SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
ACCEPTABLE USE
POLICY:
Essential components
of a social media
policy to manage social
media risk
Presented by: Dominic Kornu
October 29, 2021
Covid-19 and Social Media
The COVID-19 pandemic has demonstrated how the spread of misinformation,
which is intensified on social media and other digital platforms, is proving to be
as much a threat to businesses and organisations.
Advancements in technology and social media create opportunities to keep
people safe, informed and ultimately connected. It has become difficult for
organizations to resist the use of social media as a core part of their
communication and marketing strategies.
However, these organisations need to ensure effective systems are put in place
to prevent – and resolve – risks that may arise as a result of using social media.
Social Media risks
Reputational Risk (PR disaster):
▪ unattended social media accounts
▪ human error
▪ imposter accounts
▪ hacked accounts
Security Risk:
▪ vulnerable 3rd party applications
▪ phishing attacks and scams
▪ unsecured mobile phones
Social Media policy
A social media policy basically spells out how an organization and its employees
should conduct themselves while navigating the web. It helps protect the
organization’s online reputation and encourages employees to also get involved in
sharing about the organisation with their online connections.
This should be simple, clear, accessible, and continually updated.
It is not meant to stifle employees but to ensure no negative surprises are
encountered in future.
Why have a Social Media policy?
A social media policy accomplishes the following:
Clearly sets expectations Protect brand reputation Increase employee advocacy
Prevents security breach
Prevents possible PR crisis
Components of a Social Media policy -1
Roles and responsibilities:
1. Who owns the organization’s accounts?
2. Specify duties: advertisements, security, strategy, social listening
Security protocols:
1. Passwords to Social Media accounts must be changed frequently. Employ 2FA. Do not use the
same password for all accounts.
2. Tighten privacy settings
3. Monitor SM postings/accounts, especially when you outsource it
4. Update of software and devices
Components of a Social Media policy -2
Crisis management plan:
1. emergency contact list
2. internal communication guide
3. ensure responses to negative posts/mentions, or queries are handled by authorized individuals.
You can add a contact to be reached in such cases.
Enhanced employee advocacy
1. develop a content bank for them to choose from
Components of a Social Media policy -3
1. Employees who are let go should not continue having access to company’s Social
Media accounts
2. Keep an open mind when engaging in online conversations. Always remember
cultural differences and ideologies.
3. Separate business with personal posts. When in doubt, DO NOT post. Be aware
that whatever you share is permanent.
4. Be transparent when engaging online. If you’re part of the social media team, do
end every post with your assigned intitials/name, or an official hashtag.
5. DO NOT use official device to log in to a personal account
What to do in drafting SM policy
1. Research the systems your organization interacts with
2. Which roles would mostly be relevant in drafting the policy? Set up a system to
approve posts.
3. Bring in auditors to show how to control the management of Social Media
4. Where would the policy be hosted? Intranet? On local PCs?
THANK YOU

Weitere ähnliche Inhalte

Ähnlich wie ESSENTIAL SOCIAL MEDIA POLICY COMPONENTS

social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptxRACHANAB18
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
FDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaFDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaSerge Milman
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
Lesson 1 Introduction to Media and Information Literacy
Lesson 1 Introduction to Media and Information LiteracyLesson 1 Introduction to Media and Information Literacy
Lesson 1 Introduction to Media and Information Literacyraffy ursulum
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)CR Group
 
#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14
#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14
#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14Paige Jarreau
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information LiteracyKatherine Villaluna
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Social Media & Crisis Management--C4CS--Schmidt--DRG Interview
Social Media & Crisis Management--C4CS--Schmidt--DRG InterviewSocial Media & Crisis Management--C4CS--Schmidt--DRG Interview
Social Media & Crisis Management--C4CS--Schmidt--DRG InterviewOliver S. Schmidt
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013KINSHIP digital
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & EmployeesJohn Theriault
 

Ähnlich wie ESSENTIAL SOCIAL MEDIA POLICY COMPONENTS (20)

social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social Media Applications.pdf
Social Media Applications.pdfSocial Media Applications.pdf
Social Media Applications.pdf
 
FDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaFDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social media
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Lesson 1 Introduction to Media and Information Literacy
Lesson 1 Introduction to Media and Information LiteracyLesson 1 Introduction to Media and Information Literacy
Lesson 1 Introduction to Media and Information Literacy
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14
#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14
#Manship4002 Ethics and Crisis Communications via Social Media - Lecture 14
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Social Media & Crisis Management--C4CS--Schmidt--DRG Interview
Social Media & Crisis Management--C4CS--Schmidt--DRG InterviewSocial Media & Crisis Management--C4CS--Schmidt--DRG Interview
Social Media & Crisis Management--C4CS--Schmidt--DRG Interview
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & Employees
 

Mehr von Kofi Kafui Kornu

Roles of Rotary club leaders
Roles of Rotary club leadersRoles of Rotary club leaders
Roles of Rotary club leadersKofi Kafui Kornu
 
A talk on Rotary's Presidential citation
A talk on Rotary's Presidential citationA talk on Rotary's Presidential citation
A talk on Rotary's Presidential citationKofi Kafui Kornu
 
Youth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & ChallengesYouth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & ChallengesKofi Kafui Kornu
 
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoringRhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoringKofi Kafui Kornu
 
Leadership and Professional Development
Leadership and Professional DevelopmentLeadership and Professional Development
Leadership and Professional DevelopmentKofi Kafui Kornu
 
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)Kofi Kafui Kornu
 
Fake news -- a conversation
Fake news -- a conversationFake news -- a conversation
Fake news -- a conversationKofi Kafui Kornu
 
WhatsApp and its security issues
WhatsApp and its security issuesWhatsApp and its security issues
WhatsApp and its security issuesKofi Kafui Kornu
 
Online Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a NetizenOnline Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a NetizenKofi Kafui Kornu
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & ChallengesKofi Kafui Kornu
 

Mehr von Kofi Kafui Kornu (12)

Roles of Rotary club leaders
Roles of Rotary club leadersRoles of Rotary club leaders
Roles of Rotary club leaders
 
A talk on Rotary's Presidential citation
A talk on Rotary's Presidential citationA talk on Rotary's Presidential citation
A talk on Rotary's Presidential citation
 
Youth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & ChallengesYouth service - Experiences, Benefits & Challenges
Youth service - Experiences, Benefits & Challenges
 
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoringRhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
RhinoStreet -- A Crowdsourcing platform for Road Toll monitoring
 
Leadership and Professional Development
Leadership and Professional DevelopmentLeadership and Professional Development
Leadership and Professional Development
 
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
RCSC Plan of Action for 2019-2020 Rotary Year (1st half)
 
Fake news -- a conversation
Fake news -- a conversationFake news -- a conversation
Fake news -- a conversation
 
Rotary formula
Rotary formula Rotary formula
Rotary formula
 
WhatsApp and its security issues
WhatsApp and its security issuesWhatsApp and its security issues
WhatsApp and its security issues
 
Online Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a NetizenOnline Safety -- Securing your space as a Netizen
Online Safety -- Securing your space as a Netizen
 
Technical glitch, or ...?
Technical glitch, or ...?Technical glitch, or ...?
Technical glitch, or ...?
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & Challenges
 

Kürzlich hochgeladen

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 

Kürzlich hochgeladen (9)

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 

ESSENTIAL SOCIAL MEDIA POLICY COMPONENTS

  • 1. ACCEPTABLE USE POLICY: Essential components of a social media policy to manage social media risk Presented by: Dominic Kornu October 29, 2021
  • 2. Covid-19 and Social Media The COVID-19 pandemic has demonstrated how the spread of misinformation, which is intensified on social media and other digital platforms, is proving to be as much a threat to businesses and organisations. Advancements in technology and social media create opportunities to keep people safe, informed and ultimately connected. It has become difficult for organizations to resist the use of social media as a core part of their communication and marketing strategies. However, these organisations need to ensure effective systems are put in place to prevent – and resolve – risks that may arise as a result of using social media.
  • 3. Social Media risks Reputational Risk (PR disaster): ▪ unattended social media accounts ▪ human error ▪ imposter accounts ▪ hacked accounts Security Risk: ▪ vulnerable 3rd party applications ▪ phishing attacks and scams ▪ unsecured mobile phones
  • 4. Social Media policy A social media policy basically spells out how an organization and its employees should conduct themselves while navigating the web. It helps protect the organization’s online reputation and encourages employees to also get involved in sharing about the organisation with their online connections. This should be simple, clear, accessible, and continually updated. It is not meant to stifle employees but to ensure no negative surprises are encountered in future.
  • 5. Why have a Social Media policy? A social media policy accomplishes the following: Clearly sets expectations Protect brand reputation Increase employee advocacy Prevents security breach Prevents possible PR crisis
  • 6. Components of a Social Media policy -1 Roles and responsibilities: 1. Who owns the organization’s accounts? 2. Specify duties: advertisements, security, strategy, social listening Security protocols: 1. Passwords to Social Media accounts must be changed frequently. Employ 2FA. Do not use the same password for all accounts. 2. Tighten privacy settings 3. Monitor SM postings/accounts, especially when you outsource it 4. Update of software and devices
  • 7. Components of a Social Media policy -2 Crisis management plan: 1. emergency contact list 2. internal communication guide 3. ensure responses to negative posts/mentions, or queries are handled by authorized individuals. You can add a contact to be reached in such cases. Enhanced employee advocacy 1. develop a content bank for them to choose from
  • 8. Components of a Social Media policy -3 1. Employees who are let go should not continue having access to company’s Social Media accounts 2. Keep an open mind when engaging in online conversations. Always remember cultural differences and ideologies. 3. Separate business with personal posts. When in doubt, DO NOT post. Be aware that whatever you share is permanent. 4. Be transparent when engaging online. If you’re part of the social media team, do end every post with your assigned intitials/name, or an official hashtag. 5. DO NOT use official device to log in to a personal account
  • 9. What to do in drafting SM policy 1. Research the systems your organization interacts with 2. Which roles would mostly be relevant in drafting the policy? Set up a system to approve posts. 3. Bring in auditors to show how to control the management of Social Media 4. Where would the policy be hosted? Intranet? On local PCs?