Www.garfunkelwild.com Document Number© 2015 GARFUNKEL WILD, P.C. Protecting Online Reputations: Surviving and Prospering in the Online World October 15,

Slides:



Advertisements
Similar presentations
REFINING YOUR DISCOVERY TACTICS: A PLAINTIFF PERSPECTIVE Amanda A. Farahany Barrett & Farahany, LLP 1401 Peachtree Street, Suite 101 Atlanta, GA
Advertisements

FINEMAN KREKSTEIN & HARRIS EFFECTIVE CLAIMS HANDLING Presented to: FIRST KEYSTONE RISK RETENTION GROUP, INC. Presented by: Jay Barry Harris, Esquire &
Remedies Against Govt Defendants – Some Basics 11 th amendment bars suits against the State, unless Lawsuit is against state officer in their official.
TOPIC 7: SHAREHOLDERS’ RIGHTS AND REMEDIES….contd
A WHOLE NEW WORLD OF SETTLING CASES: PART II Donald Patrick Eckler December 23, 2013.
Chapter 8.  A civil action relates to an act or omission that infringes the rights of a person, group or government instrumentality and seeks to return.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
F L O R I D A D E P A R T M E N T O F B U S I N E S S A N D P R O F E S S I O N A L R E G U L A T I O N Division of Regulation Complaint Process Division.
HB1695 and HB1540 Legislative Update 2010 The Missouri Bar Solo and Small Firm Conference Jason Lamb Office of Prosecution Services.
© 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 3 Litigation and Alternative Dispute Resolution Chapter 3 Litigation and.
Alternative, Judicial, and E-Dispute Resolution
Legal Liability under the Digital Millennium Copyright Act and the Communications Decency Act Presented by Daliah Saper Saper Law Offices, LLC.
© 2015 McGraw-Hill Education. All rights reserved Law A body of regulations that govern society and that people are obligated to observe Sources.
Litigation and Alternatives for Settling Civil Disputes CHAPTER FIVE.
Social Media: Battling the Modern Day Medusa Chad Ray Donnahoo Campbell Shatley, PLLC 674 Merrimon Ave., Suite 210 Asheville, NC 28804
Chapter 3 Tort Law.
Judicial Review. Basic Requirements Court must have jurisdiction Plaintiff must state a recognized cause of action and seek a recognized remedy This is.
Page 1 County of Los Angeles Corrective Action Plan Program Enhancements John Sterritt CEO Risk Management.
Advanced Civil Litigation Class 6Slide 1 Steps in Filing a Complaint First, the necessary complaint must be prepared. Make sure you attach the: First,
ISP Liability for Defamation and Copyright Violation Richard Warner.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Tort Liability in New Media Steve Baron Nov. 2, 2010.
SEMINAR NAIC/ASSAL/SVS REGULATION & SUPERVISION OF MARKET CONDUCT © 2014 National Association of Insurance Commissioners Complaint Handling.
Lecturer: Miljen Matijašević Session 7.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Defamation and the Communications Decency Act Jennifer.
The New Legal Landscape for Event Industry Social Media Kathryn Carrier, Esq. © 2011 Katy Carrier.
A Review of Board of Health Liability James A. LeNoury LeNoury Law Counsel to alPHa February 5th, 2015.
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
Planning an Audit The Audit Process consists of the following phases:
Tort Liability in New Media Steve Baron April 2, 2009.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Chapter 4 Alternative, Judicial, and E- Dispute Resolution.
Court Procedures Chapter 3.
Public law governs:  relationships between individuals and the state/government; and  the structure, administration and operation of the state/government.
1 Welcomes You To It’s Those Wonderful Rights! Welcome To read the script that goes with each slide, click on the Notes tab (to the left of this screen).
Chapter 4.  Litigation: The process of bringing, maintaining, and defending a lawsuit  Pretrial litigation process can be divided into:  Pleadings.
Chapter 3 Judicial, Alternative, and E-Dispute Resolution
Internet Content Liability David S. Bralow CUNY October 15, 2012.
LS 500 Unit Nine Town Hall Saturday, February 11, 2012 John Gray Welcome! Are there any questions about the material.
Access to Judicial Review Part II. 2 Procedural Injury In Lujan, the procedural violation was the failure of the agency to do an inter-agency consultation.
Section 1-5 Resolving Consumer Problems. Registering a Complaint Need to: – State the problem clearly – Decide the outcome you desire – Gather all relevant.
Illinois Action for Children Media 101: Making the Press Work for You.
Mediation with the Information Commissioner’s Office Cory Martinson Appeals and Policy Analyst 25 November 2009.
Civil Law U.S. Government Chapter 15 Section 2.  Why would someone bring a lawsuit against another person, a business, or an organization? List 2-3 reasons.
Winning Contract Disputes Mark P. Henriques Vivian Coates November 12, 2015.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Civil and Criminal Law.
The Internet and freedom of expression law Training workshop on media and freedom of expression law.
Copyright Tips for Presenting at SOA Meetings & Webinars January 2016.
DOW JONES & CO. INC. v GUTNICK International Business Law Spring 2012 Presenter: Sang Mi CHO Jin Hwa LEE.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
Agents of Harm or Agents of Grace The Legal and Ethical Aspects of Identifying Harm and Assigning Responsibility in a Networked World By Thomas A. Lipinski,
Customer Service Charter Introduction About SIMWEN A simulated work environment that will enable the student to complete 8 of the 10 units in Certificate.
CIVIL PROCEDURE FALL 2003 CLASS 3 (8/29/03) STAGES AND ESSENTIAL CONCEPTS OF A CIVIL ACTION Columbus School of Law The Catholic University of America Professor.
Table of Contents. Lessons 1. Criminal Law Go Go 2. Civil Law and Torts Go Go 3. Civil Law and Contracts Go Go.
Defamation: Common-Law Defenses and Privileges 1. The Truth Defense 2. Absolute Privileges a. Judicial Proceedings b. Legislative Business c. Executive.
The U.S. Legal System Module 1 NURS Summer II
GOVERNMENT LAWYER’S REPRESENTATION OF GOVERNMENT EMPLOYEES Craig E. Leen City Attorney City of Coral Gables *** With special thanks to Yaneris Figueroa,
THE PARALEGAL PROFESSIONAL PA101 Unit 3 Seminar. Discussion Board Tips Most units have more than 1 DB assignment - posting to each DB assignment is required.
Building the Defense of a Product: Taking a Technical Approach
PRE-SUIT CONSIDERATIONS
Administrative law Ch1 scope and Nature of Administrative Law.
Civil Pre-Trial Procedures
DOW JONES & CO. INC. V GUTNICK
Civil Pre-Trial Procedures
Tort Liability in New Media
Chapter 3 Judicial, Alternative, and E-Dispute Resolution
Nuisance – Elements Nuisance is the cause of action you use when someone is interfering with your right to enjoy your property; but trespass is not applicable.
Disability discrimination claims against the DWP: a sample from DPG
Presentation transcript:

Document Number© 2015 GARFUNKEL WILD, P.C. Protecting Online Reputations: Surviving and Prospering in the Online World October 15, 2015 Presented By: Kevin G. Donoghue Garfunkel, Wild P.C. (516)

2Document Number© 2015 GARFUNKEL WILD, P.C. Presentation Overview Investigating the Online Attack and Developing a Strategy to Address It Investigating the Online Attack and Developing a Strategy to Address It Implementation: Executing the Plan and Achieving Results Implementation: Executing the Plan and Achieving Results Case Studies Case Studies

3Document Number© 2015 GARFUNKEL WILD, P.C. Investigating the Online Attack and Developing a Strategy to Address It

4Document Number© 2015 GARFUNKEL WILD, P.C. Investigating the Online Attack Who is attacking you? Who is attacking you? What type of online attack is it and where is it located? What type of online attack is it and where is it located? Fact gathering at the outset is crucial to developing an effective, cost-efficient plan Fact gathering at the outset is crucial to developing an effective, cost-efficient plan

5Document Number© 2015 GARFUNKEL WILD, P.C. Developing a Strategy to Address the Online Attack Be very aware of anyone who offers to assist by rushing to the simple, cookie- cutter “quick fix” Be very aware of anyone who offers to assist by rushing to the simple, cookie- cutter “quick fix” The proposed strategy will be driven by the underlying facts The proposed strategy will be driven by the underlying facts Many issues factor into approach to be taken Many issues factor into approach to be taken

6Document Number© 2015 GARFUNKEL WILD, P.C. Developing a Strategy to Address the Online Attack The protocols, if any, to which the website in question adheres The protocols, if any, to which the website in question adheres Review website’s Terms of ServiceReview website’s Terms of Service Identify those provisions of the Terms of Service that are violated by the online attackIdentify those provisions of the Terms of Service that are violated by the online attack

7Document Number© 2015 GARFUNKEL WILD, P.C. Developing a Strategy to Address the Online Attack Other considerations Other considerations Client ConcernsClient Concerns Economic costs to client Economic costs to client Noneconomic costs to client Noneconomic costs to client Client’s tolerance for risk Client’s tolerance for risk Legal ConcernsLegal Concerns Jurisdictional issues Jurisdictional issues Timing of claim – statutes of limitations Timing of claim – statutes of limitations Strength of potential claims Strength of potential claims Quantifying damages Quantifying damages

8Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results

9Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results A note on removal of online content versus driving down or otherwise managing content A note on removal of online content versus driving down or otherwise managing content

10Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results Removal approaches generally fall into one or more of the following categories: Removal approaches generally fall into one or more of the following categories: Reach out to the online attacker – either amicably or by way of a cease and desist letterReach out to the online attacker – either amicably or by way of a cease and desist letter Reach out to the websiteReach out to the website Pursue a judicial remedyPursue a judicial remedy

11Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results ”You can catch more flies with honey than vinegar.” Reaching out to the online attacker Reaching out to the online attacker Clients often know or have a strong suspicion as to who the online attacker is Clients often know or have a strong suspicion as to who the online attacker is If there is a chance to amicably communicate with the attacker, client or counsel can do so If there is a chance to amicably communicate with the attacker, client or counsel can do so Goals are to try to understand attacker, find a way to resolve attacker’s complaint, and to ask attacker to remove damaging online content Goals are to try to understand attacker, find a way to resolve attacker’s complaint, and to ask attacker to remove damaging online content

12Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results When you are not catching any flies with honey… Sending the Cease and Desist Letter Sending the Cease and Desist Letter If amicable solution is not possible, then client or counsel can send a Cease and Desist letter If amicable solution is not possible, then client or counsel can send a Cease and Desist letter Always remember the Hippocratic Oath of Online Attacks – First Do No Harm Always remember the Hippocratic Oath of Online Attacks – First Do No Harm Be prepared to have the Cease and Desist letter posted for all to see – understand that there is more than one target audience Be prepared to have the Cease and Desist letter posted for all to see – understand that there is more than one target audience The major approaches to Cease and Desist letters The major approaches to Cease and Desist letters

13Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results Reaching out to the website Reaching out to the website Understanding the lay of the land – the uphill battle in the world of the Communications Decency ActUnderstanding the lay of the land – the uphill battle in the world of the Communications Decency Act

14Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results Section 230 of the Communications Decency Act (“CDA”) is a groundbreaking piece of Internet legislation in the United States, codified at 47 U.S.C. § 230. Section 230(c)(1)47 U.S.C.§ 230 CDA provides immunity from liability for providers and users of an "interactive computer service" who publish information provided by others

Implementation: Executing the Plan and Achieving Results The CDA provides that no provider of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider 15Document Number© 2015 GARFUNKEL WILD, P.C.

Implementation: Executing the Plan and Achieving Results When analyzing the availability of the immunity offered under the CDA, Courts very often apply a three-part test. All three must be met to obtain immunity. The defendant must be a provider of an "interactive computer service." The cause of action asserted by the plaintiff must treat the defendant as the "publisher or speaker" of the harmful information at issue. The information must be "provided by another information content provider," i.e., the defendant must not be the "information content provider" of the harmful information at issue. 16Document Number© 2015 GARFUNKEL WILD, P.C.

17Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results The Good News About Communications Decency Act Immunity… The Good News About Communications Decency Act Immunity… Can be used as both a sword and a shield by providers of interactive computer services because the statutory immunity applies whether content is left online or taken downCan be used as both a sword and a shield by providers of interactive computer services because the statutory immunity applies whether content is left online or taken down

18Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results Reaching out to the website Reaching out to the website Know the website that you are approachingKnow the website that you are approaching Review Terms of Service for the websiteReview Terms of Service for the website Prepare a credible and persuasive explanation as to why the content must be taken downPrepare a credible and persuasive explanation as to why the content must be taken down

19Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results Reaching out to the website (continued) Reaching out to the website (continued) Identify the right person and try to speak with him or her by phoneIdentify the right person and try to speak with him or her by phone Put in writing to website only after trying to contact by phonePut in writing to website only after trying to contact by phone Rely upon not only Terms of Use but also common sense and emotional appealsRely upon not only Terms of Use but also common sense and emotional appeals If complete removal by the website is not going to occur, try to pursue other optionsIf complete removal by the website is not going to occur, try to pursue other options

20Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results Going to Court – pursuing a judicial remedy Going to Court – pursuing a judicial remedy Commence a lawsuit against online attacker (not the website) for defamation, business tort, and other possible claimsCommence a lawsuit against online attacker (not the website) for defamation, business tort, and other possible claims Obtain an order or judgment from Court finding that online content is defamatory or otherwise illegalObtain an order or judgment from Court finding that online content is defamatory or otherwise illegal Bring court order / judgment to websites and / or to search engines asking that they take down offending content or links theretoBring court order / judgment to websites and / or to search engines asking that they take down offending content or links thereto

21Document Number© 2015 GARFUNKEL WILD, P.C. Implementation: Executing the Plan and Achieving Results Going to Court – pursuing a judicial remedy (continued) Going to Court – pursuing a judicial remedy (continued) In those cases when client cannot identify the online attacker, commence legal proceedings in order to serve a subpoena on websites, and possibly also on internet service providers, to obtain identity of online attackerIn those cases when client cannot identify the online attacker, commence legal proceedings in order to serve a subpoena on websites, and possibly also on internet service providers, to obtain identity of online attacker

22Document Number© 2015 GARFUNKEL WILD, P.C. Case Studies

23Document Number© 2015 GARFUNKEL WILD, P.C. Case Studies Online Attacks of New Jersey Medical Group Online Attacks of New Jersey Medical Group Difficult and aggressive patient, multiple posts on numerous websites, successful handling of matter through website contacts alone Difficult and aggressive patient, multiple posts on numerous websites, successful handling of matter through website contacts alone Multiple Online Attacks on Surgeons in New York Medical Practice Multiple Online Attacks on Surgeons in New York Medical Practice Approached the patient first, then websites, then turned to legal proceedings against patient, including engaging cyber investigation services firm, that resulted in resolution Approached the patient first, then websites, then turned to legal proceedings against patient, including engaging cyber investigation services firm, that resulted in resolution

24Document Number© 2015 GARFUNKEL WILD, P.C. Q & A Session

Document Number© 2015 GARFUNKEL WILD, P.C. Thank you for attending Protecting Online Reputations: Surviving and Prospering in the Online World presented by Kevin G. Donoghue Garfunkel, Wild P.C. (516)