Ogletree, Deakins, Nash, Smoak & Stewart PC

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
Peter Francis Partner at FAL Lawyers Peter Francis Partner at FAL Lawyers.
Αθανάσιος Θ. Κοσμόπουλος Νομικός Προϊστάμενος Μονάδας Δ ’ Ειδική Υπηρεσία ΕΠ Ψηφιακή Σύγκλιση.
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Using Technology the CCSD Way by Dr. Kathi Vanderbilt.
Boyertown Area School District Acceptable Use Policy.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
1 Twitter This: Social Media & Hospitals Jenna Mooney, Partner Ingrid Brydolf, Partner.
INTERNET and CODE OF CONDUCT
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Electronic Use Policies.   Social Media  Internet.
Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
00870B2F.0/Internet%20Safety.jpg.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich Copyright.
Monitoring Employees on Networks: Unethical or Good Business?
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
© 2004 SHRM SHRM Weekly Online Poll: March 9, 2004 Trade Secrets Analyzing 247 responses of s sent, 1622 received (response rate = 15%). Fielded.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Use: Policies to Enhance Employee Productivity Elizabeth A. Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Restricted © Siemens AG All rights reserved Trade Secret Qu Xiaoyang, Director of Intellectual Property | Dec
©2012, Mika Meyers Beckett & Jones PLC All Rights Reserved Michigan Association of Educational Data Systems Presented by: Jennifer A. Puplava Mika Meyers.
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
Moscow, Russia, 10 September 2012 HSE Intellectual Property Policy Aliya Ermakova, Head of IP Department, Innovation and Enterprise Office, HSE
December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.
INTERNET SAFETY.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Legal framework Look at the legal compliance and framework a business is subject to.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Protecting your Managed Services Practice: Are you at Risk?
Social Media Policies: What Employers Can and Cannot Do Thomas D. Rees, Esq. High Swartz LLP February 23,
HR Compliance Unit 6: Handbooks. Overview Practical handbook advice Top ten handbook issues for independent schools Quiz questions Questions from the.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Don’t get Burned: How to Protect Your Intellectual Property
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Confidentiality October 14, 2005.
Internet Safety and Acceptable Use Policies.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
Essentials of the legal environment today, 5e
Personal Social Media and Technology Use Policy
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
UC Riverside Chairs 201 Workshop
Presentation transcript:

Ogletree, Deakins, Nash, Smoak & Stewart PC Danielle Ochs Shareholder Ogletree, Deakins, Nash, Smoak & Stewart PC Danielle.ochs@ogletreedeakins.com

Policies - Procedures - Training - Enforcement Employers Can Protect Themselves Against Misuse Policies - Procedures - Training - Enforcement

Digital Media/ Internet Policies and Procedures No ownership of work by employee for employer - belongs to employer (work for hire) No unauthorized digital uploading, posting, blogging or sharing of employer-owned content, trademarks and logos for commercial purposes (even if information not confidential) No unauthorized downloading of 3rd party digital content for work-related purposes No unauthorized integration of 3rd party content into employer work product No unauthorized installation of software, applications, or media players No work-related digital conduct /content and device use inconsistent with employer rules “Authorization” requires transparency and knowledge of and compliance with applicable copyright, trademark, patent and other employer and intellectual property laws, rules, and regulations

Dos and Don’ts Do determine personal / work time use policy (“no personal use” vs. modest use) Do prohibit unauthorized digital speech on behalf of the Company Do prohibit knowingly false digital speech about the Company Do prohibit obscenities, threats, pornography, harassment, discrimination, and bullying Do require work-related testimonials, endorsements, “friending” and “likes” to comply with rules and law Do advice no expectation of privacy - reporting obligations – threat of personal criminal & civil liability Don’t allow employees to register company email on non work-related social media sites Don’t allow managers to share content unless legitimate business necessity / purpose Don’t otherwise interfere with right to speak or concerted activity

Training and Enforcement – Generally Employees should understand difference between copyrights, trademarks, trade secrets, and patents Employers should convey importance of IP protections -provide examples of digital outlets /content that raise issues

Training and Enforcement – Specifically Review policies and procedures at beginning of employment Document receipt of policies with written acknowledgments Train employees on policies annually Monitor internet traffic (technology available) Enforce policies by coaching / disciplining violators (but be consistent)

Thank you