/
PIRATES! 11 WAYS TO PROTECT YOUR MEETING PIRATES! 11 WAYS TO PROTECT YOUR MEETING

PIRATES! 11 WAYS TO PROTECT YOUR MEETING - PowerPoint Presentation

pasty-toler
pasty-toler . @pasty-toler
Follow
342 views
Uploaded On 2019-11-28

PIRATES! 11 WAYS TO PROTECT YOUR MEETING - PPT Presentation

PIRATES 11 WAYS TO PROTECT YOUR MEETING Patricia Andrade Vice President Marketing and Communications Angel Napolitano Executive Vice President Client Operations WHO ARE THEY THE PIRATE THE POACHER POACHER ID: 768460

official housing domain block housing official block domain trademark registration attendees website protect meeting godaddy names rooms domains hotel

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "PIRATES! 11 WAYS TO PROTECT YOUR MEETING" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

PIRATES! 11 WAYS TO PROTECT YOUR MEETING Patricia Andrade Vice President Marketing and Communications Angel Napolitano Executive Vice President Client Operations

WHO ARE THEY? THE PIRATE THE POACHER

POACHER UNETHICAL Use of conference name and official-like appearance with small disclaimer. May offer rooms around the official housing block. May purchase rooms from official hotels and/or official housing and registration services and charge a higher price. Will drop official housing rooms if they can’t fill them, causing attrition charges for association. May say that the room block is sold out, but they can get you a better room for a lower rate or even in the same hotel for a better price.

PIRATE ILLEGAL Use of conference logos, trademarks and images to make communications look official. Non-existent hotel rooms or registration. Usually international, harder to enforce laws.

CAN YOU RECOGNIZE THEM? A B

CAN YOU RECOGNIZE THEM? A B

FIGHT!

1 PROTECT YOUR DATA Protect the names of your members, exhibitors, and attendees from unwanted solicitors. Password protect and encrypt your data! Make sure that your vendors are protecting your data, as well.

2 LAUNCH YOUR WEBSITE EARLYPirates’ websites are short and to the point, and they are online way in advance. When attendees/sponsors are searching for your meeting online, make sure they find YOU... The earlier your website is up, the earlier crawlers will discover and index your website. Make sure you take steps to get your event website indexed asap! http://www.google.com/addurl/

3 OPEN HOUSING EARLYOpen international housing as early as possible. International attendees book up to a year in advance. Their sponsored groups may be comprised of hundreds of attendees, and they start logistics early. International groups are prime meat for poachers and pirates. Just 1 group may signify thousands of dollars- for the pirate in stolen money, for the poacher in additional fees, and for the association in attrition charges.

ALERT YOUR MEMBERS Include alerts about the official room block and potential room block piracy and poaching risks in the event website, event emails, and in the registration and housing systems. You can even add screenshots of offending sites!Make sure the user acknowledges that they’ve seen the notice. 4

5 COMMUNICATE OFFICIAL HOUSING Most meeting planners don’t manage their own housing. If you are using 1 or more housing vendors, make sure you communicate who they are CLEARLY, LOUDLY, AND OFTEN.Information on correct processes and dates should be readily available.

6 CREATE AN OFFICIAL HOUSING LOGO Use a distinct official housing or official vendor logo that CANNOT be copied/lifted. Disable the right-click on your website.

7 OFFER BLOCK BENEFITS Offer registration discounts or incentives like the use of free event shuttles for attendees booking within the housing block. Impose around the block booking penalties for attendees and groups that book around the block.

8 DON’T GO OVERBOARD! Make sure that your pirate-fighting tactics aren’t harming your meeting in the long run.

9 CHECK YOUR HOTEL CONTRACTS, OFTEN Even official hotels sometimes sell rooms to poachers. Examine your negotiated hotel contracts to make sure you are protected. Consistently run audits comparing registration to rooming lists.

10 FIND THEM Run Google.com, Yahoo.com, even AskJeeves.com web and image searches for your meeting name, dates, logo, etc. Set up Google Alerts. You’ll receive an email every time your name is mentioned online.

11 USE THE POWER OF THE INTERNET

The Internet Corporation for Assigned Names and Numbers (ICANN) is the California-based nonprofit public-benefit organization with authority over the global Internet’s system of unique identifiers, e.g. IP addresses and domain names, known as generic top-level domains (gTLDs). The WIPO Arbitration and Mediation Center (Center) manages the Uniform Domain Name Dispute Resolution (UDRP) , a cost-effective and highly-efficient protection. Upon a successfully adjudicated claim, a trademark owner may elect to have the abusively-registered domain name deleted, or to have the domain name transferred to their control. Trademark Clearinghouse (TMCH) database to serve as a centralized repository of trademark records to interface with each new gTLD. You can submit your trademark data into the database. You'll receive a unique authentication key which gives you access to participate in every Sunrise period and will notify you of the domain that has been registered with your trademarked name. The Trademark Registry Exchange (' TREx ') is a new service developed by the Trademark Clearinghouse, which provides trademark holders with an additional protection layer for unregistered domain names, matching their labels, across a multitude of TLDs, by restricting the registration of these domain names in the general availability phase.

Domains Protected Marks List programs, DPMLTM and DPML PlusTM , offer cost-effective solutions that protect your brand’s trademarks, prevent cybersquatting and ensure that your domains are available for future use. With DPML and DPML Plus, you can easily and affordably block registrations of validated trademarks without requiring defensive purchases in each of Donuts’ 239 top-level domains (TLDs). Lets brand owners block the registration of terms registered in the Trademark Clearinghouse throughout the entirety of Uniregistry's Top Level Domain portfolio. DMCA.com provides its customers with a variety of tools to help detect any stolen content (images, text, video, etc.). They provide SEO monitoring and will take down any stolen content. Search engine used for querying databases that store the registered users or assignees of an internet resource, such as a domain name, an IP address block or an autonomous system, but is also used for a wider range of other information.

phishing@godaddy.com , copyrightcomplaints@godaddy.com , trademarkclaims@godaddy.com , verifypayment@godaddy.com , spam@godaddy.com Google Ads will investigate complaints against any trademarked material. Trademarks are regional, so make sure your brand is trademarked everywhere. udrp@namecheap.com E-mail Services

COMMUNICATE

Q&A Angel Napolitano Executive Vice President Client Operations napolitano@abtscs.com Patricia Andrade Vice President Marketing and Communications pandrade@abtscs.com