SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Social Media in Texas Government




Jon Lee, DIR
jon.lee@dir.texas.gov
ELITE
Monday, 4/2/2012
About



                                    1
Social Media is easy, right?
  Setting up an account takes minutes
  No software licenses to buy
  No expensive equipment needed
  Nothing to install
  Maybe certain internet access privileges




                                             2
…Why isn’t social media as
as advertised?




                             3
Quick answer:
     it’s not about the technology




                                     4
Quick answer:
                it’s not about the technology



There are many other factors that affect the chances of success,

such as policy, training, culture, internal buy-in, etc…




                                                                   5
For example:




               A document collaboration tool
               to manage data proliferation is
               a great solution…




                                                 6
For example:




               …but without a sound
               implementation strategy, it
               probably won’t be successful




                                              7
It’s like a cell phone
The ability to make a wireless call has been
around since the 1940s…




                                               8
It’s like a cell phone
…but it took another 50 years to solve
problems related to
•   Weight
•   Size
•   Battery life
•   Temperature
•   Durability




                                         9
We have to think of Social Media as a package




                                                10
…which leads us to the Social Media Toolkit




                                              11
…which leads us to the Social Media Toolkit


a comprehensive resource
to help Texas agencies
initiate and improve their
social media efforts.




                                              12
There are four sections to the Social Media Toolkit…

 1. Strategy                        3. Content



                                           4. Operations
2. Policy




                                                           13
There is no rule about
social media




                    Social Media Policy



                                          14
There is no rule about
social media

But there are rules about
content on a website




                    Social Media Policy



                                          15
Public Social Media Policy
Some sections need to be communicated to the public, such as
• Privacy notification
• Moderation policy
• Linking policy,
• Public Information Act
• Third-party website policy
• Intellectual property rights and ownership




                                                               16
Policy Sections
1.    Accessibility
2.    Privacy
3.    Public Information Requests
4.    Records Retention
5.    Security
6.    Third-Party Websites and Terms of Use
7.    Moderation and Monitoring
8.    IP Rights and Ownership
9.    Employee Use
10.   Linking




                                              17
Accessibility
• Accessibility is about the content, not the tool.
• If agencies want to use inaccessible features, they must
  provide alternative access.




                                                             18
Privacy
• Only public information may be posted on social media
  websites.




                                                          19
Public Information Requests
• Follow your agency’s Public Information Requests Policy




                                                            20
Records Retention
• Social media content is considered a public record and is
  subject to State Records Retention requirements.
• Exceptions: Duplicate and Transitory content
• Agencies are responsible for developing their own system of
  classifying, retaining, and disposing of social media content.
• Agencies should consult with TSLAC.




                                                                   21
Security
• Follow your agency’s IT security policies, standards, and
  guidelines.




                                                              22
Third-Party Website Policies and Terms of Use

• Agencies are responsible for accepting a provider’s
  terms of service.
• Facebook revised TOS
• YouTube CLA




                                                        23
Moderation and Monitoring
• The level of moderation is up to the agency.
• Keep in mind First Amendment Rights.




                                                 24
IP Rights and Ownership
• Agencies must ensure it has the right to post all social
  media content and is not infringing on the intellectual
  property rights of others.




                                                             25
Employee Use
• Follow your agency’s Acceptable Use and other HR policies.




                                                               26
Linking
• Agencies are encouraged to follow 1 TAC 206 Linking
  Policies when possible.




                                                        27
Policy Sections
1.    Accessibility
2.    Privacy
3.    Public Information Requests
4.    Records Retention
5.    Security
6.    Third-Party Websites and Terms of Use
7.    Moderation and Monitoring
8.    IP Rights and Ownership
9.    Employee Use
10.   Linking




                                              28
Questions?


   Social Media in Texas Government

                      Jon Lee, DIR
                      jon.lee@dir.texas.gov
                      512-463-8500




                                              29

Weitere ähnliche Inhalte

Was ist angesagt?

Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
Maker party Net Neuatrality
Maker party Net NeuatralityMaker party Net Neuatrality
Maker party Net Neuatralitybilalshaikh7
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionIGF Indonesia
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationmikeecholscyber
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-Kenneth Muhangi Esq.
 
GOOGLE and privacy regulations
GOOGLE and privacy regulationsGOOGLE and privacy regulations
GOOGLE and privacy regulationsKevin Constant
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Content pirates
Content pirates Content pirates
Content pirates LIJIJOYSON
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Developing Policy for Emerging Technologies
Developing Policy for Emerging TechnologiesDeveloping Policy for Emerging Technologies
Developing Policy for Emerging TechnologiesLovisa Williams
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 

Was ist angesagt? (20)

Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Maker party Net Neuatrality
Maker party Net NeuatralityMaker party Net Neuatrality
Maker party Net Neuatrality
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship Transition
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-
 
GOOGLE and privacy regulations
GOOGLE and privacy regulationsGOOGLE and privacy regulations
GOOGLE and privacy regulations
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0
 
Content pirates
Content pirates Content pirates
Content pirates
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Developing Policy for Emerging Technologies
Developing Policy for Emerging TechnologiesDeveloping Policy for Emerging Technologies
Developing Policy for Emerging Technologies
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Social– isms
Social– ismsSocial– isms
Social– isms
 

Ähnlich wie Social Media in Texas Government

Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...
Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...
Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...CanadaHelps / MyCharityConnects
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governmentsCraig Thomler
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1Julian Ranger
 
20220316 ARMA Vancouver How to Implement Social Media Governance
20220316 ARMA Vancouver How to Implement Social Media Governance20220316 ARMA Vancouver How to Implement Social Media Governance
20220316 ARMA Vancouver How to Implement Social Media GovernanceJesse Wilkins
 
Records and information management presentation 2012
Records and information management presentation 2012Records and information management presentation 2012
Records and information management presentation 2012LRNcorporation
 
Launch of ODI 2019 data trust pilots work
Launch of ODI 2019 data trust pilots workLaunch of ODI 2019 data trust pilots work
Launch of ODI 2019 data trust pilots workPeter Wells
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy termsCOMP 113
 
Presentation sdimi risks, challenges and benefits of social media 2011
Presentation sdimi risks, challenges and benefits of social media 2011Presentation sdimi risks, challenges and benefits of social media 2011
Presentation sdimi risks, challenges and benefits of social media 2011ZoeMM
 
Session B: Handout 3
Session B: Handout 3Session B: Handout 3
Session B: Handout 3feitwincities
 
Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1Dave King
 
In-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social NetworkIn-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social NetworkMHCLawyers
 
Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...
Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...
Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...Business Development Institute
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...Kellyton Brito
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookKristine Simpson
 
Summary of Ethics and Information Security (one page)Solution.pdf
Summary of Ethics and Information Security (one page)Solution.pdfSummary of Ethics and Information Security (one page)Solution.pdf
Summary of Ethics and Information Security (one page)Solution.pdfarjuncollection
 

Ähnlich wie Social Media in Texas Government (20)

Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...
Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...
Kirstin Beardsley - Setting the Boundaries: Developing Social Media Policies ...
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
20220316 ARMA Vancouver How to Implement Social Media Governance
20220316 ARMA Vancouver How to Implement Social Media Governance20220316 ARMA Vancouver How to Implement Social Media Governance
20220316 ARMA Vancouver How to Implement Social Media Governance
 
Records and information management presentation 2012
Records and information management presentation 2012Records and information management presentation 2012
Records and information management presentation 2012
 
Launch of ODI 2019 data trust pilots work
Launch of ODI 2019 data trust pilots workLaunch of ODI 2019 data trust pilots work
Launch of ODI 2019 data trust pilots work
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy terms
 
Presentation sdimi risks, challenges and benefits of social media 2011
Presentation sdimi risks, challenges and benefits of social media 2011Presentation sdimi risks, challenges and benefits of social media 2011
Presentation sdimi risks, challenges and benefits of social media 2011
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
Session B: Handout 3
Session B: Handout 3Session B: Handout 3
Session B: Handout 3
 
Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1
 
In-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social NetworkIn-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social Network
 
Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...
Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...
Compliance Considerations in Social Media Initiatives - BDI 5/17/12 Social & ...
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff Braybrook
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
Summary of Ethics and Information Security (one page)Solution.pdf
Summary of Ethics and Information Security (one page)Solution.pdfSummary of Ethics and Information Security (one page)Solution.pdf
Summary of Ethics and Information Security (one page)Solution.pdf
 

Kürzlich hochgeladen

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Social Media in Texas Government

  • 1. Social Media in Texas Government Jon Lee, DIR jon.lee@dir.texas.gov ELITE Monday, 4/2/2012 About 1
  • 2. Social Media is easy, right? Setting up an account takes minutes No software licenses to buy No expensive equipment needed Nothing to install Maybe certain internet access privileges 2
  • 3. …Why isn’t social media as as advertised? 3
  • 4. Quick answer: it’s not about the technology 4
  • 5. Quick answer: it’s not about the technology There are many other factors that affect the chances of success, such as policy, training, culture, internal buy-in, etc… 5
  • 6. For example: A document collaboration tool to manage data proliferation is a great solution… 6
  • 7. For example: …but without a sound implementation strategy, it probably won’t be successful 7
  • 8. It’s like a cell phone The ability to make a wireless call has been around since the 1940s… 8
  • 9. It’s like a cell phone …but it took another 50 years to solve problems related to • Weight • Size • Battery life • Temperature • Durability 9
  • 10. We have to think of Social Media as a package 10
  • 11. …which leads us to the Social Media Toolkit 11
  • 12. …which leads us to the Social Media Toolkit a comprehensive resource to help Texas agencies initiate and improve their social media efforts. 12
  • 13. There are four sections to the Social Media Toolkit… 1. Strategy 3. Content 4. Operations 2. Policy 13
  • 14. There is no rule about social media Social Media Policy 14
  • 15. There is no rule about social media But there are rules about content on a website Social Media Policy 15
  • 16. Public Social Media Policy Some sections need to be communicated to the public, such as • Privacy notification • Moderation policy • Linking policy, • Public Information Act • Third-party website policy • Intellectual property rights and ownership 16
  • 17. Policy Sections 1. Accessibility 2. Privacy 3. Public Information Requests 4. Records Retention 5. Security 6. Third-Party Websites and Terms of Use 7. Moderation and Monitoring 8. IP Rights and Ownership 9. Employee Use 10. Linking 17
  • 18. Accessibility • Accessibility is about the content, not the tool. • If agencies want to use inaccessible features, they must provide alternative access. 18
  • 19. Privacy • Only public information may be posted on social media websites. 19
  • 20. Public Information Requests • Follow your agency’s Public Information Requests Policy 20
  • 21. Records Retention • Social media content is considered a public record and is subject to State Records Retention requirements. • Exceptions: Duplicate and Transitory content • Agencies are responsible for developing their own system of classifying, retaining, and disposing of social media content. • Agencies should consult with TSLAC. 21
  • 22. Security • Follow your agency’s IT security policies, standards, and guidelines. 22
  • 23. Third-Party Website Policies and Terms of Use • Agencies are responsible for accepting a provider’s terms of service. • Facebook revised TOS • YouTube CLA 23
  • 24. Moderation and Monitoring • The level of moderation is up to the agency. • Keep in mind First Amendment Rights. 24
  • 25. IP Rights and Ownership • Agencies must ensure it has the right to post all social media content and is not infringing on the intellectual property rights of others. 25
  • 26. Employee Use • Follow your agency’s Acceptable Use and other HR policies. 26
  • 27. Linking • Agencies are encouraged to follow 1 TAC 206 Linking Policies when possible. 27
  • 28. Policy Sections 1. Accessibility 2. Privacy 3. Public Information Requests 4. Records Retention 5. Security 6. Third-Party Websites and Terms of Use 7. Moderation and Monitoring 8. IP Rights and Ownership 9. Employee Use 10. Linking 28
  • 29. Questions? Social Media in Texas Government Jon Lee, DIR jon.lee@dir.texas.gov 512-463-8500 29