Tag archives: LinkedIn

Social Media and Anti-SLAPP Cases

In a recent defamation case where the defendant sought anti-SLAPP protection related to internet forum posts about the plaintiffs, a federal district court recognized that social-media speech is no different from “traditional” speech. See Piping Rock Partners, Inc. v. David Lerner Assocs., Inc., No. C 12-04634 SI (N.D. Cal. May 17, 2013) (Illston, J.). “SLAPP” is an … Continue reading

Electronic Communications Privacy Act of 1986

The Electronic Communications Privacy Act (“ECPA”) prohibits interception of “any wire, oral, or electronic communication.”  18 U.S.C. § 2511.  Electronic communication is defined as “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo-electronic or photo-optical system.”  18 U.S.C. … Continue reading

ECPA Reform Bill adds geolocation provisions

Congress woman Zoe Lofgren recently introduced a bill intending to align the Electronic Communications Privacy Act of 1986 with the current state of technology, especially with respect to cloud computing.  The Online Communications and Geolocation Protection Act, backed by tech companies such as Google, Apple, Microsoft, Intel, Twitter, eBay and Amazon, intends to clarify and apply … Continue reading

The NLRB and employer social media policies

The highly respected Pew Center recently released its demographic data on social media usage. The data shows that regardless of age, race, sex, education, or income, well over half of the adults in the United States who use the internet, use social media.  It is therefore reasonable that employers would formally address their expectations of … Continue reading

SEC approves social media for company announce- ments if investors are alerted

On April 2, 2013, the Securities and Exchange Commission (the “SEC”) issued a report (the “Report”) indicating that companies can use social media, such as Facebook and Twitter, to announce key information in compliance with Regulation Fair Disclosure (“Regulation FD”), provided that investors have been informed of which social media outlet will be used to … Continue reading

Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq., projects the common law tort of real property trespass into the virtual realm of computers. The CFAA has been successfully invoked for creation of fake user accounts on social network sites, email spam, email phishing, robotic data mining, and unauthorized hard-drive wiping.  … Continue reading

Owning your social media: Drafting a social media use policy

As more companies recognize the brand value created and sustained through social media, there is greater interest in preserving social media accounts for company use and retaining the follower, member or “friend” base that has been built over time. Simultaneously, an increasing number of employees believe that the social media accounts are not company property … Continue reading

CDA § 230 Safe Harbor

Section 230 of the Communications Decency Act (“CDA”), otherwise known as § 230 Safe Harbor, explains that “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”  47 U.S.C.A. § 230(c)(1).  In addition, § 230 precludes liability for providers … Continue reading

Defamation in a Social Media World

Companies of every size are concerned with protecting the reputation of the company, which is often a company’s greatest source of referrals. Protecting the online reputation of a company has become increasingly difficult because the reputation of a company can be ruined very quickly if an unhappy customer, former employee, or competitor of the company … Continue reading

Passwords & Social Media

An employee’s personal social media page may offer prospective hackers a backdoor into company protected information. Many companies are moving towards lengthy and complex passwords, which has placed additional strain on password recovery procedures. Many of these “forgot password” security procedures ask for pseudo personal information such as a user’s high school mascot or mother’s … Continue reading

Anonymous Negative Reviews

Austin-based cleaning company Austin Gutter King Corporation, Inc. made headline news in Texas this week by filing a lawsuit against the poster of a negative review of its business on Google Places, the search engine’s business listing and review website. The review originally came from a user named “Norma Lee,” but a court-ordered request from … Continue reading

NLRB Still Scrutinizing Social Media Policies

On November 15, 2012, the National Labor Relations Board again rejected an employer’s social media policy because it could be construed to chill employees’ rights to join together for mutual aid and protection. Dish Network’s employee handbook banned employees from making “disparaging or defamatory comments” about the company. Relying on the NLRB’s  recent decision invalidating … Continue reading

OpenID

OpenID is an third-party identification protocol that allows users to log on to multiple websites with only one username and password.  Users register with one OpenID website, called an Identity Provider.  The user can then log on to any website that accepts OpenID using the identity from the provider.  The “OpenID Acceptor,” as it is … Continue reading
LexBlog