Social media legal issues: Advice for IT security pros

Social media legal issues: Advice for IT security pros

Social media legal issues: Advice for IT security pros

Date: Jul 24, 2012

In this video interview, David Navetta, an attorney and founding partner of the Information Law Group, discusses the social media legal issues that companies face when they, or their employees, use social media sites. These risks include data leakage if an employee shares too many details or disparages the competition on a social media site.

Regulatory compliance must also be considered when a company uses social media. Navetta provides sample situations in which a company could get into trouble with the FTC over its use of social media.

Navetta reminds IT security pros that using any type of social media means the company has entered into a contractual obligation with each social media site. It is important to understand the different terms and conditions of Facebook, Google Plus and other social media sites’ contracts. If the company or its employees do not adhere to the contracts, the social media sites can sue the company for breach of contract.

More on Social media security risks and real-time communication security

  • canderson

    Mobile malware and social malware: Nipping new threats in the bud

    VIDEO - Learn mobile and social media malware prevention tactics as contributor Lisa Phifer analyzes the malware risks of social media and mobile devices.
  • canderson

    Screencast: How to use WPScan to provide WordPress plug-in security

    VIDEO - Mike McLaughlin displays the abilities of WPScan and the simplicity the tool offers in assessing the security of WordPress plug-ins and avoiding related security vulnerabilities.
  • canderson

    Faceoff: Has social networking changed data privacy and security?

    VIDEO - In this exclusive conversation, security industry luminaries Hugh Thompson, founder of People Security, and Adam Shostack, author of "The New School of Information Security," discuss the state of social networking and data privacy, and why the social networking phenomenon may be an infosec ticking time bomb waiting to explode.
  • Can encrypted calling apps boost BYOD security?

    Answer - There are apps available that encrypt voice communications on smartphones and BYO devices, but are they really worth the investment? Expert Michael Cobb discusses.
  • How can vishing attacks be prevented?

    Answer - Enterprise threats expert Nick Lewis explains what vishing attacks are and offers best practices for defending against them.
  • Rogue IMSI catchers heighten enterprise cell phone security risks

    News - News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.

    ( Sep 19, 2014 )

  • The importance of social media compliance

    Answer - Social media compliance is not typically considered a big issue for companies, but expert Mike Chapple explains why it should be.
  • social login

    Definition - Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website. The sites most commonly associated with social login are Facebook, LinkedIn, Google and Twitter.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: