PR and Cybersmear Campaigns

Slides:



Advertisements
Similar presentations
Shipbuilding Intellectual Property Protection CESA/GuardSHIP Rotterdam, 4 February 2010.
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Developed by Technology Services 1:1 Laptop Initiative
John D. Gregory Ministry of the Attorney General (Ontario) October 29, 2012.
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
Target Data Breach – Cost of the Learning Curve Discuss the recent Target data breach and its impact on the industry as well as individuals January 29/30,
Social Media in the Physician Practice Setting. Objectives 1. Review the types of social media available for communication with patients. 2. Explain the.
Wiredsafety.org  The world’s largest online safety and help group, including: –WiredPatrol.org –WiredKids.org –Cyberlawenforcement.org  Provides education,
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
1 Social Media: Strategy and Implementation Are you protected? Amy D. Cubbage & Cynthia L. Effinger.
RahulMIN KU WHAT TO DO IF CYBER-BULLYING OCCURS Firstly protect your number- only give it to friends and don’t leave your mobile where others can.
Social Media Listening Campaigns Intrapromote Introduction.
Reputation Monitoring & Management When Blogs and Forums Attack! Presented by Andy Beal
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
The proliferation of social media Word of Mouth– before and after… Crisis communication networks– Nature article.
Media relations, budgeting & publics Media relations will have the biggest impact on the success or failure of your public relations program. Despite advances.
Licensing & Regulation Division Senior Sergeant Brett Kahan Presentation to the Association of Investigators & Security Professionals.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
EPR-Public Communications L-05
The need for global approach to child online protection Dr. Mona Al-achkar Jabbour Pan Arab Observatory for cyber security October.
Preventing and Managing a Crisis. Overview This session will cover how to: Develop a crisis communications plan Prevent crises Prepare for crises Implement.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
Best Practice Investor Relations What it takes to develop an effective Investor Relations strategy Claire Fargeot.
1 IPRA International Public Relations Association - an introduction.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
17 September 2015 Privacy and the New Media. 17 September 2015 New media Websites Blogs Social media.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
WFE Workshop on Leadership & Communications “What action – corporate communication roundtable” Tokyo Stock Exchange Group, Inc. February
Presentation to Senior Management MiFID for Senior Managers Introduction These slides introduce the big changes for senior management from MiFID.
Chapter Eleven Crisis Communications and Public Relations Messages McGraw-Hill/Irwin Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Conducting Regulatory Investigations September 28, 2012 Ottawa, Canada Richard Leblanc, PhD.
Internal Investigations: A primer Bob Cooper May 30, 2007.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
IR is all about…... First Impressions are Paramount. WHY?
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
1 Chapter 9 Public Relations. 2 Public Relations Planning Background Situation Analysis Background Situation Analysis PR Plan Objectives Strategies Execution.
Directors’ Duties in the On-line Environment Simon Rubenstein Solicitor ASIC.
Presented by Jarrod Roark Director – Advanced Infrastructure Bennett Adelson.
Corporate Ethics Programs What are they? A systematic approach to raise employees’ ethical awareness –By education –By providing resources to identify.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Legal framework Look at the legal compliance and framework a business is subject to.
What is Cyber-Bullying? “Cyber-Bullying” is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted.
Crisis Management. How to avoid a crisis  Stay on top of everything within your company  Listen to everything and always think how situations can turn.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
GATE SAFETY WEEK 10 th – 16 th OCTOBER GUIDANCE FOR POWERED GATE GROUP MEMBERS KEEPING THE NATION SAFE How DHF Powered Gate Group members can lend their.
INTERNAL AUDIT BRIEFING Business Objectives Business Objectives: What are they and how are they used?
Strategic Communications Training Crisis Communications X State MDA 1.
O nline R eputation. Paris Brown She was 17 She was 17 From Kent From Kent She was Britain’s first youth crime commissioner She was Britain’s first.
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Law Firm Data Security: What In-house Counsel Need to Know
Information Security Program
CYBER BULLYING.
MANAGING intellectual property ASSETS
Data Minimization Framework
Using Social Media in the University Setting
GOSSIP and CYBERBULLYING
Privacy and Security in the Employment Relationship
GOSSIP and CYBERBULLYING
Neil Kirton and Zoë Newman
Introduction to Digital Forensics
Anatomy of a Common Cyber Attack
Presentation transcript:

PR and Cybersmear Campaigns How to avoid and fight online reputation attacks against your clients…what every PR professional needs to know Parry Aftab, Esq. parry@aftab.com 201-463-8663 For NETA Communications Council November 16, 2005

What is a cybersmear campaign? It’s an organized campaign designed to intimidate, harass or adversely affect the reputation of a company or representative of that company It may start out innocently or as an angry communication, but builds to have a potentially serious affect on the business, operations or reputation of the company or its representatives It may start out small and build with the help of unwitting accomplices manipulated into supporting the campaign

How does it work? Rumors and innuendo Stock manipulation Personal attacks and harassment Cyberstalking and cyber-harassment Posing and impersonation Cybersmear by proxy Communications with key stakeholders Anonymous defamatory statements Getting competitors and regulators involved

Cybersmear and the Law Defamation TOS violations, acceptable use policy violations Cyberstalking and harassment SEC violations Regulatory violations False light and common laws Intellectual property crimes and violations Hacking, cyber-espionage, unfair trade practices and fraud…Oh! My!!

What can anyone do about it? The best time to consider this is BEFORE it occurs Create a cyberattack committee or team Keep a cyber-eye out for anything posted online about your company, key executives and employees and products Alert your IT people to watch for SPAM referencing any of the above Terminate access for any problematic employees, agents and contractors Monitor employee communications and set rules about permitted and inappropriate technology uses Google your company and watch the blogs (feedster.com and other similar service)

The role of the PR professional in protecting the reputation of the client PR is crucial and should help lead in these issues PR must be a member of the cyberattack team and help identify crisis spokespeople PR must maintain credibility with industry and mainline media and press PR must deliver the message positively, without feeding the misinformation PR needs to be well-informed about the company’s operations, businesses and strategies PR needs a good working relationship with legal and IT, as well as management PR needs to identify possible breaches and targets PR has to think like an attacker…how would you attack reputations and business?

Anatomy of a cybersmear Sounds plausible Builds on provable facts and statements Relies on anonymity of the attacker Relies on the gullibility of certain media and others online, like influential bloggers Gives a suggested outcome and suggested places to launch attacks Targets key stakeholder within and without

Things you can do in advance… Register the URL of all permutations of your brands Register all permutations of your brands in blogging services Register all of the above with “bash,” “hates,” “sucks” or similar terms Get online and after-hour contact information for media, press and key stakeholders – analysts and shareholders, major ISPs, and police Inform senior management and unions, as well as board members of the possibility of cybersmear and what to do if contacted Put in systems to collect evidence and work with IT on tracing methods and with legal on subpoena execution

Selling it to Management Find ways to prove the value to management – upside and downside Fear and greed motivate Find the ROI, get legal, HR, risk managers and IT on your side Do some research Do some sensitivity training on online reputation risks – tie it to cyberharassment and cyberbullying in the media

Cyberattack Team Make-up PR Legal, consumer relations and HR Brand managers Marketing IT and website/services management Insurance and risk managers Corporate communications (if separate from PR) Senior management and at least one board member

Understanding the Cyber-Breadcrumbs Everyone leaves behind an IP address Static and dynamic IP addresses Civil subpoena or law enforcement subpoena process Preserving the records How to read a header – what it shows

Things to think about Insuring the risk Early warning systems with IT and HR If monitoring employees, check with unions Tracking news releases about your client Holding seminars and workshops within the company to raise awareness Learning more about the problem

To contact me or for more information parry@aftab.com www.Aftab.com www.ThePrivacyLawyer.blogspot.com The Privacy Lawyer column for Information Week Magazine (informationweek.com) 201-463-8663