Social media tips to avoid a risk management nightmare

Tags:

Preview:

DESCRIPTION

 

Citation preview

Social Media: Tips to Avoid a Risk Management Nightmare

ACUITY FORUMS’ EXECUTING SOCIAL MEDIA 2010

AgendaBackground

Issues

Governance strategies

Policy development

Ensuring privacy

Private vs. public information

Leaking information

Dealing with outside issues

February 9, 2010

ContextInternal

External

Personal

February 9, 2010Executing Social Media 3

Background - ExternalProfiles on most platforms

Social networking

Facebook

LinkedIn

Plaxo

Stumble Upon

etc.

Wikis: Wikipedia, etc.ForumsBlogs

X employees

February 9, 2010Executing Social Media 4

IssuesConfidential information

FinanceSecurityPrivilegeSecrets

Intellectual Property

Reputation

Liability

Time theft

February 9, 2010Executing Social Media 5

RealityIndividuals

High usageUser-friendlyTrendy and viral

Low understandingLawsImpactsUnderlying technologies

TechnologiesUncontrollable

AnonymityThird party

Unavoidable“Right”

Last “forever”

February 9, 2010Executing Social Media 6

Background - InternalInteractive and customizable intranet

Look and feelWidgets

Productivity

News

Wikis

Forum

Internal blog

Human capital management

Metacrawler

February 9, 2010Executing Social Media 7

IssuesConfidential information

FinanceSecurityPrivilegeSecrets

Intellectual Property

Reputation

Liability

Time theft

February 9, 2010Executing Social Media 8

RealityTechnologies

ControllablePartial anonymityIn-housePrivilege

Moderated

IndividualsLower usage

ImpactPartial anonymity

Better understandingEducation Policy Laws

February 9, 2010Executing Social Media 9

Solution = Policies integration

February 9, 2010Executing Social Media 10

Data classification• Confidential• Internal use• Public

Communication• Language• Content• Respect

Document retention• Periods depends on

information and platform

Security• Access

Code of conductRead and signed annually

Web-based education

Solution = TechnologyNo

Print ScreenshotSaveEmail

LogLimited access

History

Traceability

Username

Password

February 9, 2010Executing Social Media 11

Next step...Engaging with the outside

Service providers and vendorsCustomers

UsesCorporation

Communication

Notice

Promotion

Publicity

R&D

Customers

Comments

Complaints

Ideas

February 9, 2010Executing Social Media 12

February 9, 2010

Privacy issues

Executing Social Media 13

PIPEDA reviewPart and Schedule 1

Private sectorGovernment

Privacy Act

Personal informationAbout an identifiable individual…who is an employeeExcluding business id information

In the course of commercial activity

Collected, used or disclosed

Key ConceptsConsentLimited collectionLimited useSafeguards

February 9, 2010Executing Social Media 14

Different casesLoyalty and whistleblowing

“My employer sucks”“My employer violates the law”“My Department wastes the government’s money”

Identity and opinionI work for Department X and I

like to sleep with animals hate big corporationsam telling you that 1 + 1 = 3

February 9, 2010 15Executing Social Media

No contractual leverageHow to deal with

former employeesanonymous publications

SolutionsBreach of confidenceDefamation & intentional interferenceCopyright and TM infringementBreach of statuteBreach of special covenant

February 9, 2010Executing Social Media 16

Questions?