ICLE 2016 Recap: Social Media Beyond Our Comfort Zone

On September 16, 2016 over 130 attorneys attended in person or via remote access the 6th Annual Social Media and Law program sponsored by the Institute of Continuing Legal Education in Georgia (ICLE). Chaired by Deborah Gonzalez, Esq. , founder of Law2sm, LLC (www.law2sm.com), the program featured a number of prominent attorneys in the areas of criminal and civil litigation, employment law, entertainment law and technology law.

Gonzalez began the day with an update of the social media legal landscape highlighting the most prominent changes in the social media technology and the latest cases relating to the online platforms. Gonzalez emphasized that not only were there changed from 2015 to 2016, but that these changes should be seen in the context of change from 2011 (when this series began) to 2016 (the present year).

Trends reported on:

  • Facebook seeing its users share less personal information as people are becoming more concerned over privacy and security.
  • Facebook changing its algorithm making it necessary for business to spend more on advertising to reach potential clients.
  • Live streaming taking off with Facebook Live and Twitter and NFL deal.
  • Emojis as a language that can convey specific speech, including threats and discrimination.
  • New apps accessing publically available social media data for new uses.
  • Hoax Alert – Selfitis
  • Increase in cyber bullying and cyber-harassment
  • FTC Native Advertising Guidance
  • Tweets are Public Records in Nevada
  • The Dark Web proves challenging for law enforcement and criminal investigations.

The next panel focused on Social Media and its use in litigation. Paul E Andrew, from Andrew Merritt, Reilly & Smith, organized and moderated the panel. Josh H Viau from Fisher & Phillips LLP and Melinda C Pillow from the Law Office of Melinda C Pillow were the panelists. They began their presentation with a comparison of the 20th and 21st Century perspectives about the use of the Internet in litigation:

20th Century View: “Any evidence procured off the Internet is adequate for absolutely nothing.” St. Clair v. Johnny’s Oyster & Shrimp, Inc. (S.D. Tex. 1999).

21st Century View: A lawyer has a duty of competence to his/her clients (GRPC Rule 1.1). To be ignorant of social media and its interrelationship with the law is unethical at best and, at worst, malpractice.

Their panel discussion followed the litigation process from client intake to after the decision and award. Some highlights:

  • Review a potential client’s social media accounts – run a Google search and see what you find.
  • Various jurisdictions now allow for service f process via social media and email.
  • Social media has created new defendants and expanded duties.
  • Social media is accepted as evidence but you must go through the authentication process, etc. to have it entered into the record.
  • Social media used in the voir dire of jurors.
  • Be careful about using social media before, during, and after trial – publicity rules and Ethical rules must be followed.

Third panel of the day recognized the importance of this year in politics. Tamay Shannon (@Where2start) from W2S Marketing and Ashley Sasnett (@AshleySasnett) from Atlanta joined Gonzalez in looking at the impact social media platforms are having on the politic landscape, specifically this presidential election. The panelists provided examples of social media campaigns and best practices and Gonzalez focused on the legal issues surrounding this use.


  • Earned, owned, paid and shared media work together to reach voters.
  • FTC Disclosures of hen political speech is free and when it is bought.
  • Your social media political team needs to have certain skills in crisis communication, data analytics, writing political speech
  • No backyard is private anymore.
  • A crisis will happen – how big and how much of an impact it has varies on the response: delete, ignore, repurpose.
  • Political donations DO NOT have a limited when they are contributed via online.
  • Security has become a major issue for the campaigns – from protecting donor and voter information, to preventing hacks.
  • We are getting some decisions from state courts regarding ballot selfies – in some states they are protected freedom of speech. However there is an argument as to whether this can violate the integrity of the voting process.
  • Government agencies can use social media but not to post propaganda.

After lunch the anxiously anticipated social media and ethics panel began. Moderated by Paul Andrew it included William J Cobb, Counsel for the State Bar of Georgia and Terri Thornton from Thornton Communications. Christina Petrig, then counsel for the State Bar of Georgia, left many attorneys with more questions regarding “consent” from clients. In response Ms. Thornton worked with her attorney clients to create a series of hypotheticals, and Andrew sent them on to Tina and Cobb. Cobb, Thornton and Andrew then went through the hypothetical scenarios. The short answer is always get consent from your client before you post anything right before you post it. Do not rely on a social media amendment signed at the beginning of the engagement as situations may change and the client may change their mind. Cobb also provided a good paper regarding specific ethical rules to be considered when an attorney uses social media.

The next to the last panel focused on a specific application of social media use within the entertainment industry. Social Media: Celebrities and Public Figures Legalities included Julie K Roach, Esq.(@julieroachesq), Ashley Hollan Couch, Esq. (@CouchLawyer) and Eddie Rhodman, Jr. from DFSM.


  • The difference between a celebrity, a public figure and an influencer.
  • Review of how celebrities use social media, including to promote change and to stay relevant.
  • How brands use celebrities and influencers
  • The issue of honesty, authenticity and consumer protection when brands promote using celebrities and influencers.
  • The differences between endorsement, sponsorship, advertisement and promotion.
  • FTC Endorsement Guidelines (retweets, disclaimers)
  • Twitter Whitelisting

The last session of the day was Social Media International Developments by John Yates of Morris, Manning & Martin, LLP. According to Yates this topic is important because “While social media has become ubiquitous across the world in all realms of society, the legal complexity surrounding it remains challenging.

These challenges are daunting in light of the diversity of concerns that must be addressed among different countries that may have inconsistency in the rules and regulations based on new technologies and overlapping jurisdictions. Plus, these applications are changing so quickly that someone who thinks they’ve covered their bases may learn that the landscape has changed drastically in a short period of time. “ John’s session was based on a survey “derived directly from international attorneys (from 16 different countries) with whom I have been involved throughout the ITechLaw organization, a global association of attorneys focused on technology law issues.” The questions addressed by them were:

  1. Has your country enacted or proposed laws or regulations on social media?
  2. What organization or governing body promulgates rules and regulations in this area?
  3. Have there been court cases or administrative decisions relating to the use of social media? If so, I’d be interested in a short summary.
  4. Do the social media rules vary from province/state/jurisdiction in your country or are they uniform across the country?
  5. What is your expectation of the future of regulation of social media in your country?

For more information about the program and/or to secure materials from prior year sessions please contact ICLE at http://iclega.org/.

Ashley Couch, Eddie Rodham Jr., Julie Roach
Ashley Couch, Eddie Rodham Jr., Deborah Gonzalez, Julie Roach


John Yates, Terri Thornton
John Yates, Terri Thornton



Bill Cobb, Terri Thornton, Paul Andrew
Bill Cobb, Terri Thornton, Paul Andrew
Terri Thornton, Ashley Sasnette, Tamay Shannon, Deborah Gonzalez
Terri Thornton, Ashley Sasnette, Tamay Shannon, Deborah Gonzalez

Gwinnett Tech Forum: The Evolution of Wearable Technology

Using smart watch

Partnership Gwinnett hosts quarterly Technology Forums (http://www.gwinnettchamber.org/gwinnett-technology-forum/). I enjoy attending them because they always have interesting topics, knowledgeable speakers, and great networking with technology professionals. The last one I attended was called “The Evolution of Wearable Technology.” Panelists included Rick Erazo (RE), of AT&T Wearable IOT; Todd Charest (TC), Chief Innovation and Product Officer, Ingenious Med; and Peter Presti (PP), Research Scientist at Georgia Tech IMTC Georgia Tech. The panel was moderated by Robert McIntyre (RM), from the Wireless Technology Forum.

The discussion began with some introductory remarks and a history of wearable technology – where it came from up to where it is now. The moderator then presented a series of questions for each panelist regarding how they use the technology, what are the trends and obstacles they see, and how they believe this technology will change employer and consumer behavior. Below I have put some highlights form the discussion.

Check their website for future Forum dates.


Hurdles for wearable technology?

Size, battery life, and consumer behavior.

Factors of adaptability of wearable technology?

Health, productivity, safety and security.

Interesting stats:

  • 10% of wearable devices will be working on a cellular network.
  • 24 million devices were in use by end of 2015.
  • A 36% annual growth is expected in this market through 2017.
  • By 2018 it will be a $12 billion range market.

There is a difference between non-traditional OEM’s of wearable technology and enterprise wearable technology.

Non-Traditional OEM Enterprise
Concerned with how the device “looks” on the body

Personal preferences, tastes, personality traits of the wearer, fashion, lifestyle


Concerned with how the device “functions” and affects productivity

Ex. Google glass flopped with consumers but has been taken up by service providers

  1. Why are wearables taking off?
    • Mass adoption of smart phones. (RE)
    • There are better user interfaces and user experiences now. (RE)
    • A wearable is not just the device but also an infrastructure. (PP)
    • We are understanding better behavior change – behavioral engineering – so now we can collect data passively and do something with the data to make lives better. (TC)
  2. Is the wearable the extension of the human or is the human the extension of the wearable?
    • We start with the human first. (TC)
    • We may be transitioning in to a “Borg Lab” (from Star Trek) where humans and wearables will co-evolve (like clothes). (PP)
    • An extension of the human 0 that fashion element that represents who you are to the world – like luxury items. (RE)
  3. How will wearables enhance and challenge the workplace?
    • Wearables can work very well in certain areas – like manufacturing – like id badges – for authentication and to provide access. (RE)
    • Any job that needs interaction with a terminal can use a wearable. (PP)
    • We are collecting a vast amount of data today – information overload – we need to learn how to make sense of it. It will not be fashion but usability that will determine a higher adoption rate in the workplace. (TC)
  4. What about privacy and security?
    • These are the biggest challenges in this market. How do we strike a balance? What is the younger generation’s understanding of privacy, etc.? (TC)
    • What happens to the data collected by the wearable beyond health – photos, etc.? Regulatory policy will come into this space within the next 5-10 years. (PP)
    • These are critical to adoption multi-faceted approach through every step in the use of the wearable for security. We each need to access our risk. Need to look at mobile device management – and update IT policy to include wearables and IoT; especially bio-data of employees. (RE)
  5. Which wearable is your favorite and why?
    • Google Glass – a massive social experiment of what people are willing to accept and not to accept. Fashion vs. form vs. function – what is the right way to build these things? (PP)
    • Samsung Gearup 2 and Timex Metropolitan (RE)
    • Need to look at the breath and depth; my smartphone, Apple Watch (convenience and social acceptability), Fitbit (social norms) (TC)
  6. Which wearable technology company should we buy stock in?
    • Fashion name brands like The Fossil Group which just acquired Misfit. (RE)
    • Small start-ups; Pulse Wave monitoring company (PP)
    • Companies working with cognitive computing; self-driving cars; insurance companies (DC)
  7. Other comments:
    • Problem with Google Glass is that its battery life is too short so it is not good for constant and long-term monitoring (PP)
    • Empowered patients – “sitting (not moving) is the new smoking” – this is a public health concern; we need to get employees moving (PP)
    • This will be a competitive space, but a big challenge is that the data collected in one device is not transferable to different platforms. (TC)
    • Who owns the data? Will you be beholden to a certain brand because they have your data (not ideal). The user should own the data. (PP)
    • It will be a crowded space (RE)





Law2sm’s Recap 07/01/16 – Interesting Stories Related to Cyber-bullying

Colorful fireworks

Welcome to our monthly recap of interesting stories relating to Cyber-bullying. These stories cover many issues including: parent tips on cyberbullying, online predators, & privacy; YouTube TOS targets harassment; no simple solution for cyber-bullying; cyber-bullying & recent suicides; and more.

Hope you had a safe and fun Fourth of July!

These are some of the articles, reports, posts, etc. that caught our attention this past month. We originally send them out through our twitter account @l2cyberbullying, so follow us to get them as we find them. Some of the links below can only be accessed by our Twitter handle. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Enjoy and let us know some of the stories you’ve found interesting. Just share in the comments below.

  • Teenagers who are bullied and their bullies are at risk of suicides, warns AAP report ‪http://ow.ly/4J9U301Ojje 
  • Parents Tips: Cyberbullying, Online Predators & Privacy ⋆
  • Legal Bits & Business Bytes Monthly Lunch-n-Learn ‪http://ow.ly/PTMD301JksS 
  • Changes To YouTube Terms Of Service Target Harassment
  • Cyber Violence against Women and Girls: A World-Wide Wake-Up Call ‪http://ow.ly/NwrO301xgz6 
  • As number of social apps grows, so does need to battle cyberbullying | KVAL
  • Do you know if your child is being cyberbullied? ‪http://ow.ly/mo42301rBpB 
  • Facebook leads the way against cyberbullying, but others need to follow
  • Editorial: Pain of cyberbullying is all too real
  • How citizen journalism can lead to cyber bullying ‪http://ow.ly/SBCt301iKMz 
  • New Legislation Expands Stalking Laws, Adds Rules For Online Activity And Social Media
  • Facebook’s Suicide Prevention tool to offer support to at-risk users – National
  • Cyberbullying: So you’ve become a meme – National – NZ Herald News
  • No simple solution for cyberbullying as social media changes – Times Union
  • Cyberbullying: 11-Year-Old Falls Victim to Offline and Online Bullying in Virginia ‪http://ow.ly/uvqa301adUh 
  • A Nude Snapchat Video and Cyberbullying Lead to Teen’s Suicide
  • North Carolina’s cyberbullying law violates First Amendment – Supreme Court
  • Technological Advancement And The Dawn Of The Cyber Bully
  • 10 Ways to Protect Social Media Passwords From Hackers
  • Law2sm’s Recap 06/01/16 – Interesting Stories Related to Cyber-bullying ‪http://ow.ly/qQfV3010mVf 
  • How to actively prevent workplace cyber bullying & harassment ‪http://ow.ly/7KXY300Wfxd 
  • ‘This Was Louise’s Phone’ website shows harsh realities of cyberbullying | The Daily Dot ‪http://ow.ly/6rBi300Wfv2 
  • New Laws To Prevent Bullying In Missouri
  • Google, censor agencies train pupils on Internet safety – The Nation Nigeria
  • ‘No one listened’: Teen dies by suicide after months of cyberbullying | ‪http://PennLive.com 


Law2sm’s Monthly Recap 07/01/16 – Stories Relating to Social Media & the Law


Welcome to our monthly recap of stories relating to Social Media and the Law. This month recap’s stories cover many issues including: things to add to a social media pre-nup; social media risk management; battle to put out social media fires; Tinder troll pleads guilty; emojis as corporate tools; Snapchat caught; do you need a social media will?; dark web marketplace; and more.

Enjoy the fireworks and be safe this weekend!

These are some of the articles, reports, posts, etc. that caught our attention this month. We originally send them out through our twitter account @law2sm, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Some have the links that will take you to their original sources, whether Mashable, Lexology, and/or others. For others you have to go to our Twitter handle @Law2sm to get. Enjoy and let us know some of the stories you’ve found interesting this time around. Just share in the comments below. Have a great week!

  • Divorce in the digital age – avoiding the pitfalls of social media | Lexology ‪http://ow.ly/DE6H301Ojp6 
  • Looking forward to this: Lo And Behold: Reveries of the Connected World – Official Trailer
  • Alvin Toffler, Author of ‘Future Shock,’ Dies at 87
  • Conversations business leaders need to have about security
  • Data security trends in business, law ‪http://ow.ly/CkZF301Nfu3 
  • Digital patch kit: How to protect yourself from data leaks
  • Visitors to the U.S. May Be Asked for Social Media Information
  • FTC closes 70 percent of data security investigations ‪http://ow.ly/aTET301Ltwr 
  • Put the Voir Dire Process to Work Before Choosing a Social Media “Expert” ‪http://ow.ly/x5la301JoKN 
  • Legal Bits & Business Bytes Monthly Lunch-n-Learn ‪http://ow.ly/PTMD301JksS 
  • 6 Things to Add to Your Social Media Prenup
  • FTC Settles Charges w Misleading Websites: Another Native Advertising Enforcement Action
  • Is Your Social Media Account Hackable? ‪http://ow.ly/jQwc301yz9l 
  • Social Media Risk Management: How to Evaluate your Liability Before it’s Too Late
  • Changes To YouTube Terms Of Service Target Harassment
  • For Charlotte employers, an uphill battle to put out social media fires
  • NM State Supreme Court warns judges to be careful on social media ‪http://ow.ly/arsm301xgjp 
  • Executive Issues on Social Media
  • Intel Releases Research About the Digital Dangers of Staying Plugged In on Vacation ‪http://ow.ly/LQOL301w4TZ 
  • Tinder troll pleads guilty to social media threats | The New Daily
  • My guiding principles in life are to be honest, genuine, thoughtful and caring-Prince William, Duke of Cambridge
  • Taylor Swift & other big names join music industry’s campaign against YouTube ‪http://ow.ly/4kbm301u2DN  ‪#copyright by ‪@anthonyha ‪@TechCrunch
  • Hands Off My Smiley Face: Emoji Become Corporate Tools
  • Champions of a Monster Polaroid Yield to the Digital World
  • 5 Steps To Securing Yourself From Online Identity Theft ‪http://ow.ly/LxQv301tz1k 
  • Millennials More Likely to Unplug While on Vacation (Infographic) ‪http://ow.ly/4yoH301tyWg 
  • Views on Encryption, Data Security Portrayal in TV Shows From ‘Mr. Robot’ Writer ‪http://ow.ly/zStz301tyLe 
  • How Terrorists’ Use of Social Media Points to the Future ‪http://ow.ly/SSZm301rG8I 
  • Parliament considers hiring social media investigator to stop fanatics abusing MPs online in wake of Jo Cox murder
  • Snapchat forced to say sorry after getting caught using artists’ designs without permission
  • Social Media: Ethical, legal and practical challenges
  • Clients drop firm after lawyer uses Twitter to celebrate ‘win’ against parents of disabled children ‪http://ow.ly/vhjZ301mpct 
  • Beware, this ransomware is seeking to target your Smart TVs
  • Internet Security, AntiVirus, AntiSpam, AntiSpyware Quiz ‪http://ow.ly/7RNY301koI9 
  • Attorney General offers summer tips for online safety and security
  • 5 Ways to Defuse Data Threat from Departing Employees – eSecurity Planet ‪http://ow.ly/1Dfk301iL6R 
  • Negligence, not malice, the biggest threat to law firm data security
  • How citizen journalism can lead to cyber bullying ‪http://ow.ly/SBCt301iKMz 
  • How to Create Social Media that ‘Follows’ Compliance Rules ‪http://ow.ly/c5aD301iKIJ 
  • Legal Insider: New Social Media Policy for Security Clearance Investigations ‪http://ow.ly/Eybx301iKDx 
  • TAG State of the Industry 2016 ‪http://ow.ly/amng301iKxf 
  • New Legislation Expands Stalking Laws, Adds Rules For Online Activity And Social Media
  • The Car Hacker’s Handbook digs into automotive data security ‪http://ow.ly/xSFW301hCEL 
  • Outrage as law firm takes to social media to boast of ‘great win’ over parents
  • Have We Reached a New Era for Digital Identity Management? ‪http://ow.ly/D9Hs301cc14 
  • NFL hires cybersecurity firm to teach players how to use social media
  • Creepy startup will help landlords, employers, online dates strip-mine intimate data from your FB page
  • The Creepy (and Totally Legal) Way Your Landlord Could Be Spying on You
  • Gawker’s General Counsel Takes On a Leadership Role
  • Ethiopia’s New Cybercrime Law Allows for More Efficient & Systematic Prosecution of Online Speech
  • For the Alt-Right, the Message Is in the Punctuation
  • A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet
  • Legal Advice Or PR Plan? A Pertinent Privilege Conundrum
  • North Carolina’s cyberbullying law violates First Amendment – Supreme Court
  • Do you need a social media will?
  • Ways to Protect Social Media Passwords From Hackers
  • Facebook Messenger flaw revealed – CSO ‪http://ow.ly/Uppp30132Lg 
  • Law2sm’s Recap 06/01/16 – Interesting Stories Related to Cyber-bullying ‪http://ow.ly/qQfV3010mVf 
  • Managing Online Risk’s Monthly Recap (May 2016) – Stories Relating to Online Security & Risk
  • People Style, Fashion e-Comm Site Busted for “Confusing” Native Ads
  • Stop the Bots From Killing Broadway
  • 100 million social media accounts hacked, up for sale on dark web marketplace ‪http://ow.ly/jlYk3010aFT 
  • Even ‘Dead’ Social Media Sites Are a Gold Mine for Hackers ‪http://ow.ly/hkk43010aB6 
  • Even Mark Zuckerberg Got Hacked: Here’s a Basic Internet Security Mistake to Avoid
  • Summertime Security: 5 Tips to Stay Safe on Public Wi-Fi ‪http://ow.ly/1aoM30109XK 
  • Law2sm’s Monthly Recap 06/01/16 – Stories Relating to Social Media & the Law ‪http://ow.ly/Es8s300YOTZ 
  • When social media show-offs should have shut up – BBC News
  • Biometrics technology is reshaping the landscape of the security industry ‪http://ow.ly/omg9300Xods 
  • National Security in a Data Age ‪http://ow.ly/lk7c300Xo7I 
  • Why legal departments begrudge the cloud
  • Apartment Building Attempts To Coerce Tenants Into Crazy Social Media Policy Post-Lease
  • How social media is disrupting the courts
  • How to actively prevent workplace cyber bullying & harassment ‪http://ow.ly/7KXY300Wfxd 
  • Obama Administration Releases Final Data Security Policy Principles & Framework ‪http://ow.ly/YzTB300Wf5V 
  • How to Protect Your Small Business as Cybersecurity Threats Rise
  • How to delete your smartphone data securely before selling your device
  • Millennials & Mobile Payments: What is the Price of Convenience?
  • Music World Bands Together Against YouTube, Seeking Change to Law
  • Law firm helps businesses navigate the confusing web of online sharing | LVB
  • The European Commission Wants You To Log Into Social Media Accounts With Govt-Issued ID Cards
  • Why celebrities get away with stealth shilling on Instagram ‪http://ow.ly/zNtb300SMnd 
  • Social Media Guide for Lawyers v. 3.0: LinkedIn for Lawyers
  • Most Americans Get Their News From Social Media
  • Spy Games Creator Issues Traveling Tips to Public ‪http://ow.ly/qUfR300SKvB 
  • Myth 8: data privacy & security law compliance is the provider’s responsibility ‪http://ow.ly/hjG8300SKlE 
  • 4 Effective Data Security Tips for Small Business ‪http://ow.ly/l6WE300SKik 
  • Social Media’s Expanding Distribution of Internet Advertising Impacts Privacy and Security ‪http://ow.ly/ElaT300Qk6c 
  • Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance 2016
  • Going out of business: An important, but forgotten security precaution
  • Beyond Backup: The Role of Security and Privacy in Data Protection ‪http://ow.ly/k2Sk300Nut6 
  • Data security is the most significant risk facing in-house counsel today ‪http://ow.ly/JVRt300NupW 

Law2sm’s Recap 06/01/16 – Interesting Stories Related to Cyber-bullying


Welcome to our monthly recap of interesting stories relating to Cyber-bullying. These stories cover many issues including: the impact of cyber-bullying; the true cost of online crime; lessons for stopping cyber bullies; the lifelong dangers of cyber-bullying; revenge porn sites & legal loopholes; and more.

These are some of the articles, reports, posts, etc. that caught our attention this past month. We originally send them out through our twitter account @l2cyberbullying, so follow us to get them as we find them. Some of the links below can only be accessed by our Twitter handle. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Enjoy and let us know some of the stories you’ve found interesting. Just share in the comments below.

  • Novel brings to light impact of cyber-bullying
  • Advice for Recognizing and Preventing Cyberbullying
  • The True Cost of Online Crime ‪http://ow.ly/bk0D300Hngh 
  • Texas anti-cyberbullying bill modeled after Maryland law
  • 4 myths that will change how you define bullying
  • Lessons for Stopping an Adult Cyberbully
  • Cyberbullying facts: 5 things to spot and how to help your child online
  • These 5 Organizations Hope To Stop Online Harassment In Its Tracks
  • What HR Can Do About Cyberbullying in the Workplace ‪http://ow.ly/8DvN300iayy 
  • Lifelong Dangers of Cyberbullying, Sexting
  • Social Media Leads ‘Sextortion’ Channels
  • Preventing Teens From Going Online May Not Shield Them From Cyber Bullying, Sex
  • Time Warner funds EPIC’s internet safety and cyberbullying workshops ‪http://ow.ly/a9Yi300i6ND 
  • Protecting our kids against cyber bullies | Illawarra Mercury
  • Tyler Clementi Foundation Helps Teens Fight Cyberbullying… ‪http://ow.ly/b2Yc300i61K 
  • How revenge porn sites rely on legal loopholes and anonymity
  • Lessons from eMerge: The Communication Decency Act, A Tool Against Cyberbullying ‪http://ow.ly/zUoH3000IWv 
  • Global expert meeting on bullying and cyber-bullying at Innocenti
  • New Web Site Helps Kids Cope With Cyberspace Bullies ‪http://ow.ly/4nqAcD 
  • Cyberbullying And The Implications For Insurers ‪http://ow.ly/4nqA7n 
  • Tyler Clementi Family’s Ongoing Mission: Stop Cyberbullying ‪http://ow.ly/4nqA0h 
  • How Do You Stop Cyberbullying? There’s An App For That!
  • Law2sm Recap: Stories Related to Cyber-bullying 5/01/16 ‪http://ow.ly/4nnYH5 
  • Combination of face-to-face and online bullying may pack a powerful punch ‪http://ow.ly/4nn0hh 
  • When will human resources departments catch up with cyberbullying?
  • School Surveillance of Student Social Media Raises Privacy Concerns