pretend to be someone you are not • But does virtual reality sites like Second Life promote this?
  • 6. Scenario Boss comes to you, the intern, and asks you to tweet for him. Your boss is well-known in the industry with a huge following. While at a large conference, he wants to appear to be active, but doesn’t have time to tweet himself. What do you do?
  • 7. Scenario Solutions • Multi-author • Set reminder that team members may be tweeting • Every so many number posts, reminder of team tweets • If characters permit, add a hash tag to denote team post • Learn his/her voice
  • 11. Astroturfing • Political, advertising, or public relations campaigns that are formally planned by an organization, but designed to mask its origins to create the impression of being spontaneous, popular "grassroots" behavior.
  • 12. Astroturfing: Example • 2006 • Wal-Marting Across America • Jim & Laura • Stories about their trips around the U.S. in the RV and staying in Wal-Mart parking lots
  • 13. Astroturfing: Example • Turns out to be a fabrication/distorted view • Funded by Wal-Mart & Edelman, public relations advisor • Some form/sum of money was being sent to Jim & Laura to say nice things • Relevant info • Same time controversies about low wages at Wal-Mart • Wal-Mart accused of altering its Wikipedia entry in 2005 by removing its wages being lower than min. wage (replace it with they paid double min. wage)
  • 14. Netiquette • E-mail • • • • • • • Be brief Clear subject line Appropriate language Proper signature Ask permission to forward Do not spam Copyright laws • Respect others Privacy
  • 15. Best Practices: Twitter • Pick an appropriate photo of yourself • Private and company account? Be careful which you tweet too • Do not tweet during meetings or special events (unless asked or encouraged too) • Do not overuse hash tags • Attempt to use proper grammar and avoid abbreviations • Use direct messages for private conversations • Use it for conversation, not venting (or when you are drunk)
  • 16. Best Practices: How often? • Some Guidelines • Blog everyday or once per week – but remember, its not all about selling, but providing valuable content • Tweet as often as you want, but don’t get carried away • Facebook status updates can be daily or a few times per day • If you are inspired by someone’s post, give them credit by linking text or placing it at the end of the text
  • 17. Future • See a lot of employee handbooks that cover social media • Disclosure forms/interviews
  • 18. References • Tweeting Under False Circumstances
  • 19. Legal Issues “Internet today resembles the Old West of American history” (Fertik and Thompson, 2010)
  • 20. The Transparent Society • David Brin book (1998) • “Light is going to shine into nearly every corner of our lives.” • Brin’s focus was on surveillance technologies and his call for a “reciprocal transparency” where government was “Big Brother”
  • 21. A Transparent Society • Tapscott and Williams (2011) focus on social media’s effect on privacy laws and regulations. • “Privacy and data protection laws ensure that organizations collect, use, retain and disclose our personal information in a confidential manner. But today the biggest threat is not other organizations, it’s us.” • Tapscott and Williams’ statement carried great validity especially with the emergence of the Web 2.0 era.
  • 22. YouTube • To date, most legal issues revolve around YouTube violating: • defamation, • privacy, or • copyright law and the Digital Millennium Copyright Act • “strengthened the legal protection of intellectual property rights in the wake of emerging new information communication technologies, i.e., the Internet” (Indiana University, 2009).
  • 23. Comm Law Review (or Intro) • Defamation • Any intentional false communication, either written or spoken, that harms a person's reputation; decreases the respect, regard, or confidence in which a person is held; or induces disparaging, hostile, or disagreeable opinions or feelings against a person. • Libel – written • Slander – spoken Legal Dictionary Online
  • 24. Digital Millennium Copyright Act (DMCA) • Signed into law on October 28, 1998 by President Clinton • Made changes to US Copyright Act • Penalizes copyright infringement on the Internet • Criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works Wikipedia
  • 25. Voluntary v. Involuntary • Paradigm of openness • Voluntary – providing information and participating • Domino’s Case Study • Involuntary – information becoming public, but not by one’s choice • Rathergate
  • 26. So what happens when someone discloses information or private documents not intended to go public?
  • 27. Wikileaks • Julian Assange, a transparency advocate, releasing confidential U.S. foreign policy documents (involuntary transparency) • “Whether we like it or not, the new, involuntary transparency calls for a new code of behavior, on dictated by the reality that we can never assume we are alone or unwatched” (Bennis, Goleman, & O’Toole, 2008, p. 17-18). • An attempt to create a more open and transparent society in an effort to drive greater ethical behavior among companies and government with the belief that their efforts will bring more good than harm • These types of situations will force government and companies to reassess their crisis communication plan to adopt policies and strategies for dealing with instances where information about their company may be leaked, and how they will respond to it in a timely manner.
  • 28. Legal Cases • Dominick v. MySpace • Corbett v. Twitter, Inc. • La Russa v. Twitter, Inc. • ONEOK v. Twitter, Inc.
  • 29. Dominick v. MySpace • May 12, 2008 • Location: Illinois • Legal Claims: Defamation • Larry Dominick, Town President of Cicero Illinois • Filed a “Petition of Discovery” seeking the identity of the MySpace user who had created two false profiles of Dominick
  • 30. Dominick v. MySpace • Claiming “defamation, invasion of privacy, and related torts arising from various statements on a social networking website known as MySpace.” • The petition continued: “These profiles falsely state that they are profiles of the petitioner, falsely state that they were created, posted, and published by the petitioner, and include defamatory matter concerning the petitioner” (Petition, 2008, 1). • Although he provided no details to support his claim that the statements about him were false, MySpace removed the pages in question.
  • 31. Dominick v. MySpace • On June 4, 2008, the Electronic Freedom Foundation (EFF) responded, arguing in an amicus brief that the First Amendment protects anonymous speech unless Dominick could demonstrate a viable defamation claim • Dominick withdrew his petition on June 13th without stating his reasons for doing so • EFF stated publically that Dominick failed to provide specific allegations of defamation, or any proof that the allegedly defamatory statements were false.
  • 32. Corbett v. Twitter • May 6, 2010 • Location: Pennsylvania • Legal Claims: Other • Tom Corbett, Pennsylvania Attorney General • Requested an investigative grand jury to issue a subpoena requesting Twitter respond by providing the identities of two anonymous Twitter account users that had criticized the Attorney General as he competed in the Republican Primary for that party’s gubernatorial nomination (Subpoena)
  • 33. Corbett v. Twitter • News reports indicated that the subpoenas may in part be an attempt to unmask the authors of a blog critical of Corbett (Citizen Media Law Project) • Free speech advocates criticized Corbett as an abuse of his official powers as attorney general to silence critics through political retaliation
  • 34. Corbett v. Twitter • “Anonymous speech is a longstanding American right” • Paul Alan Levy of the Public Citizen Litigation Group, a Washington organization that has defended anonymous commenters who have been sued by companies and politicians • “…any subpoena seeking to unmask the identity of anonymous critics raises the specter of political retaliation.” • Witold Walczak, legal director for the A.C.L.U. of Pennsylvania
  • 35. Corbett v. Twitter • The Attorney General withdrew the subpoena on May 19, 2010 • Corbett offered no comment as to why the order had withdrawn, responding only that the subpoena had been part of a grand jury investigation and that he could not offer comment beyond that
  • 36. La Russa v. Twitter, Inc. • May 5, 2009 • Location: California • Legal Claims: Cybersquatting; Right of Publicity; Trademark Infringement; Trademark Dilution • Anthony (Tony) La Russa, manager of St. Louis Cardinals • Filed a complaint in the Superior Court of California against Twitter, Inc., alleging that the defendant maintains a site allegedly be owned by La Russa, containing his photograph and written statements implied to have been made by the plaintiff
  • 37. La Russa v. Twitter, Inc. • The statements are claimed to be highly derogatory, suggesting alcohol abuse, and damaging to La Russa’s reputation and his trademark rights • The complaint contended that the domain name of the site, and the use of the plaintiff ’s name dilute the plaintiff ’s trademark, his name • Creates the misleading impression that La Russa authors the site
  • 38. La Russa v. Twitter, Inc. • In October 2009, the case was removed from the Superior Court’s calendar, the media reporting various conflicting terms of settlement • PCWorld offered the following insights into the weaknesses: • First, La Russa should know that celebrity is going to generate parody through imitation (similar to SNL) • Twitter has an anti-imitation process for reporting and removing attempts at impersonation, which La Russa did not pursue
  • 39. La Russa v. Twitter, Inc. • Second, the same policy states that parody impersonations are permissible if clearly labeled as parody • Third, online service providers are shielded from responsibility for third-party expression • Section 230 of the Communications Decency Act of 1996 prohibits a claim such as La Russas
  • 40. ONEOK, Inc. v. Twitter • September 15, 2009 • Location: Oklahoma • Legal Claims: Trademark Infringement • ONEOK Inc., a natural gas company in Oklahoma • Filed suit against Twitter on counts of trademark infringement and contributory infringement, alleging that an anonymous user had created and employed an imposter Twitter account using the name ONEOK and the corporate trademark
  • 41. ONEOK, Inc. v. Twitter • Their complaint alleges that the imposter account had tweeted corporate related information, which they held to be potentially damaging to ONEOK’s public image in the investor community and energy industry, and negatively impact the company’s shareholders • ONEOK sought to obtain the imposter’s identity and contact information, and to have the ONEOK account assigned to them • Twitter refused to do so in both instances, at point which ONEOK filed suit, seeking a permanent injunction against further use of this account
  • 42. ONEOK, Inc. v. Twitter • The case was dropped by ONEOK, Inc., perhaps following the removal of the site by Twitter. • Issues such as this may be the motivation behind Twitter’s decision to introduce “Verified Accounts” • Celebrities, athletes, public officials, etc., can display “verified account” status on their Twitter pages • Allows those notables to distinguish their legitimate sites from impersonators
  • 43. What Do We Need to Know? • Global computer-based technologies now ignore traditional territorial boundaries and new boundaries separated by usernames and passwords create the boundaries of Cyberspace (Post & Johnson, 2006) • New boundaries now threaten traditional laws
  • 44. “There is no sheriff in town, and Internet users have been left with rough frontier justice” (Fertik & Johnson, 2010)
  • 45. Online Regulation Today • September 2009 • Texas enacted H.B. No. 2003, making it a third-degree felony to impersonate individuals on social networking websites “relating to the creation of the offense of online harassment” (HB2003 Act) • Also includes text messages: • Section 33.07 states: • “A person commits an offense if the person uses the name or persona of another person to create a webpage on or to post on or more messages on a commercial social networking site: (1) without obtaining the other person’s consent; and (2) with the intent to harm, defraud, intimidate, or threaten any person”
  • 46. Online Regulation Today • January 1, 2011 • The state of California passed State Bill 1411, making it a misdemeanor to impersonate another individual online • “This bill would provide that any person who knowingly and without consent credibly impersonates another actual person through or on an Internet Web site or by other electronic means, as specified, for purposes of harming, intimidating, threatening, or defrauding another person is guilty of a misdemeanor. The bill would, in addition to the specified criminal penalties, authorize a person who suffers damage or loss to bring a civil action against any person who violates that provision, as specified.”
  • 47. Online Regulation Raises Questions • Anonymous speech • Parody and satire • Commercial speech and trademark dilution • Back to boarders, what happens when the violator is not from the state of Texas or California?
  • 48. Want to Learn More? • Larry Lessig, Harvard Law Professor • Code as Law • American Bar Association Convention Keynote
  • 49. References Amicus Brief, Larry Dominick v. MySpace, Inc., Electronic Freedom Foundation, Circuit Court of Cook County, Illinois County Department Law Division. June 4, 2008. Bennis, W., Goleman, D., & O’Toole, J. (2008). Transparency: How Leaders Create a Culture of Candor. San Francisco, CA: Jossey-Bass. Brin, D. (1998). The transparent society: will technology force us to choose between privacy and freedom. Reading, MA: AddisonWesley. Fertik, M., & Thompson, D. (2010). Wild west 2.0: how to protect and restore your online reputation on the untamed social frontier. New York, NY: American Management Association. Indiana University. (2009, July 20). What is the digital millennium copyright act?. Retrieved from http://kb.iu.edu/data/alik.html  Johnson, D. & Post, D. (1996). Law and borders--The rise of law in cyberspace. Stanford Law Review, May, pp. 1-20. Tapscott, D., & Williams, A. D. (2011, January 1). Social media's unexpected threat [Web log message]. Retrieved from http://www.theglobeandmail.com/report-on-business/commentary/don-tapscott/social-medias-unexpectedthreat/article1854656/