SlideShare a Scribd company logo
Rush C. Nigut
   Social Media is an interactive, constantly changing medium,
    unlike a regular website, which generally provides static
    information, social networking tools facilitate
    communication.
   There are 4 main sources of Social Media:
     Facebook
     Blogs
     LinkedIn
     Twitter
   Profiles
     Photos
     Personal Information
     Other Media (
      music, articles, books, etc.)
   Able to be searched and
    viewed by literally
    ANYONE
   Communications
     Direct comments
     Instant messaging
     Email
   Facebook is King of the social media empire
     Launched in 2004, had reached 100 million users by August of 2008
     From 2008 to 2010 Facebook grew from 100 million users to 500
      million!
     Facebook is second only to Google in terms of internet traffic among
      websites
     Over 700 BILLION minutes per month are spent on Facebook by
      people from all across the globe




                                                     Miles, 2011
   There are more than 161
    million blogs on the internet
     More than 68,000 of those
      were created in the 24 hours
      preceding that study
 Blog topics are varied and
  only limited by human
  imagination
 Bloggers can be anyone with
  access to the internet, even
  YOU!




                                     Miles, 2011
   The “Professional” social
                  networking site
                 Focused on the user’s
                  professional life
                 Launched in 2003, LinkedIn
                  reached the 100 million
                  member mark in 2011
                 It is now growing at a rate
                  of one million new users
                  per week, which is faster
                  than one user every second
Miles, 2011
   A “real time information
      network that connects
      you to the latest
      information about what
      you find interesting”
     From 2006 to 2011 it has
      gained over 200 million
      users
     Over half of all U.S. users
      are between the ages of
      18 and 34
     Ability to run real time
      searches

Miles, 2011
   The face of social media has changed tremendously in the
    last 10 years.
   A “here today, gone tomorrow” industry
     Myspace
      ▪ Launched in 2004, it grew to over 67 million users by 2008 and was the number
        1 social media site on the net
      ▪ When Facebook launched Myspace began slowly losing popularity and
        dropped from the number 1 site on the net to the 75th most popular today
     Facebook
      ▪ The current “King” but faces struggles ahead with new sites coming out almost
        monthly
     Twitter
      ▪ Still fairly “new” and developing a reputation
     Google+
      ▪ The newest of the large scale social media sites
      ▪ Grew to 25 million members in just one month, it took Facebook 35 months to
        reach that benchmark (Web Sigmas, 2011)

                                                                       Miles, 2011
   The chart below shows reasons why applicants were
   95% of employers are                 denied jobs base on their social media profiles
                                         (Madrigal, 2011)
    using social media to
    screen potential
    employees
   Guidance on laws and
    regulations of social media
    are still developing
     There are few clear rules on
      what is appropriate and what
      is not



    Schwartz, 2011
   Male hiring mangers
    were more often found
    to screen candidates
    using the internet
   Searching for
    information about the
    candidates lifestyle,
    inappropriate comments
    left, unsuitable
    photos/videos, etc.
   The chart to the right 
     Breaks down the different
      searches that hiring
      managers perform
                                  Einhorn, 2010
   55% of employees admit to visiting social
    networking sites during work hours
   87% said they had no clear business reason
    for using Facebook
   74% of managers surveyed believe social
    networking sites put the firms and their
    brands at risk
   Employee productivity drops 1.5% at
    companies that allow full access to Facebook
                                     Kawaski, 2009
   Work Use vs. Non-Work Use
     Is social media being used to market your business?
     Mobile Access
       ▪ Mobile users spend 1.4 times as many hours using social networking sites than reading and
         responding to email, averaging out at 3.1 hour per week on social networks
   Social Media Is Not Private
     Even when your off the clock your employer still is involved
     Your personal image is always compared back to the company at which you work
       ▪ Set good examples
   Photo’s and Video’s
     Photo’s can help advertise the business’s accomplishments or events
     Important to inform employees of the possibility their photo appears on the
       website ahead of time
   Harassment
     Employers must protect themselves by monitoring what is being said on social
      media sites between employees
     Many employers take initiative by blocking social media sites completely



                                                                                       Hyman,2011
   Harassment
     Employers must protect themselves by monitoring what is being said
      on social media sites between employees
     Many employers take initiative by blocking social media sites
      completely

   Corporate Image
     Goes back on the ideals that you portray the company that you work
      for
   Discrimination
     Employers must adopt a social media policy to avoid discrimination,
      whether it be intentional or not
     Often times possible employees are searched online through social
      media sites before ever even being contacted by employers
      ▪ This often gives employers preset images of the candidate, often times hurting
        opportunities to be hired

                                                                           Hyman, 2011
   Confidentiality
     Social media in certain instances can put your
      companies trade secrets or other confidential
      information at risk
   ‘Friending’ Co-Workers
     Has more to do with corporate culture, than what is
      legal or illegal
      ▪ Is it acceptable to friend your boss?
   Accountability
     Any social media policy must emphasize that
      employees are accountable for their social media
      activities, both inside and outside of work
   Hiring: Five points to consider
    1. Consistency
            Make all recruitment decisions based on consistent selection criteria. Create a list of allowable
            social media websites that human resources may utilize for lawful information about the applicant
            (for example,LinkedIn).
    2. Consent
            Seek the applicant's consent to use designated lawful information obtained from the applicant's
            social media sites.
    3. Neutrality
            The social media search should be conducted by a neutral third party or by someone in the
            company that has no influence over the hiring of the applicant. They can help the employer sieve
            out unnecessary or excessive information.
    4. 'Friend'ship
            No 'Friend'ship! Employers should not be'friend' an applicant just so that it can get into an
            applicant's 'page'.
    5. Reasoning
            When a decision has been made to not hire an applicant, make sure this decision is a supported,
            standalone decision independent from anything researched on the applicant through the use of
            social media.



                                                                                        Tam, 2011
   My intern, Uriah Hansen, while applying for a position
    at a local company was later informed after his hiring
    that it wasn’t just his experience or personality that got
    his job, but what was also on his Facebook profile, or
    lack there of
   After reviewing resumes and conducting interviews
    with multiple applicants his hiring manager had it
    narrowed down between Uriah and one other
    candidate, each equally qualified and experienced
   Social media was the separator. When profiles were
    compared Uriah’s was modest and kept under key while
    the opposing candidate had multiple pictures of
    drinking and inappropriate behavior which ended up
    being the deciding factor in offering the job to Uriah
   Comedian and voice of the Aflac duck, Gilbert
    Godfrey was fired in March after Tweeting
    inappropriate comments about the Tsunami in
    Japan.
     I just split up with my girlfriend, but like the Japanese
      say, “They’ll be another one floating by any minute now.”
     Japan is really advanced. They don’t go to the beach. The
      beach comes to them.
 Prevent loss of productivity
 Permit effective monitoring (compliance with laws)
 Protect the reputation and image of your company
 Protect against loss of confidential information
  and trade secrets
 Guard against suits for invasion of privacy,
  defamation, improper recruiting and improper
  discipline and termination
 Protection against discrimination, harassment and
  cyber-bullying
   Must be clear and specific to your organization
   Focus on what can and cannot be done (the do’s
    and don’ts)
   Must be consistent to other organizational
    policies
       Anti-discrimination
       Anti-harassment
       Computer, Internet, and Email Systems
       Employee Privacy
       Confidentiality
       References
                                                Fagan, 2010
   Monitoring
     Give Notice
     Difference between on and off duty?
     No obligation to monitor, but may want to in
     order to address
      ▪   Loss of confidential info.
      ▪   Cyber-bullying, stalking
      ▪   Harassment and discrimination
      ▪   Prevent defamation and improper recruiting acts

                                                      Fagan, 2010
   Include mandatory training regarding social
    media
   Assign a compliance officer or responsible
    person to create a compliance framework
    tailored to your company
   Create a reporting procedure and protocal



                                         Fagan, 2010
   Make clear that employees may NOT:
     Use the organization’s name in the online identity
      (username, handle, or screen name)
     Claim or imply they are speaking as a
      organizational representative
     Use the companies intellectual
      property, logos, trademarks, or copyrights
     Identify a client or co-worker in an online post


                                                 Fagan, 2010
 The First Amendment does NOT protect an
  employee from being monitored, disciplined or
  terminated for violating a clear and reasonable
  social media policy
 Employees have NO absolute Constitutional
  right to
  privacy in the workplace (4th Amendment on
  searches and seizures does not apply)
 But you need a clear and reasonable policy that
  sets out expectations and restrictions on usage

                                          Fagan, 2010
   Policy should reduce any expectation of privacy on the
    organization’s computers, email systems, blackberry,
    telephone/voicemail systems and any of the data on
    these systems by:
     Making sure employees know that certain
    information exchanged on social networking sites
    can be monitored and accessed by the
    organization
     Expressly stating: no expectation of privacy, even
    with personal use and when telecommuting
     Reserving right to remove content without notice
     Reminding employees about privacy settings        Fagan, 2010
   Make sure your policy adheres to the following laws:
     Electronic Communications Privacy Act
    (Wiretap – consent and business
    exceptions)
     Stored Communications Act (improper
    access of electronically stored information)
     Federal Trade Commission Guidelines
    (false advertising and misleading sales
    pitches)
     NLRA (section 7 rights of employees for
    concerted activity)

                                                   Fagan, 2010
   Policy should prohibit employees from disclosing:
     Clients, customers, partners, or suppliers by
    name
     Organization’s confidential information and
    trade secrets
     Information regarding organization’s clients,
    affiliates, partnerships
     Policy should fit in with any restrictive
     language in employment agreements or handbook

                                           Fagan, 2010
   Some of the biggest issues that arise out of lack
    of policy are Harassment and Discrimination,
    your policy needs to emphasize that employees
    may not:
     Post offensive or insulting material regarding the
      company, its employees, vendors, suppliers,
      competitors, etc.
     Post information that could be construed as
      discriminatory or harassment based on race, age,
      sexuality, gender, disability, or any other protected
      characteristic
   Here is an example of IBM’s current social
    media policy
    1)   Know and follow IBM's Business Conduct Guidelines
    2)   IBMers are personally responsible for the content they publish on-line, whether in a
         blog, social computing site or any other form of user-generated media. Be mindful
         that what you publish will be public for a long time—protect your privacy and take
         care to understand a site's terms of service.
    3)   Identify yourself—name and, when relevant, role at IBM—when you discuss IBM or
         IBM-related matters, such as IBM products or services. You must make it clear that
         you are speaking for yourself and not on behalf of IBM.
    4)   If you publish content online relevant to IBM in your personal capacity use a
         disclaimer such as this: "The postings on this site are my own and don't necessarily
         represent IBM's positions, strategies or opinions.“
    5)   Respect copyright, fair use and financial disclosure laws.


                                                                            IBM, 2010
5)    Don't provide IBM's or another's confidential or other proprietary information and
      never discuss IBM business performance or other sensitive matters publicly
6)    Don't cite or reference clients, partners or suppliers without their approval. When you
      do make a reference, link back to the source. Don't publish anything that might allow
      inferences to be drawn which could embarrass or damage a client
7)    Respect your audience. Don't use ethnic slurs, personal insults, obscenity, or engage in
      any conduct that would not be acceptable in IBM's workplace. You should also show
      proper consideration for others' privacy and for topics that may be considered
      objectionable or inflammatory—such as politics and religion
8)    Be aware of your association with IBM in online social networks. If you identify yourself
      as an IBMer, ensure your profile and related content is consistent with how you wish to
      present yourself with colleagues and clients
9)    Don't pick fights, be the first to correct your own mistakes
10)   Try to add value. Provide worthwhile information and perspective. IBM's brand is best
      represented by its people and what you publish may reflect on IBM's brand
11)   Don't use use IBM logos or trademarks unless approved to do so



                                                                                IBM, 2010
   Amira-Jabbar v. Travel Services, Inc.
     Inappropriate comments were posted on a picture
      from a corporate event during work hours, from
      work equipment
     The court ruled that the employer was not at fault
      for the incident, but as a precautionary measure
      Travel Services blocked Facebook and revamped
      their Social Media policy to reflect the situation


                                             DiBianca, 2011
   Doe v. XYC Corporation
     Management had discovered an employee was accessing
        pornographic websites on company equipment
       No steps were taken to ensure the employee halted his
        behavior
       Employee was later arrested and charged with child
        pornography, some of which he transmitted and submitted
        from his work computer
       Doe’s wife sued XYC for failure to monitor her husbands activity
        and prevent him from exploiting her daughter
       XYC company was found liable in the suit because they had no
        expectation of privacy in Doe’s internet usage on the company
        computer
       Court found that XYC had a duty to act to prevent further harm
        to innocent third parties
                                                        DiBianca, 2011
   Be wary when posting recommendations or
    references for an employee or subordinate on
    sites such as LinkedIn
   These references could later be used against
    you in a wrongful termination suit
   Social media is around to stay!
   Proper precautions need to be made to
    protect your companies reputation as well as
    financials
   Don’t put your blinders on, stay on your toes
    regarding social media and the constant
    changes
   The most important step in protecting your
    company is a SOCIAL MEDIA POLICY
Social media pp

More Related Content

What's hot

Social media guidelines
Social media guidelines Social media guidelines
Social media guidelines
Adam De Vile
 
ISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media EffortsISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media Efforts
Raul Colon
 
Social Media For Employment
Social Media For EmploymentSocial Media For Employment
Social Media For Employment
Katie Fellenz
 
Social Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage EmployeesSocial Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage Employees
Bryce Maddock
 
Social Media - The Good and the Bad
Social Media - The Good and the BadSocial Media - The Good and the Bad
Social Media - The Good and the Bad
Leah Schklar
 
Social Media Job Search
Social Media Job SearchSocial Media Job Search
Social Media Job Search
novermyer
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
Steve Young
 
Social Media In The Workplace
Social Media In The WorkplaceSocial Media In The Workplace
Social Media In The Workplace
Andrew Kudwa
 
Bsm wk iv_j2013
Bsm wk iv_j2013Bsm wk iv_j2013
Bsm wk iv_j2013
Yadira Galindo
 
Social Media 101 for Addiction Professionals
Social Media 101 for Addiction ProfessionalsSocial Media 101 for Addiction Professionals
Social Media 101 for Addiction Professionals
Alpha 180
 
Social Media and Human Resource Management
Social Media and Human Resource Management Social Media and Human Resource Management
Social Media and Human Resource Management
Gaurav Wadhwa
 
Social Media in the Workplace
Social Media in the WorkplaceSocial Media in the Workplace
Social Media in the Workplace
Kate Bischoff, JD, SPHR
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
Dave Tinker, CFRE
 
Social Media and HR
Social Media and HRSocial Media and HR
Social Media and HR
Lance Haun
 
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaSocial Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Karen Kefauver
 
Social media course conclusion 2010 2011
Social media course conclusion 2010 2011Social media course conclusion 2010 2011
Social media course conclusion 2010 2011
guillaume ereteo
 
Social media
Social mediaSocial media
Social media
SMassengale2017
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
Micheal Axelsen
 
Social Media Personalities: Make or Break Your Career and Personal Brand
Social Media Personalities: Make or Break Your Career and Personal BrandSocial Media Personalities: Make or Break Your Career and Personal Brand
Social Media Personalities: Make or Break Your Career and Personal Brand
LaurelEK
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
guestca2060b
 

What's hot (20)

Social media guidelines
Social media guidelines Social media guidelines
Social media guidelines
 
ISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media EffortsISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media Efforts
 
Social Media For Employment
Social Media For EmploymentSocial Media For Employment
Social Media For Employment
 
Social Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage EmployeesSocial Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage Employees
 
Social Media - The Good and the Bad
Social Media - The Good and the BadSocial Media - The Good and the Bad
Social Media - The Good and the Bad
 
Social Media Job Search
Social Media Job SearchSocial Media Job Search
Social Media Job Search
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
 
Social Media In The Workplace
Social Media In The WorkplaceSocial Media In The Workplace
Social Media In The Workplace
 
Bsm wk iv_j2013
Bsm wk iv_j2013Bsm wk iv_j2013
Bsm wk iv_j2013
 
Social Media 101 for Addiction Professionals
Social Media 101 for Addiction ProfessionalsSocial Media 101 for Addiction Professionals
Social Media 101 for Addiction Professionals
 
Social Media and Human Resource Management
Social Media and Human Resource Management Social Media and Human Resource Management
Social Media and Human Resource Management
 
Social Media in the Workplace
Social Media in the WorkplaceSocial Media in the Workplace
Social Media in the Workplace
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Social Media and HR
Social Media and HRSocial Media and HR
Social Media and HR
 
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaSocial Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
 
Social media course conclusion 2010 2011
Social media course conclusion 2010 2011Social media course conclusion 2010 2011
Social media course conclusion 2010 2011
 
Social media
Social mediaSocial media
Social media
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
 
Social Media Personalities: Make or Break Your Career and Personal Brand
Social Media Personalities: Make or Break Your Career and Personal BrandSocial Media Personalities: Make or Break Your Career and Personal Brand
Social Media Personalities: Make or Break Your Career and Personal Brand
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
 

Viewers also liked

E-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucu
E-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucuE-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucu
E-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucu
Murat Erdör
 
Dossier 10 negritos 2 temporada. luis santidrián
Dossier 10 negritos    2 temporada. luis santidriánDossier 10 negritos    2 temporada. luis santidrián
Dossier 10 negritos 2 temporada. luis santidrián
CONSULTOR
 
Life style show
Life style showLife style show
Life style show
CONSULTOR
 
Sektörden Haberler Emarsys Haziran 2014
Sektörden Haberler Emarsys Haziran 2014Sektörden Haberler Emarsys Haziran 2014
Sektörden Haberler Emarsys Haziran 2014
Murat Erdör
 
Sektörden Haberler_Emarsys_ Kasım 2013
Sektörden Haberler_Emarsys_ Kasım 2013Sektörden Haberler_Emarsys_ Kasım 2013
Sektörden Haberler_Emarsys_ Kasım 2013
Murat Erdör
 
Sektörden Haberler_Emarsys_Şubat 2014
Sektörden Haberler_Emarsys_Şubat 2014Sektörden Haberler_Emarsys_Şubat 2014
Sektörden Haberler_Emarsys_Şubat 2014
Murat Erdör
 
İş Dünyası Hakkında Kimsenin Anlatmadıkları
İş Dünyası Hakkında Kimsenin Anlatmadıkları İş Dünyası Hakkında Kimsenin Anlatmadıkları
İş Dünyası Hakkında Kimsenin Anlatmadıkları
Murat Erdör
 
Proyectos 2016
Proyectos 2016Proyectos 2016
Proyectos 2016
CONSULTOR
 
Dossier Bailando a lorca
Dossier Bailando a lorcaDossier Bailando a lorca
Dossier Bailando a lorca
CONSULTOR
 
Nuevo dossier 10 negritos 2016
Nuevo dossier 10 negritos   2016Nuevo dossier 10 negritos   2016
Nuevo dossier 10 negritos 2016
CONSULTOR
 
Why Turkey Has a Potential in E-commerce
Why Turkey Has a Potential in E-commerceWhy Turkey Has a Potential in E-commerce
Why Turkey Has a Potential in E-commerce
Murat Erdör
 
Başarılı Hoşgeldin E-postaları İçin 12 Tavsiye
Başarılı Hoşgeldin E-postaları İçin 12 TavsiyeBaşarılı Hoşgeldin E-postaları İçin 12 Tavsiye
Başarılı Hoşgeldin E-postaları İçin 12 Tavsiye
Murat Erdör
 
Başarılı Sevgililer Günü E-Posta Kampanyaları için 15 Tavsiye
Başarılı Sevgililer Günü E-Posta Kampanyaları için 15 TavsiyeBaşarılı Sevgililer Günü E-Posta Kampanyaları için 15 Tavsiye
Başarılı Sevgililer Günü E-Posta Kampanyaları için 15 Tavsiye
Murat Erdör
 
Sektörden Haberler Emarsys Mayıs 2014
Sektörden Haberler Emarsys Mayıs 2014Sektörden Haberler Emarsys Mayıs 2014
Sektörden Haberler Emarsys Mayıs 2014
Murat Erdör
 
Başarılı Sizi Özledik Kampanyaları için Tavsiyeler
Başarılı Sizi Özledik Kampanyaları için TavsiyelerBaşarılı Sizi Özledik Kampanyaları için Tavsiyeler
Başarılı Sizi Özledik Kampanyaları için Tavsiyeler
Murat Erdör
 
E-posta Pazarlama Hakkında Bilinmesi Gerekenler
E-posta Pazarlama Hakkında Bilinmesi GerekenlerE-posta Pazarlama Hakkında Bilinmesi Gerekenler
E-posta Pazarlama Hakkında Bilinmesi Gerekenler
Murat Erdör
 
Sektörden Haberler_Emarsys_Aralık 2013
Sektörden Haberler_Emarsys_Aralık 2013Sektörden Haberler_Emarsys_Aralık 2013
Sektörden Haberler_Emarsys_Aralık 2013
Murat Erdör
 
Jose Hernandez Resume
Jose Hernandez ResumeJose Hernandez Resume
Jose Hernandez Resume
Iglesia Nueva
 

Viewers also liked (18)

E-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucu
E-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucuE-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucu
E-posta Pazarlamasında Geri Dönüşüm Oranını Artıracak 10 İpucu
 
Dossier 10 negritos 2 temporada. luis santidrián
Dossier 10 negritos    2 temporada. luis santidriánDossier 10 negritos    2 temporada. luis santidrián
Dossier 10 negritos 2 temporada. luis santidrián
 
Life style show
Life style showLife style show
Life style show
 
Sektörden Haberler Emarsys Haziran 2014
Sektörden Haberler Emarsys Haziran 2014Sektörden Haberler Emarsys Haziran 2014
Sektörden Haberler Emarsys Haziran 2014
 
Sektörden Haberler_Emarsys_ Kasım 2013
Sektörden Haberler_Emarsys_ Kasım 2013Sektörden Haberler_Emarsys_ Kasım 2013
Sektörden Haberler_Emarsys_ Kasım 2013
 
Sektörden Haberler_Emarsys_Şubat 2014
Sektörden Haberler_Emarsys_Şubat 2014Sektörden Haberler_Emarsys_Şubat 2014
Sektörden Haberler_Emarsys_Şubat 2014
 
İş Dünyası Hakkında Kimsenin Anlatmadıkları
İş Dünyası Hakkında Kimsenin Anlatmadıkları İş Dünyası Hakkında Kimsenin Anlatmadıkları
İş Dünyası Hakkında Kimsenin Anlatmadıkları
 
Proyectos 2016
Proyectos 2016Proyectos 2016
Proyectos 2016
 
Dossier Bailando a lorca
Dossier Bailando a lorcaDossier Bailando a lorca
Dossier Bailando a lorca
 
Nuevo dossier 10 negritos 2016
Nuevo dossier 10 negritos   2016Nuevo dossier 10 negritos   2016
Nuevo dossier 10 negritos 2016
 
Why Turkey Has a Potential in E-commerce
Why Turkey Has a Potential in E-commerceWhy Turkey Has a Potential in E-commerce
Why Turkey Has a Potential in E-commerce
 
Başarılı Hoşgeldin E-postaları İçin 12 Tavsiye
Başarılı Hoşgeldin E-postaları İçin 12 TavsiyeBaşarılı Hoşgeldin E-postaları İçin 12 Tavsiye
Başarılı Hoşgeldin E-postaları İçin 12 Tavsiye
 
Başarılı Sevgililer Günü E-Posta Kampanyaları için 15 Tavsiye
Başarılı Sevgililer Günü E-Posta Kampanyaları için 15 TavsiyeBaşarılı Sevgililer Günü E-Posta Kampanyaları için 15 Tavsiye
Başarılı Sevgililer Günü E-Posta Kampanyaları için 15 Tavsiye
 
Sektörden Haberler Emarsys Mayıs 2014
Sektörden Haberler Emarsys Mayıs 2014Sektörden Haberler Emarsys Mayıs 2014
Sektörden Haberler Emarsys Mayıs 2014
 
Başarılı Sizi Özledik Kampanyaları için Tavsiyeler
Başarılı Sizi Özledik Kampanyaları için TavsiyelerBaşarılı Sizi Özledik Kampanyaları için Tavsiyeler
Başarılı Sizi Özledik Kampanyaları için Tavsiyeler
 
E-posta Pazarlama Hakkında Bilinmesi Gerekenler
E-posta Pazarlama Hakkında Bilinmesi GerekenlerE-posta Pazarlama Hakkında Bilinmesi Gerekenler
E-posta Pazarlama Hakkında Bilinmesi Gerekenler
 
Sektörden Haberler_Emarsys_Aralık 2013
Sektörden Haberler_Emarsys_Aralık 2013Sektörden Haberler_Emarsys_Aralık 2013
Sektörden Haberler_Emarsys_Aralık 2013
 
Jose Hernandez Resume
Jose Hernandez ResumeJose Hernandez Resume
Jose Hernandez Resume
 

Similar to Social media pp

Social media
Social mediaSocial media
Social media
Rad Integrated Media
 
Group 7 - Social Media
Group 7 - Social MediaGroup 7 - Social Media
Group 7 - Social Media
Laura Terry
 
SMPS Columbus Online Social Media Panel Presentation
SMPS Columbus Online Social Media Panel PresentationSMPS Columbus Online Social Media Panel Presentation
SMPS Columbus Online Social Media Panel Presentation
Stephanie Brown
 
From Linked In To Linked Together
From Linked In To Linked TogetherFrom Linked In To Linked Together
From Linked In To Linked Together
Brayman Construction
 
Unit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsUnit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltools
Keiko24
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
Muneendra Rasamsetty
 
From Linked In To Linked Together
From Linked In To Linked TogetherFrom Linked In To Linked Together
From Linked In To Linked Together
Brayman Construction
 
socialmediaasarecruitmenttool
socialmediaasarecruitmenttoolsocialmediaasarecruitmenttool
socialmediaasarecruitmenttool
Archana Mathapati
 
Holy Crap! You Can Get Fired For Social Media Posts?
Holy Crap! You Can Get Fired For Social Media Posts?Holy Crap! You Can Get Fired For Social Media Posts?
Holy Crap! You Can Get Fired For Social Media Posts?
Eric T. Tung
 
Social Media for HR
Social Media for HRSocial Media for HR
Social Media for HR
Pam Ross Consulting
 
Social networking
Social networkingSocial networking
Social networking
akshay kumar
 
Keynote: The Future of Sales is Social
Keynote: The Future of Sales is SocialKeynote: The Future of Sales is Social
Keynote: The Future of Sales is Social
Ross Dawson
 
Social media
Social mediaSocial media
Social media
Ramki M
 
Social Media and Small Business
Social Media and Small BusinessSocial Media and Small Business
Social Media and Small Business
StrategyWorks
 
Social media personal learning
Social media personal learningSocial media personal learning
Social media personal learning
AdamBarton92
 
01.Key trends in social media
01.Key trends in social media01.Key trends in social media
01.Key trends in social media
Julian Matthews
 
The New Model of Interaction in Social Networks
The New Model of Interaction in Social NetworksThe New Model of Interaction in Social Networks
The New Model of Interaction in Social Networks
Sharlyn Lauby
 
socialmedia (1)
socialmedia (1)socialmedia (1)
socialmedia (1)
Alexis Green
 
socialmedia
socialmediasocialmedia
socialmedia
Rosemary Garcia
 
Social Media For HR
Social Media For HRSocial Media For HR
Social Media For HR
Digital Consultant
 

Similar to Social media pp (20)

Social media
Social mediaSocial media
Social media
 
Group 7 - Social Media
Group 7 - Social MediaGroup 7 - Social Media
Group 7 - Social Media
 
SMPS Columbus Online Social Media Panel Presentation
SMPS Columbus Online Social Media Panel PresentationSMPS Columbus Online Social Media Panel Presentation
SMPS Columbus Online Social Media Panel Presentation
 
From Linked In To Linked Together
From Linked In To Linked TogetherFrom Linked In To Linked Together
From Linked In To Linked Together
 
Unit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsUnit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltools
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
From Linked In To Linked Together
From Linked In To Linked TogetherFrom Linked In To Linked Together
From Linked In To Linked Together
 
socialmediaasarecruitmenttool
socialmediaasarecruitmenttoolsocialmediaasarecruitmenttool
socialmediaasarecruitmenttool
 
Holy Crap! You Can Get Fired For Social Media Posts?
Holy Crap! You Can Get Fired For Social Media Posts?Holy Crap! You Can Get Fired For Social Media Posts?
Holy Crap! You Can Get Fired For Social Media Posts?
 
Social Media for HR
Social Media for HRSocial Media for HR
Social Media for HR
 
Social networking
Social networkingSocial networking
Social networking
 
Keynote: The Future of Sales is Social
Keynote: The Future of Sales is SocialKeynote: The Future of Sales is Social
Keynote: The Future of Sales is Social
 
Social media
Social mediaSocial media
Social media
 
Social Media and Small Business
Social Media and Small BusinessSocial Media and Small Business
Social Media and Small Business
 
Social media personal learning
Social media personal learningSocial media personal learning
Social media personal learning
 
01.Key trends in social media
01.Key trends in social media01.Key trends in social media
01.Key trends in social media
 
The New Model of Interaction in Social Networks
The New Model of Interaction in Social NetworksThe New Model of Interaction in Social Networks
The New Model of Interaction in Social Networks
 
socialmedia (1)
socialmedia (1)socialmedia (1)
socialmedia (1)
 
socialmedia
socialmediasocialmedia
socialmedia
 
Social Media For HR
Social Media For HRSocial Media For HR
Social Media For HR
 

Recently uploaded

System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

Social media pp

  • 2. Social Media is an interactive, constantly changing medium, unlike a regular website, which generally provides static information, social networking tools facilitate communication.  There are 4 main sources of Social Media:  Facebook  Blogs  LinkedIn  Twitter
  • 3. Profiles  Photos  Personal Information  Other Media ( music, articles, books, etc.)  Able to be searched and viewed by literally ANYONE  Communications  Direct comments  Instant messaging  Email
  • 4. Facebook is King of the social media empire  Launched in 2004, had reached 100 million users by August of 2008  From 2008 to 2010 Facebook grew from 100 million users to 500 million!  Facebook is second only to Google in terms of internet traffic among websites  Over 700 BILLION minutes per month are spent on Facebook by people from all across the globe Miles, 2011
  • 5. There are more than 161 million blogs on the internet  More than 68,000 of those were created in the 24 hours preceding that study  Blog topics are varied and only limited by human imagination  Bloggers can be anyone with access to the internet, even YOU! Miles, 2011
  • 6. The “Professional” social networking site  Focused on the user’s professional life  Launched in 2003, LinkedIn reached the 100 million member mark in 2011  It is now growing at a rate of one million new users per week, which is faster than one user every second Miles, 2011
  • 7. A “real time information network that connects you to the latest information about what you find interesting”  From 2006 to 2011 it has gained over 200 million users  Over half of all U.S. users are between the ages of 18 and 34  Ability to run real time searches Miles, 2011
  • 8. The face of social media has changed tremendously in the last 10 years.  A “here today, gone tomorrow” industry  Myspace ▪ Launched in 2004, it grew to over 67 million users by 2008 and was the number 1 social media site on the net ▪ When Facebook launched Myspace began slowly losing popularity and dropped from the number 1 site on the net to the 75th most popular today  Facebook ▪ The current “King” but faces struggles ahead with new sites coming out almost monthly  Twitter ▪ Still fairly “new” and developing a reputation  Google+ ▪ The newest of the large scale social media sites ▪ Grew to 25 million members in just one month, it took Facebook 35 months to reach that benchmark (Web Sigmas, 2011) Miles, 2011
  • 9. The chart below shows reasons why applicants were  95% of employers are denied jobs base on their social media profiles (Madrigal, 2011) using social media to screen potential employees  Guidance on laws and regulations of social media are still developing  There are few clear rules on what is appropriate and what is not Schwartz, 2011
  • 10. Male hiring mangers were more often found to screen candidates using the internet  Searching for information about the candidates lifestyle, inappropriate comments left, unsuitable photos/videos, etc.  The chart to the right   Breaks down the different searches that hiring managers perform Einhorn, 2010
  • 11. 55% of employees admit to visiting social networking sites during work hours  87% said they had no clear business reason for using Facebook  74% of managers surveyed believe social networking sites put the firms and their brands at risk  Employee productivity drops 1.5% at companies that allow full access to Facebook Kawaski, 2009
  • 12. Work Use vs. Non-Work Use  Is social media being used to market your business?  Mobile Access ▪ Mobile users spend 1.4 times as many hours using social networking sites than reading and responding to email, averaging out at 3.1 hour per week on social networks  Social Media Is Not Private  Even when your off the clock your employer still is involved  Your personal image is always compared back to the company at which you work ▪ Set good examples  Photo’s and Video’s  Photo’s can help advertise the business’s accomplishments or events  Important to inform employees of the possibility their photo appears on the website ahead of time  Harassment  Employers must protect themselves by monitoring what is being said on social media sites between employees  Many employers take initiative by blocking social media sites completely Hyman,2011
  • 13. Harassment  Employers must protect themselves by monitoring what is being said on social media sites between employees  Many employers take initiative by blocking social media sites completely  Corporate Image  Goes back on the ideals that you portray the company that you work for  Discrimination  Employers must adopt a social media policy to avoid discrimination, whether it be intentional or not  Often times possible employees are searched online through social media sites before ever even being contacted by employers ▪ This often gives employers preset images of the candidate, often times hurting opportunities to be hired Hyman, 2011
  • 14. Confidentiality  Social media in certain instances can put your companies trade secrets or other confidential information at risk  ‘Friending’ Co-Workers  Has more to do with corporate culture, than what is legal or illegal ▪ Is it acceptable to friend your boss?  Accountability  Any social media policy must emphasize that employees are accountable for their social media activities, both inside and outside of work
  • 15. Hiring: Five points to consider 1. Consistency Make all recruitment decisions based on consistent selection criteria. Create a list of allowable social media websites that human resources may utilize for lawful information about the applicant (for example,LinkedIn). 2. Consent Seek the applicant's consent to use designated lawful information obtained from the applicant's social media sites. 3. Neutrality The social media search should be conducted by a neutral third party or by someone in the company that has no influence over the hiring of the applicant. They can help the employer sieve out unnecessary or excessive information. 4. 'Friend'ship No 'Friend'ship! Employers should not be'friend' an applicant just so that it can get into an applicant's 'page'. 5. Reasoning When a decision has been made to not hire an applicant, make sure this decision is a supported, standalone decision independent from anything researched on the applicant through the use of social media. Tam, 2011
  • 16. My intern, Uriah Hansen, while applying for a position at a local company was later informed after his hiring that it wasn’t just his experience or personality that got his job, but what was also on his Facebook profile, or lack there of  After reviewing resumes and conducting interviews with multiple applicants his hiring manager had it narrowed down between Uriah and one other candidate, each equally qualified and experienced  Social media was the separator. When profiles were compared Uriah’s was modest and kept under key while the opposing candidate had multiple pictures of drinking and inappropriate behavior which ended up being the deciding factor in offering the job to Uriah
  • 17. Comedian and voice of the Aflac duck, Gilbert Godfrey was fired in March after Tweeting inappropriate comments about the Tsunami in Japan.  I just split up with my girlfriend, but like the Japanese say, “They’ll be another one floating by any minute now.”  Japan is really advanced. They don’t go to the beach. The beach comes to them.
  • 18.  Prevent loss of productivity  Permit effective monitoring (compliance with laws)  Protect the reputation and image of your company  Protect against loss of confidential information and trade secrets  Guard against suits for invasion of privacy, defamation, improper recruiting and improper discipline and termination  Protection against discrimination, harassment and cyber-bullying
  • 19. Must be clear and specific to your organization  Focus on what can and cannot be done (the do’s and don’ts)  Must be consistent to other organizational policies  Anti-discrimination  Anti-harassment  Computer, Internet, and Email Systems  Employee Privacy  Confidentiality  References Fagan, 2010
  • 20. Monitoring  Give Notice  Difference between on and off duty?  No obligation to monitor, but may want to in order to address ▪ Loss of confidential info. ▪ Cyber-bullying, stalking ▪ Harassment and discrimination ▪ Prevent defamation and improper recruiting acts Fagan, 2010
  • 21. Include mandatory training regarding social media  Assign a compliance officer or responsible person to create a compliance framework tailored to your company  Create a reporting procedure and protocal Fagan, 2010
  • 22. Make clear that employees may NOT:  Use the organization’s name in the online identity (username, handle, or screen name)  Claim or imply they are speaking as a organizational representative  Use the companies intellectual property, logos, trademarks, or copyrights  Identify a client or co-worker in an online post Fagan, 2010
  • 23.  The First Amendment does NOT protect an employee from being monitored, disciplined or terminated for violating a clear and reasonable social media policy  Employees have NO absolute Constitutional right to privacy in the workplace (4th Amendment on searches and seizures does not apply)  But you need a clear and reasonable policy that sets out expectations and restrictions on usage Fagan, 2010
  • 24. Policy should reduce any expectation of privacy on the organization’s computers, email systems, blackberry, telephone/voicemail systems and any of the data on these systems by:  Making sure employees know that certain information exchanged on social networking sites can be monitored and accessed by the organization  Expressly stating: no expectation of privacy, even with personal use and when telecommuting  Reserving right to remove content without notice  Reminding employees about privacy settings Fagan, 2010
  • 25. Make sure your policy adheres to the following laws:  Electronic Communications Privacy Act (Wiretap – consent and business exceptions)  Stored Communications Act (improper access of electronically stored information)  Federal Trade Commission Guidelines (false advertising and misleading sales pitches)  NLRA (section 7 rights of employees for concerted activity) Fagan, 2010
  • 26. Policy should prohibit employees from disclosing:  Clients, customers, partners, or suppliers by name  Organization’s confidential information and trade secrets  Information regarding organization’s clients, affiliates, partnerships  Policy should fit in with any restrictive language in employment agreements or handbook Fagan, 2010
  • 27. Some of the biggest issues that arise out of lack of policy are Harassment and Discrimination, your policy needs to emphasize that employees may not:  Post offensive or insulting material regarding the company, its employees, vendors, suppliers, competitors, etc.  Post information that could be construed as discriminatory or harassment based on race, age, sexuality, gender, disability, or any other protected characteristic
  • 28. Here is an example of IBM’s current social media policy 1) Know and follow IBM's Business Conduct Guidelines 2) IBMers are personally responsible for the content they publish on-line, whether in a blog, social computing site or any other form of user-generated media. Be mindful that what you publish will be public for a long time—protect your privacy and take care to understand a site's terms of service. 3) Identify yourself—name and, when relevant, role at IBM—when you discuss IBM or IBM-related matters, such as IBM products or services. You must make it clear that you are speaking for yourself and not on behalf of IBM. 4) If you publish content online relevant to IBM in your personal capacity use a disclaimer such as this: "The postings on this site are my own and don't necessarily represent IBM's positions, strategies or opinions.“ 5) Respect copyright, fair use and financial disclosure laws. IBM, 2010
  • 29. 5) Don't provide IBM's or another's confidential or other proprietary information and never discuss IBM business performance or other sensitive matters publicly 6) Don't cite or reference clients, partners or suppliers without their approval. When you do make a reference, link back to the source. Don't publish anything that might allow inferences to be drawn which could embarrass or damage a client 7) Respect your audience. Don't use ethnic slurs, personal insults, obscenity, or engage in any conduct that would not be acceptable in IBM's workplace. You should also show proper consideration for others' privacy and for topics that may be considered objectionable or inflammatory—such as politics and religion 8) Be aware of your association with IBM in online social networks. If you identify yourself as an IBMer, ensure your profile and related content is consistent with how you wish to present yourself with colleagues and clients 9) Don't pick fights, be the first to correct your own mistakes 10) Try to add value. Provide worthwhile information and perspective. IBM's brand is best represented by its people and what you publish may reflect on IBM's brand 11) Don't use use IBM logos or trademarks unless approved to do so IBM, 2010
  • 30. Amira-Jabbar v. Travel Services, Inc.  Inappropriate comments were posted on a picture from a corporate event during work hours, from work equipment  The court ruled that the employer was not at fault for the incident, but as a precautionary measure Travel Services blocked Facebook and revamped their Social Media policy to reflect the situation DiBianca, 2011
  • 31. Doe v. XYC Corporation  Management had discovered an employee was accessing pornographic websites on company equipment  No steps were taken to ensure the employee halted his behavior  Employee was later arrested and charged with child pornography, some of which he transmitted and submitted from his work computer  Doe’s wife sued XYC for failure to monitor her husbands activity and prevent him from exploiting her daughter  XYC company was found liable in the suit because they had no expectation of privacy in Doe’s internet usage on the company computer  Court found that XYC had a duty to act to prevent further harm to innocent third parties DiBianca, 2011
  • 32. Be wary when posting recommendations or references for an employee or subordinate on sites such as LinkedIn  These references could later be used against you in a wrongful termination suit
  • 33. Social media is around to stay!  Proper precautions need to be made to protect your companies reputation as well as financials  Don’t put your blinders on, stay on your toes regarding social media and the constant changes  The most important step in protecting your company is a SOCIAL MEDIA POLICY