Class 6 Internet Privacy Law Social Media Privacy.

Slides:



Advertisements
Similar presentations
FERPA - Sharing Student Information
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Hart District Acceptable Use Policy Acceptable Use Policy.
Social Media Policy ADM – E 21. CHS Social Media Policy Social media = media designed to be disseminated through social interaction, created using highly.
ERIC PALTELL, ESQ. KOLLMAN & SAUCIER, P.A CUMBERLAND VALLEY SHRM LEGAL & LEGISLATIVE CONFERENCE Recent Developments in Maryland Employment Law.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Herbert SHIU Joseph FONG Jeanne Lam.  Introduction  Facebook features  Facebook as an education platform  Case study  Conclusion.
Surveillance and Privacy on the Internet Presented by Jill Homes and Marion Barry.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Your Rights Under the Internet Law By: Sannita S. Lam.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
INTERNET and CODE OF CONDUCT
Ethical Issues with Facebook Employers using Facebook to prescreen applicants Members using Facebook to bully others Misrepresentation of users Advertisement.
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Safety In CyberSpace. ‘Report Abuse’ in action Look for this link on websites Microsoft have made a real commitment Approx £30,000 per month revenue.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
The Family Educational Rights and Privacy Act FERPA Tutorial online:
CPS Acceptable Use Policy Day 2 – Technology Session.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Electronic Use Policies.   Social Media  Internet.
MANAGING EMPLOYEE BLOGS, FACEBOOK PAGES AND WEBSITES Jonathan M. Crotty September 24, 2009.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
1.8 vs. 5.3 Benefits and Risks of Social Media in Healthcare Andy Malinoski Director of Risk Management Andy Malinoski Director of Risk Management.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
European Workshop “Using Open Educational Resources for enhancing e-Mentoring” Capacity of Social Networks for promoting ideas Ton Brouwers Partner BECAUSE.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Regulating Employee Use of Social Media Health Directors Legal Conference April 26, 2012 Diane M. Juffras School of Government UNC- Chapel Hill.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Should employers have access to your social feeds?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Privacy and Data Mining What Do “They” Know About You?
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Technology Tips and Safety for Teens. Social Networks Social Networks are internet applications which are used to facilitate communication between users.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
School Law and Technology Fall 2013 Week 4 - Ced 555.
FERPA Family Educational Rights and Privacy Act
Privacy & Confidentiality
FERPA (Oops, can I say that?)
Emily Snyder, William Darras, Stephanie Berger
FERPA (Oops, can I say that?)
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Essentials of the legal environment today, 5e
Privacy and Data Mining
Presentation transcript:

Class 6 Internet Privacy Law Social Media Privacy

Reasonable Expectation of Privacy

User control over privacy

Student/Employer Access to Social Network Accounts

EMPLOYEE AND STUDENT SOCIAL NETWORK PRIVACY ❖ Employer, recruiter, or school asks applicants or student for access to online pages, social media accounts, and s without a legitimate purpose where innocent third parties do not expect they are communicating with a school or employer jeopardizes their privacy and safety.

MODEL SOLUTION Prohibited actions by employers or schools: ❖ Request/require credentials to access a personal online account ❖ Compel giving employer/school access to personal online account via relationship link ❖ Compel over-the-shoulder observation of personal online account ❖ Take adverse action for someone’s failure to give any of the above Exceptions for access: ❖ Retain access to devices and accounts supplied by the employer/school. ❖ Maintain a safe environment and follow all law ❖ Meet their obligations to screen applicant

STATES ARE MAKING THESE PROTECTIONS LAW No Law Enacted Privacy Law

Marketing on Social Networking Sites (promoted ads/tweets)

Facebook Beacon

Complaint against Facebook ❖ Video Privacy Protection Act, a statute which protects against disclosure of video rental records. ❖ Violated ECPA since information sent between a Facebook user's computer and the websites of Beacon affiliates was intercepted, and this communication was disclosed for an unlawful purpose. ❖ Violations of CFAA

Striking the Right Balance

Google Buzz