Law2sm’s Monthly Recap 07/01/16 – Stories Relating to Social Media & the Law

fireworks-display-series-64

Welcome to our monthly recap of stories relating to Social Media and the Law. This month recap’s stories cover many issues including: things to add to a social media pre-nup; social media risk management; battle to put out social media fires; Tinder troll pleads guilty; emojis as corporate tools; Snapchat caught; do you need a social media will?; dark web marketplace; and more.

Enjoy the fireworks and be safe this weekend!

These are some of the articles, reports, posts, etc. that caught our attention this month. We originally send them out through our twitter account @law2sm, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Some have the links that will take you to their original sources, whether Mashable, Lexology, and/or others. For others you have to go to our Twitter handle @Law2sm to get. Enjoy and let us know some of the stories you’ve found interesting this time around. Just share in the comments below. Have a great week!

  • Divorce in the digital age – avoiding the pitfalls of social media | Lexology ‪http://ow.ly/DE6H301Ojp6 
  • Looking forward to this: Lo And Behold: Reveries of the Connected World – Official Trailer
  • Alvin Toffler, Author of ‘Future Shock,’ Dies at 87
  • Conversations business leaders need to have about security
  • Data security trends in business, law ‪http://ow.ly/CkZF301Nfu3 
  • Digital patch kit: How to protect yourself from data leaks
  • Visitors to the U.S. May Be Asked for Social Media Information
  • FTC closes 70 percent of data security investigations ‪http://ow.ly/aTET301Ltwr 
  • Put the Voir Dire Process to Work Before Choosing a Social Media “Expert” ‪http://ow.ly/x5la301JoKN 
  • Legal Bits & Business Bytes Monthly Lunch-n-Learn ‪http://ow.ly/PTMD301JksS 
  • 6 Things to Add to Your Social Media Prenup
  • FTC Settles Charges w Misleading Websites: Another Native Advertising Enforcement Action
  • Is Your Social Media Account Hackable? ‪http://ow.ly/jQwc301yz9l 
  • Social Media Risk Management: How to Evaluate your Liability Before it’s Too Late
  • Changes To YouTube Terms Of Service Target Harassment
  • For Charlotte employers, an uphill battle to put out social media fires
  • NM State Supreme Court warns judges to be careful on social media ‪http://ow.ly/arsm301xgjp 
  • Executive Issues on Social Media
  • Intel Releases Research About the Digital Dangers of Staying Plugged In on Vacation ‪http://ow.ly/LQOL301w4TZ 
  • Tinder troll pleads guilty to social media threats | The New Daily
  • My guiding principles in life are to be honest, genuine, thoughtful and caring-Prince William, Duke of Cambridge
  • Taylor Swift & other big names join music industry’s campaign against YouTube ‪http://ow.ly/4kbm301u2DN  ‪#copyright by ‪@anthonyha ‪@TechCrunch
  • Hands Off My Smiley Face: Emoji Become Corporate Tools
  • Champions of a Monster Polaroid Yield to the Digital World
  • 5 Steps To Securing Yourself From Online Identity Theft ‪http://ow.ly/LxQv301tz1k 
  • Millennials More Likely to Unplug While on Vacation (Infographic) ‪http://ow.ly/4yoH301tyWg 
  • Views on Encryption, Data Security Portrayal in TV Shows From ‘Mr. Robot’ Writer ‪http://ow.ly/zStz301tyLe 
  • How Terrorists’ Use of Social Media Points to the Future ‪http://ow.ly/SSZm301rG8I 
  • Parliament considers hiring social media investigator to stop fanatics abusing MPs online in wake of Jo Cox murder
  • Snapchat forced to say sorry after getting caught using artists’ designs without permission
  • Social Media: Ethical, legal and practical challenges
  • Clients drop firm after lawyer uses Twitter to celebrate ‘win’ against parents of disabled children ‪http://ow.ly/vhjZ301mpct 
  • Beware, this ransomware is seeking to target your Smart TVs
  • Internet Security, AntiVirus, AntiSpam, AntiSpyware Quiz ‪http://ow.ly/7RNY301koI9 
  • Attorney General offers summer tips for online safety and security
  • 5 Ways to Defuse Data Threat from Departing Employees – eSecurity Planet ‪http://ow.ly/1Dfk301iL6R 
  • Negligence, not malice, the biggest threat to law firm data security
  • How citizen journalism can lead to cyber bullying ‪http://ow.ly/SBCt301iKMz 
  • How to Create Social Media that ‘Follows’ Compliance Rules ‪http://ow.ly/c5aD301iKIJ 
  • Legal Insider: New Social Media Policy for Security Clearance Investigations ‪http://ow.ly/Eybx301iKDx 
  • TAG State of the Industry 2016 ‪http://ow.ly/amng301iKxf 
  • New Legislation Expands Stalking Laws, Adds Rules For Online Activity And Social Media
  • The Car Hacker’s Handbook digs into automotive data security ‪http://ow.ly/xSFW301hCEL 
  • Outrage as law firm takes to social media to boast of ‘great win’ over parents
  • Have We Reached a New Era for Digital Identity Management? ‪http://ow.ly/D9Hs301cc14 
  • NFL hires cybersecurity firm to teach players how to use social media
  • Creepy startup will help landlords, employers, online dates strip-mine intimate data from your FB page
  • The Creepy (and Totally Legal) Way Your Landlord Could Be Spying on You
  • Gawker’s General Counsel Takes On a Leadership Role
  • Ethiopia’s New Cybercrime Law Allows for More Efficient & Systematic Prosecution of Online Speech
  • For the Alt-Right, the Message Is in the Punctuation
  • A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet
  • Legal Advice Or PR Plan? A Pertinent Privilege Conundrum
  • North Carolina’s cyberbullying law violates First Amendment – Supreme Court
  • Do you need a social media will?
  • Ways to Protect Social Media Passwords From Hackers
  • Facebook Messenger flaw revealed – CSO ‪http://ow.ly/Uppp30132Lg 
  • Law2sm’s Recap 06/01/16 – Interesting Stories Related to Cyber-bullying ‪http://ow.ly/qQfV3010mVf 
  • Managing Online Risk’s Monthly Recap (May 2016) – Stories Relating to Online Security & Risk
  • People Style, Fashion e-Comm Site Busted for “Confusing” Native Ads
  • Stop the Bots From Killing Broadway
  • 100 million social media accounts hacked, up for sale on dark web marketplace ‪http://ow.ly/jlYk3010aFT 
  • Even ‘Dead’ Social Media Sites Are a Gold Mine for Hackers ‪http://ow.ly/hkk43010aB6 
  • Even Mark Zuckerberg Got Hacked: Here’s a Basic Internet Security Mistake to Avoid
  • Summertime Security: 5 Tips to Stay Safe on Public Wi-Fi ‪http://ow.ly/1aoM30109XK 
  • Law2sm’s Monthly Recap 06/01/16 – Stories Relating to Social Media & the Law ‪http://ow.ly/Es8s300YOTZ 
  • When social media show-offs should have shut up – BBC News
  • Biometrics technology is reshaping the landscape of the security industry ‪http://ow.ly/omg9300Xods 
  • National Security in a Data Age ‪http://ow.ly/lk7c300Xo7I 
  • Why legal departments begrudge the cloud
  • Apartment Building Attempts To Coerce Tenants Into Crazy Social Media Policy Post-Lease
  • How social media is disrupting the courts
  • How to actively prevent workplace cyber bullying & harassment ‪http://ow.ly/7KXY300Wfxd 
  • Obama Administration Releases Final Data Security Policy Principles & Framework ‪http://ow.ly/YzTB300Wf5V 
  • How to Protect Your Small Business as Cybersecurity Threats Rise
  • How to delete your smartphone data securely before selling your device
  • Millennials & Mobile Payments: What is the Price of Convenience?
  • Music World Bands Together Against YouTube, Seeking Change to Law
  • Law firm helps businesses navigate the confusing web of online sharing | LVB
  • The European Commission Wants You To Log Into Social Media Accounts With Govt-Issued ID Cards
  • Why celebrities get away with stealth shilling on Instagram ‪http://ow.ly/zNtb300SMnd 
  • Social Media Guide for Lawyers v. 3.0: LinkedIn for Lawyers
  • Most Americans Get Their News From Social Media
  • Spy Games Creator Issues Traveling Tips to Public ‪http://ow.ly/qUfR300SKvB 
  • Myth 8: data privacy & security law compliance is the provider’s responsibility ‪http://ow.ly/hjG8300SKlE 
  • 4 Effective Data Security Tips for Small Business ‪http://ow.ly/l6WE300SKik 
  • Social Media’s Expanding Distribution of Internet Advertising Impacts Privacy and Security ‪http://ow.ly/ElaT300Qk6c 
  • Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance 2016
  • Going out of business: An important, but forgotten security precaution
  • Beyond Backup: The Role of Security and Privacy in Data Protection ‪http://ow.ly/k2Sk300Nut6 
  • Data security is the most significant risk facing in-house counsel today ‪http://ow.ly/JVRt300NupW 

Law2sm’s Recap 06/01/16 – Interesting Stories Related to Cyber-bullying

pinky-monster_G143_OHu_L

Welcome to our monthly recap of interesting stories relating to Cyber-bullying. These stories cover many issues including: the impact of cyber-bullying; the true cost of online crime; lessons for stopping cyber bullies; the lifelong dangers of cyber-bullying; revenge porn sites & legal loopholes; and more.

These are some of the articles, reports, posts, etc. that caught our attention this past month. We originally send them out through our twitter account @l2cyberbullying, so follow us to get them as we find them. Some of the links below can only be accessed by our Twitter handle. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Enjoy and let us know some of the stories you’ve found interesting. Just share in the comments below.

  • Novel brings to light impact of cyber-bullying
  • Advice for Recognizing and Preventing Cyberbullying
  • The True Cost of Online Crime ‪http://ow.ly/bk0D300Hngh 
  • Texas anti-cyberbullying bill modeled after Maryland law
  • 4 myths that will change how you define bullying
  • Lessons for Stopping an Adult Cyberbully
  • Cyberbullying facts: 5 things to spot and how to help your child online
  • These 5 Organizations Hope To Stop Online Harassment In Its Tracks
  • What HR Can Do About Cyberbullying in the Workplace ‪http://ow.ly/8DvN300iayy 
  • Lifelong Dangers of Cyberbullying, Sexting
  • Social Media Leads ‘Sextortion’ Channels
  • Preventing Teens From Going Online May Not Shield Them From Cyber Bullying, Sex
  • Time Warner funds EPIC’s internet safety and cyberbullying workshops ‪http://ow.ly/a9Yi300i6ND 
  • Protecting our kids against cyber bullies | Illawarra Mercury
  • Tyler Clementi Foundation Helps Teens Fight Cyberbullying… ‪http://ow.ly/b2Yc300i61K 
  • How revenge porn sites rely on legal loopholes and anonymity
  • Lessons from eMerge: The Communication Decency Act, A Tool Against Cyberbullying ‪http://ow.ly/zUoH3000IWv 
  • Global expert meeting on bullying and cyber-bullying at Innocenti
  • New Web Site Helps Kids Cope With Cyberspace Bullies ‪http://ow.ly/4nqAcD 
  • Cyberbullying And The Implications For Insurers ‪http://ow.ly/4nqA7n 
  • Tyler Clementi Family’s Ongoing Mission: Stop Cyberbullying ‪http://ow.ly/4nqA0h 
  • How Do You Stop Cyberbullying? There’s An App For That!
  • Law2sm Recap: Stories Related to Cyber-bullying 5/01/16 ‪http://ow.ly/4nnYH5 
  • Combination of face-to-face and online bullying may pack a powerful punch ‪http://ow.ly/4nn0hh 
  • When will human resources departments catch up with cyberbullying?
  • School Surveillance of Student Social Media Raises Privacy Concerns

Law2sm’s Monthly Recap 06/01/16 – Stories Relating to Social Media & the Law

Successful businessman

Welcome to our monthly recap of stories relating to Social Media and the Law. This month recap’s stories cover many issues including: the challenges of catching criminals on social media; how to properly disclose sponsored posts; fair use in the age of social media; can you legally own a hashtag; when YouTube pranks break the law; are you hiring robots yet; Facebook wins legal battle in China; how to wind down your practice; and more.

These are some of the articles, reports, posts, etc. that caught our attention this month. We originally send them out through our twitter account @law2sm, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Some have the links that will take you to their original sources, whether Mashable, Lexology, and/or others. For others you have to go to our Twitter handle @Law2sm to get. Enjoy and let us know some of the stories you’ve found interesting this time around. Just share in the comments below. Have a great week!

  • Circuits split on privacy rights for video views and third-party data sharing ‪http://ow.ly/v93w300KTcZ 
  • What Is the Future of Mobile App Development? – DZone Mobile
  • Australia to auction seized Bitcoins – CSO ‪http://ow.ly/4t9d300KAEb 
  • The Challenges of Catching Criminals on Social Media
  • Don’t Hand Our TVs Over to Google
  • Break Out the Chewbacca Mask and You Won’t Laugh Alone
  • The True Cost of Online Crime ‪http://ow.ly/bk0D300Hngh 
  • A How-To Guide for Properly Disclosing Your Sponsored Posts
  • Fair Use In The Age Of Social Media
  • The View From Up North: New Legal App Trolls Social Media For Evidence
  • ‘Bad-ass lawyer’ can’t sue over parody Twitter account, appeals court says ‪http://ow.ly/GA7B300EcKX 
  • ‘Super lawyers’ and ‘rising stars’ are warned about accolade advertising ‪http://ow.ly/NiWO300Ecud 
  • Social Media Compliance a Challenge for Enterprises
  • Social Media Guide for Lawyers v. 3.0: Facebook for Lawyers
  • Can you legally own a hashtag?
  • “Be Happy”; Not So Fast Says NLRB ‪http://ow.ly/B8ru300zBy2 
  • Clone Kimber new book: Legal Guidelines for Employers and Employees Dealing with CyberLaw Issues
  • Man gets 37 months in federal prison for intimidating witness on Facebook ‪http://ow.ly/uhhT300zAHS 
  • Vincent Gallo sues Facebook over claimed refusal to deactivate imposter’s account ‪http://ow.ly/88JT300zAB1 
  • Judge OKs suit accusing Facebook of violating Illinois privacy law with its photo-tag technology ‪http://ow.ly/6NFX300zAl6 
  • Recommendations for Evaluating Your Organization’s Use of Social Media
  • What is Email Security? Data Protection 101
  • The role of online security insurance in business
  • Google Innovates Online Security Measure, No More Passwords By The End Of This Year
  • Revealed: How copyright law is being misused to remove material from the internet
  • How Should Companies Handle Data From Employees’ Wearable Devices?
  • When YouTube Pranks Break the Law
  • Five legal risks you have to know about if using social media to promote your business
  • Social Media: The Digital Footprint to Fraud ‪http://ow.ly/Ajr5300qldR 
  • Are YOU Hiring Robots Yet? | Global Sales Growth
  • Five Resources to Help You Deploy an Effective Mobile Security Strategy
  • ‪#PossibleWoman‪ Conference 2016 Recap: Dare to Win! @PossibleWoman (SPNSRD) http://ow.ly/oXqw300keQM 
  • Robots Learn How to Make Friends and Influence People ‪http://ow.ly/TS0F300k5BV 
  • White House Announces Initiative Focused on Artificial Intelligence ‪http://ow.ly/e3Pm300k5oO 
  • Lessons for Stopping an Adult Cyberbully
  • IT’s not just technology, it’s about purpose and passion ‪#powtoonstevejobs
  • Facebook And The First Amendment: Legal Challenges To Trending Controversy May Prove Difficult
  • Facebook adds social media-savvy judge to its legal team
  • What HR Can Do About Cyberbullying in the Workplace ‪http://ow.ly/8DvN300iayy 
  • Why a staggering number of Americans have stopped using the Internet the way they used to
  • Biometric data: security and ease negate passwords, but is it private?
  • Data security mistakes to avoid at all costs
  • Social Media Leads ‘Sextortion’ Channels
  • Social Media Posts Now Fair Game in Security Clearance Process
  • Does Social Media Help the Government-Citizen Relationship? Depends Who You Ask ‪http://ow.ly/a3MT300i74S 
  • 4 PR and legal strategies and tactics to battle online defamation | PR Week ‪http://ow.ly/2P53300i6wg 
  • How Social Media Has Become a Live Event Curator, Why Cannes is Less Crowded This Year
  • Think you don’t have a social media governance problem? Neither did this football player
  • How to protect your business from 5 big data security threats
  • Mobile Security Challenges: You’re Not Alone
  • Norm Pattis: Social Media is Changing Jury Dynamics
  • Mobile security updates are a mess. The FCC and FTC want to know why.
  • Facebook Wins Legal Battle In China, Won’t Have To Share Name With Canned Food
  • How revenge porn sites rely on legal loopholes and anonymity
  • When Twitter Cut Off The US Intelligence Community: Social Media And Surveillance
  • Police Facebook pages catching on as way to catch criminals
  • How to Properly Wind Down Your Practice ‪http://ow.ly/DVVt3006JKi 
  • Social Media Crisis Management: How to Prepare and Execute a Plan
  • Best Practices for Social Media Archiving ‪http://ow.ly/lQBY3000Jg2 
  • What Disclosures? A Look at Advertising in Disguise
  • Social Media: Things You Might Not Have Thought About
  • Russian Hacker Trades Millions of Stolen Records for Social Media Likes
  • 7 Password Experts on How to Lock Down Your Online Security
  • Lessons from eMerge: The Communication Decency Act, A Tool Against Cyberbullying ‪http://ow.ly/zUoH3000IWv 
  • FFIEC Releases Guidance on Risk Management for Mobile Financial Services ‪http://ow.ly/ulPV3000Hk9 
  • We Tested 50+ Free Security Tools so You can Use Them for Your Online Protection
  • Warning issued over fake online ads for puppies and kittens
  • A Litigator’s Take on Juries in the Age of Social Media
  • Social Media Defamation: the ‪#creeper decision
  • 15 Reasons Why Clients Pay Us More than LegalZoom ‪@SparksLawyer ‪http://ow.ly/4nprlN 
  • Building the Case for Law Firm Data Security (Infographic)
  • The Digital Download – Alston & Bird’s Privacy & Data Security Newsletter
  • Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin
  • Two Sigma’s David Siegel Worries About Robots Taking Over ‪#IoUCRobots
  • IoUC’s Monthly Recap (Apr. 2016) – Stories Relating to the Internet of Unintended Consequences ‪http://ow.ly/4nnVV8 
  • Managing Online Risk’s Monthly Recap (Apr. 2016) – Stories Relating to Online Security & Risk
  • Law2sm Monthly Recap: Social Media & the Law 5/1/16 ‪http://ow.ly/4nnEU7 
  • 5 Things to Avoid When Putting Your Company on Social Media
  • Cybersecurity Insurance: Facing Hidden Risks and Uncertainty
  • Using freedom of speech in social media age ‪http://ow.ly/4nl1UJ 
  • School Surveillance of Student Social Media Raises Privacy Concerns
  • Technology in Focus: Monetizing the Internet of Security Things ‪http://ow.ly/4nk7dA 
  • Craft a winning risk assessment analysis in five steps

Possible Woman Conference 2016 Recap: Dare to Win!

IMG_7683

A couple of months ago a good friend and colleague invited me to be a “brand ambassador” for an upcoming women’s leadership conference. We are both members of Atlanta Social Media Women (ASMW), a group whose members are comprised of very seasoned and successful women in the top of the social media and marketing fields. Toby Bloomberg (@TobyDiva) is the president of Bloomberg Marketing, founder of Diva Foodies, and fearless leader of ASMW.   They “allow” me in because I do social media law and every once in a while (although more frequently now) a legal concern comes up in the group’s discussions. Before I sad yes, Toby had to explain what a “brand ambassador” was and what I was supposed to do as one. Simply put it was to tweet and post on my social media accounts about the conference and its speakers before and during the event. Of course we were to disclose that our tweets and posts were sponsored because we received complimentary admission to the event in exchange for our brand ambassadorship. I used the “SPONSORED” and “SPNSRD” for my disclaimers. There were seven of us in total (http://www.windenterprises.com/2016-conference-dare-to-win/social-media-ambassadors/).

The conference was held as a half-day event on May 10, 2016 with “two wonderful keynotes, interactive C-suite panelists, exciting networking opportunities and informative exhibits” (excerpted from their program). You can look back at the tweets and social media postings by searching out #PossibleWoman (http://www.windenterprises.com/2016-conference-dare-to-win/). I wasn’t sure what to expect but ended up enjoying the conference on different levels – one getting to meet new exceptional women, getting to better know amazing women that I already knew, and learning a few golden tidbits to help my own path to success. One of the messages emphasized is the need for us, as successful leaders to share what we learn with others so below I have listed a few of the things that I made me reflect, rang true, or were surprising.

“Keys for success: confidence and competence.” Hala Moddelmog, President, MAC

“Phrasing the problem to solve changes the perspective: curing breast cancer vs. decreasing the mortality of breast cancer.” Hala Moddelmog

“You must be intentional.” Hala Moddelmog

“Stand by your beliefs. Keep an open mind but it is OK to walk a different path.” Tracy Garner, AT&T

“Diversity needs to change from how we look around the table to getting the best of each of us.” Patricia Falotico, Greenleaf Center for Servant Leadership

“Who you are as a leader is different depending on who needs you at a particular time.” Tracy Garner

“Be selfish with your time. Outsource what you don’t bring value to (Like cleaning the house).” Lee Pressley, IBM

“There is no work-life balance – it is about life choices – integration of the two.” Paraphrased from various speakers.

“We have an obligation to be great.” Celeste Johnson, Transformation Coach

“Who’s watching you? Who are you inspiring?” Celeste Johnson

Affirmation by Celeste:

“I’m open to possibilities;  I’m committed to action; I dare to succeed.”

“Success does have a cost: time, money, attention.” Celeste Johnson

DARE by Celeste Johnson:

D = Discipline yourself

A = Act with clarity and focus

R = Raise the bar on endurance, excellence and expectations

E = Engage with people, purpose and passion

Did you attend? What tidbits would you share? If you did not attend what leadership lessons would you share with others?

 

IMG_7684
ASMW Social Media Ambassadors Table –                   Close to the action.

 

From Hala Moddelmog's keynote
           From Hala Moddelmog’s keynote

 

women of Power & Vision Panelists
        Women of Power & Vision Panelists

 

Desserts are a must at any leadership conference - chocolate!
       Desserts are a must at any leadership conference – chocolate!

 

 

 

Law2sm’s Recap 05/01/16 – Interesting Stories Related to Cyber-bullying

shocked-cartoon-eyes-vector_7k9Pxf_L

Welcome to our monthly recap of interesting stories relating to Cyber-bullying. These stories cover many issues including: cyber-bullying & college students; revenge porn, cyber-bullying & the law; ultimate guide to child online safety; new cyberethics course introduced; CyberSpace survey; cyber-bullying & AI; and more.

These are some of the articles, reports, posts, etc. that caught our attention this past month. We originally send them out through our twitter account @l2cyberbullying, so follow us to get them as we find them. Some of the links below can only be accessed by our Twitter handle. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a recap. Enjoy and let us know some of the stories you’ve found interesting. Just share in the comments below.Law