SlideShare a Scribd company logo
1 of 43
Developing an Effective Governance Framework for Social Media Jesse Wilkins, CRM AIIM International March 23, 2011
It’s just a fad….     By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery.        Source: “Social Media Governance: An Ounce of Prevention”, Gartner
Agenda Introduction Structural elements of a comprehensive social media policy Social media policy statements
Introduction
Prohibition is not realistic
“A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers.  We call this new kind of company the networked enterprise.”
Why a governance framework? Ensures that employees know what is expected of them Provides guidelines for being more effective Reduces risk of someone posting inappropriate content Addresses legal and operational concerns
The governance framework Management  Governance roles and responsibilities  Organization  Groups and structures required to manage information Policy  Processes and standards for managing information and processes
Management Provides support for social media initiative(s) Determines need for policy guidance Determines need for enterprise solutions Supports – or doesn’t – transformation efforts
Organization Governance roles required to ensure compliance with the framework Includes usual suspects… Also includes new roles Social media strategist Community managers Moderators
About the social media policy Social content is just another form of content Policy should provide a framework applicable to most or all social media tools – and to other content/communication-related technologies as well DON’T write e.g. a Facebook policy, a Twitter policy, etc.
Best Buy Social Media Policy Be smart. Be respectful. Be human. http://www.bby.com/2010/01/20/best-buy-social-media-guidelines/
Zappos Twitter Policy Be real and use your best judgment.
Policy 2.0 – in 140 characters Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.”
Structural elements of a social media policy
Policy elements Purpose Scope  Responsibilities Definitions Policy statements References
Purpose and scope This policy has three purposes: Establish definitions relevant to social business technologies Describe usage policies relating to social business technologies Describe security and technology policies relating to social business technologies Scope: This policy is applicable to the entire enterprise.
Responsibilities Responsibilities for policy development and maintenance Responsibilities for policy administration Responsibilities for compliance with policy
Definitions Uncommon terms Common terms used in an uncommon fashion Acronyms and abbreviations
Policy statements Many different elements available Detailed in the next section
References List any references used to develop the policy Internal strategic documents Existing policies and procedures Statutes and regulations Publications  Examples and templates
Social media policy statements
Official vs. unofficial Link to social media policy
Creation of official accounts
Look & feel guidelines Account details Handle Picture – including corporate logo usage Bio Contact information Friends/buddies/contacts Groups/fans/likes
Content guidelines Whether posts will require approval Pictures and video By the organization By third parties Links (i.e. “sharing”) Applications and widgets Likes, retweets, etc.
Personal access and usage Access to personal accounts using organizational resources (time, computers, network, etc.) Access to sites using personal devices (iPhone, tablet, etc.)
Inappropriate usage Offensive content Disparagement of the organization – or of competitors or others Slander or libel Sexual content Solicitations of commerce Threats Illegal activity Violation of copyright
Sensitive materials Personnel-related information Financial information Confidential information Health information If you wouldn’t post it to your website or send via email, don’t post to FB or send via Twitter.
Monitoring and reviewing comments
Official response to third-party sites Response to comments
Governmental considerations Links to primary site (“content of record”) Whether comments are allowed And monitored Public records act notices Public safety and monitoring                 issues
Whether the account is monitored for actionable content (screenshot) Public records
Questions?
For more information Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International              +1 (303) 574-0749 direct 		jwilkins@aiim.org  		http://www.twitter.com/jessewilkins 		http://www.linkedin.com/in/jessewilkins 		http://www.facebook.com/jessewilkins 		http://www.slideshare.net/jessewilkins
Social Business Roadmap Describes steps to implement social business effectively Based on experience of the authors, the broader AIIM community, and dozens of published case studies and resources Available under Creative Commons license at http://www.aiim.org/roadmap
Social Business Strategy Workshop Schedule a 1-day workshop to learn how your organization can use social technologies to redefine and improve business processes Briefing objectives: Identify how you can use social technologies to improve communication, marketing, sales, support, R&D, and HR.  Document business opportunities and ROI Identify necessary functionality and possible solutions Outline required governance structure to minimize risks and ensure regulatory compliance Get a roadmap for how to implement social processes and technologies effectively www.aiim.org/workshop
Additional resources “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”, Patricia Franks, Ph.D., IBM Center for The Business of Government, 2010 “Electronic Records Management: Blogs, Wikis, Facebook, Twitter, & Managing Public Records”, Washington State Archives, September 2009
Additional resources “Managing Social Media Records”, U.S. Department of Energy, September 2010 http://cio.energy.gov/documents/Social_Media_Records_and_You_v2_JD.pdf “Guidance on Social Networking”, Arizona State Library, Archives, and Public Records, June 2010 http://www.lib.az.us/records/documents/pdf/Social_Networking.pdf
Additional resources NARA Bulletin 2011-02, “Guidance on Managing Records in Web 2.0/Social Media Platforms”, October 2010 http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html “A Report on Federal Web 2.0 Use and Value”, National Archives and Records Administration, 2010 http://www.archives.gov/records-mgmt/resources/web2.0-use.pdf
Additional resources Eric Schwartzman’s Social media policy template http://ericschwartzman.com/pr/schwartzman/social-media-policy-template.aspx PDF:   http://ericschwartzman.com/pr/schwartzman/document/Social-Media-Policy.pdf
Additional resources Compliance Building Social Media Policies Database http://www.compliancebuilding.com/about/publications/social-media-policies/ 57 Social Media Policy Examples and Resources http://www.socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-and-resources Web 2.0 Governance Policies and Best Practices http://govsocmed.pbworks.com/w/page/15060450/Web-2-0-Governance-Policies-and-Best-Practices
Additional resources Social Media Governance policy database http://socialmediagovernance.com/policies.php “Analysis of Social Media Policies: Lessons and Best Practices”, Chris Boudreaux, December 2009 http://socialmediagovernance.com

More Related Content

More from Jesse Wilkins

20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptxJesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...Jesse Wilkins
 
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptxJesse Wilkins
 
20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....
20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....
20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....Jesse Wilkins
 
20230427 AIIM23 Top Skills for IM Pros of the Future.pptx
20230427 AIIM23 Top Skills for IM Pros of the Future.pptx20230427 AIIM23 Top Skills for IM Pros of the Future.pptx
20230427 AIIM23 Top Skills for IM Pros of the Future.pptxJesse Wilkins
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptxJesse Wilkins
 
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptxJesse Wilkins
 
20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...
20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...
20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...Jesse Wilkins
 
20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptx
20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptx20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptx
20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
 

More from Jesse Wilkins (20)

20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
 
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
 
20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....
20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....
20230413 ARMA Western Michigan Building Your RIM Program with a RIM Playbook....
 
20230427 AIIM23 Top Skills for IM Pros of the Future.pptx
20230427 AIIM23 Top Skills for IM Pros of the Future.pptx20230427 AIIM23 Top Skills for IM Pros of the Future.pptx
20230427 AIIM23 Top Skills for IM Pros of the Future.pptx
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
 
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
 
20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...
20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...
20230315 SCIE ARMA Building Your RIM Program with a Records Management Playbo...
 
20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptx
20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptx20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptx
20230214 ARMA Chattanooga Building Your RIM-IG Program with a RIM Playbook.pptx
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

20110323 info360 2011 Social Media Governance

  • 1. Developing an Effective Governance Framework for Social Media Jesse Wilkins, CRM AIIM International March 23, 2011
  • 2. It’s just a fad…. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner
  • 3. Agenda Introduction Structural elements of a comprehensive social media policy Social media policy statements
  • 5. Prohibition is not realistic
  • 6. “A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.”
  • 7. Why a governance framework? Ensures that employees know what is expected of them Provides guidelines for being more effective Reduces risk of someone posting inappropriate content Addresses legal and operational concerns
  • 8. The governance framework Management Governance roles and responsibilities Organization Groups and structures required to manage information Policy Processes and standards for managing information and processes
  • 9. Management Provides support for social media initiative(s) Determines need for policy guidance Determines need for enterprise solutions Supports – or doesn’t – transformation efforts
  • 10. Organization Governance roles required to ensure compliance with the framework Includes usual suspects… Also includes new roles Social media strategist Community managers Moderators
  • 11. About the social media policy Social content is just another form of content Policy should provide a framework applicable to most or all social media tools – and to other content/communication-related technologies as well DON’T write e.g. a Facebook policy, a Twitter policy, etc.
  • 12. Best Buy Social Media Policy Be smart. Be respectful. Be human. http://www.bby.com/2010/01/20/best-buy-social-media-guidelines/
  • 13. Zappos Twitter Policy Be real and use your best judgment.
  • 14. Policy 2.0 – in 140 characters Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.”
  • 15. Structural elements of a social media policy
  • 16. Policy elements Purpose Scope Responsibilities Definitions Policy statements References
  • 17. Purpose and scope This policy has three purposes: Establish definitions relevant to social business technologies Describe usage policies relating to social business technologies Describe security and technology policies relating to social business technologies Scope: This policy is applicable to the entire enterprise.
  • 18. Responsibilities Responsibilities for policy development and maintenance Responsibilities for policy administration Responsibilities for compliance with policy
  • 19. Definitions Uncommon terms Common terms used in an uncommon fashion Acronyms and abbreviations
  • 20. Policy statements Many different elements available Detailed in the next section
  • 21. References List any references used to develop the policy Internal strategic documents Existing policies and procedures Statutes and regulations Publications Examples and templates
  • 22. Social media policy statements
  • 23. Official vs. unofficial Link to social media policy
  • 25. Look & feel guidelines Account details Handle Picture – including corporate logo usage Bio Contact information Friends/buddies/contacts Groups/fans/likes
  • 26. Content guidelines Whether posts will require approval Pictures and video By the organization By third parties Links (i.e. “sharing”) Applications and widgets Likes, retweets, etc.
  • 27. Personal access and usage Access to personal accounts using organizational resources (time, computers, network, etc.) Access to sites using personal devices (iPhone, tablet, etc.)
  • 28. Inappropriate usage Offensive content Disparagement of the organization – or of competitors or others Slander or libel Sexual content Solicitations of commerce Threats Illegal activity Violation of copyright
  • 29. Sensitive materials Personnel-related information Financial information Confidential information Health information If you wouldn’t post it to your website or send via email, don’t post to FB or send via Twitter.
  • 31. Official response to third-party sites Response to comments
  • 32. Governmental considerations Links to primary site (“content of record”) Whether comments are allowed And monitored Public records act notices Public safety and monitoring issues
  • 33. Whether the account is monitored for actionable content (screenshot) Public records
  • 35. For more information Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins
  • 36. Social Business Roadmap Describes steps to implement social business effectively Based on experience of the authors, the broader AIIM community, and dozens of published case studies and resources Available under Creative Commons license at http://www.aiim.org/roadmap
  • 37. Social Business Strategy Workshop Schedule a 1-day workshop to learn how your organization can use social technologies to redefine and improve business processes Briefing objectives: Identify how you can use social technologies to improve communication, marketing, sales, support, R&D, and HR. Document business opportunities and ROI Identify necessary functionality and possible solutions Outline required governance structure to minimize risks and ensure regulatory compliance Get a roadmap for how to implement social processes and technologies effectively www.aiim.org/workshop
  • 38. Additional resources “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”, Patricia Franks, Ph.D., IBM Center for The Business of Government, 2010 “Electronic Records Management: Blogs, Wikis, Facebook, Twitter, & Managing Public Records”, Washington State Archives, September 2009
  • 39. Additional resources “Managing Social Media Records”, U.S. Department of Energy, September 2010 http://cio.energy.gov/documents/Social_Media_Records_and_You_v2_JD.pdf “Guidance on Social Networking”, Arizona State Library, Archives, and Public Records, June 2010 http://www.lib.az.us/records/documents/pdf/Social_Networking.pdf
  • 40. Additional resources NARA Bulletin 2011-02, “Guidance on Managing Records in Web 2.0/Social Media Platforms”, October 2010 http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html “A Report on Federal Web 2.0 Use and Value”, National Archives and Records Administration, 2010 http://www.archives.gov/records-mgmt/resources/web2.0-use.pdf
  • 41. Additional resources Eric Schwartzman’s Social media policy template http://ericschwartzman.com/pr/schwartzman/social-media-policy-template.aspx PDF: http://ericschwartzman.com/pr/schwartzman/document/Social-Media-Policy.pdf
  • 42. Additional resources Compliance Building Social Media Policies Database http://www.compliancebuilding.com/about/publications/social-media-policies/ 57 Social Media Policy Examples and Resources http://www.socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-and-resources Web 2.0 Governance Policies and Best Practices http://govsocmed.pbworks.com/w/page/15060450/Web-2-0-Governance-Policies-and-Best-Practices
  • 43. Additional resources Social Media Governance policy database http://socialmediagovernance.com/policies.php “Analysis of Social Media Policies: Lessons and Best Practices”, Chris Boudreaux, December 2009 http://socialmediagovernance.com

Editor's Notes

  1. The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
  2. Moving into mainstream
  3. Here’s a very succinct Twitter policy from a blog by an HR-focused law firm, GruntledEmployees.com. “Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.””Pretty good, right? Now, you could argue that this policy is missing a lot of the stuff I just mentioned. But I don’t know that I agree – authentic, professional, discreet, represent us well – that’s pretty close. And regardless of what you think might be missing, I’d argue that if your employees follow this policy, you won’t have many issues with them. And note that this policy is itself Tweetable. [twitter] Policy 2.0 – in 140 characters, courtesy of gruntledemployees.com. http://is.gd/8BpjT[/twitter]
  4. Official vs. unofficial includes: Disclaimers (this is or is not official; disclaimer of responsibility if it isn’t)Whether approval is required to create an account (official only)
  5. At this point I’d be pleased to entertain your questions.