SlideShare a Scribd company logo
1 of 59
Social Media Governance in Federal Agencies Jesse Wilkins, CRM AIIM International July 20, 2011
International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology  Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org  http://www.aiimcommunities.org About AIIM
Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Frequent industry speaker and author AIIM ERM and Social Business Expert Blogger Instructor for AIIM Certificate Programs Jesse Wilkins, CRM, CDIA+, ERMM
    By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery.        Source: “Social Media Governance: An Ounce of Prevention”, Gartner  It’s just a fad….
Is a Facebook “like” a record?
The social media governance framework Structural elements of a comprehensive social media policy Social media policy statements Managing social media content as records Agenda
The social media governance framework
Prohibition is not realistic
“A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers.  We call this new kind of company the networked enterprise.”
Ensures that employees know what is expected of them Provides guidelines for being more effective Reduces risk of someone posting inappropriate content Addresses legal and operational concerns Why a governance framework?
Management  Strategic roles and responsibilities  Organization  Groups and structures required to manage information Policy and procedures Processes and standards for managing information The governance framework
Determines overall strategic goals of organization Provides support for social media initiative(s) Determines need for policy guidance Determines need for enterprise solutions Supports – or doesn’t – transformation efforts Management
Governance roles required to ensure compliance with the framework Includes usual suspects… Also includes new roles Social media strategist Community managers Moderators Organization
Social content is just another form of content Policy should provide a framework applicable to most or all social media tools – and to other content/communication-related technologies as well DON’T write a Facebook policy, a Twitter policy, etc. The social media policy
Be smart. Be respectful. Be human. Best Buy Social Media Policy
Be real and use your best judgment.  Zappos Twitter Policy
Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.” Policy 2.0 – in 140 characters
Structural elements of a social media policy
Purpose Scope  Responsibilities Definitions Policy statements References Policy elements
This policy has three purposes: Establish definitions relevant to social business technologies Describe usage policies relating to social business technologies Describe security and technology policies relating to social business technologies Scope: This policy is applicable to the entire enterprise.  Purpose and scope
Responsibilities for policy development and maintenance Responsibilities for policy administration Responsibilities for compliance with policy Responsibilities
Uncommon terms Common terms used in an uncommon fashion Acronyms and abbreviations Definitions
Many different elements available Detailed in the next section Policy statements
List any references used to develop the policy Internal strategic documents Existing policies and                  procedures Statutes and regulations Publications  Examples and templates References
Social media policy statements
Official vs. unofficial Link to social media policy
Creation of official accounts
Account details User name Picture Corporate logo usage Bio Contact information Friends/buddies/contacts Groups/fans/likes Look & feel guidelines
Whether posts will require approval Pictures and video By the organization By third parties Links (i.e. “sharing”) Applications and widgets Likes, retweets, etc.  Content guidelines
Access to personal accounts using organizational resources (time, computers, network, etc.) Access to sites using personal devices (iPhone, tablet, etc.) Personal access and usage
Affiliation Acceptable and unacceptable groups Perception of approval
Offensive content Disparagement of the organization – or of competitors or others Slander or libel Sexual content Solicitations of commerce Threats Illegal activity Violation of copyright Inappropriate usage
Personnel-related information Financial information Confidential information Health information If you wouldn’t post it to your website or send via email, don’t post to FB or send via Twitter.  Sensitive materials
Whether comments are allowed And monitored Comments
Official response to third-party sites Response to comments
Monitoring and reviewing comments
Public records act notices Public safety monitoring considerations Other considerations
Whether the account is monitored for actionable content (screenshot) Public records Monitoring for public safety
Managing social content as records
Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision? Is it a record?
Check the service level agreement
Blog post Comments? Updates? Individual Tweet Links and shortened URLS? Wiki article The article? Its changes over time? It depends…. What’s the record? Prepare for production
Address in policies
Save content locally Most sites store information outside the firewall Little control over how it is stored Little control over how long it is stored Geographic and jurisdictional issues First step is to save content locally
Take a snapshot of record content
Archive entire stream locally
Archive selected items locally Use search queries and monitoring Records management in brief Store selected items locally using search queries or RSS
Use the native backup to store locally Store locally using built-in tools
Use a third-party service to store locally Store locally using third-party service
Store locally using API Store locally using APIs
Use Word or Notepad to draft content updates and save *that* as a record Draft content locally
Implement enterprise versions
Implement a compliance solution ,[object Object],[object Object]
Web 2.0 is here Prohibition is not a realistic option Web 2.0 tools can add significant value to the organization  Lead your organization to use them effectively Conclusion
Jesse Wilkins, CRM, CDIA+, ermm Director, Systems of Engagement AIIM International              +1 (303) 574-0749 direct 		jwilkins@aiim.org  		http://www.twitter.com/jessewilkins 		http://www.linkedin.com/in/jessewilkins 		http://www.facebook.com/jessewilkins 		http://www.slideshare.net/jessewilkins 		http://www.govloop.com/profile/jessewilkins For more information
On September 8, 2011, AIIM will bring together leading industry experts in a Social Business Virtual Conference. Attend this 1-day event to learn how your organization can use social technologies to engage staff or customers with the appropriate control and governance. Running from 11am – 5pm EDT we have a packed program of 30 sessions, delivered in 3 tracks. Social Business Virtual Conference
Workshop Attendees:  Attend the Social Business Virtual Event for $50 – a savings of $45! Register for the conference by July 31, 2011 Enter code FOSEATT85 at checkout http://www.aiim.org/socialbusinessconference Social Business Virtual Event
Covers best practices in governance Policy development Governance processes for social media Roles and responsibilities Broadly applicable strategies – and solutions for specific tools and processes Records management for social media Currently in development Some courses available now Total of 30 courses available by end of September Social Media Governance Training
20110720 fose 2011 sm governance

More Related Content

What's hot

Privacy Issues in Social Media
Privacy Issues in Social MediaPrivacy Issues in Social Media
Privacy Issues in Social MediaBaljot Saral
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedBritt Newton
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
Social Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & CollegesSocial Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & CollegesDeborah Gonzalez, Esq.
 
Social Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand ProtectionSocial Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand ProtectionStrella Social Media
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011amystewart
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsAmy Shriner
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Werkshop Marketing
 
The State of Online Privacy
The State of Online PrivacyThe State of Online Privacy
The State of Online PrivacyColin Hogan
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaHelen Levinson
 
Micro-Targets, Privacy, and You- Lisa Raehsler- MnSEM
Micro-Targets, Privacy, and You- Lisa Raehsler- MnSEMMicro-Targets, Privacy, and You- Lisa Raehsler- MnSEM
Micro-Targets, Privacy, and You- Lisa Raehsler- MnSEMLisa Raehsler
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityMason Bird
 
How To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolHow To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolJason P. Sullivan
 

What's hot (19)

Privacy Issues in Social Media
Privacy Issues in Social MediaPrivacy Issues in Social Media
Privacy Issues in Social Media
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealed
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
Social networking
Social networkingSocial networking
Social networking
 
Social Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & CollegesSocial Media Policy Overview for Universities & Colleges
Social Media Policy Overview for Universities & Colleges
 
Social Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand ProtectionSocial Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand Protection
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?
 
The State of Online Privacy
The State of Online PrivacyThe State of Online Privacy
The State of Online Privacy
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
 
Micro-Targets, Privacy, and You- Lisa Raehsler- MnSEM
Micro-Targets, Privacy, and You- Lisa Raehsler- MnSEMMicro-Targets, Privacy, and You- Lisa Raehsler- MnSEM
Micro-Targets, Privacy, and You- Lisa Raehsler- MnSEM
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of Cybersecurity
 
How To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolHow To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr Tool
 

Viewers also liked

ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTSISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTSProf. Jacques Folon (Ph.D)
 
The Farm by BBDO, 2014.
The Farm by BBDO, 2014.The Farm by BBDO, 2014.
The Farm by BBDO, 2014.BBDO
 
Social Media: What Every Australian Retailer Needs to Know
Social Media: What Every Australian Retailer Needs to KnowSocial Media: What Every Australian Retailer Needs to Know
Social Media: What Every Australian Retailer Needs to KnowSarah Mitchell
 
Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?
Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?
Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?Nobuyuki Matsui
 
periferitos deentrada
periferitos deentradaperiferitos deentrada
periferitos deentradajhon pintag
 
9. Coursera devdataprod 2015
9. Coursera devdataprod 20159. Coursera devdataprod 2015
9. Coursera devdataprod 2015Pritam Dey
 
دوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخ
دوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخدوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخ
دوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخMajid Babaie, MBA, PMP
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
Project outline
Project outlineProject outline
Project outlinechalkyface
 
Apple and Microsoft:Leading Innovators of the 21st Techology
Apple and Microsoft:Leading Innovators of the 21st TechologyApple and Microsoft:Leading Innovators of the 21st Techology
Apple and Microsoft:Leading Innovators of the 21st TechologyHistory Lovr
 
Why you should check out the check in
Why you should check out the check inWhy you should check out the check in
Why you should check out the check inTijs Vrolix
 
HAPPYWEEK 189 - 2016.10.10.
HAPPYWEEK 189 - 2016.10.10.HAPPYWEEK 189 - 2016.10.10.
HAPPYWEEK 189 - 2016.10.10.Jiří Černák
 
3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...
3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...
3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...SlideTeam.net
 
Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...
Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...
Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...Salesforce Admins
 
Saatchi and saatchibtehrnytejytr
Saatchi and saatchibtehrnytejytrSaatchi and saatchibtehrnytejytr
Saatchi and saatchibtehrnytejytrvnieuwbtwiugfty
 
5 amazing tips for interview by Jubaer
5 amazing tips for interview  by Jubaer5 amazing tips for interview  by Jubaer
5 amazing tips for interview by JubaerAbu Jubaer
 

Viewers also liked (20)

ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTSISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTS
 
The Farm by BBDO, 2014.
The Farm by BBDO, 2014.The Farm by BBDO, 2014.
The Farm by BBDO, 2014.
 
Social Media: What Every Australian Retailer Needs to Know
Social Media: What Every Australian Retailer Needs to KnowSocial Media: What Every Australian Retailer Needs to Know
Social Media: What Every Australian Retailer Needs to Know
 
Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?
Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?
Raspberry Pi + AWS + SoftEtherVPN + RemoteWorks = ?
 
periferitos deentrada
periferitos deentradaperiferitos deentrada
periferitos deentrada
 
9. Coursera devdataprod 2015
9. Coursera devdataprod 20159. Coursera devdataprod 2015
9. Coursera devdataprod 2015
 
دوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخ
دوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخدوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخ
دوطبقه سازی بزرگراه ها , تحقق یک رویاست یا واقعیتی تلخ
 
Aporte del crae
Aporte del craeAporte del crae
Aporte del crae
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
Project outline
Project outlineProject outline
Project outline
 
PRywatki na Wykładzinie bez krawatów vol. 2 - Cannes Lions 2016
PRywatki na Wykładzinie bez krawatów vol. 2 - Cannes Lions 2016PRywatki na Wykładzinie bez krawatów vol. 2 - Cannes Lions 2016
PRywatki na Wykładzinie bez krawatów vol. 2 - Cannes Lions 2016
 
Apple and Microsoft:Leading Innovators of the 21st Techology
Apple and Microsoft:Leading Innovators of the 21st TechologyApple and Microsoft:Leading Innovators of the 21st Techology
Apple and Microsoft:Leading Innovators of the 21st Techology
 
Why you should check out the check in
Why you should check out the check inWhy you should check out the check in
Why you should check out the check in
 
HAPPYWEEK 189 - 2016.10.10.
HAPPYWEEK 189 - 2016.10.10.HAPPYWEEK 189 - 2016.10.10.
HAPPYWEEK 189 - 2016.10.10.
 
鯖江夕景
鯖江夕景鯖江夕景
鯖江夕景
 
3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...
3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...
3 d pie chart circular puzzle with hole in center process 7 stages style 2 po...
 
Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...
Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...
Authentic Connections in an Online World by Mary Scotton, Leah Hunter & Jessi...
 
Saatchi and saatchibtehrnytejytr
Saatchi and saatchibtehrnytejytrSaatchi and saatchibtehrnytejytr
Saatchi and saatchibtehrnytejytr
 
5 amazing tips for interview by Jubaer
5 amazing tips for interview  by Jubaer5 amazing tips for interview  by Jubaer
5 amazing tips for interview by Jubaer
 
ครูยอด
ครูยอดครูยอด
ครูยอด
 

Similar to 20110720 fose 2011 sm governance

20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20Jesse Wilkins
 
20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap
20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap
20110913 ECM Show 2011 Opening Keynote on the Social Business RoadmapJesse Wilkins
 
Social Business: Utilizando tecnologias e processos sociais para atingir os o...
Social Business: Utilizando tecnologias e processos sociais para atingir os o...Social Business: Utilizando tecnologias e processos sociais para atingir os o...
Social Business: Utilizando tecnologias e processos sociais para atingir os o...guiabusinessmedia
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business IssuesJeff Johnson
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarNICSA
 
Government of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaGovernment of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaJesse Wilkins
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceUnified Communications Online
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceMike Lesczinski
 
Developing an agency social media infrastructure
Developing an agency social media infrastructureDeveloping an agency social media infrastructure
Developing an agency social media infrastructureCraig Thomler
 
Unlocking Social CRM for your Organisation (Keynote)
Unlocking Social CRM for your Organisation (Keynote)Unlocking Social CRM for your Organisation (Keynote)
Unlocking Social CRM for your Organisation (Keynote)Joakim Nilsson
 
20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa Adoption20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa AdoptionJesse Wilkins
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and GovernmentMichael Smith
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaGerardo A Dada
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 

Similar to 20110720 fose 2011 sm governance (20)

20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
 
Managing Web 2.0 Records.
Managing Web 2.0 Records.Managing Web 2.0 Records.
Managing Web 2.0 Records.
 
20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap
20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap
20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap
 
Social Business: Utilizando tecnologias e processos sociais para atingir os o...
Social Business: Utilizando tecnologias e processos sociais para atingir os o...Social Business: Utilizando tecnologias e processos sociais para atingir os o...
Social Business: Utilizando tecnologias e processos sociais para atingir os o...
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
 
Presentation: Social Media & HR
Presentation: Social Media & HRPresentation: Social Media & HR
Presentation: Social Media & HR
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Government of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaGovernment of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social Media
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media Governance
 
Developing an agency social media infrastructure
Developing an agency social media infrastructureDeveloping an agency social media infrastructure
Developing an agency social media infrastructure
 
Unlocking Social CRM for your Organisation (Keynote)
Unlocking Social CRM for your Organisation (Keynote)Unlocking Social CRM for your Organisation (Keynote)
Unlocking Social CRM for your Organisation (Keynote)
 
Social Media MTL Conference Ppt
Social Media MTL Conference PptSocial Media MTL Conference Ppt
Social Media MTL Conference Ppt
 
20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa Adoption20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa Adoption
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social Media
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 

More from Jesse Wilkins

20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptxJesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...Jesse Wilkins
 
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptxJesse Wilkins
 

More from Jesse Wilkins (20)

20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
 
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
 

Recently uploaded

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Recently uploaded (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

20110720 fose 2011 sm governance

  • 1. Social Media Governance in Federal Agencies Jesse Wilkins, CRM AIIM International July 20, 2011
  • 2. International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org http://www.aiimcommunities.org About AIIM
  • 3. Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Frequent industry speaker and author AIIM ERM and Social Business Expert Blogger Instructor for AIIM Certificate Programs Jesse Wilkins, CRM, CDIA+, ERMM
  • 4. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner It’s just a fad….
  • 5. Is a Facebook “like” a record?
  • 6. The social media governance framework Structural elements of a comprehensive social media policy Social media policy statements Managing social media content as records Agenda
  • 7. The social media governance framework
  • 8. Prohibition is not realistic
  • 9. “A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.”
  • 10. Ensures that employees know what is expected of them Provides guidelines for being more effective Reduces risk of someone posting inappropriate content Addresses legal and operational concerns Why a governance framework?
  • 11. Management Strategic roles and responsibilities Organization Groups and structures required to manage information Policy and procedures Processes and standards for managing information The governance framework
  • 12. Determines overall strategic goals of organization Provides support for social media initiative(s) Determines need for policy guidance Determines need for enterprise solutions Supports – or doesn’t – transformation efforts Management
  • 13. Governance roles required to ensure compliance with the framework Includes usual suspects… Also includes new roles Social media strategist Community managers Moderators Organization
  • 14. Social content is just another form of content Policy should provide a framework applicable to most or all social media tools – and to other content/communication-related technologies as well DON’T write a Facebook policy, a Twitter policy, etc. The social media policy
  • 15. Be smart. Be respectful. Be human. Best Buy Social Media Policy
  • 16. Be real and use your best judgment. Zappos Twitter Policy
  • 17. Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.” Policy 2.0 – in 140 characters
  • 18. Structural elements of a social media policy
  • 19. Purpose Scope Responsibilities Definitions Policy statements References Policy elements
  • 20. This policy has three purposes: Establish definitions relevant to social business technologies Describe usage policies relating to social business technologies Describe security and technology policies relating to social business technologies Scope: This policy is applicable to the entire enterprise. Purpose and scope
  • 21. Responsibilities for policy development and maintenance Responsibilities for policy administration Responsibilities for compliance with policy Responsibilities
  • 22. Uncommon terms Common terms used in an uncommon fashion Acronyms and abbreviations Definitions
  • 23. Many different elements available Detailed in the next section Policy statements
  • 24. List any references used to develop the policy Internal strategic documents Existing policies and procedures Statutes and regulations Publications Examples and templates References
  • 25. Social media policy statements
  • 26. Official vs. unofficial Link to social media policy
  • 28. Account details User name Picture Corporate logo usage Bio Contact information Friends/buddies/contacts Groups/fans/likes Look & feel guidelines
  • 29. Whether posts will require approval Pictures and video By the organization By third parties Links (i.e. “sharing”) Applications and widgets Likes, retweets, etc. Content guidelines
  • 30. Access to personal accounts using organizational resources (time, computers, network, etc.) Access to sites using personal devices (iPhone, tablet, etc.) Personal access and usage
  • 31. Affiliation Acceptable and unacceptable groups Perception of approval
  • 32. Offensive content Disparagement of the organization – or of competitors or others Slander or libel Sexual content Solicitations of commerce Threats Illegal activity Violation of copyright Inappropriate usage
  • 33. Personnel-related information Financial information Confidential information Health information If you wouldn’t post it to your website or send via email, don’t post to FB or send via Twitter. Sensitive materials
  • 34. Whether comments are allowed And monitored Comments
  • 35. Official response to third-party sites Response to comments
  • 37. Public records act notices Public safety monitoring considerations Other considerations
  • 38. Whether the account is monitored for actionable content (screenshot) Public records Monitoring for public safety
  • 40. Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision? Is it a record?
  • 41. Check the service level agreement
  • 42. Blog post Comments? Updates? Individual Tweet Links and shortened URLS? Wiki article The article? Its changes over time? It depends…. What’s the record? Prepare for production
  • 44. Save content locally Most sites store information outside the firewall Little control over how it is stored Little control over how long it is stored Geographic and jurisdictional issues First step is to save content locally
  • 45. Take a snapshot of record content
  • 47. Archive selected items locally Use search queries and monitoring Records management in brief Store selected items locally using search queries or RSS
  • 48. Use the native backup to store locally Store locally using built-in tools
  • 49. Use a third-party service to store locally Store locally using third-party service
  • 50. Store locally using API Store locally using APIs
  • 51. Use Word or Notepad to draft content updates and save *that* as a record Draft content locally
  • 53.
  • 54. Web 2.0 is here Prohibition is not a realistic option Web 2.0 tools can add significant value to the organization Lead your organization to use them effectively Conclusion
  • 55. Jesse Wilkins, CRM, CDIA+, ermm Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins http://www.govloop.com/profile/jessewilkins For more information
  • 56. On September 8, 2011, AIIM will bring together leading industry experts in a Social Business Virtual Conference. Attend this 1-day event to learn how your organization can use social technologies to engage staff or customers with the appropriate control and governance. Running from 11am – 5pm EDT we have a packed program of 30 sessions, delivered in 3 tracks. Social Business Virtual Conference
  • 57. Workshop Attendees: Attend the Social Business Virtual Event for $50 – a savings of $45! Register for the conference by July 31, 2011 Enter code FOSEATT85 at checkout http://www.aiim.org/socialbusinessconference Social Business Virtual Event
  • 58. Covers best practices in governance Policy development Governance processes for social media Roles and responsibilities Broadly applicable strategies – and solutions for specific tools and processes Records management for social media Currently in development Some courses available now Total of 30 courses available by end of September Social Media Governance Training

Editor's Notes

  1. The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
  2. Moving into mainstream
  3. Technology changes much faster than the law or policies can keep up with. That’s why it’s better to use a comprehensive policy that can cover new technologies as they appear.
  4. Here’s Best Buy’s policy. There is a little more to it, but fundamentally this is it. And while it doesn’t cover records management, compliance, etc., if your employees embrace it (and are trained on how it applies) it will cover the vast majority of issues found in much more detailed policies. http://www.bby.com/2010/01/20/best-buy-social-media-guidelines/
  5. Zappos is a $1b clothing and shoe retailer – and their Twitter policy is only 7 words.
  6. Here’s a very succinct Twitter policy from a blog by an HR-focused law firm, GruntledEmployees.com. “Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.””
  7. Official vs. unofficial includesDisclaimers (this is or is not official; disclaimer of responsibility if it isn’t)Also includes a link to his social media policy
  8. Whether approval is required to create an account (official only)It’s also useful, as CSU does, to list all the official accounts somewhere on the website.
  9. This includes things like:What user names are appropriate, and whether to use the organization as part of it (e.g. Dell_JeffW)Pictures – same thingBio – same thing, plus things like official account, name (and sometimes personal Twitter handle) of the person behind the account, etc. Different types of contact informationIt’s also valuable to have guidelines for what types of contacts are appropriate. An official federal government account could “friend” Barack Obama on Twitter, but probably shouldn’t friend his re-election campaign or the Democratic Party (and even if it did the Republican Party as well, it’s still problematic). Similarly, it might look a bit odd for an energy company account to “friend” a parody account like BPGlobalPR, or a competitor, or an unsavory group, etc.
  10. Pretty straightforward here. Three main points:If third party content is allowed, it should be reviewed so people don’t upload pornography, etc. If it is reviewed, the organization may have some responsibility to remove things that are inappropriate. This should be spelled out clearly and adhered to rigorously – all goes back to transparency. If an official account “likes” something on Facebook, or retweets something on Twitter, this could be considered approval or even recommendation – and if it’s something offensive, or illegal, or otherwise inappropriate, this could cause serious issues.
  11. The policy should outline what types of groups are appropriate and what types of groups should be out of bounds. This is especially important for official commercial accounts but could be applicable even to personal accounts where the connection could be made to the organization because of the employee’s visibility. For example, it would be inappropriate for an official in charge of elections to be a member of a Facebook group focused on reelecting one candidate or another. Moreover, there are any number of groups dedicated to patently offensive or illegal causes; having accounts associated with these types of groups could bring significant risk to the organization and its brand. ~Another related area involves conveying a perception of approval of content that might be controversial, offensive, or illegal. For example, both a Facebook “like” and retweeting content on Twitter are often perceived as approval of that content. If an official account or the personal account of a senior manager retweets a sexist joke or something that condones illegal drug use, that could also cause serious issues for the organization.
  12. Pretty straightforward
  13. These are specific to government. It’s always a good idea to link back to the organization’s home website and vice versa so it’s clear that the account is an official one. Because of public records and sunshine laws, it’s important for the agency to be open about whether comments are allowed or monitored and whether it believes them to be covered under such legislation. And for public safety accounts in particular, such as fire departments or police, the account should note whether it’s monitored and what the “official” mechanisms are to report safety issues.
  14. This is an example of a guideline for how to engage those that comment on your social media, and those that post or comment on third party sites. This triage chart from the American Society of Chemical Engineers is not for every user in the organization, but it can be quite useful for those responsible for monitoring and engaging comments about the organization such as public affairs.
  15. These are specific to government. It’s always a good idea to link back to the organization’s home website and vice versa so it’s clear that the account is an official one. Because of public records and sunshine laws, it’s important for the agency to be open about whether comments are allowed or monitored and whether it believes them to be covered under such legislation. And for public safety accounts in particular, such as fire departments or police, the account should note whether it’s monitored and what the “official” mechanisms are to report safety issues.
  16. Here’s an example of this from the Seattle Fire Dept – it clearly says “This site is not monitored. Call 911 for emergencies.” It also notes the applicability of public records laws and has a link to the main website.
  17. The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
  18. Prepare for discovery. This means having the same type of data map you have in place inside the organization, but with listings of all the services you use, the accounts used there, etc. At a minimum you should list any official use of services and official accounts. It also means understanding the process for getting at that information in the event of litigation, FOIA request, etc. The time to put that process in place is before the subpoena is received. For hosted tools, such as FB or Twitter, it may mean taking periodic snapshots of what is posted to them. Right now there aren’t a lot of tools that do this; one way that can be effective is to capture the RSS feeds generated by these tools. As updates are made, they are published through the RSS feed, which can be saved locally. It might also require working with the third-party vendor in the event that some information or some updates are not available through RSS – for example, web-based email. It’s also important to note that at least for commercial solutions there is very little ability to put or enforce legal holds or to prevent a user from deleting an account, at least without a subpoena and without doing it before the user knows to delete it. [twitter]Prepare for discovery in advance, including listing official use of services and accounts.[/twitter]
  19. As we just noted, the records management or communications policies (or both) should address the use of these tools. We’ll look at some examples of policies over the next few slides. At a minimum, the policy should address: Identity, relationship, and transparency – is the account official or unofficial?Security, confidentiality, and sensitive informationComments and responses to commentsResponding to others’ posts on commercial sitesAccuracy and ethicsMonitoring and auditing[twitter]Address these tools in the records or communications policies (or both). [/twitter]
  20. How to capture content will depend first on one key variable: where is it stored? The vast majority of social media sites are either hosted solutions or commercial ones – that is, users’ data is not stored inside the organization’s firewall, but on some third party data center outside the control of the organization. This can present a significant issue because how and how long the data is stored is almost entirely dependent on the site’s Terms of Service. If the Terms are changed from retention for 7 years to retention for 2 weeks, or to permanently, it presents a real problem for the records program. And depending on the site this is almost certainly non-negotiable with the exception of governmental entities with the force of the law behind them. ~It’s also the case that some regulatory regimes have geographical aspects that, for example, require particular content to be stored inside a country’s boundaries, or prohibit it from being stored in certain countries’ boundaries. This can present issues for services that store information in the cloud and that might have numerous data centers spread around the world. ~Once the organization has determined what to capture, the next step then is to save that information locally. This is almost always a copy – in other words, saving social content from Facebook does *not* delete it from there. There are a number of ways to accomplish this that we will review over the rest of this module.
  21. Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it. [twitter]Consider implementing enterprise versions. FB is FB, but internal tools might be more appropriate.[/twitter]
  22. At this point I’d be pleased to entertain your questions.
  23. In conclusion, Web 2.0 is not something coming down the road or over the horizon – it’s here today and is probably in your organization, whether you know about it or not. It is all but impossible to effectively prohibit them – and the tools can significantly improve an organization’s collaboration and knowledge sharing, thereby adding value to the organization. It is incumbent on records management professionals to step up and lead your organizations in the effective use and management of these tools.