This document discusses risks associated with social media use for organizations. It outlines both personal risks for employees from using social media as well as risks to organizations from employee social media use. The document provides examples of social media mishaps by companies. It emphasizes the importance of reputation management on social media and discusses strategies for organizations to manage social media risks, including developing policies, training employees, monitoring content, and being engaged on social media.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
This presentation about the Social Media and Prominent Types of Social media and also about the mobile social media includes using phone or mobile to connect with the social media.
Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
The Power Point Presentation is all about the impact of Social media ON youth and teenager as well it includes all the top social media platforms with statistical data and facts.
Spyware is a kind of malware on both PCs and mobile devices that collects a broad amount of data about a person or organization without their knowledge.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
This presentation about the Social Media and Prominent Types of Social media and also about the mobile social media includes using phone or mobile to connect with the social media.
Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
The Power Point Presentation is all about the impact of Social media ON youth and teenager as well it includes all the top social media platforms with statistical data and facts.
Spyware is a kind of malware on both PCs and mobile devices that collects a broad amount of data about a person or organization without their knowledge.
How to assess Risk versus Reward in Social Media, how to mitigate risk where it is present and how to determine what level of control your organisation wants over its messaging in Social Media.
Risk Mitigation in Social Media MarketingBernie Borges
Common risk factors in social media marketing and how to minimize them, presented by Bernie Borges of Find and Convert at the Internet & Technology Summit, June 22, 2010, Orlando, FL.
Leaders have a strong core of content marketing/education
Cautious experimentation by provider organizations
The Rise of e-Patients
Social Media’s role in patient engagement
Mobile devices impact
Where to we go from here?
Demys&fying
Cloud
Security
J o u r n e y
f r o m
P r o j e c t
t o
P a t e n t
t o
P u b l i c
C o n s u m p & o n
Platform as a Service
Software as a Service Database as a Service Load Balancing as a Service
Monitoring as a Service
Central Access Control as a Service
Infrastructure as a Service
Notification as a Service
Validation as a Service
Health Information Exchange as a Service
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
Social Media and Electronic Communication--Classroom EditionBovee and Thill
Students can learn about social media and electronic communication in this presentation. Be sure to download the accompanying script at http://www.slideshare.net/Bovee/script-for-teaching-social-media-and-electronic-communicationclassroom-edition.
http://www.scoop.it/t/business-communication-2-0-social-media-and-electronic-communication/p/952303710/teaching-social-media-and-electronic-communication-instructor-edition-by-bovee-thill
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Raul Colon
One wrong move can land you or your company into an unknown abyss. The lack of guidance from Social Media and non-existent controls can cost companies hundreds of thousands or even millions. The hidden risks of not understanding the many channels of Social Media are immeasurable. With a better understanding and some guidance on Social Media Patterns yourself and your company are going to be able to mitigate the arising risks.
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
This presentation gives the legal and business framework for corporations looking to build trust online with their customers. Through partnering with a law firm to craft a custom social media policy, deploy it to staff, and maintain continuous monitoring and litigation support, businesses can more effectively enter the social media space with confidence.
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxRAHUL126667
By Sandeep Rotte(545081).
Praveen Komma( 544549).
Management Information Systems
Sunny Onyiri
Social Media And Networking
Group D
Social Media
Social Networks are the websites which allow users to upload their contents such as Blogs, texts, pictures, videos and location etc to the web. The main advantage of social media is we can ignore the traffic to the content viewing.
It is considered as one to many communication methods as people can only repsond and comment on the content which we own and later we decide to write/record/delete the response or media by ourself.
Social Media in Real Time
In todays technical world it is easy to communicate from different locations using social networking sites such as facebook, Flickr, Twitter, Youtube, Instagram, Pinterest etc.
All above networking sites have gained popularity throughout the world in regards with their applications functionality and is usage.
Advantages Of Social Media
Increasing the brand awareness by implementing some digital marketings methods to raise the companies visibility and awareness of the brand performing in the marketing.
Exclude more inbound traffic : When people become aware of the brand then there will be less traffic of accessing and marketing them in users perspective patterns.
Search engine popularity and ranks can be raised by positioning the social media importance in business.
Disadvantages:
Decreases the F2F communication which is a main important task to be done when there is a need of interacting in presence.
Improves lazyness towards achieving aspects as the interaction is all online which makes individual become lazy of getting up and solving any issue.
Decreases interactions of friends, family closeness when there is only socially interacting online.
Social Networks
These are the websites which allow people to interact with each other and connect anywhere may be virtually or by sharing the content. Also helps in making friends and relations all over the globe.The most used social networking site is facebook , twitter, google etc(Ahmad & Ateeq, 2011).
Every social networking sites are raising their subscribers daily due to the fact that they are very easy to interact from anywhere in the world.
Facebook
Facebook has earned its repuation as best social networking site known to users where we can learn how to interact with friends, family etc.
It also helps us to write, read and take pics of any important stuff sent by any individual. The main advantage of using this sites is that they will make some important comments or send the documents.
This social networking site also advanced in making some good donations to charity by posting socially in the sites where people are reacting.
Advantages Of Social Networking Sites
There are many reasons why someone may choose to take advantage of social networks online.
Worldwide Connectivity: No matter if you are searching for a former college roommate, your first grade teac ...
Acceptable Use Policy: Essential components of a social media policy to manag...Kofi Kafui Kornu
Does your organisation have a social media policy? Why should you draft one if you don't?
This is a talk I gave at the 8th IT Governance Conference of ISACA, Accra Chapter.
Why Social Media Applications Can Pose a Threat to Small Businesses?
1. Negative Reviews and Feedback
2. Viral Criticism
3. Miscommunication and Misunderstanding
4. Competitor Attacks
I made this presentation for Professional And Ethical Issues In Information Systems, module that I'm studying at UWIC University, Cardiff.
I hope you like it, please, send your feedback.
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfCIOWomenMagazine
Stay safe online! Protect your privacy & info with these crucial social media cybersecurity tips. From strong passwords to 2FA & privacy settings, learn how to navigate the web securely.
Similar to Social media Risk Management Presentation Sample (Animations don't work in slideshare) (20)
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraAvirahi City Dholera
The Tata Group, a titan of Indian industry, is making waves with its advanced talks with Taiwanese chipmakers Powerchip Semiconductor Manufacturing Corporation (PSMC) and UMC Group. The goal? Establishing a cutting-edge semiconductor fabrication unit (fab) in Dholera, Gujarat. This isn’t just any project; it’s a potential game changer for India’s chipmaking aspirations and a boon for investors seeking promising residential projects in dholera sir.
Visit : https://www.avirahi.com/blog/tata-group-dials-taiwan-for-its-chipmaking-ambition-in-gujarats-dholera/
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
3. Burger King Twitter Hijack
2013
Fransesco’s CEO tweets too soon
2012
McDonalds failed Initiative
2012
Kitchen Aid’s Obama Tweet
2012
4. • Competitive advantage
• Free advertising
• Launching of initiatives/competitions
• Business model structured around social media
• Identify Trends / future direction
• Build a reputation/following
5. • Organisation’s Risk due to Employee use of Social Media
• Intellectual Property & Data leakage
• Extreme views of staff
• Virus risk
• Loss of password risk
• Personal Risk
• Identity theft
• Virus & Phishing scams
• Personal reputation
Types of Risk :
1.Personal Risk
2.Risk to Organisation due to employee use
3.Organisation’s social media presence
6. • Organisation’s social media presence
• Others posting negatively about your organisaiton
• Campaigns backfiring
• Inefficient use of Social Media
• Lack of updates
• Inconsistent/conflicting info across various Social networks
• Risk of doing nothing………
7. “Risk Management is not just about insurance”
REPUTATION CANNOT BE INSURED!
80%
of risks faced byof risks faced by
organisations areorganisations are
notnot insurable!insurable!
‘‘Chance or choice’ -Chance or choice’ -
SOLACE/ZMMSSOLACE/ZMMS
8. “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you'll do
things differently.” Warren Buffett quote
• 8
10. Objectives
Customer engagement
Reputation
Attracting talent
Sales
Governance
Opportunities and risks
Risk of not engaging
Communicate policies
Activities
Platforms
Resource requirements
Responsibilities and time
Link to offline activities
• 10
11. ENGAGEMENT
Listen
Engage
Measure
• 11
Listen
Identify relevant monitoring tools
Optimize use of tools
Understand current reputation
Identify influencers and communities
Engage
Enter Conversations
Add value
Engage with influencers
Positive responses
Measure & Refine
Set and monitor KPI’s
Success stories
Report internally
12. • 12
Learn
Use Social Media
Study Case Studies
Educate Senior Execs
Practitioners
Understand Trends
Develop
Internal Champions
Train staff
Establish Pilot
Develop Culture of
transparency
15. Develop a social-media policy and train
staff
Monitor user-generated content
Deal with customer complaints carefully
Review social-media sites’ terms of use
Monitor use of your brand and fake user
names and pages
Manage employee access to social media
Manage user access rights
16. Policy – guidelines on acceptable use.
Cover personal and organisation guidelines.
Communicate to staff.
17. Companies can be held liable for
comments made by employees. Currently
Australia but has alerted regulators and
brand owners.
Opt-in program? Join our page and you may
use your account at work.
18. Training is vital
Communication plan (Comms matrix –
Messages vs Stakeholders/Social Media
Platform)
Avoid deleting comments or negative posts.
TRIPADVISOR MANAGER COMMENTS
Avoid aggressive comments, instead bring
the conversation to another platform.
19. Monitor use of your brand and fake user
names and pages
Legal advisors
Coca Cola was originally started by two
fans on facebook
Not all social networking sites will take
down usernames
20. Promotions/Competitions – ensure users
are not setting up multiple accounts to win.
Avoid legal disputes
Monitor fake promotions (win apple ipad
etc.)
21. Total ban
Only some sites approved (can help with
your own organisational presence)
Monitor personal use
Beware the consequences
Opt-in program? Join our page and you may
use your account at work.
22. Download
Upload
Sensitive files access
Enforced virus/malware protection
Ensure passwords are in place and
updated
Perhaps introduce 2nd
question rather than
forcing users to have 7 different passwords
Change to Apple???
24. Risk Management :
Hurricane/Tsunami warning to citizens
Voice for staff to :
Raise risk management concerns in a transparent
fashion
Share opportunities with management and one
another
Google Moderator (20% projects) & Google +
25. Business Continuity :
Hurricane/Tsunami warning to citizens
Spouse management
Connecting with stakeholders during an
incident
Internal staff communication as part of BCM
Need to consider battery life, of devices,
availability of mobile and internet network etc.
Need to consider and communicate WHICH
media to use.
26. Microsoft's worked with partners to create local applications such as J!ResQ to help
people find family and friends and to aid relief efforts with aid agencies.
Business Continuity ensured ongoing network capacity and electricity in effected areas
On Windows Azure, Microsoft provided a cloud-based disaster response communications
portal to governments.
Red Cross used social media to request donations.
Earthquake in Japan benefitted greatly from Social Media both in terms of
getting up to date information from the ground as well as connecting with loved
one.
Pages were set up on Facebook in order to keep the public up to date. Other
sites were set up to put relatives in touch with visitors .
27. Install theft protection software.
Make sure never to click the box to save your password
when you are on a public, work or laptop computer.
Use your real name.
Avoid personal information on social media sites,
such as address, phone number or your birth date
Change your privacy settings.
Type in the name of the social media site, or use a bookmark, instead of
clicking on email links.
Create complicated passwords when you sign up for social media accounts.
Never give out your travel plans over social media sites.
Avoid using online applications on social media sites, or the Internet in
general, that require access to your personal or profile information.
Use extreme caution when opening links on social media sites.
Editor's Notes
1. Examples of social media disasters
2. Types of Social Media Risks
3. Opportunity of Social Media
4. Social Media Governence, framework etc.
5. Management of specific risks
5. Opportunities for Risk Management
6. Case Study
6. Personal Risk
McDonalds
Back in January, McDonald's tried to promote its brand and engage with customers through two promoted trends: #meetthefarmers and #mcdstories.Unfortunately for McDonald's, many Twitter users decided to post their horror stories at the fast food chain using the second of those hashtags. In essence, McDonald's paid to promote a trend that showered the company in bad publicity. McDonald's later admitted that "#mcdstories did not go as planned."
Kitchen Aid
When it comes to offensive tweets, KitchenAid takes the cake. After President Obama mentioned his grandmother during the first presidential debate in October, the kitchen appliance manufacturer responded by posting the following tweet to its 24,000 followers: "Obamas gma even knew it was going 2 b bad! She died 3 days b4 he became president. #nbcpolitics"
To the company's credit, it quickly removed the tweet and issued an apology, explaining that a member of the KitchenAid team had mistakenly posted it from the company account instead of from a personal handle.
Burger King
hackers who broke into the official Burger King Twitter account tweeted the company had been sold to McDonald’s. Then the tweets turned into photos of a man in a Burger King bathroom and a needle in his arm with the message: “We caught one of our employees in the bathroom doing this.”
Although led to MORE twitter followers.
We empathize with our @burgerking counterparts. Rest assured, we had nothing to do with the hacking.
— McDonald’s (@McDonalds) February 18, 2013
Fransesca
Francesca’s, a clothing retailer with stores in 44 states, started the year on the wrong foot when its CFO sent out this tweet after a confidential meeting on March 7. The problem is that Francesca’s is a publicly traded company. The CFO disclosed company info to his followers before it went public, thus sharing inside information - a violation of long-held SEC regulations. He was promptly fired.
Similar personal photos on facebook and twitter of staff doing horrible things to burgers and chickens etc.
Competitive advantage :
Lets customers know about sales
Build a following
Build a cult brand
Customer relationship
See example below (HOTEL Twitter)
Advertisement
1. Name spread across internet through social media
2. Product placement on certain sites
3. Word of mouth… “likes”, “tweets”
4.
Initiatives/Competitions
1. Reach more people for free.
2.
3.
4.
Business Model
Cult following
“Cool” brand
New and up and coming brand. Exclusive or first to know.. (Music industry uses this method extensively – Arctic monkeys became huge in UK through Social Media initiatives. Kaizers Orchestra used social media to connect fans with fans creating a Kaizers Virus… releasing new songs only upon infection of the virus… users could find other infected fans through gps and could get within 100 meters and automatically get infected themselves… which resulted in being able to download new material etc.) – David Bowie use of white square on new album cover shared on social media with people pasting the white square on pictures across the web and as their profile picture on Facebook etc.
Connect to your customers. Consultancies, artists, service providers etc. can support customers 1 on 1 and can offer free advice through social media building relationships.
CASE
_______
EXAMPLE of TWITTER at hotel.
Waiting in a line… I tweet….
Hotel next door tweets back….
Could have gone wrong… “Come to us instead… we have no lines… (WHY? And stop stalking me!)
Instead “Sorry for your hassle.. Hope you have a good holiday”
Got business next time… and from some friends of mine etc.
Password risk
If someone gets facebook account details then they can guess that it is the same as work password. Hack…
(implement question following password?)
Inefficient use
People will perceive you as being slow, waste of time, not effiecient as a company.
Ever been to an out of date website? What are your impressions? Wrong numbers, wrong maps etc.
Risks of doing nothingSo maybe you’re thinking you can avoid altogether the many risks related to social media use. Simply eliminate its use in marketing, recruiting, and other bank departments, and ban employees from using it on company time or equipment.However, failing to exploit the opportunities social media provides for building a brand, attracting new customers, and retaining current customers exposes banks to risks, too. Banning any official participation in social media ignores the positive effects of using a powerful channel appropriately to build relationships with stakeholders, customers, potential employees, and other affiliates. Banks would give up the ability to use a potent communication tool and expand the reach of their products and services in a quick and cost-effective manner.Face it: Social media channels have become part of the fabric of social interaction for an increasing segment of the population, and it’s impossible to put the social media genie back in the bottle. However, organizations that formally assess the risks of social media and implement guidelines that promote its responsible use will be better equipped to reap the benefits of these new tools.
Beautify this slide… boxes of quotes etc…
CLICK
Some may ask, doesn’t Saudi Aramco already have ERM in place?
CLICK
1. Engage a multidisciplinary team. Social media is not just an IT or marketing problem.Since social media activity affects a wide range of functions, an effective strategy brings together senior representatives from Human Resources, Legal, Information Technology, Marketing, Risk Management, Public Relations, Compliance, and any other affected functions. Assigning a project or program manager will help to track and maintain the team’s progress.Nestlé’s Facebook page, for instance, was inundated with negative comments in March 2010 following a Greenpeace campaign against the company’s use of palm oil. The company’s attempt to restrict commentary drew more unwanted attention to the issue and created a public relations disaster.
7. Monitor social media channels. Banks also need to consider how they will stay current on social media chatter that could have an impact on their objectives. Social customer relationship management (CRM) tools, composed of software products and vendor services, can help banks monitor public channels for social media chatter that could affect the organization. How an organization responds to negative comments made via social media entails significant risks of its own. Nestlé’s Facebook page, for instance, was inundated with negative comments in March 2010 following a Greenpeace campaign against the company’s use of palm oil. The company’s attempt to restrict commentary drew more unwanted attention to the issue and created a public relations disaster.
Develop a social-media policy and train staff
Most employers should be considering implementing a policy to set guidelines on acceptable use of social media. The policy should cover employee use of social media — for example, employees’ own Facebook or Twitter accounts - and use by the business.
Clearly, risks and priorities will vary from business to business, so it is important to tailor policies. Also, policies need to be able to adapt to the broad and fast-changing nature of social media, which is not just Facebook and Twitter, and can include blogs and sites such as YouTube.
Once finalised, the social-media policy should be communicated to staff. There is certainly a case for training all staff in the use of social media, but brand managers and social-media page administrators in particular need skills in dealing with users on social networks.
2. Monitor user-generated content
A recent landmark ruling by Australia’s advertising watchdog has confirmed that companies could be liable for comments made on their Facebook pages by users.
While the ruling is applicable to Australia only, it has alerted regulators and brandowners around the world to the importance of monitoring user-generated content on social-media sites, and whether they need to be doing more on this front.
Under the ruling, no differentiation was made between comments posted by the company and those made by users, leaving the company liable under advertising laws for all comments made on its page.
In the UK, the current indication is that the Advertising Standards Authority (ASA), which has had an online advertising remit since March 2011, will not be making changes to its current position. Essentially, it will only intervene on user-generated content if an advertiser takes a user post and highlights it as a testimonial.
However, the Committee of Advertising Practice (CAP) is presently conducting a two-year review of the ASA’s online remit, so it remains to be seen whether this position will ultimately change.
In the meantime, brandowners are taking a risk in having completely unmonitored social-media pages - for brand-reputation reasons, if not because of advertising law.
3. Deal with customer complaints carefully
Administrators of company’s social-media pages should be vigilant about content posted by users, but they should also be careful when interacting with them.
A number of brands use social media to interact direct with fans and users - for example, dealing with commonly-asked questions and customer complaints.
However, some companies have made situations worse by simply deleting negative posts or tweets. This practice raises potential advertising-law concerns. Others have engaged in online arguments with users on social networks, unwittingly creating bad publicity.
An aggressive reaction, however justified, to a complaint is usually best avoided. Instead, it’s better to have a measured response, informing the user what is being done to address his or her concerns.
If the issue is complex, your social-media presence may not be the best place to conduct a conversation with a disgruntled customer.
5. Monitor use of your brand and fake user names and pages
Brandowners should also be vigilant about the generic use of their brands by social-media users and should look to prevent their trademarks losing distinctiveness and therefore legal protection.
Brandowners should also keep a careful eye on infringers on social networks, in particular the use of fake pages and usernames. On the one hand, fan pages may not necessarily cause harm to a brand: Coca-Cola’s Facebook page was originally started by two fans.
But the potential for, in particular, infringement of intellectual- property rights and defamation is clear. Facebook and Twitter will take down infringing content, but at the moment, there is no equivalent process for social-media usernames to the uniform dispute- resolution policy used for domain-name disputes.
So a brandowner may need to consider court action if a social network refused to take down a fake page or username.
4. Review social-media sites’ terms of use
Before using Facebook, Twitter and other social networks, you should carefully check their terms and conditions. This measure is particularly important in the context of running promotions and competitions. Not complying with their rules risks your page being removed.
For example, you cannot use Facebook’s Like button functionality as a voting mechanism for a promotion, nor can you notify winners through Facebook, such as through messages, chat or posts on profiles.
You must acknowledge that the promotion is in no way associated with Facebook. With Twitter promotions, a key rule is that you must discourage users from creating multiple accounts - to dissuade them from entering a contest more than once.
5. Monitor use of your brand and fake user names and pages
Brandowners should also be vigilant about the generic use of their brands by social-media users and should look to prevent their trademarks losing distinctiveness and therefore legal protection.
Brandowners should also keep a careful eye on infringers on social networks, in particular the use of fake pages and usernames. On the one hand, fan pages may not necessarily cause harm to a brand: Coca-Cola’s Facebook page was originally started by two fans.
But the potential for, in particular, infringement of intellectual- property rights and defamation is clear. Facebook and Twitter will take down infringing content, but at the moment, there is no equivalent process for social-media usernames to the uniform dispute- resolution policy used for domain-name disputes.
So a brandowner may need to consider court action if a social network refused to take down a fake page or username.
5. Monitor use of your brand and fake user names and pages
Brandowners should also be vigilant about the generic use of their brands by social-media users and should look to prevent their trademarks losing distinctiveness and therefore legal protection.
Brandowners should also keep a careful eye on infringers on social networks, in particular the use of fake pages and usernames. On the one hand, fan pages may not necessarily cause harm to a brand: Coca-Cola’s Facebook page was originally started by two fans.
But the potential for, in particular, infringement of intellectual- property rights and defamation is clear. Facebook and Twitter will take down infringing content, but at the moment, there is no equivalent process for social-media usernames to the uniform dispute- resolution policy used for domain-name disputes.
So a brandowner may need to consider court action if a social network refused to take down a fake page or username.
CLICK
Some may ask, doesn’t Saudi Aramco already have ERM in place?
CLICK
http://www.bizjournals.com/houston/blog/socialmadness/2013/04/social-media-has-an-emerging-role-in.html?page=all
Voice for staff to Raise Risks : (BP incident indicated that risks were raised but not considered)
Share Opportunities :
Google Moderator, an innovation management tool designed by Google’s engineers. The simple idea behind it is that when people have tech talks or company-wide meetings, it lets anyone ask a question and then people can vote up the questions that they’d like answered. Through Moderator, people can discover existing ideas, questions or suggestions, vote for ideas, questions or suggestions and see the aggregate votes to date, create a new series asking for ideas organized by topic, event or meeting. Google Moderator itself is one of Google’s infamous “20 percent” projects. By allowing its engineers to spend 20% of their work week on projects that interest them, Google is able to tap into the many talents of its employees
Google+ conversations.
TGIF: Google’s weekly all-hands meetings, where employees ask questions directly to the company’s top leaders and other execs about any number of company issues.
Google Universal Ticketing Systems, or ‘GUTS’, which is a way to file issues about anything, and is then reviewed for patterns or problems.
‘FixIts’, 24-hour sprints where Googlers drop everything and focus 100 percent of their energy on solving a specific problem;
Internal innovation reviews, which are formal meetings where executives present product ideas through their divisions to the top executives;