SlideShare una empresa de Scribd logo
1 de 51
Avoiding Legal Landmines in
Social Media
Ellyn Angelotti
Faculty, Digital trends & social media
Poynter Institute
What’s Changing?
Disclaimer
• This is not specific legal advice, but legal
information.
Some Rules of Thumb
• When it comes to the law, “it depends”
– Gray areas are common
– Different facts change how the law is applied
• Common questions
– What is reasonable?
– What is foreseeable?
– What are my/my audiences expectations?
Just because you can,
should you?
• Legal vs. Ethical issues
– Gut check
– What are your values?
– Do you have a decision-making process?
• Would you/could you share your process?
The new legal issues?
• Posting offensive/inappropriate content
– Badmouthing others
• Copying what people find on websites
• Privacy expectations
– Social media files, emails, etc.
What every site should have
• Terms of Use
– Set boundaries for your users
• Privacy Policy
– Let your users know what information you
collect and how you use it
– Potential opt out options
What every web users should
know
• Duty to read
– Terms of Service/
Privacy policies
– User agreements
Danger Areas
• Defamation
– Key Point: Falsity of Fact
• Copyright
– Key Point: Market Value
• Privacy
– Key Point: Consent
Defamation: Guiding Values
• Seek truth and report it
• Minimize harm
What is Defamation?
• Injury to reputation caused by publishing
a false statement of fact AND
– A publisher was careless, reckless or had
knowledge of falsity
– The defamed person can be identified
• Public vs. Private person
– Injures a person or business/exposes
someone to hatred, ridicule or contempt
What is NOT Defamation?
• Who
– Libelproof Defendants
• Someone with an already tarnished reputation
– Deceased
– *More difficult* Public Figures
• Must prove actual malice
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Who Is A Public Figure?
Content: Fact vs. Opinion
• Is it true?
• Can you determine if it is true or false?
• Context
What is not defamation?
• Content
– Opinions
• The “true or false” test
– Hyperbole
– Parody
Is it Defamatory?
• My neighbor John Smith is a stinking lush.
• In my opinion the mayor is an alcoholic.
• My attorney Dan Jackson is a crook.
• All Florida attorneys are crooks.
• Calling a TV show participant a “local
loser,” “chicken butt” and “big skank”
• Calling someone a pimp
Defamation Tips
• Create standards and follow them
– Accuracy (Check, double check and triple
check)
– Thoroughness (The more perspectives and
sources, the better)
– If you’re making a bold claim, make sure all
sides are represented (gives you more
credibility)
– Support opinions with on-the-record quotes
Defamation Tips
• We all make mistakes
– Promptly correcting or retracting inaccuracies
can boost your credibility with your audience
– Carefully investigate claims that you are
incorrect
Online Commenters
• Determine how you will moderate
comments
– Before or after publication
– Will you strike or edit comments?
• Thoughtfully craft your terms of service
• Authors: make your presence known
• Enable user comments only for stories
that will benefit from it/if you can handle it.
What is Copyright?
• Grants authors exclusive rights to works
and the rights to:
– Reproduce
– Distribute
– Perform
– Display
– Transfer rights
©
What Copyright Isn’t
• Not subject to copyright:
– Idea
– Concept
– Discovery
– Laws
– “Fair Use”
– “70 years rule”
Copyright Era vs.
Open-source World
• Copyright-era language
– Scoop, byline, beat, etc.
• Open-source language
– Collaboration, retweeting, embeddable
content, etc.
Copyright Issues in Linking
• Deep Linking: Putting a link on your site
that opens a specific page on another
site.
• Inline Linking: Embedding HTML code on
your site so it displays content directly
from another site.
Copyright Issues in Social Media
• Typically the original author owns the
copyright (should clarify this with
contract).
• Some posts do not meet minimal creative
threshold and may not have copyright
protection.
• Aggregation can bring up copyright issues
.
Fair Use Factors
• Subjective balancing test
• Four areas
– Purpose and character
– Nature of work
– Amount of work used
– Market value effect
Fair Use
• Purpose & character (in the public interest)
– News reporting
– Non-profit
– Adds a new meaning to the original work
Fair Use
• Nature of the work
– Creative work is more protected than fact-
based work
Fair Use
• Amount of work used (relative)
– Not necessarily based on proportion
– Look at the “heart” of the work
– Too little for fair use: “de minimis”
Fair Use
• Market value effect
– Most important factor
Attribution/Disclaimer
• Will not protect you from a copyright
claim*
* Unless the owner has granted rights via
Creative Commons
Online Commenters
• “Notice and takedown”
– DCMA protects publishers
• You will generally not be liable if you promptly
take down a comment after being notified by a
copyright owner
Copyright Tips
• Create your own work
• If you do use others’ work …
– Ask for permission
– Give credit
– Ensure that it is fair use
What is Privacy?
• Publishing personal information without
permission
• Intrusion into personal space
• False light (in some states)
• Right of publicity (commercial
misappropriation)
What is Privacy?
• Personally Identifiable
Information
• Personally
Embarrassing
Information
How Private Are You?
When is Privacy Violated?
• When an aggrieved person has a
– Reasonable expectation of privacy (no
established method to determine this)
Are Posts Private?
• Public postings on public sites (i.e.
Twitter) are not private.
• Secured Communication Act may protect
posts on:
– Password-protected sites
– If poster has deliberately prevented outside
users from viewing site
Elements of Intrusion
• Intentional invasion of someone’s private
affairs
• Reasonably offensive
• Private matter
• Mental Anguish
Privacy Tips
• Gather content from public places and
public sources
• Be cautious when technology lets you
intrude (lenses, microphones, etc)
• Get consent, when possible.
• Rely on public information
Is it Private?
• Who owns the tool or account being used?
• Where are the messages stored?
• What network is the information traveling
through?
• Are the messages being sent on employer
time?
• Does the employee affiliate with employer in
message?
What Can I Do?
• Have a process/ policy
– Coach people on how to use the tools and
the importance of good judgment
• If you’re posting content from others from
social media to your site, consider the
benefits of a moderator
#PrivChat
• Center for Democracy & Technology
FOIA Requests
Resources
• Electronic Frontier Foundation
– http://www.eff.org/
• Reporters Committee for the Freedom of the
Press
– http://www.rcfp.org/
• Online Media Law: The Basics for Bloggers and
Other Publishers
– http://www.newsu.org
• Citizen Media Law Project
– http://www.citmedialaw.org/
For More Information
• Section 512 of the Digital Millennium
Copyright Act
• CDA 230 (Section 230 of the
Communications Decency Act)

Más contenido relacionado

La actualidad más candente

Plagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpointPlagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpointkelseygarris
 
Netiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & CopyrightNetiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & Copyrightrickyswervin
 
Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12nakyrahill915
 
Use and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and AppsUse and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and AppsQuarles & Brady
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationhjhteach
 
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.Steven Chau
 
Copyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismCopyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismJoshua197
 
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Quarles & Brady
 
Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Cheryl Vann
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy EditorsCubReporters.org
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrestShani Wolf
 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6Siegmeyer
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Katie Sunstrom
 
Edna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright PresentationEdna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright Presentationedniuchis
 

La actualidad más candente (20)

copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Big data; small print.
Big data; small print.Big data; small print.
Big data; small print.
 
Plagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpointPlagiarism, netiquette, copyrighting powerpoint
Plagiarism, netiquette, copyrighting powerpoint
 
Netiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & CopyrightNetiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & Copyright
 
Journalism law
Journalism lawJournalism law
Journalism law
 
Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12
 
Use and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and AppsUse and Protection of IP in Social Media and Apps
Use and Protection of IP in Social Media and Apps
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
Legal Issues for Bloggers by Donald R. Simon, J.D/LL.M.
 
Copyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismCopyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarism
 
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
 
Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy Editors
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrest
 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.
 
Edna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright PresentationEdna Orozco-6340_66 Copyright Presentation
Edna Orozco-6340_66 Copyright Presentation
 
Plagiarism and How to Avoid It
Plagiarism and How to Avoid ItPlagiarism and How to Avoid It
Plagiarism and How to Avoid It
 

Similar a Legal issues facing journalists

Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Pod Legal
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)Pod Legal
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theoriesTobore Oshobe
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Brian Miller, Solicitor
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and uxEric Reiss
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and librariesDorothea Salo
 
Online Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOnline Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOmar Ha-Redeye
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?Stephen Rhind-Tutt
 
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward OnlineYou’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward OnlineRocket Matter, LLC
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 

Similar a Legal issues facing journalists (20)

Twitter libel for sxsw
Twitter libel for sxswTwitter libel for sxsw
Twitter libel for sxsw
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
370 april 25 libel
370 april 25 libel370 april 25 libel
370 april 25 libel
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better world
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and ux
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
Online Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOnline Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and Tactics
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?
 
You’re not a dog
You’re not a dogYou’re not a dog
You’re not a dog
 
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward OnlineYou’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
You’re Not A Dog: How Lawyers Can Put Their Best Foot Forward Online
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Legal issues facing journalists

  • 1. Avoiding Legal Landmines in Social Media Ellyn Angelotti Faculty, Digital trends & social media Poynter Institute
  • 3. Disclaimer • This is not specific legal advice, but legal information.
  • 4. Some Rules of Thumb • When it comes to the law, “it depends” – Gray areas are common – Different facts change how the law is applied • Common questions – What is reasonable? – What is foreseeable? – What are my/my audiences expectations?
  • 5. Just because you can, should you? • Legal vs. Ethical issues – Gut check – What are your values? – Do you have a decision-making process? • Would you/could you share your process?
  • 6. The new legal issues? • Posting offensive/inappropriate content – Badmouthing others • Copying what people find on websites • Privacy expectations – Social media files, emails, etc.
  • 7. What every site should have • Terms of Use – Set boundaries for your users • Privacy Policy – Let your users know what information you collect and how you use it – Potential opt out options
  • 8. What every web users should know • Duty to read – Terms of Service/ Privacy policies – User agreements
  • 9. Danger Areas • Defamation – Key Point: Falsity of Fact • Copyright – Key Point: Market Value • Privacy – Key Point: Consent
  • 10. Defamation: Guiding Values • Seek truth and report it • Minimize harm
  • 11. What is Defamation? • Injury to reputation caused by publishing a false statement of fact AND – A publisher was careless, reckless or had knowledge of falsity – The defamed person can be identified • Public vs. Private person – Injures a person or business/exposes someone to hatred, ridicule or contempt
  • 12. What is NOT Defamation? • Who – Libelproof Defendants • Someone with an already tarnished reputation – Deceased – *More difficult* Public Figures • Must prove actual malice
  • 13. Who Is A Public Figure?
  • 14. Who Is A Public Figure?
  • 15. Who Is A Public Figure?
  • 16. Who Is A Public Figure?
  • 17. Who Is A Public Figure?
  • 18. Who Is A Public Figure?
  • 19. Content: Fact vs. Opinion • Is it true? • Can you determine if it is true or false? • Context
  • 20. What is not defamation? • Content – Opinions • The “true or false” test – Hyperbole – Parody
  • 21. Is it Defamatory? • My neighbor John Smith is a stinking lush. • In my opinion the mayor is an alcoholic. • My attorney Dan Jackson is a crook. • All Florida attorneys are crooks. • Calling a TV show participant a “local loser,” “chicken butt” and “big skank” • Calling someone a pimp
  • 22. Defamation Tips • Create standards and follow them – Accuracy (Check, double check and triple check) – Thoroughness (The more perspectives and sources, the better) – If you’re making a bold claim, make sure all sides are represented (gives you more credibility) – Support opinions with on-the-record quotes
  • 23. Defamation Tips • We all make mistakes – Promptly correcting or retracting inaccuracies can boost your credibility with your audience – Carefully investigate claims that you are incorrect
  • 24. Online Commenters • Determine how you will moderate comments – Before or after publication – Will you strike or edit comments? • Thoughtfully craft your terms of service • Authors: make your presence known • Enable user comments only for stories that will benefit from it/if you can handle it.
  • 25. What is Copyright? • Grants authors exclusive rights to works and the rights to: – Reproduce – Distribute – Perform – Display – Transfer rights ©
  • 26. What Copyright Isn’t • Not subject to copyright: – Idea – Concept – Discovery – Laws – “Fair Use” – “70 years rule”
  • 27. Copyright Era vs. Open-source World • Copyright-era language – Scoop, byline, beat, etc. • Open-source language – Collaboration, retweeting, embeddable content, etc.
  • 28. Copyright Issues in Linking • Deep Linking: Putting a link on your site that opens a specific page on another site. • Inline Linking: Embedding HTML code on your site so it displays content directly from another site.
  • 29. Copyright Issues in Social Media • Typically the original author owns the copyright (should clarify this with contract). • Some posts do not meet minimal creative threshold and may not have copyright protection. • Aggregation can bring up copyright issues .
  • 30. Fair Use Factors • Subjective balancing test • Four areas – Purpose and character – Nature of work – Amount of work used – Market value effect
  • 31. Fair Use • Purpose & character (in the public interest) – News reporting – Non-profit – Adds a new meaning to the original work
  • 32. Fair Use • Nature of the work – Creative work is more protected than fact- based work
  • 33. Fair Use • Amount of work used (relative) – Not necessarily based on proportion – Look at the “heart” of the work – Too little for fair use: “de minimis”
  • 34. Fair Use • Market value effect – Most important factor
  • 35. Attribution/Disclaimer • Will not protect you from a copyright claim* * Unless the owner has granted rights via Creative Commons
  • 36. Online Commenters • “Notice and takedown” – DCMA protects publishers • You will generally not be liable if you promptly take down a comment after being notified by a copyright owner
  • 37. Copyright Tips • Create your own work • If you do use others’ work … – Ask for permission – Give credit – Ensure that it is fair use
  • 38. What is Privacy? • Publishing personal information without permission • Intrusion into personal space • False light (in some states) • Right of publicity (commercial misappropriation)
  • 39. What is Privacy? • Personally Identifiable Information • Personally Embarrassing Information
  • 41. When is Privacy Violated? • When an aggrieved person has a – Reasonable expectation of privacy (no established method to determine this)
  • 42. Are Posts Private? • Public postings on public sites (i.e. Twitter) are not private. • Secured Communication Act may protect posts on: – Password-protected sites – If poster has deliberately prevented outside users from viewing site
  • 43.
  • 44. Elements of Intrusion • Intentional invasion of someone’s private affairs • Reasonably offensive • Private matter • Mental Anguish
  • 45. Privacy Tips • Gather content from public places and public sources • Be cautious when technology lets you intrude (lenses, microphones, etc) • Get consent, when possible. • Rely on public information
  • 46. Is it Private? • Who owns the tool or account being used? • Where are the messages stored? • What network is the information traveling through? • Are the messages being sent on employer time? • Does the employee affiliate with employer in message?
  • 47. What Can I Do? • Have a process/ policy – Coach people on how to use the tools and the importance of good judgment • If you’re posting content from others from social media to your site, consider the benefits of a moderator
  • 48. #PrivChat • Center for Democracy & Technology
  • 50. Resources • Electronic Frontier Foundation – http://www.eff.org/ • Reporters Committee for the Freedom of the Press – http://www.rcfp.org/ • Online Media Law: The Basics for Bloggers and Other Publishers – http://www.newsu.org • Citizen Media Law Project – http://www.citmedialaw.org/
  • 51. For More Information • Section 512 of the Digital Millennium Copyright Act • CDA 230 (Section 230 of the Communications Decency Act)

Notas del editor

  1. "[Name of website] will not collect any personal information about you except when you specifically and knowingly provide such information Privacy: When a user visits a website, he or she provides personal information to the website operator simply by virtue of browsing, reading, and downloading material. This information includes IP address, user configuration settings, and what website referred the user to the site, among other things. It is better to tell users that this type of information is being collected automatically on standard web server access logs. .
  2. Private Figures: the amount of research undertaken prior to publication; the trustworthiness of sources; attempts to verify questionable statements or solicit opposing views; and whether the defendant followed other good journalistic practices.
  3. Public Figure District 2 St. Pete Councilperson Calvin Harris
  4. High School wresting coach The case went all the way to the Supreme Court, which ruled 7-2 in favor of Milkovich in a landmark 1980 decision that he is not a public figure and therefore not subject to a published opinion. One reason is in his 27 years of coaching (1950-77), he had a dual meet record of 265-25-2. From 1963-72, his teams won 102 consecutive matches, which is still a state record. He also guided the Mustangs to 10 state team titles and nine state runners-up, and had 37 individual champions - the last being his nephew Jamie, who is the team's current coach. The other reason is for a landmark Supreme Court ruling. On Feb. 9, 1974, a brawl erupted among wrestlers at a match between Maple Heights High School and Mentor High School covered by J. Theodore Diadiun, who at the time was sports editor for the Willoughby News-Herald. Diadiun is now The Plain Dealer's reader representative. Milkovich filed a libel action against Diadiun and the News-Herald for what Diadiun wrote in a column following a Ohio High School Athletic Association hearing about the fracas.
  5. Cliff Lee’s wife Time, Inc. v. Firestone 1976 (Florida Supreme Court) (a) voluntarily participates in a discussion about a public controversy, and (b) has access to the media to get his or her own view across
  6. Limited: (a) voluntarily participates in a discussion about a public controversy, and (b) has access to the media to get his or her own view across
  7. Limited: (a) voluntarily participates in a discussion about a public controversy, and (b) has access to the media to get his or her own view across
  8. No such thing as a false idea.
  9. When false, these are defamatory (if they are true, then not defamatory) (in most state) No, yes, Yes, yes, no, maybe but probably no. 3: They concluded the term has "no generally recognized meaning." 2: “Our dad’s a pimp. . . . We’re interested in the underclass.” “dad dabbled in pimportial arts” –had to be false because he HAD been a pimp in the past, and that was good enough could not be used to support the truth of the statement. Vanity Fair mag, Allen Hughes and Albert Hughs Jr. Evil kenieval picture with his wife and another woman( No – not reasonbaly defamied)
  10. if you wish to criticize a novelist, you should have the freedom to quote a portion of the novelist's work without asking permission. Absent this freedom, copyright owners could stifle any negative comments about their work. if you wish to criticize a novelist, you should have the freedom to quote a portion of the novelist's work without asking permission. Absent this freedom, copyright owners could stifle any negative comments about their work.
  11. Benefit to the public- unpublished work gets more protection because author gets the first shot at publishing
  12. Does not typically apply to Parody WEIRD AL De minimis: Movie Seven: appear fleetingly and are obscured, severely out of focus, and virtually unidentifiable."
  13. Gather not necessarily publish
  14. Not for Facebook… but this is more for privates websites
  15. Phyiscial invasion, or electronic/optical invasion “ use of ultra-powerful or highly sensitive equipment was the only way you were able to obtain your information or recording. "
  16. Consent is implied if you tell them you are in the media All parties need to be aware a conversation is being recorded