SlideShare une entreprise Scribd logo
1  sur  7
Running Head: GROUP DECISION MAKING PROCESS
Group Decision Making Process: Security Company
Name:
Institutional Affiliation:
Date of Submission
Group Decision Making Process 1
Group Decision Making Process
Group decision making is a process whereby individuals collectively arrive at a choice
from available alternatives. Everyone affected by the decision contributes to the outcome of the
choice. The main aim of this form of decision making process is to enhance group cohesion and
practice of democracy. More so, group decisions are more polar and tend to be effective unlike
individual based decisions which could bring forth conflicts of interests. Under normal
procedures, there are policies which cannot be affected by decisions. These policies form the
fundamental basis of any decision to be implemented.
Under normal circumstance social media will remain to be protected. Networking sites
like Twitter and Facebook communicate to a large number of people. The network is not just for
college students but a wider age gap that appreciates internet as a means of communication. In
this case, firms should consider how to modify their policies that will be acceptable by everyone.
Use of technology in various organizations is growing at a rapid stage. This requires a policy
which ensures guidance with concerns to the using of social networking tools while in the
working environment. However, they should consider innovation is on a rapid space thus needed
to take advantage of that to develop quality and safe channels in future. Social networking policy
applies specifically when users of social networking sites try to advance their suspicious ways
with the intention of keeping the private life of other people in danger.
 The general requirements include the following
 Workers should consider protecting confidential information of their customers every
time. Confidential information includes the use of social networking tools by the client.
This would help retain sensitive information intact.
Group Decision Making Process 2
 Workers of the social networking company should be courteous and professional every
time especially times when they represent the organization. This may include use of
social networking tools to argue in favour of the organization. They should also not make
any defamatory remarks about their clients.
 Workers of the social networking company should be careful when making
advertisements over their organization. This may include statements made through emails
or personal sites concerning the social networking company.
 Workers working in the social networking company should seek advice before
performing any activity. In case they require clarifications, they should inquire from their
superiors who understand better. Concerns should be raised concerning the use of the
social networking tools.
Use of social networking tools while at the company
Use of social networking tools by workers will be subject to identified guidelines:
i. Workers should utilize social networking tools in conjunction with the how they conduct
their business
ii. Workers should not use social networking tools for personal interest except during the
time they are not in office during work time.
iii. Workers should not use social networking tools for activities not related to their job
description.
iv. Workers should not use social discuss policies of the company or practices within the
company with a third party without clearing with the management concerned. Workers
Group Decision Making Process 3
may discuss practices of the organization with a prospective client but using a private
channel.
v. Workers should not use social networking tools while distributing chain letters.
The company has the rights of monitoring, accessing, retrieving, reading and disclosing
communication by the worker with or without notice to the worker. Accordingly, they should not
be given any rights of privacy in using the social networking tools on facilities that the company
uses. The firm however, will not be obligated in ensuring against authorized access to the use of
social networking sites.
Advertising
1. Workers normally advertise their properties using social networking tool should abide by
the provision as contained in the License Law. The rules give the code of ethics
surrounding the working environment.
2. Workers will comply with the requirements of the Federal especially when using social
networking tools in transmitting messages in electronic form.
3. Workers will avoid using deceptive key words or some devices in driving traffic while at
the internet site.
Collection of information
1. Workers should not collect information connected to the clients through use of social
networking tools unless they information the client or informing consumers over the issue
at hand.
Group Decision Making Process 4
Emailing
1. Workers should follow the set provisions in the federal act after amending the policy
2. Workers should follow provisions given in the federal Act after amending the policy
3. Workers should ensure that they check clearly any information they send or post via the
social networking site the targeted customer.
4. Workers should print the information posted in the social networking site to validate the
legality of the information in case it interferes with the comfort of people.
Blogging
1. Workers should engage in blogging in relation to the information of their company. They
need to follow policies and procedures given by the code of ethics of the company.
2. In a case the workers want to establish a blog, and then they should consult with their
management to higher an expertise to perform such activity.
Copyright and protected information
1. Workers should not copy received information through the social networking tools
without consent from the author. In a case permission is granted with conditions, they
should adhere to the conditions given.
2. Workers should recognize that the firm owns copyright to organizational information as
contained in the web site. Copy of the information for other use not related to the
company would require consent from the management.
Group Decision Making Process 5
Policy changes
The company has the rights of changing, modifying or amending the given policy in any manner
accepted by the authorities.
Group Decision Making Flowchart
Group Decision Making Process 6
References
Beesley, C. (2014). How to Craft a Social Media Policy for Your Small Business. Retrieved June
20, 2014, from http://www.sba.gov/community/blogs/how-craft-social-media-policy-
your-small-business
Government of Canada. (2014). CONSTITUTION ACT, 1982. Retrieved June 20, 2014, from
http://laws-lois.justice.gc.ca/eng/Const/page-15.html
Hoang, D. (2009). Social Media Policies and Procedures . Retrieved June 20, 2014, from
http://www.danielhoang.com/2009/02/21/social-media-policies-and-procedures/
SSS, REALTORS. (n.d.). SOCIAL MEDIA POLICY. Retrieved June 20, 2014, from
http://www.illinoisrealtor.org/sites/illinoisrealtor.org/files/Legal/socialmediapolicy.pdf

Contenu connexe

Tendances

Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
Stites & Harbison
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security Presentation
SchleighS
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS
 
Social media
Social mediaSocial media
Social media
Sheila A
 

Tendances (20)

Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Workshop 2 - generic social media policy
Workshop 2 - generic social media policyWorkshop 2 - generic social media policy
Workshop 2 - generic social media policy
 
Generic social media policy
Generic social media policyGeneric social media policy
Generic social media policy
 
Case 2.2 : Facebook It's About the Money
Case 2.2 : Facebook It's About the MoneyCase 2.2 : Facebook It's About the Money
Case 2.2 : Facebook It's About the Money
 
Presentation: Social Media & HR
Presentation: Social Media & HRPresentation: Social Media & HR
Presentation: Social Media & HR
 
Social networking
Social networkingSocial networking
Social networking
 
Case 2 facebook it's about the money 2
Case 2 facebook it's about the money 2Case 2 facebook it's about the money 2
Case 2 facebook it's about the money 2
 
Facebook presentation
Facebook presentationFacebook presentation
Facebook presentation
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Social Media
Social MediaSocial Media
Social Media
 
Social media- Kate
Social media- KateSocial media- Kate
Social media- Kate
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security Presentation
 
Infraworks social media policy v1.0
Infraworks social media policy v1.0Infraworks social media policy v1.0
Infraworks social media policy v1.0
 
Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social media
Social mediaSocial media
Social media
 
Metro Social Media Policy
Metro Social Media PolicyMetro Social Media Policy
Metro Social Media Policy
 
Assignment modified
Assignment modifiedAssignment modified
Assignment modified
 
Social Media for Internal Communications
Social Media for Internal CommunicationsSocial Media for Internal Communications
Social Media for Internal Communications
 

En vedette

Investing in-renewables
Investing in-renewablesInvesting in-renewables
Investing in-renewables
Mauro Bassotti
 
Costa Concordia: March 2012
Costa Concordia: March 2012Costa Concordia: March 2012
Costa Concordia: March 2012
Vijaya Prasad
 
Fire wall
Fire wallFire wall
Fire wall
ICTU
 

En vedette (17)

Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)
 
Investing in-renewables
Investing in-renewablesInvesting in-renewables
Investing in-renewables
 
Tailieu.vncty.com dt22
Tailieu.vncty.com   dt22Tailieu.vncty.com   dt22
Tailieu.vncty.com dt22
 
how to be friends with Search Engine ( SEO training by DGhanma ) Introduction
how to be friends with Search Engine ( SEO training by DGhanma ) Introductionhow to be friends with Search Engine ( SEO training by DGhanma ) Introduction
how to be friends with Search Engine ( SEO training by DGhanma ) Introduction
 
Partner Community Office Hours (May 6, 2015)
Partner Community Office Hours (May 6, 2015)Partner Community Office Hours (May 6, 2015)
Partner Community Office Hours (May 6, 2015)
 
Costa Concordia: March 2012
Costa Concordia: March 2012Costa Concordia: March 2012
Costa Concordia: March 2012
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh Duggal
 
Fire wall
Fire wallFire wall
Fire wall
 
Presentation yoga secrets
Presentation yoga secretsPresentation yoga secrets
Presentation yoga secrets
 
Christmas 2005 -2006
Christmas  2005 -2006Christmas  2005 -2006
Christmas 2005 -2006
 
Civil Rights News, Photos and Videos
Civil Rights News, Photos and VideosCivil Rights News, Photos and Videos
Civil Rights News, Photos and Videos
 
Inheritance tax in spain
Inheritance tax in spainInheritance tax in spain
Inheritance tax in spain
 
[UX Project] C-Saw
[UX Project] C-Saw[UX Project] C-Saw
[UX Project] C-Saw
 
Mobile websites and mass communication media.
Mobile websites and mass communication media.Mobile websites and mass communication media.
Mobile websites and mass communication media.
 
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
 
Kontakt fizyczny
Kontakt fizycznyKontakt fizyczny
Kontakt fizyczny
 
Routine style by Duardox
Routine style by DuardoxRoutine style by Duardox
Routine style by Duardox
 

Similaire à Order #32788581

Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10
Barbara Richman, SPHR
 
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxSOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
whitneyleman54422
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
todd271
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
NICSA
 
Legal matters in social media
Legal matters in social mediaLegal matters in social media
Legal matters in social media
Ishmeet Bedi
 

Similaire à Order #32788581 (20)

Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business
 
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxSOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
 
Social Media at Work Place Training Manual
Social Media at Work Place Training ManualSocial Media at Work Place Training Manual
Social Media at Work Place Training Manual
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Social Web Policy Guide
Social Web Policy GuideSocial Web Policy Guide
Social Web Policy Guide
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
RegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policyRegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policy
 
Compliance Webinar Feb 2012
Compliance Webinar Feb 2012Compliance Webinar Feb 2012
Compliance Webinar Feb 2012
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Legal matters in social media
Legal matters in social mediaLegal matters in social media
Legal matters in social media
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & Employees
 
Social Media Policy Template
Social Media Policy TemplateSocial Media Policy Template
Social Media Policy Template
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 

Plus de gracyatpassessays (9)

Order 31645285
Order 31645285Order 31645285
Order 31645285
 
Order 31614197
Order 31614197Order 31614197
Order 31614197
 
Order 26626243
Order 26626243Order 26626243
Order 26626243
 
Order 25448245
Order 25448245Order 25448245
Order 25448245
 
Order 25142695
Order 25142695Order 25142695
Order 25142695
 
Order 25142651
Order 25142651Order 25142651
Order 25142651
 
Order #31088901
Order #31088901Order #31088901
Order #31088901
 
Order #29836407
Order #29836407Order #29836407
Order #29836407
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Order #32788581

  • 1. Running Head: GROUP DECISION MAKING PROCESS Group Decision Making Process: Security Company Name: Institutional Affiliation: Date of Submission
  • 2. Group Decision Making Process 1 Group Decision Making Process Group decision making is a process whereby individuals collectively arrive at a choice from available alternatives. Everyone affected by the decision contributes to the outcome of the choice. The main aim of this form of decision making process is to enhance group cohesion and practice of democracy. More so, group decisions are more polar and tend to be effective unlike individual based decisions which could bring forth conflicts of interests. Under normal procedures, there are policies which cannot be affected by decisions. These policies form the fundamental basis of any decision to be implemented. Under normal circumstance social media will remain to be protected. Networking sites like Twitter and Facebook communicate to a large number of people. The network is not just for college students but a wider age gap that appreciates internet as a means of communication. In this case, firms should consider how to modify their policies that will be acceptable by everyone. Use of technology in various organizations is growing at a rapid stage. This requires a policy which ensures guidance with concerns to the using of social networking tools while in the working environment. However, they should consider innovation is on a rapid space thus needed to take advantage of that to develop quality and safe channels in future. Social networking policy applies specifically when users of social networking sites try to advance their suspicious ways with the intention of keeping the private life of other people in danger.  The general requirements include the following  Workers should consider protecting confidential information of their customers every time. Confidential information includes the use of social networking tools by the client. This would help retain sensitive information intact.
  • 3. Group Decision Making Process 2  Workers of the social networking company should be courteous and professional every time especially times when they represent the organization. This may include use of social networking tools to argue in favour of the organization. They should also not make any defamatory remarks about their clients.  Workers of the social networking company should be careful when making advertisements over their organization. This may include statements made through emails or personal sites concerning the social networking company.  Workers working in the social networking company should seek advice before performing any activity. In case they require clarifications, they should inquire from their superiors who understand better. Concerns should be raised concerning the use of the social networking tools. Use of social networking tools while at the company Use of social networking tools by workers will be subject to identified guidelines: i. Workers should utilize social networking tools in conjunction with the how they conduct their business ii. Workers should not use social networking tools for personal interest except during the time they are not in office during work time. iii. Workers should not use social networking tools for activities not related to their job description. iv. Workers should not use social discuss policies of the company or practices within the company with a third party without clearing with the management concerned. Workers
  • 4. Group Decision Making Process 3 may discuss practices of the organization with a prospective client but using a private channel. v. Workers should not use social networking tools while distributing chain letters. The company has the rights of monitoring, accessing, retrieving, reading and disclosing communication by the worker with or without notice to the worker. Accordingly, they should not be given any rights of privacy in using the social networking tools on facilities that the company uses. The firm however, will not be obligated in ensuring against authorized access to the use of social networking sites. Advertising 1. Workers normally advertise their properties using social networking tool should abide by the provision as contained in the License Law. The rules give the code of ethics surrounding the working environment. 2. Workers will comply with the requirements of the Federal especially when using social networking tools in transmitting messages in electronic form. 3. Workers will avoid using deceptive key words or some devices in driving traffic while at the internet site. Collection of information 1. Workers should not collect information connected to the clients through use of social networking tools unless they information the client or informing consumers over the issue at hand.
  • 5. Group Decision Making Process 4 Emailing 1. Workers should follow the set provisions in the federal act after amending the policy 2. Workers should follow provisions given in the federal Act after amending the policy 3. Workers should ensure that they check clearly any information they send or post via the social networking site the targeted customer. 4. Workers should print the information posted in the social networking site to validate the legality of the information in case it interferes with the comfort of people. Blogging 1. Workers should engage in blogging in relation to the information of their company. They need to follow policies and procedures given by the code of ethics of the company. 2. In a case the workers want to establish a blog, and then they should consult with their management to higher an expertise to perform such activity. Copyright and protected information 1. Workers should not copy received information through the social networking tools without consent from the author. In a case permission is granted with conditions, they should adhere to the conditions given. 2. Workers should recognize that the firm owns copyright to organizational information as contained in the web site. Copy of the information for other use not related to the company would require consent from the management.
  • 6. Group Decision Making Process 5 Policy changes The company has the rights of changing, modifying or amending the given policy in any manner accepted by the authorities. Group Decision Making Flowchart
  • 7. Group Decision Making Process 6 References Beesley, C. (2014). How to Craft a Social Media Policy for Your Small Business. Retrieved June 20, 2014, from http://www.sba.gov/community/blogs/how-craft-social-media-policy- your-small-business Government of Canada. (2014). CONSTITUTION ACT, 1982. Retrieved June 20, 2014, from http://laws-lois.justice.gc.ca/eng/Const/page-15.html Hoang, D. (2009). Social Media Policies and Procedures . Retrieved June 20, 2014, from http://www.danielhoang.com/2009/02/21/social-media-policies-and-procedures/ SSS, REALTORS. (n.d.). SOCIAL MEDIA POLICY. Retrieved June 20, 2014, from http://www.illinoisrealtor.org/sites/illinoisrealtor.org/files/Legal/socialmediapolicy.pdf