Social Networking Policy. Managing and Controlling Employee Social Networks. Version 2.1

Similar documents
Social Media Guidelines: King County 1

Sample Social Media Policy for Museums

Social Media Guidelines

Social Media Toolkit. Luke Williams. Feb Page 1

GIRL GUIDES AUSTRALIA (GGA) SOCIAL MEDIA POLICY

Social Media. Guide for employees

Social Media and Technology Issues in the Workplace. What is Social Media? Social Media is. Becky S. Knutson

Social Media Guidelines

NASW-NC Social Media Policy Setting up Social Media- NASW-NC Professional Accounts

Social Networking and Internet Marketing in the Financial Services Sector

Social MediaTraining Slides. India

INSTAGOOGLETWEETFACE? Social Media for Scholarship Engagement

Social Media Policy. SAMPLE Social Media Policy

Information for registrants. Guidance on social media

Social Media Policy. Planning for Success

Advertising, Design, Social Media & Printing Easton - Philadelphia

Module 36 MARKETING PLAN TEMPLATE

SOCIAL MEDIA TOOLKIT FOR NONPROFITS

The Guide for Buyers of Market Research.

Dated July 2017 ALTUS STRATEGIES PLC. ( Company ) SOCIAL MEDIA POLICY

8 Ways To Build Your Brand Using Social Media

The Social Media Policy was adopted by Full Council at its Meeting held on 5 May Introduction

Social Media Standards. A guide to Lane s participation in social media.

3.1. Breach Use of social media which contravenes Ermha s Social Media Policy, any other Ermha Policy, or the law.

Dean College Social Media Handbook

Twitter for Small Business

Southwest Airlines Co. Code of Ethics

Corporate Social Media Training for RunningUSA

SAMPLE SOCIAL MEDIA POLICY

Social Media Savvy: Facebook and Twitter. Jennifer Li AFSCME Digital Communications

BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS

Welcome to the Payroll Dashboard

Social Media Guidelines

New Technology: Mission Impossible?

Guide to Ethical Use of Social Media for Texas Lawyers. Zach Wolfe.

WHY DIGITAL MATTERS. Digital Benefits for WOLF PROs. Homeowners, Contractors and Social Media

Effective Social Media Handbook

THE USE OF SOCIAL MEDIA BY INVESTMENT COMPANIES, INVESTMENT ADVISERS, AND BROKER-DEALERS

Social Networking Policy

Social Media Usage Policy

Social Media Recommendations For Clubs: Getting Started & Best Practices. General

Ask, Self-Recruiter Blog Guide to Organizing Your Job Search

for Recruiting Using LinkedIn Presented by Lindee Brauer NST Innovate & Educate for Results

San Mateo County Departmental Social Media Policy (revised April 2015) Table of Contents

Auckland Council Social Media Policy. Part two: policy for using social media

Corporate Code of Business Conduct and Ethics

Policy for Use of Social Media

How to Make Your Messages Stand Out on Snapchat, Instagram, Twitter and Facebook

USING FACEBOOK FOR RECRUITING

Our Agenda. Instructions for Credit. Ethics Education for Local ABC Boards. Page 1. Ethics for Local ABC Boards UNC School of Government

When Social Media Meets Employer Branding: Your Guide to Doing It Right

Disclosures. Session 3004 Social Media for the Allergy/ Immunology Practice: Let s Do It! Introduction to Twitter 1/6/14. * None

Multi-media Cross Channel Coordination Marketing Campaigns. Credit Apps E- Mail

SAP Global Certification Digital Badges Step-by-Step Guide

Creating Review Forms and Review Plans in ADP Workforce Now Performance

Good Deeds Day Communication & Press Kit

Practical Exercises. Professional Diploma in Digital Marketing Social Media Marketing 2

Essential Time & Attendance Employee Basics: For Employees Who Clock In and Out or Use a Timecard

Localized Social Media Plan For Dillard s. Bryce Brinkman Sales Associate Store #

Social Media Policy. Reference: HR th December Induction CD/ Sharepoint/ EDRMS HR Site/ Website

Twitter. Runa Sarkar Indian Institute of Management Calcutta

CODE OF CONDUCT, ETHICS & SOCIAL RESPONSABILITY. syone

Basics of Social Media. The why, the what, and the how for your small business or nonprofit

ANVIL MARKETING SERVICES

Legal Ethics and Social Media

How To Increase Business Leads Using LinkedIn

FACEBOOK GUIDE HOW TO USE FACEBOOK FOR RECRUITMENT MARKETING

PowerUP Lite Guide Book -1-

MASTERS OF ARTS IN STRATEGIC COMMUNICATION

Topic 2 - Market Research. N5 Business Management

Innovative Online Marketing Strategies. Dale Griffen, R.N. The Go! Agency & The Social Marketing Academy

Interactive and Social Media Applications Laura Boyce, Sarah Mc Brearty & Kathleen McCourt

How To Attract Crowds To Your Webinar

A Guide to Successful Social Media Marketing

Social Media in the Workplace

TOP 10 EXAMPLES. of POLICE SOCIAL MEDIA. - and why they work. Twitter & Facebook

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS

FORTIFY YOUR BRAND: PROTECTING YOUR ONLINE PRESENCE AND SOCIAL MEDIA IDENTITY

FAQ: How to build User Profiles

Successful B2B Social Media 101

Code of Business Conduct and Ethics

A COMPLETE GUIDE TO SUPER LAWYERS

How to Promote Your Golf Course Using Social Media. Justin Ramers, Director of Social Media

8 Secrets to Boost Your Business Through Social Media

Oracle. Human Capital Management Cloud Using Workforce Reputation Management. Release 13 (update 18A)

CFO #CFOPERFORMANCE. Building Your Brand The Value of Reputation

REAL ESTATE INDUSTRY SOCIAL MEDIA MARKETING REPORT 2015

M G S D I G I T A L. where he or she can;

The Research Foundation for The State University of New York Code of Conduct

INTEGRATION CLOUD. Modern Integration and Intelligent Automation for a Connected Enterprise

CODE OF BUSINESS CONDUCT

Advertising Packages. For Business-to-Business (B2B) Suppliers. Company YOUR LOGO

WaYS TO BETTER COMMUNICATE WITH YOUR TARGET CUSTOMER HANDOUT.

Goals for today s session

Sage Business Partner, Advisor and Forum Membership

Innovative Marketing Ideas That Work

User-generated Content and Rights Management A GUIDE FOR BRANDS AND AGENCIES

SOCIAL MEDIA - POLICIES AND PROCEDURES

Social Media Marketing For Small Business May, 2016

Raising awareness and celebrating your project

Transcription:

Social Networking Policy Managing and Controlling Employee Social Networks Version 2.1

Table of Contents Social Network Policy...3 Definitions... 3 Overview... 3 Policy... 4 Overview... 4 Statement... 5 Rights to content... 8 Confidential Information... 8 Private versus Public Information... 9 Option for More Restrictive License Terms... 10 Attribution... 10 Guidelines... 11 Security Standards... 13 BYOD Security... 14 Protect Sensitive Data... 14 Disaster Recovery and Business Continuity... 15 Best Practices in Managing Social Networks and Social Relationship... 16 Steps to Prevent Being Scammed by Social Media... 17 Appendix... 18 Job Descriptions... 19 Job Description Social Media Specialist... 19 Electronic Forms... 20 Internet and Electronic Communication Agreement... 20 Social Network Policy Compliance Agreement... 20 Protection from Phishing and Whaling Attacks... 21 Social Networking Best Practices... 24 Twitter... 24 LinkedIn... 25 Blog... 26 What s News... 29 2

Social Network Policy Definitions Social Networking - Connecting with a community of people in your network through services like Facebook and Twitter with various methods of online interaction. A blog with a broad user base also is a social network Social Media - Online media like blogs, podcasts, videos, and news with a strong participatory element through comments, ratings, or other mechanisms. Social media is generated by the people and for the people with content created by anyone with a voice. Overview Social networking enhances existing human behaviors for the need to connect and communicate during a crisis. Like a scene at a freeway car crash, most want to know what s happening and in the excitement, jump in to monitor and participate. Assume your competitors are using social networking to communicate and monitor what your enterprise s status is. Disaster Recovery and Business Continuity plans need to be updated to: Enhance Communication Plans: Just as your enterprise has an existing communication plan (often a press statement from executive management to media) understand how to repurpose these messages and communication on social networks. Experiment and Build a Base: Enterprises should experiment with the tools like the Department of Homeland Security understands how to use these tools for disasters, so companies should also start to monitor, then experiment. Having a platform in advance provides benefits, as those who participate have power. Educate, Train, and build Awareness Before an Event. Companies as they test their DRPs and BCP should incorporate these social networks into the planning and execution processes. Companies need to indicate to the world what is an official channel, where people should go for news, and how each function plans to respond using these tools. These tools can help educate citizens how to prepare for disasters, where to go for help, how to develop a crises plan and even basic lifesaving medical techniques. 3

Private versus Public Information If you engage in a discussion related to ENTERPRISE, in addition to disclosing that you work for ENTERPRISE and that your views are personal, you must also be sure that your posts are accurate, not misleading, and that they do not reveal non-public company information. If you are in doubt, ask your supervisor. If you are still in doubt, don t post. Non-public information includes: Any topic related to the financial performance of the company; Information directly or indirectly related to the safety performance of ENTERPRISE systems or components for vehicles; ENTERPRISE Secret, Confidential or Attorney-Client Privileged information; Information that has not already been disclosed by authorized persons in a public forum; and Personal information about another ENTERPRISE employee, such as his or her medical condition, performance, compensation or status in ENTERPRISE. When in doubt about whether the information you are considering sharing falls into one of the above categories, DO NOT POST. Check with ENTERPRISE Communications or ENTERPRISE Legal to see if it s a good idea. Failure to stay within these guidelines may lead to disciplinary action. Respect proprietary information and content, confidentiality, and the brand, trademark and copyright rights of others. Always cite, and obtain permission, when quoting someone else. Make sure that any photos, music, video or other content you are sharing is legally sharable or that you have the owner s permission. If you are unsure, you should not use. Get permission before posting photos, video, quotes or personal information of anyone other than you online. Do not incorporate ENTERPRISE logos, trademarks or other assets in your posts. If during your work you create, receive or become aware of personal information about ENTERPRISE employees, contingent workers, customers, customers patients, providers, business partners or third parties, don t disclose that information in any way via social media or other online activities. You may disclose personal information only to those authorized to receive it in accordance with ENTERPRISE Privacy policies. 9

Job Descriptions A full job description is included with this policy template. It comes separately in its own directory. Job Description Social Media Specialist 19

Electronic Forms Two (2) Electronic forms are included with this policy template. They come separately in their own directory. Internet and Electronic Communication Agreement Social Network Policy Compliance Agreement 20

Social Networking Best Practices Twitter 1. Locate a good image of your enterprise s logo and have a good JPG file on your computer. 2. Decide how many accounts you want at Twitter. 3. Create a new Twitter account for each, fill out the profile completely and upload the mostrecognizable image of you or your company/product. 4. Find the Twitter account and follow it. 5. Look at the listing of followers and follow each of the other members. 6. As people follow you and your new Twitter accounts, take a look at their profile and follow them as well. Keep your posts relevant and valuable When someone "follows" you on Twitter, they have searched for a Twitter account name and clicked the "Follow" button. They will expect that you post relevant comments or announcements with that account. Since they will be seeing or reading your posts, you want them to expect a certain kind of value and receive that. How many accounts? So, you'll likely want two different kinds of Twitter accounts: one for yourself as an individual and another for the company or its major offering. For instance: @CompanyNameBCPManager is the Business Continuity Manger s individual communication @CompanyName is for the company's topic-specific comments Naming your accounts When someone searches for you on Twitter, you want your account name to match what they would search for. It is unlikely your customers and other stakeholders would know your specifics, so use account names that are easy to find @CompanyNameBCPManager is the Business Continuity Manger s individual communication @CompanyName is for the company's topic-specific comments 24

What s News Version 2.1 Added Internet and Electronic Communication Agreement electronic form Updated Social Networking Policy Compliance Agreement electronic form Updated Social Media Specialist job description Updated policy to meet EU compliance requirement Version 2.0 Updated Social Networking Compliance Agreement Form Added Social Networking Best Practices Updated to include latest security compliance requirements Version 1.6 Updated electronic form - Social Networking Compliance Agreement Form - added pdf fillable form Added job description for Social Media Specialist Version 1.5 Updated to meet the latest compliance requirements Added best practices for social networking Added tips on how to avoid being scammed in social networks. Version 1.4 Added BYOD security standard Added section of what to include for Disaster Recovery and Business Continuity Updated electronic forms Version 1.3 Updated to comply with the Office of the General Counsel of the Division of Operations Management 29

Version 1.2 Updated to include electronic form Social Networking Policy Compliance Agreement Version 1.1 Added section on protection from phishing and whaling attacks 30