SlideShare ist ein Scribd-Unternehmen logo
1 von 43
How to Manage Social Media in
 Your Organization: Building a
Successful Governance Strategy

       Patricia C. Franks, Ph.D., CRM
        Sandra Broady-Rudd, CRM
  Elizabeth Shaffer, UBC Doctoral Student
         James A. Merrifield, ERM

  Education Code: TU02-3277
Learning Objectives
Upon completion of this
session, participants will be able to:
1. Analyze the impact of social media
   technologies on records management
2. Identify records residing in
   blogs, microblogs, and social networks
3. Cite best practices for governing social media
   records
4. Describe current tools available to capture and
   manage social media records
                                                     2
Management Strategies
          Must Address
 Systems of Record – We’re good at this!
  – Records Management Systems were developed to
    manage content in the form of documents (e.g., text and
    graphics) that are regulated, controlled, and provide
    accurate and complete evidence of transactions
 Systems of Engagement – This is our
  latest challenge.
  – Social media technologies enable conversations and
    interactions in the form of text, images, audio, and video
    developed in an ad hoc and collaborative manner and
    result in information that may be transient in nature
                                                                 3
Today’s Agenda
 Panelist #1: Elizabeth Shaffer
  Topics – Social Media Governance > Laws and
  Regulations > Technology & Infrastructure > Risk
  Management and Behavioral Norms
 Panelist #2: Sandra Broady-Rudd, CRM
  Topics – Social Media Policy > Recordkeeping Controls >
  Tagging and Metadata > Creating Data Maps
 Panelist #3: James A. Merrifield, ERM
  Topics – Change Management > Training > Audit and
  Evaluation


                                                            4
Governance is about …
      Providing leadership


      Setting goals and strategies


      Obtaining and allocating resources


      Protecting resources and/or assets


      Monitoring results and trends
ES
                                            5
Laws and Regulations
      Legislative, legal, and regulatory issues
       are an important consideration when
       using social media in an organization
      U.S. case law involving social media is
       ever-evolving
      Regulations vary from one country to the
       next
       – Increasingly, many organizations operate
         globally, where records and information are
         created, transmitted, and/or stored across
ES
         international boundaries
                                                       6
Laws and Regulations
  U.S. Statutes and Regulations

     - Many acts and regulations address requirements
       for managing various types of records and
       information regardless of document format and
       the means by which the document comes into
       existence

     - Example #1: Financial Industry Regulatory
       Authority Regulatory Notice 10-06

     - Example #2: NARA Report on Federal Web 2.0
ES
       Use and Record Value
                                                        7
Laws and Regulations
  Case Law

     – More than 600 federal and state court decisions on a
       variety of topics addressing social media evidence in
       published opinions

     – Example #1: Lester v. Allied Concrete Company (2011)

     – Example #2: Torres v. Lexington Insurance Company
       (2006)

ES
                                                               8
Laws and Regulations
  Sources of Information, Global Laws and
     Regulations
     – Professional and trade associations provide up-to-date
       news pertaining to domestic and foreign legislative, legal,
       and regulatory headlines

     – Other private or government organizations can be useful
       sources of information as well

     – Foreign news sources can provide an overseas perspective,
       which can be helpful to organizations operating in a global
       arena

ES
                                                                     9
Technology & Infrastructure
      Evaluating Social Media Applications
       and Services
       – Evaluate the application software or services before
         considering them for purchase and deployment

       – After a proposed application or service has been
         selected, the process for determining if it fits within the
         organization’s technology infrastructure begins

       – The following slides outline issues to be considered in
         the evaluation, as well as methods for addressing
         these issues
ES
                                                                       10
Technology & Infrastructure
      Computing Infrastructure
       – Standardize on certain hardware, software, software
         versions, databases, etc., to provide a more cost-
         effective computing infrastructure

      Security
       – Determine the type of service provided through
         social media and ensure periodic testing of that
         service

      Network Considerations
       – Evaluate the impact the application has on the
         overall network needs
ES
                                                               11
Technology & Infrastructure
      Records and Information Management
       Process Implications
       – Once a social media application has been approved
         for use in the organization, several records and
         information management considerations should be
         investigated

      Audit and Monitoring of Social Media
       Applications and Services
       – After a social media application or service has been
         approved by the organization, usage must be
         monitored and audited

       – This activity should have the highest priority, given
ES       that externally facing content can be accessed by the
         general public
                                                                 12
Technology & Infrastructure

      Service Level Agreements/Terms of
       Service Agreements

       – Internally hosted applications

       – Externally hosted applications




ES
                                           13
Risk Management and
              Behavioral Norms
 Need to understand and assess the impact
     on the organization's records and
     information management and
     legal/regulatory compliance obligations
     –   Legal discovery (also referred to as e-discovery)
     –   Admissibility
     –   Preservation
     –   Privacy


ES
                                                             14
Risk Management and
            Behavioral Norms
 Some actions to mitigate or minimize risks:

     – Develop a migration plan for any social media software
       used by the organization

     – Refrain from duplicating user IDs and passwords across
       multiple social networking sites

     – Train employees on the appropriate use of social media
       within the organization
ES
                                                                15
Risk Management and
            Behavioral Norms
 Some actions to mitigate or minimize risks:
     – Taking an inventory of social media sites used by the
       organization

     – Investigating software or applications available for
       monitoring and preserving social media information

     – Maintaining and updating the organization’s retention
       schedule, to include records and information
       created, transmitted, and/or stored via social media
ES
                                                               16
Policy
 Comprehensive Policy Development
 Championed and Approved at a High Level
 Combined with Related Policies/RM/IM/IT
 Collaborative input from RM, HR, Legal, IT,
  Marketing
 Map to Existing Best Practices and
  Regulatory Requirements to Identify Gaps
  Policy will Remedy
SBR
                                                17
Policy
       Policy Content
        –   Purpose
        –   Scope
        –   Roles & Responsibilities
        –   Behavioral Expectations
        –   Expectations of Privacy
        –   Confidentiality
        –   Approved Tools
        –   RM Guidance
        –   Intellectual Ownership
        –   Ownership
        –   Enforcement
        –   Acknowledgements
SBR
                                       18
Policy
 Policy Communication & Implementation
  – Communications Plan
  – Training Plan
  – Implementation Plan




SBR
                                          19
Recordkeeping Controls
 Adherence to RM Principles
  – Organizations responsible for their own records
  – Records Retention Schedules are media neutral
    and based on content
  – Organizational content, including
    records/information, is an asset owned by the
    organization



SBR
                                                      20
Capturing & Preserving Records
    Capture
     – Is it a record?
    Storage
    Protection from alteration
    Proper access controls
    Classification to retention schedule
    Ability to change retention
    Destruction and Suspension
SBR
    Record Ownership
                                            21
Tagging and Metadata

 Capture Adequate Metadata to ensure:
  – Authenticity
  – Reliability
  – Accessibility
  – Usability




SBR
                                         22
Tagging and Metadata

 Minimum Set per Dublin Core/ISO 23081
      –   Author or Creator
      –   Individual Performing Posting
      –   Org or unit
      –   Topic
      –   Id of external or internal publisher
      –   Access restrictions
      –   Date/time of creation
      –   Date/Time of modification
      –   Individual performing the modification
SBR
                                                   23
Tagging and Metadata
 Classification, Retention and Disposition
      Metadata
      – Record
      – Associate with Records Retention Schedule
      – Destruction Eligibility Date
      – Date of Destruction




SBR
                                                    24
Tagging and Metadata
 Traditional and Non-Traditional Taxonomies
  – Traditional
         Meaningful to user and consistent with
          records/information methodologies
      – Non-Traditional
         Collaborative Tagging
         More informal tagging seen with social media
         Collaborative effort by users to create and manage
          their own tags to classify and categorize on-line
          content
SBR
                                                               25
Data Maps
       Inventory of Social Media Content
       Integrate into Existing Data Map
       All information inventoried to:
        – Speed Retrieval
        – More Seamless E-Discovery Response
        – Aid in Records Preservation Efforts




SBR
                                                26
Data Maps
 Data Map Benefits
      – Listing of all content for retrieval and e-discovery
      – Inventory of all ESI internal and external
      – Synchronization to data to retention schedule
      – Identification of Information Technology applications
      – Identification of information duplication
      – Validate whether information constitutes “official”
        record
      – Mechanism for managing records and information
SBR
        when applications are decommissioned
                                                                27
Data Maps
 If No Data Map
      – Look at legacy processes or applications where most of
        the information is already documented
      – Develop project to incorporate necessary procedures
        and metadata to start building a comprehensive data
        map for the organization
      – Less time and resources than starting from scratch




SBR
                                                                 28
Change Management

 What is Change Management?

     A structured approach to shifting and transitioning
     individuals, teams, and organizations from a current
     state to a desired future state where change can be
     accepted and embraced




JM
                                                            29
Change Management

 Common Reasons Why Social Media Use
     May Fail
     – Failure to identify appropriate software solutions
     – Lack of organization-wide training and
       education
     – Employee resistance to change due to
       uncertainty and insecurity
     – Failure to create organization-wide policies
     – Lack of resources (e.g. time, money, personnel)
JM
                                                            30
Change Management
 Common Reasons for Social Media Failure
     Continued…
     – Lack of executive management (i.e. Top-Down)
       support
     – Failure to develop a strategy
     – Excessive and/or primary reliance upon interns
       and/or volunteers



JM
                                                        31
Change Management
 Ways To Improve the Organization’s
     Change Management Efforts Related to
     Social Media
     – Establish a clear vision and strategy to stimulate
       organization-wide buy-in
     – Make objectives relevant and inspire individuals
       to take action by communicating early and
       broadly
     – Build a committed and skillful core team
     – Know Your Audience
JM
                                                            32
Change Management
 Recognize and reward progress and
  achievements
 Initially, set aims that are easy to achieve
 Encourage determination and persistence
  by reporting on progress and highlighting
  future milestones to be achieved
 Weave change into the organization’s
  cultural fabric and reinforce its value
  through recruitment and promotion
JM
                                                 33
Training
 Social Media Training should include:
  – Organization’s definition of social media such
    that applications, tools, and platforms are
    clearly explained
  – Organization’s goals and objectives (e.g. public
    relations, sales, customer service)
  – Benefits and risks of social media use within the
    organization


JM
                                                        34
Training
 Explanation of social media policies and
   compliance expectations, including
   consequences and penalties for
   noncompliance
 Tips on behavioral practices for
   safe, secure, effective use of social media
 Department(s) and/or individual(s)
   responsible for social media in the
   organization, providing points of contact for
JM employees
                                                   35
Training
 Types of Training Platforms and Venues
  – In-person classes
  – Online
  – On-demand classes
  – Wikis, Blogs
  – Private Social Media site managed by
    organization
  – Podcasts, Video Conferences, Audio
    Conferences
JM
                                           36
Training
 Who takes the lead in Training the
     Organization?
     – Employees of the Organization – HR, RIM, IT
     – External Contractors hired by organization
     – Combination of Both




JM
                                                     37
Audit & Evaluation
 Steps To Provide A Consistent Audit
     Experience
     – Define the purpose of the audit at the outset
     – State the scope of the audit and determine what
       is to be included/excluded in the effort
     – Determine the recurring audit calendar cycle
     – Determine if individuals form within the
       organization will conduct the audit or if external
       contractors will be used
     – Determine the audience for the audit results
JM
                                                            38
QUESTIONS?


             39
References for your RIM Library




    (ANSI/ARMA 18-2011)   (ARMA TR-21-2012)



                                              40
Contact the Panelists
 Sandra Broady-Rudd, CRM
    Sandra.E.Broady-Rudd@wellsfargo.com

 Elizabeth Shaffer
    elisabeth.shaffer@gmail.com

 James A. Merrifield, ERM
    jamesmerrifieldii@gmail.com

                                          41
Continue the Conversation
               Twitter
     @ARMA_INT or #ARMA12
        ARMA iConference
      http://iconference.arma.org

   … and find us on
Facebook and LinkedIN
   by searching for
  ARMA International
HOW TO MANAGE SOCIAL
MEDIA IN YOUR ORGANIZATION




     Patricia C. Franks, Ph.D., CRM
        patricia.franks@sjsu.edu

 Education Code: TU02-3277

Weitere ähnliche Inhalte

Was ist angesagt?

An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protectionNicha Tatsaneeyapan
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!Tammy Clark
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
FED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FARFED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FARJSchaus & Associates
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثانيBunayan ALdosari
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...Miguel A. Amutio
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 

Was ist angesagt? (13)

An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
FED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FARFED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FAR
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
Cissp notes
Cissp notesCissp notes
Cissp notes
 
Information security
Information securityInformation security
Information security
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Review questions
Review questionsReview questions
Review questions
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 

Andere mochten auch

Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfJim Merrifield, IGP, CIP
 
Ignite Cincinnati Speaker orientation
Ignite Cincinnati Speaker orientationIgnite Cincinnati Speaker orientation
Ignite Cincinnati Speaker orientationJoe Pantuso
 
Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...
Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...
Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...Jim Merrifield, IGP, CIP
 
Make share point the heart of your information 3 ways to extend your investment
Make share point the heart of your information 3 ways to extend your investmentMake share point the heart of your information 3 ways to extend your investment
Make share point the heart of your information 3 ways to extend your investmentJim Merrifield, IGP, CIP
 
Management Informatique
Management InformatiqueManagement Informatique
Management Informatiquesimeon
 
Understanding Gamification of Consumer Experiences
Understanding Gamification of Consumer ExperiencesUnderstanding Gamification of Consumer Experiences
Understanding Gamification of Consumer ExperiencesIan McCarthy
 
Career Path For Next Generation Records Manager
Career Path For Next Generation Records ManagerCareer Path For Next Generation Records Manager
Career Path For Next Generation Records ManagerJim Merrifield, IGP, CIP
 
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierBecome an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierJim Merrifield, IGP, CIP
 
Estudo de caso urban channel
Estudo de caso urban channelEstudo de caso urban channel
Estudo de caso urban channelAndre Nishiwaki
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
L'entreprise digitale et le contrôle interne
L'entreprise digitale et le contrôle interne L'entreprise digitale et le contrôle interne
L'entreprise digitale et le contrôle interne Antoine Vigneron
 
Moving Forward: The Application of Information Governance
Moving Forward: The Application of Information GovernanceMoving Forward: The Application of Information Governance
Moving Forward: The Application of Information GovernanceJim Merrifield, IGP, CIP
 
MENE_MONEY-braga_motors_challenge(promo)
MENE_MONEY-braga_motors_challenge(promo)MENE_MONEY-braga_motors_challenge(promo)
MENE_MONEY-braga_motors_challenge(promo)Andre Nishiwaki
 
37728087 vb-bank
37728087 vb-bank37728087 vb-bank
37728087 vb-bankAmit
 
38618669 bank-recruitment-advt
38618669 bank-recruitment-advt38618669 bank-recruitment-advt
38618669 bank-recruitment-advtAmit
 
Career path for today's information management professional - ARMA CT 9/24/13
Career path for today's information management professional - ARMA CT 9/24/13Career path for today's information management professional - ARMA CT 9/24/13
Career path for today's information management professional - ARMA CT 9/24/13Jim Merrifield, IGP, CIP
 
Vijaya Bank Recruitment
Vijaya Bank RecruitmentVijaya Bank Recruitment
Vijaya Bank RecruitmentAmit
 
52043097 shreyas-gramin-bank-recruitment-advertisement
52043097 shreyas-gramin-bank-recruitment-advertisement52043097 shreyas-gramin-bank-recruitment-advertisement
52043097 shreyas-gramin-bank-recruitment-advertisementAmit
 

Andere mochten auch (20)

Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages Itself
 
Ignite Cincinnati Speaker orientation
Ignite Cincinnati Speaker orientationIgnite Cincinnati Speaker orientation
Ignite Cincinnati Speaker orientation
 
Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...
Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...
Become an Information Governance Superhero in 2015 - Lunch Keynote ARMA Houst...
 
Make share point the heart of your information 3 ways to extend your investment
Make share point the heart of your information 3 ways to extend your investmentMake share point the heart of your information 3 ways to extend your investment
Make share point the heart of your information 3 ways to extend your investment
 
Urbanisme et cloud
Urbanisme et cloudUrbanisme et cloud
Urbanisme et cloud
 
Management Informatique
Management InformatiqueManagement Informatique
Management Informatique
 
Understanding Gamification of Consumer Experiences
Understanding Gamification of Consumer ExperiencesUnderstanding Gamification of Consumer Experiences
Understanding Gamification of Consumer Experiences
 
Career Path For Next Generation Records Manager
Career Path For Next Generation Records ManagerCareer Path For Next Generation Records Manager
Career Path For Next Generation Records Manager
 
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierBecome an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
 
Estudo de caso urban channel
Estudo de caso urban channelEstudo de caso urban channel
Estudo de caso urban channel
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
L'entreprise digitale et le contrôle interne
L'entreprise digitale et le contrôle interne L'entreprise digitale et le contrôle interne
L'entreprise digitale et le contrôle interne
 
Moving Forward: The Application of Information Governance
Moving Forward: The Application of Information GovernanceMoving Forward: The Application of Information Governance
Moving Forward: The Application of Information Governance
 
MENE_MONEY-braga_motors_challenge(promo)
MENE_MONEY-braga_motors_challenge(promo)MENE_MONEY-braga_motors_challenge(promo)
MENE_MONEY-braga_motors_challenge(promo)
 
RIM In Law Firm Environment
RIM In Law Firm EnvironmentRIM In Law Firm Environment
RIM In Law Firm Environment
 
37728087 vb-bank
37728087 vb-bank37728087 vb-bank
37728087 vb-bank
 
38618669 bank-recruitment-advt
38618669 bank-recruitment-advt38618669 bank-recruitment-advt
38618669 bank-recruitment-advt
 
Career path for today's information management professional - ARMA CT 9/24/13
Career path for today's information management professional - ARMA CT 9/24/13Career path for today's information management professional - ARMA CT 9/24/13
Career path for today's information management professional - ARMA CT 9/24/13
 
Vijaya Bank Recruitment
Vijaya Bank RecruitmentVijaya Bank Recruitment
Vijaya Bank Recruitment
 
52043097 shreyas-gramin-bank-recruitment-advertisement
52043097 shreyas-gramin-bank-recruitment-advertisement52043097 shreyas-gramin-bank-recruitment-advertisement
52043097 shreyas-gramin-bank-recruitment-advertisement
 

Ähnlich wie Build a Successful Social Media Governance Strategy

The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarNICSA
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectJohn Macasio
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR prioritiesAlberto Canadè
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and GovernmentMichael Smith
 
Case Study
Case StudyCase Study
Case Studylneut03
 
Establishing an information governance program
Establishing an information governance programEstablishing an information governance program
Establishing an information governance programLouise Spiteri
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfYihune Ephrem
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptShruthi48
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxsoulscout02
 
Elements & steps of a national safeguards system
Elements & steps of a national safeguards systemElements & steps of a national safeguards system
Elements & steps of a national safeguards systema_lhumeau
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 

Ähnlich wie Build a Successful Social Media Governance Strategy (20)

The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
Case Study
Case StudyCase Study
Case Study
 
Establishing an information governance program
Establishing an information governance programEstablishing an information governance program
Establishing an information governance program
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdf
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
Tl vi a
Tl vi aTl vi a
Tl vi a
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
12 security policies
12 security policies12 security policies
12 security policies
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
Elements & steps of a national safeguards system
Elements & steps of a national safeguards systemElements & steps of a national safeguards system
Elements & steps of a national safeguards system
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Build a Successful Social Media Governance Strategy

  • 1. How to Manage Social Media in Your Organization: Building a Successful Governance Strategy Patricia C. Franks, Ph.D., CRM Sandra Broady-Rudd, CRM Elizabeth Shaffer, UBC Doctoral Student James A. Merrifield, ERM Education Code: TU02-3277
  • 2. Learning Objectives Upon completion of this session, participants will be able to: 1. Analyze the impact of social media technologies on records management 2. Identify records residing in blogs, microblogs, and social networks 3. Cite best practices for governing social media records 4. Describe current tools available to capture and manage social media records 2
  • 3. Management Strategies Must Address  Systems of Record – We’re good at this! – Records Management Systems were developed to manage content in the form of documents (e.g., text and graphics) that are regulated, controlled, and provide accurate and complete evidence of transactions  Systems of Engagement – This is our latest challenge. – Social media technologies enable conversations and interactions in the form of text, images, audio, and video developed in an ad hoc and collaborative manner and result in information that may be transient in nature 3
  • 4. Today’s Agenda  Panelist #1: Elizabeth Shaffer Topics – Social Media Governance > Laws and Regulations > Technology & Infrastructure > Risk Management and Behavioral Norms  Panelist #2: Sandra Broady-Rudd, CRM Topics – Social Media Policy > Recordkeeping Controls > Tagging and Metadata > Creating Data Maps  Panelist #3: James A. Merrifield, ERM Topics – Change Management > Training > Audit and Evaluation 4
  • 5. Governance is about …  Providing leadership  Setting goals and strategies  Obtaining and allocating resources  Protecting resources and/or assets  Monitoring results and trends ES 5
  • 6. Laws and Regulations  Legislative, legal, and regulatory issues are an important consideration when using social media in an organization  U.S. case law involving social media is ever-evolving  Regulations vary from one country to the next – Increasingly, many organizations operate globally, where records and information are created, transmitted, and/or stored across ES international boundaries 6
  • 7. Laws and Regulations  U.S. Statutes and Regulations - Many acts and regulations address requirements for managing various types of records and information regardless of document format and the means by which the document comes into existence - Example #1: Financial Industry Regulatory Authority Regulatory Notice 10-06 - Example #2: NARA Report on Federal Web 2.0 ES Use and Record Value 7
  • 8. Laws and Regulations  Case Law – More than 600 federal and state court decisions on a variety of topics addressing social media evidence in published opinions – Example #1: Lester v. Allied Concrete Company (2011) – Example #2: Torres v. Lexington Insurance Company (2006) ES 8
  • 9. Laws and Regulations  Sources of Information, Global Laws and Regulations – Professional and trade associations provide up-to-date news pertaining to domestic and foreign legislative, legal, and regulatory headlines – Other private or government organizations can be useful sources of information as well – Foreign news sources can provide an overseas perspective, which can be helpful to organizations operating in a global arena ES 9
  • 10. Technology & Infrastructure  Evaluating Social Media Applications and Services – Evaluate the application software or services before considering them for purchase and deployment – After a proposed application or service has been selected, the process for determining if it fits within the organization’s technology infrastructure begins – The following slides outline issues to be considered in the evaluation, as well as methods for addressing these issues ES 10
  • 11. Technology & Infrastructure  Computing Infrastructure – Standardize on certain hardware, software, software versions, databases, etc., to provide a more cost- effective computing infrastructure  Security – Determine the type of service provided through social media and ensure periodic testing of that service  Network Considerations – Evaluate the impact the application has on the overall network needs ES 11
  • 12. Technology & Infrastructure  Records and Information Management Process Implications – Once a social media application has been approved for use in the organization, several records and information management considerations should be investigated  Audit and Monitoring of Social Media Applications and Services – After a social media application or service has been approved by the organization, usage must be monitored and audited – This activity should have the highest priority, given ES that externally facing content can be accessed by the general public 12
  • 13. Technology & Infrastructure  Service Level Agreements/Terms of Service Agreements – Internally hosted applications – Externally hosted applications ES 13
  • 14. Risk Management and Behavioral Norms  Need to understand and assess the impact on the organization's records and information management and legal/regulatory compliance obligations – Legal discovery (also referred to as e-discovery) – Admissibility – Preservation – Privacy ES 14
  • 15. Risk Management and Behavioral Norms  Some actions to mitigate or minimize risks: – Develop a migration plan for any social media software used by the organization – Refrain from duplicating user IDs and passwords across multiple social networking sites – Train employees on the appropriate use of social media within the organization ES 15
  • 16. Risk Management and Behavioral Norms  Some actions to mitigate or minimize risks: – Taking an inventory of social media sites used by the organization – Investigating software or applications available for monitoring and preserving social media information – Maintaining and updating the organization’s retention schedule, to include records and information created, transmitted, and/or stored via social media ES 16
  • 17. Policy  Comprehensive Policy Development  Championed and Approved at a High Level  Combined with Related Policies/RM/IM/IT  Collaborative input from RM, HR, Legal, IT, Marketing  Map to Existing Best Practices and Regulatory Requirements to Identify Gaps Policy will Remedy SBR 17
  • 18. Policy  Policy Content – Purpose – Scope – Roles & Responsibilities – Behavioral Expectations – Expectations of Privacy – Confidentiality – Approved Tools – RM Guidance – Intellectual Ownership – Ownership – Enforcement – Acknowledgements SBR 18
  • 19. Policy  Policy Communication & Implementation – Communications Plan – Training Plan – Implementation Plan SBR 19
  • 20. Recordkeeping Controls  Adherence to RM Principles – Organizations responsible for their own records – Records Retention Schedules are media neutral and based on content – Organizational content, including records/information, is an asset owned by the organization SBR 20
  • 21. Capturing & Preserving Records  Capture – Is it a record?  Storage  Protection from alteration  Proper access controls  Classification to retention schedule  Ability to change retention  Destruction and Suspension SBR  Record Ownership 21
  • 22. Tagging and Metadata  Capture Adequate Metadata to ensure: – Authenticity – Reliability – Accessibility – Usability SBR 22
  • 23. Tagging and Metadata  Minimum Set per Dublin Core/ISO 23081 – Author or Creator – Individual Performing Posting – Org or unit – Topic – Id of external or internal publisher – Access restrictions – Date/time of creation – Date/Time of modification – Individual performing the modification SBR 23
  • 24. Tagging and Metadata  Classification, Retention and Disposition Metadata – Record – Associate with Records Retention Schedule – Destruction Eligibility Date – Date of Destruction SBR 24
  • 25. Tagging and Metadata  Traditional and Non-Traditional Taxonomies – Traditional  Meaningful to user and consistent with records/information methodologies – Non-Traditional  Collaborative Tagging  More informal tagging seen with social media  Collaborative effort by users to create and manage their own tags to classify and categorize on-line content SBR 25
  • 26. Data Maps  Inventory of Social Media Content  Integrate into Existing Data Map  All information inventoried to: – Speed Retrieval – More Seamless E-Discovery Response – Aid in Records Preservation Efforts SBR 26
  • 27. Data Maps  Data Map Benefits – Listing of all content for retrieval and e-discovery – Inventory of all ESI internal and external – Synchronization to data to retention schedule – Identification of Information Technology applications – Identification of information duplication – Validate whether information constitutes “official” record – Mechanism for managing records and information SBR when applications are decommissioned 27
  • 28. Data Maps  If No Data Map – Look at legacy processes or applications where most of the information is already documented – Develop project to incorporate necessary procedures and metadata to start building a comprehensive data map for the organization – Less time and resources than starting from scratch SBR 28
  • 29. Change Management  What is Change Management? A structured approach to shifting and transitioning individuals, teams, and organizations from a current state to a desired future state where change can be accepted and embraced JM 29
  • 30. Change Management  Common Reasons Why Social Media Use May Fail – Failure to identify appropriate software solutions – Lack of organization-wide training and education – Employee resistance to change due to uncertainty and insecurity – Failure to create organization-wide policies – Lack of resources (e.g. time, money, personnel) JM 30
  • 31. Change Management  Common Reasons for Social Media Failure Continued… – Lack of executive management (i.e. Top-Down) support – Failure to develop a strategy – Excessive and/or primary reliance upon interns and/or volunteers JM 31
  • 32. Change Management  Ways To Improve the Organization’s Change Management Efforts Related to Social Media – Establish a clear vision and strategy to stimulate organization-wide buy-in – Make objectives relevant and inspire individuals to take action by communicating early and broadly – Build a committed and skillful core team – Know Your Audience JM 32
  • 33. Change Management  Recognize and reward progress and achievements  Initially, set aims that are easy to achieve  Encourage determination and persistence by reporting on progress and highlighting future milestones to be achieved  Weave change into the organization’s cultural fabric and reinforce its value through recruitment and promotion JM 33
  • 34. Training  Social Media Training should include: – Organization’s definition of social media such that applications, tools, and platforms are clearly explained – Organization’s goals and objectives (e.g. public relations, sales, customer service) – Benefits and risks of social media use within the organization JM 34
  • 35. Training  Explanation of social media policies and compliance expectations, including consequences and penalties for noncompliance  Tips on behavioral practices for safe, secure, effective use of social media  Department(s) and/or individual(s) responsible for social media in the organization, providing points of contact for JM employees 35
  • 36. Training  Types of Training Platforms and Venues – In-person classes – Online – On-demand classes – Wikis, Blogs – Private Social Media site managed by organization – Podcasts, Video Conferences, Audio Conferences JM 36
  • 37. Training  Who takes the lead in Training the Organization? – Employees of the Organization – HR, RIM, IT – External Contractors hired by organization – Combination of Both JM 37
  • 38. Audit & Evaluation  Steps To Provide A Consistent Audit Experience – Define the purpose of the audit at the outset – State the scope of the audit and determine what is to be included/excluded in the effort – Determine the recurring audit calendar cycle – Determine if individuals form within the organization will conduct the audit or if external contractors will be used – Determine the audience for the audit results JM 38
  • 40. References for your RIM Library (ANSI/ARMA 18-2011) (ARMA TR-21-2012) 40
  • 41. Contact the Panelists  Sandra Broady-Rudd, CRM Sandra.E.Broady-Rudd@wellsfargo.com  Elizabeth Shaffer elisabeth.shaffer@gmail.com  James A. Merrifield, ERM jamesmerrifieldii@gmail.com 41
  • 42. Continue the Conversation Twitter @ARMA_INT or #ARMA12 ARMA iConference http://iconference.arma.org … and find us on Facebook and LinkedIN by searching for ARMA International
  • 43. HOW TO MANAGE SOCIAL MEDIA IN YOUR ORGANIZATION Patricia C. Franks, Ph.D., CRM patricia.franks@sjsu.edu Education Code: TU02-3277

Hinweis der Redaktion

  1. #1#2DescriptionComplementing ANSI/ARMA 18-2011 Implications of Web-based, Collaborative Technologies in Records Management (ANSI/ARMA 18-2011), this new technical report offers advice on implementing social media within the context of accepted RIM best practices. Topics include governance, infrastructure/technology, processes and controls, change management, training, and audit/evaluation.