AUSTIN, Texas — A divided House vote provides momentum for Texas employees who wish to shield personal text messages, email passwords under a bill backed by Democratic State Rep. Hellen Giddings and given preliminary approval Thursday.
Proponents say Texas workers need the same social media protections provided in several other states. The bill prohibits employers from asking job applicants or employees for passwords to access their Facebook, Twitter or other personal accounts. Opponents argue it will provide “safe harbor” for employees to steal proprietary information at the workplace through their personal accounts.
No specific penalties are spelled out for employers who would violate the law.
The Texas law is another reminder of the ongoing evolution of Social Media law and regulation as legislators and private businesses struggle to understand how these technologies affect everyone’s rights, obligations and remedies.
If you or your business is concerned about social media legal and regulatory compliance, contact David Adler at Leavens, Strand, Glover & Adler. 866-734-2568 firstname.lastname@example.org.
I’m surprised at how often I receive commercial bulk email messages that are not compliant with the Federal CAN SPAM act.The two biggest mistakes I see are 1) no physical address and 2) no opt-out/unsubscribe mechanism.
Another common mistake is a “blind” bulk email address list like “Undisclosed-Recipients@email.com.” Not only do I NOT know which address this received the offensive message, there usually isn’t even a proper return address for me to send an “Unsubscribe” message.
With the popularity of social media, you’ve probably received a Twitter promotion for iPhones, special deals, free downloads, etc. While it’s easy to dismiss poorly-written tweets from obvious spammers, when someone replies to you on Twitter, says “must read, check it out” and the topic is clearly the kind of thing you read and share it’s more difficult to tell. Often, these are from legitimate accounts where a human has taken the time to compose and send the message.
In light of the growing use of electronic mail (“email”) messages for advertising, marketing, corporate communications and customer service, is essential to have some familiarity with the Federal “Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003” also known as the CAN SPAM Act (the “Act”) The Act provides the parameters of its application, explicit prohibitions, requirements for transmission of legally compliant email messages including the “Opt-Out” mechanism and vicarious liability. Generally speaking, the Act was written to prohibit the fraudulent, deceptive, predatoryand abusive practices that threaten to undermine the success and effectiveness of commercial email and email marketing.
Congress drafted the Act to impose limitations and penalties on the transmission of unsolicited commercial email messages. Unlike some state initiatives, the Act is an “opt-out” law. Put another way, for most purposes permission of the e-mail recipient is not required. However, once an email recipient has indicated a desire to opt-out or no longer receive such messages, failure to comply with the recipient’s request may subject both the sender and the person or entity on whose behalf the message was sent to severe penalties.
Frequently asked question about the Act include:
1) To Whom Does The Act Apply? The Act applies to any person or entity that sends email.
2) What Activities Are Prohibited By The Act? The Act is primarily concerned with explicitly prohibiting certain predatory and abusive commercial email practices.
3) What Are The Requirements For Sending Email Messages? Section 5(a) of the Act sets requires the inclusion non-misleading information regarding: (a) transmission, (b) subject, (c) email address, (d) Opt-out and physical address, and (e) clear and conspicuous language identifying sexually-oriented messages.
4) Who Can Be Liable for Violations? The Act applies to both the party actually sending the commercial email messages and those who procure their services.
The primary substantive provisions of the Act can be divided into three parts found in Section 4, Section 5 and Section 6. Section 4 of the Act addresses “predatory and abusive” practices prohibited by the Act. Section 5 details the requirements for transmission of messages that comply with the Act. Section 6 details the requirements for transmission and identification of sexually-oriented messages. Section 6 is not discussed in this article.
Section 4 of the Act lists specific “predatory and abusive” practices prohibited by the Act. In short, the Act specifically prohibits: (i) accessing a computer without authorization for the purpose of initiating transmission of multiple commercial email messages, (ii) transmission of multiple commercial email messages with the intent to deceive or mislead recipients, (iii) transmission of multiple commercial email messages with materially false header information, (iv) registration of email accounts or domain names using information that materially falsifies the identity of the actual registrant, and (v) false representations regarding the registration of Internet Protocol addresses used to initiate multiple commercial email messages.
The second relevant part, set forth in Section 5 of the Act, details the requirements for transmission of messages that comply with the Act. Subject to certain limitations discussed below, the Act requires that email messages contain: (i) transmission information that is not materially false or misleading, (ii) subject information that is not materially false or misleading, (iii) a return address or comparable mechanism for opt-out purposes, (iv) identifier, Opt-out and physical address, and (v) clear and conspicuous language identifying sexually-oriented messages as such. (Note, this last requirement is not discussed. See above.) Lastly, the Act implicates both commercial email transmission service providers as well as those who procure their services.
To Whom Does The Act Apply?
The Act applies to any person or entity that sends email. The Act specifically regulates “commercial electronic mail messages,” defined as any email message “the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose).” However, the Act specifically excludes from this definition “transactional or relationship messages.” A “transactional or relationship message” falls within one of five categories of messages:
communications that facilitate, complete or confirm a commercial transaction previously agreed to by the recipient;
communications that provide warranty or other product information with respect to a product or service previously used or purchased by the recipient;
notifications with respect to a subscription, membership, account, loan, or comparable ongoing commercial relationship;
information directly related to an employment relationship or related benefit plan in which the recipient is currently involved; and
communications to deliver goods or services, including product updates or upgrades, under the terms of a transaction previously agreed to by the recipient.(Emphasis added.)
The purpose for the distinction between “commercial electronic mail messages” and “transactional or relationship messages” is to exempt certain types of communications from compliance with all the message transmission requirements of the Act. As should be clear from the list above, the Act distinguishes the types of communications based on the relationship between the sender and recipient rather than on the character of the message. Put another way, so long as the communication is related to some type of existing business relationship, it is not a “commercial electronic mail message.”
What Activities Are Prohibited By The Act?
Section 4 of the Act is primarily concerned with prohibiting certain predatory and abusive commercial email practices. Section 4(a) amends Chapter 47 of Title 18 of the United States Code by adding Section 1037 which specifies the offenses that constitute “fraud and related activity in connection with email.” An offense is committed by anyone who directly or indirectly, knowingly:
accesses a protected computer without authorization, and intentionally initiates the transmission of multiple commercial electronic mail messages from or through such computer,
uses a protected computer to relay or retransmit multiple commercial electronic mail messages, with the intent to deceive or mislead recipients, or any Internet access service, as to the origin of such messages,
materially falsifies header information in multiple commercial electronic mail messages and intentionally initiates the transmission of such messages,
registers, using information that materially falsifies the identity of the actual registrant, for five or more electronic mail accounts or online user accounts or two or more domain names, and intentionally initiates the transmission of multiple commercial electronic mail messages from any combination of such accounts or domain names, or
falsely represents oneself to be the registrant or the legitimate successor in interest to the registrant of 5 or more Internet Protocol addresses, and intentionally initiates the transmission of multiple commercial electronic mail messages from such addresses.
Clearly, Section 4 is primarily concerned with preventing practices whereby the sender intentionally, either through outright fraud or other deception, conceals its true identity or the true commercial character of the message.
What Are The Requirements For Sending Email Messages?
Section 5(a) of the Act sets forth certain other protections for the users of commercial email.
Accurate Transmission Information. Among the affirmative requirements of Section 5(a), Section 5(a)(1) prohibits sending either a commercial electronic mail message, or a transactional or relationship message, that contains, or is accompanied by, header information that is materially false or materially misleading. Unlike the general prohibition against sending messages with materially false header information under Section 4, in addition to having technically accurate transmission information, the sender is prohibited from having used false pretense or other deceptive means to acquire such information (e.g. email accounts, domain names and IP addresses). Furthermore, the “from” line must “accurately identify the person transmitting the message.” Lastly, the sender must accurately identify the computers used to originate, relay or retransmit the message.
Note, the following only apply to commercial electronic mail messages:
Accurate Subject Information. Messages must have accurate subject information. Subject information would not be accurate if a “person has actual knowledge, or knowledge fairly implied on the basis of objective circumstances, that a subject heading of the message would be likely to mislead a recipient, acting reasonably under the circumstances, about a material fact regarding the contents or subject matter of the message.”
Inclusion of Opt-out Mechanism. Messages MUST contain a functioning return email address or other Internet-based mechanism (e.g. hyperlink), that is clearly and conspicuously displayed that enables a recipient to submit a request to opt-out of future email messages from the sender whose email address was contained in the message. The opt-out mechanism (whether email address or hyperlink, etc.) must remain functional for at least thirty (30) days after the transmission of the original message.
Removal After Objection. If a recipient makes a request using the opt-out mechanism, the sender shall not transmit any further messages to the recipient, more than ten (10) business days after the receipt of such request, if such message would fall within the scope of the request. A third-party acting on behalf of the sender shall not transmit or assist others to transmit, any further messages to the recipient, more than ten (10) business days after the receipt of such request, if such third party knows or should know of the recipient’s objection. Lastly, the sender and any third party who knows that the recipient has made such a request, shall not sell, lease, exchange, or otherwise transfer or release the electronic mail address of the recipient for any purpose other than compliance with the Act or other provision of law.
Inclusion of Identifier, Opt-out & Physical Address. Every message must clearly and conspicuously: (i) identify the message as an advertisement or solicitation; (ii) provide notice of the opportunity to opt-out of future communications; and (iii) provide a valid physical postal address of the sender. However, the notice that a message is an advertisement or solicitation does not apply where the recipient has given prior affirmative consent to receive the message.
Related Activities Proscribed.
Other prohibitions in the Act concern unethical or unscrupulous practices that tend to coincide with deceptive or abusive email. Several common methods for generating email distribution lists have also been proscribed. The Act prohibits certain unethical practices such as:
hijacking another email server to send or relay messages;
“harvesting” email addresses that appear on others’ Web sites;
randomly generating email addresses;
knowingly linking an email ad to a fraudulently registered domain; and
participating in other offenses such as fraud, identity theft, etc.
Who Can Be Liable for Violations?
The Act applies to both the party actually sending the commercial email messages and those who procure their services. One cannot “outsource” its “spam” and thereby avoid liability under the Act. One may be held accountable if the email service employed isn’t actually using a legally-compiled or permission-based list. Under some parts of the Act one may be held liable for employing a third party to distribute the messages “with actual knowledge, or by consciously avoiding knowing, whether such [third party] is engaging or will engage, in a pattern or practice that violates this Act.”
The Act was written to prohibit the fraudulent, deceptive, predatory and abusive practices that threaten to undermine the success and effectiveness of commercial email and email marketing. Since Bacon’s uses email to communicate with employees, vendors, existing and prospective customers, Bacon’s is clearly subject to the Act. The Act focuses on enumerating proscribed activities rather than affirmative obligations to make it easier for legitimate, honest businesses to comply with the Act. The Act distinguishes communications based on a previously existing relationship between the sender and the recipient from those communications that are prospective in nature. Generally, email messages not based on a pre-existing relationship are subject to greater affirmative requirements.
Be Aware of the Requirements for Transmitting Messages.
Into the data jungle – in association with Huron Legal
Technological developments such as cloud computing, social networking and mobile apps mean EU law is no longer fit for purpose. The EU claims current laws often conflict and cost businesses a total of nearly £2bn a year.
Saudi Arabia considers law against insulting Islam
Bangladesh News 24 hours
JEDDAH, Saudi Arabia, July 16 (bdnews24.com/Reuters) – Saudi Arabia is studying new regulations to criminalise insulting Islam, including in social media, and the law could carry heavy penalties, a Saudi paper said on Sunday.
Mind the missteps in online job dance
With some background check firms specializing in social media searches (U.S.-based Social Intelligence Corp. for one), how do third-party recruiters use social media when screening or finding clients for law firms in Canada?
10 Tactics for Integrating Photographs into Content Marketing
Business 2 Community
Acquire digital rights for images. Remember when using images, especially photographs, your legal team is your best friend. Ensure that you’ve got the right to use the photos by incorporating outtakes and additional shots for social media.
Reasonable Expectations of Privacy in the Digital Age
Mondaq News Alerts (registration)
In this digital age of smart phones, global positioning systems, cloud computing, and social networking, determining what constitutes private information and what lengths our legal system will go to protect it is increasingly challenging.
The Future Of Social Is Moving From Mere Participation To Analysis & Strategic Initiatives
I had the opportunity to attend and participate in Converge 2012 run by the Institute for Social, Search & Mobile Marketing. The theme was mastering the Business of Social Media. The Conference had a great selection of speakers (yours truly included) and topics that really resonated with the audience. I hope to summarize here some of the take-aways I learned at this conference.
Business Is Now Social
The last few years have seen an unprecedented shift in the adoption of social platforms for businesses to reach and interact with customers. What started as a “dipping our toes into the water” excerise has now matured into jumping in with both feet. Not surprisingly, the first few presentations of the conference focused on the effect of so much participation: greater focus on ROI. The presentations covered a lot of ground, but here are the key take aways from Day 1:
Businesses that fail to integrate the social channels may not exist in five years
Analytics are maturing in terms of both measurement tools and metrics
Better analytics are driving innovation by putting companies ahead of emerging issues instead of simply reacting to them
Creating a Social Media culture must come from the top and flow down
The growth of mobile platforms Is blurring the line between online and in-store experiences because of anywhere/anytime andpersonalized access
Day 1 concluded with the panel presentation in which I participated “Social Media “Venture Heaven” Money is flooding into social media, It’s time to understand why.” Key take-aways from this panel include the followig Data about the growth in Mobile:
As of May, 2012, mobile comprises 10% of Internet traffic, up from just 4% less than a year and a half ago
Mobile = ~8% of ecommerce
Monetization growing rapidly 79% is Apps, 21% is from ads
There has been a rapid increase in time spent relative money spent on ads; TV is roughly at parity while Mobile ad spend is about 1/10 of that
Drivers of growth in Mobile:
Improved user interfaces
More emphasis on design aestheticS
In a world of ubiquitous fast Internet, mass blogging and micro-blogging, minute-by-minute status updates and customer complaints and recommendations, businesses need to focus on tailoring their product for their customers desires, rather that merely tolerating customer requests. Whatever device/platform customers use most will get the most attention from developers, accessory makers and potential new customers.
(See “Protect Our Data! A Digital Consumer Bill of Rights” and “A Bill of Rights for Facebook Users” for related discussion.) The temptation to exploit user data in ways that erode privacy will always be present. Just by joining Facebook, …
In addition, in February the White House proposed a “bill of rights” to protect consumer privacy online, including an easy way for users to tell Internet companies with one click whether they want their online activity to be tracked.
Howard A. Schmidt is returning to the private life, but the White House is still pushing for some kind of legislation in the Consumer Prvacy Bill of Rights fashion. While the Cyber Intelligence Sharing and Protection Act passed the House of …
Your decision to hold this hearing will help protect important privacy rights. The Electronic Privacy Information Center (“EPIC”) is a non-partisan public interest research organization established in 1994 to focus public attention on emerging privacy …
See all stories on this topic »
In fashion, innovation never goes out of style. Therefore, it is no surprise that fashion houses and clothing brandsmarket across many different
social media platforms. It is axiomatic that fashion marketing requires a deep understanding of the target audience, regardless of whether that knowledge comes from online or offline interaction. Social media provides a forum for a more authentic, transparent and personal engagement with the customer, but also highlights whether a brand has judged (or misjudged) its customer base.
To be successful in social media, brands need to harness the personality, wit, charm and, in all likelihood, free time of their staff. In order to ensure positive, informative and engaging social interaction, a fashion brand’s social media rules must be smart, positive and inclusive. Here are some guidelines for drafting a social media policy that will bring out the best in your brand, your employees (brand ambassadors) and your customers.
Rather than writing out a lengthy, legal boilerplate script, keep these considerations in mind when drafting your policy:
Philosophy. Begin with a discussion of how social media fits into an employee’s job expectations and performance. For example, guidelines are important, because if not followed “bad things” can happen, such as losing customers or vendors, the company could get into legal trouble, or worse, you could lose your job.
Behavioral Expectations. This is a good place to remind employees that even though it’s a big world, you are often in a small community and, on the Internet, it’s forever. What a person says can be seen by customers and employees all over the world. Remind employees to stick to their areas of expertise and use respectful conduct. Other watch words include “timeliness” (posts should be fresh, current and relevant), “perspective” (something that may sound clever and racy to one person may be inaccurate or offensive to another), “transparency” (be the first to point out that you are an employee and make it clear that you are not a company spokesperson) and “judiciousness” (use caution when discussing things where emotional topics like politics and religion and show respect for others’ opinions).
Channel expectations. If your company has a social media strategy, make sure employees know which sites (communication channels) are appropriate for which types of communications and marketing messages.
Contextual Expectations. Help employees understand the context within which they are engaging customers. Suggest using a conversational style. Remember that in customer’s eyes, “perception is reality.” Add value: Make sure your posts really add to the conversation. If they promote the company’s goals and values, supports the customers, improves or helps to sell products, or helps to do jobs better, then you are adding value.
Content Expectations. The policy must have clear and conspicuous language about what is considered company proprietary information, including current projects, trademarks, names, logos and how they may be used. Never: (i) discuss or post about financial information, sales trends, strategies, forecasts, legal issues and future promotional activities; (ii) post confidential or non-public information about the company; (iii) give out personal information about customers or employees; or (iv) respond to an offensive or negative post by a customer.
Consequences. Lastly, be upfront about the very real consequences if mistakes are made. If a mistake occurs, correct it immediately and be clear about what’s been done to fix it. Contact the social media team if there’s a lesson to be learned.
SEAPA says the key trend is that governments are shifting focus from traditional broadcast and print media to social media and online news. SEAPA Executive Director Gayathry Venkiteswaran said online news sites have become the most frequent target.
CT: The growing usage of the internet and social media in Liberia is certainly a progressive trend. Having worked in Liberia, can you briefly tell us how the internet and social media are viewed by the cross sections of the Liberia population?
Hordes of angry hockey fans – presumably Boston Bruins fans — unleashed a barrage of racist rants on Twitter and other social-networking sites after the Washington Capitals beat the defending champion Bruins a week ago Wednesday on an overtime goal.
Some of the issues covered in depth in the paper include: Build up a positive online social media profile. “It is absolutely crucial to remember that anything you post online may stay there forever, in one form or another, so think carefully.
Canadian consumers are being encouraged to consider their online property, including social media accounts, when planning a will. A new report released earlier this week by the BMO Retirement Institute raises concerns.
Continued concern about employers asking applicants and employees for their passwords to social media sites has led to the introduction of a federal bill.
The legal and regulatory environment impacting social media is constantly evolving. Here is a collection of recent articles impacting everything from law enforcement use of social media to new legislation.
A social media tip line for police
“Use of social media has provided an additional outlet for people to interact with law enforcement” says Lauri Stevens – founder of LAwS Communications, a consulting company that helps law enforcement agencies expand into social media.
Social media limits and the law
Monterey County Herald
Leland Yee, a San Francisco Democrat, introduced a bill that would prohibit employers, public or private, from requiring or requesting in writing a prospective employee to disclose user names or passwords for personal social media accounts.
Ariz. bill says unlawful to ‘annoy’ others online
“Speaking to annoy or offend is not a crime,” Media Coalition Executive Director David Horowitz said. Horowitz said if the proposal becomes law, speech done in satire, political debate or even sports trash talking could get people in unnecessary legal trouble.
Social Media in China, Innovation
Apr. 2, 2012 – April 2 (Bloomberg) — Vivek Wadhwa, fellow at Stanford Law School and head of academics at Singularity University, talks about social media in China and innovation.
Sponsor: Arizona bill isn’t aimed at Internet trolls
The fear is that the bill would prohibit hateful comments on news and social-media sites, amounting to a ban on so-called Internet trolling. The problem: The bill won’t do any of that, its sponsor told CNN on Wednesday. “I think they’re absolutely …
How Family Law Attorneys Use Social Media Evidence [Infographic]
PR Web (press release)
Family Law Attorneys Dishon & Block formally released today an infographic that illustrates how attorneys use social media to collect “smoking gun” evidence for divorce and child custody cases. With the advancement in technology and modernizing of laws …
See all stories on this topic »
PR Web (press release)
On 5th January 2010 the Defendant, Lalit Modi, published on his official personal page of the social networking serviceTwitter the following words: “Chris Cairns removed from the IPL auction list due to his past record in match fixing. This was done by the Governing Council today.” Mr Cairns then sued Mr Modi for defamation in respect of the Tweet and the comment to Cricinfo. The defamatory meaning of the Tweet is obvious, namely that the Claimant had fixed cricket matches.
The court found for the plaintiff and awarded $140,000 in damages. The case cant be found here.
Seemingly overnight, Social media has moved from a business curiosity to an invaluable tool for customer engagement, brand positioning and employee empowerment. For example, social media use for 18-29 year olds has grown from 16% in 2005 to 89% in 2010. A recent survey, now in its third year, found that Social Media is imperative and effective to stand out in a crowded market: 88% of all marketers found that it helped increase exposure and 76% found that it increased traffic and subscriptions.
Faced with the rapid adoption of social media services and platforms, companies find themselves in a dilemma: move quickly to adapt to new technologies, or put policies in place that support marketing goals. Finding the right balance between taking appropriate business risks and minimizing legal ones is a dilemma shared by all businesses, and it can be particularly tricky in the rapidly changing realm of social media. A social media snafu could pull a business into a range of legal imbroglios, involving employment law, intellectual property rights, advertising, defamation, libel, antitrust, and privacy protection. What follows is a list of five common social media legal mistakes that businesses are making.
1. Your Company does not have a social media policy.
Social media is going through an evolution from social media to social business. Yet In the rush to avoid being left behind, some 79% of companies do not have social media policies in place. Companies and employees are becoming deep users of Twitter, LinkedIn, Facebook, blogs, private-label platforms, and the like. Absence of a policy has led to lawsuits over basic issues such as ownership of LinkedIn profiles and Twitter followers. Lack of a policy could also lead to awkward situations that require a response, but may not rise to the level of a legal quandary such as public criticism by a volunteer or advisor.
Having a social media policy cannot prevent the occurrence of unintended consequences. However, it can address most risks that businesses will face and provide an informal framework for addressing issues that will inevitably arise before they become full-fledged emergencies that require a legal solution.
2. Your Company’s social media policy is unenforceable.
Not surprisingly, one of the most active legal areas of social media for business has been in the context of Employer-Employee relations. In 2011, the U.S. Chamber of Commerce released a report stating that the National Labor Relations Board (NLRB) had received 129 cases involving social media. The majority of claims concerned overly-restrictive employer social media policies or employee discipline and even termination based on use of social media.
More recently, the NLRB released updated guidance discussing 14 such cases in particular. Significantly, the NLRB criticized five employers’ social media policies, as “unlawfully overly broad” (e.g., too restrictive). In four cases, an employee’s use of Facebook to complain about their employer was held to be “protected concerted activity.” The benefit for employers is that the report frames the discussion for the appropriate scope of an enforceable social media policy.
3. Your employees don’t understand your social media policy.
For companies who have drafted a social media policy, another risk is that the employees who are engaged in social media on behalf of the company or brand do not understand the policies. Training employees about what it is, how it works and what’s expected is just the beginning.
For example, Australian telecomm company Telstra is an excellent example of social media transparency. This 40,000+ employee company mandates social media training built around a manageable policy focused on “3Rs” – responsibility, respect and representation. To promote awareness and understanding, the comic book-styled policy answers simple questions like “what is Facebook?” and more complex issues like employer criticism on personal blogs. Taking it a step further, the company published their entire social media training guide online for others to study and critique.
More importantly, the dynamics of online usage and marketing have changed. The availability of GPS data and commonly used technologies for targeted advertising and related services pose new privacy risks such as leaking personally identifiable information including usernames, email addresses, first names, last names, physical addresses, phone numbers, and birthdays. A recent series of articles by the Wall Street Journal analyzed the tracking files installed on people’s computers by the 50 most popular U.S. websites, plus WSJ.com and found that some sites like dictionary.com had over 200 such tracking cookies.
5. Your Company is Not Engaging In The Conversation.
Lastly, social media enables instantaneous, ubiquitous, electronic social interaction using highly accessible and scalable publishing techniques. The platforms and services that enable this interaction also provide an unfettered medium for defamatory statements about individuals, disparaging remarks about a companies’ products and services and inaccurate or misleading remarks by over-enthusiastic employees.
The legal risk is that a company often does not control such conversations which can quickly spiral out of control. Many web sites and blogs allow comments and invite participation by unrelated third parties. Having a strategy for when, how, and why to engage is critical to mitigate the legal risks since this area of law is notoriously fact and circumstances dependent and varies by jurisdiction.
Contact Us For a Consultation.
Is your business making one of the mistakes described above? Do you want to learn how to use social media to market and communicate with existing and prospective clients and do so in a way that minimizes potential risks and pitfalls? Hopefully, the guidance outlined above can serve as a good starting point for discussions about how best to use social media as well as suggestions regarding factors that firms may wish to consider in strengthening their compliance and risk management programs. We invite you to contact us with comments and requests about how we can help you educate your employees, prevent fraud, monitor risk, and promote compliance. We can be reached at lsglegal.com, 866-734-256, @adlerlaw and email@example.com.