The document provides guidance for Coast Guard personnel on the responsible use of social media both personally and professionally. It outlines principles for official Coast Guard social media use, including only posting approved information, building an engaged community, and ensuring accessibility. It also provides guidance for personal social media use, stressing the need to follow all laws and policies, practice restraint, and realize that nothing posted is truly private or anonymous. A decision tree is included to help determine if a photo or video can be posted online.
U.S. Navy Command Leadership Social Media HandbookDouglas Burdett
This document provides guidelines for Navy commands regarding the use of social media. It discusses defining social media and relevant DoD and Navy policies. It provides guidance on communicating expectations to sailors regarding safe social media use and avoiding OPSEC violations. It also offers tips for commands regarding setting communication objectives, content strategies, and selecting and managing social media platforms. The overall aim is to help commands incorporate social media effectively while maintaining standards of conduct.
This document provides guidance for the U.S. Army's use of social media. It outlines the Department of Defense's policies on social media and explains that the Army uses social media to communicate its messages and stories to the public. The document provides instructions for Army organizations on establishing an official social media presence, including developing a strategy, researching existing Army social media, setting up accounts according to guidelines, and registering sites on the Army's social media directory. It also covers best practices for using social media and maintaining online safety.
This document provides guidance on using social media for the Air Force. It includes tips for leaders, Airmen, families and an introduction to common social media platforms and trends. Leaders are encouraged to use social media to connect with audiences and share stories. Airmen should represent core values and be cautious of sensitive information. Families can use social media to support Airmen but should avoid oversharing details. The document also covers hashtags, geotagging and telling the Air Force story on social media.
The document outlines the Marine Corps' social media principles and guidance for Marines' personal and official use of social media. It emphasizes adhering to core values of honor, courage, and commitment online. Marines are encouraged to participate respectfully in social media discussions as representatives of the Corps. The guidance provides tips on privacy, ethics, and maintaining operations security. It aims to empower Marines to engage constructively while avoiding security risks.
Social media is becoming widely used by Family Readiness Groups to connect Army families by sharing information on events, activities and photos. However, operations security must be maintained by avoiding posting sensitive military details or personally identifiable information online. Family Readiness Groups should train members on appropriate social media use and follow Army guidance for official online presences.
Social networking services allow users to connect with others and share content online. They have become very popular, with 73% of online adults using at least one social networking site. While useful for socializing and business purposes, social networking sites also present some risks if personal information is misused or employees waste time online. Researchers have found that students can benefit educationally from social networking by improving technology skills, creativity, communication, and openness to diverse views.
U.S. Navy Command Leadership Social Media HandbookDouglas Burdett
This document provides guidelines for Navy commands regarding the use of social media. It discusses defining social media and relevant DoD and Navy policies. It provides guidance on communicating expectations to sailors regarding safe social media use and avoiding OPSEC violations. It also offers tips for commands regarding setting communication objectives, content strategies, and selecting and managing social media platforms. The overall aim is to help commands incorporate social media effectively while maintaining standards of conduct.
This document provides guidance for the U.S. Army's use of social media. It outlines the Department of Defense's policies on social media and explains that the Army uses social media to communicate its messages and stories to the public. The document provides instructions for Army organizations on establishing an official social media presence, including developing a strategy, researching existing Army social media, setting up accounts according to guidelines, and registering sites on the Army's social media directory. It also covers best practices for using social media and maintaining online safety.
This document provides guidance on using social media for the Air Force. It includes tips for leaders, Airmen, families and an introduction to common social media platforms and trends. Leaders are encouraged to use social media to connect with audiences and share stories. Airmen should represent core values and be cautious of sensitive information. Families can use social media to support Airmen but should avoid oversharing details. The document also covers hashtags, geotagging and telling the Air Force story on social media.
The document outlines the Marine Corps' social media principles and guidance for Marines' personal and official use of social media. It emphasizes adhering to core values of honor, courage, and commitment online. Marines are encouraged to participate respectfully in social media discussions as representatives of the Corps. The guidance provides tips on privacy, ethics, and maintaining operations security. It aims to empower Marines to engage constructively while avoiding security risks.
Social media is becoming widely used by Family Readiness Groups to connect Army families by sharing information on events, activities and photos. However, operations security must be maintained by avoiding posting sensitive military details or personally identifiable information online. Family Readiness Groups should train members on appropriate social media use and follow Army guidance for official online presences.
Social networking services allow users to connect with others and share content online. They have become very popular, with 73% of online adults using at least one social networking site. While useful for socializing and business purposes, social networking sites also present some risks if personal information is misused or employees waste time online. Researchers have found that students can benefit educationally from social networking by improving technology skills, creativity, communication, and openness to diverse views.
The document provides best practices for using social media platforms like Facebook, blogs, and Twitter for Army public affairs and engagement. It outlines guidelines for setting up official profiles and pages, including using .mil domains when possible and maintaining OPSEC. The document advises having a strategic plan, committing resources to maintain a presence, and being willing to engage with audiences. It also provides examples of effective military leaders' social media pages.
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
Social Media and Law Enforcement - Opportunities and Challenges is a presentation by Central Bureau of Investigation. It explains the concepts and dynamics of social media in dealing with crimes. It give a broad overview of the possible scenarios with real life examples from across the world.
This document provides an overview of social networking including its history and evolution over time. It discusses early social networking platforms from the 1970s through the 1990s like CompuServe, AOL, Classmates, and Friendster. Popular current sites like Facebook, Twitter, and LinkedIn are also examined. Both the pros and cons of social networking are outlined related to privacy, identity theft, and viruses. Statistics on social networking usage in Canada are presented. The conclusion reiterates that social networking has changed culture and brought people together globally online.
Social networking has evolved significantly from early platforms like CompuServe and AOL to today's major sites like Facebook, Twitter, and LinkedIn. The presentation traces the history and growth of social networking, highlighting both benefits like staying connected with others and risks involving privacy and identity theft. It also lists popular current social media sites and discusses issues of protecting personal information online through privacy settings.
This document discusses Twitter and provides guidance on using Twitter to promote blogs. It covers topics like how to use hashtags and mentions to engage others on Twitter, how to find relevant people to follow, how to create lists, and when the best times are to post on Twitter. Metrics and analytics tools for Twitter like TweetStats and Topsy are also mentioned. Instructions are provided for installing Twitter plugins on blogs to integrate Twitter posts with the blog.
A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content.
Using Twitter And Social Networking As A Toolmfaulkner
Michael Faulkner presents on using Twitter for situational awareness and public information during emergencies. Twitter allows real-time information sharing from any location. It was useful during disasters like wildfires and protests by providing firsthand updates. However, content is mostly casual conversations and promotions. Physical infrastructure is required and content cannot be regulated. Government use requires clear social media policies regarding appropriate content. Twitter provides a way to disseminate brief, urgent messages to a broad audience but has limitations and drawbacks to consider for emergency situations.
When it comes to writing social media policy, you just can't say no. View this presentation on the 4 areas that must be covered when writing an effective policy. Also covered is the 7 things every policy needs and the 3 steps to get started.
This document provides information and guidance about safe and responsible use of social media for military personnel. It discusses Department of Defense social media policies, how to represent the military professionally online, and risks like identity theft and security breaches. Specific tips are given around privacy settings, avoiding sharing sensitive personal details or locations. Resources and contacts are provided to help military members learn about social media best practices.
The document outlines the social media policy for employees of the Office of Information Technology at a university. It provides guidelines for using social media accounts and representing the university in an authentic, transparent, and safe manner. The policy aims to protect privacy, confidential information, copyrights, and stakeholders while promoting the university brand. It also states that violations of the policy will be subject to disciplinary action or legal consequences.
Risks and opportunities for using social media for government transparencyStan Skrabut, Ed.D.
This presentation reviews guidelines that government agencies should follow to ensure laws and regulations are met while providing a communication outlet for citizens.
These guidelines are intended as an introductory guide to highlight core principles that must be considered when developing a communications strategy and campaigns including social media in the United Kingdom. For international activity, members are advised to review the guidelines and legal considerations of their respective countries.
The CIPR social media advisory (CIPRSM) panel would like to thank all those who contributed to updating these guidelines.
This document provides an introduction and guidelines for using social media for public relations purposes. It begins with definitions of social media and an overview of the CIPR Code of Conduct. It then lists dos and don'ts for social media engagement, emphasizing listening, understanding audiences, planning strategies, engaging in conversations consistently across platforms, being transparent, correcting errors, and considering legal and ethical issues. The document aims to help PR professionals navigate social media challenges in a rapidly changing environment.
This document provides Cisco's social media policy, guidelines, and FAQs for employees. The policy outlines 8 rules that must be followed, such as identifying yourself as a Cisco employee, not disclosing proprietary information, and not engaging with media without approval. The guidelines provide 12 best practices for social media use, including being respectful, adding value to conversations, and knowing content is hard to remove. The document answers frequently asked questions on topics like using social media for work, personal use guidelines, responding to comments, and using photos/videos.
Social media provides opportunities and ethics concerns for legal professionals. It allows attorneys to network, gain knowledge, and market their practice, but they must be careful not to form attorney-client relationships online or reveal confidential information. Attorneys should control their online presence by developing consistent profiles and monitoring what clients and the public see. They also need policies for firm employees' social media use and should educate clients and staff on related risks.
This document provides basic social computing guidelines for service members and government staff to consider when using social networks and blogs. It outlines 7 key considerations: 1) individuals maintain their right to free speech but must represent their organization appropriately; 2) be aware of all information security, operations security, and IT policies; 3) identify your affiliation and include a disclaimer for official comments; 4) only comment on topics you are knowledgeable about; 5) do not discuss any information that could compromise operations security; 6) only post information you would feel comfortable sharing with your family; and 7) be cognizant of how your personal social media represents your organization.
Description: In this article, we provide you with ten invaluable tips to ensure your safety and protect your personal information while engaging on social media platforms. Discover how to secure your privacy settings, avoid suspicious links and phishing attacks, think before you click or comment, exercise caution when accepting friend requests, be mindful of what you share, regularly review and clean up your friend list, educate yourself about privacy controls and features, use strong and unique passwords, stay updated with platform policies, and enable two-factor authentication. By implementing these tips, you can enjoy the benefits of social media while maintaining control over your privacy and security. Safeguard your online presence and explore the world of virtual entertainment with confidence.
This document provides guidelines for employees using social media. It defines social media as websites that allow sharing information and building communities. The guidelines explain that as representatives of an organization, employees should be professional, responsible, credible, and responsive online. Employees are personally responsible for anything they post and should make clear they are speaking for themselves, not the organization, unless authorized. Failure to comply with the guidelines could result in disciplinary action.
This social media policy for Friends for Youth employees outlines guidelines for using social media including:
- Employees are allowed to publish on social media as long as they identify themselves and do not disclose confidential information.
- Employees must be honest, respectful, and avoid copyright infringement when publishing content.
- Employees should avoid disparaging Friends for Youth, customers, or partners on social media.
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docxrosemariebrayshaw
Social Media in a Law Enforcement Workplace
Clarissa N. Iverson
Strayer University
Professional Communications
Agenda
How to market the police?
How to use social media to prevent and solve crime.
Social media policy for civilian employees and sworn officers.
How to Market the Police?
Law enforcement agencies now must utilize social media in many ways, such as recruiting and overall communication with the community.
Social media reaches a wide range of community. As far as it being useful for recruiting employees outside their local target market.
Showing the basic police academy process and the steps individuals need to take to apply and what to except is a great way many agencies have used social media to attract followers and potential employees.
Additionally, social media has been a great way to connect law enforcement with the community. Last year, many were engaged with the “Lip Sync Challenge” that agencies across the country participated in on social media.
Solving Crime
Using Social Media to Solve and Prevent Crime.
Social Media leaves a “digital fingerprint”
Many criminals will post themselves engaging in criminal activity.
Many criminals do not know if a social media friend or follower grants them access to their account to view the criminal activity it does no violate privacy.
Surveys have indicated 1,221 federal, state and local law enforcement who use social media, 4 of 5 use social media to gather intelligence.
Iverson, Clarissa (IC) - Business: https://www.cnn.com/2012/08/30/tech/social-media/fighting-crime-social-media/index.html
Catching Up With Modern Technology
Law enforcement and the judicial system have not caught up with current technology.
Police having a hard time regulating criminal activity because now criminals use social media and the Internet to expand their traditional reach.
Gangs use the Internet to work in conjunction with each other and to work together.
Social Media Policy
Establishing policy for individuals working in law enforcement.
Law enforcement agencies must be careful how they post on official social media accounts
Officers personal social media accounts can reflect badly on a department.
Officers have been in the news for posting inappropriate videos or racist joke, while on duty.
Agencies should adopt a social media policy and have them written in their directives.
The purpose of the policy should have a purpose and determine what it needs to cover.
The social media policy should be clearly defined to avoid confusion.
The policy need to establish what is acceptable and what is unacceptable uses of official and personal social media.
Iverson, Clarissa (IC) - Law Enforcement Social Media Policy. (2019, March 13). Retrieved from PowerDMS.
Additional Information
Police Officer Tommy Norman has used social media to bridge the gap between the community and law enforcement. His Instagram page has over 1 million followers and he now has people around the wo.
The document provides best practices for using social media platforms like Facebook, blogs, and Twitter for Army public affairs and engagement. It outlines guidelines for setting up official profiles and pages, including using .mil domains when possible and maintaining OPSEC. The document advises having a strategic plan, committing resources to maintain a presence, and being willing to engage with audiences. It also provides examples of effective military leaders' social media pages.
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
Social Media and Law Enforcement - Opportunities and Challenges is a presentation by Central Bureau of Investigation. It explains the concepts and dynamics of social media in dealing with crimes. It give a broad overview of the possible scenarios with real life examples from across the world.
This document provides an overview of social networking including its history and evolution over time. It discusses early social networking platforms from the 1970s through the 1990s like CompuServe, AOL, Classmates, and Friendster. Popular current sites like Facebook, Twitter, and LinkedIn are also examined. Both the pros and cons of social networking are outlined related to privacy, identity theft, and viruses. Statistics on social networking usage in Canada are presented. The conclusion reiterates that social networking has changed culture and brought people together globally online.
Social networking has evolved significantly from early platforms like CompuServe and AOL to today's major sites like Facebook, Twitter, and LinkedIn. The presentation traces the history and growth of social networking, highlighting both benefits like staying connected with others and risks involving privacy and identity theft. It also lists popular current social media sites and discusses issues of protecting personal information online through privacy settings.
This document discusses Twitter and provides guidance on using Twitter to promote blogs. It covers topics like how to use hashtags and mentions to engage others on Twitter, how to find relevant people to follow, how to create lists, and when the best times are to post on Twitter. Metrics and analytics tools for Twitter like TweetStats and Topsy are also mentioned. Instructions are provided for installing Twitter plugins on blogs to integrate Twitter posts with the blog.
A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content.
Using Twitter And Social Networking As A Toolmfaulkner
Michael Faulkner presents on using Twitter for situational awareness and public information during emergencies. Twitter allows real-time information sharing from any location. It was useful during disasters like wildfires and protests by providing firsthand updates. However, content is mostly casual conversations and promotions. Physical infrastructure is required and content cannot be regulated. Government use requires clear social media policies regarding appropriate content. Twitter provides a way to disseminate brief, urgent messages to a broad audience but has limitations and drawbacks to consider for emergency situations.
When it comes to writing social media policy, you just can't say no. View this presentation on the 4 areas that must be covered when writing an effective policy. Also covered is the 7 things every policy needs and the 3 steps to get started.
This document provides information and guidance about safe and responsible use of social media for military personnel. It discusses Department of Defense social media policies, how to represent the military professionally online, and risks like identity theft and security breaches. Specific tips are given around privacy settings, avoiding sharing sensitive personal details or locations. Resources and contacts are provided to help military members learn about social media best practices.
The document outlines the social media policy for employees of the Office of Information Technology at a university. It provides guidelines for using social media accounts and representing the university in an authentic, transparent, and safe manner. The policy aims to protect privacy, confidential information, copyrights, and stakeholders while promoting the university brand. It also states that violations of the policy will be subject to disciplinary action or legal consequences.
Risks and opportunities for using social media for government transparencyStan Skrabut, Ed.D.
This presentation reviews guidelines that government agencies should follow to ensure laws and regulations are met while providing a communication outlet for citizens.
These guidelines are intended as an introductory guide to highlight core principles that must be considered when developing a communications strategy and campaigns including social media in the United Kingdom. For international activity, members are advised to review the guidelines and legal considerations of their respective countries.
The CIPR social media advisory (CIPRSM) panel would like to thank all those who contributed to updating these guidelines.
This document provides an introduction and guidelines for using social media for public relations purposes. It begins with definitions of social media and an overview of the CIPR Code of Conduct. It then lists dos and don'ts for social media engagement, emphasizing listening, understanding audiences, planning strategies, engaging in conversations consistently across platforms, being transparent, correcting errors, and considering legal and ethical issues. The document aims to help PR professionals navigate social media challenges in a rapidly changing environment.
This document provides Cisco's social media policy, guidelines, and FAQs for employees. The policy outlines 8 rules that must be followed, such as identifying yourself as a Cisco employee, not disclosing proprietary information, and not engaging with media without approval. The guidelines provide 12 best practices for social media use, including being respectful, adding value to conversations, and knowing content is hard to remove. The document answers frequently asked questions on topics like using social media for work, personal use guidelines, responding to comments, and using photos/videos.
Social media provides opportunities and ethics concerns for legal professionals. It allows attorneys to network, gain knowledge, and market their practice, but they must be careful not to form attorney-client relationships online or reveal confidential information. Attorneys should control their online presence by developing consistent profiles and monitoring what clients and the public see. They also need policies for firm employees' social media use and should educate clients and staff on related risks.
This document provides basic social computing guidelines for service members and government staff to consider when using social networks and blogs. It outlines 7 key considerations: 1) individuals maintain their right to free speech but must represent their organization appropriately; 2) be aware of all information security, operations security, and IT policies; 3) identify your affiliation and include a disclaimer for official comments; 4) only comment on topics you are knowledgeable about; 5) do not discuss any information that could compromise operations security; 6) only post information you would feel comfortable sharing with your family; and 7) be cognizant of how your personal social media represents your organization.
Description: In this article, we provide you with ten invaluable tips to ensure your safety and protect your personal information while engaging on social media platforms. Discover how to secure your privacy settings, avoid suspicious links and phishing attacks, think before you click or comment, exercise caution when accepting friend requests, be mindful of what you share, regularly review and clean up your friend list, educate yourself about privacy controls and features, use strong and unique passwords, stay updated with platform policies, and enable two-factor authentication. By implementing these tips, you can enjoy the benefits of social media while maintaining control over your privacy and security. Safeguard your online presence and explore the world of virtual entertainment with confidence.
This document provides guidelines for employees using social media. It defines social media as websites that allow sharing information and building communities. The guidelines explain that as representatives of an organization, employees should be professional, responsible, credible, and responsive online. Employees are personally responsible for anything they post and should make clear they are speaking for themselves, not the organization, unless authorized. Failure to comply with the guidelines could result in disciplinary action.
This social media policy for Friends for Youth employees outlines guidelines for using social media including:
- Employees are allowed to publish on social media as long as they identify themselves and do not disclose confidential information.
- Employees must be honest, respectful, and avoid copyright infringement when publishing content.
- Employees should avoid disparaging Friends for Youth, customers, or partners on social media.
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docxrosemariebrayshaw
Social Media in a Law Enforcement Workplace
Clarissa N. Iverson
Strayer University
Professional Communications
Agenda
How to market the police?
How to use social media to prevent and solve crime.
Social media policy for civilian employees and sworn officers.
How to Market the Police?
Law enforcement agencies now must utilize social media in many ways, such as recruiting and overall communication with the community.
Social media reaches a wide range of community. As far as it being useful for recruiting employees outside their local target market.
Showing the basic police academy process and the steps individuals need to take to apply and what to except is a great way many agencies have used social media to attract followers and potential employees.
Additionally, social media has been a great way to connect law enforcement with the community. Last year, many were engaged with the “Lip Sync Challenge” that agencies across the country participated in on social media.
Solving Crime
Using Social Media to Solve and Prevent Crime.
Social Media leaves a “digital fingerprint”
Many criminals will post themselves engaging in criminal activity.
Many criminals do not know if a social media friend or follower grants them access to their account to view the criminal activity it does no violate privacy.
Surveys have indicated 1,221 federal, state and local law enforcement who use social media, 4 of 5 use social media to gather intelligence.
Iverson, Clarissa (IC) - Business: https://www.cnn.com/2012/08/30/tech/social-media/fighting-crime-social-media/index.html
Catching Up With Modern Technology
Law enforcement and the judicial system have not caught up with current technology.
Police having a hard time regulating criminal activity because now criminals use social media and the Internet to expand their traditional reach.
Gangs use the Internet to work in conjunction with each other and to work together.
Social Media Policy
Establishing policy for individuals working in law enforcement.
Law enforcement agencies must be careful how they post on official social media accounts
Officers personal social media accounts can reflect badly on a department.
Officers have been in the news for posting inappropriate videos or racist joke, while on duty.
Agencies should adopt a social media policy and have them written in their directives.
The purpose of the policy should have a purpose and determine what it needs to cover.
The social media policy should be clearly defined to avoid confusion.
The policy need to establish what is acceptable and what is unacceptable uses of official and personal social media.
Iverson, Clarissa (IC) - Law Enforcement Social Media Policy. (2019, March 13). Retrieved from PowerDMS.
Additional Information
Police Officer Tommy Norman has used social media to bridge the gap between the community and law enforcement. His Instagram page has over 1 million followers and he now has people around the wo.
The HOTS network provides an online platform for workers in housing, outreach, and transitional support to strengthen relationships and enhance support networks for clients. By sharing experiences and strategies, members contribute to collective knowledge that strengthens the social safety net. The network aims to discover new solutions to problems around poverty and homelessness by facilitating collaboration between frontline workers. A network coordinator monitors activity, assists members, identifies issues to examine, and tracks member participation trends. Guidelines for the network require members to identify themselves, write respectfully within their areas of expertise, maintain confidentiality, and ensure participation does not interfere with work commitments.
Social Media: Critical Issues for Employersdsalmeida
The document provides an overview of critical issues related to social media and employment. It discusses the rise of social media and how employers can and do use sites like Facebook, Twitter, and LinkedIn. However, employee use of social media also presents potential issues for employers like breach of confidentiality, defamation, and inappropriate content. The document recommends employers develop social media policies to address these issues and regulate employee use both during and after work hours. It also discusses legal considerations around monitoring employee online activities and disciplining employees for any policy violations.
Social Media Policy Essentials for Lenders and BrokersSmarsh
Learn how to adopt and enforce social media policies that make sense for the mortgage industry, including:
-What elements should be included
-Best practices for developing a social media policy
-How to enforce a policy once it's made
Memphis Business Journal. Social Media Policies. Published 8.20.10Barbara Richman, SPHR
1. The growing popularity of social media has created a need for organizations to implement social media policies to provide guidance to employees on appropriate use and avoid potential legal issues.
2. Examples of what can be included in a social media policy are establishing that employee social media use may have employment implications, informing employees that their online presence reflects on the organization, and prohibiting harassment or disclosure of confidential information.
3. Developing an effective social media policy also requires considering the organization's needs, consulting legal counsel, communicating the policy to employees, and monitoring ongoing changes to social media.
The document provides guidelines for Ogilvy employees on social media and reputation management. It outlines five main points: 1) only authorized employees can talk to media, 2) do not disclose confidential company information, 3) assume all online content is public, 4) identify yourself as an Ogilvy employee, and 5) be civil and avoid offensive or inflammatory language. It emphasizes behaving thoughtfully online to protect the company's reputation.
Social Media 101: a beginner's guide for Finance Employeeswebpublishing
This document provides guidelines for Finance employees on appropriate use of social media. It outlines that employees should:
- Maintain high standards of conduct online as required by the APS Code of Conduct.
- Only discuss factual, unclassified matters related to the department without authorization. More sensitive topics require manager approval.
- Separate personal and professional social media profiles.
- Be aware that social media access at work is governed by ICT policies and personal use must be incidental to work duties.
- Take care when sharing information online due to risks of social engineering and oversharing personal details.
Similar to U.S. Coast Guard Social Media Handbook (20)
2015 Flight Global and PwC Top 100 Aerospace CompaniesDouglas Burdett
The document discusses the annual Top 100 analysis of the aerospace industry by Flight International and PwC. It finds that 2014 was another boom year for the industry, with all-time sales records and double-digit growth. However, the coming period may present more challenges due to economic uncertainties in countries like Brazil, India, Russia, and potentially China. Even so, the industry would still be in strong shape even if half of the large aircraft order books were canceled. The analysis provides details on the financial performance and position of the top 20 companies in the industry.
Let us imagine for a moment that we inhabit an opposite universe.
One where left is right, up is down, in is out, and good is bad.
Now suppose we wanted to win a government contract in this strange world. To win a government contract there, we would have to lose.
How would one go about it? Try these suggestions.
New Export Control Requirement For Electronics Manufacturers In Defense And A...Douglas Burdett
New Export Control Requirement For Electronics Manufacturers In Defense And Aerospace Industries by Thomas B. McVey, Williams Mullen law firm. Updated 2 January 2015
This document provides an overview of export control laws and regulations for defense industry executives, focusing on the International Traffic in Arms Regulations (ITAR). It discusses that ITAR controls the export of military items on the U.S. Munitions List, including defense articles, technical data, software, and defense services. It also notes some key requirements for items on the USML, such as obtaining an export license, registration requirements, recordkeeping, and screening for prohibited parties. The document is intended to help defense industry executives understand and comply with ITAR regulations.
The document discusses the annual Top 100 report from PwC that analyzes the 2013 financial performance of major aerospace companies. It finds that the industry has experienced steady revenue growth averaging 5.6% per year since 2005, showing the ongoing strength of the civil aviation market. Boeing maintained its top position with record revenue and profit in 2013, while Airbus also saw strong growth. Overall, the top 20 companies accounted for over 75% of the industry's revenue and profits. The outlook remains positive, though economic uncertainties could pose challenges in the coming years.
Our analysis of the 2012 financial performance of the top 100 aerospace companies sees no change in the top 10 companies, but includes some new names from China and Russia. While merger and acquisition activity was subdued after the 2008 financial crisis, 2012 saw a rebound in dealmaking activity as companies seek to diversify their business. Overall profitability for the industry is strong and higher than historical norms, as aviation continues to grow faster than the global economy. The report predicts that consolidation within the aerospace supply chain is likely to continue in the coming years.
Export Opportunities For Virginia's Defense IndustryDouglas Burdett
This document provides an overview of export opportunities for Virginia's defense industry given decreased federal defense spending. It discusses factors for defense companies to consider when deciding to enter international markets such as regulatory issues, investment requirements, and adapting products for other countries. The document also outlines the key regulations governing defense exports, the two main channels for foreign defense sales, options for financing exports, and strategies for commercializing defense technologies in non-defense sectors. Resources are provided to help companies with each step of pursuing international opportunities.
2013. With partner KRC Research, Weber Shandwick surveyed 630 professionals — managers on up to the C-suite, excluding CEOs — about the social participation of CEOs. Respondents worked in companies with revenues of $500 million or more and represented 10 countries across North America, Europe, Latin America and Asia Pacific.
- Engineering, operations, and supplier collaboration are seen as having the highest potential to positively impact companies' bottom lines. Engineering in particular is cited as an area of high potential.
- Companies are focusing on improving productivity within their core competencies and growth in domestic markets using existing product extensions, as looming defense budget cuts and increased global competition weigh heavily on the industry.
- Suppliers perceive the greatest challenge as meeting schedule and lead time commitments across the global supply chain, while also facing expectations to take on more product development and cost reduction responsibilities. Lack of reliable schedule and plan information is a primary concern.
Defense News Top 100 Defense Contractors (2013)Douglas Burdett
Top 100: Looking Beyond Defense
Firms Grow Revenue - By Diversifying
The decline in defense spending by a block of nations in Europe and the US hasn’t been catastrophic, but it’s making its presence felt on this year’s Defense News Top 100 list.
This document provides an overview and analysis of defense spending trends among the top 50 defense spending countries from 2006 to 2011. It segments these countries into four strategic profiles based on their level of GDP per capita (higher or lower income) and percentage of GDP spent on defense (spender or economizer). The key points are:
- Spending increased 22% among the top 50 from 2006-2011, driven mainly by the US, China, and Russia.
- Higher income countries are now slowing spending due to fiscal pressures and ending wars, while lower income countries face more instability and are spending more.
- Emerging strategic realities shaping defense policies and investments include concentrated spending growth in lower income countries, denuclear
PwC Aerospace & Defense 2012 Year In Review and 2013 ForecastDouglas Burdett
The document summarizes the performance of the top 100 aerospace and defense companies in 2012. Key points include:
- Commercial aerospace performed strongly, driving overall revenue growth of 4% and record orders despite declines in defense spending.
- Boeing had the largest revenue increase at $13 billion due to strong commercial aircraft sales.
- Sequestration cuts impacted defense spending in 2013, and companies face pressure to improve productivity and transparency.
- Commercial aerospace is expected to see continued growth in 2013 with over 600 new aircraft deliveries, while defense revenues decline 4-5%.
A Step-By-Step Guide to LinkedIn's New Company PagesDouglas Burdett
This document provides a step-by-step guide to using LinkedIn Company Pages for marketing. It discusses the benefits of Company Pages, including reaching a wider professional audience, increasing product awareness among industry professionals, and improving search engine optimization. The guide also outlines the key components of a Company Page and provides instructions for setting up a new page.
Navigating the Social Network: The Air Force Guide to Effective Social Media UseDouglas Burdett
Defense contractors who adopt topflight social media policies and best practices can raise their profile, motivate supporters, counter detractors, recruit top talent and grow their business.
Defense contractors can grow their business by raising their company’s profile, participating in “virtual trade show breakout rooms,” positioning themselves as experts, generating quality leads and making direct contact with key decision makers.
With the right planning, defense contractors can use trade shows to speed up the sales cycle, reduce the cost of sales, and reach customers, prospects and even “hidden buyers.”
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Choosing The Best AWS Service For Your Website + API.pptx
U.S. Coast Guard Social Media Handbook
1. U.S. Coast Guard Social Media
Handbook
Responsible Use of Social Media
SOCIAL MEDIA PRINCIPLES 2
PROFESSIONAL BEHAVIOR 3
PERSONAL BEHAVIOR 6
PROTECTING YOUR PRIVACY ONLINE 5
MULTIMEDIA RELEASE DECISION TREE 7
WHAT IS SAPP? 4
2. Social Media Principles
While we have traditionally excelled at telling the U.S. Coast Guard
story – actively engaging the media, the public and the community – the
growth of social media presents the opportunity to take our storytelling
one step further. Being a trusted source of timely, engaging and
responsive online information helps continue to build public trust and
confidence.
While the Coast Guard views every member and employee as a
spokesperson for the service, it also holds them accountable for
communicating effectively and responsibly. This handbook provides
guiding principles for using social media tools both personally and
professionally to help personnel be responsible online and keep Coast
Guard men and women safe and secure.
While these principles are applicable across all online communication,
they are not all inclusive. You must exercise good judgment and
common sense, adhere to the Coast Guard core values and follow
established public affairs, security and legal policies. When in doubt,
consult with your chain of command or servicing public affairs office.
Any content posted online must be:
Approved for release by the responsible authority.
Present, in some form, on an official website OR be properly stored/archive on Coast Guard owned servers
or electronic storage.
Links to unofficial content, such as news articles or multimedia, are authorized as long as proper credit is given to
the source.
Follow proper Operations (OPSEC) and Information (INFOSEC) Security practices by not posting FOUO, classified,
or critical/sensitive information.
Do not share internal documents, conversations, emails, memos, results of meetings or other pre-decisional content
that is not approved for public dissemination.
Follow the flow chart on page 7 of this handbook for the release of imagery (photographs and video).
IS IT OFFICIAL, UNOFFICIAL OR PERSONAL?
OFFICIAL: Engaging on social media IS your job and you are
doing it on behalf of the Coast Guard.
UNOFFICIAL: Engaging on social media IS RELATED to yourjob, but you are doing so in a personal capacity. What youare posting online mentions the Coast Guard, your job or
your experience.
PERSONAL: Engaging on social media IS NOT RELATEDto your job. What you are posting does not mention the
Coast Guard in any way.
2
checklist for release of official information online
NOTE: If you come across evidence of a Coast Guard member or employee violating command or public affairs policy online, you should handle it in
the same manner you would if you witnessed the infraction in any other environment. While the tools have changed, the rules for Coast Guard public
affairs as well as personal conduct still apply. All Coast Guard members and employees are accountable for anything they post online.
3. Professional Behavior
The following guidelines are for members and employees who engage on social media
sites in their official duties. In other words, what you are posting online is on behalf of a
Coast Guard unit, command or other entity. When you are assigned as the public affairs
officer or the social media site manager, everything you do impacts public trust. You are a
direct representative of the Coast Guard and must embody the spirit and professionalism
of the service.
Comply with policy.
Commands shall ensure their site(s) are authorized and comply with Coast Guard Public Affairs policy.
Sites shall be set up, registered and identified as official sites in accordance with the social media policy.
Contact socialmedia@uscg.mil for more information.
Keep records of official sites in accordance with records management schedules.
Have a social media manager designation letter on file at your command and servicing public affairs office.
Do not provide or imply endorsement of opinions, products, services, causes or political candidates.
Post relevant content.
Always follow the guidelines for release of information and imagery (see page 2).
Only content applicable and appropriate to the audience should be shared on official, publicly accessible
web and social media sites.
Develop a content management plan to guide postings ensure what is posted interests your audience.
Be unique and use your insider access to take the reader behind the scenes of your job.
Build a community.
Provide meaningful, relevant, timely and professional content while at the same time being engaging and
interesting in a way that is appropriate for social media.
Don’t talk at your audience. Have a conversation with them.
Ensure content is accessible to all audiences.
Ensure your content complies with Section 508 requirements. Content shall be accessible to the visually
and physically impaired.
Include closed captioning and/or transcript files on videos and alt text on imagery/graphics.
Do not use “click here” for links to sites. Make the name of the site or article the hyperlink.
Be official.
Post and adhere to appropriate disclaimers and policies as outlined in social media policy. (email:
socialmedia@uscg.mil
Disclose who you are and your affiliation with the service when engaging online on other sites.
Clearly mark the site as “official” use official email for contact. Do not use a Gmail or other email provider.
Use strong passwords and keep track of all official logons and passwords in a secure place.
Moderate comments.
Post the official comment policy and moderate comments on the site accordingly.
Commands may consider using their servicing public affairs office or other trustworthy and properly trained
party to moderate their official social media site.
Social media sites should be an
extension of, not a substitute
for an official government
website.
3
checklist for official communication on social media
4. SAPP is a helpful acronym that stands for Security, Accuracy, Policy, and propriety. Here is how SAPP applies online:
What is SAPP?
Releasing information that violates Coast Guard
SECURITY policies is prohibited. For example, using
location based social networking to “check-in” to
places online or posting the location, status and
schedule of a deployed cutter could compromise
OPSEC.
Information released by Coast Guard personnel mustbe verified for ACCURACY prior to release. Stick to thefacts and avoid speculation. For example, re-postingor sharing information that is not verified or officiallyreleased or speculating about a Coast Guard event, issueor operation could misinform the public.
Information released by Coast Guard personnel shall
not violate service or command POLICY. For example, to
protect privacy personnel shall carefully consider what
information they share about themselves and others.
Also, while it’s authorized to talk about your job, self-
promotion of one’s Coast Guard position for personal or
financial gain is not authorized.
All information released by Coast Guard personnel will
be appropriate and adhere to acceptable standards of
PROPRIETY. For example, personnel should realize how
engaging in conversations with explicit sexual references;
criticisms of race or religion; obscene or profane language
based on commonly accepted community standards;
referencestoillicitdrugs;andonlinesharingofconfidential
intellectual property may reflect poorly on themselves
personally and on the Coast Guard by association. Be
mindful that you are never really out of uniform or off duty
online. You are personally accountable for everything you
post online.
4
S
A
P
P
5. Protecting your privacy online
Social media users should be vigilant in protecting their privacy and the privacy of others
online. You should never assume confidentiality online regardless of how strict your privacy
settings are. We must ensure that we, our families and loved ones keep themselves safe
and do not compromise the safety and security of Coast Guard members and operations.
Providing too much information about your private life, your home life or daily routine can
provide details that can be used maliciously. Be careful to protect yourself and your privacy.
What information is
considered critical and
shouldn’t be posted?
Details about schedules, locations,
times, routines deployment
plans of units, ongoing or future
operations and activities.
Details about Coast Guard security,
use of force policy, weapons, planned
operations or courses of action.
Personnel rosters containing
personally identifiable information.
References to trends, routines
or movements of Coast Guard
personnel, particularly flag officers
and key command personnel.
Disclosure of internal Coast Guard
information or documents not
officially released to the public.
STOP
5
Never accept the “default” settings for sites. Personally go through
your settings and select the appropriate level of protection for you, your
family and the Coast Guard.
Don’t share details about yourself, your family members or others online
including social security numbers, birthdates, contact information, home
addresses, details about lifestyles or careers, and any other personally
identifiable information.
Cautiously use location-based social networking (e.g. geotagging,
FourSquare, “checking in”) as this provides specific details about
your daily habits to the public including adversaries. Never use these
services when deployed or underway or you could compromise OPSEC.
Do not “friend” or grant access to people you do not know and trust.
Regularly, screen your friends and remove those you are not close to.
The line between personal and professional boundaries can blur easily
online. If you decide to add colleagues or professional contacts to your
networks, consider adding them to a special list or group and limit/
protect what you share with that list/group.
Be aware that nothing is really ever private online. What is posted on
the web can easily be shared, taken out of context or used maliciously.
Use strong passwords to protect your accounts. It is suggested to have
14+ characters including a combination of upper and lower case letters,
numbers and symbols.
checklist for privacy protection
Facebook changes
privacy settings regularly.
It is up to the individual to
check Facebook (and other
online sites) privacy settings
regularly. At least once a month
is suggested.
6. 6
STOP
Personal behavior
While Coast Guard personnel are the best people to tell the Coast Guard story, they
are encouraged to engage online responsibly. Personnel who use social media should
share information with the understanding and realization that nothing posted online is
truly private. We must be vigilant, sensible and disciplined so our actions online do not
jeopardize our public reputation, interfere with Coast Guard missions or discredit the
service. This guidance applies to anything said, written, posted or shared on the Internet,
including personal comments, photos, videos or graphics, blogs, forums, wikis, multimedia
sharing sites or any other public-facing Internet site.
Obey the law. You are personally responsible for your actions online.
Do not violate intellectual property rights including copyright
protections.
Do not use U.S. Coast Guard protected words or symbols
without prior authorization from Coast Guard public affairs office
(CG-09223).
Be responsible.
Regardless of how content is collected, always follow the
guidelines for release of information and imagery (see page 2).
Adhere to Coast Guard public affairs and personal conduct
policy.
Practice restraint.
Be aware that you lose control over online content. Anything you
post on the web including text and pictures can easily be shared,
taken out of context or used maliciously.
Be respectful, accurate and professional. Always use your best
judgment and consider how the content reflects upon yourself,
your unit and the U.S. Coast Guard.
Online = anonymous. There is no such thing as anonymity online.
Even if you decide not to fully identify yourself, you should not disguise,
impersonate or otherwise misrepresent who you are and your association
with the Coast Guard.
Are you talking about the Coast Guard? If you are using social media
in an unofficial capacity or your post could be associated with your job;
Comment carefully. Stay in your lane and only talk about what
you know, your personal experiences and professional expertise.
Use the unofficial post disclaimer (see margin).
You may use your name, rank and position to disclose your
affiliation with the service.
Do not forgot OPSEC!
Do not self promote oraccept payments
Using your job, rank or responsibilitiesto promote yourself online andaccepting compensation for writingabout your official connection withthe service is not authorized. Treatrequests for postings that relate toa current or former Coast Guard jobor responsibility as a media request.Coordinate with your servicing public
affairs office.
It is very difficult to separate
personal and professional
lives on social media!
Unofficial Posts Disclaimer:
using social media responsibly checklist
Be mindful that you are never
really out of uniform or off
duty. You are personally
accountable for everything
you post online.
Post this disclaimer below your signature
line when you post content about the Coast
Guard in an unofficial capacity:
“The views expressed herein are those of
the writer and are not to be construed
as official or reflecting the views of the
Commandant or of the U. S. Coast Guard.”
STOP
If you wouldn’t say it to
your commander or your
grandmother...
/
DON’T SAY IT ONLINE!
7. can i post my photo or video online?
Any photo or video taken on a Coast Guard facility or
of a Coast Guard operation or person, regardless of
whether or not the imagery was taken with a personal
camera or for personal or official purposes.*
Does the photo or video
compromise security?
Is the photo or video respectful, accurate
and suitable for public release?
Does the photo or video depict operational,
mission-related or newsworthy events?
Photos or videos depicting morale
events, ceremonies or other routine
non-operational activities can be posted
on command, personal or other online
sites and do not have to be uploaded into
CGVI.**
To post photos or video online, follow these steps:
1. Obtain clearance for release from command or
appropriate approval authority.
2. Work with your servicing public affairs office to upload
the photo or video to CGVI.***
3. Post the photo or video to command, personal or
other online site.
*Designated command or public affairs
personnel escorting or allowing people on Coast
Guard facilities or to attend official Coast Guard
events, tours or ceremonies are granting the
photographer/videographer release authority for
the imagery taken. Commanding officers and
their representatives are expected to proactively
and judiciously limit access to sensitive or
classified information so that it is not captured on
camera in the first place.
**Any photos or videos posted on official Coast
Guard sites that are not uploaded to the Coast
Guard Visual Information Gallery (CGVI) must
also be present on an official agency owned/
managed domain or be properly stored and
archived on Coast Guard owned servers
or electronic storage (e.g. a morale picture
uploaded to a unit Facebook page must be
saved on a Coast Guard computer or storage
device).
***All operational, mission-related or newsworthy
imagery shall be uploaded to the Coast Guard
Visual Information Gallery (CGVI) for records
management.
DO NOT
RELEASE OR
POST ONLINE
Yes
YesNo
No
Next
No Yes
Example: Picture is geotagged
or otherwise identifies location of
deployed CG units or personnel
Example: members are wearing
proper uniform and adhering to core
values
Example: Unit cookout, promotion
ceremony or a picture of yourself in a
crew lounge
DO NOT
RELEASE OR
POST ONLINE
Next
7
start
Multimedia Release Decision Tree
8. www.uscg.mil
www.uscg.mil/mag
Coast Guard Visual
Imagery Gallery
(cgvi.uscg.mil)
coastguard.dodlive.
mil
twitter.com/uscoastguard (new releases)
twitter.com/USCG
facebook.com/uscoastguard
youtube.com/uscgimagery
flickr.com/coast_guard
COAST GUARD WEBSITES:
Contact: socialmedia@uscg.mil
The Coast Guard Social Media
Handbook is online!
Scan this QR Code from you
smartphone or go to www.
dvidshub.net/publication.
For a complete list of Coast Guard
social media sites, go to http://
coastguard.dodlive.mil/official-
sites/
Or scan the QR code with your
smartphone.