Best Practices for Secure Enterprise Social Media Deployments
 

Best Practices for Secure Enterprise Social Media Deployments

on

  • 15,947 views

Deploying Social Media at Enterprise Scale requires a different set of priorities for compliance, governance, and risk. If you are looking for best practices as it relates to how global companies are ...

Deploying Social Media at Enterprise Scale requires a different set of priorities for compliance, governance, and risk. If you are looking for best practices as it relates to how global companies are deploying social at scale, this checklist should help.

Sprinklr has helped global brands with implementations in over 50 countries. We’ve assembled some best practices in an easy checklist for those concerned with issues around compliance, governance, and risk.

Statistics

Views

Total Views
15,947
Views on SlideShare
9,013
Embed Views
6,934

Actions

Likes
16
Downloads
184
Comments
0

36 Embeds 6,934

http://www.sprinklr.com 5560
http://www.socialbusinessnews.com 598
http://www.marketingtechblog.com 221
http://www.scoop.it 197
http://storify.com 72
http://feeds.feedburner.com 60
https://www.rebelmouse.com 49
http://www.fusionmediasoft.com 28
http://www.twylah.com 23
https://twitter.com 21
http://fusionmediasoft.com 20
http://betawpspr.sprinklr.com 18
http://kred.com 13
http://tweets.kellytirman.com 12
http://www.socializedby.me 6
http://www.messagepeople.com.au 5
http://www.linkedin.com 5
https://si0.twimg.com 4
http://www.diffbot.com 2
http://newsblur.com 2
http://www.networkedblogs.com 2
http://plus.url.google.com 2
http://www.somema.org 1
http://www.pinterest.com 1
http://www.diffbot.com&_=1355014896380 HTTP 1
http://twitter.com 1
http://translate.googleusercontent.com 1
http://10.140.30.109 1
http://www.idealemailmarketing.com 1
http://tweets.marketingtechblog.com 1
http://conversation.ecairn.com 1
http://webcache.googleusercontent.com 1
http://checkthis.com 1
http://dmz01.app.clicktale.com 1
http://www.diffbot.com&_=1355240230096 HTTP 1
http://www.spr.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Best Practices for Secure Enterprise Social Media Deployments Best Practices for Secure Enterprise Social Media Deployments Document Transcript

  • 22 Must Haves For Secure Enterprise SocialHow to Avoid Common Risk, Compliance, and Governance Mistakes
  • The Enterprise Social Media Security Reality “Almost two-thirds of companies surveyed say that social media is a significant or critical risk to their brand reputation; yet 60% of companies either never train their employees about their corporate social media policies or do so only upon hiring. Moreover, 43% of companies have less than one Full-Time Equivalent (FTE) dedicated to managing social media risk.” Guarding the Social Gates: The Imperative for Social Media Risk Management (Alan Webber, Altimeter, August 2012) “Nearly two-thirds of security and risk professionals (64%) have no social media policy in place or if they do, they lack tools to sufficiently enforce and support the policy.” Manage the Risks of Social Media (Chris McClean and Nick Hayes, Forrester Research, Inc., November 2012)
  • Social@Scale Security Checklist22 Must Haves For Every Enterprise-wide Social Media Deployment Do we have...? Yes NoGovernance 1. content rules that flag unacceptable outbound content? 2. an approval workflow for outbound content? 3. the legal team involved for outbound content guidelines? 4. a defined escalation process? 5. the ability to track messages from inception to resolution? 6. a way to handle rogue accounts? 7. enterprise-wide, single point password control? 8. a rule to disapprove sending passwords around in Excel? 9. Access Management? 10. a social media policy or guidelines?Security 11. the ability to treat private messages differently? 12. the ability to integrate with enterprise-wide authentication systems? 13. only tools and platforms that are enterprise-grade security compliant? 14. enforced password guidelines? 15. the ability to differentiate influencers? 16. automated monitoring rules?Compliance 17. the ability to retract social messages from a central location? 18. the ability to document internal conversations about social media situations? 19. the ability to archive outbound content? 20. the ability to archive inbound content? 21. the ability to create audit trails for social media activities? 22. a Social Media Management System that meets our own corporate security requirements? To learn more about Social@Scale Security, visit us at www.sprinklr.com