SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
WHITE PAPER




                                 The Case for Social Media
                                Management and Archiving
SPON                                                An Osterman Research White Paper
                                                                            Published January 2011

                                                                                    SPONSORED BY
        sponsored by
          SPON




                 sponsored by
                                                                                    Osterman Research, Inc.
                                                  P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA
                                    Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com
                                                           www.ostermanresearch.com • twitter.com/mosterman
The Case for Social Media Management and Archiving




Executive Summary
SOCIAL MEDIA USE IS GROWING
By virtually any measure, the impact of social media is growing on a number of fronts:

•   More businesses are using social media to build brand awareness
•   Governments are using social media to share information
•   Social media sites have emerged as icons in the popular culture

With regard to the last point, the “Big Three” social media tools in North America host a
staggering number of users as of late 2010:

•   Twitter has 175 million usersi
•   Facebook has roughly 520 million usersii
•   LinkedIn has 85 million usersiii

However, there are more than 1,000 systems in use in the dynamic, worldwide social
media environment. For exampleiv:

•   China’s microblogging site Sina.com is expected to have 65 million users by the end
    of 2010v.

•   Google’s Orkut is the most popular social media network in Brazil with 37.5 million
    users as of August 2010vi.

•   StudiVZ, with 16.6 million usersvii, is a German language social network and, not
    surprisingly, is the most popular such site in Germany.

•   Mixi, a popular social network in Japan intended only for individuals who have access
    to a mobile phone provided by a Japanese carrier, has roughly 12 million users as of
    September 2010viii.

As further evidence of the growing impact of social media is the time that users spend
using these networks: a Nielsen studyixfound that in June 2010 users spent nearly 23%
of their online time using social media, up from nearly 16% a year earlier, making social
media the fastest growing consumer of users’ online time.

SOCIAL MEDIA, WHILE BENEFICIAL, INCREASES CORPORATE RISK
Social media offers a number of important benefits to both users and organizations that
maintain a social media presence. For example, users benefit from the use of social
media by having a ready source of current information, being able to share views, and
partnering with like-minded individuals. Organizations benefit by building a following
among current and prospective customers, gaining competitive advantage by being
perceived as thought leaders, and sharing information in ways that would not otherwise
be possible using conventional communication channels. Further, the proper use of
social media strengthens client and prospect relationships with real time, authentic
dialogue in a way that other media cannot.



©2010 Osterman Research, Inc.                                                               1
The Case for Social Media Management and Archiving



Despite the many benefits of social media for both users and organizations, there are
two primary risks associated with it:

•   Users can send business records, confidential information or racially or sexually
    offensive content using social media tools in violation of the law, legal best practice
    or corporate policies.

•   Users can generate content using social media that needs to be preserved according
    to corporate and regulatory retention requirements – but often is not.

ABOUT THIS WHITE PAPER
The goal of this white paper is to demonstrate that social media content must be
managed properly. Specifically, this means a) monitoring what employees post on social
media sites and how they do so, and b) archiving relevant business records that are
distributed via social media sites. Further, this white paper offers a brief overview of the
vendor that sponsored it and that can address each of these issues, Actiance.



Social Media Monitoring and Archiving Are Critical
OUTBOUND SOCIAL MEDIA MUST BE MONITORED…
The inappropriate use of social media can create enormous liabilities, embarrassment
and other problems for an organization. For example:

•   Employees at the Tri-City Medical Center in Oceanside, California posted patient
    information on Facebookx.

•   A hospital employee in Hawaii with access to patients’ medical records illegally
    accessed another person’s records and posted on MySpace that the individual had
    HIVxi.

•   A West Allis, Wisconsin employee was fired for a post she made on her Facebook
    page claiming that she was addicted to alcohol and various prescription and illegal
    drugs, although the employee claimed that her comments were made in jestxii.

•   In early 2009, an employee of Ketchum, a public relations firm, used Twitter to post
    insulting comments about the city of Memphis shortly before presenting to the
    worldwide communications group at FedEx – Memphis’ largest employer. An
    employee of FedEx discovered the tweet, responded to the tweeter, and then copied
    FedEx’s senior managers, the management of FedEx’s communication department
    and the management of Ketchumxiii.

•   A radio host tweeted a racially offensive comment after a basketball game between
    the Dallas Mavericks and San Antonio Spurs and was subsequently firedxiv.

•   The case of Blakely v. Continental Airlines [164 N.J. 38 (2000)], although decided by
    the New Jersey Supreme Court prior to the advent of social media, established the
    precedent that employers are liable for what their employees post online.

©2010 Osterman Research, Inc.                                                                 2
The Case for Social Media Management and Archiving



It is also important to monitor content based on regulatory guidelines. For example:

•   Federal Energy Regulatory Commission (FERC) Order No. 717 requires monitoring
    and archiving of communications between the marketing and transmission
    operations of vertically integrated electricity and natural gas companies.

•   Various rules issued by the Financial Industry Regulatory Authority (FINRA) require
    supervision of communications by registered financial services representatives.

Various US government agencies have also issued guidance on the retention and
management of social media content. For example:

•   The Environmental Protection Agency has published Interim Guidance for EPA
    Employees who are Representing EPA Online Using Social Media, requiring that
    “agency records created or received using social media tools must be printed to
    paper and managed according to the applicable records schedule in a recordkeeping
    system.”

•   The US Department of Defense has provided formal guidance on the use of Web 2.0
    tools, which includes guidance that “all users of these Internet-based capabilities
    must be aware of the potential record value of their content, including content that
    may originate outside the agency.”

•   The US State Department’s official policy, Using Social Media, requires a site sponsor
    to be the recordkeeper for content that must be preserved long term, requiring that
    records “be maintained with related records or managed through an acceptable
    records management application.”

The National Archives and Record Administration (NARA) continues to refine policy
regarding the retention of social media communication. An October 2010 NARA bulletin
explains that “Open and transparent government increasingly relies on the use of these
[Web 2.0] technologies, and as agencies adopt these tools, they must comply with all
records management laws, regulations, and policies. The principles for analyzing,
scheduling, and managing records are based on content and are independent of the
medium; where and how an agency creates, uses, or stores information does not affect
how agencies identify Federal records.xv”

….BUT INBOUND CONTENT IS JUST AS IMPORTANT TO MONITOR
However, outbound threats are only part of the problem that social media can pose.
Because Twitter, Facebook and many other social media sites have become a haven for
hackers, malware authors and other criminals, organizations must be vigilant to protect
against threats can enter a corporate network through social media sites. For example:

•   The Boonana malware, written in Java and first reported in late October 2010,
    targets Macs through social media sites and operates in a manner similar to that of
    the Koobface worm that has been infecting Windows-based machines since 2008.
    Koobface has targeted Facebook users in particularxvi.



©2010 Osterman Research, Inc.                                                             3
The Case for Social Media Management and Archiving



•   In early October 2010, a large-scale phishing attack against LinkedIn users delivered
    the Bugat malware that is related to the Zeus bot responsible for the loss of tens of
    millions of dollarsxvii.

•   A temporary security hole in Twitter, patched in September 2010, allowed an exploit
    in which simply placing a mouse cursor over a malicious link would cause the user to
    visit a malicious or offensive sitexviii. Thousands of users were impacted by this bug.

•   A Consumer Reports study found that 1.8 million computers had been infected by
    applications downloaded through a social media sitexix.

OTHER CONSIDERATIONS FOR MONITORING SOCIAL MEDIA
In addition to the obvious outbound and inbound threats posed by social media, there is
also the issue of managing users’ identities when employees and other representatives
of a company post content to a social media site. This issue is focused primarily on two
key concerns:

•   Employees can establish for themselves any available name on a social media site
    and use it to post content either officially or unofficially. This results in a company
    losing control over naming conventions and the identities of individuals purporting to
    post content on the company’s behalf.

    To specifically address this issue for financial services firms, the FINRA issued a
    statement in Regulatory Notice 10-06xxthat “[regulated] firms must have a general
    policy prohibiting any associated person from engaging in business communications
    in a social media site that is not subject to the firm’s supervision.”

•   A related concern is that employees posting content on behalf of their employer can
    maintain the same social media name once they leave the organization. However,
    the lack of enforceable naming conventions means that the outside world has no
    indication that the employee has changed employers, thereby leaving employers
    vulnerable to a variety of posts long after an employee has left an organization.

SOCIAL MEDIA CONTENT MUST ALSO BE ARCHIVED
While social media can create problems for individuals and employees if content is
inappropriate, at least some social media content – that which contains business records
and other content that may have evidentiary value – must be retained based on various
retention guidelines. For example:

•   FINRA Regulatory Notice 10-06xxi states that “every firm that intends to
    communicate, or permit its associated persons to communicate, through social
    media sites must first ensure that it can retain records of those communications as
    required by Rules 17a-3 and 17a-4 under the Securities Exchange Act of 1934 and
    NASD Rule 3110.” This notice requires pre-review of static content, the supervision
    of dynamic content and the supervision of customer complaints sent in social media.




©2010 Osterman Research, Inc.                                                             4
The Case for Social Media Management and Archiving



•   The State of Oregon has established a policy that “social media posts are public
    records. That means they require you to retain them.xxii”

•   Similarly, the State of North Carolina has concluded that “[social media] posts of the
    employee administrator and any feedback by other employees or non-employees,
    including citizens, will become part of the public record.xxiii”

•   FERC 18 CFR Parts 35 and 284 require the retention of various types of records for
    five years and FERC Part 125 establishes specific retention periods for the records of
    public utilities and companies affiliated with them. While these regulations do not
    specifically call out retention of social media content per se, even a conservative
    reading of these requirements would dictate preservation of relevant social media
    content sent by energy and related companies governed by FERC.

•   In the case TEKSystems, Inc. v. Hammernick, the plaintiff is suing based on its
    allegation that the defendant violated several agreements after leaving the company
    by using her LinkedIn account to contact a number of employees of the plaintiffxxiv.

Today, driven by FINRA and the Securities and Exchange Commission, the financial
services industry is the key driver for archiving social media content – for the most part,
other industries have yet to establish detailed and thorough guidelines about the
archiving of this content, although the government and energy sectors are close behind.
The financial services industry’s focus on social media archiving is part of its long term
focus on electronic content archiving which began with email in 1997 and instant
messaging in 2003.

That said, other industries will clearly follow the lead of financial services, government
and energy and will establish detailed guidelines on social media archiving. However,
any public or private company, regardless of industry, must establish retention
guidelines to ensure that it is retaining business records in social media for the
appropriate length of time. Social media, as with any business record, must be retained
to demonstrate both to courts and regulators proper diligence in the preservation of
business content, and also to provide the ability for pre-review of business records for
early case assessment and related activities.

THE BOTTOM LINE: ORGANIZATIONS ARE AT RISK
The vast majority of organizations today do not have the ability to capture relevant
information from social media sites or to retain it for long periods as many do for other
types of business records. Nor do they have the ability to monitor employee posts to
social media sites for inappropriate content that could result in a lawsuit or quash a
merger or damage their corporate reputation. The result is that organizations are
increasingly at risk as the use of social media tools continues to grow. This risk is multi-
faceted and includes the potential spoliation of evidence, a failure to prevent sexual
harassment between employees, charges of libel and other negative consequences.

It is important that organizations retain social media content independently of the
providers – in other words, don’t rely on social media providers to retain content, but
instead manage it independently to ensure its retention for as long as necessary.


©2010 Osterman Research, Inc.                                                              5
The Case for Social Media Management and Archiving



Although it is best practice to retain content independently, it is imperative to do so
because the social media platform providers are not obligated to do this. For example,
Twitter’s terms of service include “We also retain the right to create limits on…storage at
our sole discretion at any time without prior notice to you.”



What to Do Next
Osterman Research recommends that any organization that is using or is considering
using social media undertake a four-step process for protecting against the risks
associated with its use.

STEP 1: UNDERSTAND HOW AND WHY SOCIAL MEDIA IS USED IN
YOUR ORGANIZATION
IT should conduct a thorough audit of how social media is used in the organization,
which tools are used, why they are used and so forth. This audit should also include a
forward-looking focus on how these tools might be used in the future, how competing
firms are using these tools, and new capabilities that might be employed in the future.
In short, an organization should determine if it could obtain competitive advantage
through the use of social media instead of making a knee-jerk decision not to use it
because of security or other risks it might pose.

It is important to note that there may be a major disconnect between what IT, security
or compliance perceives as a legitimate application of social media and what individual
users or business units perceive to be legitimate. The goal, of course, is to balance the
competing interests of both groups and derive the greatest benefit from the use of
social media while still remaining compliant with corporate policies and security
requirements. This might include:

•   Marketing, communications, PR teams and spokespeople who want the ability to
    post commentary, create events and utilize the full functionality of social media.

•   Corporate users, such as Human Resources and legal staff who need to research
    new hires and investigate shared content.

•   Regulatory compliance teams who must not only maintain records of shared content
    and activities, but also approve and moderate subject matter.

•   Employees who utilize social media to prospect for business, network with customers
    and partners and collaborate with suppliers.

STEP 2: UNDERSTAND THE RISKS YOU FACE BY NOT MANAGING
SOCIAL MEDIA PROPERLY
Next, it is important to understand the consequences that can result when social media
content is not managed properly, when business records in social media posts are not
retained, and so forth. It would be appropriate at this phase of the evaluation process
to understand the potential consequences associated with not managing social media
use adequately. For example:

©2010 Osterman Research, Inc.                                                               6
The Case for Social Media Management and Archiving



•     If business records or actionable information are sent via social media tools,
      management’s decision to purge this content could be seen as spoliation of evidence
      in a lawsuit. For example, if management decides not to preserve sexually harassing
      direct messages sent using Twitter, a party offended by this content that takes legal
      action may be entitled to access the archives of these posts as part of an e-discovery
      exercise and could claim spoliation in their absence.

      The ramifications of spoliation can be substantial and include fines and sanctions
      imposed by the court, the requirement to pay the prevailing party’s legal fees,
      attorneys’ costs for additional motions, and other serious consequences.

•     If employees want to discuss work conditions or complain about their benefits, for
      example, employers are not permitted to interfere with these communications
      according to rules codified in the National Labor Relations Act. This means that
      employers must tread a fine line between monitoring and blocking social media for
      inappropriate use or sharing of content in an inappropriate way and preserving the
      rights of employees to share information. Further complicating the issue is the need
      for multinational organizations to satisfy the diverse requirements of each territory in
      which it operates.

•     For firms in the financial services industry, investment advisers cannot be the
      beneficiary of a testimonial or recommendation on LinkedIn because of the potential
      violation of Rule 206(4) of the Investment Advisers Act of 19401. This rule makes it
      illegal for an investment adviser to publish or benefit from an advertisement or
      testimonial that deals with their conduct as an adviser.

•     Similarly, registered financial services representatives are subject to scrutiny when
      they post content on social media sites, including monitoring of their posts and
      retention of their communications.

STEP 3: IMPLEMENT SOCIAL MEDIA POLICIES THAT FIT YOUR
INDUSTRY AND ORGANIZATION
The next requirement is to implement policies that will attempt to strike the appropriate
balance between employee freedom to communicate via social media tools, the business
benefits that will be derived from the use of these tools, compliance with industry
regulations, and advice from legal counsel. Considerations for these policies include:

•     Policies about the use of social media tools should be part of an overall messaging
      and communication policy that covers the use of corporate email, personal Webmail,
      instant messaging, collaboration workspaces, cloud-based storage tools and any
      venue through which individuals might share corporate information.

•     Sufficient granularity should be included so that differing roles within the
      organization are clearly subject to different policies. For example, energy and
      securities traders may be subject to different rules about their use of social media
      than clerical staff, senior managers should be subject to different policies when

1
    http://newrulesofinvesting.com/2009/03/22/adviser-use-of-linkedin-may-violate-sec-rules/


©2010 Osterman Research, Inc.                                                                  7
The Case for Social Media Management and Archiving



    communicating with external auditors than when they communicate with employees,
    formal communications that represent a company position should be subject to
    different scrutiny than personal communications, and so on.

•   Policies should also include a detailed discussion about appropriate use of social
    media tools, including requirements not to post sexually or racially offensive
    comments or images, not to include links to inappropriate Web sites, not to defame
    or slander others, not to post content that could run afoul of copyright laws, not to
    post personnel records or other sensitive information, and the like.

•   The specific tools that can and cannot be used should be specified clearly, preferably
    along with a rationale for the decision. This includes the social media sites
    themselves, as well as the platforms on which these sites are accessed – home
    computers, smartphones, desktop computers at work, etc.

•   Where appropriate and where possible, disclaimers should be included for
    communications like Facebook posts or blogs. Obviously, disclaimers will not be
    practical for tweets and other space-limited communication tools (unless, possibly, a
    short URL is included that points to a corporate disclaimer).

•   Policies should clearly spell out that management reserves the right to monitor
    employee communication via social media, when it has the right to act on this
    information, and that content may be retained for an indefinite period.

•   Succession planning should also be a part of social media policies. For example, if
    an employee – particularly one with a large number of followers – leaves the
    organization, corporate policy should include provisions about whose followers those
    are, the individual’s or the company’s.

•   Policies should also spell out the corporate reaction to and consequences of a breach
    of policy.

STEP 4: DEPLOY MANAGEMENT AND ARCHIVING TECHNOLOGIES
Finally, any organization should deploy technologies that will do the following:

•   Monitor employee posts on every social media protocol that might be used. This
    monitoring may be after the fact, such as sampling employee posts to check for
    inappropriate content; or it might be in real time to monitor posts before they leave
    the organization.

•   Osterman Research has found that while many IT decision makers oppose the use of
    specific social media tools or at least find them not to be legitimate for use in a
    business context, far fewer really do anything to prevent their use.

•   Archive and log all relevant content that might constitute a business record and that
    might need to be retained. It is generally easier to simply archive or log all social
    media content than take the risk that some important content might slip through and
    not be retained, but this will depend to a large extent on the industry in which an


©2010 Osterman Research, Inc.                                                               8
The Case for Social Media Management and Archiving



    organization operates and other factors. A key part of content logging is to ensure
    that the identity of the individuals who use social media tools is clear and that
    content can be tied back to their corporate identity.

    Most organizations will want to integrate their social media archive with their primary
    electronic content archive. This makes legal holds, as well as searching across all
    electronic content during early case assessment and e-discovery, much easier and
    less time-consuming.

•   It is also vitally important to block threats that can enter an organization through
    social media. This is particularly important given a) the widespread use of short
    URLs that offer the user no visual cues about the veracity of the link, and b) the fact
    that many social media tools can display content provided by individuals to whom
    users have not given permission to display posts.

    One of the key problems with social media from a security perspective is that these
    tools are generally less well defended than more established tools like email. Given
    the rapid increase in the use of many of these tools, many IT departments are
    scrambling to keep up with the rapid growth of social media tools, leaving
    organizations vulnerable to malware infiltration. For example, an Osterman
    Research survey conducted during May 2010 revealed that 12% of mid-sized and
    large organizations in North America had been the victim of malware infiltration
    during the previous 12 months, while 9% of organizations had had sensitive or
    confidential information accidentally or maliciously leaked through a social media or
    Web 2.0 applicationxxv .



Summary
The fundamental message regarding the use of social media in any organization can be
distilled down to three important points:

1. Take advantage of social media for marketing, thought leadership or other purposes,
   particularly during the window in which your competitors are not doing so.

2. Monitor social media content leaving and entering your organization to minimize the
   risks that it can create.

3. Archive relevant business content generated in social media, also to mitigate risks.




©2010 Osterman Research, Inc.                                                               9
The Case for Social Media Management and Archiving




Sponsor of This White Paper

                                                        Actiance enables the safe and productive use
                                                        of Unified Communications, collaboration and
                                                        Web 2.0, including blogs and social networking
                                                        sites. Formerly FaceTime Communications,
Actiance, Inc.                                          Actiance’s award-winning platforms are used
1301 Shoreway                                           by 9 of the top 10 US banks and more than
Suite 275                                               1600 organizations globally for the security,
Belmont, CA 94002                                       management and compliance of unified
USA                                                     communications, Web 2.0 and social media
+1 888 349 3223                                         channels. Actiance supports all leading social
                                                        networks, unified communications providers
400 Thames Valley Park Drive                            and IM platforms, including Facebook,
Thames Valley Park                                      LinkedIn, Twitter AOL, Google, Yahoo!, Skype,
                                                        Microsoft, IBM and Cisco.
Reading, RG6 1PT
United Kingdom                                          For more information about Actiance’s award
+44 (0) 1189 637 469                                    winning platform, please visit
                                                        www.actiance.com.
www.actiance.com




© 2010 Osterman Research, Inc. All rights reserved.

No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission
of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without
prior written authorization of Osterman Research, Inc.

Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this
document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance
with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive
order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent
legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty
regarding the completeness or accuracy of the information contained in this document.

THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND.          ALL EXPRESS OR IMPLIED
REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE
DETERMINED TO BE ILLEGAL.


©2010 Osterman Research, Inc.                                                                                         10
The Case for Social Media Management and Archiving




i
        http://twitter.com/about
ii
        http://www.facebook.com/press/info.php?statistics
iii
        http://goo.gl/Ox2ID
iv
        http://www.socialmediatoday.com/soravjain/195917/40-most-popular-social-networking-sites-world
v
        http://english.peopledaily.com.cn/90001/90776/90882/7193475.html
vi
        http://www.comscore.com/Press_Events/Press_Releases/2010/10/Orkut_Continues_to_Lead_Brazil_s_Social_
        Networking_Market_Facebook_Audience_Grows_Fivefold/(language)/eng-US
vii
        http://pulse2.com/2010/05/28/studivz-has-16-6-million-users-facebook-has-9-million-in-germany/
viii
        http://www.comscoredatamine.com/2010/11/twitter-sees-impressive-growth-in-japan/
ix
        http://mashable.com/2010/08/02/stats-time-spent-online/
x
        Source: Privacy Rights Clearinghouse (http://www.privacyrights.org/data-breach)
xi
        Source: Privacy Rights Clearinghouse (http://www.privacyrights.org/data-breach)
xii
        http://www.courthousenews.com/2010/05/24/27513.htm
xiii
        http://shankman.com/be-careful-what-you-post/
xiv
        http://www.huffingtonpost.com/2010/04/26/mike-bacsik-twitter-tirad_n_552532.html
xv
        NARA Bulletin 2011-02
xvi
        http://www.computerworld.com/s/article/9193720/Koobface_worm_targets_Mac_users_on_Facebook_Twitter
xvii
        http://www.bankinfosecurity.com/podcasts.php?podcastID=783
xviii
        http://mashable.com/2010/09/21/twitter-mouseover-bug/
xix
        Source: Consumer Reports State of the Net
xx
        http://www.finra.org/web/groups/industry/@ip/@reg/@notice/documents/notices/p120779.pdf
xxi
        http://www.finra.org/web/groups/industry/@ip/@reg/@notice/documents/notices/p120779.pdf
xxii
        http://oregon.gov/DAS/EISPD/EGOV/BOARD/social_networking_guide/public_records.shtml
xxiii
        Source: Best Practices for Social Media Usage, December 2009
xxiv
        http://www.chicagobusinesslitigationlawyerblog.com/2010/10/federal_lawsuit_asks_judge_to.html
xxv
        Source: Messaging and Web Security Market Trends, 2010-2013; Osterman Research, Inc.




©2010 Osterman Research, Inc.                                                                                  11

Contenu connexe

Tendances

Profit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflictProfit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflictaditi agarwal
 
Facebook knew about and failed to police abusive content globally; report
Facebook knew about and failed to police abusive content globally; reportFacebook knew about and failed to police abusive content globally; report
Facebook knew about and failed to police abusive content globally; reportaditi agarwal
 
Analyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery StrategyAnalyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery StrategyHudsonLegal
 
3 ways to engage citizens using social media
3 ways to engage citizens using social media3 ways to engage citizens using social media
3 ways to engage citizens using social mediaGohar Khan
 
2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social NetworkCarol Spencer
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social JusticeJodi Sperber
 
Social Media at Work
Social Media at WorkSocial Media at Work
Social Media at WorkGohar Khan
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Collnet seoul-2013-2
Collnet seoul-2013-2Collnet seoul-2013-2
Collnet seoul-2013-2Gohar Khan
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Government2.0
Government2.0Government2.0
Government2.0ksabol
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 

Tendances (19)

Profit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflictProfit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflict
 
Facebook knew about and failed to police abusive content globally; report
Facebook knew about and failed to police abusive content globally; reportFacebook knew about and failed to police abusive content globally; report
Facebook knew about and failed to police abusive content globally; report
 
Analyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery StrategyAnalyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery Strategy
 
3 ways to engage citizens using social media
3 ways to engage citizens using social media3 ways to engage citizens using social media
3 ways to engage citizens using social media
 
2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social Justice
 
Government 2.0 Explained
Government 2.0 ExplainedGovernment 2.0 Explained
Government 2.0 Explained
 
Social Media at Work
Social Media at WorkSocial Media at Work
Social Media at Work
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Collnet seoul-2013-2
Collnet seoul-2013-2Collnet seoul-2013-2
Collnet seoul-2013-2
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Birmingham
BirminghamBirmingham
Birmingham
 
Government2.0
Government2.0Government2.0
Government2.0
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 

En vedette

IAB Digital Morning 2015 Alex Banks (comScore)
IAB Digital Morning 2015 Alex Banks (comScore)IAB Digital Morning 2015 Alex Banks (comScore)
IAB Digital Morning 2015 Alex Banks (comScore)IAB Brasil
 
B&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performance
B&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performanceB&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performance
B&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performanceIAB Brasil
 
Digital Morning - Por que content marketing?
Digital Morning - Por que content marketing?Digital Morning - Por que content marketing?
Digital Morning - Por que content marketing?IAB Brasil
 
F.biz Daniel Spinelli
F.biz Daniel SpinelliF.biz Daniel Spinelli
F.biz Daniel SpinelliIAB Brasil
 
IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)
IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)
IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)IAB Brasil
 
Content Marketing
Content MarketingContent Marketing
Content MarketingIAB Brasil
 
Smartclip Riza Soares
Smartclip Riza SoaresSmartclip Riza Soares
Smartclip Riza SoaresIAB Brasil
 
IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...
IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...
IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...IAB Brasil
 
IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...
IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...
IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...IAB Brasil
 
IAB BRASÍLIA: Conquistadores digitais - Maurício Lima
IAB BRASÍLIA: Conquistadores digitais - Maurício LimaIAB BRASÍLIA: Conquistadores digitais - Maurício Lima
IAB BRASÍLIA: Conquistadores digitais - Maurício LimaIAB Brasil
 
comscore alex banks
comscore alex bankscomscore alex banks
comscore alex banksIAB Brasil
 
Vml Fernando Taralli
Vml Fernando TaralliVml Fernando Taralli
Vml Fernando TaralliIAB Brasil
 
B&P 2016 - Jornada do consumidor multicanal
B&P 2016 - Jornada do consumidor multicanalB&P 2016 - Jornada do consumidor multicanal
B&P 2016 - Jornada do consumidor multicanalIAB Brasil
 
IAB BRASÍLIA: Mídia programática - Luis Machado
IAB BRASÍLIA: Mídia programática - Luis MachadoIAB BRASÍLIA: Mídia programática - Luis Machado
IAB BRASÍLIA: Mídia programática - Luis MachadoIAB Brasil
 
IAB BRASÍLIA: Métricas x Objetivos- Patricia Garrido
IAB BRASÍLIA: Métricas x Objetivos- Patricia GarridoIAB BRASÍLIA: Métricas x Objetivos- Patricia Garrido
IAB BRASÍLIA: Métricas x Objetivos- Patricia GarridoIAB Brasil
 
Iab brasília #live anywhere-tiago-twitter
Iab brasília #live anywhere-tiago-twitterIab brasília #live anywhere-tiago-twitter
Iab brasília #live anywhere-tiago-twitterIAB Brasil
 
IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...
IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...
IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...IAB Brasil
 

En vedette (20)

IAB Digital Morning 2015 Alex Banks (comScore)
IAB Digital Morning 2015 Alex Banks (comScore)IAB Digital Morning 2015 Alex Banks (comScore)
IAB Digital Morning 2015 Alex Banks (comScore)
 
B&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performance
B&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performanceB&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performance
B&P - Conteúdo 3.0: como gerar valor para as marcas com métricas de performance
 
Digital Morning - Por que content marketing?
Digital Morning - Por que content marketing?Digital Morning - Por que content marketing?
Digital Morning - Por que content marketing?
 
F.biz Daniel Spinelli
F.biz Daniel SpinelliF.biz Daniel Spinelli
F.biz Daniel Spinelli
 
Case Neutrogena - ação ambiente
Case Neutrogena - ação ambienteCase Neutrogena - ação ambiente
Case Neutrogena - ação ambiente
 
Apresentação
ApresentaçãoApresentação
Apresentação
 
IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)
IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)
IAB Meeting 2013 - Marcelo Lobianco (IAB Brasil)
 
Content Marketing
Content MarketingContent Marketing
Content Marketing
 
Smartclip Riza Soares
Smartclip Riza SoaresSmartclip Riza Soares
Smartclip Riza Soares
 
IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...
IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...
IAB Digital Morning 2015 - Inclusão do Mobile na Estratégia de um Cliente - E...
 
IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...
IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...
IAB Digital Morning 2015 - Novos rumos pra comunicação - Andre Zimmermann (Ne...
 
IAB BRASÍLIA: Conquistadores digitais - Maurício Lima
IAB BRASÍLIA: Conquistadores digitais - Maurício LimaIAB BRASÍLIA: Conquistadores digitais - Maurício Lima
IAB BRASÍLIA: Conquistadores digitais - Maurício Lima
 
comscore alex banks
comscore alex bankscomscore alex banks
comscore alex banks
 
Vml Fernando Taralli
Vml Fernando TaralliVml Fernando Taralli
Vml Fernando Taralli
 
Marketing Digital no Agronegócio
Marketing Digital no AgronegócioMarketing Digital no Agronegócio
Marketing Digital no Agronegócio
 
B&P 2016 - Jornada do consumidor multicanal
B&P 2016 - Jornada do consumidor multicanalB&P 2016 - Jornada do consumidor multicanal
B&P 2016 - Jornada do consumidor multicanal
 
IAB BRASÍLIA: Mídia programática - Luis Machado
IAB BRASÍLIA: Mídia programática - Luis MachadoIAB BRASÍLIA: Mídia programática - Luis Machado
IAB BRASÍLIA: Mídia programática - Luis Machado
 
IAB BRASÍLIA: Métricas x Objetivos- Patricia Garrido
IAB BRASÍLIA: Métricas x Objetivos- Patricia GarridoIAB BRASÍLIA: Métricas x Objetivos- Patricia Garrido
IAB BRASÍLIA: Métricas x Objetivos- Patricia Garrido
 
Iab brasília #live anywhere-tiago-twitter
Iab brasília #live anywhere-tiago-twitterIab brasília #live anywhere-tiago-twitter
Iab brasília #live anywhere-tiago-twitter
 
IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...
IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...
IAB Digital Morning 2015 - Oportunidades do Mobile no Brasil - Natália Traldi...
 

Similaire à The Case for Social Media Management and Archiving

Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your companyActiance, Inc.
 
NCSBN Keynote Presentation Alan W Silberberg
NCSBN Keynote Presentation Alan W SilberbergNCSBN Keynote Presentation Alan W Silberberg
NCSBN Keynote Presentation Alan W SilberbergDIGIJAKS
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13devy7
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysisu3037519
 
socia l network and health
socia l network and healthsocia l network and health
socia l network and healthKaori Riveros
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaOsterman Research, Inc.
 
Why You Need a Social Media Policy
Why You Need a Social Media PolicyWhy You Need a Social Media Policy
Why You Need a Social Media PolicyDave Tinker, CFRE
 
Wave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media TrackerWave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media TrackerUM Wave
 
The Social Media Revolution
The Social Media Revolution The Social Media Revolution
The Social Media Revolution i4box Anon
 
Social media
Social mediaSocial media
Social mediaAzmi Aziz
 
Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMoving Media
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfPhngLinhTrn33
 
Mosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insuranceMosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insuranceOdanga Madung
 
HRSA Social Media Webcast: Connecting With Your Target Audience
HRSA Social Media Webcast: Connecting With Your Target AudienceHRSA Social Media Webcast: Connecting With Your Target Audience
HRSA Social Media Webcast: Connecting With Your Target AudienceSpotlight Communications
 

Similaire à The Case for Social Media Management and Archiving (20)

Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communications
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your company
 
NCSBN Keynote Presentation Alan W Silberberg
NCSBN Keynote Presentation Alan W SilberbergNCSBN Keynote Presentation Alan W Silberberg
NCSBN Keynote Presentation Alan W Silberberg
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
 
socia l network and health
socia l network and healthsocia l network and health
socia l network and health
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social Media
 
Why You Need a Social Media Policy
Why You Need a Social Media PolicyWhy You Need a Social Media Policy
Why You Need a Social Media Policy
 
Wave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media TrackerWave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
 
Why You Need a Social Media Policy
Why You Need a Social Media PolicyWhy You Need a Social Media Policy
Why You Need a Social Media Policy
 
The Social Media Revolution
The Social Media Revolution The Social Media Revolution
The Social Media Revolution
 
Social media
Social mediaSocial media
Social media
 
Griffin.2011
Griffin.2011Griffin.2011
Griffin.2011
 
Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Mosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insuranceMosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insurance
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
HRSA Social Media Webcast: Connecting With Your Target Audience
HRSA Social Media Webcast: Connecting With Your Target AudienceHRSA Social Media Webcast: Connecting With Your Target Audience
HRSA Social Media Webcast: Connecting With Your Target Audience
 
(2011) Case Study: Using Social Media to Promote an Academic Laboratory
(2011) Case Study: Using Social Media to Promote an Academic Laboratory(2011) Case Study: Using Social Media to Promote an Academic Laboratory
(2011) Case Study: Using Social Media to Promote an Academic Laboratory
 

Plus de Actiance, Inc.

Compliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsCompliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsActiance, Inc.
 
The impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your businessThe impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your businessActiance, Inc.
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms Actiance, Inc.
 
Messaging best practices for 2011
Messaging best practices for 2011Messaging best practices for 2011
Messaging best practices for 2011Actiance, Inc.
 
Compliance implications of social media
Compliance implications of social mediaCompliance implications of social media
Compliance implications of social mediaActiance, Inc.
 
Importance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industryImportance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industryActiance, Inc.
 
How do you quantify ROI on social media?
How do you quantify ROI on social media?How do you quantify ROI on social media?
How do you quantify ROI on social media?Actiance, Inc.
 
IDC event flash on Socialite launch
IDC event flash on Socialite launchIDC event flash on Socialite launch
IDC event flash on Socialite launchActiance, Inc.
 
Social Media Guidelines for Insurance Industry
Social Media Guidelines for Insurance Industry Social Media Guidelines for Insurance Industry
Social Media Guidelines for Insurance Industry Actiance, Inc.
 
Enterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to LyncEnterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to LyncActiance, Inc.
 
True Compliance for Social Media
True Compliance for Social MediaTrue Compliance for Social Media
True Compliance for Social MediaActiance, Inc.
 
Social Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesSocial Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesActiance, Inc.
 
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...Actiance, Inc.
 
Actiance handbook-interpreting finra-10-03_and_11-39_for_using_social_media
Actiance handbook-interpreting finra-10-03_and_11-39_for_using_social_mediaActiance handbook-interpreting finra-10-03_and_11-39_for_using_social_media
Actiance handbook-interpreting finra-10-03_and_11-39_for_using_social_mediaActiance, Inc.
 

Plus de Actiance, Inc. (14)

Compliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsCompliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered Firms
 
The impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your businessThe impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your business
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms
 
Messaging best practices for 2011
Messaging best practices for 2011Messaging best practices for 2011
Messaging best practices for 2011
 
Compliance implications of social media
Compliance implications of social mediaCompliance implications of social media
Compliance implications of social media
 
Importance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industryImportance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industry
 
How do you quantify ROI on social media?
How do you quantify ROI on social media?How do you quantify ROI on social media?
How do you quantify ROI on social media?
 
IDC event flash on Socialite launch
IDC event flash on Socialite launchIDC event flash on Socialite launch
IDC event flash on Socialite launch
 
Social Media Guidelines for Insurance Industry
Social Media Guidelines for Insurance Industry Social Media Guidelines for Insurance Industry
Social Media Guidelines for Insurance Industry
 
Enterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to LyncEnterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to Lync
 
True Compliance for Social Media
True Compliance for Social MediaTrue Compliance for Social Media
True Compliance for Social Media
 
Social Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesSocial Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery Issues
 
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
 
Actiance handbook-interpreting finra-10-03_and_11-39_for_using_social_media
Actiance handbook-interpreting finra-10-03_and_11-39_for_using_social_mediaActiance handbook-interpreting finra-10-03_and_11-39_for_using_social_media
Actiance handbook-interpreting finra-10-03_and_11-39_for_using_social_media
 

Dernier

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Dernier (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

The Case for Social Media Management and Archiving

  • 1. WHITE PAPER The Case for Social Media Management and Archiving SPON An Osterman Research White Paper Published January 2011 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman
  • 2. The Case for Social Media Management and Archiving Executive Summary SOCIAL MEDIA USE IS GROWING By virtually any measure, the impact of social media is growing on a number of fronts: • More businesses are using social media to build brand awareness • Governments are using social media to share information • Social media sites have emerged as icons in the popular culture With regard to the last point, the “Big Three” social media tools in North America host a staggering number of users as of late 2010: • Twitter has 175 million usersi • Facebook has roughly 520 million usersii • LinkedIn has 85 million usersiii However, there are more than 1,000 systems in use in the dynamic, worldwide social media environment. For exampleiv: • China’s microblogging site Sina.com is expected to have 65 million users by the end of 2010v. • Google’s Orkut is the most popular social media network in Brazil with 37.5 million users as of August 2010vi. • StudiVZ, with 16.6 million usersvii, is a German language social network and, not surprisingly, is the most popular such site in Germany. • Mixi, a popular social network in Japan intended only for individuals who have access to a mobile phone provided by a Japanese carrier, has roughly 12 million users as of September 2010viii. As further evidence of the growing impact of social media is the time that users spend using these networks: a Nielsen studyixfound that in June 2010 users spent nearly 23% of their online time using social media, up from nearly 16% a year earlier, making social media the fastest growing consumer of users’ online time. SOCIAL MEDIA, WHILE BENEFICIAL, INCREASES CORPORATE RISK Social media offers a number of important benefits to both users and organizations that maintain a social media presence. For example, users benefit from the use of social media by having a ready source of current information, being able to share views, and partnering with like-minded individuals. Organizations benefit by building a following among current and prospective customers, gaining competitive advantage by being perceived as thought leaders, and sharing information in ways that would not otherwise be possible using conventional communication channels. Further, the proper use of social media strengthens client and prospect relationships with real time, authentic dialogue in a way that other media cannot. ©2010 Osterman Research, Inc. 1
  • 3. The Case for Social Media Management and Archiving Despite the many benefits of social media for both users and organizations, there are two primary risks associated with it: • Users can send business records, confidential information or racially or sexually offensive content using social media tools in violation of the law, legal best practice or corporate policies. • Users can generate content using social media that needs to be preserved according to corporate and regulatory retention requirements – but often is not. ABOUT THIS WHITE PAPER The goal of this white paper is to demonstrate that social media content must be managed properly. Specifically, this means a) monitoring what employees post on social media sites and how they do so, and b) archiving relevant business records that are distributed via social media sites. Further, this white paper offers a brief overview of the vendor that sponsored it and that can address each of these issues, Actiance. Social Media Monitoring and Archiving Are Critical OUTBOUND SOCIAL MEDIA MUST BE MONITORED… The inappropriate use of social media can create enormous liabilities, embarrassment and other problems for an organization. For example: • Employees at the Tri-City Medical Center in Oceanside, California posted patient information on Facebookx. • A hospital employee in Hawaii with access to patients’ medical records illegally accessed another person’s records and posted on MySpace that the individual had HIVxi. • A West Allis, Wisconsin employee was fired for a post she made on her Facebook page claiming that she was addicted to alcohol and various prescription and illegal drugs, although the employee claimed that her comments were made in jestxii. • In early 2009, an employee of Ketchum, a public relations firm, used Twitter to post insulting comments about the city of Memphis shortly before presenting to the worldwide communications group at FedEx – Memphis’ largest employer. An employee of FedEx discovered the tweet, responded to the tweeter, and then copied FedEx’s senior managers, the management of FedEx’s communication department and the management of Ketchumxiii. • A radio host tweeted a racially offensive comment after a basketball game between the Dallas Mavericks and San Antonio Spurs and was subsequently firedxiv. • The case of Blakely v. Continental Airlines [164 N.J. 38 (2000)], although decided by the New Jersey Supreme Court prior to the advent of social media, established the precedent that employers are liable for what their employees post online. ©2010 Osterman Research, Inc. 2
  • 4. The Case for Social Media Management and Archiving It is also important to monitor content based on regulatory guidelines. For example: • Federal Energy Regulatory Commission (FERC) Order No. 717 requires monitoring and archiving of communications between the marketing and transmission operations of vertically integrated electricity and natural gas companies. • Various rules issued by the Financial Industry Regulatory Authority (FINRA) require supervision of communications by registered financial services representatives. Various US government agencies have also issued guidance on the retention and management of social media content. For example: • The Environmental Protection Agency has published Interim Guidance for EPA Employees who are Representing EPA Online Using Social Media, requiring that “agency records created or received using social media tools must be printed to paper and managed according to the applicable records schedule in a recordkeeping system.” • The US Department of Defense has provided formal guidance on the use of Web 2.0 tools, which includes guidance that “all users of these Internet-based capabilities must be aware of the potential record value of their content, including content that may originate outside the agency.” • The US State Department’s official policy, Using Social Media, requires a site sponsor to be the recordkeeper for content that must be preserved long term, requiring that records “be maintained with related records or managed through an acceptable records management application.” The National Archives and Record Administration (NARA) continues to refine policy regarding the retention of social media communication. An October 2010 NARA bulletin explains that “Open and transparent government increasingly relies on the use of these [Web 2.0] technologies, and as agencies adopt these tools, they must comply with all records management laws, regulations, and policies. The principles for analyzing, scheduling, and managing records are based on content and are independent of the medium; where and how an agency creates, uses, or stores information does not affect how agencies identify Federal records.xv” ….BUT INBOUND CONTENT IS JUST AS IMPORTANT TO MONITOR However, outbound threats are only part of the problem that social media can pose. Because Twitter, Facebook and many other social media sites have become a haven for hackers, malware authors and other criminals, organizations must be vigilant to protect against threats can enter a corporate network through social media sites. For example: • The Boonana malware, written in Java and first reported in late October 2010, targets Macs through social media sites and operates in a manner similar to that of the Koobface worm that has been infecting Windows-based machines since 2008. Koobface has targeted Facebook users in particularxvi. ©2010 Osterman Research, Inc. 3
  • 5. The Case for Social Media Management and Archiving • In early October 2010, a large-scale phishing attack against LinkedIn users delivered the Bugat malware that is related to the Zeus bot responsible for the loss of tens of millions of dollarsxvii. • A temporary security hole in Twitter, patched in September 2010, allowed an exploit in which simply placing a mouse cursor over a malicious link would cause the user to visit a malicious or offensive sitexviii. Thousands of users were impacted by this bug. • A Consumer Reports study found that 1.8 million computers had been infected by applications downloaded through a social media sitexix. OTHER CONSIDERATIONS FOR MONITORING SOCIAL MEDIA In addition to the obvious outbound and inbound threats posed by social media, there is also the issue of managing users’ identities when employees and other representatives of a company post content to a social media site. This issue is focused primarily on two key concerns: • Employees can establish for themselves any available name on a social media site and use it to post content either officially or unofficially. This results in a company losing control over naming conventions and the identities of individuals purporting to post content on the company’s behalf. To specifically address this issue for financial services firms, the FINRA issued a statement in Regulatory Notice 10-06xxthat “[regulated] firms must have a general policy prohibiting any associated person from engaging in business communications in a social media site that is not subject to the firm’s supervision.” • A related concern is that employees posting content on behalf of their employer can maintain the same social media name once they leave the organization. However, the lack of enforceable naming conventions means that the outside world has no indication that the employee has changed employers, thereby leaving employers vulnerable to a variety of posts long after an employee has left an organization. SOCIAL MEDIA CONTENT MUST ALSO BE ARCHIVED While social media can create problems for individuals and employees if content is inappropriate, at least some social media content – that which contains business records and other content that may have evidentiary value – must be retained based on various retention guidelines. For example: • FINRA Regulatory Notice 10-06xxi states that “every firm that intends to communicate, or permit its associated persons to communicate, through social media sites must first ensure that it can retain records of those communications as required by Rules 17a-3 and 17a-4 under the Securities Exchange Act of 1934 and NASD Rule 3110.” This notice requires pre-review of static content, the supervision of dynamic content and the supervision of customer complaints sent in social media. ©2010 Osterman Research, Inc. 4
  • 6. The Case for Social Media Management and Archiving • The State of Oregon has established a policy that “social media posts are public records. That means they require you to retain them.xxii” • Similarly, the State of North Carolina has concluded that “[social media] posts of the employee administrator and any feedback by other employees or non-employees, including citizens, will become part of the public record.xxiii” • FERC 18 CFR Parts 35 and 284 require the retention of various types of records for five years and FERC Part 125 establishes specific retention periods for the records of public utilities and companies affiliated with them. While these regulations do not specifically call out retention of social media content per se, even a conservative reading of these requirements would dictate preservation of relevant social media content sent by energy and related companies governed by FERC. • In the case TEKSystems, Inc. v. Hammernick, the plaintiff is suing based on its allegation that the defendant violated several agreements after leaving the company by using her LinkedIn account to contact a number of employees of the plaintiffxxiv. Today, driven by FINRA and the Securities and Exchange Commission, the financial services industry is the key driver for archiving social media content – for the most part, other industries have yet to establish detailed and thorough guidelines about the archiving of this content, although the government and energy sectors are close behind. The financial services industry’s focus on social media archiving is part of its long term focus on electronic content archiving which began with email in 1997 and instant messaging in 2003. That said, other industries will clearly follow the lead of financial services, government and energy and will establish detailed guidelines on social media archiving. However, any public or private company, regardless of industry, must establish retention guidelines to ensure that it is retaining business records in social media for the appropriate length of time. Social media, as with any business record, must be retained to demonstrate both to courts and regulators proper diligence in the preservation of business content, and also to provide the ability for pre-review of business records for early case assessment and related activities. THE BOTTOM LINE: ORGANIZATIONS ARE AT RISK The vast majority of organizations today do not have the ability to capture relevant information from social media sites or to retain it for long periods as many do for other types of business records. Nor do they have the ability to monitor employee posts to social media sites for inappropriate content that could result in a lawsuit or quash a merger or damage their corporate reputation. The result is that organizations are increasingly at risk as the use of social media tools continues to grow. This risk is multi- faceted and includes the potential spoliation of evidence, a failure to prevent sexual harassment between employees, charges of libel and other negative consequences. It is important that organizations retain social media content independently of the providers – in other words, don’t rely on social media providers to retain content, but instead manage it independently to ensure its retention for as long as necessary. ©2010 Osterman Research, Inc. 5
  • 7. The Case for Social Media Management and Archiving Although it is best practice to retain content independently, it is imperative to do so because the social media platform providers are not obligated to do this. For example, Twitter’s terms of service include “We also retain the right to create limits on…storage at our sole discretion at any time without prior notice to you.” What to Do Next Osterman Research recommends that any organization that is using or is considering using social media undertake a four-step process for protecting against the risks associated with its use. STEP 1: UNDERSTAND HOW AND WHY SOCIAL MEDIA IS USED IN YOUR ORGANIZATION IT should conduct a thorough audit of how social media is used in the organization, which tools are used, why they are used and so forth. This audit should also include a forward-looking focus on how these tools might be used in the future, how competing firms are using these tools, and new capabilities that might be employed in the future. In short, an organization should determine if it could obtain competitive advantage through the use of social media instead of making a knee-jerk decision not to use it because of security or other risks it might pose. It is important to note that there may be a major disconnect between what IT, security or compliance perceives as a legitimate application of social media and what individual users or business units perceive to be legitimate. The goal, of course, is to balance the competing interests of both groups and derive the greatest benefit from the use of social media while still remaining compliant with corporate policies and security requirements. This might include: • Marketing, communications, PR teams and spokespeople who want the ability to post commentary, create events and utilize the full functionality of social media. • Corporate users, such as Human Resources and legal staff who need to research new hires and investigate shared content. • Regulatory compliance teams who must not only maintain records of shared content and activities, but also approve and moderate subject matter. • Employees who utilize social media to prospect for business, network with customers and partners and collaborate with suppliers. STEP 2: UNDERSTAND THE RISKS YOU FACE BY NOT MANAGING SOCIAL MEDIA PROPERLY Next, it is important to understand the consequences that can result when social media content is not managed properly, when business records in social media posts are not retained, and so forth. It would be appropriate at this phase of the evaluation process to understand the potential consequences associated with not managing social media use adequately. For example: ©2010 Osterman Research, Inc. 6
  • 8. The Case for Social Media Management and Archiving • If business records or actionable information are sent via social media tools, management’s decision to purge this content could be seen as spoliation of evidence in a lawsuit. For example, if management decides not to preserve sexually harassing direct messages sent using Twitter, a party offended by this content that takes legal action may be entitled to access the archives of these posts as part of an e-discovery exercise and could claim spoliation in their absence. The ramifications of spoliation can be substantial and include fines and sanctions imposed by the court, the requirement to pay the prevailing party’s legal fees, attorneys’ costs for additional motions, and other serious consequences. • If employees want to discuss work conditions or complain about their benefits, for example, employers are not permitted to interfere with these communications according to rules codified in the National Labor Relations Act. This means that employers must tread a fine line between monitoring and blocking social media for inappropriate use or sharing of content in an inappropriate way and preserving the rights of employees to share information. Further complicating the issue is the need for multinational organizations to satisfy the diverse requirements of each territory in which it operates. • For firms in the financial services industry, investment advisers cannot be the beneficiary of a testimonial or recommendation on LinkedIn because of the potential violation of Rule 206(4) of the Investment Advisers Act of 19401. This rule makes it illegal for an investment adviser to publish or benefit from an advertisement or testimonial that deals with their conduct as an adviser. • Similarly, registered financial services representatives are subject to scrutiny when they post content on social media sites, including monitoring of their posts and retention of their communications. STEP 3: IMPLEMENT SOCIAL MEDIA POLICIES THAT FIT YOUR INDUSTRY AND ORGANIZATION The next requirement is to implement policies that will attempt to strike the appropriate balance between employee freedom to communicate via social media tools, the business benefits that will be derived from the use of these tools, compliance with industry regulations, and advice from legal counsel. Considerations for these policies include: • Policies about the use of social media tools should be part of an overall messaging and communication policy that covers the use of corporate email, personal Webmail, instant messaging, collaboration workspaces, cloud-based storage tools and any venue through which individuals might share corporate information. • Sufficient granularity should be included so that differing roles within the organization are clearly subject to different policies. For example, energy and securities traders may be subject to different rules about their use of social media than clerical staff, senior managers should be subject to different policies when 1 http://newrulesofinvesting.com/2009/03/22/adviser-use-of-linkedin-may-violate-sec-rules/ ©2010 Osterman Research, Inc. 7
  • 9. The Case for Social Media Management and Archiving communicating with external auditors than when they communicate with employees, formal communications that represent a company position should be subject to different scrutiny than personal communications, and so on. • Policies should also include a detailed discussion about appropriate use of social media tools, including requirements not to post sexually or racially offensive comments or images, not to include links to inappropriate Web sites, not to defame or slander others, not to post content that could run afoul of copyright laws, not to post personnel records or other sensitive information, and the like. • The specific tools that can and cannot be used should be specified clearly, preferably along with a rationale for the decision. This includes the social media sites themselves, as well as the platforms on which these sites are accessed – home computers, smartphones, desktop computers at work, etc. • Where appropriate and where possible, disclaimers should be included for communications like Facebook posts or blogs. Obviously, disclaimers will not be practical for tweets and other space-limited communication tools (unless, possibly, a short URL is included that points to a corporate disclaimer). • Policies should clearly spell out that management reserves the right to monitor employee communication via social media, when it has the right to act on this information, and that content may be retained for an indefinite period. • Succession planning should also be a part of social media policies. For example, if an employee – particularly one with a large number of followers – leaves the organization, corporate policy should include provisions about whose followers those are, the individual’s or the company’s. • Policies should also spell out the corporate reaction to and consequences of a breach of policy. STEP 4: DEPLOY MANAGEMENT AND ARCHIVING TECHNOLOGIES Finally, any organization should deploy technologies that will do the following: • Monitor employee posts on every social media protocol that might be used. This monitoring may be after the fact, such as sampling employee posts to check for inappropriate content; or it might be in real time to monitor posts before they leave the organization. • Osterman Research has found that while many IT decision makers oppose the use of specific social media tools or at least find them not to be legitimate for use in a business context, far fewer really do anything to prevent their use. • Archive and log all relevant content that might constitute a business record and that might need to be retained. It is generally easier to simply archive or log all social media content than take the risk that some important content might slip through and not be retained, but this will depend to a large extent on the industry in which an ©2010 Osterman Research, Inc. 8
  • 10. The Case for Social Media Management and Archiving organization operates and other factors. A key part of content logging is to ensure that the identity of the individuals who use social media tools is clear and that content can be tied back to their corporate identity. Most organizations will want to integrate their social media archive with their primary electronic content archive. This makes legal holds, as well as searching across all electronic content during early case assessment and e-discovery, much easier and less time-consuming. • It is also vitally important to block threats that can enter an organization through social media. This is particularly important given a) the widespread use of short URLs that offer the user no visual cues about the veracity of the link, and b) the fact that many social media tools can display content provided by individuals to whom users have not given permission to display posts. One of the key problems with social media from a security perspective is that these tools are generally less well defended than more established tools like email. Given the rapid increase in the use of many of these tools, many IT departments are scrambling to keep up with the rapid growth of social media tools, leaving organizations vulnerable to malware infiltration. For example, an Osterman Research survey conducted during May 2010 revealed that 12% of mid-sized and large organizations in North America had been the victim of malware infiltration during the previous 12 months, while 9% of organizations had had sensitive or confidential information accidentally or maliciously leaked through a social media or Web 2.0 applicationxxv . Summary The fundamental message regarding the use of social media in any organization can be distilled down to three important points: 1. Take advantage of social media for marketing, thought leadership or other purposes, particularly during the window in which your competitors are not doing so. 2. Monitor social media content leaving and entering your organization to minimize the risks that it can create. 3. Archive relevant business content generated in social media, also to mitigate risks. ©2010 Osterman Research, Inc. 9
  • 11. The Case for Social Media Management and Archiving Sponsor of This White Paper Actiance enables the safe and productive use of Unified Communications, collaboration and Web 2.0, including blogs and social networking sites. Formerly FaceTime Communications, Actiance, Inc. Actiance’s award-winning platforms are used 1301 Shoreway by 9 of the top 10 US banks and more than Suite 275 1600 organizations globally for the security, Belmont, CA 94002 management and compliance of unified USA communications, Web 2.0 and social media +1 888 349 3223 channels. Actiance supports all leading social networks, unified communications providers 400 Thames Valley Park Drive and IM platforms, including Facebook, Thames Valley Park LinkedIn, Twitter AOL, Google, Yahoo!, Skype, Microsoft, IBM and Cisco. Reading, RG6 1PT United Kingdom For more information about Actiance’s award +44 (0) 1189 637 469 winning platform, please visit www.actiance.com. www.actiance.com © 2010 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. ©2010 Osterman Research, Inc. 10
  • 12. The Case for Social Media Management and Archiving i http://twitter.com/about ii http://www.facebook.com/press/info.php?statistics iii http://goo.gl/Ox2ID iv http://www.socialmediatoday.com/soravjain/195917/40-most-popular-social-networking-sites-world v http://english.peopledaily.com.cn/90001/90776/90882/7193475.html vi http://www.comscore.com/Press_Events/Press_Releases/2010/10/Orkut_Continues_to_Lead_Brazil_s_Social_ Networking_Market_Facebook_Audience_Grows_Fivefold/(language)/eng-US vii http://pulse2.com/2010/05/28/studivz-has-16-6-million-users-facebook-has-9-million-in-germany/ viii http://www.comscoredatamine.com/2010/11/twitter-sees-impressive-growth-in-japan/ ix http://mashable.com/2010/08/02/stats-time-spent-online/ x Source: Privacy Rights Clearinghouse (http://www.privacyrights.org/data-breach) xi Source: Privacy Rights Clearinghouse (http://www.privacyrights.org/data-breach) xii http://www.courthousenews.com/2010/05/24/27513.htm xiii http://shankman.com/be-careful-what-you-post/ xiv http://www.huffingtonpost.com/2010/04/26/mike-bacsik-twitter-tirad_n_552532.html xv NARA Bulletin 2011-02 xvi http://www.computerworld.com/s/article/9193720/Koobface_worm_targets_Mac_users_on_Facebook_Twitter xvii http://www.bankinfosecurity.com/podcasts.php?podcastID=783 xviii http://mashable.com/2010/09/21/twitter-mouseover-bug/ xix Source: Consumer Reports State of the Net xx http://www.finra.org/web/groups/industry/@ip/@reg/@notice/documents/notices/p120779.pdf xxi http://www.finra.org/web/groups/industry/@ip/@reg/@notice/documents/notices/p120779.pdf xxii http://oregon.gov/DAS/EISPD/EGOV/BOARD/social_networking_guide/public_records.shtml xxiii Source: Best Practices for Social Media Usage, December 2009 xxiv http://www.chicagobusinesslitigationlawyerblog.com/2010/10/federal_lawsuit_asks_judge_to.html xxv Source: Messaging and Web Security Market Trends, 2010-2013; Osterman Research, Inc. ©2010 Osterman Research, Inc. 11