SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
SOCIAL MEDIA AND
CONFIDENTIALITY:
The Ease of
Intentional (and
Unintentional)
Disclosures
Prof. Jonathan I. Ezor
Touro Law Center for Innovation in Business, Law and Technology
jezor@tourolaw.edu
@ProfJonathan on Twitter
Nassau County Bar Association
Intellectual Property Law Committee
October 30, 2013
Confidentiality Key
to Business
• Confidentiality crucial to many business contexts
–
–
–
–
–

Due diligence
Joint ventures
Employment
Technology
Media

• Many professions have confidentiality obligations
• Law relevant as well
• Can be necessary to preserve trade secret
protection
jezor@tourolaw.edu
NDA:
Prohibition ≠
Prevention
• Non-disclosure agreements key tool for
preserving confidentiality
• Standalone or included in other
agreements/policy documents
• Set forth obligations for/limitations on
confidentiality
• Cannot prevent disclosure

jezor@tourolaw.edu
Risk Management
for Sensitive
Information
• Those sharing confidentiality information must
assess, manage risks
–
–
–
–

Selective disclosure
Redaction/anonymizing data
Access restrictions
Agreements

• Mobile devices, Internet add to concerns

jezor@tourolaw.edu
Social Media:
Antithesis of
Confidentiality
• Social media designed to enable, encourage
information sharing
• May be accessed via Web, mobile, even text
messages
• Brevity balanced by links, metadata
– GPS/location info
– EXIF data in photos

• Difficult to separate personal/professional,
public/private
jezor@tourolaw.edu
http://shankman.com/be-careful-what-youpost/

Many of my peers and I feel this is inappropriate. We
do not know the total millions of dollars FedEx
Corporation pays Ketchum annually for the valuable
and important work your company does for us
around the globe. We are confident however, it is
enough to expect a greater level of respect and
awareness from someone in your position as a vice
president at a major global player in your industry. A
hazard of social networking is people will read what
you write.
The visitor had recently learned that Tocquigny was wooing
one of his company's competitors—by seeing a message that
one of Tocquigny's employees had posted to Twitter. "It took
me by surprise," says Tocquigny. "I realized that we needed
to be more cautious about what we throw out there in to the
universe."
Apple's code of silence extends to
140-character messages on the
microblogging site Twitter. During an
in-person meeting with Apple
representatives in February, Wall
Street Journal Deputy Managing Editor
Alan Murray posted a short message
to Twitter that announced he was
using the device. The tweet was later
removed from the site.
Risk Management
Approaches for
Social Media
• Policies
• Training
– Tools
– Best practices

• Industry-specific requirements
• Monitoring
– Self
– Others

• Insurance
jezor@tourolaw.edu
QUESTIONS?

jezor@tourolaw.edu

Más contenido relacionado

La actualidad más candente

Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)onlineprivacy
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power pointstephanieprovitt
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyGregory Barnes
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Claudia Romeo GurreaNozaleda
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersNicole Black
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellowsJohn Mayer
 

La actualidad más candente (20)

Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Safe shipley 2 upload
Safe shipley 2 uploadSafe shipley 2 upload
Safe shipley 2 upload
 
TrendsintheIndustry (1)
TrendsintheIndustry (1)TrendsintheIndustry (1)
TrendsintheIndustry (1)
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellows
 

Destacado

Privacy (architectural behaviour)
Privacy (architectural behaviour)Privacy (architectural behaviour)
Privacy (architectural behaviour)Anuoluwaposimi
 
How Does Architecture Affect Behavior?
How Does Architecture Affect Behavior?How Does Architecture Affect Behavior?
How Does Architecture Affect Behavior?miniatureafterl18
 
Cognitive perspective
Cognitive perspectiveCognitive perspective
Cognitive perspectiveArdi Dionisio
 
Structure, Space and the Mind
Structure, Space and the MindStructure, Space and the Mind
Structure, Space and the MindShyam Bhat MD
 
«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»Maria1808
 
Psychology and Architecture
Psychology and ArchitecturePsychology and Architecture
Psychology and ArchitectureAshiq Muhammed
 
Psychology and Architecture in Cities: Phallic Architecture
Psychology and Architecture in Cities:  Phallic ArchitecturePsychology and Architecture in Cities:  Phallic Architecture
Psychology and Architecture in Cities: Phallic ArchitectureUlaş Başar Gezgin
 

Destacado (7)

Privacy (architectural behaviour)
Privacy (architectural behaviour)Privacy (architectural behaviour)
Privacy (architectural behaviour)
 
How Does Architecture Affect Behavior?
How Does Architecture Affect Behavior?How Does Architecture Affect Behavior?
How Does Architecture Affect Behavior?
 
Cognitive perspective
Cognitive perspectiveCognitive perspective
Cognitive perspective
 
Structure, Space and the Mind
Structure, Space and the MindStructure, Space and the Mind
Structure, Space and the Mind
 
«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»«The influence of architecture on people’s psychology»
«The influence of architecture on people’s psychology»
 
Psychology and Architecture
Psychology and ArchitecturePsychology and Architecture
Psychology and Architecture
 
Psychology and Architecture in Cities: Phallic Architecture
Psychology and Architecture in Cities:  Phallic ArchitecturePsychology and Architecture in Cities:  Phallic Architecture
Psychology and Architecture in Cities: Phallic Architecture
 

Similar a 10-30-13 Social Media and Confidentiality Presentation

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social MediaYogeshIJTSRD
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )MAHIRA
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfMustafasahibZada3
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionIsaiah Edem
 
Issues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptxIssues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptxmohitsrivastavabtech
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information LiteracyKatherine Villaluna
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital eraCHEMISTRY AGENCY
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 

Similar a 10-30-13 Social Media and Confidentiality Presentation (20)

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Team black
Team blackTeam black
Team black
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Issues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptxIssues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptx
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 

Más de Jonathan Ezor

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationJonathan Ezor
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsJonathan Ezor
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practiceJonathan Ezor
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright PresentationJonathan Ezor
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media RiskJonathan Ezor
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security PresentationJonathan Ezor
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsJonathan Ezor
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics PresentationJonathan Ezor
 

Más de Jonathan Ezor (11)

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 

Último

Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 

Último (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 

10-30-13 Social Media and Confidentiality Presentation

  • 1. SOCIAL MEDIA AND CONFIDENTIALITY: The Ease of Intentional (and Unintentional) Disclosures Prof. Jonathan I. Ezor Touro Law Center for Innovation in Business, Law and Technology jezor@tourolaw.edu @ProfJonathan on Twitter Nassau County Bar Association Intellectual Property Law Committee October 30, 2013
  • 2. Confidentiality Key to Business • Confidentiality crucial to many business contexts – – – – – Due diligence Joint ventures Employment Technology Media • Many professions have confidentiality obligations • Law relevant as well • Can be necessary to preserve trade secret protection jezor@tourolaw.edu
  • 3. NDA: Prohibition ≠ Prevention • Non-disclosure agreements key tool for preserving confidentiality • Standalone or included in other agreements/policy documents • Set forth obligations for/limitations on confidentiality • Cannot prevent disclosure jezor@tourolaw.edu
  • 4. Risk Management for Sensitive Information • Those sharing confidentiality information must assess, manage risks – – – – Selective disclosure Redaction/anonymizing data Access restrictions Agreements • Mobile devices, Internet add to concerns jezor@tourolaw.edu
  • 5. Social Media: Antithesis of Confidentiality • Social media designed to enable, encourage information sharing • May be accessed via Web, mobile, even text messages • Brevity balanced by links, metadata – GPS/location info – EXIF data in photos • Difficult to separate personal/professional, public/private jezor@tourolaw.edu
  • 6. http://shankman.com/be-careful-what-youpost/ Many of my peers and I feel this is inappropriate. We do not know the total millions of dollars FedEx Corporation pays Ketchum annually for the valuable and important work your company does for us around the globe. We are confident however, it is enough to expect a greater level of respect and awareness from someone in your position as a vice president at a major global player in your industry. A hazard of social networking is people will read what you write.
  • 7.
  • 8. The visitor had recently learned that Tocquigny was wooing one of his company's competitors—by seeing a message that one of Tocquigny's employees had posted to Twitter. "It took me by surprise," says Tocquigny. "I realized that we needed to be more cautious about what we throw out there in to the universe."
  • 9. Apple's code of silence extends to 140-character messages on the microblogging site Twitter. During an in-person meeting with Apple representatives in February, Wall Street Journal Deputy Managing Editor Alan Murray posted a short message to Twitter that announced he was using the device. The tweet was later removed from the site.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Risk Management Approaches for Social Media • Policies • Training – Tools – Best practices • Industry-specific requirements • Monitoring – Self – Others • Insurance jezor@tourolaw.edu