SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
TrueCompliance for Social Media
                        ™



When”good enough” is not enough
Introduction


   It is no secret that social media within the financial services industry has
   exploded over the last few years. The industry recognises that social media
   is a powerful, cost-effective channel to reach new customers and strengthen
   existing relationships. However, enabling the use of social within a corporate
   environment also has compliance and security implications.


   Existing Financial Services Authority (FSA) rules still apply, and the regula-
   tor has issued additional guidelines on the use of social over the last couple
   years. There is of course other European legislation to be considered such
   as MiFID and PCI. Moreover, all these different social media channels today
   represent attractive avenues for hackers to unleash viruses and other types
   of malware on unsuspecting users. So, although the benefits of social are
   massive, organisations need to ensure they have the appropriate technology
   solutions in place to address these compliance and security concerns.
Compliance Requirements for Financial Services


     Let’s take a closer look at the FSA’s guidelines. In its Financial Promotions       •	 Guaranteed message order preservation: Given the interactive nature
     Industry Update No 5 the FSA noted that all electronic communications                 of social media, retaining the context of blogs and their comments,
     shared via the internet should still be governed by High Level Standards              Facebook chat conversations, and LinkedIn Group discussions is vital.
     and Business Standards. Within these regulations there are two main areas             Without context, firms face the daunting prospect of having to piece
     that need consideration when using social media.                                      together one conversation from a vast repository of data.


     Recordkeeping                                                                       •	Non-repudiation: This refers to proof of the integrity and origin of
     SYSC 9.1 General rules on record-keeping states that “A firm must arrange             data. With so many hackers and sophisticated schemes to deceive users,
     for orderly records to be kept of its business and internal organisation,             data authenticity is a key consideration.
     including all services and transactions undertaken by it, which must be
     sufficient to enable the FSA or any other relevant competent authority under        Supervision
     MiFID to monitor the firm’s compliance with the requirements under the              FSA regulated firms should review items such as LinkedIn Profiles
     regulatory system.” This includes content such as LinkedIn Profile edits,           and Facebook Profiles since they could be considered “advertisements”
     Facebook posts, and Tweets are all subject to recordkeeping rules.                  subject to pre-approval by an authorized person.


     In addition, ICOBS 2.4, MCOB 3.10 and COBS 4.11 state that adequate                 Some specific facets of supervision that firms must incorporate include
     records of financial promotions must be kept. COBS 4.11.1 (1) specifically          the following:
     says “it communicates or approves,” potentially implying that even unau-
     thorised communication needs to be recorded.                                        •	Real-time content review: COBS 4.10.3 and MCOB 3.11.1 prohibits
                                                                                           unauthorised personnel from sending out financial promotions without
     Some specific facets of recordkeeping that firms must incorporate include             prior approval from the FSA registered firm. Under Update number 5
     the following:                                                                        this includes Tweets, status updates and LinkedIn Posts.


     •	Tamper-proof archiving: Electronic records must be preserved exclusively          •	Monitoring of links to third-party sites: Hyperlinks can be considered
       in a non-rewriteable and non-erasable format. This means that data must             inducements depending on the prominence and type of link eg clicking
       be delivered to a customer’s archiving system in its original form.                 on a logo. Links to third party sites are not normally considered a financial
                                                                                           promotion, unless there is an agreement between the two to procure users.




 4   | TrueCompliance for Social Media                                               5   | Social Media Success                             True Compliance for Social Media   | 5
Addressing the Requirements


     So, what must firms do to properly address the requirements outline above?      Capture as much as possible
     The following are some key considerations:                                      The FSA and MiFID require firms to capture all business-related communi-
                                                                                     cations. With the proliferation of smartphones nowadays, it is essential for
     Pre-review certain communications                                               firms to have policies and technology in place to accommodate the reality of
     There are some aspects of social media sites that unequivocally require         employees using personal devices for business-related communications.
     pre-approval by an authorised person. For instance, a tweet that could be
     deemed a financial promotion posted by an unauthorised person. Regarding        Authenticity of data
     general tweets or Facebook posts, the FSA leaves it up to the individual firm   Firms must store social media content in tamper-proof repositories, such
     to decide its policy based on its risk-tolerance profile.                       that data integrity is not compromised. Message order preservation and
                                                                                     guaranteed delivery to the customer’s archive are two such ways to ensure
     Feature access controls                                                         authenticity of data.
     Since some social media features may invoke the “inducement” or
     “procurement” theories, controlling individual features, such as Facebook
     Likes, LinkedIn Recommendations, or Twitter Retweets, becomes critical.
     Being able to pick and choose the allowable features gives firms the
     flexibility to enable the use of social without having to worry about the
     “inducement” issue.


     Tracking user activities
     Establishing a complete audit trail of a user’s interaction with a given
     social media site comes into play in both regulatory and legal inquiries.
     For instance, say there’s a lawsuit involving the social media activities of
     John Smith while he was at work on a corporate-owned device. Counsel for
     both sides would be very interested in knowing what Smith was doing from
     10am-11am while on Facebook. Did he upload any content? Did he delete
     any content? What other areas (e.g., Photos, Groups, Discussion boards,
     Chat) did he visit during that one hour? Did he post content to other sites
     from Facebook? The user activity history thus becomes very relevant.




 6   | TrueCompliance for Social Media                                                                                                 True Compliance for Social Media   | 7
Potential Technology Solutions


     Solutions that enable compliance for social media generally take one of two            All user activities can be logged (e.g., a user’s entire Facebook session can
     technology approaches: the API and the proxy.                                          be captured with all the associated metadata) and archived. Pre-review capa-
                                                                                            bilities and blocking/allowing access to specific features of a social network
     The API                                                                                (e.g., Facebook Like, LinkedIn Recommendation, Twitter Retweet) are also
     Each social network (e.g., Facebook, LinkedIn, and Twitter) makes its API              made possible with the proxy. Most importantly, a proxy eliminates the API’s
     available to third-party developers. Each API is a little bit different. For           “window of vulnerability” due to the former’s real-time capture of data.
     instance, each social network allows calls to its API (“API calls”) only a
     limited number of times per day. That number depends on several factors,
     such as the number of employees at the company calling the API. It also
     means that capture is NOT done in real-time.


     In the period between each of these API calls, comments or posts on, say,
     Facebook can be edited or deleted. These edits and deletions are just as
     important as the initial posts themselves. Regulatory bodies like the FSA
     are interested in the deleted content as much as the content that remains
     unchanged. This period between API calls is that “window of vulnerability”
     that opens the door to potential non-compliance, putting the firm at risk for
     sanctions or other penalties.


     The Proxy
     This approach entails the routing of social media traffic through a technol-
     ogy vendor’s solution, be it through proxy-forwarding rules or a proxy auto-
     configuration (PAC) file. Either way, the technology vendor sees all the traffic
     in real-time, as it happens. It offers the most granular controls available for
     users on a corporate-managed device or network.




 8   | TrueCompliance for Social Media                                                  9   | Social Media Success                             True Compliance for Social Media   | 9
The Best Practice Solution                                                                          About Actiance


      Given the stringent requirements regulatory governance, firms must                                  Actiance is the only technology vendor in the market that utilizes both
      leverage both approaches to ensure complete compliance. On their own,                               the API and proxy methods to ensure its customers remain compliant.
      the API and proxy are not enough to remain compliant. The best practice,                            In fact, Actiance is the only vendor offering TrueCompliance,    TM




      therefore, is to use BOTH, so that a firm can confidently meet all of its                           a collection of features that support the strictest requirements of
      compliance requirements (see table below).                                                          social media compliance:


       Requirement       Detail                        Example                        Proxy   API
                                                                                                          •	Tamper-proof archiving
       Supervision       Pre-review                    LinkedIn Profile edits         Yes     No          •	Guaranteed preservation of message/conversation order (context)
       Supervision       Feature access controls       Block Facebook Like            Yes     No          •	Guaranteed data delivery to customer’s archiving system
       Recordkeeping     Real-time capture of ALL      Archive all tweets, Facebook   Yes     No          •	Guaranteed non-circumvention
                         content while on corporate-   posts, LinkedIn updates done
                         managed network or device     from a work laptop
                                                                                                          •	Real-time content filtering with advanced pattern matching,
       Recordkeeping     Logging of user activities    Track user movement from       Yes     No          	 blocking and scanning (supervision)
                                                       LinkedIn Homepage to join-
                                                       ing LinkedIn Group to trying
                                                       to make a Recommendation
       Recordkeeping     Capture of content regard-    Capture business-related       No      Yes
                         less of device or location    tweet made from a personal
                                                       iPhone
       Recordkeeping     Automatic removal of inap-    Removal of offensive joke      No      Yes
                         propriate content             from company Facebook
                                                       page




 10   | TrueCompliance for Social Media                                                              11   | Social Media Success                             True Compliance for Social Media   | 11
Worldwide Headquarters                  EMEA Headquarters
     1301 Shoreway, Suite 275                400 Thames Valley Park
     Belmont, CA 94002 USA                   Reading, Berkshire, RG6 1PT UK
     (650) 631-6300 phone                    +44 (0) 118 963 7469 phone
     info@actiance.com                       emea@actiance.com




     This document is for informational purposes only. Actiance makes no warranties, express or implied,
     in this document.

     Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights
     under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system,
     or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise),
     or for any purpose, without the express written permission of Actiance, Inc.

     © 2001 - 2012 Actiance, Inc. All rights reserved. Actiance and the Actiance logo are registered trademarks of
     Actiance, Inc. Actiance Vantage, Unified Security Gateway, Socialite, TrueCompliance and Insight are trademarks
     of Actiance, Inc. All other trademarks are the property of their respective owners.




12   | TrueCompliance for Social Media

Mais conteúdo relacionado

Mais procurados

Project_casia_alchemist
Project_casia_alchemistProject_casia_alchemist
Project_casia_alchemistmitesh gajjar
 
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...Actiance, Inc.
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Business Development Institute
 
Intro to Investor Relations Online in 2009
Intro to Investor Relations Online in 2009Intro to Investor Relations Online in 2009
Intro to Investor Relations Online in 2009Dominic Jones
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineHector Hoyos
 
Biometrics Today article
Biometrics Today articleBiometrics Today article
Biometrics Today articleHector Hoyos
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White PaperHector Hoyos
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarNICSA
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Social Media Marketing for the Rest of Us
Social Media Marketing for the Rest of UsSocial Media Marketing for the Rest of Us
Social Media Marketing for the Rest of UsBernie Borges
 

Mais procurados (12)

Project_casia_alchemist
Project_casia_alchemistProject_casia_alchemist
Project_casia_alchemist
 
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
Handbook on Interpreting FINRA Regulatory Notices 10-06 and 11-39 and Using S...
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Intro to Investor Relations Online in 2009
Intro to Investor Relations Online in 2009Intro to Investor Relations Online in 2009
Intro to Investor Relations Online in 2009
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
 
Biometrics Today article
Biometrics Today articleBiometrics Today article
Biometrics Today article
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White Paper
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Social Media Marketing for the Rest of Us
Social Media Marketing for the Rest of UsSocial Media Marketing for the Rest of Us
Social Media Marketing for the Rest of Us
 

Destaque

1 luis torres la nueva agenda de mejora de la competitividad de las pymes
1 luis torres   la nueva agenda de mejora de la competitividad de las pymes1 luis torres   la nueva agenda de mejora de la competitividad de las pymes
1 luis torres la nueva agenda de mejora de la competitividad de las pymesFundación Romero
 
Mypes y pymes en el perú
Mypes y pymes en el perúMypes y pymes en el perú
Mypes y pymes en el perúBoris Oliver
 
Micro, pequeña, mediana y grande empresa
Micro, pequeña, mediana y grande empresaMicro, pequeña, mediana y grande empresa
Micro, pequeña, mediana y grande empresaSERGIO1552
 
clasificacion de empresas
clasificacion de empresasclasificacion de empresas
clasificacion de empresasguest4a7714
 

Destaque (9)

1 luis torres la nueva agenda de mejora de la competitividad de las pymes
1 luis torres   la nueva agenda de mejora de la competitividad de las pymes1 luis torres   la nueva agenda de mejora de la competitividad de las pymes
1 luis torres la nueva agenda de mejora de la competitividad de las pymes
 
Las PYMES en el Peru - Modulo 7
Las PYMES  en el Peru - Modulo 7Las PYMES  en el Peru - Modulo 7
Las PYMES en el Peru - Modulo 7
 
Mypes Y Pymes
Mypes Y PymesMypes Y Pymes
Mypes Y Pymes
 
Las pymes en perú
Las pymes en perúLas pymes en perú
Las pymes en perú
 
Ppt pyme 2013
Ppt pyme 2013Ppt pyme 2013
Ppt pyme 2013
 
PEQUEÑAS Y MEDIANAS EMPRESAS
PEQUEÑAS Y MEDIANAS EMPRESASPEQUEÑAS Y MEDIANAS EMPRESAS
PEQUEÑAS Y MEDIANAS EMPRESAS
 
Mypes y pymes en el perú
Mypes y pymes en el perúMypes y pymes en el perú
Mypes y pymes en el perú
 
Micro, pequeña, mediana y grande empresa
Micro, pequeña, mediana y grande empresaMicro, pequeña, mediana y grande empresa
Micro, pequeña, mediana y grande empresa
 
clasificacion de empresas
clasificacion de empresasclasificacion de empresas
clasificacion de empresas
 

Semelhante a True Compliance for Social Media

Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media Ogilvy Consulting
 
SocialVolt FINRA Guideance Whitepaper
SocialVolt FINRA Guideance WhitepaperSocialVolt FINRA Guideance Whitepaper
SocialVolt FINRA Guideance WhitepaperSocialVolt
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresPatton Boggs LLP
 
Social Media: UK FCA Guidance Consultation Summary & Opinion
Social Media: UK FCA Guidance Consultation Summary & OpinionSocial Media: UK FCA Guidance Consultation Summary & Opinion
Social Media: UK FCA Guidance Consultation Summary & OpinionDominic Crosthwaite
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Centre for Advanced Management Education
 
Technology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRMTechnology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRMAshley Leonzio
 
globalrelay_archive_social_media_compliance_solutions_overview
globalrelay_archive_social_media_compliance_solutions_overviewglobalrelay_archive_social_media_compliance_solutions_overview
globalrelay_archive_social_media_compliance_solutions_overviewTom Johnston
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
Web and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial IndustryWeb and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial IndustryPageFreezer
 
Make social networking work for you
Make social networking work for youMake social networking work for you
Make social networking work for youNuno Fraga Coelho
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...
David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...
David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...Business Development Institute
 
Better Business Insight Means Better Business Decisions (11/11/12)
Better Business Insight Means Better Business Decisions (11/11/12)Better Business Insight Means Better Business Decisions (11/11/12)
Better Business Insight Means Better Business Decisions (11/11/12)Davalen LLC
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
The Social Layer
The Social LayerThe Social Layer
The Social LayerReadWrite
 
What are the Most Advanced Features for Fintech Web Apps in 2023
What are the Most Advanced Features for Fintech Web Apps in 2023What are the Most Advanced Features for Fintech Web Apps in 2023
What are the Most Advanced Features for Fintech Web Apps in 2023Amplework Software Pvt. Ltd.
 
How to leverage B2B social networking with standard users seattle 2010
How to leverage B2B  social networking with standard users seattle 2010How to leverage B2B  social networking with standard users seattle 2010
How to leverage B2B social networking with standard users seattle 2010The Oren Group
 

Semelhante a True Compliance for Social Media (20)

Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media
 
SocialVolt FINRA Guideance Whitepaper
SocialVolt FINRA Guideance WhitepaperSocialVolt FINRA Guideance Whitepaper
SocialVolt FINRA Guideance Whitepaper
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
 
Social Media: UK FCA Guidance Consultation Summary & Opinion
Social Media: UK FCA Guidance Consultation Summary & OpinionSocial Media: UK FCA Guidance Consultation Summary & Opinion
Social Media: UK FCA Guidance Consultation Summary & Opinion
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Technology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRMTechnology Analysis - Social Networking as an Avenue for CRM
Technology Analysis - Social Networking as an Avenue for CRM
 
globalrelay_archive_social_media_compliance_solutions_overview
globalrelay_archive_social_media_compliance_solutions_overviewglobalrelay_archive_social_media_compliance_solutions_overview
globalrelay_archive_social_media_compliance_solutions_overview
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Web and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial IndustryWeb and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial Industry
 
Social Media for IR
Social Media for IRSocial Media for IR
Social Media for IR
 
Make social networking work for you
Make social networking work for youMake social networking work for you
Make social networking work for you
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...
David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...
David Chung Presentation - BDI 7/12/12 Social Media Security & Compliance Wor...
 
India hardy presentation
India hardy   presentationIndia hardy   presentation
India hardy presentation
 
Better Business Insight Means Better Business Decisions (11/11/12)
Better Business Insight Means Better Business Decisions (11/11/12)Better Business Insight Means Better Business Decisions (11/11/12)
Better Business Insight Means Better Business Decisions (11/11/12)
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
The Social Layer
The Social LayerThe Social Layer
The Social Layer
 
What are the Most Advanced Features for Fintech Web Apps in 2023
What are the Most Advanced Features for Fintech Web Apps in 2023What are the Most Advanced Features for Fintech Web Apps in 2023
What are the Most Advanced Features for Fintech Web Apps in 2023
 
How to leverage B2B social networking with standard users seattle 2010
How to leverage B2B  social networking with standard users seattle 2010How to leverage B2B  social networking with standard users seattle 2010
How to leverage B2B social networking with standard users seattle 2010
 

Mais de Actiance, Inc.

Compliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsCompliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsActiance, Inc.
 
The case for social media management and archiving
The case for social media management and archivingThe case for social media management and archiving
The case for social media management and archivingActiance, Inc.
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your companyActiance, Inc.
 
Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
 
The impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your businessThe impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your businessActiance, Inc.
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms Actiance, Inc.
 
Messaging best practices for 2011
Messaging best practices for 2011Messaging best practices for 2011
Messaging best practices for 2011Actiance, Inc.
 
Compliance implications of social media
Compliance implications of social mediaCompliance implications of social media
Compliance implications of social mediaActiance, Inc.
 
Importance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industryImportance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industryActiance, Inc.
 
How do you quantify ROI on social media?
How do you quantify ROI on social media?How do you quantify ROI on social media?
How do you quantify ROI on social media?Actiance, Inc.
 
IDC event flash on Socialite launch
IDC event flash on Socialite launchIDC event flash on Socialite launch
IDC event flash on Socialite launchActiance, Inc.
 
Enterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to LyncEnterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to LyncActiance, Inc.
 
Social Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesSocial Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesActiance, Inc.
 

Mais de Actiance, Inc. (13)

Compliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsCompliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered Firms
 
The case for social media management and archiving
The case for social media management and archivingThe case for social media management and archiving
The case for social media management and archiving
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your company
 
Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communications
 
The impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your businessThe impact of the new FRCP amendments on your business
The impact of the new FRCP amendments on your business
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms
 
Messaging best practices for 2011
Messaging best practices for 2011Messaging best practices for 2011
Messaging best practices for 2011
 
Compliance implications of social media
Compliance implications of social mediaCompliance implications of social media
Compliance implications of social media
 
Importance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industryImportance of social media in Pharmaceutical industry
Importance of social media in Pharmaceutical industry
 
How do you quantify ROI on social media?
How do you quantify ROI on social media?How do you quantify ROI on social media?
How do you quantify ROI on social media?
 
IDC event flash on Socialite launch
IDC event flash on Socialite launchIDC event flash on Socialite launch
IDC event flash on Socialite launch
 
Enterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to LyncEnterprises are upgrading from Microsoft OCS to Lync
Enterprises are upgrading from Microsoft OCS to Lync
 
Social Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesSocial Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery Issues
 

Último

QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 

Último (20)

QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 

True Compliance for Social Media

  • 1. TrueCompliance for Social Media ™ When”good enough” is not enough
  • 2. Introduction It is no secret that social media within the financial services industry has exploded over the last few years. The industry recognises that social media is a powerful, cost-effective channel to reach new customers and strengthen existing relationships. However, enabling the use of social within a corporate environment also has compliance and security implications. Existing Financial Services Authority (FSA) rules still apply, and the regula- tor has issued additional guidelines on the use of social over the last couple years. There is of course other European legislation to be considered such as MiFID and PCI. Moreover, all these different social media channels today represent attractive avenues for hackers to unleash viruses and other types of malware on unsuspecting users. So, although the benefits of social are massive, organisations need to ensure they have the appropriate technology solutions in place to address these compliance and security concerns.
  • 3. Compliance Requirements for Financial Services Let’s take a closer look at the FSA’s guidelines. In its Financial Promotions • Guaranteed message order preservation: Given the interactive nature Industry Update No 5 the FSA noted that all electronic communications of social media, retaining the context of blogs and their comments, shared via the internet should still be governed by High Level Standards Facebook chat conversations, and LinkedIn Group discussions is vital. and Business Standards. Within these regulations there are two main areas Without context, firms face the daunting prospect of having to piece that need consideration when using social media. together one conversation from a vast repository of data. Recordkeeping • Non-repudiation: This refers to proof of the integrity and origin of SYSC 9.1 General rules on record-keeping states that “A firm must arrange data. With so many hackers and sophisticated schemes to deceive users, for orderly records to be kept of its business and internal organisation, data authenticity is a key consideration. including all services and transactions undertaken by it, which must be sufficient to enable the FSA or any other relevant competent authority under Supervision MiFID to monitor the firm’s compliance with the requirements under the FSA regulated firms should review items such as LinkedIn Profiles regulatory system.” This includes content such as LinkedIn Profile edits, and Facebook Profiles since they could be considered “advertisements” Facebook posts, and Tweets are all subject to recordkeeping rules. subject to pre-approval by an authorized person. In addition, ICOBS 2.4, MCOB 3.10 and COBS 4.11 state that adequate Some specific facets of supervision that firms must incorporate include records of financial promotions must be kept. COBS 4.11.1 (1) specifically the following: says “it communicates or approves,” potentially implying that even unau- thorised communication needs to be recorded. • Real-time content review: COBS 4.10.3 and MCOB 3.11.1 prohibits unauthorised personnel from sending out financial promotions without Some specific facets of recordkeeping that firms must incorporate include prior approval from the FSA registered firm. Under Update number 5 the following: this includes Tweets, status updates and LinkedIn Posts. • Tamper-proof archiving: Electronic records must be preserved exclusively • Monitoring of links to third-party sites: Hyperlinks can be considered in a non-rewriteable and non-erasable format. This means that data must inducements depending on the prominence and type of link eg clicking be delivered to a customer’s archiving system in its original form. on a logo. Links to third party sites are not normally considered a financial promotion, unless there is an agreement between the two to procure users. 4 | TrueCompliance for Social Media 5 | Social Media Success True Compliance for Social Media | 5
  • 4. Addressing the Requirements So, what must firms do to properly address the requirements outline above? Capture as much as possible The following are some key considerations: The FSA and MiFID require firms to capture all business-related communi- cations. With the proliferation of smartphones nowadays, it is essential for Pre-review certain communications firms to have policies and technology in place to accommodate the reality of There are some aspects of social media sites that unequivocally require employees using personal devices for business-related communications. pre-approval by an authorised person. For instance, a tweet that could be deemed a financial promotion posted by an unauthorised person. Regarding Authenticity of data general tweets or Facebook posts, the FSA leaves it up to the individual firm Firms must store social media content in tamper-proof repositories, such to decide its policy based on its risk-tolerance profile. that data integrity is not compromised. Message order preservation and guaranteed delivery to the customer’s archive are two such ways to ensure Feature access controls authenticity of data. Since some social media features may invoke the “inducement” or “procurement” theories, controlling individual features, such as Facebook Likes, LinkedIn Recommendations, or Twitter Retweets, becomes critical. Being able to pick and choose the allowable features gives firms the flexibility to enable the use of social without having to worry about the “inducement” issue. Tracking user activities Establishing a complete audit trail of a user’s interaction with a given social media site comes into play in both regulatory and legal inquiries. For instance, say there’s a lawsuit involving the social media activities of John Smith while he was at work on a corporate-owned device. Counsel for both sides would be very interested in knowing what Smith was doing from 10am-11am while on Facebook. Did he upload any content? Did he delete any content? What other areas (e.g., Photos, Groups, Discussion boards, Chat) did he visit during that one hour? Did he post content to other sites from Facebook? The user activity history thus becomes very relevant. 6 | TrueCompliance for Social Media True Compliance for Social Media | 7
  • 5. Potential Technology Solutions Solutions that enable compliance for social media generally take one of two All user activities can be logged (e.g., a user’s entire Facebook session can technology approaches: the API and the proxy. be captured with all the associated metadata) and archived. Pre-review capa- bilities and blocking/allowing access to specific features of a social network The API (e.g., Facebook Like, LinkedIn Recommendation, Twitter Retweet) are also Each social network (e.g., Facebook, LinkedIn, and Twitter) makes its API made possible with the proxy. Most importantly, a proxy eliminates the API’s available to third-party developers. Each API is a little bit different. For “window of vulnerability” due to the former’s real-time capture of data. instance, each social network allows calls to its API (“API calls”) only a limited number of times per day. That number depends on several factors, such as the number of employees at the company calling the API. It also means that capture is NOT done in real-time. In the period between each of these API calls, comments or posts on, say, Facebook can be edited or deleted. These edits and deletions are just as important as the initial posts themselves. Regulatory bodies like the FSA are interested in the deleted content as much as the content that remains unchanged. This period between API calls is that “window of vulnerability” that opens the door to potential non-compliance, putting the firm at risk for sanctions or other penalties. The Proxy This approach entails the routing of social media traffic through a technol- ogy vendor’s solution, be it through proxy-forwarding rules or a proxy auto- configuration (PAC) file. Either way, the technology vendor sees all the traffic in real-time, as it happens. It offers the most granular controls available for users on a corporate-managed device or network. 8 | TrueCompliance for Social Media 9 | Social Media Success True Compliance for Social Media | 9
  • 6. The Best Practice Solution About Actiance Given the stringent requirements regulatory governance, firms must Actiance is the only technology vendor in the market that utilizes both leverage both approaches to ensure complete compliance. On their own, the API and proxy methods to ensure its customers remain compliant. the API and proxy are not enough to remain compliant. The best practice, In fact, Actiance is the only vendor offering TrueCompliance, TM therefore, is to use BOTH, so that a firm can confidently meet all of its a collection of features that support the strictest requirements of compliance requirements (see table below). social media compliance: Requirement Detail Example Proxy API • Tamper-proof archiving Supervision Pre-review LinkedIn Profile edits Yes No • Guaranteed preservation of message/conversation order (context) Supervision Feature access controls Block Facebook Like Yes No • Guaranteed data delivery to customer’s archiving system Recordkeeping Real-time capture of ALL Archive all tweets, Facebook Yes No • Guaranteed non-circumvention content while on corporate- posts, LinkedIn updates done managed network or device from a work laptop • Real-time content filtering with advanced pattern matching, Recordkeeping Logging of user activities Track user movement from Yes No blocking and scanning (supervision) LinkedIn Homepage to join- ing LinkedIn Group to trying to make a Recommendation Recordkeeping Capture of content regard- Capture business-related No Yes less of device or location tweet made from a personal iPhone Recordkeeping Automatic removal of inap- Removal of offensive joke No Yes propriate content from company Facebook page 10 | TrueCompliance for Social Media 11 | Social Media Success True Compliance for Social Media | 11
  • 7. Worldwide Headquarters EMEA Headquarters 1301 Shoreway, Suite 275 400 Thames Valley Park Belmont, CA 94002 USA Reading, Berkshire, RG6 1PT UK (650) 631-6300 phone +44 (0) 118 963 7469 phone info@actiance.com emea@actiance.com This document is for informational purposes only. Actiance makes no warranties, express or implied, in this document. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Actiance, Inc. © 2001 - 2012 Actiance, Inc. All rights reserved. Actiance and the Actiance logo are registered trademarks of Actiance, Inc. Actiance Vantage, Unified Security Gateway, Socialite, TrueCompliance and Insight are trademarks of Actiance, Inc. All other trademarks are the property of their respective owners. 12 | TrueCompliance for Social Media