SlideShare una empresa de Scribd logo
1 de 17
Brandjacking and what steps should
companies take to safeguard against it.




                         Presented by –

                         Ronil Sinha
                         Sairam Ramkumar
                         Saurav Chaudhury
                         Shreya Sharma
                         Valene Varela
AND HOW TO STAY
SAFE FROM IT!
WHAT IS BRANDJACKING?

 Brandjacking is an activity whereby someone
  acquires or otherwise assumes
  the online identity of another entity for the
  purposes of acquiring that person's or
  business's brand equity
 The term combines the notions of 'branding'
  and 'hijacking', and has been used since at
  least 2007 when it appeared in a Business
  Week article
 The tactic is often associated with use of
TYPES OF BRANDJACKING

1) Identity
impersonation
   Facebook    and
    Twitter are breeding
    grounds for fake
    profiles
    impersonating
    celebrities and even
    regular people
   Done to gain
    personal information
    of users
TYPES OF BRANDJACKING

2) Cyber-squatting
   When     someone buys a URL (website
    address) in anticipation that you'll want to buy
    it off them at some point in the future
   Buying up URLs in the names of new limited
    companies or extensions that existing
    successful organisations did not have the
    presence of forethought to secure (such as
    .org, .com, .co.uk, .net) can be very profitable
   Definitely considered to be immoral
    profiteering
TYPES OF BRANDJACKING

3) Phishing
   Technical cat-burglars
    raid your database
    and glean personal or
    financial data that they
    can then use against
    you or your customers
   Biggest motive ->
    credit card information
   Secondary motive ->
    To steal passwords
    and access accounts
   Private information is
MOTIVE BEHIND BRANDJACKING

   A brandjacker may attempt to use the
    reputation of its target for:
     Free publicity
     to malign the reputation of its target

     “innovative marketing”

   The effects on the original brand-holder
     Financial  loss
     Credibility loss
SOME HIGH PROFILE HIJACKINGS –
BURGER KING

 Burger King’s official
  Twitter handle
  @BurgerKing was
  hijacked and
  adorned with
  McDonald’s
• Apparently their password was “whopperr123”
  branding on
• A faction of Anonymous claimed responsibility
  February 18
• After more than an hour, the handle was
  suspended
SOME HIGH PROFILE HIJACKINGS –
BP
   During the BP Deepwater Horizon oil spill in 2010
    the Twitter handle @BPGlobalPR gained a huge
    following – almost 10 times the number of followers
    of the official @BP_America account – and
    frequently parodied their response (and lack
    thereof) to the disaster.
8 STEPS TO PREVENT BRAND-
JACKING
   Sign-up for leading social media sites, which
    includes all well-known sites along with the
    ones which apply especially to the Line-of-
    Business e.g. Media, Entertainment , Travel.

   List out all brand names that need to be
    protected – company name, product-names,
    characters, spokespersons, other IP and sign-
    up for user names using each of these brand
    names. Wherever possible, create user
    communities on a site.
8 STEPS TO PREVENT BRAND-
JACKING
   Define the company department which is
    responsible for brand presence on Social Media
    and entrust them with active site-monitoring and
    creation and promotion of user communities
    around the brands.

   Engage customers, fans and users actively and
    positively on social media by having logos for
    approved fan sites, customer service sites and
    regular status updates. The goal is to create a
    sense of close-knit community to gain positive
8 STEPS TO PREVENT BRAND-
JACKING
   Always plan for the future. All products, brand
    names, characters or other public names that
    affect the IP of the organization should be
    registered everywhere before they become
    public.

   Supervise employees who are using the brand
    names or other IP in social media to keep a
    positive image, avoid misleading acts, and
    ensure that the marketing and legal
    departments are always kept in the loop.
8 STEPS TO PREVENT BRAND-
JACKING
   In case of an IP infringement, the fight to
    recover brand rights should be a low-key effort
    and the offender should be treated tactfully &
    facts should be validated extensively to prevent
    negative publicity and a potential PR disaster.

   Finally, the single most critical tip to prevent
    brand-jacking is “ETERNAL VIGILANCE” of the
    Intellectual Property on the Internet.
COMPANIES WHICH DID IT RIGHT -
COKE
             Coke has the highest brand equity among all
              the companies world wide. Every year it
              spends billions of dollars in order to maintain
              its brand value
             According to the page data Coca Cola fan
              page is the second most popular page on
              Facebook with over 3.3 Million fans, only
              second to Barack Obama
             However, this page wasn’t created by Coke,
              but by two Coke fans in Los Angeles, Dusty
              Sorg and Michael Jedrzejewski.
             Instead of acting against brand jacking – the
              officials at coke contacted them to partner
              with coke to manage their page
             Facebook made the decision to either close
              the page or let Coca-Cola take it over. Coca-
              Cola instead proposed an alternative: Let the
              creators keep the page but share it with a few
              of Coca-Cola’s senior interactive folks…
PINSTAGRAM
   Some times brandjacking helps both the
    parties. One of the latest example for this is
    the new application that is created –
    Pinstagram
   Pinstagram is a hybrid application that is half
    social pinning site Pinterest, and half photo-
    sharing app Instagram
   The simple combination of the two apps has
    created an entirely new offering, while
    hijacking both brands.
   instagram gets downloads as people
    respond to its unique product, while
    Instagram and Pinterest receive more traffic
    as a result.
   “Pinstagram has jacked Pinterest and
    Instagram in a way that’s complicit with the
    other two. It’s a homage to the other brands,
    and it’s useful to both brands as it drives
HOW TO SURVIVE A BRAND HIJACK?
   Notifying our customers immediately
   Reporting the phishing site to the company hosting
    it
   Putting out a press release
   Well defined plan to help affected customers
   Proper communication within the organization
   Filing a report to the Internet Authority of the
    respective country
SHELL’S STORY
   Generally oil companies get targeted by environment
    activist groups such as Greenpeace
   Shell was also not spared
   Problem for Shell was such activist groups took over
    Shell’s social media space
   The fake pages started getting more attention than
    Shell’s original pages
   How did Shell react to this accusations against some
    oil spills?
   Analyzed the situation, by not allowing itself to be the
    center of trolls

Más contenido relacionado

Similar a Brandjacking

Start up singapore - social media
Start up singapore - social mediaStart up singapore - social media
Start up singapore - social mediaIndependant
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Corporate reputation social age by john bell
Corporate reputation social age by john bellCorporate reputation social age by john bell
Corporate reputation social age by john bellJohn Bell
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bresslerhillarybressler
 
Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)Sameer Mathur
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Social Media Reputation Management
Social Media Reputation ManagementSocial Media Reputation Management
Social Media Reputation Managementsmibevents
 
Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4mtk4
 
IDEP Tourism Social Media Workshop
IDEP Tourism Social Media WorkshopIDEP Tourism Social Media Workshop
IDEP Tourism Social Media WorkshopMichael David
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10lindseymgift
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introductionsaltmedia
 
Corporate Reputation and Social Media
Corporate Reputation and Social MediaCorporate Reputation and Social Media
Corporate Reputation and Social MediaConverseon
 
Rpa m2 l2-common online channels
Rpa m2 l2-common online channelsRpa m2 l2-common online channels
Rpa m2 l2-common online channelsVikas Gaur
 
Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...Ian McCarthy
 
Enterprise Customer Relationship Management
Enterprise Customer Relationship ManagementEnterprise Customer Relationship Management
Enterprise Customer Relationship ManagementConvergeEnterprise
 
Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07Eric Weaver
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...Helen Levinson
 

Similar a Brandjacking (20)

Start up singapore - social media
Start up singapore - social mediaStart up singapore - social media
Start up singapore - social media
 
Corporate blogging
Corporate bloggingCorporate blogging
Corporate blogging
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Corporate reputation social age by john bell
Corporate reputation social age by john bellCorporate reputation social age by john bell
Corporate reputation social age by john bell
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bressler
 
Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)Building a Brand (Social Media Marketing)
Building a Brand (Social Media Marketing)
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Social Media Reputation Management
Social Media Reputation ManagementSocial Media Reputation Management
Social Media Reputation Management
 
Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4Social Media And Advertising 1196991487121589 4
Social Media And Advertising 1196991487121589 4
 
IDEP Tourism Social Media Workshop
IDEP Tourism Social Media WorkshopIDEP Tourism Social Media Workshop
IDEP Tourism Social Media Workshop
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
 
Social Media Fitzwilliam22nd June09
Social Media Fitzwilliam22nd June09Social Media Fitzwilliam22nd June09
Social Media Fitzwilliam22nd June09
 
Social Media 101 - an introduction
Social Media 101 - an introductionSocial Media 101 - an introduction
Social Media 101 - an introduction
 
Corporate Reputation and Social Media
Corporate Reputation and Social MediaCorporate Reputation and Social Media
Corporate Reputation and Social Media
 
Rpa m2 l2-common online channels
Rpa m2 l2-common online channelsRpa m2 l2-common online channels
Rpa m2 l2-common online channels
 
Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...Open branding: Managing the unauthorized use of brand-related intellectual pr...
Open branding: Managing the unauthorized use of brand-related intellectual pr...
 
LMA We First slides
LMA We First slidesLMA We First slides
LMA We First slides
 
Enterprise Customer Relationship Management
Enterprise Customer Relationship ManagementEnterprise Customer Relationship Management
Enterprise Customer Relationship Management
 
Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07Social Media and Advertising: Ad Club 10/07
Social Media and Advertising: Ad Club 10/07
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Brandjacking

  • 1. Brandjacking and what steps should companies take to safeguard against it. Presented by – Ronil Sinha Sairam Ramkumar Saurav Chaudhury Shreya Sharma Valene Varela
  • 2. AND HOW TO STAY SAFE FROM IT!
  • 3. WHAT IS BRANDJACKING?  Brandjacking is an activity whereby someone acquires or otherwise assumes the online identity of another entity for the purposes of acquiring that person's or business's brand equity  The term combines the notions of 'branding' and 'hijacking', and has been used since at least 2007 when it appeared in a Business Week article  The tactic is often associated with use of
  • 4. TYPES OF BRANDJACKING 1) Identity impersonation  Facebook and Twitter are breeding grounds for fake profiles impersonating celebrities and even regular people  Done to gain personal information of users
  • 5. TYPES OF BRANDJACKING 2) Cyber-squatting  When someone buys a URL (website address) in anticipation that you'll want to buy it off them at some point in the future  Buying up URLs in the names of new limited companies or extensions that existing successful organisations did not have the presence of forethought to secure (such as .org, .com, .co.uk, .net) can be very profitable  Definitely considered to be immoral profiteering
  • 6. TYPES OF BRANDJACKING 3) Phishing  Technical cat-burglars raid your database and glean personal or financial data that they can then use against you or your customers  Biggest motive -> credit card information  Secondary motive -> To steal passwords and access accounts  Private information is
  • 7. MOTIVE BEHIND BRANDJACKING  A brandjacker may attempt to use the reputation of its target for:  Free publicity  to malign the reputation of its target  “innovative marketing”  The effects on the original brand-holder  Financial loss  Credibility loss
  • 8. SOME HIGH PROFILE HIJACKINGS – BURGER KING  Burger King’s official Twitter handle @BurgerKing was hijacked and adorned with McDonald’s • Apparently their password was “whopperr123” branding on • A faction of Anonymous claimed responsibility February 18 • After more than an hour, the handle was suspended
  • 9. SOME HIGH PROFILE HIJACKINGS – BP  During the BP Deepwater Horizon oil spill in 2010 the Twitter handle @BPGlobalPR gained a huge following – almost 10 times the number of followers of the official @BP_America account – and frequently parodied their response (and lack thereof) to the disaster.
  • 10. 8 STEPS TO PREVENT BRAND- JACKING  Sign-up for leading social media sites, which includes all well-known sites along with the ones which apply especially to the Line-of- Business e.g. Media, Entertainment , Travel.  List out all brand names that need to be protected – company name, product-names, characters, spokespersons, other IP and sign- up for user names using each of these brand names. Wherever possible, create user communities on a site.
  • 11. 8 STEPS TO PREVENT BRAND- JACKING  Define the company department which is responsible for brand presence on Social Media and entrust them with active site-monitoring and creation and promotion of user communities around the brands.  Engage customers, fans and users actively and positively on social media by having logos for approved fan sites, customer service sites and regular status updates. The goal is to create a sense of close-knit community to gain positive
  • 12. 8 STEPS TO PREVENT BRAND- JACKING  Always plan for the future. All products, brand names, characters or other public names that affect the IP of the organization should be registered everywhere before they become public.  Supervise employees who are using the brand names or other IP in social media to keep a positive image, avoid misleading acts, and ensure that the marketing and legal departments are always kept in the loop.
  • 13. 8 STEPS TO PREVENT BRAND- JACKING  In case of an IP infringement, the fight to recover brand rights should be a low-key effort and the offender should be treated tactfully & facts should be validated extensively to prevent negative publicity and a potential PR disaster.  Finally, the single most critical tip to prevent brand-jacking is “ETERNAL VIGILANCE” of the Intellectual Property on the Internet.
  • 14. COMPANIES WHICH DID IT RIGHT - COKE  Coke has the highest brand equity among all the companies world wide. Every year it spends billions of dollars in order to maintain its brand value  According to the page data Coca Cola fan page is the second most popular page on Facebook with over 3.3 Million fans, only second to Barack Obama  However, this page wasn’t created by Coke, but by two Coke fans in Los Angeles, Dusty Sorg and Michael Jedrzejewski.  Instead of acting against brand jacking – the officials at coke contacted them to partner with coke to manage their page  Facebook made the decision to either close the page or let Coca-Cola take it over. Coca- Cola instead proposed an alternative: Let the creators keep the page but share it with a few of Coca-Cola’s senior interactive folks…
  • 15. PINSTAGRAM  Some times brandjacking helps both the parties. One of the latest example for this is the new application that is created – Pinstagram  Pinstagram is a hybrid application that is half social pinning site Pinterest, and half photo- sharing app Instagram  The simple combination of the two apps has created an entirely new offering, while hijacking both brands.  instagram gets downloads as people respond to its unique product, while Instagram and Pinterest receive more traffic as a result.  “Pinstagram has jacked Pinterest and Instagram in a way that’s complicit with the other two. It’s a homage to the other brands, and it’s useful to both brands as it drives
  • 16. HOW TO SURVIVE A BRAND HIJACK?  Notifying our customers immediately  Reporting the phishing site to the company hosting it  Putting out a press release  Well defined plan to help affected customers  Proper communication within the organization  Filing a report to the Internet Authority of the respective country
  • 17. SHELL’S STORY  Generally oil companies get targeted by environment activist groups such as Greenpeace  Shell was also not spared  Problem for Shell was such activist groups took over Shell’s social media space  The fake pages started getting more attention than Shell’s original pages  How did Shell react to this accusations against some oil spills?  Analyzed the situation, by not allowing itself to be the center of trolls