Your SlideShare is downloading. ×
Social media   tips to avoid a risk management nightmare
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Social media tips to avoid a risk management nightmare

234
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
234
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Social Media: Tips to Avoid aRisk Management Nightmare ACUITY FORUMS’ EXECUTING SOCIAL MEDIA 2010
  • 2. AgendaBackground Ensuring privacyIssues Private vs. publicGovernance informationstrategies Leaking informationPolicy development Dealing with outside issues February 9, 2010
  • 3. Context Internal External Personal Executing Social Media February 9, 2010 3
  • 4. Background - ExternalProfiles on most platforms Social networking Facebook LinkedIn Plaxo Stumble Upon etc. Wikis: Wikipedia, etc. Forums BlogsX employees Executing Social Media February 9, 2010 4
  • 5. IssuesConfidential information Finance Security Privilege SecretsIntellectual PropertyReputationLiabilityTime theft Executing Social Media February 9, 2010 5
  • 6. RealityIndividuals High usage User-friendly Trendy and viral Low understanding Laws Impacts Underlying technologiesTechnologies Uncontrollable Anonymity Third party Unavoidable “Right” Last “forever” Executing Social Media February 9, 2010 6
  • 7. Background - InternalInteractive and customizable intranet Look and feel Widgets Productivity NewsWikisForumInternal blogHuman capital managementMetacrawler Executing Social Media February 9, 2010 7
  • 8. IssuesConfidential information Finance Security Privilege SecretsIntellectual PropertyReputationLiabilityTime theft Executing Social Media February 9, 2010 8
  • 9. RealityTechnologies Controllable Partial anonymity In-house Privilege ModeratedIndividuals Lower usage Impact Partial anonymity Better understanding Education  Policy  Laws Executing Social Media February 9, 2010 9
  • 10. Solution = Policies integrationData classification Communication• Confidential • Language• Internal use • Content• Public • Respect Code of conduct Read and signed annually Web-based educationDocument retention Security• Periods depends on • Access information and platform Executing Social Media February 9, 2010 10
  • 11. Solution = TechnologyNo Print Screenshot Save EmailLog Limited accessHistoryTraceabilityUsernamePassword Executing Social Media February 9, 2010 11
  • 12. Next step...Engaging with the outside Service providers and vendors CustomersUses Corporation Communication Notice Promotion Publicity R&D Customers Comments Complaints Ideas Executing Social Media February 9, 2010 12
  • 13. Privacy issuesExecuting Social Media February 9, 2010 13
  • 14. PIPEDA reviewPart and Schedule 1 Key Concepts Private sector Consent Government Limited collection Privacy Act Limited use SafeguardsPersonal information About an identifiable individual…who is an employee Excluding business id informationIn the course of commercial activityCollected, used or disclosed Executing Social Media February 9, 2010 14
  • 15. Different casesLoyalty and whistleblowing “My employer sucks” “My employer violates the law” “My Department wastes the government’s money”Identity and opinion I work for Department X and I like to sleep with animals hate big corporations am telling you that 1 + 1 = 3 Executing Social Media February 9, 2010 15
  • 16. No contractual leverageHow to deal with former employees anonymous publicationsSolutions Breach of confidence Defamation & intentional interference Copyright and TM infringement Breach of statute Breach of special covenant Executing Social Media February 9, 2010 16
  • 17. Questions?