World Information, Data & Cyber Security News & Legal Roundup

German cybersecurity agency prods users to ditch IE

Computerworld – Germany’s cybersecurity agency on Monday urged users to drop Internet Explorer (IE) and switch to a rival, like Chrome or Firefox, until Microsoft patches a new critical bug in its browser.

Democratic senators call for ‘cybersecurity’ executive order
CNET

Senators call for ‘cybersecurity’ executive order. This summer’s partisan sparring that derailed a federal cybersecurity law has resumed, with Democrats proposing an executive order and Republicans saying it would levy “more mandates.”

Cybersecurity scholarships to be offered
UPI.com

“The nation is in dire need of people who are capable of handling the cybersecurity challenges we face,” professor of computing and information sciences Xinming “Simon” Ou said. “We are lagging behind in the number of experts we have versus the threats.

Cybersecurity: Kay Bailey Hutchison condemns Obama’s ‘heavy handed …
Houston Chronicle (blog)

Amid escalating partisan rhetoric over the bipartisan goal of protecting U.S. computer systems from terrorist attacks, Texas Kay Bailey Hutchison criticized President Obama for a “heavy handed, regulatory regime” that would be created.

National Cyber Security Alliance Announces Theme for Data Privacy Day
The Herald | HeraldOnline.com

18, 2012 /PRNewswire-USNewswire/ — The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused on helping all digital citizens stay safer and more secure online and official coordinator of Data Privacy Day (DPD), today …

When it comes to cybersecurity law, where do we draw the line?
ZDNet

Over the past few years, the Obama administration and Congress have taken a variety of legislative runs at creating comprehensive cybersecurity law. See Also: How cybersecurity is like Star Trek’s transporter.

Cyber security biggest challenge for universal credit, says David Freud
ComputerWeekly.com

Cyber security is the biggest challenge for the government’s universal credit roll-out, welfare reform minister David Freud has told a select committee. Speaking to a select committee, pensions minister Ian Duncan Smith said government had consulted …

NetLib teams with CIS to fight cyber security
Mass High Tech

Neil Weicher wants to win the battle in cyber security. NetLib, a Stamford, Conn.-based provider of encryption software founded by Weicher, has partnered with the Center for Internet Security, a non-profit focused on cyber security readiness.

UK spy agency tests Britons’ cyber skills
Reuters

The Government Communications Headquarters (GCHQ) said those aged 16 or over and not already working in cyber security could apply to test their ability to guard a computer network but only 150 contestants at most would be eventually allowed.

Former FBI Cybersecurity Official Steven Chabinsky Thinks FBI is Doing Great …
ticklethewire.com

The FBI’s former top attorney for cybersecurity, Steven Chabinsky, who stepped down this month, thinks the FBI is doing a great job battling the problem, but told the Washington Post that the “federal government” has taken a “failed approach”.

FTC Publishes Guide to Help Mobile App Developers Observe Truth-in-Advertising, Privacy Principles

Sept. 5 2012:

From the FTc web site:

The Federal Trade Commission has published a guide to help mobile application developers observe truth-in-advertising and basic privacy principles when marketing new mobile apps. The FTC’s new publication, “Marketing Your Mobile App: Get It Right from the Start,” notes that there are general guidelines that all app developers should consider. They include:

Tell the Truth About What Your App Can Do. – “Whether it’s what you say on a website, in an app store, or within the app itself, you have to tell the truth,” the publication advises;

Disclose Key Information Clearly and Conspicuously. – “If you need to disclose information to make what you say accurate, your disclosures have to be clear and conspicuous.”

Build Privacy Considerations in From the Start. – Incorporate privacy protections into your practices, limit the information you collect, securely store what you hold on to, and safely dispose of what you no longer need. “For any collection or sharing of information that’s not apparent, get users’ express agreement. That way your customers aren’t unwittingly disclosing information they didn’t mean to share.”

Offer Choices that are Easy to Find and Easy to Use. – “Make it easy for people to find the tools you offer, design them so they’re simple to use, and follow through by honoring the choices users have made.”

Honor Your Privacy Promises. – “Chances are you make assurances to users about the security standards you apply or what you do with their personal information. App developers – like all other marketers – have to live up to those promises.”

Protect Kids’ Privacy. – “If your app is designed for children or if you know that you are collecting personal information from kids, you may have additional requirements under the Children’s Online Privacy Protection Act.”

Collect Sensitive Information Only with Consent. – Even when you’re not dealing with kids’ information, it’s important to get users’ affirmative OK before you collect any sensitive data from them, like medical, financial, or precise geolocation information.

Keep User Data Secure. – Statutes like the Graham-Leach-Bliley Act, the Fair Credit Reporting Act, and the Federal Trade Commission Act may require you to provide reasonable security for sensitive information.

The Impact of Social Media on Privacy is Unsettled

Illustration of Facebook mobile interface
Illustration of Facebook mobile interface (Photo credit: Wikipedia)

A recent New Jersey District Court case underscores the rise in tensions between employers and employees when it comes to Social Media Accounts. In Ehling v. Monmouth-Ocean Hospital Service Corp., the Court denied an employer’s motion to dismiss a former employee’s invasion of privacy claim that alleged a supervisor accessed the employee’s Facebook account. Ehling worked for Monmouth-Ocean Hospital Service Corporation (“MONOC”) and became Acting President of the local union for Professional Emergency Medical Services. Ehling alleged that MONOC began engaging in a pattern of retaliatory conduct against her eventually leading to termination of her employment.

Posting Limited to “Friends”

Ehling maintained an account on Facebook, but kept access to her wall post limited to Facebook “friends,” many of whom were coworkers, but none of whom were members of MONOC’s management. Ehling alleged that MONOC surreptitiously gained access to her Facebook account when a supervisor summoned a MONOC employee, who was a Facebook friend, and coerced, strong-armed, and/or threatened the employee to access his Facebook account in the supervisor’s presence for the purpose of viewing and copying Ehling’s posts.

Ehling alleged that MONOC then sent letters regarding a certain posting to the New Jersey Board of Nursing and the New Jersey Department of Health, Office of Emergency Medical Services as it was concerned that Plaintiff’s Facebook posting showed a disregard for patient safety. Ehling alleged the letters were malicious and meant to damage her professionally.

Accessing Wall Postings Alleged to be Common Law Invasion of Privacy

Ehling’s claim for common law invasion of privacy was premised on Defendants’ alleged unauthorized “access of her private Facebook postings” The Court denied MONOC’s motion to dismiss which argued that Ehliong did not have a reasonable expectation of privacy in her Facebook posting. The Court stated that Under New Jersey law, to state a claim for intrusion upon one’s seclusion or private affairs, a plaintiff must allege sufficient facts to demonstrate that (1) her solitude, seclusion, or private affairs were intentionally infringed upon, and that (2) this infringement would highly offend a reasonable person. See Bisbee v. John C. Conover Agency Inc., 186 N.J. Super. 335, 339 (App. Div. 1982). “[E]xpectations of privacy are established by general social norms” and must be objectively reasonable – a plaintiff’s subjective belief that something is private is irrelevant. White, 344 N.J. Super. 211, 223 (Ch. Div. 2001).

The Impact of Social Media on Privacy is Unsettled

The Court went on to make further observations on the impact of Social Media on Privacy:

“Privacy in social networking is an emerging, but underdeveloped, area of case law. See Robert Sprague, Invasion of the Social Networks: Blurring the Line between Personal Life and the Employment Relationship, 50 U. Louisville L. Rev. 1, 13 (2011) (discussing the undefined legal boundary between public and private communications on social  networking websites).

No Reasonable Expectation of Privacy

There appears to be some consistency in the case law on the two ends of the privacy spectrum. On one end of the spectrum, there are cases holding that there is no reasonable expectation of privacy for material posted to an unprotected website that anyone can view. See, e.g., United States v. Gines-Perez, 214 F.Supp.2d 205, 225 (D.P.R. 2002), rev’d on other grounds, 90 F. App’x 3 (1st Cir. 2004) (“[I]t it strikes the Court as obvious that a claim to privacy is unavailable to someone who places information on an indisputably, public medium, such as the Internet, without taking any measures to protect the information”); Yath v. Fairview Clinics, N.P., 767 N.W.2d 34, 44(Minn. Ct. App. 2009) (holding that privacy was lost when private information was posted on a publicly accessible Internet website and “[a]ccess to the publication was not restricted”).

Some Reasonable Expectation of Privacy

On the other end of the spectrum, there are cases holding that there is a reasonable expectation of privacy for individual, password-protected online communications. See, e.g., Stengart v. Loving Care Agency, Inc., 201 N.J. 300 (N.J. 2010) (employee could have reasonably expected that e-mail communications with her lawyer through her personal, password-protected, web-based e-mail account would remain private); Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 587 F. Supp. 2d 548 (S.D.N.Y. 2008) (employee had a reasonable expectation of privacy in personal, password-protected e-mail messages stored on a third party’s server, although the employee had accessed that outside server while at work).

Legal Approaches Continue to Develop

The Court note that a consistent approach hasn’t yet developed. While most courts hold that a communication is not necessarily public just because it is accessible there is disagreement as to how far that theory extends. Some courts have adopted the rule that when one shares private information to one or more persons, there may still be a reasonable expectation that the recipients of the information will not disseminate it further. What is clear is that privacy determinations are made on a case-by-case basis, in light of all the facts presented.

World Social Media Legal News Roundup

Newsmakers Q&A | Law slow to address workers’ social-media privacy
Columbus Dispatch

Colorado shooting: Public calls on Christian Bale to swoop in
Los Angeles Times

July 21, 2012, 12:04 p.m.. People are calling upon the caped crusader in the wake of the Colorado theater shooting with the 21st century bat signal: social media.

Afghan social media war steps up with new campaign
Reuters UK

And with the government mulling a media law to tighten its grip over the fledgling but lively Afghan press corps, Nai hoped social media could help safeguard political and social freedoms, as occurred during the wave of uprisings across the Middle East.

A social media win on merger
Philadelphia Inquirer

It’s a bracing lesson, on a local stage, in the power of social media to create community around an issue and ratchet up pressure on key players – in this case, the members of the Abington board and its president and CEO, Laurence Merlis. “It’s amazing to me just how fast word spread,” …. A community-conscious and activist community, with a high concentration of concerned, committed people who work in industries such as law, medicine, public relations, and journalism.

Valley reacts via social media regarding Colorado shooting
KGBT-TV

Once new information began streaming in about the shooting, over 100 viewers began responding to the Action 4 News Facebook page and Twitter feed. As the day progressed, over 500 comments came into valleycentral.com andAction 4 social media

Media Wise Parents to the rescue
Windsor This Week
Media Wise Parents helps parents, educators and churches become more aware with social media and the internet. Tweet · Bookmark and … It’s certainly in my background with law and marketing, it’s always something that interests me.

We Want To Hear From You: Take This Two-Minute Social Media Survey
Business Insider

This Is The Gun Used In The Colorado Shooting That Everyone Can’t Believe Is Actually Legal

In Focus: Social Media & Law Enforcement

Busted! Police Turn to Social Media to Fight Crime
CNBC.com (blog)

Law enforcement is taking to social media because criminals are changing their behavior and using social media to facilitate crime. In response, law enforcement officials are using it to track down criminals and as a predictive policing tool, said Haywood.

Role of Social Media in Law Enforcement Significant and Growing
Business Wire (press release)

WASHINGTON–(BUSINESS WIRE)–LexisNexis® Risk Solutions today announced the results of a comprehensive survey focused on the impact of social media on law enforcement in criminal investigations.

Police Make Wide Use Of Social Tools
InformationWeek (blog)

The survey, of more than 1200 law enforcement professionals with federal, state, and local agencies, found that 83% of the respondents are using social media, particularly Facebook and YouTube, to further their investigations.

Crime Busters Embrace Social Media
BusinessNewsDaily

It’s not just prospective customers, partners or employers who may be scanning the social media landscape to glean information about you and your organization. The long arm of the law has joined the party as well, a new survey shows.

How Law Enforcement Is Using Social Media (Infographic)
Law enforcement officials are using social media to solve crimes and will continue to do so in greater numbers. In an online survey conducted by LexisNexis Risk Solutions, four out of five law enforcement officials used social media.

Social Media Legal News Roundup

Into the data jungle – in association with Huron Legal
The Lawyer
Technological developments such as cloud computing, social networking and mobile apps mean EU law is no longer fit for purpose. The EU claims current laws often conflict and cost businesses a total of nearly £2bn a year.

Saudi Arabia considers law against insulting Islam
Bangladesh News 24 hours
JEDDAH, Saudi Arabia, July 16 (bdnews24.com/Reuters) – Saudi Arabia is studying new regulations to criminalise insulting Islam, including in social media, and the law could carry heavy penalties, a Saudi paper said on Sunday.

Mind the missteps in online job dance
Lawyers Weekly
With some background check firms specializing in social media searches (U.S.-based Social Intelligence Corp. for one), how do third-party recruiters use social media when screening or finding clients for law firms in Canada?

Saudi Arabia looking to criminalize Islam insults on social media
Bikya Masr
DUBAI: The Saudi Arabia government is looking to ensure users on social media networking sites do not insult Islam or the Prophet Mohamed, al-Watan newspaper reported on Sunday, citing officials who said a new law could bring “heavy” penalties.

Watching the detectives: the case for restricting access to your social media data
Delimiter
That debate tells us something about how Australians and the media conceptualise privacy and business-government relationships in a world where mobile phones and social network services such as Facebook are ubiquitous.

10 Tactics for Integrating Photographs into Content Marketing
Business 2 Community
Acquire digital rights for images. Remember when using images, especially photographs, your legal team is your best friend. Ensure that you’ve got the right to use the photos by incorporating outtakes and additional shots for social media.

Syracuse Neighborhood Watch plans to increase social media outreach
CNYcentral.com
New program coordinator plans more email, social media contact. … CNY Biz Central – Legal. Helpful advice about finding the right attorney for your legal needs. CNY Biz Central. Get information from our team.

Reasonable Expectations of Privacy in the Digital Age
Mondaq News Alerts (registration)
In this digital age of smart phones, global positioning systems, cloud computing, and social networking, determining what constitutes private information and what lengths our legal system will go to protect it is increasingly challenging.

Sale Of Digg Reminder Of Potential Risks To Facebook And Other Social Media …
Seeking Alpha
In 2011, social media watchers may recall reading in Bloomberg that Myspace, which had been purchased by News Corporation (NWS) for $580 million in 2005 had reportedly been sold for just $35 million to private investors, including Justin Timberlake. In …

Your Social Media Tweeting & Posting Legal Rights. TV … – YouTube
Find out how legally liable you are for your Twitter Tweets and Facebook postings.

Learn more about me here: www.ecommerceattorney.com and follow me here

Perfect Pitch: Who Am I? What Am I? Why Am I? Why You Merit Investment

Perfect Pitch™ A Strategy For Concise And Effective Communication Of The Idea Behind Your Business And Why You Merit Investment

©David M. Adler, All Rights Reserved

My recent attendance at TechWeek Chicago 2012 reminded me of advice that I used to provide to start-up and technology entrepreneurs. I have spent the last 15 years of my law practice advising entrepreneurs and businesses in varying stages of development. At some point, all growing businesses will need an infusion of capital. Sometimes this comes from “friends, family and fools.” Just as often it comes from professional investors such as Angels or Venture Capitalists. If you or your business needs additional capital to get to the “next level” whether that be development of a “proof of concept,” execution of the go-to-market strategy or strategic investment in new people or technology, you will need to convince the investor that your idea or business is relevant to the target market, achievable by the people and intellectual capital behind it, and likely to result in a substantial increase in value.

It has been my experience that many entrepreneurs or CEO pitch-men lose sight of the forest for the tress. All too often, the “pitch” or presentation only focuses on one thing. Usually, it focuses too heavily on the idea or the market and not enough on the people and strategy. On the other hand successful presentations seem to incorporate three basic, yet distinct concepts, what I call the tri-partite “Perfect Pitch.” In a nutshell the Perfect Pitch answers three questions: Who Am I? What Am I? Why Am I?

Who Am I? 

Answering this question tells investors about the people behind the idea. Every presentation should begin with a short, pithy and relevant description of the people and company, their history together and their qualifications for successfully commercializing this idea. For example: “John Doe, Jane Smith and Mary Jones each graduated in 2006 with a MBA from the Whoopity School Of Business. John has 5 years experience managing operations for a national retail chain. Jane has a 4 years experience as an assistant human resources manager for a Fortune 500 Company. Mary operated a small consulting business for 3 years before shutting down operations to pursue her MBA. Last year, they formed National Widget Sales Consultants (NWSC) as a Delaware LLC to capitalize on the emerging/growing/widening need for retailers to leverage the growing list of retail sales technologies.”

What Am I?

Answering this question tells the investor about the specific product or service offered and the revenue model. Put another way, answering this question tells investors what you do, how you do it and how you plan to make money. It never ceases to amaze me how many entrepreneurs forget the making-money part. They simply assume that advisors, investors and strategic partners will intuitively “get it.”

We won’t unless you tell us in plain and simple terms. If it is a product, does it stand alone or will it be incorporated into an end-product? Will it be sold wholesale, at retail, through VARs, through an inside sales team, or through an outside sales team, e.g. commissioned sales reps? How will the product be distributed? Will you have your own distribution? Will you piggy-back on another’s? Will you use a traditional courier, e.g., UPS or FedEx?

If it is a service, how will you market it? How will customers acquire it? Will it be licensed? How do you plan to keep customers coming back?

Continuing our previous example, “NWSC has created a proprietary and highly-customizable system that will be marketed and sold by an inside sales force. We will place consultants within our clients’ businesses to dissect their retail operations, identify operational and sales goals and evaluate which of the many technologies in the marketplace are the best fit for achieving those goals. NWSC generates revenue through consulting fees, commissions on technology sales and licensing the system to third-party business consultants.”

This is also the part of the presentation where you want to highlight the existence and commercial viability of any Intellectual Property including, Patents, Trademarks, Copyrighted content and Trade Secrets as well as proprietary technology or systems and methods.

Why Am I?

Now that you have convinced us that you are qualified to run this business and that you know how it will make money, you need to convince us how or why your idea meets existing or potential needs in the marketplace. Another common mistake I see is a focus on market size, penetration and growth. Yes, it’s true that VCs want to see Billion Dollar markets. But, more importantly, they want to know why your idea is going to penetrate that market and capture sales.

For example, is the market fragmented with no dominant provider? Are there segments of the market that are underserved by existing products/services? Put another way, what is your value proposition? Why will customers choose your product or service over their existing, entrenched ways of doing business? Again, don’t assume your audience will instinctively understand this. The more sophisticated the product or service, the more you will have to flesh out this value proposition.

The Bottom Line. 

While following the method outlined above is not guaranteed to land you that round of financing that you are after, it will no doubt help. Paying attention to answering these three simple questions will help keep you focused, keep you on message and provide a framework for answering the types of questions that your advisors, investors and strategic partners will be asking themselves. Good Luck!

PLEASE Forward, comment and follow me!

World Social Media Legal News Roundup

Law professor says social media can pose legal problems in Courtroom
Winnipeg Free Press
SASKATOON – The dean of law at the University of Saskatchewan says using social media can have negative consequences in the Courtroom – Business – Winnipeg Free Press.

Eight Ways Your Employee Social-Media Policy May Violate Federal law
AdAge.com (blog)
All employees have certain rights under federal law that social-media policies can’t restrict.

New Law to Force Identification of Trolls Set to be Unveiled
Technorati
Home / Social Media / Articles / New Law to Force Identification of Troll. … is behind the attacks on them online without having to resort to expensive legal action.

A blue wave of change Cleveland County law enforcers join move toward social media alerts
Norman Transcript
Lauri Stevens, a social media strategist at LAwS Communications, a Boston-area company, said law enforcement agencies nationwide are beginning to embrace social media.

Social media helped, hurt in hunt for suspect in triple shooting
Washington Post
Social media at times was a help, other times a hindrance in the search and eventual arrest of a suspect in the triple fatal shooting at an Alabama apartment complex.

Use social media, but use it responsibly, UAE conference hears
gulfnews.com
He said, “We do not monitor social media networks. People have the freedom to speak within the legal framework. There is no law specifically for twitter, but …

Police: Street gangs embrace social media, too
Kansas.com
Beard gave a presentation on gangs, the Internet and social media at last week’s Midwest Law Enforcement Conference on Gangs and Drugs, held in Wichita.

And…don’t forget to check out my presentation on the Law & Social Data panel at #TechWeek Chicago 2012.

The past few years have witnessed an explosion of legal and regulatory activity involving social and other new media. This session will examine several key areas, including copyright, trademark and related intellectual property concerns; defamation, obscenity and related liability; false advertising and marketing restrictions; gaming; data privacy issues presented by social media; and impacts of social media on employees and the workplace. Attendees will learn how to identify legal risks and issues before they become full-scale emergencies and how to develop appropriate policies and guidelines covering social media activity.

If you can’t make it, check out the Slideshare presentation here.

Mobile Privacy Standards Coming: U.S. National Telecommunications and Information Agency

Mobile carriers, app developers, and other technology stakeholders will meet with the U.S. National Telecommunications and Information Agency on July 12 to discuss privacy standards for mobile use. The focus of the discussion will be the privacy practices of mobile apps and their transparency.

Applications will be the main focus on July 12 when enforcement begins. The initial series of meetings will decide on rights, obligations and enforcement of online and mobile device security under President Obama’s virtual “Privacy Bill of Rights”.

The U.S. Department of Commerce’s National Communications and Telecommunication Administration (NTIA) has made the decision that it is now time to put the president’s Privacy Bill of Rights into effect. In order to get started, they have sent an invitation to all of the “privacy stakeholders” in order to “generate robust input” in the creation of the very first transparency code of conduct for consumer data collection and use.

The White House and Congress hopes that this discussion will eventually lead to a privacy bill of rights. July’s meeting will be webcast for the public.

Social Media & The Law: Recent Developments in Privacy, Security & Media

Statute Puts Online Libraries and Other Service Providers at Risk
Kansas City infoZine

A New Washington State Law Intends to Make Online Service Providers Criminally Liable For Online Postings. The Electronic Frontier Foundation (EFF) is representing the Internet Archive in order to block the enforcement of SB 6251, a law aimed at combating advertisements for underage sex workers but with vague and overbroad language that is squarely in conflict with federal law.

NLRB General Counsel Issues Further Guidance on Social Media
National Labor Relations Board (“NLRB”) is closely scrutinizing employer social media policies.

Legal issues in the media
Social Media Legal, Regulatory & Compliance: Risks & Issues Social Media Slideshare presentation.

Putting the Consumer Privacy Bill of Rights into Practice
Providing transparency in how consumer data is handled by mobile applications – this is the first topic for the National Telecommunications and Information…

US lawmakers propose digital bill of rights to safeguard privacy …
Two US lawmakers have proposed a digital bill of rights to safeguard consumer privacy rights and ensure internet freedom.

Stakeholders to Discuss Consumer Privacy Bill of Rights
The National Telecommunications and Information Administration (NTIA) will convene stakeholders July 12, 2012 in Washington, DC to develop a privacy code of conduct.