Social Networking Policy Template
Comes with Electronic Social Networking Policy Agreement Form
Updated to reflect impact of HTML5 developments
With increased adoption of social networks among the public, organizations have begun setting up profiles within social networks as a means to further connect with their audiences. Organizations who have been most successful in these endeavors take time to survey the community, understand the values and rules of engagement. In short, they pay attention to the culture and identify what is accepted before they join. When they join, the organizations who have had success within social networks remember that this isn’t a place for traditional public relations tactics but a place for engagement. These organizations don’t always just talk about themselves, but they have real and human-toned conversations with real people.
Social networking is going corporate. The popular technology used by millions of people to share ideas and photos on MySpace, Facebook, LinkedIn and others is catching on at companies to improve productivity and communication among workers. Private, internal social networks make sense as companies grapple with a slumping economy that has made travel cost-prohibitive even as work forces are spread out as never before.
Janco recommends that companies embrace social networking because:
- Social networking is going to happen - Workers increasingly have Internet access on their smart phones. By the year 2013, 43% of global mobile internet users (607.5 million people worldwide) will be accessing social networks from their mobile devices.
- Most employees will use it wisely and for the benefit of the enterprise - Some CIOs fear that social networking would lead to "Networking" instead of doing their jobs. Employees with proper training and guidance will use this new "technology" in ways that will enhance the enterprise's products an services.
- Social networks actually can make workers more productive - Three out of four of the 895 experts interviewed for the recent Pew Internet report The Future of the Internet IV, said that use of the Internet enhances and augments human intelligence, and two-thirds said use of the Internet has improved reading, writing, and rendering of knowledge.
- Great ideas are gems that are ready to be found on social networks - Great ideas can come from any level of a company. Using social networks internally (wikis, blogs, forums, even IM) fosters collaboration, and allows workers at all levels to contribute ideas.
- Employees are trustworthy - Managers worry that employees will leak confidential information, or speak poorly of the company. but with the proper training and procedures in place this is a non-issue.
The issue faced by enterprises of all sizes is ensuring that the right message is being communicated in a consistent manner. The first step in achieving this objective is to have a uniform social network policy.
The Social Networking Policy Template is the right tool for this task. With it you can successfully manage and control your employees’ activity that are related to your enterprise.
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers.
These sites are continuing to proliferate. For example, Facebook is the second most popular site in the world and is continuing to grow in popularity with nearly 60% of global Internet users visiting the site in December 2011, up from approximately 34% in June 2010.
- The numbers of users on the site now exceeds 800 million, 70% of which are located outside of the US.
- The rapid growth in popularity and usage of such sites is just part of the problem.
Companies unaware of the associated dangers of these types of websites risk getting caught of guard.
- Inadvertent disclosure of confidential information is also a risk. You wouldn't publish your
organization chart and phone directory on the internet; but a head-hunter or identity thief can use information on social networking sites to reconstruct this kind of information.
- Sites that allow third parties to run applications that have access to user profiles. This is a potential privacy risk. People publish a wealth of personal information in their profiles. This makes social networking sites a happy hunting ground for identity thieves and con men.
- Social networking sites can be addictive and time-consuming. Cyber-slacking is a genuine
- There is also a risk to your company's reputation. Social networking is more public and less formal than company e-mail. It is also easier to use than blog software. It's easy to imagine employees posting pictures or text that would embarrass their employer.
- Viruses and spyware: Social Networking sites often display advertisements.
The policies have just been updated to comply with all mandated requirements and include electronic forms that can be Emailed, filled out completely on the computer, routed and stored electronically -- a total solution.
We have just completed a major update of most of the individual polices and almost all of the electronic forms.
- CIO IT Infrastructure Policy Bundle (All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable)
- Backup and Backup Retention Policy
- Blog and Personal Web Site Policy (Includes electronic Blog Compliance Agreement Form)
- BYOD Policy Template (Includes electronic BYOD Access and Use Agreement Form)
- Google Glass Policy (Includes Google Glass Access and Use Agreement Form)
- Incident Communication Plan Policy (Updated to include social networks as a communication path)
- Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy(Includes 5 electronic forms to aid in the quick deployment of this policy)
- Mobile Device Access and Use Policy
- Patch Management Policy
- Outsourcing and Cloud Based File Sharing Policy
- Physical and Virtual Server Security Policy
- Record Management, Retention, and Destruction Policy
- Sensitive Information Policy(HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form)
- Service Level Agreement (SLA) Policy Template with Metrics
- Social Networking Policy(includes electronic form)
- Telecommuting Policy(includes 3 electronic forms to effectively manage work at home staff)
- Text Messaging Sensitive and Confidential Information (includes electronic form)
- Travel, Electronic Meeting, and Off-Site Meeting Policy
- Wearable Device Policy
- IT Infrastructure Electronic Forms