SlideShare a Scribd company logo
1 of 16
Technology and the Law Stacy Robin, The Degania Group
Technology and the Law….or How you can get into a lot of trouble  without even trying How do you identify your risk? What are key areas of growing legal concern? How do you stay current?
Identifying Risk: Your Current State What policies and procedures do you have in place? In what areas might you be exposed? Did you write your own policies? Did you plagiarize someone else’s policy? Do you have an attorney? Does that attorney have a specialty in technology? When did you last have your company reviewed and your policies updated? Are you comfortable with your current risk?
Employees and Technology Computers Employee surveillance Data  Monitoring Discovery Privacy Social media
Employer Technology for Employee Use Need definition Employment Contract Employee Handbook Signed Understanding I don’t have employees.  I have contractors!  Do they use your technology? Are guidelines in your contract? Does a company have the right to the data on an employee’s work computer?
Recent cases 2010: Steingartv. Loving Care Agency, Inc. (NJ) 2011: Holmes v. Petrovich Development Company, LLC (CA) At issue: Use of company computers Monitoring/storing user data (emails) Company policy Client-Attorney privilege  What should you learn from these cases?
Using Technology to Monitor Employees Why? Are you violating privacy?  Did you: Intrude upon seclusion Appropriate an employee’s likeness for commercial purposes Publish of private employee matters Disclose medical records  Limit to visual images
Social Media Assume posts are not private; can be used as evidence Industry regulations Hiring practices: protected classes Potential conflict: “Views are strictly my own” NLRB: Employee protection Complaints about working conditions; especially those that affect co-workers as well what an employee Employees organizing (unions) Company protection What an employee accesses at work What an employee is allowed to post about proprietary company (or client) information  CFAA:Is it criminal to access social media sites?
Data and E-Discovery E-discovery refers to "electronically stored information” (ESI) Emails, electronic documents, social media, all online activity  It does not matter how brief the storage period Federal Rules: term was "intended to be read expansively to include all current and future electronic storage mediums” “Clouds”  Social networking sites How do you stay in compliance? Stay informed: general best practices, industry policies Update company retention policies as appropriate Use verified/audited vendors to back up data  Consider holding period, access, ownership of data, security1 1http://www.socialmedialawupdate.com/2011/01/articles/ediscovery/ediscovery-rules-applied-to-social-media-what-this-means-in-practical-terms-for-businesses/
E-Discovery: Making it complicated Federal vs. state laws Many states have adopted a statute/rules governing e-discovery statute Differing standards across states - document preservation, production of electronically stored information Conflict: companies must dispose of certain records Data privacy laws Failing to comply with e-discovery rules is a serious offense Study of 401 cases prior to 2010; more than half received sanctions1 Sanctions included Case dismissals Adverse jury instructions Large monetary sanctions 1http://www.socialmedialawupdate.com/2011/01/articles/ediscovery/ediscovery-rules-applied-to-social-media-what-this-means-in-practical-terms-for-businesses/ and http://www.abajournal.com/files/DukeLaw.pdf
Online Sites ,[object Object]
Defamatory Content and False Statements
COPPA
Promotions and Sweepstakes
Content (Intellectual Property),[object Object]
CAN-SPAM: What is it? Protects consumers from unwanted solicitations All messages with promotion as a primary purpose Not limited to unsolicited messages No exception for emails to recipients with whom sender has a pre-existing relationship Additional application: Facebook, MySpace, Twitter Act has a broad definition of an email address Facebook, Inc. v. MaxBounty, Inc. Penalties (listed on FTC site) Each separate email in violation: up to $16,000 More than one person may be held responsible for violations. Aggravated violations: additional fines, criminal penalties – including imprisonment

More Related Content

What's hot

Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyIAB Canada
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to KnowHIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to KnowNetwork 1 Consulting
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protectionMRS
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStart Pad
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceTodd Merrill
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...Kelly Hart & Hallman LLP
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesThomas Benjamin Huggett
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacymkeane
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 

What's hot (20)

Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your Company
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to KnowHIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer Responses
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber Attack
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 

Viewers also liked

What is the cloud marvin korves - chicago tour
What is the cloud   marvin korves - chicago tourWhat is the cloud   marvin korves - chicago tour
What is the cloud marvin korves - chicago tourRamon Ray
 
Focus ramon ray - top five technologies
Focus   ramon ray - top five technologiesFocus   ramon ray - top five technologies
Focus ramon ray - top five technologiesRamon Ray
 
Wendi caplan carroll of constant contact - engagement marketing - small biz s...
Wendi caplan carroll of constant contact - engagement marketing - small biz s...Wendi caplan carroll of constant contact - engagement marketing - small biz s...
Wendi caplan carroll of constant contact - engagement marketing - small biz s...Ramon Ray
 
Analytics alex chang - tour 2011 (2)
Analytics   alex chang  - tour 2011 (2)Analytics   alex chang  - tour 2011 (2)
Analytics alex chang - tour 2011 (2)Ramon Ray
 
The power of content - John Colder ICE Lawson - Atlanta Tour
The power of content - John Colder ICE Lawson - Atlanta TourThe power of content - John Colder ICE Lawson - Atlanta Tour
The power of content - John Colder ICE Lawson - Atlanta TourRamon Ray
 
Pat keating cloud services cs intro
Pat keating cloud services cs introPat keating cloud services cs intro
Pat keating cloud services cs introRamon Ray
 
Donna Wells (Mindflash) Small Biz Tech Tour PPT
Donna Wells (Mindflash) Small Biz Tech Tour PPTDonna Wells (Mindflash) Small Biz Tech Tour PPT
Donna Wells (Mindflash) Small Biz Tech Tour PPTRamon Ray
 
Denise terry social media for growing businesses - small biz big things 2012
Denise terry   social media for growing businesses - small biz big things 2012Denise terry   social media for growing businesses - small biz big things 2012
Denise terry social media for growing businesses - small biz big things 2012Ramon Ray
 
The responsive web jennifer shaheen
The responsive web   jennifer shaheenThe responsive web   jennifer shaheen
The responsive web jennifer shaheenRamon Ray
 
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16KC Digital Drive
 
Technology and Law
Technology and LawTechnology and Law
Technology and Lawcs404ta
 
Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)
Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)
Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)Ramon Ray
 
Tim burke cloud small biztechpresofinal
Tim burke   cloud small biztechpresofinalTim burke   cloud small biztechpresofinal
Tim burke cloud small biztechpresofinalRamon Ray
 
Lifecycle Marketing: Challenges and Success
Lifecycle Marketing: Challenges and SuccessLifecycle Marketing: Challenges and Success
Lifecycle Marketing: Challenges and SuccessRamon Ray
 
Kristy presentation small-biztech_boston
Kristy presentation small-biztech_bostonKristy presentation small-biztech_boston
Kristy presentation small-biztech_bostonRamon Ray
 
Andy Steuer - MarchEngines - Local Marketing
Andy Steuer - MarchEngines - Local MarketingAndy Steuer - MarchEngines - Local Marketing
Andy Steuer - MarchEngines - Local MarketingRamon Ray
 
John colderice lawson sales and customer influence - small biz summit 2012
John colderice lawson   sales and customer influence - small biz summit 2012John colderice lawson   sales and customer influence - small biz summit 2012
John colderice lawson sales and customer influence - small biz summit 2012Ramon Ray
 
Personal Brand Building
Personal Brand BuildingPersonal Brand Building
Personal Brand BuildingRamon Ray
 
Six strategies for technology success 14-feb-2011-vertical-response
Six strategies for technology success 14-feb-2011-vertical-responseSix strategies for technology success 14-feb-2011-vertical-response
Six strategies for technology success 14-feb-2011-vertical-responseRamon Ray
 
Technology & The Law
Technology & The LawTechnology & The Law
Technology & The Law34734
 

Viewers also liked (20)

What is the cloud marvin korves - chicago tour
What is the cloud   marvin korves - chicago tourWhat is the cloud   marvin korves - chicago tour
What is the cloud marvin korves - chicago tour
 
Focus ramon ray - top five technologies
Focus   ramon ray - top five technologiesFocus   ramon ray - top five technologies
Focus ramon ray - top five technologies
 
Wendi caplan carroll of constant contact - engagement marketing - small biz s...
Wendi caplan carroll of constant contact - engagement marketing - small biz s...Wendi caplan carroll of constant contact - engagement marketing - small biz s...
Wendi caplan carroll of constant contact - engagement marketing - small biz s...
 
Analytics alex chang - tour 2011 (2)
Analytics   alex chang  - tour 2011 (2)Analytics   alex chang  - tour 2011 (2)
Analytics alex chang - tour 2011 (2)
 
The power of content - John Colder ICE Lawson - Atlanta Tour
The power of content - John Colder ICE Lawson - Atlanta TourThe power of content - John Colder ICE Lawson - Atlanta Tour
The power of content - John Colder ICE Lawson - Atlanta Tour
 
Pat keating cloud services cs intro
Pat keating cloud services cs introPat keating cloud services cs intro
Pat keating cloud services cs intro
 
Donna Wells (Mindflash) Small Biz Tech Tour PPT
Donna Wells (Mindflash) Small Biz Tech Tour PPTDonna Wells (Mindflash) Small Biz Tech Tour PPT
Donna Wells (Mindflash) Small Biz Tech Tour PPT
 
Denise terry social media for growing businesses - small biz big things 2012
Denise terry   social media for growing businesses - small biz big things 2012Denise terry   social media for growing businesses - small biz big things 2012
Denise terry social media for growing businesses - small biz big things 2012
 
The responsive web jennifer shaheen
The responsive web   jennifer shaheenThe responsive web   jennifer shaheen
The responsive web jennifer shaheen
 
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
 
Technology and Law
Technology and LawTechnology and Law
Technology and Law
 
Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)
Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)
Social Media 101 and Deep Dive for Small Businesses (Kentucky SBDC)
 
Tim burke cloud small biztechpresofinal
Tim burke   cloud small biztechpresofinalTim burke   cloud small biztechpresofinal
Tim burke cloud small biztechpresofinal
 
Lifecycle Marketing: Challenges and Success
Lifecycle Marketing: Challenges and SuccessLifecycle Marketing: Challenges and Success
Lifecycle Marketing: Challenges and Success
 
Kristy presentation small-biztech_boston
Kristy presentation small-biztech_bostonKristy presentation small-biztech_boston
Kristy presentation small-biztech_boston
 
Andy Steuer - MarchEngines - Local Marketing
Andy Steuer - MarchEngines - Local MarketingAndy Steuer - MarchEngines - Local Marketing
Andy Steuer - MarchEngines - Local Marketing
 
John colderice lawson sales and customer influence - small biz summit 2012
John colderice lawson   sales and customer influence - small biz summit 2012John colderice lawson   sales and customer influence - small biz summit 2012
John colderice lawson sales and customer influence - small biz summit 2012
 
Personal Brand Building
Personal Brand BuildingPersonal Brand Building
Personal Brand Building
 
Six strategies for technology success 14-feb-2011-vertical-response
Six strategies for technology success 14-feb-2011-vertical-responseSix strategies for technology success 14-feb-2011-vertical-response
Six strategies for technology success 14-feb-2011-vertical-response
 
Technology & The Law
Technology & The LawTechnology & The Law
Technology & The Law
 

Similar to Stacy Robin - The Degania Group - Technology and the Law

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxdonnajames55
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Dave Shannon
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and BeyondAlexNemiroff
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketinggaurav jain
 
Linkedin policy primer
Linkedin policy primerLinkedin policy primer
Linkedin policy primerAnna Dobos
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)hassan777898
 
Autonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic WebAutonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic WebPaul Bernal
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app- Mark - Fullbright
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical mallisonshavon
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
Enterprise toronto nov 2011 - marketing in web2-0 world
Enterprise toronto   nov 2011 - marketing in web2-0 worldEnterprise toronto   nov 2011 - marketing in web2-0 world
Enterprise toronto nov 2011 - marketing in web2-0 worldCognition LLP
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 

Similar to Stacy Robin - The Degania Group - Technology and the Law (20)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Linkedin policy primer
Linkedin policy primerLinkedin policy primer
Linkedin policy primer
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Autonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic WebAutonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic Web
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Enterprise toronto nov 2011 - marketing in web2-0 world
Enterprise toronto   nov 2011 - marketing in web2-0 worldEnterprise toronto   nov 2011 - marketing in web2-0 world
Enterprise toronto nov 2011 - marketing in web2-0 world
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 

More from Ramon Ray

Life Is Your Journey - 23 Rules for Success in Career and Life
Life Is Your Journey - 23 Rules for Success in Career and LifeLife Is Your Journey - 23 Rules for Success in Career and Life
Life Is Your Journey - 23 Rules for Success in Career and LifeRamon Ray
 
Attract, Sell, Wow - Date Your Leads and Marry Your Customers
Attract, Sell, Wow - Date Your Leads and Marry Your CustomersAttract, Sell, Wow - Date Your Leads and Marry Your Customers
Attract, Sell, Wow - Date Your Leads and Marry Your CustomersRamon Ray
 
Free Publicity: How To Get Media Coverage For Your Business
Free Publicity: How To Get Media Coverage For Your BusinessFree Publicity: How To Get Media Coverage For Your Business
Free Publicity: How To Get Media Coverage For Your BusinessRamon Ray
 
The New Digital Economy: 12 Rules To Thrive In The Uber Economy
The New Digital Economy: 12 Rules To Thrive In The Uber EconomyThe New Digital Economy: 12 Rules To Thrive In The Uber Economy
The New Digital Economy: 12 Rules To Thrive In The Uber EconomyRamon Ray
 
The Local Celebrity Entrepreneur: Build and Grow Your Person Brand
The Local Celebrity Entrepreneur: Build and Grow Your Person BrandThe Local Celebrity Entrepreneur: Build and Grow Your Person Brand
The Local Celebrity Entrepreneur: Build and Grow Your Person BrandRamon Ray
 
Technology and Your Business: 11 Rules for Success with Tech
Technology and Your Business: 11 Rules for Success with TechTechnology and Your Business: 11 Rules for Success with Tech
Technology and Your Business: 11 Rules for Success with TechRamon Ray
 
Attract, Sell, Wow - sales and marketing best practices for growing businesses
Attract, Sell, Wow - sales and marketing best practices for growing businessesAttract, Sell, Wow - sales and marketing best practices for growing businesses
Attract, Sell, Wow - sales and marketing best practices for growing businessesRamon Ray
 
The Local Celebrity Entreprenuer
The Local Celebrity EntreprenuerThe Local Celebrity Entreprenuer
The Local Celebrity EntreprenuerRamon Ray
 
Building Your Business - AT&T National Tour - Social Media and Technology
Building Your Business - AT&T National Tour - Social Media and TechnologyBuilding Your Business - AT&T National Tour - Social Media and Technology
Building Your Business - AT&T National Tour - Social Media and TechnologyRamon Ray
 
Social Content Marketing for Small Businesses
Social Content Marketing for Small BusinessesSocial Content Marketing for Small Businesses
Social Content Marketing for Small BusinessesRamon Ray
 
No New Customers. Capture Leads Instead!
No New Customers. Capture Leads Instead!No New Customers. Capture Leads Instead!
No New Customers. Capture Leads Instead!Ramon Ray
 
Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014
Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014
Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014Ramon Ray
 
Facebook for business 052113
Facebook for business   052113Facebook for business   052113
Facebook for business 052113Ramon Ray
 
Infusionsoft Lifecycle Marketing
Infusionsoft Lifecycle MarketingInfusionsoft Lifecycle Marketing
Infusionsoft Lifecycle MarketingRamon Ray
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small bizRamon Ray
 
Social media and and content marketing 101
Social media and and content marketing 101Social media and and content marketing 101
Social media and and content marketing 101Ramon Ray
 
11 rules for technology success
11 rules for technology success11 rules for technology success
11 rules for technology successRamon Ray
 
Technology 101 for small businesses
Technology 101 for small businessesTechnology 101 for small businesses
Technology 101 for small businessesRamon Ray
 
How To Succeed As An Engineer and Computing Major
How To Succeed As An Engineer and Computing MajorHow To Succeed As An Engineer and Computing Major
How To Succeed As An Engineer and Computing MajorRamon Ray
 

More from Ramon Ray (20)

Life Is Your Journey - 23 Rules for Success in Career and Life
Life Is Your Journey - 23 Rules for Success in Career and LifeLife Is Your Journey - 23 Rules for Success in Career and Life
Life Is Your Journey - 23 Rules for Success in Career and Life
 
Attract, Sell, Wow - Date Your Leads and Marry Your Customers
Attract, Sell, Wow - Date Your Leads and Marry Your CustomersAttract, Sell, Wow - Date Your Leads and Marry Your Customers
Attract, Sell, Wow - Date Your Leads and Marry Your Customers
 
Free Publicity: How To Get Media Coverage For Your Business
Free Publicity: How To Get Media Coverage For Your BusinessFree Publicity: How To Get Media Coverage For Your Business
Free Publicity: How To Get Media Coverage For Your Business
 
The New Digital Economy: 12 Rules To Thrive In The Uber Economy
The New Digital Economy: 12 Rules To Thrive In The Uber EconomyThe New Digital Economy: 12 Rules To Thrive In The Uber Economy
The New Digital Economy: 12 Rules To Thrive In The Uber Economy
 
The Local Celebrity Entrepreneur: Build and Grow Your Person Brand
The Local Celebrity Entrepreneur: Build and Grow Your Person BrandThe Local Celebrity Entrepreneur: Build and Grow Your Person Brand
The Local Celebrity Entrepreneur: Build and Grow Your Person Brand
 
Technology and Your Business: 11 Rules for Success with Tech
Technology and Your Business: 11 Rules for Success with TechTechnology and Your Business: 11 Rules for Success with Tech
Technology and Your Business: 11 Rules for Success with Tech
 
Attract, Sell, Wow - sales and marketing best practices for growing businesses
Attract, Sell, Wow - sales and marketing best practices for growing businessesAttract, Sell, Wow - sales and marketing best practices for growing businesses
Attract, Sell, Wow - sales and marketing best practices for growing businesses
 
The Local Celebrity Entreprenuer
The Local Celebrity EntreprenuerThe Local Celebrity Entreprenuer
The Local Celebrity Entreprenuer
 
Building Your Business - AT&T National Tour - Social Media and Technology
Building Your Business - AT&T National Tour - Social Media and TechnologyBuilding Your Business - AT&T National Tour - Social Media and Technology
Building Your Business - AT&T National Tour - Social Media and Technology
 
Social Content Marketing for Small Businesses
Social Content Marketing for Small BusinessesSocial Content Marketing for Small Businesses
Social Content Marketing for Small Businesses
 
No New Customers. Capture Leads Instead!
No New Customers. Capture Leads Instead!No New Customers. Capture Leads Instead!
No New Customers. Capture Leads Instead!
 
Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014
Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014
Lifecycle Marketing: Date Leads. Marry Customers - NEW 2014
 
Facebook for business 052113
Facebook for business   052113Facebook for business   052113
Facebook for business 052113
 
Infusionsoft Lifecycle Marketing
Infusionsoft Lifecycle MarketingInfusionsoft Lifecycle Marketing
Infusionsoft Lifecycle Marketing
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small biz
 
Social media and and content marketing 101
Social media and and content marketing 101Social media and and content marketing 101
Social media and and content marketing 101
 
11 rules for technology success
11 rules for technology success11 rules for technology success
11 rules for technology success
 
Technology 101 for small businesses
Technology 101 for small businessesTechnology 101 for small businesses
Technology 101 for small businesses
 
Tech 101
Tech 101Tech 101
Tech 101
 
How To Succeed As An Engineer and Computing Major
How To Succeed As An Engineer and Computing MajorHow To Succeed As An Engineer and Computing Major
How To Succeed As An Engineer and Computing Major
 

Stacy Robin - The Degania Group - Technology and the Law

  • 1. Technology and the Law Stacy Robin, The Degania Group
  • 2. Technology and the Law….or How you can get into a lot of trouble without even trying How do you identify your risk? What are key areas of growing legal concern? How do you stay current?
  • 3. Identifying Risk: Your Current State What policies and procedures do you have in place? In what areas might you be exposed? Did you write your own policies? Did you plagiarize someone else’s policy? Do you have an attorney? Does that attorney have a specialty in technology? When did you last have your company reviewed and your policies updated? Are you comfortable with your current risk?
  • 4. Employees and Technology Computers Employee surveillance Data Monitoring Discovery Privacy Social media
  • 5. Employer Technology for Employee Use Need definition Employment Contract Employee Handbook Signed Understanding I don’t have employees. I have contractors! Do they use your technology? Are guidelines in your contract? Does a company have the right to the data on an employee’s work computer?
  • 6. Recent cases 2010: Steingartv. Loving Care Agency, Inc. (NJ) 2011: Holmes v. Petrovich Development Company, LLC (CA) At issue: Use of company computers Monitoring/storing user data (emails) Company policy Client-Attorney privilege What should you learn from these cases?
  • 7. Using Technology to Monitor Employees Why? Are you violating privacy? Did you: Intrude upon seclusion Appropriate an employee’s likeness for commercial purposes Publish of private employee matters Disclose medical records Limit to visual images
  • 8. Social Media Assume posts are not private; can be used as evidence Industry regulations Hiring practices: protected classes Potential conflict: “Views are strictly my own” NLRB: Employee protection Complaints about working conditions; especially those that affect co-workers as well what an employee Employees organizing (unions) Company protection What an employee accesses at work What an employee is allowed to post about proprietary company (or client) information CFAA:Is it criminal to access social media sites?
  • 9. Data and E-Discovery E-discovery refers to "electronically stored information” (ESI) Emails, electronic documents, social media, all online activity It does not matter how brief the storage period Federal Rules: term was "intended to be read expansively to include all current and future electronic storage mediums” “Clouds” Social networking sites How do you stay in compliance? Stay informed: general best practices, industry policies Update company retention policies as appropriate Use verified/audited vendors to back up data Consider holding period, access, ownership of data, security1 1http://www.socialmedialawupdate.com/2011/01/articles/ediscovery/ediscovery-rules-applied-to-social-media-what-this-means-in-practical-terms-for-businesses/
  • 10. E-Discovery: Making it complicated Federal vs. state laws Many states have adopted a statute/rules governing e-discovery statute Differing standards across states - document preservation, production of electronically stored information Conflict: companies must dispose of certain records Data privacy laws Failing to comply with e-discovery rules is a serious offense Study of 401 cases prior to 2010; more than half received sanctions1 Sanctions included Case dismissals Adverse jury instructions Large monetary sanctions 1http://www.socialmedialawupdate.com/2011/01/articles/ediscovery/ediscovery-rules-applied-to-social-media-what-this-means-in-practical-terms-for-businesses/ and http://www.abajournal.com/files/DukeLaw.pdf
  • 11.
  • 12. Defamatory Content and False Statements
  • 13. COPPA
  • 15.
  • 16. CAN-SPAM: What is it? Protects consumers from unwanted solicitations All messages with promotion as a primary purpose Not limited to unsolicited messages No exception for emails to recipients with whom sender has a pre-existing relationship Additional application: Facebook, MySpace, Twitter Act has a broad definition of an email address Facebook, Inc. v. MaxBounty, Inc. Penalties (listed on FTC site) Each separate email in violation: up to $16,000 More than one person may be held responsible for violations. Aggravated violations: additional fines, criminal penalties – including imprisonment
  • 17. CAN-SPAM: The Do and Don’t List Don’t use false/misleading headers Don’t use deceptive subject lines Do identify the message as an advertisement Do tell recipients where you are located (must be a valid, physical postal address) Do clearly explain to recipients how to “opt out” Do honor “opt out” requests promptly (within 10 business days) Do monitor your vendors; you can’t contract away your liability Do make recipients aware of sexually explicit material Do not “preview” sexually explicit material http://business.ftc.gov/documents/bus61-can-spam-act-compliance-guide-business
  • 18. Stay Current: Changes Coming! Data Privacy PII Third party vendors Employee theft (CFAA), negligence Online advertising FTC revamping guidelines; comment period closes July 11 Paid endorsements New apps and new ways to enforce the law DOL Timekeeping app
  • 19. Creating and identifying opportunities for you to save money, find money and make money Stacy Robin stacyrobin@degania.net @stacyrobin www.deganigroup.com 1.877.334.2642