SlideShare a Scribd company logo
1 of 46
DIGITAL COMPETENCE DAY AT THE EU COMMISSION
             MARCH 26, 2013

       Internal social networks
         Risks&opportunities




                                        Jacques Folon
                                  Partner Edge Consulting
                              Me. de conf. Université de LIège
                                   Chargé de cours ICHEC
                               Prof. invitéUniversité de Metz
Cette présentation est sur
www.slideshare.net/folon

elle est à votre disposition
MY DIGITAL IDENTITY
http://jacquesfolon.tel
First part :Risks

1.   Data privacy
2.   Data security
3.   Intellectualproperty
4.   What about an
     internalcommunity
     manager?
1.0 Data privacy
1.1.Data privacy basics
• Basic principles: the Data
   controller
(i.e. the EU COMMISSION)
   – collect and processpersonal data
     onlywhenthisislegallypermitted
   – respect certain
     obligationsregarding the
     processing of personal data (details
     on nextslide) ;

   – respond to
     complaintsregardingbreaches of
     data protection rules;
   – collaboratewith national data
            Source: http://ec.europa.eu/justice/data-protection/index_en.htm
1.2. Data privacyrules for data
               controllers
• Personal Data must be
   – processed legally and fairly;
   – collected for explicit and legitimate
     purposes and used accordingly;
   – adequate, relevant and not excessive in
     relation to the purposes for which it is
     collected and/or further processed;
   – accurate, and updated where necessary;
   – kept any longer than strictly necessary;
   – rectified, removed or blocked by the
     data subject if incorrect;
   – Protected against accidental or unlawful
     destruction, loss, alteration and
     disclosure, particularly when processing
     involves data transmission over
     networks.

          Source: http://ec.europa.eu/justice/data-protection/index_en.htm
1.3. Data privacy&
    internal social media questions

•   Whichprecisepurpose ?
•   Whatkind of personal data willbestored?
•   Are data stored in Europe ?
•   Are they in the « Cloud »?
•   Data privacy commission adviceneeded?
•   Whatwillbe the securitypolicy?
•   What about the content of ex-employees?
•   Is a code of conductenough?

             SO IT ’S AN IMPORTANT ISSUE !!!
2.0. Data security




SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
Source : https://www.britestream.com/difference.html.
How many information?




                        67
Employees share (too) many information and
          also with third parties
Where do one steal     Which devices are
       data?                stolen?

•Banks                •USB
•Hospitals            •Laptops
•Ministries           •Hard disks
•Police               •Papers
•Newspapers           •Binders
•Telecoms             •Cars
•...
TELEWORKING
What are Control limitations?
3.0. INTELLECTUAL PROPERTY




  Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
Copyright infringment




Source: http://en.wikipedia.org/wiki/File:Plagiarism_vs_Copyright_Infringement.png
Employer’sresponsibility !
• What about
  externalprotectedworks?
• What about creation by employees?
• What about import of
  protectedworks by employees?
• What about sub-
  contractorsprotectedworks?
• What about advertisingcampaign?
• What about pressclipping?
• What about externaltrademarks
• What about employee’s images?
• …

• What do youthink of a code of
  conduct?                   http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
4.0. INTERNAL COMMUNITY MANAGER




PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
Who’s in charge if …?




http://www.capreseaux.fr/community-management/
Second part: Added value




http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
Reading and answering e-mail. Approximately 28%, or about 11.2 hours,
of the average interaction worker’sworkweekisspentreading and
answering e-mails. The studyindicatesthatbecause of private social
media’sability to makesearchable content out of all posted messages, the
amount of time spentwith e-mail canbereduced by as much as 35%, or
about 4 hours.
Searching and gathering information. 19%, about 7.6 hours, of the
average interaction worker’sworkhours are spentsearching for internal
information only certain employeespossess. Again, because of enterprise
social media’sability to store all messages as searchable content, this
figure canbereduced by nearly 35% to about 4.9 hours per week,
whichamounts to a savings of 2.7 hours per week per interaction worker.
Communicating and collaboratinginternally. Using phones, e-mail, and
in-person interaction to communicate consumes about 5.6 hours of the
average interaction worker’sworkweek. Becauseyoucandirectly message
anyone in the organizationwithoutcluttering up an e-mail inboxwith a
collaboration tool, yourorganizationcanrealize up to a 35% time
savings, or about 2.0 hours per interaction worker.
Role-specifictasks. Tasksspecific to a particular job consume the
mostamount of time for anyrole, averaging out to about 15.6 hours per
week. Internal social media increases the productivity of thesetasks by
about 15%, or approximately 2.3 hours per week. One
waytheyenhancejob-specificproductivity lies in theirability to centralize al
job functionsat one hub, soyouremployeesbeginusing all other
applications there.
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
Source de l’image: http://agiledudes.com/wp-content/uploads/brain-transfer.jpg
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
Reed's Law
     The value of
   networks scales
  exponentially with
    the size of the
       network.

http://fr.slideshare.net/eekim/achieving-collective-intelligence
Brooks's Law
   Adding people
    to a complex
  project makes it
     take longer.


http://fr.slideshare.net/eekim/achieving-collective-intelligence
Network                                                       Network
     Potential                                                     Friction




http://fr.slideshare.net/eekim/achieving-collective-intelligence
We Want Reed to Win!




http://fr.slideshare.net/eekim/achieving-collective-intelligence
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
Otheradded value
•   KM
•   Collective intelligence
•   Co-working
•   Network management

• BUT

• The vendorsalreadytoldyou, is ‘nt it?
Conclusion
•   Do not forgetprivacy issues
•   CC/CO 81
•   Control or not control
•   IPR regulation s/b reminded
•   Internal code of conduct
•   BUT
•   There are some important added value
Internal code of conduct main
                 rules
•   Define the internal and external social media
•   Intellectualpropertyrules
•   Data privacyexplanations
•   Confidential information
•   Anonimityisforbidden
•   Penalties
•   And
•   Which communication for the code of conduct?
•   How to have itapproved?
Any questions ?




Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/
                                                                                         45
Internal social networks

More Related Content

What's hot

computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology Jeanloismorante
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologyterlyn711
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ajinkya Dubey
 
اخلاقيات الثالث
اخلاقيات الثالثاخلاقيات الثالث
اخلاقيات الثالثBunayan ALdosari
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 

What's hot (20)

computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
اخلاقيات الثالث
اخلاقيات الثالثاخلاقيات الثالث
اخلاقيات الثالث
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 

Viewers also liked

Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?
Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?
Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?SMS Partner
 
Diccionario pictórico
Diccionario pictóricoDiccionario pictórico
Diccionario pictóricohilda moreno
 
Curso trabajar en red en asociaciones
Curso trabajar en red en asociacionesCurso trabajar en red en asociaciones
Curso trabajar en red en asociacionesAndres Dochao
 
Visión del Docente sobre el Uso del Blog en el Aula
Visión del Docente sobre el Uso del Blog en el AulaVisión del Docente sobre el Uso del Blog en el Aula
Visión del Docente sobre el Uso del Blog en el AulaSan Tiago
 
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)L'innovazione sociale secondo Roberto Covolo (Ex Fadda)
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)RENA
 
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...COIICV
 
Modelos requisitos casos de uso si_investigación
Modelos requisitos casos de uso si_investigaciónModelos requisitos casos de uso si_investigación
Modelos requisitos casos de uso si_investigaciónailatan66
 
Ellas hacen sedes pre inscripcion
Ellas hacen sedes pre inscripcionEllas hacen sedes pre inscripcion
Ellas hacen sedes pre inscripcionIgnacio Barrios
 
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273p
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273pGauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273p
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273pVaszati Shastra
 
Cv carolina prieto 2015 terminado (1)
Cv carolina prieto 2015 terminado (1)Cv carolina prieto 2015 terminado (1)
Cv carolina prieto 2015 terminado (1)Caro Prieto
 
Europe biosimilars market opportunity outlook 2020
Europe biosimilars market opportunity outlook 2020Europe biosimilars market opportunity outlook 2020
Europe biosimilars market opportunity outlook 2020KuicK Research
 
Origins of World War I
Origins of World War IOrigins of World War I
Origins of World War Irakochy
 
Drug release and dissolution
Drug release and dissolution Drug release and dissolution
Drug release and dissolution Areej Abu Hanieh
 
Mecanismos de transmision 1eso
Mecanismos de transmision 1esoMecanismos de transmision 1eso
Mecanismos de transmision 1esoroyomartinez
 
Guia creda els alumnes sords a ei i ci curs 11 12
Guia creda els alumnes sords a ei i ci curs 11 12Guia creda els alumnes sords a ei i ci curs 11 12
Guia creda els alumnes sords a ei i ci curs 11 12marialopeztena
 

Viewers also liked (20)

Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?
Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?
Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?
 
Color digital C Franco
Color digital C FrancoColor digital C Franco
Color digital C Franco
 
Diccionario pictórico
Diccionario pictóricoDiccionario pictórico
Diccionario pictórico
 
Curso trabajar en red en asociaciones
Curso trabajar en red en asociacionesCurso trabajar en red en asociaciones
Curso trabajar en red en asociaciones
 
Visión del Docente sobre el Uso del Blog en el Aula
Visión del Docente sobre el Uso del Blog en el AulaVisión del Docente sobre el Uso del Blog en el Aula
Visión del Docente sobre el Uso del Blog en el Aula
 
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)L'innovazione sociale secondo Roberto Covolo (Ex Fadda)
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)
 
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...
 
Modelos requisitos casos de uso si_investigación
Modelos requisitos casos de uso si_investigaciónModelos requisitos casos de uso si_investigación
Modelos requisitos casos de uso si_investigación
 
Gastro altas 1
Gastro altas 1Gastro altas 1
Gastro altas 1
 
Life forching. un nuevo comienzo
Life forching. un nuevo comienzoLife forching. un nuevo comienzo
Life forching. un nuevo comienzo
 
Ellas hacen sedes pre inscripcion
Ellas hacen sedes pre inscripcionEllas hacen sedes pre inscripcion
Ellas hacen sedes pre inscripcion
 
16 mamiferos
16 mamiferos16 mamiferos
16 mamiferos
 
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273p
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273pGauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273p
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273p
 
Cv carolina prieto 2015 terminado (1)
Cv carolina prieto 2015 terminado (1)Cv carolina prieto 2015 terminado (1)
Cv carolina prieto 2015 terminado (1)
 
Europe biosimilars market opportunity outlook 2020
Europe biosimilars market opportunity outlook 2020Europe biosimilars market opportunity outlook 2020
Europe biosimilars market opportunity outlook 2020
 
Origins of World War I
Origins of World War IOrigins of World War I
Origins of World War I
 
Oportunidad forever living
Oportunidad forever livingOportunidad forever living
Oportunidad forever living
 
Drug release and dissolution
Drug release and dissolution Drug release and dissolution
Drug release and dissolution
 
Mecanismos de transmision 1eso
Mecanismos de transmision 1esoMecanismos de transmision 1eso
Mecanismos de transmision 1eso
 
Guia creda els alumnes sords a ei i ci curs 11 12
Guia creda els alumnes sords a ei i ci curs 11 12Guia creda els alumnes sords a ei i ci curs 11 12
Guia creda els alumnes sords a ei i ci curs 11 12
 

Similar to Internal social networks

Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 
NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. ShookJ. David Morris
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in PracticeTomppa Järvinen
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and designRai University
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsCarl Brown
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxJoshuaCasas7
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 

Similar to Internal social networks (20)

Réseaux sociaux d'entreprise
Réseaux sociaux d'entrepriseRéseaux sociaux d'entreprise
Réseaux sociaux d'entreprise
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. Shook
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptx
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 

More from Prof. Jacques Folon (Ph.D)

Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTProf. Jacques Folon (Ph.D)
 

More from Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Internal social networks

  • 1. DIGITAL COMPETENCE DAY AT THE EU COMMISSION MARCH 26, 2013 Internal social networks Risks&opportunities Jacques Folon Partner Edge Consulting Me. de conf. Université de LIège Chargé de cours ICHEC Prof. invitéUniversité de Metz
  • 2. Cette présentation est sur www.slideshare.net/folon elle est à votre disposition
  • 4. First part :Risks 1. Data privacy 2. Data security 3. Intellectualproperty 4. What about an internalcommunity manager?
  • 6. 1.1.Data privacy basics • Basic principles: the Data controller (i.e. the EU COMMISSION) – collect and processpersonal data onlywhenthisislegallypermitted – respect certain obligationsregarding the processing of personal data (details on nextslide) ; – respond to complaintsregardingbreaches of data protection rules; – collaboratewith national data Source: http://ec.europa.eu/justice/data-protection/index_en.htm
  • 7. 1.2. Data privacyrules for data controllers • Personal Data must be – processed legally and fairly; – collected for explicit and legitimate purposes and used accordingly; – adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed; – accurate, and updated where necessary; – kept any longer than strictly necessary; – rectified, removed or blocked by the data subject if incorrect; – Protected against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks. Source: http://ec.europa.eu/justice/data-protection/index_en.htm
  • 8. 1.3. Data privacy& internal social media questions • Whichprecisepurpose ? • Whatkind of personal data willbestored? • Are data stored in Europe ? • Are they in the « Cloud »? • Data privacy commission adviceneeded? • Whatwillbe the securitypolicy? • What about the content of ex-employees? • Is a code of conductenough? SO IT ’S AN IMPORTANT ISSUE !!!
  • 9. 2.0. Data security SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
  • 12. Employees share (too) many information and also with third parties
  • 13.
  • 14.
  • 15. Where do one steal Which devices are data? stolen? •Banks •USB •Hospitals •Laptops •Ministries •Hard disks •Police •Papers •Newspapers •Binders •Telecoms •Cars •...
  • 17. What are Control limitations?
  • 18. 3.0. INTELLECTUAL PROPERTY Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
  • 20. Employer’sresponsibility ! • What about externalprotectedworks? • What about creation by employees? • What about import of protectedworks by employees? • What about sub- contractorsprotectedworks? • What about advertisingcampaign? • What about pressclipping? • What about externaltrademarks • What about employee’s images? • … • What do youthink of a code of conduct? http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
  • 21. 4.0. INTERNAL COMMUNITY MANAGER PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
  • 22. Who’s in charge if …? http://www.capreseaux.fr/community-management/
  • 23. Second part: Added value http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
  • 24.
  • 25. Reading and answering e-mail. Approximately 28%, or about 11.2 hours, of the average interaction worker’sworkweekisspentreading and answering e-mails. The studyindicatesthatbecause of private social media’sability to makesearchable content out of all posted messages, the amount of time spentwith e-mail canbereduced by as much as 35%, or about 4 hours.
  • 26. Searching and gathering information. 19%, about 7.6 hours, of the average interaction worker’sworkhours are spentsearching for internal information only certain employeespossess. Again, because of enterprise social media’sability to store all messages as searchable content, this figure canbereduced by nearly 35% to about 4.9 hours per week, whichamounts to a savings of 2.7 hours per week per interaction worker.
  • 27. Communicating and collaboratinginternally. Using phones, e-mail, and in-person interaction to communicate consumes about 5.6 hours of the average interaction worker’sworkweek. Becauseyoucandirectly message anyone in the organizationwithoutcluttering up an e-mail inboxwith a collaboration tool, yourorganizationcanrealize up to a 35% time savings, or about 2.0 hours per interaction worker.
  • 28. Role-specifictasks. Tasksspecific to a particular job consume the mostamount of time for anyrole, averaging out to about 15.6 hours per week. Internal social media increases the productivity of thesetasks by about 15%, or approximately 2.3 hours per week. One waytheyenhancejob-specificproductivity lies in theirability to centralize al job functionsat one hub, soyouremployeesbeginusing all other applications there.
  • 31. Source de l’image: http://agiledudes.com/wp-content/uploads/brain-transfer.jpg
  • 35. Reed's Law The value of networks scales exponentially with the size of the network. http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 36. Brooks's Law Adding people to a complex project makes it take longer. http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 37. Network Network Potential Friction http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 38. We Want Reed to Win! http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 40. Otheradded value • KM • Collective intelligence • Co-working • Network management • BUT • The vendorsalreadytoldyou, is ‘nt it?
  • 41. Conclusion • Do not forgetprivacy issues • CC/CO 81 • Control or not control • IPR regulation s/b reminded • Internal code of conduct • BUT • There are some important added value
  • 42. Internal code of conduct main rules • Define the internal and external social media • Intellectualpropertyrules • Data privacyexplanations • Confidential information • Anonimityisforbidden • Penalties • And • Which communication for the code of conduct? • How to have itapproved?
  • 43.
  • 44.
  • 45. Any questions ? Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/ 45