The Legal Implications of Social Networking Part Three: Data Security
by David Navetta, InformationLawGroup, January 9, 2012
Summary: In 2011, InfoLawGroup began its “Legal Implications” series for social media by posting Part One (The Basics) and Part Two (Privacy). In this post (Part Three), we explore how security concerns and legal risk arise and interact in the social media environment. There are three main security-related issues that pose potential security-related legal risk. First, to the extent that employees are accessing and using social media sites from company computers (or increasingly from personal computers connected to company networks or storing sensitive company data), malware, phishing and social engineering attacks could result in security breaches and legal liability. Second, spoofing and impersonation attacks on social networks could pose legal risks. In this case, the risk includes fake fan pages or fraudulent social media personas that appear to be legitimately operated. Third, information leakage is a risk in the social media context that could result in an adverse business and legal impact when confidential information is compromised.
Dr. Lea Shanley is the founder and former co-Chair of the Federal Community of Practice on Crowdsourcing and Citizen Science, a vibrant community of 200 federal employees from more than 35 agencies. She is also a co-founding member of the Citizen Science Association. Dr. Shanley recently served as a Presidential Innovation Fellow at NASA, where she helped to foster a culture of open innovation. Prior to this, she founded and directed the Commons Lab at the Wilson Center, served in the US Senate as a Congressional Science Fellow, and worked with local and tribal communities to develop GIS-based decision support systems for city planning, natural resource management, coastal management, and disaster response through the University of Wisconsin-Madison.
Disclaimer: This is a personal blog of links to relevant news, events, and reports, provided for educational purposes only. The opinions and views contained therein are those only of the authors of the original articles. These opinions do not necessarily reflect those of the editor of this blog or or associated organizations.
Error: Twitter did not respond. Please wait a few minutes and refresh this page.
- RT @BioCollectives: .@WIRED @m_e_rhodes Great Read on #SidewaysDictionary by #Google tech incubator - The price of using analogies? @TheWil… 2 years ago
- RT @BioCollectives: Don’t know what a honeypot is? This plug-in uses analogies to make security terms totally understandable https://t.co/4… 2 years ago
- 137,038 hits