In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks August 2014 | Page 3
1
Introduction
O
nline reputation attacks have become one of the easiest and
most impactful mechanisms for individuals and companies to
cause serious damage to businesses.
These types of attacks can originate from a variety of sources, but most
commonly the “attackers” are competitors, disgruntled employees,
disgruntled customers, disgruntled investors, extortionists or other
people and businesses who become upset with a company (or
associated individuals) and want to cause that company serious
damage.
Further, these attacks come in many forms. Some common types
of attacks include making a slew of defamatory postings on gripe
websites such as Ripoff Report and Pissed Consumer; posting false
information on social media websites or apps, including Facebook
and Twitter; anonymously sending defamatory emails to clients or
customers; posting false reviews on Yelp or similar websites; altering
Wikipedia entries about a company or particular executives in an
embarrassing or otherwise harmful way; or creating websites or
blogs and posting disparaging information on these platforms. The
common misperception is that this conduct is somehow protected.
It is not.
Considering the ease with which these types of attacks can be
initiated, and because of how quickly content can spread on the
internet, online reputation has become a top concern for businesses
and executives. In fact, according to “Exploring Strategic Risk,”
Deloitte’s 2013 survey of 300 executives, reputation was cited as the
defamationremovalattorneys.com