SlideShare a Scribd company logo
Risks&added value
of an internal digital social network

           COMMnetkernportail




               Jacques Folon
          Partner Edge Consulting
www.aliaz.com/jacques-
folonjacques.folon@edge-
Cetteprésentationestsur
www.slideshare.net/folon

elleestàvotre disposition
First part :Risks

1.   Data privacy
2.   Data security
3.   Intellectualproperty
4.   What about an
     internalcommunity
     manager?
1.0 Data privacy
1.1.Data privacy basics
• Basic principles: the Data
   controller
(i.e. the Belgian state i.e. the
   Minister)
   – collect and processpersonal data
     onlywhenthisislegallypermitted
   – respect certain
     obligationsregarding the
     processing of personal data (details
     on nextslide) ;

   – respond to
     complaintsregardingbreaches of
     data protection rules;
   – collaboratewith national data
            Source: http://ec.europa.eu/justice/data-protection/index_en.htm
     protection supervisory authorities
1.2. Data privacyrules for data
               controllers
• Personal Data must be
   – processed legally and fairly;
   – collected for explicit and legitimate
     purposes and used accordingly;
   – adequate, relevant and not excessive in
     relation to the purposes for which it is
     collected and/or further processed;
   – accurate, and updated where necessary;
   – kept any longer than strictly necessary;
   – rectified, removed or blocked by the
     data subject if incorrect;
   – Protected against accidental or unlawful
     destruction, loss, alteration and
     disclosure, particularly when processing
     involves data transmission over
     networks.

          Source: http://ec.europa.eu/justice/data-protection/index_en.htm
1.3. Data privacy&
    internal social media questions

•   Whichprecisepurpose ?
•   Whatkind of personal data willbestored?
•   Are data stored in Europe ?
•   Are they in the « Cloud »?
•   Data privacy commission adviceneeded?
•   Whatwillbe the securitypolicy?
•   What about the content of ex-employees?
•   Is a code of conductenough?

             SO IT ’S AN IMPORTANT ISSUE !!!
2.0. Data security




SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
Source : https://www.britestream.com/difference.html.
How many information?




                        67
Employees share (too) many information and
          also with third parties
Where do one steal     Which devices are
       data?                stolen?

•Banks                •USB
•Hospitals            •Laptops
•Ministries           •Hard disks
•Police               •Papers
•Newspapers           •Binders
•Telecoms             •Cars
•...
TELEWORKING
What are Control limitations? CC/COA 81 !
3.0. INTELLECTUAL PROPERTY




  Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
Copyright infringment




Source: http://en.wikipedia.org/wiki/File:Plagiarism_vs_Copyright_Infringement.png
Employer’sresponsibility !
• What about
  externalprotectedworks?
• What about creation by employees?
• What about import of
  protectedworks by employees?
• What about sub-
  contractorsprotectedworks?
• What about advertisingcampaign?
• What about pressclipping?
• What about externaltrademarks
• What about employee’s images?
• …

• What do youthink of a code of
  conduct?                   http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
4.0. INTERNAL COMMUNITY MANAGER




PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
Who’s in charge if …?




http://www.capreseaux.fr/community-management/
Second part: Added value




http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
Reading and answering e-mail. Approximately 28%, or about 11.2 hours,
of the average interaction worker’sworkweekisspentreading and
answering e-mails. The studyindicatesthatbecause of private social
media’sability to makesearchable content out of all posted messages, the
amount of time spentwith e-mail canbereduced by as much as 35%, or
about 4 hours.
Searching and gathering information. 19%, about 7.6 hours, of the
average interaction worker’sworkhours are spentsearching for internal
information only certain employeespossess. Again, because of enterprise
social media’sability to store all messages as searchable content, this
figure canbereduced by nearly 35% to about 4.9 hours per week,
whichamounts to a savings of 2.7 hours per week per interaction worker.
Communicating and collaboratinginternally. Using phones, e-mail, and
in-person interaction to communicate consumes about 5.6 hours of the
average interaction worker’sworkweek. Becauseyoucandirectly message
anyone in the organizationwithoutcluttering up an e-mail inboxwith a
collaboration tool, yourorganizationcanrealize up to a 35% time savings,
or about 2.0 hours per interaction worker.
Role-specifictasks. Tasksspecific to a particular job consume the
mostamount of time for anyrole, averaging out to about 15.6 hours per
week. Internal social media increases the productivity of thesetasks by
about 15%, or approximately 2.3 hours per week. One
waytheyenhancejob-specificproductivity lies in theirability to centralize al
job functionsat one hub, soyouremployeesbeginusing all other
applications there.
Otheradded value
•   KM
•   Collective intelligence
•   Co-working
•   Network management

• BUT

• The vendorsalreadytoldyou, is ‘nt it?
Some test cases




http://www.journaldunet.com/solutions/reseau-social-d-entreprise/reseau-social-d-entreprise-et-cac40/
Conclusion
•   Do not forgetprivacy issues
•   CC/CO 81
•   Control or not control
•   IPR regulation s/b reminded
•   Internal code of conduct
•   BUT
•   There are some important added value
Internal code of conduct main
                 rules
•   Define the internal and external social media
•   Intellectualpropertyrules
•   Data privacyexplanations
•   Confidential information
•   Anonimityisforbidden
•   Penalties
•   And
•   Which communication for the code of conduct?
•   How to have itapproved?
GOOD LUCK
Jacques Folon
Jacques.folon@ichec.be
Any questions ?




Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/
                                                                                         36
Internal social media: risks and added value

More Related Content

What's hot

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Prof. Erwin Globio
 
Review questions
Review questionsReview questions
Review questions
Anura Kumara
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
Laguna State Polytechnic University
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
university of education,Lahore
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
jvonschilling
 
Ethics in it
Ethics in itEthics in it
Ethics in it
Akash Mathapati
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
Compliancy Group
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
IWMW
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
Kashif Sohail
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
Jesse Wilkins
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Maria Stella Solon
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
UNIVERSITAS TEKNOKRAT INDONESIA
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
Kashif Sohail
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
AVISHITYAGI
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
Nawanan Theera-Ampornpunt
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 

What's hot (20)

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Review questions
Review questionsReview questions
Review questions
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 

Viewers also liked

visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
visage humain pour nouvelles technologies - menselijk gelaat van het digitale...visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
Prof. Jacques Folon (Ph.D)
 
Ichec pme média sociaux 2011
Ichec pme média sociaux 2011Ichec pme média sociaux 2011
Ichec pme média sociaux 2011
Prof. Jacques Folon (Ph.D)
 
Auteursrechten
AuteursrechtenAuteursrechten
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Prof. Jacques Folon (Ph.D)
 
L'entreprise et le monde 2.0
L'entreprise et le monde 2.0L'entreprise et le monde 2.0
L'entreprise et le monde 2.0
Prof. Jacques Folon (Ph.D)
 
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
Prof. Jacques Folon (Ph.D)
 
RH 2.0 : 1/ le monde a changé
RH 2.0 : 1/ le monde a changéRH 2.0 : 1/ le monde a changé
RH 2.0 : 1/ le monde a changé
Prof. Jacques Folon (Ph.D)
 
Start Academy 2014 - Valider et tester ses hypothèses
Start Academy 2014 - Valider et tester ses hypothèsesStart Academy 2014 - Valider et tester ses hypothèses
Start Academy 2014 - Valider et tester ses hypothèses
David Hachez
 
Culture d'entreprise et storytelling
Culture d'entreprise et storytelling Culture d'entreprise et storytelling
Culture d'entreprise et storytelling
Prof. Jacques Folon (Ph.D)
 
De la stratégie à la gestion de projets
De la stratégie à la gestion de projetsDe la stratégie à la gestion de projets
De la stratégie à la gestion de projets
Prof. Jacques Folon (Ph.D)
 

Viewers also liked (10)

visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
visage humain pour nouvelles technologies - menselijk gelaat van het digitale...visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
 
Ichec pme média sociaux 2011
Ichec pme média sociaux 2011Ichec pme média sociaux 2011
Ichec pme média sociaux 2011
 
Auteursrechten
AuteursrechtenAuteursrechten
Auteursrechten
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
L'entreprise et le monde 2.0
L'entreprise et le monde 2.0L'entreprise et le monde 2.0
L'entreprise et le monde 2.0
 
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
 
RH 2.0 : 1/ le monde a changé
RH 2.0 : 1/ le monde a changéRH 2.0 : 1/ le monde a changé
RH 2.0 : 1/ le monde a changé
 
Start Academy 2014 - Valider et tester ses hypothèses
Start Academy 2014 - Valider et tester ses hypothèsesStart Academy 2014 - Valider et tester ses hypothèses
Start Academy 2014 - Valider et tester ses hypothèses
 
Culture d'entreprise et storytelling
Culture d'entreprise et storytelling Culture d'entreprise et storytelling
Culture d'entreprise et storytelling
 
De la stratégie à la gestion de projets
De la stratégie à la gestion de projetsDe la stratégie à la gestion de projets
De la stratégie à la gestion de projets
 

Similar to Internal social media: risks and added value

Réseaux sociaux d'entreprise
Réseaux sociaux d'entrepriseRéseaux sociaux d'entreprise
Réseaux sociaux d'entreprise
Prof. Jacques Folon (Ph.D)
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
Jason Hong
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.Coin
Franco Coin
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
Kai Roer
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
AbdurrahmanADandalam1
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
Carl Brown
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
Sophos Benelux
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
PECB
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
Tomppa Järvinen
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
Stephen Cobb
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
ARMA International
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
Ian Naumenko, CISSP, CRISC
 
Information security
Information securityInformation security
Information security
Vijayananda Mohire
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
Symeon Papadopoulos
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
Rai University
 

Similar to Internal social media: risks and added value (20)

Réseaux sociaux d'entreprise
Réseaux sociaux d'entrepriseRéseaux sociaux d'entreprise
Réseaux sociaux d'entreprise
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.Coin
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
Information security
Information securityInformation security
Information security
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
 

More from Prof. Jacques Folon (Ph.D)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
Prof. Jacques Folon (Ph.D)
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
Prof. Jacques Folon (Ph.D)
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
Prof. Jacques Folon (Ph.D)
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
Prof. Jacques Folon (Ph.D)
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
Prof. Jacques Folon (Ph.D)
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
Prof. Jacques Folon (Ph.D)
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
Prof. Jacques Folon (Ph.D)
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
Prof. Jacques Folon (Ph.D)
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
Prof. Jacques Folon (Ph.D)
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
Prof. Jacques Folon (Ph.D)
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
Prof. Jacques Folon (Ph.D)
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
Prof. Jacques Folon (Ph.D)
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
Prof. Jacques Folon (Ph.D)
 
E comm et rgpd
E comm et rgpdE comm et rgpd
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
Prof. Jacques Folon (Ph.D)
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Prof. Jacques Folon (Ph.D)
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
Prof. Jacques Folon (Ph.D)
 

More from Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Recently uploaded

Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 

Recently uploaded (20)

Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 

Internal social media: risks and added value

  • 1. Risks&added value of an internal digital social network COMMnetkernportail Jacques Folon Partner Edge Consulting
  • 4. First part :Risks 1. Data privacy 2. Data security 3. Intellectualproperty 4. What about an internalcommunity manager?
  • 6. 1.1.Data privacy basics • Basic principles: the Data controller (i.e. the Belgian state i.e. the Minister) – collect and processpersonal data onlywhenthisislegallypermitted – respect certain obligationsregarding the processing of personal data (details on nextslide) ; – respond to complaintsregardingbreaches of data protection rules; – collaboratewith national data Source: http://ec.europa.eu/justice/data-protection/index_en.htm protection supervisory authorities
  • 7. 1.2. Data privacyrules for data controllers • Personal Data must be – processed legally and fairly; – collected for explicit and legitimate purposes and used accordingly; – adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed; – accurate, and updated where necessary; – kept any longer than strictly necessary; – rectified, removed or blocked by the data subject if incorrect; – Protected against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks. Source: http://ec.europa.eu/justice/data-protection/index_en.htm
  • 8. 1.3. Data privacy& internal social media questions • Whichprecisepurpose ? • Whatkind of personal data willbestored? • Are data stored in Europe ? • Are they in the « Cloud »? • Data privacy commission adviceneeded? • Whatwillbe the securitypolicy? • What about the content of ex-employees? • Is a code of conductenough? SO IT ’S AN IMPORTANT ISSUE !!!
  • 9. 2.0. Data security SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
  • 12. Employees share (too) many information and also with third parties
  • 13.
  • 14.
  • 15. Where do one steal Which devices are data? stolen? •Banks •USB •Hospitals •Laptops •Ministries •Hard disks •Police •Papers •Newspapers •Binders •Telecoms •Cars •...
  • 17. What are Control limitations? CC/COA 81 !
  • 18. 3.0. INTELLECTUAL PROPERTY Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
  • 20. Employer’sresponsibility ! • What about externalprotectedworks? • What about creation by employees? • What about import of protectedworks by employees? • What about sub- contractorsprotectedworks? • What about advertisingcampaign? • What about pressclipping? • What about externaltrademarks • What about employee’s images? • … • What do youthink of a code of conduct? http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
  • 21. 4.0. INTERNAL COMMUNITY MANAGER PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
  • 22. Who’s in charge if …? http://www.capreseaux.fr/community-management/
  • 23. Second part: Added value http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
  • 24.
  • 25. Reading and answering e-mail. Approximately 28%, or about 11.2 hours, of the average interaction worker’sworkweekisspentreading and answering e-mails. The studyindicatesthatbecause of private social media’sability to makesearchable content out of all posted messages, the amount of time spentwith e-mail canbereduced by as much as 35%, or about 4 hours.
  • 26. Searching and gathering information. 19%, about 7.6 hours, of the average interaction worker’sworkhours are spentsearching for internal information only certain employeespossess. Again, because of enterprise social media’sability to store all messages as searchable content, this figure canbereduced by nearly 35% to about 4.9 hours per week, whichamounts to a savings of 2.7 hours per week per interaction worker.
  • 27. Communicating and collaboratinginternally. Using phones, e-mail, and in-person interaction to communicate consumes about 5.6 hours of the average interaction worker’sworkweek. Becauseyoucandirectly message anyone in the organizationwithoutcluttering up an e-mail inboxwith a collaboration tool, yourorganizationcanrealize up to a 35% time savings, or about 2.0 hours per interaction worker.
  • 28. Role-specifictasks. Tasksspecific to a particular job consume the mostamount of time for anyrole, averaging out to about 15.6 hours per week. Internal social media increases the productivity of thesetasks by about 15%, or approximately 2.3 hours per week. One waytheyenhancejob-specificproductivity lies in theirability to centralize al job functionsat one hub, soyouremployeesbeginusing all other applications there.
  • 29.
  • 30. Otheradded value • KM • Collective intelligence • Co-working • Network management • BUT • The vendorsalreadytoldyou, is ‘nt it?
  • 32. Conclusion • Do not forgetprivacy issues • CC/CO 81 • Control or not control • IPR regulation s/b reminded • Internal code of conduct • BUT • There are some important added value
  • 33. Internal code of conduct main rules • Define the internal and external social media • Intellectualpropertyrules • Data privacyexplanations • Confidential information • Anonimityisforbidden • Penalties • And • Which communication for the code of conduct? • How to have itapproved?
  • 36. Any questions ? Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/ 36