The document discusses social media and its impact on businesses and careers. It provides background on popular social media platforms like Facebook, LinkedIn, Twitter, and blogs. It then outlines both benefits and risks of social media use for businesses, such as screening candidates online and monitoring employees' social media activity. The document stresses the importance of companies establishing clear social media policies to address issues like protecting corporate image and confidential information, avoiding discrimination and harassment, and defining appropriate personal use.
The document discusses various social media platforms and how organizations can utilize them. It provides tips for using Facebook, Twitter, Flickr, YouTube, blogs, and websites effectively. Some key points made are that social media can engage broad audiences at low costs, but privacy concerns should be addressed. Tips include posting regularly, engaging with users, and using images and videos to attract more interest. The effectiveness of social media is demonstrated by how consumer reaction on platforms like Facebook and Twitter influenced decisions by large companies in high-profile cases.
The document discusses privacy concerns with social media and provides guidelines for businesses. It outlines the importance of privacy given many people and companies now use social media. It then provides tips for social media businesses, including being transparent with privacy policies and not using users' personal data without consent. Examples of both positive practices, like a secure messaging app, and negative issues, like a company using personal data for ads without permission, are described. The document concludes with guidelines for non-social media businesses to maintain privacy on social media and recommendations like disclosing information and educating employees about social media policies.
The document provides information about a social media marketing workshop. It introduces the instructor, Bob Miller, and outlines the agenda for the workshop. The workshop will provide an introductory overview of using social media for job searching and career building, focusing on platforms like LinkedIn, Facebook, Twitter, and YouTube. It encourages participants to develop an active social media presence and use social media as a research tool to further their professional goals.
Facebook has over 200 million active users who spend over 4 billion minutes on the site daily. While originally dominated by the US college demographic, Facebook's fastest growing demographics are now those aged 35-54 and 55+, who are growing at rates over 190%. Over 70% of Facebook users are now located outside the US, and the site has been translated into over 70 languages. The average Facebook user has 120 friends and spends time sharing content like photos, videos, links and comments. Marketers can leverage Facebook's large audience and targeting options by creating brand pages, running ads, developing apps, and integrating with websites using Facebook Connect.
This 6-hour workshop is based on using LinkedIn, Facebook and Twitter. The trainer\'s guide is in the notes pages. I switch among it and the websites to demonstrate what I\'m describing.
The document discusses various social media platforms and how organizations can utilize them. It provides tips for using Facebook, Twitter, Flickr, YouTube, blogs, and websites effectively. Some key points made are that social media can engage broad audiences at low costs, but privacy concerns should be addressed. Tips include posting regularly, engaging with users, and using images and videos to attract more interest. The effectiveness of social media is demonstrated by how consumer reaction on platforms like Facebook and Twitter influenced decisions by large companies in high-profile cases.
The document discusses privacy concerns with social media and provides guidelines for businesses. It outlines the importance of privacy given many people and companies now use social media. It then provides tips for social media businesses, including being transparent with privacy policies and not using users' personal data without consent. Examples of both positive practices, like a secure messaging app, and negative issues, like a company using personal data for ads without permission, are described. The document concludes with guidelines for non-social media businesses to maintain privacy on social media and recommendations like disclosing information and educating employees about social media policies.
The document provides information about a social media marketing workshop. It introduces the instructor, Bob Miller, and outlines the agenda for the workshop. The workshop will provide an introductory overview of using social media for job searching and career building, focusing on platforms like LinkedIn, Facebook, Twitter, and YouTube. It encourages participants to develop an active social media presence and use social media as a research tool to further their professional goals.
Facebook has over 200 million active users who spend over 4 billion minutes on the site daily. While originally dominated by the US college demographic, Facebook's fastest growing demographics are now those aged 35-54 and 55+, who are growing at rates over 190%. Over 70% of Facebook users are now located outside the US, and the site has been translated into over 70 languages. The average Facebook user has 120 friends and spends time sharing content like photos, videos, links and comments. Marketers can leverage Facebook's large audience and targeting options by creating brand pages, running ads, developing apps, and integrating with websites using Facebook Connect.
This 6-hour workshop is based on using LinkedIn, Facebook and Twitter. The trainer\'s guide is in the notes pages. I switch among it and the websites to demonstrate what I\'m describing.
The document provides guidelines for Steria employees on using social media. It defines social media and divides it into three categories: blogs, social networks, and content sharing websites. It then provides details on appropriate use of key social networks like Facebook, Twitter, LinkedIn, and content sharing sites. The guidelines emphasize representing Steria professionally, following branding standards, respecting confidentiality, and obtaining permissions. It encourages monitoring social media and provides governance and access information.
ISACA Corporate Guidelines For Social Media EffortsRaul Colon
This document provides guidelines for companies regarding social media efforts. It discusses how different stakeholders view social media and where they typically agree. It also covers understanding strategy, tactics, goals and targets. Additionally, it identifies common risks with social media, discusses how to formulate appropriate policies, and how to plan for crisis management and inevitable issues that may arise.
This document summarizes a presentation about using social media for employment. It discusses how over 200 million people use social networks actively and their growing popularity across age groups. It outlines levels of social media participation from observer to leader. The presentation recommends using social media like LinkedIn, Twitter and blogs to build your professional brand, showcase thought leadership, and get job leads through your expanded network. It emphasizes managing your online reputation by owning your name on search engines and social profiles to control what potential employers might find when searching for you online.
Social Media for Human Resources - Hire, Retain and Leverage EmployeesBryce Maddock
The document discusses how companies can best leverage social media to engage employees and connect with customers, candidates, and prospects. It acknowledges that while many companies fear social media could damage productivity or reputation, inaction is not an option given its growing influence. The document recommends that companies embrace social media wisely by creating policies to encourage employee participation while outlining appropriate and professional use. It provides examples of both successful social media strategies as well as mistakes to avoid.
This document discusses social media and its impacts. It begins with an introduction of Leah Schklar from Anne Arundel Community College and her experience managing many social media accounts. It then defines social media as means of online interaction and information sharing. The next section discusses the growth of social media use and managing your online reputation. Later, it covers strategies for maintaining professional versus personal social media accounts and using social media for personal branding and career opportunities. The document concludes by asking about any questions from the audience.
This document provides guidance on using social media for job searching. It discusses how recruiting has changed with the rise of social media, with employers now more satisfied with referrals and candidates from social networks than job boards. It encourages growing your professional network on sites like LinkedIn and Twitter, while maintaining privacy on more personal sites like Facebook. Key advice includes having complete profiles, engaging with your network by commenting and answering questions, and establishing a professional personal brand across all profiles.
This document discusses the benefits and risks of social media use for kids and teens. The benefits include increased communication, building social relationships, and staying connected with others. However, risks include social media being addicting and distracting from schoolwork. It can also enable bullying and allow oversharing of private information. The document provides tips for parents to minimize risks, such as monitoring kids' social media use and teaching them online safety and privacy. It also includes statistics on kids' social media usage.
The document discusses the use of social media in the workplace. It provides an overview of popular social media platforms like Facebook, Twitter, and LinkedIn and how they can be used professionally. The document also outlines advantages and disadvantages of using social media at work, as well as best practices and examples of how social media can impact employment decisions.
This document provides an overview of social media platforms Pinterest, LinkedIn, and Instagram. It discusses:
- Key facts about Pinterest's rapid growth and popularity among women. Users can create visual boards and "pin" or re-pin images.
- LinkedIn as the largest professional network with over 150 million users globally. It focuses on professional profiles, connections, groups and job listings.
- Instagram's rise in 2012 with 400% growth to 80 million users by July. The mobile app allows quick photo sharing and added basic web functionality in early 2013.
- Other networks mentioned include Flickr, Yelp, Foursquare and blogs. It also discusses using Storify to curate social
Social Media 101 for Addiction ProfessionalsAlpha 180
Intro to Social Media: Tips and Tactics for Addiction Treatment Professionals seeking to gain a foothold in the fast changing world of Facebook, Tweets, Blogs and Videos. Presented by Bob Ferguson, Founder and CEO Jaywalker Lodge, LLC, at the 37th Annual Colorado Springs MidWinter Symposium on Feb. 2, 2011
Social Media and Human Resource Management Gaurav Wadhwa
This document discusses the role of social media in human resources. It begins by defining social media and its growing importance. It then outlines how social media is used in HR for networking, information sharing, recruitment, and training. Key benefits include improved employee engagement, effective recruitment, and facilitating training. Social media has also changed HR by enabling new forms of employee communication, giving employees a voice, and impacting employer branding. The future of social media in HR will include greater knowledge sharing and access to resources, reevaluating corporate values, and supporting innovation. However, legal implications around online screening of candidates must be considered.
This document discusses the impact of social media use in the workplace. It provides statistics on major social media platforms and their users. It then outlines how employers can use social media for recruiting, branding, and collaboration. However, it also notes potential legal pitfalls for employers regarding discrimination, wage/hour issues, privacy, monitoring, and recordkeeping. Overall, the document examines both the opportunities and challenges that social media presents for employers.
Presentation from Robert Morris University's Bayer Center's TechNow11 conference on why you need social media policies and ways for a nonprofit to minimize risk.
Lance Haun presented on social networking tools and their use. He discussed major platforms like blogs, YouTube, Facebook, Twitter, and LinkedIn. He noted both hype around social networking claiming it can solve everything versus facts about reasonable employee use and companies finding success. Haun shared his personal experience blogging and using social networks. He provided advice on getting engaged, including reading regularly, sharing, commenting, creating content, and networking both online and offline.
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaKaren Kefauver
5 simple tips on how can parents can keep kids and teen safe in the world of social media. Social media marketing is designed to reach kids - how can you protect your kids from social media predators, scams, porn and more.
The document discusses the rise of social media and its impact on business communication. It notes that while brands used to control communications about them, the growth of social networks and user empowerment through new communication technologies has weakened brand voice and given power to customers. It advocates that businesses must join social conversations, build communities, and develop relationships with influencers in order to harness the potential of social media.
Social media can be used positively by businesses to advertise and promote their products, and by law enforcement to help catch criminals and gather evidence. It also benefits the economy by supporting businesses. However, social media allows the spread of false information, violates user privacy by revealing personal details, and can harm college applicants if admissions officers find evidence of illegal activity on their profiles.
This document provides a summary of a presentation about managing the business impact of social networking. The presentation discusses how social networking websites work, potential risks to individuals and businesses from using these sites, and how businesses should develop policies and procedures to address these risks. It also explores opportunities for businesses to leverage social networking and provides recommendations for an effective social networking strategy.
Social Media Personalities: Make or Break Your Career and Personal BrandLaurelEK
The document provides an overview of a presentation on understanding your social media personality and the risks and rewards of using social media for personal and professional purposes; it identifies 11 common social media personality types and discusses how each type may be perceived by employers and what dangers they may face in using social media.
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
Social Networking and the Employment Relationship
One-day conference: 3rd March 2010, Central London
· How you use social media – your internal social media network
· The benefits of social media
· Key learnings: What has gone wrong? How have you rectified the problems?
· How do you monitor employee use of social media?
· Your policy/guidelines – discussion and how are these enforced?
IBM Case Study: "Guiding Your Organization Through The Social Media Landscape”
- IBM Social engagement strategy
- how we have addressed social media governance from both an internal and external perspective at IBM.
-insights on IBM’s social computing guidelines
- Education on how IBMers can successfully leverage social technologies for improved business results.
- Best practices example
Dossier 10 negritos 2 temporada. luis santidriánCONSULTOR
“10 NEGRITOS” es “la mejor idea de Agatha Christie”, reconocido por la propia autora. Siendo la única pieza teatral que escribió (aunque se basara en su propia novela).
Escrita en 1939, ha batido todos los récords de espectadores y lectores. Con unos 100 millones de copias vendidas, hasta el momento; siendo la novela de misterio más vendida de la historia y está considerado dentro de los 10 libros más vendidos de todos los tiempos.
Miles de representaciones de éxito avalan la obra.
Contáctanos para estudiar la representación en tu localidad.
Luis Santidrián
luis.santidrian@gmail.com
+34 630 015 484 móvil
The document provides guidelines for Steria employees on using social media. It defines social media and divides it into three categories: blogs, social networks, and content sharing websites. It then provides details on appropriate use of key social networks like Facebook, Twitter, LinkedIn, and content sharing sites. The guidelines emphasize representing Steria professionally, following branding standards, respecting confidentiality, and obtaining permissions. It encourages monitoring social media and provides governance and access information.
ISACA Corporate Guidelines For Social Media EffortsRaul Colon
This document provides guidelines for companies regarding social media efforts. It discusses how different stakeholders view social media and where they typically agree. It also covers understanding strategy, tactics, goals and targets. Additionally, it identifies common risks with social media, discusses how to formulate appropriate policies, and how to plan for crisis management and inevitable issues that may arise.
This document summarizes a presentation about using social media for employment. It discusses how over 200 million people use social networks actively and their growing popularity across age groups. It outlines levels of social media participation from observer to leader. The presentation recommends using social media like LinkedIn, Twitter and blogs to build your professional brand, showcase thought leadership, and get job leads through your expanded network. It emphasizes managing your online reputation by owning your name on search engines and social profiles to control what potential employers might find when searching for you online.
Social Media for Human Resources - Hire, Retain and Leverage EmployeesBryce Maddock
The document discusses how companies can best leverage social media to engage employees and connect with customers, candidates, and prospects. It acknowledges that while many companies fear social media could damage productivity or reputation, inaction is not an option given its growing influence. The document recommends that companies embrace social media wisely by creating policies to encourage employee participation while outlining appropriate and professional use. It provides examples of both successful social media strategies as well as mistakes to avoid.
This document discusses social media and its impacts. It begins with an introduction of Leah Schklar from Anne Arundel Community College and her experience managing many social media accounts. It then defines social media as means of online interaction and information sharing. The next section discusses the growth of social media use and managing your online reputation. Later, it covers strategies for maintaining professional versus personal social media accounts and using social media for personal branding and career opportunities. The document concludes by asking about any questions from the audience.
This document provides guidance on using social media for job searching. It discusses how recruiting has changed with the rise of social media, with employers now more satisfied with referrals and candidates from social networks than job boards. It encourages growing your professional network on sites like LinkedIn and Twitter, while maintaining privacy on more personal sites like Facebook. Key advice includes having complete profiles, engaging with your network by commenting and answering questions, and establishing a professional personal brand across all profiles.
This document discusses the benefits and risks of social media use for kids and teens. The benefits include increased communication, building social relationships, and staying connected with others. However, risks include social media being addicting and distracting from schoolwork. It can also enable bullying and allow oversharing of private information. The document provides tips for parents to minimize risks, such as monitoring kids' social media use and teaching them online safety and privacy. It also includes statistics on kids' social media usage.
The document discusses the use of social media in the workplace. It provides an overview of popular social media platforms like Facebook, Twitter, and LinkedIn and how they can be used professionally. The document also outlines advantages and disadvantages of using social media at work, as well as best practices and examples of how social media can impact employment decisions.
This document provides an overview of social media platforms Pinterest, LinkedIn, and Instagram. It discusses:
- Key facts about Pinterest's rapid growth and popularity among women. Users can create visual boards and "pin" or re-pin images.
- LinkedIn as the largest professional network with over 150 million users globally. It focuses on professional profiles, connections, groups and job listings.
- Instagram's rise in 2012 with 400% growth to 80 million users by July. The mobile app allows quick photo sharing and added basic web functionality in early 2013.
- Other networks mentioned include Flickr, Yelp, Foursquare and blogs. It also discusses using Storify to curate social
Social Media 101 for Addiction ProfessionalsAlpha 180
Intro to Social Media: Tips and Tactics for Addiction Treatment Professionals seeking to gain a foothold in the fast changing world of Facebook, Tweets, Blogs and Videos. Presented by Bob Ferguson, Founder and CEO Jaywalker Lodge, LLC, at the 37th Annual Colorado Springs MidWinter Symposium on Feb. 2, 2011
Social Media and Human Resource Management Gaurav Wadhwa
This document discusses the role of social media in human resources. It begins by defining social media and its growing importance. It then outlines how social media is used in HR for networking, information sharing, recruitment, and training. Key benefits include improved employee engagement, effective recruitment, and facilitating training. Social media has also changed HR by enabling new forms of employee communication, giving employees a voice, and impacting employer branding. The future of social media in HR will include greater knowledge sharing and access to resources, reevaluating corporate values, and supporting innovation. However, legal implications around online screening of candidates must be considered.
This document discusses the impact of social media use in the workplace. It provides statistics on major social media platforms and their users. It then outlines how employers can use social media for recruiting, branding, and collaboration. However, it also notes potential legal pitfalls for employers regarding discrimination, wage/hour issues, privacy, monitoring, and recordkeeping. Overall, the document examines both the opportunities and challenges that social media presents for employers.
Presentation from Robert Morris University's Bayer Center's TechNow11 conference on why you need social media policies and ways for a nonprofit to minimize risk.
Lance Haun presented on social networking tools and their use. He discussed major platforms like blogs, YouTube, Facebook, Twitter, and LinkedIn. He noted both hype around social networking claiming it can solve everything versus facts about reasonable employee use and companies finding success. Haun shared his personal experience blogging and using social networks. He provided advice on getting engaged, including reading regularly, sharing, commenting, creating content, and networking both online and offline.
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaKaren Kefauver
5 simple tips on how can parents can keep kids and teen safe in the world of social media. Social media marketing is designed to reach kids - how can you protect your kids from social media predators, scams, porn and more.
The document discusses the rise of social media and its impact on business communication. It notes that while brands used to control communications about them, the growth of social networks and user empowerment through new communication technologies has weakened brand voice and given power to customers. It advocates that businesses must join social conversations, build communities, and develop relationships with influencers in order to harness the potential of social media.
Social media can be used positively by businesses to advertise and promote their products, and by law enforcement to help catch criminals and gather evidence. It also benefits the economy by supporting businesses. However, social media allows the spread of false information, violates user privacy by revealing personal details, and can harm college applicants if admissions officers find evidence of illegal activity on their profiles.
This document provides a summary of a presentation about managing the business impact of social networking. The presentation discusses how social networking websites work, potential risks to individuals and businesses from using these sites, and how businesses should develop policies and procedures to address these risks. It also explores opportunities for businesses to leverage social networking and provides recommendations for an effective social networking strategy.
Social Media Personalities: Make or Break Your Career and Personal BrandLaurelEK
The document provides an overview of a presentation on understanding your social media personality and the risks and rewards of using social media for personal and professional purposes; it identifies 11 common social media personality types and discusses how each type may be perceived by employers and what dangers they may face in using social media.
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
Social Networking and the Employment Relationship
One-day conference: 3rd March 2010, Central London
· How you use social media – your internal social media network
· The benefits of social media
· Key learnings: What has gone wrong? How have you rectified the problems?
· How do you monitor employee use of social media?
· Your policy/guidelines – discussion and how are these enforced?
IBM Case Study: "Guiding Your Organization Through The Social Media Landscape”
- IBM Social engagement strategy
- how we have addressed social media governance from both an internal and external perspective at IBM.
-insights on IBM’s social computing guidelines
- Education on how IBMers can successfully leverage social technologies for improved business results.
- Best practices example
Dossier 10 negritos 2 temporada. luis santidriánCONSULTOR
“10 NEGRITOS” es “la mejor idea de Agatha Christie”, reconocido por la propia autora. Siendo la única pieza teatral que escribió (aunque se basara en su propia novela).
Escrita en 1939, ha batido todos los récords de espectadores y lectores. Con unos 100 millones de copias vendidas, hasta el momento; siendo la novela de misterio más vendida de la historia y está considerado dentro de los 10 libros más vendidos de todos los tiempos.
Miles de representaciones de éxito avalan la obra.
Contáctanos para estudiar la representación en tu localidad.
Luis Santidrián
luis.santidrian@gmail.com
+34 630 015 484 móvil
The Lifestyle Show es la primera edición de un evento sin
precedentes en España. Una esta FIESTA Premium de temática Lifestyle y todo lo que orbita alrededor de su universo: moda, tendencias e innovación a su marca
Un evento donde convergen grandes marcas, medios de comunicación y VIPS. Segmento de mercado alto. Evento que no debe perder. Comercializa y promociona: Luis Santidrián. luis.santidrian@gmail.com Teléfono: 630 015 484
İş Dünyası Hakkında Kimsenin Anlatmadıkları Murat Erdör
Üniversite’den mezun olurken herkes çok karmaşık duygular içerisinde oluyor. İş görüşmelerinde ve işe başladıktan sonra nelere dikkat edilmesi ile ilgili yeni mezunlar veya mezun olacak öğrenciler malesef yakın çevre ve aileden başka kimseden bir fikir edinemiyor. Konuyla ilgili birçok kitap olmasına rağmen bir çok bilgi teoriden öteye geçemiyor. Bu eğitimde iş dünyasına yeni atılacak kişilerin iş görüşmelerinde ve işe başladıktan sonra nelere dikkat etmesi hakkında detaylı bilgilerin canlı örneklerle verilmesi amaçlanmıştır.
Relación de proyectos de éxito que desarrollamos en 2016. Comunicación, patrocinio, sponsorización, social media, mejor target, acciones especiales, redes y mucho más. Cine, documental, cortometrajes, escena, eventos, festivales, Orgullo, belleza, cultura
Este año, el 80 aniversario de su fusilamiento la compañía de María Carrasco quiere reencontrarse con el mundo lorquiano y abordar de nuevo un análisis del poeta a través de la danza. Para ello recupera el espectáculo “BAILANDO A LORCA”, .renovándolo para representarlo ante sus paisanos, el publico madrileño.
Este espectáculo fue estrenado hace cinco años en la Red de Castilla la Mancha, fue represento en La Feria del Libro, en el Teatro Nacional de Panamá y en el XXI Aniversario del Teatro Cecut de Tijuana, México; entre otros.
Es una forma de conmemorar los 80 años de su muerte, porque a pesar del tiempo, Lorca sigue siendo un misterio.Federico García Lorca es un hombre lunar, vitalísimo, malogrado, vidente de su propio drama. Lorca ocupa todos los rincones y, de algún modo, todavía demasiados silencios, por eso es inacabable.
Contratación de espectáculo:
Luis Santidrián
luis.santidrian@gmail.com
+ 34 630015484 móvil
“10 NEGRITOS” es “la mejor idea de Agatha Christie”, reconocido por la propia autora. Siendo la única pieza teatral que escribió (aunque se basara en su propia novela).
Escrita en 1939, ha batido todos los récords de espectadores y lectores. Con unos 100 millones de copias vendidas, hasta el momento; siendo la novela de misterio más vendida de la historia y está considerado dentro de los 10 libros más vendidos de todos los tiempos.
Miles de representaciones de éxito avalan la obra.
Contáctanos para estudiar la representación en tu localidad.
Luis Santidrián
luis.santidrian@gmail.com
+34 630 015 484 móvil
Başarılı Sevgililer Günü E-Posta Kampanyaları için 15 TavsiyeMurat Erdör
Başarılı sevgililer günü e-postaları hakkında detaylı sunuma buradan bakabilir, beni @muraterdor Twitter adresinden takip edebilirsiniz. Bilgi Paylaştıkça Güzel.
Başarılı Sizi Özledik Kampanyaları için TavsiyelerMurat Erdör
Başarılı sizi özledik e-postaları hakkında detaylı sunuma buradan bakabilir, beni @muraterdor Twitter adresimden takip edebilirsiniz. Bilgi Paylaştıkça Güzel.
Jose Hernandez is a business leader with 15 years of experience in sales and management. He has a proven track record of successfully leading teams and exceeding sales objectives. Hernandez holds a PhD in Leadership and Management and has held several senior sales roles, most recently as Enterprise Sales Manager for CenturyLink where he led a team exceeding 100% of sales targets. He is skilled in areas such as leadership, client retention, strategic planning, and staff development.
This document discusses the growing impact and importance of social media for financial advisors. It notes that social media has fundamentally shifted communications and that consumers now spend over 55 minutes per day on platforms like Facebook, Twitter, and LinkedIn. The document outlines statistics on the growth and size of major social media platforms and notes that social media can help advisors build relationships with clients, gather information, provide value, and get feedback. It discusses how social media can be used for recruiting and references studies finding that social media influences investment decisions and that consumers trust recommendations from social media. The document provides industry resources and regulations related to social media use by financial advisors.
This document summarizes information about several major social media platforms - Facebook, YouTube, Instagram - presented by Laura Terry, Navraj Batra, and Ian Baker. It discusses the founding, purpose, target audiences, and business models of each platform. It also outlines both the positive and negative social impacts of social media under categories like environmental, social, geopolitical, career, technology, and mental factors. Positives include increased connectivity and sharing of information, while negatives include spread of misinformation, negative effects on mental health and well-being, and risks to privacy and security. The document concludes with short biographies of the presenters.
This document discusses how social media and Web 2.0 technologies can be used for recruitment, employee engagement, and job seeking. It defines Web 2.0 as technologies that allow users to interact with and participate in online content. Some key benefits of using social media for these purposes are attracting passive candidates, improving branding, building personal relationships, and reducing costs. However, legal issues and a lack of screening are potential drawbacks. The document provides statistics on social media usage and recommends tools like LinkedIn, Facebook, and company pages for recruitment and engagement purposes.
Justine Sacco, a PR consultant, tweeted a racially insensitive joke before a flight to South Africa in 2013. The tweet was spotted and spread widely on social media, garnering outrage and leading to Sacco being fired from her job. The document discusses the risks of social media posts, including how they can seriously damage careers and reputations. It provides tips on using social media professionally and maintaining privacy and appropriate conduct online.
Social media etiquette refers to the customs and rules for polite behavior when using social media. Some key etiquettes include having an appropriate profile picture, not oversharing content, thinking before posting, giving credit when sharing others' content, avoiding vulgar language, and thanking people for engaging with your posts. Using social media can help with job searching by making you more visible to recruiters on sites like LinkedIn, allowing you to build your professional network, and engage with potential employers. Diplomatic communication involves sticking to the subject, avoiding judgments, choosing words carefully, listening, and communicating in an open but respectful manner.
This document discusses using social media for recruitment, employee engagement, and job seeking. It defines Web 2.0 as online technologies that allow user participation and outlines popular social media platforms. Benefits of social media include attracting passive candidates, improving branding and the candidate experience, and reducing costs. Risks include legal issues, so companies should create social media policies.
This document discusses using social media as a recruitment tool. It begins by defining social media and providing statistics on social media usage. It then outlines how companies can use various social media platforms like Twitter, Facebook, LinkedIn, YouTube, and blogs in their recruitment strategies. For example, companies can advertise jobs, engage in conversations to build their employer brand, and find potential candidates on these channels. The document also notes some challenges in using social media for recruitment, such as legal issues, being overwhelmed by the volume of content, and needing to overcome fears of ceding control. It emphasizes that social media should complement, not replace, a company's careers website. Overall, the document explores how recruiters can leverage different social media platforms and
This document discusses social media and networking, outlining key definitions and concepts. It defines social media as content, tools, and services created and used online, such as Facebook, Twitter, and YouTube. Social networking is described as building interactive online communities through communication and information sharing. Popular social networking services allow users to create public profiles, connect with others who share interests, and view connections. The benefits of social media for individuals and businesses are discussed, including staying connected with others, generating leads at low cost, and creating online groups and communities.
This document provides an overview of social media and its relevance for small businesses. It discusses key concepts around social media, popular platforms, who uses social media and why, and how businesses are adopting social media. The document emphasizes that social media is huge in terms of users and time spent, trusted as a source of recommendations between consumers, and impacts businesses by allowing people to talk about brands. It provides tips for businesses to get started with social media, including forming a team, setting objectives, and choosing appropriate strategies and metrics to measure return on investment.
Your social media identity consists of photos, videos, text, and content others post about you. It is important to protect your social media identity to prevent identity theft and fraud. Managing your social media identity properly, such as using privacy settings and only connecting with people you know, helps avoid potential damage to personal relationships, reputation, and identity theft. Employers also use social media to screen applicants, so maintaining a positive online profile is important for professional reasons.
The document discusses key trends in social media and provides an overview of social media tools and strategies. It notes that social media allows direct engagement with customers and influencers. It highlights statistics on mobile and internet penetration and the growth of social networks. It emphasizes that ignoring social media can have negative consequences like not knowing what is being said and losing competitive advantage. The document provides a 4-step guidance for an effective social media strategy involving listening, connecting, adding value and measuring engagement.
The New Model of Interaction in Social NetworksSharlyn Lauby
America Empresarial, Bogota, 2011
The concept of social networking isn’t just for young people anymore. More and more businesses and professionals are using social media as a way to generate revenue and interact with customers (both internally and externally.) When case studies show the use of social tools exceeds email, then businesses have to stand up, take notice and join the movement. For business professionals, this becomes an opportunity to develop an internal marketing and communications strategy to support our organizations.
But what exactly is the philosophy behind social networking? This presentation offers an overview to the purpose of social media and the key considerations for developing and implementing a social networking strategy in your organization.
The document provides an overview of using social media, specifically Facebook, Twitter, and LinkedIn, for recruitment purposes. It discusses how these platforms can be used to find and engage with candidates, providing resources for employers. Facebook allows sharing photos and updates about the company culture. Twitter is best for sharing job postings and interacting with candidates. LinkedIn facilitates researching candidates' experience and building a professional network. The document recommends establishing a presence on these major social media sites to access candidates and enhance employer branding.
This document provides an overview of using social media, specifically blogs, for talent recruitment. It defines what a blog is and how it differs from traditional media in its emphasis on user interaction and comments. Blogs can attract candidates by providing insights into a company's culture from a personal perspective and allowing candidates to communicate directly. Maintaining a company blog also strengthens a company's overall social media presence and branding by linking to other social profiles to drive traffic.
This document summarizes a presentation on using social media for HR and professional development. It defines social media and common types like blogs, social networks, and media sharing sites. It discusses using social media for personal branding, recruitment, and HR. Some key points include:
- Social media allows one-to-many conversations through user-generated content and web tools. Common types are blogs, social networks, and media sharing sites.
- Personal branding on social media can help build and invest in one's professional network. HR can use social media to research candidates and monitor employees.
- When using social media for HR and business, organizations should set goals and strategies, add value through sharing knowledge, and be careful of legal
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
2. Social Media is an interactive, constantly changing medium,
unlike a regular website, which generally provides static
information, social networking tools facilitate
communication.
There are 4 main sources of Social Media:
Facebook
Blogs
LinkedIn
Twitter
3. Profiles
Photos
Personal Information
Other Media (
music, articles, books, etc.)
Able to be searched and
viewed by literally
ANYONE
Communications
Direct comments
Instant messaging
Email
4. Facebook is King of the social media empire
Launched in 2004, had reached 100 million users by August of 2008
From 2008 to 2010 Facebook grew from 100 million users to 500
million!
Facebook is second only to Google in terms of internet traffic among
websites
Over 700 BILLION minutes per month are spent on Facebook by
people from all across the globe
Miles, 2011
5. There are more than 161
million blogs on the internet
More than 68,000 of those
were created in the 24 hours
preceding that study
Blog topics are varied and
only limited by human
imagination
Bloggers can be anyone with
access to the internet, even
YOU!
Miles, 2011
6. The “Professional” social
networking site
Focused on the user’s
professional life
Launched in 2003, LinkedIn
reached the 100 million
member mark in 2011
It is now growing at a rate
of one million new users
per week, which is faster
than one user every second
Miles, 2011
7. A “real time information
network that connects
you to the latest
information about what
you find interesting”
From 2006 to 2011 it has
gained over 200 million
users
Over half of all U.S. users
are between the ages of
18 and 34
Ability to run real time
searches
Miles, 2011
8. The face of social media has changed tremendously in the
last 10 years.
A “here today, gone tomorrow” industry
Myspace
▪ Launched in 2004, it grew to over 67 million users by 2008 and was the number
1 social media site on the net
▪ When Facebook launched Myspace began slowly losing popularity and
dropped from the number 1 site on the net to the 75th most popular today
Facebook
▪ The current “King” but faces struggles ahead with new sites coming out almost
monthly
Twitter
▪ Still fairly “new” and developing a reputation
Google+
▪ The newest of the large scale social media sites
▪ Grew to 25 million members in just one month, it took Facebook 35 months to
reach that benchmark (Web Sigmas, 2011)
Miles, 2011
9. The chart below shows reasons why applicants were
95% of employers are denied jobs base on their social media profiles
(Madrigal, 2011)
using social media to
screen potential
employees
Guidance on laws and
regulations of social media
are still developing
There are few clear rules on
what is appropriate and what
is not
Schwartz, 2011
10. Male hiring mangers
were more often found
to screen candidates
using the internet
Searching for
information about the
candidates lifestyle,
inappropriate comments
left, unsuitable
photos/videos, etc.
The chart to the right
Breaks down the different
searches that hiring
managers perform
Einhorn, 2010
11. 55% of employees admit to visiting social
networking sites during work hours
87% said they had no clear business reason
for using Facebook
74% of managers surveyed believe social
networking sites put the firms and their
brands at risk
Employee productivity drops 1.5% at
companies that allow full access to Facebook
Kawaski, 2009
12. Work Use vs. Non-Work Use
Is social media being used to market your business?
Mobile Access
▪ Mobile users spend 1.4 times as many hours using social networking sites than reading and
responding to email, averaging out at 3.1 hour per week on social networks
Social Media Is Not Private
Even when your off the clock your employer still is involved
Your personal image is always compared back to the company at which you work
▪ Set good examples
Photo’s and Video’s
Photo’s can help advertise the business’s accomplishments or events
Important to inform employees of the possibility their photo appears on the
website ahead of time
Harassment
Employers must protect themselves by monitoring what is being said on social
media sites between employees
Many employers take initiative by blocking social media sites completely
Hyman,2011
13. Harassment
Employers must protect themselves by monitoring what is being said
on social media sites between employees
Many employers take initiative by blocking social media sites
completely
Corporate Image
Goes back on the ideals that you portray the company that you work
for
Discrimination
Employers must adopt a social media policy to avoid discrimination,
whether it be intentional or not
Often times possible employees are searched online through social
media sites before ever even being contacted by employers
▪ This often gives employers preset images of the candidate, often times hurting
opportunities to be hired
Hyman, 2011
14. Confidentiality
Social media in certain instances can put your
companies trade secrets or other confidential
information at risk
‘Friending’ Co-Workers
Has more to do with corporate culture, than what is
legal or illegal
▪ Is it acceptable to friend your boss?
Accountability
Any social media policy must emphasize that
employees are accountable for their social media
activities, both inside and outside of work
15. Hiring: Five points to consider
1. Consistency
Make all recruitment decisions based on consistent selection criteria. Create a list of allowable
social media websites that human resources may utilize for lawful information about the applicant
(for example,LinkedIn).
2. Consent
Seek the applicant's consent to use designated lawful information obtained from the applicant's
social media sites.
3. Neutrality
The social media search should be conducted by a neutral third party or by someone in the
company that has no influence over the hiring of the applicant. They can help the employer sieve
out unnecessary or excessive information.
4. 'Friend'ship
No 'Friend'ship! Employers should not be'friend' an applicant just so that it can get into an
applicant's 'page'.
5. Reasoning
When a decision has been made to not hire an applicant, make sure this decision is a supported,
standalone decision independent from anything researched on the applicant through the use of
social media.
Tam, 2011
16. My intern, Uriah Hansen, while applying for a position
at a local company was later informed after his hiring
that it wasn’t just his experience or personality that got
his job, but what was also on his Facebook profile, or
lack there of
After reviewing resumes and conducting interviews
with multiple applicants his hiring manager had it
narrowed down between Uriah and one other
candidate, each equally qualified and experienced
Social media was the separator. When profiles were
compared Uriah’s was modest and kept under key while
the opposing candidate had multiple pictures of
drinking and inappropriate behavior which ended up
being the deciding factor in offering the job to Uriah
17. Comedian and voice of the Aflac duck, Gilbert
Godfrey was fired in March after Tweeting
inappropriate comments about the Tsunami in
Japan.
I just split up with my girlfriend, but like the Japanese
say, “They’ll be another one floating by any minute now.”
Japan is really advanced. They don’t go to the beach. The
beach comes to them.
18. Prevent loss of productivity
Permit effective monitoring (compliance with laws)
Protect the reputation and image of your company
Protect against loss of confidential information
and trade secrets
Guard against suits for invasion of privacy,
defamation, improper recruiting and improper
discipline and termination
Protection against discrimination, harassment and
cyber-bullying
19. Must be clear and specific to your organization
Focus on what can and cannot be done (the do’s
and don’ts)
Must be consistent to other organizational
policies
Anti-discrimination
Anti-harassment
Computer, Internet, and Email Systems
Employee Privacy
Confidentiality
References
Fagan, 2010
20. Monitoring
Give Notice
Difference between on and off duty?
No obligation to monitor, but may want to in
order to address
▪ Loss of confidential info.
▪ Cyber-bullying, stalking
▪ Harassment and discrimination
▪ Prevent defamation and improper recruiting acts
Fagan, 2010
21. Include mandatory training regarding social
media
Assign a compliance officer or responsible
person to create a compliance framework
tailored to your company
Create a reporting procedure and protocal
Fagan, 2010
22. Make clear that employees may NOT:
Use the organization’s name in the online identity
(username, handle, or screen name)
Claim or imply they are speaking as a
organizational representative
Use the companies intellectual
property, logos, trademarks, or copyrights
Identify a client or co-worker in an online post
Fagan, 2010
23. The First Amendment does NOT protect an
employee from being monitored, disciplined or
terminated for violating a clear and reasonable
social media policy
Employees have NO absolute Constitutional
right to
privacy in the workplace (4th Amendment on
searches and seizures does not apply)
But you need a clear and reasonable policy that
sets out expectations and restrictions on usage
Fagan, 2010
24. Policy should reduce any expectation of privacy on the
organization’s computers, email systems, blackberry,
telephone/voicemail systems and any of the data on
these systems by:
Making sure employees know that certain
information exchanged on social networking sites
can be monitored and accessed by the
organization
Expressly stating: no expectation of privacy, even
with personal use and when telecommuting
Reserving right to remove content without notice
Reminding employees about privacy settings Fagan, 2010
25. Make sure your policy adheres to the following laws:
Electronic Communications Privacy Act
(Wiretap – consent and business
exceptions)
Stored Communications Act (improper
access of electronically stored information)
Federal Trade Commission Guidelines
(false advertising and misleading sales
pitches)
NLRA (section 7 rights of employees for
concerted activity)
Fagan, 2010
26. Policy should prohibit employees from disclosing:
Clients, customers, partners, or suppliers by
name
Organization’s confidential information and
trade secrets
Information regarding organization’s clients,
affiliates, partnerships
Policy should fit in with any restrictive
language in employment agreements or handbook
Fagan, 2010
27. Some of the biggest issues that arise out of lack
of policy are Harassment and Discrimination,
your policy needs to emphasize that employees
may not:
Post offensive or insulting material regarding the
company, its employees, vendors, suppliers,
competitors, etc.
Post information that could be construed as
discriminatory or harassment based on race, age,
sexuality, gender, disability, or any other protected
characteristic
28. Here is an example of IBM’s current social
media policy
1) Know and follow IBM's Business Conduct Guidelines
2) IBMers are personally responsible for the content they publish on-line, whether in a
blog, social computing site or any other form of user-generated media. Be mindful
that what you publish will be public for a long time—protect your privacy and take
care to understand a site's terms of service.
3) Identify yourself—name and, when relevant, role at IBM—when you discuss IBM or
IBM-related matters, such as IBM products or services. You must make it clear that
you are speaking for yourself and not on behalf of IBM.
4) If you publish content online relevant to IBM in your personal capacity use a
disclaimer such as this: "The postings on this site are my own and don't necessarily
represent IBM's positions, strategies or opinions.“
5) Respect copyright, fair use and financial disclosure laws.
IBM, 2010
29. 5) Don't provide IBM's or another's confidential or other proprietary information and
never discuss IBM business performance or other sensitive matters publicly
6) Don't cite or reference clients, partners or suppliers without their approval. When you
do make a reference, link back to the source. Don't publish anything that might allow
inferences to be drawn which could embarrass or damage a client
7) Respect your audience. Don't use ethnic slurs, personal insults, obscenity, or engage in
any conduct that would not be acceptable in IBM's workplace. You should also show
proper consideration for others' privacy and for topics that may be considered
objectionable or inflammatory—such as politics and religion
8) Be aware of your association with IBM in online social networks. If you identify yourself
as an IBMer, ensure your profile and related content is consistent with how you wish to
present yourself with colleagues and clients
9) Don't pick fights, be the first to correct your own mistakes
10) Try to add value. Provide worthwhile information and perspective. IBM's brand is best
represented by its people and what you publish may reflect on IBM's brand
11) Don't use use IBM logos or trademarks unless approved to do so
IBM, 2010
30. Amira-Jabbar v. Travel Services, Inc.
Inappropriate comments were posted on a picture
from a corporate event during work hours, from
work equipment
The court ruled that the employer was not at fault
for the incident, but as a precautionary measure
Travel Services blocked Facebook and revamped
their Social Media policy to reflect the situation
DiBianca, 2011
31. Doe v. XYC Corporation
Management had discovered an employee was accessing
pornographic websites on company equipment
No steps were taken to ensure the employee halted his
behavior
Employee was later arrested and charged with child
pornography, some of which he transmitted and submitted
from his work computer
Doe’s wife sued XYC for failure to monitor her husbands activity
and prevent him from exploiting her daughter
XYC company was found liable in the suit because they had no
expectation of privacy in Doe’s internet usage on the company
computer
Court found that XYC had a duty to act to prevent further harm
to innocent third parties
DiBianca, 2011
32. Be wary when posting recommendations or
references for an employee or subordinate on
sites such as LinkedIn
These references could later be used against
you in a wrongful termination suit
33. Social media is around to stay!
Proper precautions need to be made to
protect your companies reputation as well as
financials
Don’t put your blinders on, stay on your toes
regarding social media and the constant
changes
The most important step in protecting your
company is a SOCIAL MEDIA POLICY