MT358_Assigment_Unit7
.docx
keyboard_arrow_up
School
Purdue Global University *
*We aren’t endorsed by this school
Course
MT358
Subject
Marketing
Date
Feb 20, 2024
Type
docx
Pages
6
Uploaded by andabi
Cybersecurity and ethical social media marketing.
MT358 Social Media Marketing
Cybersecurity and ethical social media marketing.
Cybersecurity and ethical social media marketing.
"Copyright infringement is the unauthorized use of someone else's work"(Kelvin Smith Library, n.d.), such as images, videos, or written content, without their permission. It violates the owner's exclusive rights and can lead to legal issues, damage to the company's reputation, and loss of revenue. Examples of copyright infringement include using images or videos without permission, copying and pasting content from other sources, and using copyrighted music in videos. As an organization, it is essential to maintain high professionalism and ethical standards regarding social media marketing. To ensure that we adhere to these standards, we must establish a social media code of conduct that addresses various issues, including copyright infringement.
To avoid copyright infringement, we suggest the following guidelines:
- Always obtain permission before using someone else's work. Including images, videos, and written content.
- Use royalty-free images and music or purchase the necessary licenses to use copyrighted material. - When in doubt, seek legal advice to ensure we are not infringing on someone else's copyright.
Next, Tuten (2021) suggests that companies must develop, adopt, and publicize a social media policy among employees (p. 135). By following these guidelines, we can ensure that we maintain ethical standards and avoid copyright infringement in our social media marketing efforts.
4. Social Media Policy:
As an organization, ABC should recognize the importance of social media in today's business world. However, also understand that social media can be a double-edged sword, and it is essential to maintain high ethical and professional behavior in social media marketing. To ensure that you are adhering to these standards, must establish the following social media policy:
Cybersecurity and ethical social media marketing.
- The designated social media manager must approve all social media posts related to the organization before posting.
- All customer interactions on social media must be handled professionally and respectfully. Any negative comments or complaints must be addressed promptly and with empathy.
- All social media posts must adhere to ethical standards and best practices. This behavior includes avoiding offensive or insensitive content and false or misleading statements and protecting consumers' and employees' privacy.
- All employees must always be aware of and adhere to this policy.
By following this policy, we can ensure that we maintain high professionalism and ethical standards in our social media marketing efforts.
5. Social Media Disclosure Requirements:
Regarding endorsements on social media, it is essential to disclose any material connections between the endorser and the organization. Including any financial or other incentives the endorser may have received in exchange for their endorsement. The Federal Trade Commission (FTC) stipulates that all social media endorsements be acknowledged. The disclosure must be easy to see and understand and placed in a location where it is likely to be seen by the audience.
To ensure compliance with these requirements, we suggest the following guidelines:
- A clear and conspicuous disclosure of any material connections between the endorser and the organization must accompany all endorsements on social media.
- The disclosure must be placed where it is likely to be seen by the audience, such as at the beginning of the post or in the post's caption.
- The disclosure must be easy to understand and written in plain language.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
The U.S. Congress enacted the CAN-SPAM Act in 2003. This act:
a) prohibits the use of false or misleading subject lines on emails used for advertising.
b) requires spammers to register with the Federal Trade Commission.
c) does not view sending multiple spam emails with the use of a hijacked computer as an offensel
d) limits advertisers from sending more than one ad per month per email address.
arrow_forward
Using a domain name that is an identical or similar to the trademark of another is:
a) legal because it is a clever marketing ploy.
b) legal because it is a fair use.
c) legal because it is a safe harbor.
d) illegal.
3) Transferring copyrighted music recordings to others, without the copyright owners’ authorization, is:
a) goodwill.
b) a fair use.
c) illegal. d) a license.
4) Discharging an employee who uses social media in a way that violates the employer's stated social media policies is:
a) within the employer's rights.
b) a violation of the employee's rights.
c) a violation of an Internet service provider's rights.
d) a violation of the social media's rights.
5) Cybercrime can best be defined as:
a) a crime against property.
b) not a new type of crime but a new way of committing crime—in cyberspace.
c) a crime that necessarily also involves a tort.
d) organized crime.
arrow_forward
The chairman of an investigation ordered by Japan’s parliament into the Fukushima nuclear disaster has declared that it was a crisis ‘made in Japan’ resulting from the ‘ingrained conventions of Japanese culture’.Kiyoshi Kurokawa, chairman of the Diet’s Nuclear Accident Independent Investigation Commission, said the crisis was the result of ‘a multitude of errors and wilful negligence’ by plant operator Tokyo Electric Power, regulators and the government. In an English language summary of the commission’s final report, Mr Kurokawa blamed the plant’s failure on ‘our refl exive obedience; our reluctance to question authority; our devotion to “sticking with programme”; our groupism; and our insularity. What must be admitted – very painfully – is that this was a disaster “made in Japan”’, he added. ‘Had other Japanese been in the shoes of those who bear responsibility for this accident, the result [might] well have been the same.’ In his preface to the Japanese version of the report,…
arrow_forward
Which law ensured that business associates were also liable for the protection of health information?
A)Hitech
B) HIPPA
C)CCPA
D)COPPA
arrow_forward
Busi Law Discuss
arrow_forward
Based on what you know about framing, an “involuntary deboarding situation” provides an airline with ______.
Multiple Choice
power
rights
interests
stock issues
arrow_forward
Google in China Introduction Using servers located in the United States, Google began offering a Chinese-language version of Google.com in 2000. The site, however, was frequently unavailable or slow because of censoring by the Chinese government. Google obtained a significant share of searches in China but lagged behind market leader Baidu.com. To achieve commercial success, Google concluded that it was imperative to host a Web site from within China. Given its motto, “Don’t Be Evil,” Google had to decide whether to operate from within China or to continue to rely on Google.com. If it decided to establish operations in China, the company had to decide how to deal with the censorship imposed by the Chinese government. As a result of an extensive debate within the company, cofounder Serge Brin explained their decision: “We gradually came to the realization that we were hurting not just ourselves but the Chinese people.”68 Google decided to establish the…
arrow_forward
One of the key purposes of the Digital Millennium Copyright Act (DMCA) is to bring copyright laws into the digital age by regulating digital media copyright infringement. As with non-digital assets, an owner of copyrightable material:
A. must include a (c) symbol on their digital work in order to be protected from reproduction.
B. must include a (c) symbol on their digital work in order to have worldwide protection from reproduction.
C. to hold internet service providers accountable for digital copyright infringement by their users.
D. does not need to include a (c) symbol on their digital work in order to be protected from reproduction.
The answer is NOT B
arrow_forward
A preparer e-file hardship waiver might be granted for which of the following reasons?
• A) The preparer is in a Presidentially Declared Disaster Area
B) The preparer does not have software that would facilitate e-file
C) The preparer believes the e-file program is a government conspiracy to spy on citizens
D) The preparer doesn't want to participate in e-file
arrow_forward
The property right of the
is granted tothe "inventor". *
O Patent
Copyright
Trademark
Trade secret
arrow_forward
A teacher is a sponsor of a religious club at a high school in Happyville, USA. On September 1, 2018, the teacher is accused of and investigated for participating in a prayer that the students conducted. Which of the findings would be correct?
A. The teacher was found to be within their rights to participate in the prayer, as long as the teacher led portion of the prayer is held at the end of the prayer.
B. None of the above
C. The teacher was found to be within their rights to participate in the prayer, as long as the portion of the prayer they stated happened right after the prayer started.
D. The teacher was found to be within their rights to participate in the prayer, as long as the portion of the prayer as long as they did not lead any portion of the prayer.
Don't use chatgpt otherwise I will report
arrow_forward
Cara owns a micro business located in Barangay Macabato. The local government unit is asking for a garbage fee. Cara insisted that under the BMBE Law, her business is exempted.*
a. Cara is really exempted because of the BMBE
b. The Negosyo Center will pay
c. Cara is wrong and she should pay garbage fee because it’s the policy of the LGU
d. None of the above
This access to market program helps MSMEs through the use of retail concept store wherein they showcase unique, quality, innovative local products in chosen retail partners such as malls, department stores, and supermarkets.*
a. One Town One Product Next Gen
b. Go Lokal!
c. Choose Local! Choose Philippines
d. SM Kultura
Which of the following is an obstacle to corporate entrepreneurshipa.
a system of feedback and positive reinforcement
b. orientation toward the market
c. rewards based upon results.
d. traditional management techniques
arrow_forward
Which of the following is an example of tort?
A case filed for patent infringement
A dispute involving business interruption insurance coverage during the covid-19 pandemic
A dispute over the implementation of hold harmless and indemnity agreement
A criminal wrongdoing against the society
arrow_forward
A real estate brokerage advertises specifically for buyer who wish to purchase using VA loans. Do these advertisements violate veterans’ rights or the advertising rules of the Federal Fair Housing Act?
Yes, because such advertising falsely implies that only military veterans can qualify for purchase
Yes, because such advertising discriminates against individuals who have not served in the military
No, because brokers are entitled to direct property advertisements to any specific segment of the population
No, because veterans from all protected classes can qualify for VA loans
arrow_forward
Title : Innovative campaign awareness of reuse/recycle fabric clothing that cause pollution's
Explain the (7) objective that must be in line with the targets and goals of the activity and stated briefly and numbered in order of priority. It must also be in accordance with the wishes of the co-organizers (if any) and not contrary to laws, acts, social values and national policies
arrow_forward
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…
arrow_forward
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…
arrow_forward
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…
arrow_forward
Paraphrase the following without and make sure there is no AI detected
The recent entry of Booktopia into voluntary administration has raised significant concerns for its customers, employees, and stakeholders. As the appointed voluntary administrator, my role is defined by the Corporation Act 2001 (Cth), particularly sections 436A to 449E which outline the legal framework for voluntary administration in Australia. My primary responsibilities include conducting an urgent assessment of the company’s financial position, as mandated by Section 436A, and communicating with creditors and stakeholders about the status of the administration process, as required under Section 439A.
One of my key responsibilities is to evaluate Booktopia’s assets and liabilities to determine the viability of restructuring or selling the business. This assessment is crucial given that the company has been trading at loss for over a year, reporting $16.7 million loss for the six months ending December 31, 2023.…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles Of Marketing
Marketing
ISBN:9780134492513
Author:Kotler, Philip, Armstrong, Gary (gary M.)
Publisher:Pearson Higher Education,
Marketing
Marketing
ISBN:9781259924040
Author:Roger A. Kerin, Steven W. Hartley
Publisher:McGraw-Hill Education
Foundations of Business (MindTap Course List)
Marketing
ISBN:9781337386920
Author:William M. Pride, Robert J. Hughes, Jack R. Kapoor
Publisher:Cengage Learning
Marketing: An Introduction (13th Edition)
Marketing
ISBN:9780134149530
Author:Gary Armstrong, Philip Kotler
Publisher:PEARSON
Contemporary Marketing
Marketing
ISBN:9780357033777
Author:Louis E. Boone, David L. Kurtz
Publisher:Cengage Learning
Related Questions
- The U.S. Congress enacted the CAN-SPAM Act in 2003. This act: a) prohibits the use of false or misleading subject lines on emails used for advertising. b) requires spammers to register with the Federal Trade Commission. c) does not view sending multiple spam emails with the use of a hijacked computer as an offensel d) limits advertisers from sending more than one ad per month per email address.arrow_forwardUsing a domain name that is an identical or similar to the trademark of another is: a) legal because it is a clever marketing ploy. b) legal because it is a fair use. c) legal because it is a safe harbor. d) illegal. 3) Transferring copyrighted music recordings to others, without the copyright owners’ authorization, is: a) goodwill. b) a fair use. c) illegal. d) a license. 4) Discharging an employee who uses social media in a way that violates the employer's stated social media policies is: a) within the employer's rights. b) a violation of the employee's rights. c) a violation of an Internet service provider's rights. d) a violation of the social media's rights. 5) Cybercrime can best be defined as: a) a crime against property. b) not a new type of crime but a new way of committing crime—in cyberspace. c) a crime that necessarily also involves a tort. d) organized crime.arrow_forwardThe chairman of an investigation ordered by Japan’s parliament into the Fukushima nuclear disaster has declared that it was a crisis ‘made in Japan’ resulting from the ‘ingrained conventions of Japanese culture’.Kiyoshi Kurokawa, chairman of the Diet’s Nuclear Accident Independent Investigation Commission, said the crisis was the result of ‘a multitude of errors and wilful negligence’ by plant operator Tokyo Electric Power, regulators and the government. In an English language summary of the commission’s final report, Mr Kurokawa blamed the plant’s failure on ‘our refl exive obedience; our reluctance to question authority; our devotion to “sticking with programme”; our groupism; and our insularity. What must be admitted – very painfully – is that this was a disaster “made in Japan”’, he added. ‘Had other Japanese been in the shoes of those who bear responsibility for this accident, the result [might] well have been the same.’ In his preface to the Japanese version of the report,…arrow_forward
- Which law ensured that business associates were also liable for the protection of health information? A)Hitech B) HIPPA C)CCPA D)COPPAarrow_forwardBusi Law Discussarrow_forwardBased on what you know about framing, an “involuntary deboarding situation” provides an airline with ______. Multiple Choice power rights interests stock issuesarrow_forward
- Google in China Introduction Using servers located in the United States, Google began offering a Chinese-language version of Google.com in 2000. The site, however, was frequently unavailable or slow because of censoring by the Chinese government. Google obtained a significant share of searches in China but lagged behind market leader Baidu.com. To achieve commercial success, Google concluded that it was imperative to host a Web site from within China. Given its motto, “Don’t Be Evil,” Google had to decide whether to operate from within China or to continue to rely on Google.com. If it decided to establish operations in China, the company had to decide how to deal with the censorship imposed by the Chinese government. As a result of an extensive debate within the company, cofounder Serge Brin explained their decision: “We gradually came to the realization that we were hurting not just ourselves but the Chinese people.”68 Google decided to establish the…arrow_forwardOne of the key purposes of the Digital Millennium Copyright Act (DMCA) is to bring copyright laws into the digital age by regulating digital media copyright infringement. As with non-digital assets, an owner of copyrightable material: A. must include a (c) symbol on their digital work in order to be protected from reproduction. B. must include a (c) symbol on their digital work in order to have worldwide protection from reproduction. C. to hold internet service providers accountable for digital copyright infringement by their users. D. does not need to include a (c) symbol on their digital work in order to be protected from reproduction. The answer is NOT Barrow_forwardA preparer e-file hardship waiver might be granted for which of the following reasons? • A) The preparer is in a Presidentially Declared Disaster Area B) The preparer does not have software that would facilitate e-file C) The preparer believes the e-file program is a government conspiracy to spy on citizens D) The preparer doesn't want to participate in e-filearrow_forward
- The property right of the is granted tothe "inventor". * O Patent Copyright Trademark Trade secretarrow_forwardA teacher is a sponsor of a religious club at a high school in Happyville, USA. On September 1, 2018, the teacher is accused of and investigated for participating in a prayer that the students conducted. Which of the findings would be correct? A. The teacher was found to be within their rights to participate in the prayer, as long as the teacher led portion of the prayer is held at the end of the prayer. B. None of the above C. The teacher was found to be within their rights to participate in the prayer, as long as the portion of the prayer they stated happened right after the prayer started. D. The teacher was found to be within their rights to participate in the prayer, as long as the portion of the prayer as long as they did not lead any portion of the prayer. Don't use chatgpt otherwise I will reportarrow_forwardCara owns a micro business located in Barangay Macabato. The local government unit is asking for a garbage fee. Cara insisted that under the BMBE Law, her business is exempted.* a. Cara is really exempted because of the BMBE b. The Negosyo Center will pay c. Cara is wrong and she should pay garbage fee because it’s the policy of the LGU d. None of the above This access to market program helps MSMEs through the use of retail concept store wherein they showcase unique, quality, innovative local products in chosen retail partners such as malls, department stores, and supermarkets.* a. One Town One Product Next Gen b. Go Lokal! c. Choose Local! Choose Philippines d. SM Kultura Which of the following is an obstacle to corporate entrepreneurshipa. a system of feedback and positive reinforcement b. orientation toward the market c. rewards based upon results. d. traditional management techniquesarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles Of MarketingMarketingISBN:9780134492513Author:Kotler, Philip, Armstrong, Gary (gary M.)Publisher:Pearson Higher Education,MarketingMarketingISBN:9781259924040Author:Roger A. Kerin, Steven W. HartleyPublisher:McGraw-Hill EducationFoundations of Business (MindTap Course List)MarketingISBN:9781337386920Author:William M. Pride, Robert J. Hughes, Jack R. KapoorPublisher:Cengage Learning
- Marketing: An Introduction (13th Edition)MarketingISBN:9780134149530Author:Gary Armstrong, Philip KotlerPublisher:PEARSONContemporary MarketingMarketingISBN:9780357033777Author:Louis E. Boone, David L. KurtzPublisher:Cengage Learning
Principles Of Marketing
Marketing
ISBN:9780134492513
Author:Kotler, Philip, Armstrong, Gary (gary M.)
Publisher:Pearson Higher Education,
Marketing
Marketing
ISBN:9781259924040
Author:Roger A. Kerin, Steven W. Hartley
Publisher:McGraw-Hill Education
Foundations of Business (MindTap Course List)
Marketing
ISBN:9781337386920
Author:William M. Pride, Robert J. Hughes, Jack R. Kapoor
Publisher:Cengage Learning
Marketing: An Introduction (13th Edition)
Marketing
ISBN:9780134149530
Author:Gary Armstrong, Philip Kotler
Publisher:PEARSON
Contemporary Marketing
Marketing
ISBN:9780357033777
Author:Louis E. Boone, David L. Kurtz
Publisher:Cengage Learning