Best of: Protecting Brands in Social Media Age

The ever-increasing number of social networking sites, blogs and customer review sites are making it difficult, if not seemingly impossible, for brand owners to manage their advertising message, reputation and intellectual property assets online. That difficulty will undoubtedly intensify as the number of participants of user-generated content sites explode to an estimated one billion by 2012. It is estimated that there will be four billion postings, known as “tweets,” on Twitter in 2009 and forty billion in 2010. Clearly, the pace at which people are using social media networks to connect with friends and seek out online relationships with business is exploding, which is why some companies see social media as an opportunity to connect with consumers that they could not otherwise reach with traditional marketing efforts.

The question being asked by many social media experts is whether companies that have not already done so will embrace this potentially golden opportunity to reach tens of thousands, if not hundreds of thousands, of traditionally unattainable consumers with the strike of a computer key or be immobilized by fear. Much of the fear surrounding social media marketing stems from companies not understanding its intricacies. And although companies fear social media itself, as if were the “boogeyman” lurking in the shadows, they also fear doing nothing and missing opportunities while their competitors strike gold.

Other reasons companies fear social media marketing include losing control of the message and brand, return on time investment and the posting of negative comments or feedback by customers, employees and ex-employees. The truth of the matter is that whether or not companies use social media marketing, their customers may already be talking about them and their products. The problem: companies don’t know what they are saying and therefore they are not able to dispel misinformation and inaccurate statements and thwart infringements of their intellectual property. Negative comments or misinformation left unchallenged become perception and that perception becomes reality for potential customers, resulting in lost revenues. Interestingly, just the other day, while on my Twitter account, one particular social media expert that I follow posted a “tweet” for her nearly 6000 followers that decried her customer service experience earlier that day at one of the largest office supply companies. Is that company listening? If so, kudos to it! If not, it might want to be.

Yet in a more prominent case of a dissatisfied customer taking his frustration over dismal customer service to the social media-sphere is that of Halifax singer-songwriter Dave Carroll whose guitar had been severely damaged by United Airlines. It is reported that in the spring of 2008, Carroll and his band, Sons of Maxwell, were travelling for a tour when Carroll says he and his band members noticed United Airlines baggage handlers throwing their instruments on the tarmac in Chicago. He then later discovered that his $3,500 guitar had been damaged. After months of baggage claims and e-mails went nowhere, Carroll, in protest, wrote and posted a song on YouTube® about his ordeal, which went viral overnight and became a public relations nightmare for United Airlines. See video here.

In addition to being concerned about negative posts and commentary, companies must also be concerned with the unauthorized use and misuse of their intellectual property, including their trademarks. Unauthorized use and misuse of company trademarks cannot be ignored. Indeed, legal precedent requires trademark owners to police and enforce unauthorized uses of their trademarks or risk losing valuable trademark rights. So rather than putting their heads in the sand and waiting for the social media marketing “fad” to blow over, companies need to put their ears to the ground, listen, and join the conversation. At least then they can try to influence the message and conversations about them and their products.

Joining the conversation will allow companies to engage consumers directly and detect negative comments or misinformation and turn them into positive ones. And they just may find that they have brand champions that will defend their products. Joining the conversation also allows companies to monitor for certain infringements to their intellectual property, such as trademark infringement, trademark hijacking, counterfeiting and libelous speech, which can damage their goodwill and reputation. If their brands have been “hijacked,” they need to know what messages the impersonators are spreading and what impact the impersonators are having on their brands.

One recently reported high-profile case involved Tony La Russa, the manager of the St. Louis Cardinals Major League baseball team, whose identity was hijacked on Twitter by an imposter. The suit filed in the Superior Court of California in San Francisco, which has since been dismissed, claimed that someone created an account under La Russa’s name and posted “tweets,” which gave the false impression that the comments came from La Russa. The suit also said that the comments were “derogatory and demeaning” and thus damaged La Russa’s trademark rights. There have also been reports of corporate sabotage. For example, it was reported that a public relations firm allegedly set up a Twitter account in the name of a rival firm. The firm then allegedly disseminated malicious “tweets” for two months before the competing firm realized that its identity had been hijacked.

What is illustrated by the preceding examples is that one of the most basic steps that brand owners can take to minimize the risk of trademark infringement or hijacking on social media sites is registering their names. Before “jumping” into social media marketing, however, they should have a well-planned branding strategy. Experts do not recommend that companies “jump” into social media marketing because social media requires a well-designed strategy for it to be most effective.

Once brand owners have reserved their names, they should next institute a monitoring program to detect negative, inaccurate and misleading comments about them and intellectual property infringements. Although gaining complete control over all negative comments and unauthorized use of company intellectual property is not practical or feasible, a certain amount of control is achievable by monitoring social network sites on a regular and systematic basis.

A monitoring program can consist of a self-monitoring program, carried out by company employees or an independent monitoring service company. Before implementing a monitoring program, however, it is advisable to first decide what sort of content poses the greatest risk and what type of content can be ignored. Most companies should at least be concerned with the following types of content: trademark infringement, dilution, counterfeit sale of goods or services, defamatory speech, brand tarnishment, impersonation of company employees and false or misleading advertising. Companies should also consider which of the social network and user-generated content sites are most relevant to their industry and business. The more common sites to monitor include Facebook, Twitter, MySpace, YouTube, Wikipedia®, Second Life and other virtual worlds, eBay®, industry blogs and product and service review sites.

A self-monitoring program should include a weekly or monthly review of a number of available social media web sites. There are search engines that can help companies find damaging content about them. Those sites include icerocket.com (searches blogs, Twitter, MySpace, news and images), Google.com/alerts (alerts for use of company names and brands on blogs, the Web, news, videos, discussion groups) and technorati.com (searches blogs).

Alternatively, companies may decide to hire an outside company to monitor for negative comments and infringements. In addition to monitoring the applicable sites, monitoring service companies can also, if need be, rehabilitate a damaged brand, caused by negative comments, by developing new web pages featuring favorable commentary, which will push unflattering comments and web pages to the bottom of search engine result pages. Companies must be aware, however, that creating “false” and “misleading” positive reviews about their company, known as “astroturfting,” may violate false adverting laws, which may trigger government action against the violating company. The service companies can also generate monthly reports that list negative comments made about companies during the previous month.

Once companies find activities that are damaging to their brands, they will need to consider the level of damage being caused, the nature of the activities and the company or individual(s) involved. If the activities are clearly intended to harm the brand, then swift and strong action is probably warranted. However, if the infringement is innocent or at least not intentional, a soft approach is likely the best strategy. The last thing any company wants is for the recipient of a strong cease and desist letter – who was innocently infringing the property – to post it on his or her blog and post negative commentary. A good approach is to review each “infringement” on a case-by-case basis.

Some companies realizing the importance of having a presence on social networking sites are discovering that someone has already registered their company and/or brand names on Facebook and Twitter, for example. What can these companies do? The first step is to review the site operator’s terms of service to find out how trademark infringement and trademark hijacking cases are handled by that service provider and then file a complaint. If the complaining party does not obtain a favorable result from the site owner, what then? Are there current laws, at least in the U.S., that would remedy the ongoing infringement?

Presently, there is uncertainty as to whether current trademark laws are designed to sufficiently address the numerous trademark issues presented by social networking sites. The problem with current U.S. laws is that they tend to cover infringement of second-level domain names. Second-level domain names appear in the Web address immediately preceding the top-level domain, such as www.facebook.com. This enables McDonald’s to use the existing U.S. trademark laws against a cyber squatter who registers www.mcdonalds.com. On both Facebook and Twitter, however, users have the ability to select personalized “user names,” not “domain names,” which appear as part of the URL or web address, but not part of the domain name (i.e., facebook.com/username). Unless the site owner, i.e., Twitter or Facebook, is agreeable to removing an infringing username from its service after receiving a complaint or a “squatter” is agreeable to relinquishing control of the infringing username to the rightful trademark owner, the trademark owner may have no choice but to file suit against the infringing party in court based upon traditional trademark infringement principles.

In an effort to minimize the risks of trademark hijacking, trademark infringement and damage to brand reputation that may occur on social media networking sites, it is advisable to take precautionary and proactive steps. Those steps include reserving company names and key permutations of company names with social networking sites, developing a presence in social networking communities, assigning company employees that are responsible for overseeing the monitoring process, understanding terms of use for each of the major social networks and develop consistent enforcement procedures.

The advent of social networking and user-generated content sites has given companies a myriad of new opportunities to promote their brands that were not previously available with traditional media. However, those opportunities have also created new challenges for managing company brands. Those challenges will likely require companies to institute consistent enforcement programs, which should include taking swift action when misuse of company brands are detected. The development of an enforcement program, and commitment to systematically monitor for potentially damaging activities, can go a long way toward making sure that online social networking sites remain free of content that is damaging to company brands.

Your email address will not be published. Required fields are marked *