Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Social Media: Tips to Avoid aRisk Management Nightmare   ACUITY FORUMS’   EXECUTING SOCIAL MEDIA 2010
AgendaBackground           Ensuring privacyIssues               Private vs. publicGovernance           informationstrategi...
Context                           Internal                           External                           Personal  Executin...
Background - ExternalProfiles on most platforms  Social networking    Facebook    LinkedIn    Plaxo    Stumble Upon    etc...
IssuesConfidential information  Finance  Security  Privilege  SecretsIntellectual PropertyReputationLiabilityTime theft   ...
RealityIndividuals  High usage     User-friendly     Trendy and viral  Low understanding     Laws     Impacts     Underlyi...
Background - InternalInteractive and customizable intranet  Look and feel  Widgets    Productivity    NewsWikisForumIntern...
IssuesConfidential information  Finance  Security  Privilege  SecretsIntellectual PropertyReputationLiabilityTime theft   ...
RealityTechnologies  Controllable    Partial anonymity    In-house    Privilege  ModeratedIndividuals  Lower usage    Impa...
Solution = Policies integrationData classification                          Communication• Confidential                   ...
Solution = TechnologyNo  Print  Screenshot  Save  EmailLog  Limited accessHistoryTraceabilityUsernamePassword      Executi...
Next step...Engaging with the outside  Service providers and vendors  CustomersUses  Corporation       Communication      ...
Privacy issuesExecuting Social Media        February 9, 2010   13
PIPEDA reviewPart and Schedule 1              Key Concepts  Private sector                   Consent  Government          ...
Different casesLoyalty and whistleblowing  “My employer sucks”  “My employer violates the law”  “My Department wastes the ...
No contractual leverageHow to deal with  former employees  anonymous publicationsSolutions  Breach of confidence  Defamati...
Questions?
Upcoming SlideShare
Loading in …5
×

Social media tips to avoid a risk management nightmare

503 views

Published on

  • Be the first to comment

  • Be the first to like this

Social media tips to avoid a risk management nightmare

  1. 1. Social Media: Tips to Avoid aRisk Management Nightmare ACUITY FORUMS’ EXECUTING SOCIAL MEDIA 2010
  2. 2. AgendaBackground Ensuring privacyIssues Private vs. publicGovernance informationstrategies Leaking informationPolicy development Dealing with outside issues February 9, 2010
  3. 3. Context Internal External Personal Executing Social Media February 9, 2010 3
  4. 4. Background - ExternalProfiles on most platforms Social networking Facebook LinkedIn Plaxo Stumble Upon etc. Wikis: Wikipedia, etc. Forums BlogsX employees Executing Social Media February 9, 2010 4
  5. 5. IssuesConfidential information Finance Security Privilege SecretsIntellectual PropertyReputationLiabilityTime theft Executing Social Media February 9, 2010 5
  6. 6. RealityIndividuals High usage User-friendly Trendy and viral Low understanding Laws Impacts Underlying technologiesTechnologies Uncontrollable Anonymity Third party Unavoidable “Right” Last “forever” Executing Social Media February 9, 2010 6
  7. 7. Background - InternalInteractive and customizable intranet Look and feel Widgets Productivity NewsWikisForumInternal blogHuman capital managementMetacrawler Executing Social Media February 9, 2010 7
  8. 8. IssuesConfidential information Finance Security Privilege SecretsIntellectual PropertyReputationLiabilityTime theft Executing Social Media February 9, 2010 8
  9. 9. RealityTechnologies Controllable Partial anonymity In-house Privilege ModeratedIndividuals Lower usage Impact Partial anonymity Better understanding Education  Policy  Laws Executing Social Media February 9, 2010 9
  10. 10. Solution = Policies integrationData classification Communication• Confidential • Language• Internal use • Content• Public • Respect Code of conduct Read and signed annually Web-based educationDocument retention Security• Periods depends on • Access information and platform Executing Social Media February 9, 2010 10
  11. 11. Solution = TechnologyNo Print Screenshot Save EmailLog Limited accessHistoryTraceabilityUsernamePassword Executing Social Media February 9, 2010 11
  12. 12. Next step...Engaging with the outside Service providers and vendors CustomersUses Corporation Communication Notice Promotion Publicity R&D Customers Comments Complaints Ideas Executing Social Media February 9, 2010 12
  13. 13. Privacy issuesExecuting Social Media February 9, 2010 13
  14. 14. PIPEDA reviewPart and Schedule 1 Key Concepts Private sector Consent Government Limited collection Privacy Act Limited use SafeguardsPersonal information About an identifiable individual…who is an employee Excluding business id informationIn the course of commercial activityCollected, used or disclosed Executing Social Media February 9, 2010 14
  15. 15. Different casesLoyalty and whistleblowing “My employer sucks” “My employer violates the law” “My Department wastes the government’s money”Identity and opinion I work for Department X and I like to sleep with animals hate big corporations am telling you that 1 + 1 = 3 Executing Social Media February 9, 2010 15
  16. 16. No contractual leverageHow to deal with former employees anonymous publicationsSolutions Breach of confidence Defamation & intentional interference Copyright and TM infringement Breach of statute Breach of special covenant Executing Social Media February 9, 2010 16
  17. 17. Questions?

×