Legal Issues, Head-On!

Category: Social Media

Following FTC Rules on Online Marketing

Following FTC Rules on Online Marketing

For most of the 20th-century television advertising was a regulated industry. Initiatives like Kidvid and the Fairness Doctrine helped keep television a balanced but still profitable business platform for a number of successful companies.

When the web first became popular in the early 90s it was not immediately accepted as a commercial platform. Since online advertising has now become a multibillion-dollar business it is necessary for regulators to take a closer look at how products are promoted on the web. The Federal Trade Commission is the organization tasked with making sure customers have a clear idea what they’re buying and from whom.


If you are promoting a product on the Internet your obligations under FTC regulations are fairly simple. You need to make certain that your customer knows who is selling the product, who is promoting the product and who is reviewing the product. From a regulatory standpoint, this is known as “transparency.”

Following these guidelines makes it possible for the customer to make an informed decision about their purchase while not having to worry about whether or not reviews, promotions, and sales techniques are genuine.


As a reviewer, your main obligation under FTC regulations is to disclose any relationship you may have with the manufacturer of a product or any relationship you may have with other reviewers. This is so customers who read your review will be reassured your opinion has not been unnecessarily influenced by the manufacturer or by other reviewers. This principle also to ensures you haven’t been secretly compensated for your efforts in reviewing a product.


Disclosure principles become especially important in the world of influencer marketing. Many bloggers have made a career of reviewing products on their sites. The trust between bloggers and their readers is the foundation upon which their business operates.

If they endorse a product at the behest of a manufacturer they are required to disclose to their readers the manufacturer compensated them for their article or opinion or paid marketing. This rule creates a distinction between an independent reviewer and a paid marketing campaign.

By and large Federal Trade Commission regulations are very easy to follow. At the same time they are a necessary part of online marketing because they help enforce the difference between paid marketing and the genuine opinion of another customer. Only this level of trust makes it possible for online marketing to join other media in being a part of a successful economy.

Continue Reading

Kyani Customer Service

Kyani Customer Service

The customer service line is +1 (844) 701-5049. You can contact a support member at If you are trying to contact corporate headquarters, call  +1 (208) 529-9872.


With so many different products, events, and general inquires coming from more than 50 countries, it’s no wonder that Kyani has so many offices around the world with fully-staffed departments to keep things running smoothly.

In the United States, the Customer Service department is located in Idaho Falls, Idaho. Their department offers support in English, Spanish, Portuguese, French, and Chinese (among several other languages). Calls are taken during business hours of 8 am until 8 pm Monday thru Friday every. week.

There are 3 ways to contact the Kyani Customer Service Department:


  1. Call
    The main phone number for customer service is +1 (844) 701-5049. You can even call on Saturday between the hours of 9 am until 5 pm for any questions you have. If there is a wait time, it is not usually very long at all.
  2. Chat
    If you visit you will be directed to the support page. In the bottom right hand corner there is a chat window that is active Monday thru Friday between 8:30 am and 5:30 pm. Chat support is useful when you are not able to call but you wish to receive quick support.
  3. Email
    The support team is very responsive to emails received throughout the day. You can expect an email reply within 1 business day or less. To send a message to the customer support team just email

How To Get Fast Service

Depending on what you need assistance with, there are some helpful things you can provide the Customer Service agent in order to help you as quickly and as efficiently as possible. If you do not have these items do not worry; Customer Service can look up your information if you are in the system.


Order Number

If you are calling about your order, you will receive even faster service if you provide your order number to the customer service agent. By providing your order number at the start of the call they can begin looking up your order while you explain your concern or question. This will save you time and it will allow the agent to begin investigating your order to see the status and the notes.


Browser Settings

If you are having an issue with the website, whether that is in the shopping site, the distributor back office web site, or even just the main corporate website, you can share your settings with the support team by going to At the top of the page there is a green button for copying the link at the top:

Kyani Customer Service


By clicking that button you will copy that code to your clipboard. When you start chatting or emailing the Kyani customer service team, give them that code so they can see what you are seeing.


Continue Reading

Are You Sharing Too Much? A Privacy Settings Guide

Are You Sharing Too Much? A Privacy Settings Guide

In the world of social networking, sharing is the name of the game. Studies such as the one in this article show that people are using social media more than ever. As this sharing trend continues to rise, double checking your security is more important than ever. To get you started, let’s check out two of the most popular sites available.

First up, Facebook. You can navigate to your settings through this link directly. Or, if you’re using a computer, navigate to the drop-down menu in the top right, and click settings. From there we are focusing on two tabs. Security and Privacy.

The Security tab mainly functions as a way to protect your account from outside access. You can get notifications when someone other than you tries to login to your account, add an authorization code as a second layer of security, or even set different passwords for mobile logins. It is also important to check the Recognized Devices and Where You’re Logged In settings, as these can show you other people that may have access to your account already. It’s common to borrow someones computer or phone to check your Facebook and forget to logout, or even accidentally save your login information to their device.

The Privacy tab is very straightforward, and is used mainly to control who can view your profile, posts, and private information. If you don’t want random people finding your phone number on Facebook, hide it here!

Next up, Twitter. Access your settings with this link directly. Also, on desktop, you can click your profile image in the top right of the page, and navigate to settings from there. We’ll be looking at the Account tab, as well as the Privacy and Safety tab.

The Account tab is similar to the Facebook Security tab. You can add a phone number to your security settings here, allowing you to manually confirm every time a new login is attempted on your account. Even if your password is hacked, this allows you to stop attempts to login. You may also setup a more detailed password reset feature, which prevents other people from resetting your password without answering security questions that only you would know.

The Privacy and Safety tab follows the same function as Facebook’s Privacy settings. Here is where you will limit to what information and posts other Twitter users can access. You can prevent anyone from seeing your Twitter feed who you haven’t approved, set photo tagging and location settings, as well as adjusting messaging privacy.

Remember, preventing unauthorized access to your account is always the first and best strategy to stopping unwanted events. Whenever you sign up for a new website, take just a few minutes to review your security settings. Doing this saves hours of potential headaches in the future!

Continue Reading

Your Digital Footprint is Larger Than You May Realize

Your Digital Footprint is Larger Than You May Realize

Everyone who goes online leaves a footprint. Online retailers and review sites often leave cookies that feed information about your online activity back to them. Google makes their money from tracking everything that you do and serving up ads targeted towards your observed interests, as do most other search engines. Social media like Facebook and Twitter do the same.

Microsoft Windows 10 collects massive amounts of personal data and browsing history and sends it to Microsoft. If you dig out and reset all of the settings, you can minimize that, but you can’t use Windows and eliminate it completely. Apple does the same thing, though they claim that they don’t use it for anything but making Siri work better for you.

Yet they do track and store your iPhone’s GPS data. They can draw a map of everywhere you’ve carried your phone for the last several years, and where you go reveals a lot about your life. Android users who think that Google doesn’t do the same thing haven’t looked at Google closely.

The NSA swore under oath that they didn’t collect data, but Snowden proved that they do. They now claim that it’s only metadata, but do we trust them this time?

Anybody Can Do It

It’s not just big companies and government agencies, either. It’s not difficult to take a bit of information that you know about someone and find out a lot more about them through their digital footprint.

Easiest is a search engine on what they do know. If you’re interested in someone on a forum who uses the nickname ‘sweetie18’, doing a web search on the nickname will turn up other forums where the handle is in use, and they’re all likely to be the same person. Sending a bit of text that looks like spam to the common email sites like gmail, hotmail, yahoo and the like with the username ‘’ may reveal their email address. Any mail sent that does not return a ‘mail undeliverable’ is an address in use by someone.

If you can find one profile picture, any site like will help you look for the same image wherever it has been used. If it shows up on Facebook, it also reveals what they told Facebook that their real name is. Take that back to the search engines, and their life opens up pretty quickly.

This doesn’t count the information that we leave about ourselves on social media. Whatever you say on Facebook or Twitter is a matter of public record.

Continue Reading

Going Offline – How to Remove Yourself From Social Media

Going Offline - How to Remove Yourself From Social Media

In the days of oversharing, removing yourself from social media can be one of the most rebellious yet satisfying acts that one can undertake. However, it can be surprisingly difficult to erase all traces of your digital footprint. Here are some of the steps you’ll need to take in order to make your online presence disappear.

Although you may be chomping at the bit to delete everything right away, make sure that you take special care to go over the instructions for deletion. Some social media platforms, such as Facebook, offer you two options for quitting—”suspending” or “deleting.” If you are looking to remove every trace of yourself from social media, then you will want to choose the latter option. Also, Facebook does allow you to go through your profile and download items before doing a deletion.

However, it is important to note that you may need to reach out to your Facebook friends and ensure that they have deleted all photos of you. With facial recognition technology becoming so precise, it is imperative that the photos be actually deleted from the system if you truly do not want them associated with you in any way. Furthermore, many pictures can be geotagged, allowing prying eyes to discover if you were in a certain place at a certain time. The only way to ensure privacy going forward is to completely delete them from the system.

Also, consider the apps that you have connected to Facebook before you delete it completely. You may need to create other logins for these apps now that you are getting rid of Facebook. Keep an eye on apps such as Tinder. Even if you delete it from your phone, the app will still be connected to your social media profile. It must be deleted from within the actual app. The sooner you take care of all these minor issues, the easier it will be to transition out of social media entirely.

Although Twitter and Instagram offer a more straightforward deletion process than Facebook does, you still will want to be vigilant and reach out to friends who have tagged you in items that you would like to have removed. Remember to delete Instagram from within the app; deleting it from your phone will not help you to achieve your ultimate goal. Although this whole process can be incredibly time-consuming and will require meticulousness, it will be worth it in the end. These days, there are so many reasons to reclaim your privacy, and removing your digital footprint is an excellent way to begin the process.

Continue Reading