SlideShare ist ein Scribd-Unternehmen logo
1 von 10
How To: Create a
Social Media Policy
Are You Ready to Defend Your Brand?
• If you talk to others on social media via company
accounts, you must be able to back your statements
• All financial social media activity is now subject to FINRA
Regulatory Notice 10-06 compliance.
– Other industries are adopting similar regulations; 10-06 is a
good starting point for industries that don't have an established
regulatory document
• Critics may attack you for what is said online
– Repercussions for small businesses can be devastating
– For large businesses, the cost of influence can cripple
What is a Social Media Policy?
• FINRA Regulatory Notice 10-06 states it is “how firms
and their registered representatives could use social
media sites for legitimate business purposes in a
manner that ensures investor protection.”
– It will “guide firms on applying the communications rules
to social media sites, such as blogs and social networking
sites.”
– “As the use of social media sites increases over time—
investors are protected from false or misleading claims and
…supervise their associated persons’ participation in these
sites.”
A Social Media Policy Is…
• Operating without a social media policy is
like driving without a seatbelt; eventually
it will cost you, and the consequences
could be dire
Keep in Mind…
• An effective social media policy should not shut
down social media activity, but rather encourage it
• This policy will limit your business's liability in the
event that:
– Confidential information is leaked
– Subpoena is issued
– Ediscovery request comes about
What to Include in a Social Media
Policy:
• General business conduct
• Employee personal responsibility online
• Self identification when participating on 3rd
party site (i.e. someone else’s blog)
• Use a disclaimer
–“The postings on this site are my own and
don't necessarily represent IBM’s
positions, strategies or opinions”
• (continued on next page)
What to Include in a Social Media
Policy:
• Protect proprietary and
confidential company
information online
• Never cite client or
customer references
without their approval
• Respect your audience
• Always be transparent
• Use common sense
Having a Social Media Policy in Place
Will Help You…
• Respond appropriately
• Have the right message ready when needed
• Give strict guidelines of what to and not to do
• Outline what can be said about the company online
• Disseminate personal social media usage rights while
at work
• Explain disclaimer policy required by employees
when discussing the company to others
Remember – They’re Listening
• You always have an audience online
– If you send a derogatory tweet, rant about a competitor, or
leave a nasty response on Facebook, it will be seen
• Remain calm and professional online, no matter the
situation
• Have a zero tolerance policy
• Create the policy in a way that encourages
employees to act proactively and positively engage
online
Keep The Records
• FINRA requires “every firm
that intends to communicate,
or permit its associated
persons to communicate,
through social media sites
must first ensure that it can
retain records of those
communications as required.”
• Backupify enables firms to
retain their records of
communications through a
social media backup plan. See
plans and pricing here.

Weitere ähnliche Inhalte

Andere mochten auch

Susuzluk
SusuzlukSusuzluk
Susuzluk
osman
 
D:\Ring O 2nd Grade
D:\Ring O 2nd GradeD:\Ring O 2nd Grade
D:\Ring O 2nd Grade
guest5ac3f31
 
alternatives to hysterectomy
alternatives to hysterectomyalternatives to hysterectomy
alternatives to hysterectomy
Karl Daniel, M.D.
 
Bideoaetahezkuntza
BideoaetahezkuntzaBideoaetahezkuntza
Bideoaetahezkuntza
patricia
 
Tiomf về sức mạnh vô biên
Tiomf về sức mạnh vô biênTiomf về sức mạnh vô biên
Tiomf về sức mạnh vô biên
bita89
 
Small group presentation
Small group presentationSmall group presentation
Small group presentation
VOX Church
 

Andere mochten auch (18)

Selection
SelectionSelection
Selection
 
8 Tips to Scale Faster in the Cloud
8 Tips to Scale Faster in the Cloud8 Tips to Scale Faster in the Cloud
8 Tips to Scale Faster in the Cloud
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
Dasar html
Dasar htmlDasar html
Dasar html
 
Susuzluk
SusuzlukSusuzluk
Susuzluk
 
D:\Ring O 2nd Grade
D:\Ring O 2nd GradeD:\Ring O 2nd Grade
D:\Ring O 2nd Grade
 
19 Luglio 2013 - Il futuro della TV - Marco Cantamessa - I3P
19 Luglio 2013 - Il futuro della TV - Marco Cantamessa - I3P19 Luglio 2013 - Il futuro della TV - Marco Cantamessa - I3P
19 Luglio 2013 - Il futuro della TV - Marco Cantamessa - I3P
 
Calendario
CalendarioCalendario
Calendario
 
Make a difference - MAD - progetto educativo
Make a difference - MAD - progetto educativoMake a difference - MAD - progetto educativo
Make a difference - MAD - progetto educativo
 
Return of blood_diamond
Return of blood_diamondReturn of blood_diamond
Return of blood_diamond
 
alternatives to hysterectomy
alternatives to hysterectomyalternatives to hysterectomy
alternatives to hysterectomy
 
Il programma Innovation4Busness
Il programma Innovation4BusnessIl programma Innovation4Busness
Il programma Innovation4Busness
 
Vượt lên nỗi đau
Vượt lên nỗi đauVượt lên nỗi đau
Vượt lên nỗi đau
 
Bideoaetahezkuntza
BideoaetahezkuntzaBideoaetahezkuntza
Bideoaetahezkuntza
 
Tiomf về sức mạnh vô biên
Tiomf về sức mạnh vô biênTiomf về sức mạnh vô biên
Tiomf về sức mạnh vô biên
 
4.lana
4.lana4.lana
4.lana
 
Small group presentation
Small group presentationSmall group presentation
Small group presentation
 
Apritisettimo 2
Apritisettimo 2Apritisettimo 2
Apritisettimo 2
 

Mehr von Datto

CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 

Mehr von Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google Drive
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

How to Set your Company's Social Media Policy

  • 1. How To: Create a Social Media Policy
  • 2. Are You Ready to Defend Your Brand? • If you talk to others on social media via company accounts, you must be able to back your statements • All financial social media activity is now subject to FINRA Regulatory Notice 10-06 compliance. – Other industries are adopting similar regulations; 10-06 is a good starting point for industries that don't have an established regulatory document • Critics may attack you for what is said online – Repercussions for small businesses can be devastating – For large businesses, the cost of influence can cripple
  • 3. What is a Social Media Policy? • FINRA Regulatory Notice 10-06 states it is “how firms and their registered representatives could use social media sites for legitimate business purposes in a manner that ensures investor protection.” – It will “guide firms on applying the communications rules to social media sites, such as blogs and social networking sites.” – “As the use of social media sites increases over time— investors are protected from false or misleading claims and …supervise their associated persons’ participation in these sites.”
  • 4. A Social Media Policy Is… • Operating without a social media policy is like driving without a seatbelt; eventually it will cost you, and the consequences could be dire
  • 5. Keep in Mind… • An effective social media policy should not shut down social media activity, but rather encourage it • This policy will limit your business's liability in the event that: – Confidential information is leaked – Subpoena is issued – Ediscovery request comes about
  • 6. What to Include in a Social Media Policy: • General business conduct • Employee personal responsibility online • Self identification when participating on 3rd party site (i.e. someone else’s blog) • Use a disclaimer –“The postings on this site are my own and don't necessarily represent IBM’s positions, strategies or opinions” • (continued on next page)
  • 7. What to Include in a Social Media Policy: • Protect proprietary and confidential company information online • Never cite client or customer references without their approval • Respect your audience • Always be transparent • Use common sense
  • 8. Having a Social Media Policy in Place Will Help You… • Respond appropriately • Have the right message ready when needed • Give strict guidelines of what to and not to do • Outline what can be said about the company online • Disseminate personal social media usage rights while at work • Explain disclaimer policy required by employees when discussing the company to others
  • 9. Remember – They’re Listening • You always have an audience online – If you send a derogatory tweet, rant about a competitor, or leave a nasty response on Facebook, it will be seen • Remain calm and professional online, no matter the situation • Have a zero tolerance policy • Create the policy in a way that encourages employees to act proactively and positively engage online
  • 10. Keep The Records • FINRA requires “every firm that intends to communicate, or permit its associated persons to communicate, through social media sites must first ensure that it can retain records of those communications as required.” • Backupify enables firms to retain their records of communications through a social media backup plan. See plans and pricing here.