SlideShare ist ein Scribd-Unternehmen logo
1 von 42
1
DS 061112
Contents
1. What is Social Media?
 Employee guidelines for using Social Media
 Management guidelines for using Social Media
2. Case Study: Preece v Wetherspoon
3. Using Social Media in the Workplace
 Social Media Case Law
4. Relevant Policies and Procedures
 Acceptable Use Policy
5. Data Protection Act
 Subject Access Requests
 Breaches, enforcements, penalties
6. Scenario’s
7. Summary
2
What do you think “Social Media” is?
Company Policy states:
“Social Media is defined as any mechanism or system that
allows individuals the ability to express or share personal
views or comments with the Public”
Wikipedia states:
“Social Media employ web and mobile-based technologies to
support interactive dialogue … using social software which
mediates human communication”
A Generic Understanding: Anywhere (usually online) a person
can share an opinion that can then be viewed by others in the
future.
4
Examples of popular social media sites
5
Twitter Facebook LinkedIn
Myspace Reddit Yammer
Friends
Reunited
Google + Bebo
Other Social Media outlets
Most websites include some form of Social Media, even if the site itself exists for other
reasons.
Some examples are:
Comments – Online newspapers, BBC news site etc.
Blog posts/comments– Online opinions
Reviews – Leaving feedback on products/services
Forum posts – Chatting in online groups
Photo Sharing sites
Apps – Public chats
Recognise any other logo’s?
6
Employee Guidelines for using
Social Media
Discuss:
What type of issues have you dealt with in this area? Or are familiar
with?
Can you think of any other issues that could cause a problem?
7
Employee Guidelines for using
Social Media
Golden Rule:
Don’t post any information that could be damaging to our (and potentially your)
reputation.
 Anything that constitutes bullying, harassment or discrimination
 Posting negative opinions of others online, spreading rumours, e.g. , relating to race, gender, religion
etc.
 Anything that is confidential in nature
 Leaking information about the company, e.g. Contracts wins/losses etc.
 Anything that would breach Data Protection laws
 Any leaks of employee’s or client’s personal or sensitive data , e.g. Employee or Client contact
details
 Anything that breaches copyright laws
 Any publication of copyrighted materials into the public domain, e.g. Taking information from one
company to a rival company for competitive advantage
 Anything that could damage working relationships with other employees/clients
 Sharing any sensitive information without relevant consent e.g. Client performance data
8
Employee Guidelines/Use of Social Media
 Continued……
 Anything that can be construed as controversial
 Pointing out conflicts of interest publicly, courting the media
 Anything that is dishonest, untrue or misleading
 Lying about job conditions, company performance
 Anything with company logos or trademarks (unless authorised)
 Using logos to lend authority to a web identity, or to joke about or degrade the company image
 Using your company email address for non work related activities
 Running personal business, excessive personal emails
 Anything anonymously that breaches this policy
 Attempting to hide your identity while committing any of the above breaches of policy
9
The Employees Guide to Social Media has been distributed in your Social
Media pack this morning
Employee Guidelines Toolbox Talk
To help you all ensure your employees adhere to the
Employee Guidelines for Social Media,
a Toolbox Talk has been prepared for Team Managers to distribute
You will need to go through the presentation with all your staff and record completion.
The presentation goes through:
 What is Social Media?
 Why have a Social Media policy?
 Employee Guidelines for using Social Media
 This will be distributed now and must be completed by 30/11/12.
Email noctraining@ourcompany.com when these are complete so they can be included in the month
end report
10
Management Guidelines to Social Media
 Personal Social Media Use at Work:
 Employees can use the internet for personal use, including restricted use of social
networking sites before/after work or during breaks.
 Personal Social Media Use in Private Life:
 The company should respect their employees right to a private life and
understand that social media networking sites are now part of everyday life
 However, the company have a duty to ensure that employees are protecting their
and our reputation when using social media.
 Any breach of the company policies could amount to gross misconduct.
 Any misuse of social media will be fully investigated and could lead to disciplinary
action.
 We reserve the right to monitor internet and email use (Acceptable Use Policy).
11
The Managers Guide to Social Media has been distributed in your Social
Media pack this morning
Preece v Wetherspoon: the Verdict
Ms Preece:
 Was dismissed on the grounds of gross misconduct:
 Her actions were deemed to have been inappropriate, in breach of
company policy, and identified Wetherspoon’s specifically
 She appealed this decision however was unsuccessful and her
dismissal was upheld.
 She then brought a claim to the Employment Tribunal for unfair
dismissal. Her claim was dismissed .
Reasons:
 Despite her comments being posted with private settings, they were still in the public domain.
 Even if she had posted the comments at home not within work, the Tribunal believed that
Wetherspoon’s would have still have had the right to act in the same way.
 Her right to freedom of expression could be restricted if the comments posted could damage
reputation, i.e. her employers.
13
Preece v Wetherspoon: Learning Points
Key learning points of Preece v Wetherspoon case:
• It highlights the importance of having a Social Media policy
• Formalises acceptable and unacceptable behaviours in a changing environment
• Defining key terms such as blogging and provide examples
• Ensuring clarity for both parties to ensure understanding
• Clarify the sanctions if the policy is breached
• Again, ensuring clarity for both parties
• Have a clear and concise disciplinary policy listing examples of gross misconduct (MORE
ON THAT TOMORROW/NEXT WEEK)
• Ensuring employees are made aware of unacceptable behaviours and any potential disciplinary sanction
• Any breaches of policies should be dealt with fairly and consistently so an employer is in
a strong position to defend any potential claims.
• Having a policy in place ensures the company can treat staff fairly and consistently, and ensures staff in all
corners of the country are able to apply the policy equally
14
Social Media and Employee Misconduct
As Social Media can be used at any time inside or outside of
work, the human
rights of your employees must be considered:
European Convention on Human Rights (ECHR)
Article 8 provides a right to respect for private and family life.
Article 9 provides a right to freedom of thought, conscience and religion.
These articles must be taken into account to ensure we cannot irresponsibly intrude into
our employee’s private lives, or tell them what they are/are not allowed to think/believe.;
However this must not compromise existing legislation and company policies.
16
Potential Negative Impacts in the
Workplace
While there are many advantages to social networking in the workplace, ( building a wider
contacts network, opening communication channels), there are also potentially negative
impacts, such as:
 Drop in productivity with excessive use of social media
 Reputational damage by personal views being construed as Company opinions
 Operational damage by leakage of confidential information
Recent improper use has led to this policy being drawn up along with the guidelines.
17
Social Media Case Law:
Flexman v BG Group
The Current Situation:
The dispute over Mr Flexman’s profile led to his resignation following a breakdown in his relationship
with senior executives.
 In October 2012, the tribunal found BG Group’s delay in dealing with the case, and the failure to
address a grievance complaint brought by Mr Flexman, meant he was fully entitled to quit in June
2011 and claim constructive dismissal.
 It found the firm guilty of a “serious breach” of contract.
 A second hearing will take place in November to determine Mr Flexman's compensation.
 A BG Group spokesman said: “We are aware of this initial ruling and are studying the reasoning in
detail as well as examining all options open to us in line with the legal process.”
19
Relevant Policies & Procedures
The following policies all relate to Social Media use in the workplace.
A “Social Media Pack” containing these policies has been emailed to
all Managers
this morning:
 IT Acceptable Use Policy
 Disciplinary Procedures
 Social Media Policy
 Managers Guide to Social Media
 Employee Guide to Social Media
22
Acceptable Use Policy
Acceptable Use Policy documents are handed out during induction of new starters. These
documents must then be signed on an annual basis and submitted to the Site Security Liaison
Officer.
 The company expects that its computer facilities to be used in a professional manner. E-mail and
internet is provided at its own expense and for business purposes only
 Any personal use by company employees, temporary staff, sub-contractors, contractors or third
parties must not interfere with the normal business activities of the company and should not
involve solicitation, personal profit and must not potentially embarrass the company.
 Material that could be considered offensive must not be accessed, viewed, downloaded,
uploaded, copied, stored, printed or transmitted using company computer systems.
 When using these technologies, employees are representing the company. Corporate email and
internet activities can be traced back to an individual within a company, and both the company
and the individual will be held responsible for defamatory or illegal content.
23
Acceptable Use Policy – Management Responsibilities
All Managers are responsible for ensuring employees, contractors and third party users:
 Are properly briefed on what is considered acceptable use prior to being granted access to
sensitive information or information systems
 Are provided with any relevant guidelines to show expectations of acceptable use
 Are advised to fulfil the acceptable use policy
 Continue to have appropriate skills and qualifications necessary to comply with the policy
 Are provided with the maintenance cover and technical support for the computer and IT
departments approved associated equipment
 Are provided with the software required to enable the Employee to carry out HisHer duties
 Are protected by ensuring compliance with license agreements for any software provided to carry
out their duties
 Policies must be signed at induction and submitted to the Site Security Liaison Officer.
24
The Data Protection Act
The Data Protection Act (DPA) 1998 defines UK law on the processing of data
related to a person who can be identified from that data.
The DPA controls how personal data of a data subject is:
 used by data controllers or
 processed on their behalf by data processors.
Data Subject: An individual who is the subject of personal data
Data Controller: A person who determines the purposes for which, and the manner in
which, data is processed (now and in the future)
Data Processors: Any person who processes the data on behalf of a Data Controller
26
The Data Protection Act
Types of Data under the Data Protection Act
 Personal data is any information which can identify an individual. This includes any
expressions of opinion about the individual.
 Sensitive personal data includes the individuals' race, ethnic origin,
sexuality, religion, health, trade union status, political beliefs or criminal record.
There are 8 Principles to follow under the DPA
when dealing with Personal (and Sensitive) Data
27
Data Protection: 8 Principles
The key principles for personal data are that they will be:-
1. Processed fairly and lawfully
2. Processed for specified and lawful purposes
3. Accurate and up to date
4. Adequate, relevant and not excessive
5. Only held for as long as necessary for the purposes requested
6. Processed in accordance with the rights of data subjects, e.g. individuals have the right to
have data about them removed
7. Appropriate technical and organisational measures shall be taken against unauthorised or
unlawful processing of personal data and against accidental loss or destruction of, or damage
8. Not transferred to a country or territory outside the European Economic Area unless that
country or territory ensures an adequate level of protection for the rights and freedoms of
data subjects in relation to the processing of personal data.
28
Data Protection: Elearning
 New Elearning module available, to be completed by latest 21st December
 To ensure all staff can adhere to our Data Protection policy.
 This is Data Protection, AND Code of Conduct 2
 Will chase both up as they are both mandatory for all employees.
Details of how to locate and complete both the Data Protection and the Code of Conduct 2
elearning modules will be emailed out this afternoon/tomorrow morning with initial
completion data (Data protection likely to be 0%), and updates will be sent out weekly, the same
way as the first set of modules were chased.
Supervised elearning sessions will also be arranged again, if required.
29
Subject Access Request
 Individuals are have the right of access to their personal data within reason by
submitting a subject access request.
 Requests must be in writing and a fee may be required (normally £10)
which must be paid up front.
 We must respond within 40 days from the date that the request is received.
If a request is made in the NOC: If anyone wants to raise a Subject Access Request, discuss
their requirements with them, as often they will require specific information that can be
filtered, e.g. across date ranges or relating to specific matters , rather than having to find
and supply everything about the employee.
Searching for data: Find emails and manual files across relevant date ranges using
specific senders and recipients and the use of initials, employee numbers and
nick names.
30
Subject Access Request
Which of the following would be personal data that may need to be used to
comply with a subject access request? The individual requesting the data (the data
subject) is Jane Roe who has worked for the company for 3 years.
 An email to Jane Roe regarding their internal application?
Yes, this is personal data
 An email to everyone in one team about their performance/sales figures including for
the data subject Jane Roe?
If all team members figures are included, then no.
If the email just shows Jane Roe’s data, then yes
 A reference provided to Jane Roe’s prospective new employer?
No, as she is not the recipient of the email
 Details of a recent grievance raised by Jane Roe whereby she has requested for all data
relating to her employment?
Yes, this is personal data
31
Withholding data from
Subject Access Requests
Withholding Data
Reasons to withhold data are as follows:-
 Legal correspondence for the purpose of seeking advice
 Confidential management planning
 Any “without prejudice” discussions and negotiations
 Confidential references, if the data subject is not the recipient
 Prevention and detection of crime
 Relating to corporate finance
Third Party Data
If a data controller needs to disclose information relating to another individual who could
be identified, they are not obliged to comply with the request unless:-
 The other individual has consented
 If it is reasonable to disclose without consent (details can be kept anonymous)
32
What is a Breach of Data Protection?
Which of the following could potentially constitute a breach of data protection:-
 A copy of an employee’s 121 performance review notes being left face up on a
manager’s desk in the office?
 Copies of work orders/Documents on the fax machine/Printer?
 Salary details for senior management/directors being shared with company
employees?
 An email from a manager to his/her team summarising performance statistics?
 An employee discussing a colleague’s recent disciplinary meeting details whilst on
the telephone on the train?
 Accessing company policies as an employee?
33
Top Ten Tips for Complying with Data Protection
 Check who is in the email trail when forwarding/replying to all
 Use an appropriate volume and tone whilst on the phone
 Collect documents from the printer immediately after printing
 Consider thin meeting room walls – who can hear next door?
 Keep passwords secret and do not write them down
 Password control – Use different letters, numbers and symbols
 Keep laptops securely locked and store them out of sight when not in use
 Report the loss of any IT equipment immediately
 Consider the location of where you carry out work on your laptop, e.g. train
 Lock your computer whenever you step away from your desk
34
Data Protection Enforcement & Penalties
 Assessments made by the Information Commissioner
 Enforcement notice
 Court order to comply
 Compensation – damage and distress
 Right to prevent processing – if likely to cause substantial damage or distress
 Right of rectify, block, erase or destroy
 Monetary penalty notice
The maximum fine is £500,000.
35
Scenarios
 A member of your team has reported that one of their colleagues seems to always be
on Facebook during work, and is updating her profile with pictures of shoes, clothes
etc. that she is copying over from the Selfridges website. They’ve asked if something
can be done as the contract is so busy. What would you do?
 One of your colleagues in the business
has seen an email chain whereby earlier
in the email you have been described by
a member of your team as an incompetent
waster. How would you handle this?
36
Scenarios
 On Monday morning a staff member approaches you over something they have seen on
facebook over the weekend. Two colleagues have called him/her something which
could be perceived as discriminatory. What action would you take?
 A trade union rep has complained
that one of their members who is an
employee has found documentation
by their manager relating to staff
performance in their local cafe.
How would you handle this?
37
Summary 1: Social Media
You should now be able to answer the following:
 What is Social Media?
 Provide some examples of Social Media sites?
 Why we have a Social Media policy?
 And you have the policies and guidelines you and your team are expected to
follow from now on.
Question:
What will you do differently now in relation
to your own use of Social Media?
Summary 2: Data Protection
You should now be able to answer the following:
 Who are Data Subjects, Controllers and Processors?
 What Personal Data and Sensitive Personal Data is?
 Know the 8 principles for dealing with Personal/Sensitive Data?
 Know how to action a Subject Access Request?
 And you have a copy of the policy to allow you and your team to adhere to Data
Protection policy
Question:
What will you do differently now in relation
to your use of Data? I.e. ensuring it is Protected
Actions for You!
All policies relating to this presentation have been sent via email this morning. You
need to ensure you have an awareness of issues that may arise as a result of the
introduction of these policies
You need to hold a buzz session to distribute to Toolbox Talk to your staff detailing
the Social Media policy and its effects. This has been written for you and emailed
to you.
This Toolbox Talk needs to be distributed to all operational staff by 30th
November.
You and your staff need to complete the new Data Protection and the new Code of
Conduct 2 Elearning modules – chase emails will be sent out regularly as per
Sustainability/Code of Conduct 1.
Both these modules must be 100% complete by 21st December.
Thank you for your time
QUESTIONS
?
Appendices: Policies and
Procedures
Managers: Click attachments to open and print the relevant policies.
 IT Acceptable Use Policy
 Disciplinary Procedures
 Social Media Policy
 Managers Guide to Social Media
 Employee Guide to Social Media
42

Weitere ähnliche Inhalte

Was ist angesagt?

The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesDan Michaluk
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media PolicyMRDC1230
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALJohn Kostak
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesAndres Baytelman
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesErrol A. Adams, J.D., M.L.S.
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)Dan Michaluk
 
Social media - employer considerations
Social media - employer considerationsSocial media - employer considerations
Social media - employer considerationsMalcolm York
 
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards   amo conference 2011 draft 5Social media risks and rewards   amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5Dan Michaluk
 
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12Maurice Blackburn Lawyers
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...lorrainefleck
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
The Complexities and Challenges of Social Media in the Workplace
The Complexities and Challenges of Social Media in the WorkplaceThe Complexities and Challenges of Social Media in the Workplace
The Complexities and Challenges of Social Media in the WorkplaceBass, Berry & Sims
 
Social media and performance management
Social media and performance managementSocial media and performance management
Social media and performance managementOntarioEast
 
Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Barbara Richman, SPHR
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)hassan777898
 
Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...
Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...
Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...Charles Krugel
 

Was ist angesagt? (20)

The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data Security
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
 
Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media Policy
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)
 
Social media - employer considerations
Social media - employer considerationsSocial media - employer considerations
Social media - employer considerations
 
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards   amo conference 2011 draft 5Social media risks and rewards   amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5
 
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
Social Media In The Workplace Presentation (Josh Bornstein) 02.03.12
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
The Complexities and Challenges of Social Media in the Workplace
The Complexities and Challenges of Social Media in the WorkplaceThe Complexities and Challenges of Social Media in the Workplace
The Complexities and Challenges of Social Media in the Workplace
 
Social media and performance management
Social media and performance managementSocial media and performance management
Social media and performance management
 
Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...
Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...
Charles Krugel's Social Media, Human Resources & Legal Issues Presentation Ma...
 

Andere mochten auch

The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
Internal investigations disciplinary procedures slides 02 04 14
Internal investigations  disciplinary procedures  slides 02 04 14Internal investigations  disciplinary procedures  slides 02 04 14
Internal investigations disciplinary procedures slides 02 04 14ocolman19
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networksblogzilla
 
Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Michael Altendorf
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 

Andere mochten auch (7)

The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Internal investigations disciplinary procedures slides 02 04 14
Internal investigations  disciplinary procedures  slides 02 04 14Internal investigations  disciplinary procedures  slides 02 04 14
Internal investigations disciplinary procedures slides 02 04 14
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 

Ähnlich wie Social media & data protection policy v1.0 141112

The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...Kelly Hart & Hallman LLP
 
Do Your Company's Policies Need a Social Media Overhaul?
Do Your Company's Policies Need a Social Media Overhaul?Do Your Company's Policies Need a Social Media Overhaul?
Do Your Company's Policies Need a Social Media Overhaul?Parsons Behle & Latimer
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace AlphaStaff
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSmarsh
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
Employee social media Toolbox Talk v1.0
Employee social media Toolbox Talk  v1.0 Employee social media Toolbox Talk  v1.0
Employee social media Toolbox Talk v1.0 Dave Shannon
 
Social Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldSocial Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldThis account is closed
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Oasis Solutions Group
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 
Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Morgan
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...lorrainefleck
 
Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11smahboobani
 
Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and GuidelinesCurt Montague
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work PlacePepovski Darko
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxbriancrawford30935
 

Ähnlich wie Social media & data protection policy v1.0 141112 (20)

The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
Order #32788581
Order #32788581Order #32788581
Order #32788581
 
Do Your Company's Policies Need a Social Media Overhaul?
Do Your Company's Policies Need a Social Media Overhaul?Do Your Company's Policies Need a Social Media Overhaul?
Do Your Company's Policies Need a Social Media Overhaul?
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and Brokers
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Employee social media Toolbox Talk v1.0
Employee social media Toolbox Talk  v1.0 Employee social media Toolbox Talk  v1.0
Employee social media Toolbox Talk v1.0
 
Social Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldSocial Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New World
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011Blake Lapthorn Social Media seminar 12 October 2011
Blake Lapthorn Social Media seminar 12 October 2011
 
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
An Ounce of Prevention is Worth a Pound of Cure: Key Elements for Social Medi...
 
Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11Final fleck law techcamp 2011_social media_jun 18 11
Final fleck law techcamp 2011_social media_jun 18 11
 
Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and Guidelines
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 

Kürzlich hochgeladen

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Kürzlich hochgeladen (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Social media & data protection policy v1.0 141112

  • 2. Contents 1. What is Social Media?  Employee guidelines for using Social Media  Management guidelines for using Social Media 2. Case Study: Preece v Wetherspoon 3. Using Social Media in the Workplace  Social Media Case Law 4. Relevant Policies and Procedures  Acceptable Use Policy 5. Data Protection Act  Subject Access Requests  Breaches, enforcements, penalties 6. Scenario’s 7. Summary 2
  • 3.
  • 4. What do you think “Social Media” is? Company Policy states: “Social Media is defined as any mechanism or system that allows individuals the ability to express or share personal views or comments with the Public” Wikipedia states: “Social Media employ web and mobile-based technologies to support interactive dialogue … using social software which mediates human communication” A Generic Understanding: Anywhere (usually online) a person can share an opinion that can then be viewed by others in the future. 4
  • 5. Examples of popular social media sites 5 Twitter Facebook LinkedIn Myspace Reddit Yammer Friends Reunited Google + Bebo
  • 6. Other Social Media outlets Most websites include some form of Social Media, even if the site itself exists for other reasons. Some examples are: Comments – Online newspapers, BBC news site etc. Blog posts/comments– Online opinions Reviews – Leaving feedback on products/services Forum posts – Chatting in online groups Photo Sharing sites Apps – Public chats Recognise any other logo’s? 6
  • 7. Employee Guidelines for using Social Media Discuss: What type of issues have you dealt with in this area? Or are familiar with? Can you think of any other issues that could cause a problem? 7
  • 8. Employee Guidelines for using Social Media Golden Rule: Don’t post any information that could be damaging to our (and potentially your) reputation.  Anything that constitutes bullying, harassment or discrimination  Posting negative opinions of others online, spreading rumours, e.g. , relating to race, gender, religion etc.  Anything that is confidential in nature  Leaking information about the company, e.g. Contracts wins/losses etc.  Anything that would breach Data Protection laws  Any leaks of employee’s or client’s personal or sensitive data , e.g. Employee or Client contact details  Anything that breaches copyright laws  Any publication of copyrighted materials into the public domain, e.g. Taking information from one company to a rival company for competitive advantage  Anything that could damage working relationships with other employees/clients  Sharing any sensitive information without relevant consent e.g. Client performance data 8
  • 9. Employee Guidelines/Use of Social Media  Continued……  Anything that can be construed as controversial  Pointing out conflicts of interest publicly, courting the media  Anything that is dishonest, untrue or misleading  Lying about job conditions, company performance  Anything with company logos or trademarks (unless authorised)  Using logos to lend authority to a web identity, or to joke about or degrade the company image  Using your company email address for non work related activities  Running personal business, excessive personal emails  Anything anonymously that breaches this policy  Attempting to hide your identity while committing any of the above breaches of policy 9 The Employees Guide to Social Media has been distributed in your Social Media pack this morning
  • 10. Employee Guidelines Toolbox Talk To help you all ensure your employees adhere to the Employee Guidelines for Social Media, a Toolbox Talk has been prepared for Team Managers to distribute You will need to go through the presentation with all your staff and record completion. The presentation goes through:  What is Social Media?  Why have a Social Media policy?  Employee Guidelines for using Social Media  This will be distributed now and must be completed by 30/11/12. Email noctraining@ourcompany.com when these are complete so they can be included in the month end report 10
  • 11. Management Guidelines to Social Media  Personal Social Media Use at Work:  Employees can use the internet for personal use, including restricted use of social networking sites before/after work or during breaks.  Personal Social Media Use in Private Life:  The company should respect their employees right to a private life and understand that social media networking sites are now part of everyday life  However, the company have a duty to ensure that employees are protecting their and our reputation when using social media.  Any breach of the company policies could amount to gross misconduct.  Any misuse of social media will be fully investigated and could lead to disciplinary action.  We reserve the right to monitor internet and email use (Acceptable Use Policy). 11 The Managers Guide to Social Media has been distributed in your Social Media pack this morning
  • 12.
  • 13. Preece v Wetherspoon: the Verdict Ms Preece:  Was dismissed on the grounds of gross misconduct:  Her actions were deemed to have been inappropriate, in breach of company policy, and identified Wetherspoon’s specifically  She appealed this decision however was unsuccessful and her dismissal was upheld.  She then brought a claim to the Employment Tribunal for unfair dismissal. Her claim was dismissed . Reasons:  Despite her comments being posted with private settings, they were still in the public domain.  Even if she had posted the comments at home not within work, the Tribunal believed that Wetherspoon’s would have still have had the right to act in the same way.  Her right to freedom of expression could be restricted if the comments posted could damage reputation, i.e. her employers. 13
  • 14. Preece v Wetherspoon: Learning Points Key learning points of Preece v Wetherspoon case: • It highlights the importance of having a Social Media policy • Formalises acceptable and unacceptable behaviours in a changing environment • Defining key terms such as blogging and provide examples • Ensuring clarity for both parties to ensure understanding • Clarify the sanctions if the policy is breached • Again, ensuring clarity for both parties • Have a clear and concise disciplinary policy listing examples of gross misconduct (MORE ON THAT TOMORROW/NEXT WEEK) • Ensuring employees are made aware of unacceptable behaviours and any potential disciplinary sanction • Any breaches of policies should be dealt with fairly and consistently so an employer is in a strong position to defend any potential claims. • Having a policy in place ensures the company can treat staff fairly and consistently, and ensures staff in all corners of the country are able to apply the policy equally 14
  • 15.
  • 16. Social Media and Employee Misconduct As Social Media can be used at any time inside or outside of work, the human rights of your employees must be considered: European Convention on Human Rights (ECHR) Article 8 provides a right to respect for private and family life. Article 9 provides a right to freedom of thought, conscience and religion. These articles must be taken into account to ensure we cannot irresponsibly intrude into our employee’s private lives, or tell them what they are/are not allowed to think/believe.; However this must not compromise existing legislation and company policies. 16
  • 17. Potential Negative Impacts in the Workplace While there are many advantages to social networking in the workplace, ( building a wider contacts network, opening communication channels), there are also potentially negative impacts, such as:  Drop in productivity with excessive use of social media  Reputational damage by personal views being construed as Company opinions  Operational damage by leakage of confidential information Recent improper use has led to this policy being drawn up along with the guidelines. 17
  • 18.
  • 19. Social Media Case Law: Flexman v BG Group The Current Situation: The dispute over Mr Flexman’s profile led to his resignation following a breakdown in his relationship with senior executives.  In October 2012, the tribunal found BG Group’s delay in dealing with the case, and the failure to address a grievance complaint brought by Mr Flexman, meant he was fully entitled to quit in June 2011 and claim constructive dismissal.  It found the firm guilty of a “serious breach” of contract.  A second hearing will take place in November to determine Mr Flexman's compensation.  A BG Group spokesman said: “We are aware of this initial ruling and are studying the reasoning in detail as well as examining all options open to us in line with the legal process.” 19
  • 20.
  • 21.
  • 22. Relevant Policies & Procedures The following policies all relate to Social Media use in the workplace. A “Social Media Pack” containing these policies has been emailed to all Managers this morning:  IT Acceptable Use Policy  Disciplinary Procedures  Social Media Policy  Managers Guide to Social Media  Employee Guide to Social Media 22
  • 23. Acceptable Use Policy Acceptable Use Policy documents are handed out during induction of new starters. These documents must then be signed on an annual basis and submitted to the Site Security Liaison Officer.  The company expects that its computer facilities to be used in a professional manner. E-mail and internet is provided at its own expense and for business purposes only  Any personal use by company employees, temporary staff, sub-contractors, contractors or third parties must not interfere with the normal business activities of the company and should not involve solicitation, personal profit and must not potentially embarrass the company.  Material that could be considered offensive must not be accessed, viewed, downloaded, uploaded, copied, stored, printed or transmitted using company computer systems.  When using these technologies, employees are representing the company. Corporate email and internet activities can be traced back to an individual within a company, and both the company and the individual will be held responsible for defamatory or illegal content. 23
  • 24. Acceptable Use Policy – Management Responsibilities All Managers are responsible for ensuring employees, contractors and third party users:  Are properly briefed on what is considered acceptable use prior to being granted access to sensitive information or information systems  Are provided with any relevant guidelines to show expectations of acceptable use  Are advised to fulfil the acceptable use policy  Continue to have appropriate skills and qualifications necessary to comply with the policy  Are provided with the maintenance cover and technical support for the computer and IT departments approved associated equipment  Are provided with the software required to enable the Employee to carry out HisHer duties  Are protected by ensuring compliance with license agreements for any software provided to carry out their duties  Policies must be signed at induction and submitted to the Site Security Liaison Officer. 24
  • 25.
  • 26. The Data Protection Act The Data Protection Act (DPA) 1998 defines UK law on the processing of data related to a person who can be identified from that data. The DPA controls how personal data of a data subject is:  used by data controllers or  processed on their behalf by data processors. Data Subject: An individual who is the subject of personal data Data Controller: A person who determines the purposes for which, and the manner in which, data is processed (now and in the future) Data Processors: Any person who processes the data on behalf of a Data Controller 26
  • 27. The Data Protection Act Types of Data under the Data Protection Act  Personal data is any information which can identify an individual. This includes any expressions of opinion about the individual.  Sensitive personal data includes the individuals' race, ethnic origin, sexuality, religion, health, trade union status, political beliefs or criminal record. There are 8 Principles to follow under the DPA when dealing with Personal (and Sensitive) Data 27
  • 28. Data Protection: 8 Principles The key principles for personal data are that they will be:- 1. Processed fairly and lawfully 2. Processed for specified and lawful purposes 3. Accurate and up to date 4. Adequate, relevant and not excessive 5. Only held for as long as necessary for the purposes requested 6. Processed in accordance with the rights of data subjects, e.g. individuals have the right to have data about them removed 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage 8. Not transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. 28
  • 29. Data Protection: Elearning  New Elearning module available, to be completed by latest 21st December  To ensure all staff can adhere to our Data Protection policy.  This is Data Protection, AND Code of Conduct 2  Will chase both up as they are both mandatory for all employees. Details of how to locate and complete both the Data Protection and the Code of Conduct 2 elearning modules will be emailed out this afternoon/tomorrow morning with initial completion data (Data protection likely to be 0%), and updates will be sent out weekly, the same way as the first set of modules were chased. Supervised elearning sessions will also be arranged again, if required. 29
  • 30. Subject Access Request  Individuals are have the right of access to their personal data within reason by submitting a subject access request.  Requests must be in writing and a fee may be required (normally £10) which must be paid up front.  We must respond within 40 days from the date that the request is received. If a request is made in the NOC: If anyone wants to raise a Subject Access Request, discuss their requirements with them, as often they will require specific information that can be filtered, e.g. across date ranges or relating to specific matters , rather than having to find and supply everything about the employee. Searching for data: Find emails and manual files across relevant date ranges using specific senders and recipients and the use of initials, employee numbers and nick names. 30
  • 31. Subject Access Request Which of the following would be personal data that may need to be used to comply with a subject access request? The individual requesting the data (the data subject) is Jane Roe who has worked for the company for 3 years.  An email to Jane Roe regarding their internal application? Yes, this is personal data  An email to everyone in one team about their performance/sales figures including for the data subject Jane Roe? If all team members figures are included, then no. If the email just shows Jane Roe’s data, then yes  A reference provided to Jane Roe’s prospective new employer? No, as she is not the recipient of the email  Details of a recent grievance raised by Jane Roe whereby she has requested for all data relating to her employment? Yes, this is personal data 31
  • 32. Withholding data from Subject Access Requests Withholding Data Reasons to withhold data are as follows:-  Legal correspondence for the purpose of seeking advice  Confidential management planning  Any “without prejudice” discussions and negotiations  Confidential references, if the data subject is not the recipient  Prevention and detection of crime  Relating to corporate finance Third Party Data If a data controller needs to disclose information relating to another individual who could be identified, they are not obliged to comply with the request unless:-  The other individual has consented  If it is reasonable to disclose without consent (details can be kept anonymous) 32
  • 33. What is a Breach of Data Protection? Which of the following could potentially constitute a breach of data protection:-  A copy of an employee’s 121 performance review notes being left face up on a manager’s desk in the office?  Copies of work orders/Documents on the fax machine/Printer?  Salary details for senior management/directors being shared with company employees?  An email from a manager to his/her team summarising performance statistics?  An employee discussing a colleague’s recent disciplinary meeting details whilst on the telephone on the train?  Accessing company policies as an employee? 33
  • 34. Top Ten Tips for Complying with Data Protection  Check who is in the email trail when forwarding/replying to all  Use an appropriate volume and tone whilst on the phone  Collect documents from the printer immediately after printing  Consider thin meeting room walls – who can hear next door?  Keep passwords secret and do not write them down  Password control – Use different letters, numbers and symbols  Keep laptops securely locked and store them out of sight when not in use  Report the loss of any IT equipment immediately  Consider the location of where you carry out work on your laptop, e.g. train  Lock your computer whenever you step away from your desk 34
  • 35. Data Protection Enforcement & Penalties  Assessments made by the Information Commissioner  Enforcement notice  Court order to comply  Compensation – damage and distress  Right to prevent processing – if likely to cause substantial damage or distress  Right of rectify, block, erase or destroy  Monetary penalty notice The maximum fine is £500,000. 35
  • 36. Scenarios  A member of your team has reported that one of their colleagues seems to always be on Facebook during work, and is updating her profile with pictures of shoes, clothes etc. that she is copying over from the Selfridges website. They’ve asked if something can be done as the contract is so busy. What would you do?  One of your colleagues in the business has seen an email chain whereby earlier in the email you have been described by a member of your team as an incompetent waster. How would you handle this? 36
  • 37. Scenarios  On Monday morning a staff member approaches you over something they have seen on facebook over the weekend. Two colleagues have called him/her something which could be perceived as discriminatory. What action would you take?  A trade union rep has complained that one of their members who is an employee has found documentation by their manager relating to staff performance in their local cafe. How would you handle this? 37
  • 38. Summary 1: Social Media You should now be able to answer the following:  What is Social Media?  Provide some examples of Social Media sites?  Why we have a Social Media policy?  And you have the policies and guidelines you and your team are expected to follow from now on. Question: What will you do differently now in relation to your own use of Social Media?
  • 39. Summary 2: Data Protection You should now be able to answer the following:  Who are Data Subjects, Controllers and Processors?  What Personal Data and Sensitive Personal Data is?  Know the 8 principles for dealing with Personal/Sensitive Data?  Know how to action a Subject Access Request?  And you have a copy of the policy to allow you and your team to adhere to Data Protection policy Question: What will you do differently now in relation to your use of Data? I.e. ensuring it is Protected
  • 40. Actions for You! All policies relating to this presentation have been sent via email this morning. You need to ensure you have an awareness of issues that may arise as a result of the introduction of these policies You need to hold a buzz session to distribute to Toolbox Talk to your staff detailing the Social Media policy and its effects. This has been written for you and emailed to you. This Toolbox Talk needs to be distributed to all operational staff by 30th November. You and your staff need to complete the new Data Protection and the new Code of Conduct 2 Elearning modules – chase emails will be sent out regularly as per Sustainability/Code of Conduct 1. Both these modules must be 100% complete by 21st December.
  • 41. Thank you for your time QUESTIONS ?
  • 42. Appendices: Policies and Procedures Managers: Click attachments to open and print the relevant policies.  IT Acceptable Use Policy  Disciplinary Procedures  Social Media Policy  Managers Guide to Social Media  Employee Guide to Social Media 42

Hinweis der Redaktion

  1. 1 - Title
  2.  2 – Contents – read through, expand where necessary
  3. 3 – Title slide
  4. 4 – What do you think Social Media is?Get them to try and define before clicking to reveal.
  5. 5 – mini quiz
  6.  6 – Other forms of Social Media - Give examples for each row 6 still – Other examples of Social Media: picasa, flickr, meetup.com, skype, Slashdot, stumbleupon, wiki, reddit, blogger, 4square, soundcloud, Spotify,
  7. Note responses on Flipchart 7 – Discussion – What type of issues have you dealt with in this area? **Use flipchart for responses**Facebook – ringing sick, being on it when sick, arguments out of work? Disaster recovery day, photo’s of drinks on Facebook***Click for “Can you think of any other types of responses that could cause a problem?Receiving inappropriate messages? Email going around about us being sold off?
  8.     8 – Employee Guidelines**Don’t post any information that could be damaging to our (and potentially your) reputation. Anything that constitutes bullying, harassment or discrimination Anything that is confidential in natureAnything that would breach Data Protection lawsAnything that breaches copyright lawsAnything that could damage working relationships with other employees/clients
  9.  9 – Employee Guidelines continuedAnything that can be construed as controversialAnything that is dishonest, untrue or misleadingAnything with company logos or trademarks (unless authorised)Using your company email address for non work related activitiesAnything anonymously that breaches this policy
  10.   10 - TOOLBOX TALK - send out now -   
  11.  11 – Management Guidelines to Social Media Personal Social Media Use at work – can use in breaks/before and after workPersonal Social Media Use in private life – Must respect their right to a private liftHave a duty to protect reputationDisciplinary options are available.
  12.  12 – Preece v Wetherspoon (handout) Read through handout, get some idea’s.
  13.  13 – Preece V Wetherspoon – the verdict – read off screen
  14.  14 – Preece V Wetherspoon Learning Points – Read through and expand if necessary 
  15.      15 – Title – Using Social Media in the Workplace  We have to give certain considerations We have to be aware of potential Impacts
  16. Read off slide
  17. Read off slide
  18. handout
  19. Read off slide
  20.  22 - List of policies, re-iterate packs have been sent out
  21. Read out
  22. Read out
  23. Read out
  24. Read out
  25. Read out
  26. VALID AS OF NOVEMBER 2012 – MAYBE NOT RELEVANT IN FUTURE
  27. 30 – DPA – Subject Access RequestIf a request is made at the NOC (on click)
  28. 31 – DPA – SAR 2 – scenario’s – which involve personal data?Yes, personal dataIf all team members details included, no, if just her stats, yesNo, she is not the recipient of the email.Yes, personal data
  29. 32 – DPA – SAR – Witholding Data – (without prejudice – consequence free conversations)
  30. 33 – DPA – Breaching DPA? – for discussion, all answers are “possibly”
  31. 34 – DPA – top ten tips
  32. 35 – DPA enforcement – maximum fine amount??? £500 000 – on click
  33. 36 – scenario’s 1 – Updating facebook with Selfridges shopping list2 – Colleague described as “an incompetent waster” What would you do? - briedf discussion
  34. 37 – scenario’s 1 – Colleague calling another something discriminatory 2 – Employee finds documents relating to staff performance. What would you do? Brief discussion
  35. Valid as of November 2012
  36. Appendices – relevant policies, up to date as of November 2012. Will not be kept up to date in future.