This session at ARMA Canada 2013 described the importance of conducting a social business assessment and provided specific information to gather as part of the assessment. More detailed questions available in many of the slides as notes.
lecture presented by Fe Angela M. Verzosa at the Seminar-workshop on Archives and Records Management for Open Government sponsored by the Commission of Human Rights (CHR) in partnership with the International Council of Museums-Philippines (ICOM-Philippines), De La Salle University-Manila University Library, and the Philippine Association of Museums (PAMI) held on 22 May 2012 at the Commission on Human Rights, UP Diliman, Quezon City
lecture presented by Fe Angela M. Verzosa at the Seminar-workshop on Archives and Records Management for Open Government sponsored by the Commission of Human Rights (CHR) in partnership with the International Council of Museums-Philippines (ICOM-Philippines), De La Salle University-Manila University Library, and the Philippine Association of Museums (PAMI) held on 22 May 2012 at the Commission on Human Rights, UP Diliman, Quezon City
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptxJesse Wilkins
This presentation delivered at the ARMA Houston 2014 Spring Conference described an approach for assessing an organization's social media usage with an eye towards implementing effective governance and records management.
Mapping Roles and Responsibilities for Social Media Risk ManagementNexgate
Social media has quickly proven to be a tremendous resource for marketing, human resources, support, and many other business functions. However, that same communications tool can also introduce a significant amount of risk to an organization – risk to corporate compliance, from security threats, employee error and abuse, and much more.
View the slides from Alan Webber, Principal at Asymmetric Insights, John Hair, Director, IT Advisory for KPMG, Chris Walker, Partner at Connect Marketing, and Devin Redmond, Co-Founder & CEO of Nexgate and their webcast on organizational roles and responsibilities in social risk management. Our expert panel shared their insights into how to define and manage enterprise social risk across your social media marketing teams.
You can watch a recording of the webcast here: http://nexgate.com/resources/webcast-roles-and-responsibilities-for-social-risk-management/
This workshop delivered July 20, 2011 at FOSE 2011 described the elements of a social media governance framework, identified structural and policy statements to include in the social media policy, and describes strategies for capturing and managing social media-generated content as records.
Basics in IT Audit and Application Control Testing Dinesh O Bareja
IT Audit and Application Control Testing are large and complex activities in themselves, and it is my presentation to share the basics here, based on my own experience and using guidance from IIA GTAGs.
A Competitor Intelligence is an systematic and ethical program for gathering information about competitors and general business trends to further your own company’s goals
Most people use social media everyday, including at work. And there are all kinds of rules and regulations governing lawful social media use they just don’t know about.
20110310 ARMA Northern CO Strategies and Policies for Social MediaJesse Wilkins
This presentation delivered on March 10, 2011 described how to develop a social media policy, the elements and policy statements to include in a comprehensive policy, and other considerations for managing social media.
The millennial workforce is very comfortable communicating over social media. The millennial workforce is growing quickly. Gen-Y will form 75% of the workforce by 2025.
At the same time, customers seek information about products and services via social media. But this also raises privacy and security concerns in an organization. This could also have implications on data privacy.
The IT Dept. must form Social Media policies about the use of social media in the organization, in the interest of protecting the company’s intellectual property.
The session will provide guidelines on what CIOs and CISOs must consider for inclusion in their Social Media Governance and policies.
Key note speech at INTEROP Sri Lanka September 2013
http://digit.lk/event/interop-conference-colombo-2013/
Need to get your business using social business. Start with thissummary of toolkit that will give you insights into the world of social business through the latest AIIM Toolkit on Social Business.
Many Organizations are struggling with the best way to govern and manage the use of Generative AI in the enterprise. There are many dimensions to this challenge ranging from ethical issues, data architecture and quality, legal and copywrite, operational and more.
This is why a governance framework needs to be carefully designed and put into place so the business can make the most use of this truly revolutionary technology, reduce and mitigate risks, control costs, maintain a positive employee and customer experience and most importantly, find competitive advantage in the marketplace.
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
More Related Content
Similar to 20130602 ARMA Canada Conducting a Social Business Assessment
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptxJesse Wilkins
This presentation delivered at the ARMA Houston 2014 Spring Conference described an approach for assessing an organization's social media usage with an eye towards implementing effective governance and records management.
Mapping Roles and Responsibilities for Social Media Risk ManagementNexgate
Social media has quickly proven to be a tremendous resource for marketing, human resources, support, and many other business functions. However, that same communications tool can also introduce a significant amount of risk to an organization – risk to corporate compliance, from security threats, employee error and abuse, and much more.
View the slides from Alan Webber, Principal at Asymmetric Insights, John Hair, Director, IT Advisory for KPMG, Chris Walker, Partner at Connect Marketing, and Devin Redmond, Co-Founder & CEO of Nexgate and their webcast on organizational roles and responsibilities in social risk management. Our expert panel shared their insights into how to define and manage enterprise social risk across your social media marketing teams.
You can watch a recording of the webcast here: http://nexgate.com/resources/webcast-roles-and-responsibilities-for-social-risk-management/
This workshop delivered July 20, 2011 at FOSE 2011 described the elements of a social media governance framework, identified structural and policy statements to include in the social media policy, and describes strategies for capturing and managing social media-generated content as records.
Basics in IT Audit and Application Control Testing Dinesh O Bareja
IT Audit and Application Control Testing are large and complex activities in themselves, and it is my presentation to share the basics here, based on my own experience and using guidance from IIA GTAGs.
A Competitor Intelligence is an systematic and ethical program for gathering information about competitors and general business trends to further your own company’s goals
Most people use social media everyday, including at work. And there are all kinds of rules and regulations governing lawful social media use they just don’t know about.
20110310 ARMA Northern CO Strategies and Policies for Social MediaJesse Wilkins
This presentation delivered on March 10, 2011 described how to develop a social media policy, the elements and policy statements to include in a comprehensive policy, and other considerations for managing social media.
The millennial workforce is very comfortable communicating over social media. The millennial workforce is growing quickly. Gen-Y will form 75% of the workforce by 2025.
At the same time, customers seek information about products and services via social media. But this also raises privacy and security concerns in an organization. This could also have implications on data privacy.
The IT Dept. must form Social Media policies about the use of social media in the organization, in the interest of protecting the company’s intellectual property.
The session will provide guidelines on what CIOs and CISOs must consider for inclusion in their Social Media Governance and policies.
Key note speech at INTEROP Sri Lanka September 2013
http://digit.lk/event/interop-conference-colombo-2013/
Need to get your business using social business. Start with thissummary of toolkit that will give you insights into the world of social business through the latest AIIM Toolkit on Social Business.
Many Organizations are struggling with the best way to govern and manage the use of Generative AI in the enterprise. There are many dimensions to this challenge ranging from ethical issues, data architecture and quality, legal and copywrite, operational and more.
This is why a governance framework needs to be carefully designed and put into place so the business can make the most use of this truly revolutionary technology, reduce and mitigate risks, control costs, maintain a positive employee and customer experience and most importantly, find competitive advantage in the marketplace.
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Oklahoma chapter on February 15, 2024, introduced attendees to the idea of a business and RIM playbook. Attendees learned about the benefits of a playbook, the elements of a playbook, and the elements of a play. The session concluded with a review of the process for building a playbook from scratch.
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
This presentation, delivered virtually to the ARMA Chattanooga chapter on February 13, 2024, described the elements of a business assessment, a technical assessment, and a maturity assessment in support of an information management initiative.
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
This presentation, delivered virtually on February 2, 2024 as part of the Austin ARMA Annual Conference, introduced the idea of a records management playbook. I described the purpose and benefits of a playbook, then outlined the elements of a playbook and the individual plays.
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater St. Louis Chapter on January 18, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater Kansas City Chapter on January 10, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
This presentation, delivered virtually to the ARMA Madison Chapter on December 7, 2023, outlined the value of a business playbook and, specifically, a records and information management (RIM) playbook. Attendees learned about the elements of a playbook and of individual plays and how to construct their own playbooks using a provided template.
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
This presentation, delivered virtually to the ARMA Florida Gulf Chapter on December 19, 2023, outlined the value of certifications and described three class of certifications including RIM, "RIM-adjacent", and "Other". Attendees received an overview of the 6 RIM certifications and a table comparing their exams and programs. The session concluded with a framework for determining how to select the most appropriate certification based on costs, context, and program visibility and market awareness.
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
This presentation was delivered virtually to ARMA San Diego on October 5, 2023. It compared and contrasted the various information governance / information management-related certifications and presented a framework for deciding which one(s) to pursue based on an individual's career goals.
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
This presentation, delivered at the ARMA Canada Information Conference on July 19, 2023 in Toronto, outlined a framework for professional development in the IM industry. Attendees learned about the 4 types of learning and the 5 domains IM professionals need to understand. Attendees also received a professional development plan template.
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
This presentation, delivered on July 17, 2023, at the ARMA Canada Information Conference, compared and contrasted the various IM and IM-adjacent certifications. Attendees also learned how to determine the right certification for them based on their career goals.
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
This keynote, delivered at the ARMA New England Win with IG seminar on September 19, 2023, outlined the state of the IG industry from three perspectives: what industry analysts are talking about, what the key conference sessions are about, and what individual chapters and vendors are talking about. The session concluded with ways for individuals to keep abreast of developments in IG.
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
This presentation, delivered to the ARMA Mile High Denver Chapter on January 17, 2023, outlined the value and benefits of building a records management playbook. Attendees learned about the elements of a playbook and the individual plays within the playbook. The session concluded with a discussion of how to actually build a RM playbook.
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
This presentation, delivered to the ARMA Boston Chapter on June 2, 2016, outlined how to apply information governance practices to social media posts. It described specific social media security threats and gave attendees an opportunity to participate in roundtable discussions.
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
This presentation, delivered at the MER conference in Chicago on May 23, 2023, introduced attendees to the concept of an information governance playbook. Attendees learned the purpose and value of a playbook, as well as the structure of a playbook and of individual plays. The session concluded with a discussion of how to build and maintain a playbook.
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
This presentation, delivered to the AIIM True North chapter virtually on September 12th, introduced ChatGPT and other generative AI tools. I briefly introduced and demonstrated ChatGPT and some other generative AI tools. We reviewed some of the more popular use cases and benefits of using generative AI. We also reviewed some of the challenges these tools present for the organization. Finally, we discussed some practices to use these tools safely and effectively in support of real business outcomes.
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
This session provided the conclusion to the ARMA Nebraska 2023 Spring Seminar in Omaha, Nebraska. Attendees learned what a playbook is, what plays are, and how to develop a RIM/IG playbook tailored to their organization.
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
This session, delivered at the ARMA Nebraska Spring Seminar 2023 on April 19, 2023, introduced the professional development matrix and walked attendees through how to leverage the matrix to develop their own personal professional development plans.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Assessments need to be done on an ongoing basis. Consider that a highly social organization in early 2007 would have focused on Friendster and Myspace, would have no presence on Facebook, and might not even know that Twitter existed. And it wouldn’t have had to worry about Google Plus, Pinterest, or Foursquare because none of them existed yet. Nor would it have felt concerns about employees’ use of mobile devices to interact with these tools because the original iPhone had yet to be released.
Ask users using various mechanismsUse the tools – search for users or organizations or productsBuilt-in analytics
Once the gap analysis is complete the organization can then update its strategy based on its findings and start to put into place the roadmap that will address the issues identified. If the organization doesn’t have a strategy this would be the time to develop it, again with the intent that it be practical, actionable, and realistic. So if the team determines that a key part of its social outreach is to engage on Facebook, the roadmap might include some of the following activities:~Set up Facebook Pages focused on particular communities and conversationsBuild interactivity into pages to get some specific and relevant behavior from people that visit the PagePromote the page through the organization’s various communications channels and to its various constituenciesReview or develop governance framework elements to ensure that risks are identified and understoodIdentify and develop the roles required to interact with Facebook and the community thereSet up alerts to quickly identify potential issues such as negative feedback or requests for assistanceAnd so forth.
Here are some of the questions to help identify whether there is a current social business strategy, and if so, what it looks like. Who are the stakeholders for this initiative?Do the stakeholders use social tools? Which ones?What are the goals and objectives of this initiative?Which ones should be prioritized?What use cases do you expect to be included in this initiative?What are competitor organizations doing in the social media space?Are they successful?Is the organization focused on internally facing technologies, externally facing technologies, or both?Who are the target audiences for externally facing social technologies?Who are the target audiences for internally facing social technologies?Where are the target audiences? (what tools are they on besides the obvious ones)
Here are some questions to ask regarding social business technologies. Note that for each tool or site there is a logical followup: How is it intended to be used, and how is it being used?Does the organization have a formal presence on commercial social media sites?If so, for each social media site please describe its purpose and how it is used. Has the organization officially implemented any externally facing social technologies? If so, for each please identify and describe how they are used. Has the organization officially implemented any internal social technologies?If so, for each please identify and describe how they are used. Are there any unofficial implementations of social technologies?If so, for each please identify and describe how they are used. What social technologies are of interest but not being used? Why?
Here are some questions to ask regarding use of externally-focused sites and communities including unsanctioned ones. Does the organization have any unofficial presences on commercial social media sites?If so, does the organization own or control these unofficial presences (for example, run by an employee)Are there any uncontrolled unofficial presences on commercial social media sites?Are there any undesired unofficial presences (parody, complaint, etc.) on commercial social media sites?Who are the influencers for a given commercial social media site and page (e.g. on your Facebook page or interacting with your account on Twitter)?Where are the interesting conversations happening?Is there a plan or calendar that describes minimum frequency of desired updates to various commercial sites?
The internal cultural assessment is very important because if the culture doesn’t support social media and the underlying ways in which it tends to change the organization it will be very difficult for any initiative to succeed. Just because the organization has set up a Facebook Page or Twitter account doesn’t mean that it’s being used, or the culture supports it, or that management buys into it – just look at all the accounts out there that post maybe every other month. ~Here, then, are some questions to ask about internal culture generally and the ways in which it might impact a social business initiative:Does the organization foster an environment of collaboration and sharing?Is the organization open and transparent?Are employees encouraged to submit suggestions, ideas, etc.?Is there a formal incentive program that rewards innovation?Does the organization restrict access to any social media sites?If so, which ones? What are the stated reasons for doing so?Do these restrictions apply to all employees?Are employees empowered to make routine decisions without approval from management?Are employees aware of existing official social media usage? How is this communicated?What is management’s impression of social business?Has management committed to provide resources for the initiative?Has management committed to provide visible support for the initiative?Has the organization identified champions for the initiative?Has the organization identified early adopters for the initiative?
Here are some questions to ask in evaluating social business processes or social tool-enabled processes such as innovation/R&D, customer service, sales support, etc. Do any processes already make use of social technologies? What technologies are being used?How are they being used?What processes are included in the initiative?Is the process documented?How well does the process work today?What are the inputs to the process?What tools or applications are used in the process today?What are the outputs from the process?Are the outputs used by anyone else? How?
And the last, but certainly not least, area to assess is governance. Here are some governance-related questions to ask. Is there a social media policy in place for employees?Is the policy applicable to the entire organization?Are employees trained on the policy as part of the hiring process?Are employees trained on the policy when it is updated?Are employees trained on the policy at least once a year?Are training materials available that describe what social media tools are and how the organization is using them or expects to use them?Does external social content require approval prior to publication? By whom?Are there employees with dedicated roles in social media, e.g. community manager?Have relevant policies been updated to address discovery and disclosure of social media?Is there a plan or policy in place to ensure that internal tools are updated and maintained?The responses gathered from all of these questions will be extraordinarily valuable in customizing the roadmap to the organization and informing and determining the social business strategy, goals, and objectives.