abusive content & privacy/security breaches: best practices for response and prevention

16
STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS Abusive Content and Privacy/Security Breaches: Best Practices for Response and Prevention Managing Legal and Business Risks in Social Media, The Canadian Institute Kelly Zalec, Rogers Communications David Elder, Stikeman Elliott April 15, 2011 Toronto

Upload: eldercomlaw

Post on 18-Jul-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Abusive Content and Privacy/Security Breaches:Best Practices for Responseand PreventionManaging Legal and Business Risks in Social Media, The Canadian Institute

Kelly Zalec, Rogers CommunicationsDavid Elder, Stikeman ElliottApril 15, 2011Toronto

Page 2: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 2 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

What is Abusive Content?

Sexual content

Violent or repulsive content

Hateful or abusive content

Harmful dangerous acts

Infringes rights of others/violates the law– Copyright, defamation, privacy, fraud…

Impersonation

Spam, viruses, phishing

Page 3: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 3 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Where is abusive content displayed?

Website or blog comments/discussion threads

Postings, Feeds (FB, LinkedIn, Twitter, etc.)

Email

Newsgroups, chat rooms, bulletin boards

Page 4: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 4 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Who posts abusive content?

Employees

Competitors

Fraudsters

Customers

Vandals, Crazies

Page 5: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 5 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Why should you care?

Brand and reputational damage – customer alienation

Loss of IP rights

Lose focus and utility of social media initiative

Civil liability

Criminal liability

Page 6: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 6 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Consequences & Liabilities

Privacy/data breach– Notification requirements

– Complaint, injunction, public shaming, damages

– Breach of contract

Defamation, intellectual property infringement

Child pornography, hate propaganda, deceptive marketing practices, etc.

Insurance increasingly available

Page 7: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 7 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Who ya gonna call?

Police

Cybertip.ca

Copyright owner/collective

Trademark owner

ISP or social net provider

Your lawyer…

Act quickly…

Page 8: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 8 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

What happens next

Preserve “evidence”; move off public thread – but don’t delete!

Preservation, production requirements for child pornon “Internet service providers”

Preservation, production orders and requests on TSPsre spam

Page 9: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 9 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Who was that masked man?

Anonymous, pseudonymous, falsified posts common

Prevention: registration/moderation

Investigation: seek Norwich order to reveal identity

Page 10: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 10 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

The “Norwich” Order

Pre-action discovery mechanism

Compels a third party to provide info

5 Elements to be established:– Valid bona fide claim

– Third party somehow involved

– 3rd party only practical source

– Balance of convenience

– Interests of justice

Page 11: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 11 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Action Plan

1. Follow the policies and protocols you have already established within your organization (see prevention techniques/best practices)

2. Act promptly

3. Be transparent

4. Be honest

5. Be conversational, personal and direct

Page 12: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 12 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Best Practices & Prevention

Consider the value/purpose of social media to your business

Don’t start with the tool (we MUST be on Twitter because everyone else is) but rather the goal (we want to help customers understand our product/service)

Page 13: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 13 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Best Practices & Prevention

Develop appropriate social media policies and protocols

Provide training

Plan for the worst and expect the best

Page 14: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 14 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Best Practices & Prevention

Review the guidelines (if any) of the 3rd party tools/platforms you are using Provide training

Hire someone to oversee the organization’s social media presence

Make sure this person/team is connected to the rest of the key stakeholders within the organization (PR, Legal, Marketing, Senior Leadership etc.)

Page 15: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

SLIDE 15 STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

Best Practices & Prevention

Control the brand message to the extent possible

Consider pre-moderating content on your own forums/pages

Monitor how your brand is discussed on 3rd party blogs/forums

Communicate with bloggers (i.e. pitch them with the right information or clarify by responding to inaccurate posts)

Page 16: Abusive Content & Privacy/Security Breaches: Best Practices for Response and Prevention

STIKEMAN ELLIOTT LLP | ROGERS COMMUNICATIONS

QUESTIONS & ANSWERS

David Elder [email protected]

Kelly [email protected]