Welcome to our monthly recap of stories relating to Social Media and the Law. This month recap’s stories cover many issues including: National Cyber Security Month highlights social media security issues; ballot-selfies law struck down; social media inlfuences causing legal issues; send a tweet, get fired; FTC’s first case on native ads; social media & defamation; Dropbox hack; social media policy checklist; and more.
These are some of the articles, reports, posts, etc. that caught our attention this month. We originally send them out through our twitter account @law2sm, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Some have the links that will take you to their original sources, whether Mashable, Lexology, and/or others. For others you have to go to our Twitter handle @Law2sm to get. Enjoy and let us know some of the stories you’ve found interesting this time around. Just share in the comments below. Have a great week
- Daily Report: When Artificial Intelligence Goes to the Dark Side Criminals are beginning to take advantage of the kind of smart technology that imitates voices and helps people plot the fastest route home. com
- Tech Giants Team Up To Devise An Ethics Of Artificial Intelligence Amazon, Facebook, Google DeepMind, IBM, and Microsoft announced the Partnership on AI, which will research ways to use the tech responsibly. com
- Top Story: White House urges you to use more stringent online security measures | Komando.com Risks of online security are real and keep growing, and now the White House is finally getting involved. Think of how much time you spend online and how many pass… com
- National Cyber Security Awareness Month Launches with a Call to Action for All Digital Citizens to… WASHINGTON, Sept. 29, 2016 /PRNewswire-USNewswire/ — Individuals and organizations around the world are marking… com
- “Ballot Selfies” Law Struck Down in New Hampshire townhall.com
- Sign outside Tampa Law firm sparks backlash on social media http://ow.ly/UAue304Hjy8
- Social media influencers causing legal issues Lawyers must ensure that clients understand the disclosure requirements regarding commercial affiliations and using social media influencers to promote their … com.au
- ‘It was a stupid mistake’: Cop’s Snapchat photo with racial slur costs her 2 jobs http://ow.ly/TQul304Hj9I
- Social media, selfies will be no-nos after new California law takes effect California law prohibits drivers from texting and making or taking cellphone calls unless it’s hands-free. But that doesn’t address updating social me… com
- Send a Tweet, Get Fired Bank and credit union employees are getting fired for boneheaded social media posts. This poses a risk to your brand that you must mitigate. com
- Artificial Intelligence Wrote a Pop Song, and It’s Better Than You Think Computers at a Sony lab composed the track after studying a large database of songs. com
- A Lawyer’s Guide to Social Media (Part 4): LinkedIn LinkedIn can be a great marketing tool if you do it right, as tech columnist Jeff Bennion explains. com
- Amy Schumer is No. 1 on the 2016 McAfee Most Dangerous Celebrities List | Intel Newsroom Comedian and actress Amy Schumer ranked No. 1 on the McAfee Most Dangerous Celebrities™ 2016 study. intel.com
- What has Mr. Robot done for the security industry? Arguably an accurate depiction of the world of cybercriminals, is Mr. Robot sending the right message? com
- TeleSign Joins White House/National Cyber Security Alliance’s “Lock Down Your Login” Online Safety Campaign http://ow.ly/7j9j304GNGl
- Yelp’s star-review system doesn’t amount to content development, 9th Circuit says http://ow.ly/fA4t304E0cm
- #Ad! — Lessons from the FTC’s First Case since the Release of its Enforcement Policy on Native Ads As was widely report here, here and here, the Federal Trade Commission entered into a settlement in March with Lord & Taylor over charges that the retailer alleg… com
- FTC Cracking Down on Influencer Marketers and Their Clients In recent months, the media has been reporting on increased regulatory activity involving the Federal Trade Commission (the “FTC” or “Commission”) and the sell… com
- Social Networks Prep for Key Role in Presidential Debates http://ow.ly/isig304zdWd
- Sexual assault case raises old questions amid new reality of social media When public shaming becomes a tool of the defense, more women are less likely to report rape. com
- Do no harm, don’t discriminate: official guidance issued on robot ethics Robot deception, addiction and possibility of AIs exceeding their remits noted as hazards that manufacturers should consider com
- 4 Ways Every Business Needs To Use Artificial Intelligence We are entering a new era of cognitive collaboration in which machines become far more than just agents to perform tasks, but help us to under… com
- Top 20 Artificial Intelligence Companies – Datamation http://ow.ly/EQHr304t19m
- Tencent’s WeChat Social Media Posts Count as Criminal Evidence Chinese law enforcement agencies can now secretly request access to personal information posted on social media services such as Tencent Holdings Ltd.’s WeCha… com
- Social media and defamation law pose threats to free speech, and it’s time for reform Defamation law poses a considerable threat to freedom of speech in Australia, especially where social media is concerned. com
- Self-Driving Cars Gain Powerful Ally: The Government New federal guidelines make it clear that, while the government will provide oversight, it wants to encourage the development of autonomous vehicles. com
- Social Media Policy Checklist A social media policy or a set of guidelines helps your employees make smarter decisions when marketing your brand, products and services online and may mitigate t… com
- Top Story: Cyberattacks now cost $86K per incident | Komando.com How much money is in your savings account? No matter what the number is, you probably don’t want to spend that money recovering from a cyberattack. But new res… com
- Fast-Approaching National Cyber Security Awareness Month Reminds All Digital Citizens That Cybers… WASHINGTON, Sept.14, 2016 /PRNewswire-USNewswire/ — Oct. 1 marks the start of the 13th annual National Cyber… com
- A Small Firm s Guide to Secure Client File Sharing http://ow.ly/p6u4304iLvy
- US Government Resolution Supports Digital Currency | PYMNTS.com The U.S. government is exploring a national policy for technology and digital currencies. com
- Instagram for Brands: How to Play the Regulations Game Instagram launched in October 2010. Within two months, it boasted 1 million registered users. Is it any wonder that brands followed? Social … com
- How The Police Use Social Media For Brand Reputation (And How You Can, Too) – B&T Do you dismiss law enforcement social media posts as mere folly? Do so at your peril, argues this regular B&T scribe. com.au
- WordPress GC: WB Blunder Shows Flaws in Copyright System Critics of the Digital Millennium Copyright Act got some ammunition-not to mention a laugh-last month, when Warner Bros. Entertainment embarrassi… com
- True threats on social media will be prosecuted Just as someone cannot yell “fire” in a crowded theater, social media also has its limits com
- With Wearable Tech Deals, New Player Data Is Up for Grabs A new, $170 million deal could allow Nike to harvest personal data from Michigan athletes through wearable tech, raising concerns over privacy a… com
- Tech Orchard panel: How employers can address mobile security issues – Kansas City Business Journal Overland Park-based Tech Orchard hosted a mobility panel Thursday evening, and the panelists shared a number of tips for addressing mobil… com
- What Makes a Winning Government Website? (Infographic) http://ow.ly/HODK3044qVg
- Court: Facebook References to Unnamed Ex Violated PFA A man who posted items to Facebook about his unnamed ex-girlfriend violated a protection from abuse order, even though the man did not dire… com
- 5 security questions mobile app developers should be asked How secure are your mobile apps? Ask any enterprise mobile developer and the answer will almost certainly be that security is a top priority. But s… com
- Gwinnett Tech Forum: The Evolution of Wearable Technology Partnership Gwinnett hosts quarterly Technology Forums ( I enjoy attending them because they always have interesting topics, knowledgeable speakers, and great … com
- Gwinnett Tech Forum: The Evolution of Wearable Technology http://ow.ly/XLFJ3043CUy
- NACCSE Women in Cyber Technology Panel 2016 I attend various cyber-security related events throughout the year so I can keep myself updated on the latest in the industry as well as keep up with … com
- Legal Concerns for Social Media Influencers: Intellectual Property http://ow.ly/EDI830420ri
- Social media can hold all the information hackers need British Science Festival hears how easy it is to retrieve important personal information com
- Once drones get artificial intelligence, they’ll rule the world Once drones come loaded with sophisticated AI and voice-recognition technology, humans won’t have to guide them. newsweek.com
- Alphabet, Amazon, Facebook, IBM, and Microsoft form AI ethics board The tech giants of Silicon Valley are working to take on the challenges of artificial intelligence before they can even arise. The group includes Alpha… co.uk
- How Artificial Intelligence Will Transform The Delivery Of Legal Services Many lawyers believe AI will marginalize them. Ironically, AI’s biggest impact might be to enhance their standing by improving client access and service. com
- Revenge porn: 200 prosecutions since new laws bought in to tackle crime http://ow.ly/nNuj303ZLUd
- Employee’s Disparaging and Misleading Tweets May Be Protected Under NLRA http://ow.ly/U42Z303ZLOS
- 5 Surprising Cyber-security Risks on Social Media – TechCocktail Practically everybody uses social media these days. In fact, the average person is on social media nearly two hours a day. Security issues are una… co
- Social Media Poses Security Risks for Businesses Even though social media poses a security risk for businesses, the specific security threats are poorly understood, a Wombat Security report finds. com
- Email Insider: 4 Ways To Fight The Privacy Vs. Relevance Battle Marketers have long been wary of the “creep” factor when it comes to relevance. Now privacy concerns threaten to make relevance even more difficult to do w… com
- Why Social Media Sites Are The New Cyber Weapons Of Choice Facebook, LinkedIn, and Twitter can’t secure their own environments, let alone yours. It’s time to sharpen your security acumen. com
- Yes, the News Can Survive the Newspaper As newspapers fade from the scene, there has been no certainty that the best services that newspapers provide would live on. com
- Data Sabotage: The Serious Security Risk of Smart Cities Smart city technology is on the rise, bringing more efficient ways to administer city services. But the new threat of data sabotage also looms. com
- Eight Reasons Why You Need to Audit Your Data Security Plan http://ow.ly/De2Q303SxBA
- Social Media a Top Cybersecurity Challenge in the Workplace — Campus Technology http://ow.ly/paTN303Q7OJ
- SMART TECHNOLOGY TAKES FLIGHT – Robots, Growth, Intelligent Tech http://ow.ly/PiYV303Ny11
- Dropbox hack leads to 68 million password hashes dumped online Dropbox is pushing password changes to users after millions of account details are released online. sophos.com
- A Debate About Law Enforcement & Social Media Is Redefining Policing In the Internet Age http://ow.ly/djnX303LLS1
- Blocked and banned by social media: When is it censorship? The world may never know what happened in the videos Korryn Gaines posted to her Facebook page before she was shot and killed by Maryland… com
- Crime And Social Media: Law Enforcement Is Watching Criminals are using various electronic communications and social media to communicate for illicit activity. In response, law enforcement is rapidly dev… com
- Judge rules Twitter is protected from liability lawsuit over ISIS propaganda http://ow.ly/Az8Q303LDUM
- Wearable technology that monitors workers could lead to legal problems for employers, lawyers say http://ow.ly/q8G3303LmX0
- Do memes violate copyright law? http://ow.ly/j1Oe303LmOo
- What does the WhatsApp privacy policy update signify? – CIO Symmetry http://ow.ly/D4TA303L6z7
- Judge Tosses Pet-Sitting Company’s Lawsuit Over Critical Yelp Reviews A Dallas judge has tossed out a breach-of-contract suit filed against dog and fish owners by a pet-sitting company. The company and its owner … com
- 7 Key Factors Driving the Artificial Intelligence Revolution Under, behind and inside many of the apps we use every day, a revolution is underway. It’s a revolution that started decades ago but today is empowering… com
- Social media, the gateway for malware Social media sites, largely outside of enterprise control, are rich with personal information for malicious actors com
- Deception technology grows and evolves Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security… com
- What’s your attack surface? Take responsibility for staying safe online In our day-to-day lives, the biggest threat to our online security is actually ourselves. net.au
- Leslie Jones Hack And Cyberbullying: Can Twitter’s Rumored New Feature Stop The Online Abuse? Incidents like the recent hack of Leslie Jones’ website, and the stream of social media abuse that she dealt with before it, have brought the cyberbu… com
- Evaluating legal risks in photos of nursing home residents on social media Prompted by recent media reports and lawmaker focus, the Centers for Medicare & Medicaid Services recently instructed State Survey Agency Di… com
- The Most Important Elements of Application and Data Security – DZone Performance 1) Focus on the fundamentals; 2) identify best practices, frameworks, and architectures; 3) embed security in the SDLC; 4) be data centric; and, 5) test and monitor cont… com
- Considering Privacy in the Age of the Camera http://ow.ly/Dbd1303GtIC
- A Chinese news outlet used an incredibly efficient “robot reporter” to cover the Olympics A Chinese robot reporter produced 450 Olympic news items over the 15-day sporting event, mostly about China’s dominant sports, like badminto… com
- How artificial intelligence is aiding the fight against cybercrime http://ow.ly/cI1K303FOYJ
- Director Werner Herzog Talks About The Intersection of Humanity And Artificial Intelligence Is technology making us less human? com
- Artificial Intelligence, Real Engagement http://ow.ly/x5rc303FONp
- The Hype—and Hope—of Artificial Intelligence – The New Yorker I. is really about augmented intelligence that helps us navigate our increasingly complex and digital world. And it is nothing to fear. newyorker.com
- Is It Legal For Vigilantes To Hunt For Suspects On Facebook? MUNICH — Online witch-hunt or smart investigative technique? When Hannover police started a pilot project in March 2011 to ask the public to search on com
- Don’t Feed The Trolls – How To Stop Online Harassment If you have any internet presence, it’s likely that you’ve noticed the web’s most unfortunate side effect: internet trolls. While cases involving well-k… com
- Inside Facebook’s (Totally Insane, Unintentionally Gigantic, Hyperpartisan) Political-Media Machine How a strange new class of media outlet has arisen to take over our news feeds. com
- Take the FBI’s Safe Online Surfing Internet Challenge (Learn More) – American Security Today What do more than 870,000 students across the nation have in common? Since 2012, they have all completed the FBI’s Safe Online Surfing (SOS) Internet Challenge…. com
- Seeing the Signs: Using Social Media to ID Potential Threats to Artists’ Safety (Guest Column) It is our obligation, as representatives of these artists, to vigilantly monitor social media and email accounts and proactively address these potentially… com
- 9 Ways to Secure Your Smartphone and Protect Your Mobile Privacy We’ve put together all the ways to maintain your smartphone privacy and keep your phone secured. com
- Anatomy Of A Social Media Attack Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they’re accomplished. com
- Five Things to Know About the New EU General Data Protection Regulation http://ow.ly/i0H3303xjTA
- Why The Kardashians Could Be In Legal Trouble The Kardashians could be in legal trouble over posting non-labeled ads on social media. com
- The Social Graf: Chipotle’s Social Media Policy Violated Law, Says NLRB Chipotle Mexican Grill’s social media policy for employees illegally constrained their ability to discuss workplace conditions. com
- Don’t let social media open the door for thieves Guard against sharing personal information online com
- Designing cities for digital citizens, by Salomon Salinas, Smart Cities lead at Accenture Mobility What truly makes a city ‘smart’ isn’t just the technology, but the use of technology to solve the most pressing issues that city has net
- Establishing A Company Website: How To Create An Online Presence Void Of Legal Issues Sherin and Lodgen LLP Partner C. Forbes Sargent III offers advice on how to avoid legal problems that may arise with a company website. cbslocal.com
- Kardashian Media Empire Under Legal Scrutiny The Kardashians haven’t been super great about labeling their Instagram posts as the ads they so obviously are. com
- Chipotle Must Take Worker Social Media Policy Off the Menu http://ow.ly/Fjwg303tC1H
- How to tackle social media bullying at work http://ow.ly/bShZ303tBSR
- Social media playing bigger role in Northwest Arkansas jury selection Nothing is left to chance when it comes to selecting a jury that might help convict or exonerate a person. com
- Serving court papers via e-mail, social media cost-effective, faster: Lawyers, Singapore News & Top… Singapore News -When lawyers from WongPartnership served court documents on Mr Chris Au on Aug 12, they were not handed to him in pe… com
- ‘Lochte Mess Monster’: Press & social media lay into US swimmers after fake Rio hold up — RT Sport Aside from incurring the wrath of the people of Brazil for lying to police about being robbed at gunpoint, four US Olympic swimmers have also be… com
- 9 Best Practices For Using Social Media Compliantly In Financial Services Before regulated firms allow their staff to use social media, they must first consider and interpret existing rules and regulations around Recordkeepin… com
- Why Peter Thiel is Right and Revenge Pornography is Wrong On Monday, entrepreneur Peter Thiel published an editorial in The New York Times titled “The Online Privacy Debate Won’t End with Gawker.” In that … com
- com to Shut Down Next Week Word of the website’s closing comes after the sale of its parent, Gawker Media, to Univision this week. nytimes.com
- Dancing Baby Waltzes Up to The Biggest Dance Floor in the Land It’s not every day that SCOTUS is asked to review a case involving a video of a dancing baby. But that’s what happened late last week when the law… com
- A Break in the Assange Saga The founder of WikiLeaks is central to a critical debate about secrecy, privacy and the public interest in the digital age. com
- Why security is a transversal issue for video games development Santiago Sassone, a senior corporate communications specialist, on why security is a transversal issue for video games development. com
- Apple’s Black Hat Security Talk Can Now Be Viewed Online The video provides viewers with an insight into the security of Apple’s iOS. com
- Getting Served On Social Media: How Some Spouses Are Using Facebook To Divorce http://ow.ly/mmnn303ijvL
- MONYANGO: The making of a cybercrimes law: A tale of two Bills http://ow.ly/Rtbg303i4LE
- EU to crack down on online services such as WhatsApp over privacy Europe will publish draft law to ensure that online messaging services have privacy rules like those for texts and calls com
- Security Risks: Smartphone Apps and Sensitive Data http://ow.ly/LxtW303hZkJ
- Celebrities warned over paid-for social media endorsements – http://FT.com http://ow.ly/Wexm303bJKO
- Protect Your Mobile Security at the Rio Games http://ow.ly/kc0z3039Hv3
- Does entertainment trump security in connected cars? Security as an afterthought is still the cause of most common vulnerabilities in connected cars. com
- Online gamers risking security attacks Fans of games like Pokémon Go may be letting their guard down and letting hackers in co.uk
- SECOND CIRCUIT EASES TENSION BETWEEN U.S. DISCOVERY REQUIREMENTS AND E.U. PRIVACY LAWS Microsoft scored an important victory when the Second Circuit ruled that the government is not authorized to issue warrants for customer data st… com
- Employers can no longer ask for social media logins, but can still look online – Illinois News… ILLINOIS NEWS NETWORK Despite a coming change in Illinois law protecting employees’ private online content from inquisitive employers, j… org
- 10 Privacy and Data Security mistakes that a budding startup must avoid – KnowStartup The legal and business implications of poorly managed privacy and data security practices are too important to ignore. com
- Generational differences in security, privacy attitudes How does being a Millennial, a Boomer or a Gen X-er impact your attitude toward security and safety? Ted Harrington from Independent Security Evaluators chat… com
- The history of social networking Social networking didn’t start with Facebook. We examine the history of social networking, from BBSes and Friendster to Diaspora and beyond. com
- Rio 2016: Social Media Scams And 4,500 Fake Apps Target Olympics http://ow.ly/X5ud302ZaKT
- Social media security: Avoiding the phishing threats from Facebook, Twitter and LinkedIn Analysis: Is LinkedIn a danger to your business? com
- Identity Theft and Social Media: How Are They Related? Social media has created many new ways for people to interact. While this can be viewed as exciting, it also leaves users vulnerable to identity theft. com
- Social Media Sites’ Infringement Remedies Another Reason to ‘Favorite’ Trademark Registration Social media sites usually provide online forms that can be effective tools for brand owners to remove infringing uses of protected trademarks. com
- 5 Social Media Security Recommendations for Your Startup Social media provides plenty of features for business development. Facebook, Twitter, and other networks are not just valuable but crucial t… co
- Big data vs. privacy: the big balancing act | Information Age http://ow.ly/cBSZ302Xj3h
- What You Need to Know about the Data Security Act of 2015 http://ow.ly/88Ab302UZvu
- No Harm? No Matter. FTC Broadens Data Security Liability http://ow.ly/lhu0302UZpr
- We Need Better Coordination Between Victims, Police and Tech to Combat Online Threats http://ow.ly/iWh2302TrLM
- Instagram Stories vs Snapchat Stories: Has Instagram Broken the Law? We chatted to a specialist intellectual property (IP) lawyer to find out if Instagram broke any laws with its blatantly Snapchat-influenced new feat… com
- Online Shaming: A Virtual Playground For Adults http://ow.ly/x99z302TrzH
- NCAA implements ‘click don’t comment’ social media recruiting rule The NCAA is at it again. Discover the changes imposed by the “click don’t comment” rule, inside. com
- Experts warn effects of a cyberbullying trend called ‘roasting’ People are getting their panties in a bunch over the exchange of memes and a few playful words, as digital safety experts deem ‘roasting’ the new … com
- Can Data Security Keep Up With Fraud, Bots and Hackers? http://ow.ly/RCzQ302Syil
- Celebrity Endorsement Disclosures on Social Media | Lexology http://ow.ly/4hj4302QZNZ
- Take the test: How risky are my social media posts? Your social media profiles could have impact on your career and as a result your personal life and reputation. co.uk
- Welsh HR Specialist Believes Social Media Policy is the Key to the Future of HR http://ow.ly/wjO8302QZAq
- The Pros and Cons of Social Media Background Checks While it does come with some risks, there are a lot of positives that can come from including social media screening as part of your company’s b… com
- Algorithms and the Perception of Bias On Saturday, July 23, Facebook acknowledged its anti-spam systems had briefly and accidentally blocked links to WikiLeaks files containing internal Democratic Natio… com
- Social media policies leave cities in control of posts, discussions Facebook users around Naperville and the Fox Valley use the social media site to stay on top of announcements about things like garbage pickup, ro… com
- 12 statistics on social media’s presence in the healthcare space http://ow.ly/W48j302Q3c5
- Tips on securing your social media account In today’s world, we are increasingly living digital lives, where we interact and engage with our friends and family online. Social media has become central to our lives, … it-online.co.za
- Snapchat, Social media and the internet’s security illusion Computers and the internet in general, give a false sense of security. But when you press the delete button,does the item simply go out of existence? ng
- Security Think Tank: EU data security principles apply, regardless … What are the pros and cons of Brexit for information security professionals and data protection? com
- Generation Famous: The Calculus Of Celebrity In The Age Of Social Media Can ‘fan’ and ‘famous’ converge online? Maybe. com
- Hacker Explains Why OurMine Took Over ‘Pokémon GO’ Creator’s Social Media Accounts FORBES talked to a hacker claiming to be from the infamous OurMine group regarding the decision to attack the accounts of Niantic Labs CEO John Hanke. com
- Pokémon Go: A Security Threat to Your Business? It seems like you can’t go anywhere these days without bumping into a gaggle of Pokémon GO addicts. Since its release at the start of July, the … com