Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Impersonation on Social Media: The Increasing Challenges of Verification

By Christine Au-Yeung and Chidera Dawodu
February 01, 2023

Among the ways social media platforms have tried to distinguish notable account holders such as celebrities, public figures, and brand names from impostors and inspire trust on their platforms, the blue checkmark appears to be most popular. Social media platforms have traditionally recognized such accounts by adding the blue checkmark next to the handles once the platforms have verified the authenticity of the accounts. However, the recent flurry of online impersonators, ranging from accounts posing as President Joe Biden to the pharmaceutical company Eli Lilly, exposes the challenges of social media platforms' verification and authentication processes. Indeed, Twitter recently altered course with the "Twitter Blue" program, which is an "opt-in, paid monthly subscription that adds a blue checkmark to [an] account …." Soon thereafter were reports of an increase in impersonation on the platform, with accounts purportedly owned by companies and public figures posting misleading or false content. These recent events show that monitoring and policing trademark infringements and right of publicity violations can be increasingly difficult in the social media context.

|

Verification on Social Media Platforms

Social media verification badges, or "blue checks," are part of a safety protocol that allow users to trust that the public figures and businesses they follow are real and the content from these accounts is authentic. Consequently, they can deter imposters and prevent successful scams.

Platforms such as Facebook, Instagram, Twitter, and TikTok each identify public figures and businesses with a blue check near their display names. While each policy differs slightly, the pillars of the policies remain the same, namely, that: 1) a user must be public figure; 2) the user must be in good standing with the platform and abiding by its guideline and terms and conditions; and 3) the account must be made public. Typically, upon a user-initiated request, Facebook, Instagram, and TikTok each conduct an internal process of review to validate the authenticity of the requester and that all requirements are met.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

CoStar Wins Injunction for Breach-of-Contract Damages In CRE Database Access Lawsuit Image

Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Fresh Filings Image

Notable recent court filings in entertainment law.