Using Social Media in the University Setting

Slides:



Advertisements
Similar presentations
PR and Cybersmear Campaigns
Advertisements

© The Association of Independent Schools of NSW ICT Conference Canberra Legal Ramifications Cathy Lovell Senior Advisor Employment Advisor 31 May 2013.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
CHRISTY BOWMAN ANGELA CORNETT JODI DAVIDSON KELLI JESSIE MELISSA MCDANIEL CAROLYN MITCHELL Cyberbullying and Sexting: The Grey Area.
Legal Issues: Legal & Regulatory Environment of Business Class 29 Thursday 12/6/11.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
RahulMIN KU WHAT TO DO IF CYBER-BULLYING OCCURS Firstly protect your number- only give it to friends and don’t leave your mobile where others can.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
E-Commerce: Regulatory, Ethical, and Social Environments
By Kenrick 8B2. * Cyberbullying is defined in legal glossaries as * actions that use information and communication technologies to support deliberate,
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
Privacy and Security Risks in Higher Education
In the Belly of the Breach: What Every In-House Counsel Needs to Know about Data Breach Response ACC International Legal Affairs Committee Legal Quick.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Exploring Business © 2009 FlatWorld Knowledge 16-1 The Legal and Regulatory Environment of Business.
00870B2F.0/Internet%20Safety.jpg.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
SOCIAL NETWORKING The Legal Perspective Lawrence M. Miller Schwartz, Woods & Miller.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Chapter 6 Business Torts and Cyber Considerations.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
Freedom of Speech Computers in the World.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
School Board Policy Draft Bullying and Harassment School Year
School Law and Technology Fall 2013 Week 4 - Ced 555.
Legal Responsibilities Sheila Carlton. Introduction Certain laws and legal responsibilities in every aspect of life Formulated to protect you and society.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Cyber Liability Insurance for an unsecure world
School Board Policy Draft Bullying and Harassment
Tort Law and Product Liability,
Legal and Ethical Dimensions of Sport Public Relations
Chapter 9: Internet Law, Social Media, and Privacy
18 USC § 1030 Computer Fraud and Abuse Act
Ethical, Social, and Political Issues in E-commerce
Chapter 10 Cyberlaw, Social Media, and Privacy
Physical Safety Issues
Chapter 3 Crimes and Torts
Teaching Internet Safety
Knowing the facts and consequences of cyber bullying
E-Commerce: Regulatory, Ethical, and Social Environments
Internet Safety and Acceptable Use Policies.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Internet law Business law.
– Communication Technology in a Changing World
Protecting Yourself from Fraud including Identity Theft
LEGAL TERMS IN DIGITAL MEDIA
Essentials of the legal environment today, 5e
Protecting Yourself from Fraud including Identity Theft
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Using Social Media in the University Setting Every Day University Personnel Have to Walk the Line Developed & Presented by: Anne T. McKenna

Balancing, on the one hand, while on the other… V E R S U Promoting Academic Growth Fostering Educational Goals Advancing Research Protecting Users’ Rights to Speech Protecting Privacy Use of Evolving Technologies Developing Alumni Connections Cultivating the University Image Ensuring Student Safety Enforcing Social Media Use Codes Adhering to Professional Standards Protecting Employees & Students Complying with Law/Avoiding Crime Minimizing University Liability Furthering the University Image Strengthening University IT Systems V E R S U Anne T. McKenna © 2016

What can happen when social media speech crosses the line? We see it in the headlines every day…. Anne T. McKenna © 2016

Scale Permanence Speed Ease Anonymity Speech on Social Media Online vs. Offline Scale Permanence Speed Ease Anonymity Anne T. McKenna © 2016

Anne T. McKenna and Claire T. Gartland © 2016 Magnified & Shared Reflection On School Image Preserved Permanent Think About “Online” Posts No control Over use Speed of Transmission Accessible- By Media & Public Images & Pics Anne T. McKenna and Claire T. Gartland © 2016

Social Media Use and the Law Internet & Computer Law Social Media Activities – governed by Internet, Privacy, Speech, Copyright, Contract & Tort law…it’s a constantly evolving area of law that potentially applies to your social media posts… Intellectual Property & Copyright Privacy and Freedom of Speech Electronic Surveillance Laws Photographs Cybercrimes Torts Evidence Anne T. McKenna and Claire T. Gartland © 2015

Anne T. McKenna, Steven S. Stern, and Claire T. Gartland © 2016 Common digital and online legal problems – all enabled by our social media platforms Revenge Porn Cyberbullying Defamation – also called Libel and Slander Invasion of Privacy Intentional Infliction of Emotional Distress Child Pornography Civil Cause of Action for Wiretapping Tortious Interference with Contractual Relations Hacking Identity Theft Intellectual Property and Copyright Infringement Anne T. McKenna, Steven S. Stern, and Claire T. Gartland © 2016

Legal Problems from Improper Social Media Use Are Distinct Defamation Cyberbullying Intentional Infliction of Emotional Distress Invasion of Privacy Tortious Interference with Contractual Relations Online Speech: Common Risks Online abuse vs. in-person abuse: bullying, stalking, harassment Scale and permanence of online attacks Defamation online vs. traditional media Prevalence of victims and attackers who are minors How this is distinct from “Offline” Speech Risks Anne T. McKenna and Claire T. Gartland © 2015

Laws that May Apply to Inappropriate Social Media Use Federal Law FERPA - the Family Educational Rights and Privacy Act Intellectual Property and Copyright Issues Digital Millennium Copyright Act (DMCA) Commercial Misappropriation of Name or Likeness Communications Decency Act (CDA) Interstate Stalking Punishment & Prevention Act, 18 USC § 2261A Computer Fraud and Abuse Act, 18 USC § 1030 Electronic Communications Privacy Act, 18 USC § 2510, et seq. Federal Child Porn Legislation—Masha’s Law Interstate Communications Act, 18 USC § 875 FTC Consumer Protection Regulations -Data privacy and security -Unfair or deceptive advertising State Law Wiretapping and Electronic Surveillance Control Act, 18 Pa. Cons. Stat. Ann. § 5701, et seq. Cyberstalking, 18 Pa. Cons. Stat. Ann. § 2709.1 Cyberharassment, 18 Pa. Cons. Stat. Ann. § 2709(a), 2709(f) Student Online Privacy Laws - PA – two bills introduced Fall 2015 that are similar to -MD Code, Educ. § 26-401. Protection against intrusion by institution of post-secondary education -MD Code, Education, § 4-13. Operators of school Internet Web sites, online services, online applications, and mobile apps Anne T. McKenna and Claire T. Gartland © 2015

Social Media In the University: Direct Liability Vicarious Liability Negligent Hiring, Retention, Supervision Liability for Use of Systems Notice of Conduct Liability for Failure to Report Liability for Failure to Protect Statutory Damages Invasion of Privacy Data Breaches from Employee Activity Online Reputation Management Social Media In the University: Liability Considerations and Challenges Anne T. McKenna © 2016

IT’S ALWAYS RECORDED Educating Students, Faculty, and Administrators For security purposes, this [email / text / Tweet / Google search / Facebook post / Snapchat / Instragram post / Vine video / GPS location ] is being monitored… WHY? What you view, send, and post to the Internet… Where you are at any given time with a cellphone in “On Mode”… In part, because Federal law requires ISPs to record and store this data for a period of time. Activity is almost always traceable at least to the ISP, and the IP Address. And in part, because companies track and store data to make money. ONLINE BEHAVORIAL TARGETED ADVERTISING IT’S ALWAYS RECORDED

Know and Use Your Resources University Legal Counsel Social Media & Public Affairs Support Student Conduct & Student Affairs PSU IT & PSU AV Be aware of: PSU Guidelines for Marketing Professionals: http://socialmedia.psu.edu/resources/guidelines-for-university- communications-and-marketing-professionals/ PSU Web Privacy Policy - http://www.psu.edu/web-privacy-statement Remember to Communicate & Collaborate Anne T. McKenna © 2016