Developing Procedures and Governance Policies for Social Media Applications and Ensuring Privacy Protection Infonex’ Gover...
<ul><li>Dominic Jaar </li></ul><ul><ul><li>Legal counsel, Ledjit Consulting inc. </li></ul></ul>June 7, 2009
Agenda June 7, 2009
Background - External <ul><li>Profiles on most platforms </li></ul><ul><ul><li>Social networking </li></ul></ul><ul><ul><u...
Issues <ul><li>Confidential information </li></ul><ul><ul><li>Finance </li></ul></ul><ul><ul><li>Security </li></ul></ul><...
Reality <ul><li>Individuals </li></ul><ul><ul><li>High usage </li></ul></ul><ul><ul><ul><li>User-friendly </li></ul></ul><...
Background - Internal <ul><li>Interactive and customizable intranet </li></ul><ul><ul><li>Look and feel </li></ul></ul><ul...
Issues <ul><li>Confidential information </li></ul><ul><ul><li>Finance </li></ul></ul><ul><ul><li>Security </li></ul></ul><...
Reality <ul><li>Individuals </li></ul><ul><ul><li>Lower usage </li></ul></ul><ul><ul><ul><li>Impact </li></ul></ul></ul><u...
Solution = Web2.0 policy <ul><li>External blog, forum, wiki, online hosting, chat,  etc. </li></ul><ul><li>Recommendations...
Solution = T&C + Moderator June 7, 2009 Infonex’  Government Web 2.0 and Social Media
Solution = Policies integration June 7, 2009 Infonex’  Government Web 2.0 and Social Media
Solution = Technology <ul><li>No  </li></ul><ul><ul><li>Print  </li></ul></ul><ul><ul><li>Screenshot </li></ul></ul><ul><u...
Next step... <ul><li>Engaging with the outside </li></ul><ul><ul><li>Service providers and vendors </li></ul></ul><ul><ul>...
<ul><li>Privacy issues </li></ul>June 7, 2009 Infonex’  Government Web 2.0 and Social Media
PIPEDA review <ul><li>Part and Schedule 1 </li></ul><ul><ul><li>Private sector </li></ul></ul><ul><ul><li>Government </li>...
Liability and Enforceable Interests <ul><li>Liability </li></ul><ul><ul><li>Misuse of information </li></ul></ul><ul><ul><...
Different cases <ul><li>Loyalty and whistleblowing </li></ul><ul><ul><li>“ My employer sucks” </li></ul></ul><ul><ul><li>“...
No contractual leverage <ul><li>How to deal with  </li></ul><ul><ul><li>former employees </li></ul></ul><ul><ul><li>anonym...
<ul><li>Questions? </li></ul><ul><li>Dominic Jaar </li></ul><ul><ul><li>[email_address] 514.212.9348 www.ledjit.com </li><...
Upcoming SlideShare
Loading in …5
×

Developing Procedures And Governance Policies For Social Media Applications And Ensuring Privacy Protection

2,682 views
2,580 views

Published on

Published in: Business, Technology
1 Comment
6 Likes
Statistics
Notes
  • As companies wrestle with business cases, metrics and cross-business-unit investments in capabilities such as privacy, security and compliance management, many companies are finding it helpful to start with a framework such as this one to organize and prioritize their efforts:

    http://firstintheroom.com/posts/social-media-governance.html

    And, for folks defining a social media policy, here is the largest online database of social media policies, for reference:

    http://socialmediagovernance.com/policies.php
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
2,682
On SlideShare
0
From Embeds
0
Number of Embeds
34
Actions
Shares
0
Downloads
155
Comments
1
Likes
6
Embeds 0
No embeds

No notes for slide

Developing Procedures And Governance Policies For Social Media Applications And Ensuring Privacy Protection

  1. 1. Developing Procedures and Governance Policies for Social Media Applications and Ensuring Privacy Protection Infonex’ Government Web 2.0 and Social Media
  2. 2. <ul><li>Dominic Jaar </li></ul><ul><ul><li>Legal counsel, Ledjit Consulting inc. </li></ul></ul>June 7, 2009
  3. 3. Agenda June 7, 2009
  4. 4. Background - External <ul><li>Profiles on most platforms </li></ul><ul><ul><li>Social networking </li></ul></ul><ul><ul><ul><li>Facebook </li></ul></ul></ul><ul><ul><ul><li>LinkedIn </li></ul></ul></ul><ul><ul><ul><li>Plaxo </li></ul></ul></ul><ul><ul><ul><li>etc. </li></ul></ul></ul><ul><ul><li>Wikis: Wikipedia, etc. </li></ul></ul><ul><ul><li>Forums </li></ul></ul><ul><ul><li>Blogs </li></ul></ul><ul><li>X employees </li></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  5. 5. Issues <ul><li>Confidential information </li></ul><ul><ul><li>Finance </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><ul><li>Privilege </li></ul></ul><ul><ul><li>Secrets </li></ul></ul><ul><li>Intellectual Property </li></ul><ul><li>Reputation </li></ul><ul><li>Liability </li></ul><ul><li>Time theft </li></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  6. 6. Reality <ul><li>Individuals </li></ul><ul><ul><li>High usage </li></ul></ul><ul><ul><ul><li>User-friendly </li></ul></ul></ul><ul><ul><ul><li>Trendy and viral </li></ul></ul></ul><ul><ul><li>Low understanding </li></ul></ul><ul><ul><ul><li>Laws </li></ul></ul></ul><ul><ul><ul><li>Impacts </li></ul></ul></ul><ul><ul><ul><li>Underlying technologies </li></ul></ul></ul><ul><li>Technologies </li></ul><ul><ul><li>Uncontrollable </li></ul></ul><ul><ul><ul><li>Anonymity </li></ul></ul></ul><ul><ul><ul><li>Third party </li></ul></ul></ul><ul><ul><li>Unavoidable </li></ul></ul><ul><ul><ul><li>“ Right” </li></ul></ul></ul><ul><ul><li>Last “forever” </li></ul></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  7. 7. Background - Internal <ul><li>Interactive and customizable intranet </li></ul><ul><ul><li>Look and feel </li></ul></ul><ul><ul><li>Widgets </li></ul></ul><ul><ul><ul><li>Productivity </li></ul></ul></ul><ul><ul><ul><li>News </li></ul></ul></ul><ul><li>Wikis </li></ul><ul><li>Forum </li></ul><ul><li>Internal blog </li></ul><ul><li>Human capital management </li></ul><ul><li>Metacrawler </li></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  8. 8. Issues <ul><li>Confidential information </li></ul><ul><ul><li>Finance </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><ul><li>Privilege </li></ul></ul><ul><ul><li>Secrets </li></ul></ul><ul><li>Intellectual Property </li></ul><ul><li>Reputation </li></ul><ul><li>Liability </li></ul><ul><li>Time theft </li></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  9. 9. Reality <ul><li>Individuals </li></ul><ul><ul><li>Lower usage </li></ul></ul><ul><ul><ul><li>Impact </li></ul></ul></ul><ul><ul><ul><li>Partial anonymity </li></ul></ul></ul><ul><ul><li>Higher understanding </li></ul></ul><ul><ul><ul><li>Education </li></ul></ul></ul><ul><ul><ul><ul><li>Policy </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Laws </li></ul></ul></ul></ul><ul><li>Technologies </li></ul><ul><ul><li>Controllable </li></ul></ul><ul><ul><ul><li>Partial anonymity </li></ul></ul></ul><ul><ul><ul><li>In-house </li></ul></ul></ul><ul><ul><ul><li>Privilege </li></ul></ul></ul><ul><ul><li>Moderated </li></ul></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  10. 10. Solution = Web2.0 policy <ul><li>External blog, forum, wiki, online hosting, chat, etc. </li></ul><ul><li>Recommendations, Expectations and Requirements </li></ul><ul><li>Content </li></ul><ul><ul><li>Corporate equipment and services </li></ul></ul><ul><ul><li>Business hours </li></ul></ul><ul><ul><ul><li>Performance </li></ul></ul></ul><ul><ul><li>Speaking on behalf of corporation </li></ul></ul><ul><ul><ul><li>Identification </li></ul></ul></ul><ul><ul><ul><li>Association </li></ul></ul></ul><ul><ul><ul><li>Remuneration/Rewards </li></ul></ul></ul><ul><ul><li>Personal responsibility </li></ul></ul><ul><ul><li>Education </li></ul></ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul><ul><ul><ul><li>Guidelines </li></ul></ul></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  11. 11. Solution = T&C + Moderator June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  12. 12. Solution = Policies integration June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  13. 13. Solution = Technology <ul><li>No </li></ul><ul><ul><li>Print </li></ul></ul><ul><ul><li>Screenshot </li></ul></ul><ul><ul><li>Save </li></ul></ul><ul><ul><li>Email </li></ul></ul><ul><li>Log </li></ul><ul><ul><li>Limited access </li></ul></ul><ul><li>History </li></ul><ul><li>Traceability </li></ul><ul><li>Username </li></ul><ul><li>Password </li></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  14. 14. Next step... <ul><li>Engaging with the outside </li></ul><ul><ul><li>Service providers and vendors </li></ul></ul><ul><ul><li>Customers </li></ul></ul><ul><li>Uses </li></ul><ul><ul><li>Corporation </li></ul></ul><ul><ul><ul><li>Communication </li></ul></ul></ul><ul><ul><ul><li>Notice </li></ul></ul></ul><ul><ul><ul><li>Promotion </li></ul></ul></ul><ul><ul><ul><li>Publicity </li></ul></ul></ul><ul><ul><ul><li>R&D </li></ul></ul></ul><ul><ul><li>Customers </li></ul></ul><ul><ul><ul><li>Comments </li></ul></ul></ul><ul><ul><ul><li>Complaints </li></ul></ul></ul><ul><ul><ul><li>Ideas </li></ul></ul></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  15. 15. <ul><li>Privacy issues </li></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  16. 16. PIPEDA review <ul><li>Part and Schedule 1 </li></ul><ul><ul><li>Private sector </li></ul></ul><ul><ul><li>Government </li></ul></ul><ul><ul><ul><li>Privacy Act </li></ul></ul></ul><ul><li>Personal information </li></ul><ul><ul><li>About an identifiable individual who is an employee </li></ul></ul><ul><ul><li>Excluding business id information </li></ul></ul><ul><li>In the course of commercial activity </li></ul><ul><li>Collected, used or disclosed </li></ul><ul><li>Key Concepts </li></ul><ul><ul><li>Consent </li></ul></ul><ul><ul><li>Limited collection </li></ul></ul><ul><ul><li>Limited use </li></ul></ul><ul><ul><li>Safeguards </li></ul></ul>June 7, 2009 Infonex’ Government Web 2.0 and Social Media
  17. 17. Liability and Enforceable Interests <ul><li>Liability </li></ul><ul><ul><li>Misuse of information </li></ul></ul><ul><ul><li>Disclosure of private information </li></ul></ul><ul><ul><li>Opinion information </li></ul></ul><ul><li>Enforceable interests </li></ul><ul><ul><li>Disclosure of confidential information </li></ul></ul><ul><ul><li>Disclosure of personal information </li></ul></ul><ul><ul><li>Harassment </li></ul></ul>June 7, 2009
  18. 18. Different cases <ul><li>Loyalty and whistleblowing </li></ul><ul><ul><li>“ My employer sucks” </li></ul></ul><ul><ul><li>“ My employer violates the law” </li></ul></ul><ul><ul><li>“ My Department wastes the government’s money” </li></ul></ul><ul><li>Identity and opinion </li></ul><ul><ul><li>I work for Department X </li></ul></ul><ul><ul><li>and I </li></ul></ul><ul><ul><ul><li>like to sleep with animals </li></ul></ul></ul><ul><ul><ul><li>hate big corporations </li></ul></ul></ul><ul><ul><ul><li>am telling you that 1 + 1 = 3 </li></ul></ul></ul>June 7, 2009
  19. 19. No contractual leverage <ul><li>How to deal with </li></ul><ul><ul><li>former employees </li></ul></ul><ul><ul><li>anonymous publications </li></ul></ul><ul><li>Solutions </li></ul><ul><ul><li>Breach of confidence </li></ul></ul><ul><ul><li>Defamation & intentional interference </li></ul></ul><ul><ul><li>Copyright and TM infringement </li></ul></ul><ul><ul><li>Breach of statute </li></ul></ul><ul><ul><li>Breach of special convenant </li></ul></ul>June 7, 2009
  20. 20. <ul><li>Questions? </li></ul><ul><li>Dominic Jaar </li></ul><ul><ul><li>[email_address] 514.212.9348 www.ledjit.com </li></ul></ul>

×