SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential1
98% of businesses in U.S. are using Social Media
22% of U.S. internet time is spent on Social Media
An introduction to your
Social Media
Compliance Requirements
From Julian Ranger
Chairman & Founder
Nielson NetView June 2010Software & Information Industry Association Report Feb 2013
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential2
For any one of these reasons you need:
• a Social Media Policy defining best
practice for your organisation
• a record of all social media activity
undertaken by or on behalf of your
business
• to anticipate legal & regulatory
requests
• to monitor internal activities too
#susanalbumparty
Some of the potential legal issues with SocialMedia use:
• Regulated industry compliance with regulations
• Confidentiality breaches, data protection
• Inc early release of protected information (e.g. Netflix, M&S)
• Inc customer data
• Copyright, Trademark & IP infringement
• Use of data gathered from social networks
• Privacy, defamation security, IP, employment practices
• Inappropriate use
• Libel, offensive, defamation, harassment (sexual & other),
discrimination
• Regulated inappropriate use
• Inc. Unfair promotional claims/advertising activities & disclosing
company you work for when tweet promotion or someone endorses
you for money
• CAP code & Legislation
• Sweepstakes/competition re T&Cs needed, & ensure not contravene
gambling laws
• Negligence
• Assuming a duty, not following through
• Contract implication - ending up in inadvertent enforceable contract
Example non-legal internal issues with SocialMedia use:
• Ownership of brand profiles, contacts and tome of brand
• Information leaks, confidential and sensitive
• Password security
• Rants, swearing, inappropriate comments
• Company/personal account boundaries & rules
Why is Social Media Compliance an issue you need to be aware of?
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential3
Send out messages
People engage
You respond
ASocialMediaWorkflow
Transmit Mentions Engagement
People mention you
or talk about you
You respond
What affect does this
engagement have on
you?
Record
Meet your legal
social media
archiving needs
• SMEs have a variety of tools to use to Transmit social media messages and to
monitor what others are saying about subjects of interest/their company
• However, for Engagement Monitoring there are few that cover all channels
• Those that do are generally complex and costly
• For Recording most do not provide ability to actually look at recorded data
?
?
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential4
Use SocialSafe to simplifyyourdispersed SocialMediaWorkflow
Send out messages
People engage
You respond
Transmit Mentions Engagement
People mention you
or talk about you
You respond
What effect does this
engagement have on
you?
Record
Meet your legal
social media
archiving needs
• SocialSafe creates your Business’ social media library for each user
• Every tweet, post, friend, follower, like, comment ...
• Aggregated into one private offline archive and library that you own and control
• Browsable, searchable, accessible - do more!
• Currently supports Facebook, Facebook Pages, Twitter, LinkedIn, Google+,
RSS (Blogs), Instagram, Pinterest and Viadeo
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential5
HowSocialSafeworks
Users’ content is ONLY stored on their own
PCs or Macs making SocialSafe the only
solution that fully adheres to all social
network terms of use and provides 100%
user privacy
Consolidated
library view of
all your social
network profiles
All data organised into
separate accounts/media
types and aggregated for
display & interaction
Search across
multiple social
network profiles
instantly
Plus: Insights & Collections to provide efficient tracking and
organisational tools
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential6
Calendar Journal Photos Contacts
Centralise and record allyoursocialnetwork data
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential7
Most engagement Most active Reach Export
Get Insights and monitorengagement
In our world every business can own, control
and do more with their social interactions
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential8
SocialSafewillbecomeyoursocialmedia libraryforyou andyourbusiness
Recording and engagement monitoring
foryourdispersed socialmedia users
Donna Serdula,
Founder of Vision Board Media
The mere fact that it aggregates all of your
social networks is amazing. I really love
SocialSafe for its search .. it's so hard to find
anything on Facebook
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential9
We've secured hundreds ofthousands ofsocialnetwork accounts
and are loved bythousands ofsocialmedia experts
Michelle Dear, Editor, Richmond Publishing
I honestly don't understand why your
product isn't listed as "best of the best" in
social media backup utilities
David Blumenstein,
Founder & Director of Tekworks
Thanks for helping me round up all my
social media data, its like herding cats, but
you guys let me do it economically #relief
DocMurdock, CEO of DocMurdock.com &
Former PIXAR Macintosh Systems Engineer
First Impression: HOLY CRAP!!! This ROCKS!
More later in a full review. Quick, easy...Very
COOL. Definitely DocMurdock Approved!
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential10
• You must record your social media activities and engagement
• Most tools are complex, expensive
• SocialSafe is an essential app for all social media users
• Enables assurance and compliance monitoring & enforcement
• Adheres to social network terms & condition
• Cost effective, and minimal training requirement
In Summary
• Creates an archive record of all interactions
• consolidated across multiple accounts
• available off-line
• Creates an address book of fans, followers, contacts
• Provides a search capability across all data
• Provides smart export options for analysis
Incredibly cost effective! £20 per user, per year
Recording and engagement monitoring foryoursocialmedia users

Contenu connexe

Tendances

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceUnified Communications Online
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlookPeter Hewer
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 

Tendances (20)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
SOX: A Short Guide to Compliance
SOX: A Short Guide to ComplianceSOX: A Short Guide to Compliance
SOX: A Short Guide to Compliance
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
 
HIPAA Compliance: What you need to know
HIPAA Compliance: What you need to knowHIPAA Compliance: What you need to know
HIPAA Compliance: What you need to know
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 

Similaire à SocialSafe for SMEs/SMBs - V1

SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesJulian Ranger
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Social Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media Performance Group
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stackNexgate
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF Social Media World Forum
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCloudIDSummit
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the BadXavier Mertens
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxT Tanujha
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011iohann Le Frapper
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseJay McLaughlin
 
MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]CanadaHelps / MyCharityConnects
 
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]CanadaHelps / MyCharityConnects
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
 

Similaire à SocialSafe for SMEs/SMBs - V1 (20)

SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Social Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and Implications
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stack
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social media-assessment
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 
MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]
 
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT Professionals
 

Dernier

Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Dernier (20)

Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 

SocialSafe for SMEs/SMBs - V1

  • 1. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential1 98% of businesses in U.S. are using Social Media 22% of U.S. internet time is spent on Social Media An introduction to your Social Media Compliance Requirements From Julian Ranger Chairman & Founder Nielson NetView June 2010Software & Information Industry Association Report Feb 2013
  • 2. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential2 For any one of these reasons you need: • a Social Media Policy defining best practice for your organisation • a record of all social media activity undertaken by or on behalf of your business • to anticipate legal & regulatory requests • to monitor internal activities too #susanalbumparty Some of the potential legal issues with SocialMedia use: • Regulated industry compliance with regulations • Confidentiality breaches, data protection • Inc early release of protected information (e.g. Netflix, M&S) • Inc customer data • Copyright, Trademark & IP infringement • Use of data gathered from social networks • Privacy, defamation security, IP, employment practices • Inappropriate use • Libel, offensive, defamation, harassment (sexual & other), discrimination • Regulated inappropriate use • Inc. Unfair promotional claims/advertising activities & disclosing company you work for when tweet promotion or someone endorses you for money • CAP code & Legislation • Sweepstakes/competition re T&Cs needed, & ensure not contravene gambling laws • Negligence • Assuming a duty, not following through • Contract implication - ending up in inadvertent enforceable contract Example non-legal internal issues with SocialMedia use: • Ownership of brand profiles, contacts and tome of brand • Information leaks, confidential and sensitive • Password security • Rants, swearing, inappropriate comments • Company/personal account boundaries & rules Why is Social Media Compliance an issue you need to be aware of?
  • 3. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential3 Send out messages People engage You respond ASocialMediaWorkflow Transmit Mentions Engagement People mention you or talk about you You respond What affect does this engagement have on you? Record Meet your legal social media archiving needs • SMEs have a variety of tools to use to Transmit social media messages and to monitor what others are saying about subjects of interest/their company • However, for Engagement Monitoring there are few that cover all channels • Those that do are generally complex and costly • For Recording most do not provide ability to actually look at recorded data ? ?
  • 4. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential4 Use SocialSafe to simplifyyourdispersed SocialMediaWorkflow Send out messages People engage You respond Transmit Mentions Engagement People mention you or talk about you You respond What effect does this engagement have on you? Record Meet your legal social media archiving needs • SocialSafe creates your Business’ social media library for each user • Every tweet, post, friend, follower, like, comment ... • Aggregated into one private offline archive and library that you own and control • Browsable, searchable, accessible - do more! • Currently supports Facebook, Facebook Pages, Twitter, LinkedIn, Google+, RSS (Blogs), Instagram, Pinterest and Viadeo
  • 5. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential5 HowSocialSafeworks Users’ content is ONLY stored on their own PCs or Macs making SocialSafe the only solution that fully adheres to all social network terms of use and provides 100% user privacy Consolidated library view of all your social network profiles All data organised into separate accounts/media types and aggregated for display & interaction Search across multiple social network profiles instantly Plus: Insights & Collections to provide efficient tracking and organisational tools
  • 6. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential6 Calendar Journal Photos Contacts Centralise and record allyoursocialnetwork data
  • 7. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential7 Most engagement Most active Reach Export Get Insights and monitorengagement
  • 8. In our world every business can own, control and do more with their social interactions your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential8 SocialSafewillbecomeyoursocialmedia libraryforyou andyourbusiness Recording and engagement monitoring foryourdispersed socialmedia users
  • 9. Donna Serdula, Founder of Vision Board Media The mere fact that it aggregates all of your social networks is amazing. I really love SocialSafe for its search .. it's so hard to find anything on Facebook your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential9 We've secured hundreds ofthousands ofsocialnetwork accounts and are loved bythousands ofsocialmedia experts Michelle Dear, Editor, Richmond Publishing I honestly don't understand why your product isn't listed as "best of the best" in social media backup utilities David Blumenstein, Founder & Director of Tekworks Thanks for helping me round up all my social media data, its like herding cats, but you guys let me do it economically #relief DocMurdock, CEO of DocMurdock.com & Former PIXAR Macintosh Systems Engineer First Impression: HOLY CRAP!!! This ROCKS! More later in a full review. Quick, easy...Very COOL. Definitely DocMurdock Approved!
  • 10. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential10 • You must record your social media activities and engagement • Most tools are complex, expensive • SocialSafe is an essential app for all social media users • Enables assurance and compliance monitoring & enforcement • Adheres to social network terms & condition • Cost effective, and minimal training requirement In Summary • Creates an archive record of all interactions • consolidated across multiple accounts • available off-line • Creates an address book of fans, followers, contacts • Provides a search capability across all data • Provides smart export options for analysis Incredibly cost effective! £20 per user, per year Recording and engagement monitoring foryoursocialmedia users