SlideShare uma empresa Scribd logo
1 de 36
#AIIM

The Global Community of Information Professionals

Information Management
and Social Media
Jesse Wilkins, CIP, CRM
AIIM International
26 November , 2013
"Despite the euphoria of Internet
enthusiasts and the hyped-up selling
palaver of some web services
providers, we remain uncertain as to
the long-run substantive benefits the
Internet will bring to businesses and
to individual users.…until the
webmeisters persuade us
otherwise, we'll hang on to our CDs
and floppies, along with the aperture
cards and other imaging artifacts that
have served our corporate and
personal purposes so cost-effectively
in the past."
Social everywhere
 1,330+ years worth of time spent every day on
Facebook.
 1.1B Facebook users.
 50% log in on any day.
 300M photos uploaded per day.
 And…
 Twitter and LinkedIn and Pinterest and
Google+ and Tumblr and Flickr and Instagram
and Myspace(!) and Livejournal and Orkut and
Yammer and blogs and millions of private
Agenda
 Information governance and social media
 The social media governance framework
 Using social media safely and effectively
#AIIM

The Global Community of Information Professionals

Information governance and social
media
Information governance defined
 “…Specification of decision rights and an
accountability framework to encourage
desirable behavior in the
valuation, creation, storage, use, archival and
deletion of information.”
 Source: Gartner
Information governance
framework






Organizational structures
Stewardship
Policy
Value creation
Data risk management &
compliance
 Information security &
privacy

 Data architecture
 Data quality
management
 Classification &
metadata
 Information lifecycle
management
 Audit
information, logging &
reporting
Governance?
Governance!
New types of content
New devices

Image source: Ted
Eytan, http://www.flickr.com/photos/taedc/8714927697/
Consumerization of IT
Third party content creation
Third party hosting
Professional vs. personal
 Devices
 Accounts
 Services
#AIIM

The Global Community of Information Professionals

The social media governance
framework
Prohibition is not realistic
“A new class of company is
emerging—one that uses
collaborative Web 2.0 technologies
intensively to connect the internal
efforts of employees and to extend
the organization’s reach to
customers, partners, and suppliers.
We call this new kind of company
the networked enterprise.”
Why a governance framework?
 Ensures that employees know what is
expected of them
 Provides guidelines for being more effective
 Reduces risk of someone posting
inappropriate content
 Addresses legal and operational concerns
The governance framework
 Management
 Strategic roles and responsibilities

 Organization
 Groups and structures required to manage
information

 Policy and procedures
 Processes and standards for managing
information
Roles and responsibilities







IT
Legal
HR
Communications
RM
Etc.
Check the service level agreements
The social media policy
 Social content is just another form of content
 Policy should provide a framework applicable
to most or all social media tools – and to other
content/communication-related technologies
as well
 DON’T write a Facebook policy, a Twitter
policy, etc.
Identify security issues





Security
Privacy and confidentiality
Intellectual property
Other sensitive topics or resources
What to keep?
 Determine whether social media content
needs to be kept:





Is it legally required?
Is it business-related?
Does it add value?
Is it unique?
How should it be kept?





In the native service
Snapshots
Archived periodically
Archived/captured on the fly
 In bulk
 By keyword/account

 Captured prior to publication
 Review
Social media migration
 Between services
 When a service shuts down
#AIIM

The Global Community of Information Professionals

Using Social Media
Safely and Effectively
Figure out where you are
Develop a plan
Apply, extrapolate, create
Training, training, training
Implement enterprise versions
Implement a compliance solution

• And many others
Questions?
For more information
Jesse Wilkins, CIP, CRM, IGP
Director, Research and Development
AIIM International
+1 (720) 232-9638 direct
jwilkins@aiim.org
http://www.twitter.com/jessewilkins
http://www.linkedin.com/in/jessewilkins
http://www.facebook.com/jessewilkins
http://www.slideshare.net/jessewilkins

Mais conteúdo relacionado

Mais procurados

17.3.3 technology first - hackathon results
17.3.3   technology first - hackathon results17.3.3   technology first - hackathon results
17.3.3 technology first - hackathon resultshmhollingsworth
 
Presentation: Social Data Best Practices
Presentation: Social Data Best PracticesPresentation: Social Data Best Practices
Presentation: Social Data Best PracticesMediaPost
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismPaul van Heel
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenPaul van Heel
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
Technology Against Trafficking
Technology Against TraffickingTechnology Against Trafficking
Technology Against TraffickingClair Deevy
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityGlobal Business Professor
 
Is ethical business possible in future
Is ethical business possible in futureIs ethical business possible in future
Is ethical business possible in futureSAKIBBAGWAN1
 
Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016Desiree Miloshevic
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black TwitterAyodele Odubela
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyDanno320
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacySarah Pearson
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyvoelkeld
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak dataMary Aviles
 

Mais procurados (17)

17.3.3 technology first - hackathon results
17.3.3   technology first - hackathon results17.3.3   technology first - hackathon results
17.3.3 technology first - hackathon results
 
Presentation: Social Data Best Practices
Presentation: Social Data Best PracticesPresentation: Social Data Best Practices
Presentation: Social Data Best Practices
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Technology Against Trafficking
Technology Against TraffickingTechnology Against Trafficking
Technology Against Trafficking
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
 
Is ethical business possible in future
Is ethical business possible in futureIs ethical business possible in future
Is ethical business possible in future
 
Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016
 
MOBE
MOBEMOBE
MOBE
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 

Semelhante a Government of Alberta Information Management Conference 2013 IM and Social Media

How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxHow to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxRobertBrown631492
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfRobertBrown631492
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptxJesse Wilkins
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business IssuesJeff Johnson
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Managing it security and data privacy security
Managing it security and data privacy securityManaging it security and data privacy security
Managing it security and data privacy securityAlpesh Doshi
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperativebutest
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social MediaDoug Cornelius
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarNICSA
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 
Social business-roadmap2011
Social business-roadmap2011Social business-roadmap2011
Social business-roadmap2011Claude Super
 
Dominate Data With Social Media Mining
Dominate Data With Social Media MiningDominate Data With Social Media Mining
Dominate Data With Social Media MiningaNumak & Company
 

Semelhante a Government of Alberta Information Management Conference 2013 IM and Social Media (20)

How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxHow to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Managing it security and data privacy security
Managing it security and data privacy securityManaging it security and data privacy security
Managing it security and data privacy security
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social Media
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
Social business-roadmap2011
Social business-roadmap2011Social business-roadmap2011
Social business-roadmap2011
 
AIIM Social Business Roadmap
AIIM Social Business RoadmapAIIM Social Business Roadmap
AIIM Social Business Roadmap
 
Dominate Data With Social Media Mining
Dominate Data With Social Media MiningDominate Data With Social Media Mining
Dominate Data With Social Media Mining
 

Mais de Jesse Wilkins

20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptxJesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...Jesse Wilkins
 

Mais de Jesse Wilkins (20)

20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Government of Alberta Information Management Conference 2013 IM and Social Media

Notas do Editor

  1. Good information governance requires a framework. IBM defines an information governance framework as including the following eleven elements. We have tried to condense down the definitions for each category. Organizational Structures and Awareness – understanding of the need for governance and the roles required to do itStewardship – ownership of the responsibility for governance for given information assetsPolicy – the “what to do”Value Creation – Analysis of the value of the organization’s informationData Risk Management & Compliance – Risk assessment, analysis, and mitigationInformation Security & Privacy – Policies and practices for protecting informationData Architecture – Tools for creating, sharing, and managing informationData Quality Management – Methods to ensure and improve data qualityClassification & Metadata – as the name suggests. Information Lifecycle Management – Policies and processes for collecting, using, and ultimately deleting informationAudit Information, Logging & Reporting – Processes for monitoring the overall governance effort. Source: IBM, http://www.infogovcommunity.com/resources
  2. So for this Tweet, where do any of these elements apply? It’s a personal account, so organizational structures and stewardship aren’t applicable and policy is difficult to enforce, especially in the age of the smart phone. Not a lot of value being created here – and therefore not a lot of concern with data risk management, compliance, information security, or privacy. It’s a hosted service, so not much to do with data architecture. Data quality management and metadata? As long as it’s on Twitter it’s Twitter’s problem; if it were stored locally it would depend on how it was captured to understand what metadata is even available. There certainly isn’t a ready mechanism for classifying it. It’s a pretty ephemeral Tweet from a data lifecycle management perspective – and again, Twitter controls that as long as it’s stored out there. And therefore there isn’t a lot of need for auditing and logging for this Tweet.
  3. On the other hand this one pretty clearly needs some governance attention, at least in most jurisdictions, and offers more things to apply governance against including the stock ticker, the link, and the pricing. The date certainly becomes much more important here as well. And if this comes from an official account or one affiliated with the organization there is definitely a governance issue here. ~In other words, on the one hand governance processes and practices are certainly relevant in the social media era; on the other hand, there are some unique issues based on both the nature of particular tools and on the nature of social media more broadly that warrant some additional considerations. Over the rest of this course we will identify and explore some of those issues and considerations to provide a foundation for the rest of the Social Media Governance Certificate Program.
  4. Consider the following types of content: ~A Facebook like; A Twitter retweet; Geolocational data provided through a service like Foursquare, perhaps with a comment about the quality of the food or service at a particular place; An edit to a wiki article; A comment to a blog post; A video, perhaps with annotation, often with comments, likes, etc.; And all the other “breadcrumbs of attention” that we leave behind as we create, consume, and share content on external sites as well as internal ones. ~All of these have metadata, and many of them have quite a lot of it. But much of this metadata is either not directly visible or accessible or isn’t germane to the way users would look for this type of content in the future. ~And many of them are quite fragmentary – the Facebook Like for example, or a conversation carried on as part of a Twitter stream or other activity stream. They tend to be even more informal and even more ephemeral compared to other types of content. Yet as we’ll see later these issues don’t eliminate the need to manage this content effectively. ~Finally, it should go without saying that volume presents an issue here. More video is uploaded to YouTube every month than the “big 3” U.S. networks (ABC, NBC, CBS) created in their first 60 years of existence combined. Facebook stores more than 100 petabytes of data and receives more than 250 million photos a day, or more than 5 billion photos a month. There simply isn’t an analogue for all but the largest enterprises and database applications.
  5. Much of this content is being created and consumed on new types of devices. It’s not simply that the devices are mobile; we’ve had laptops for 20 years. Rather, it’s the amazing proliferation of types and sizes of devices: smart phones with more computing power than most desktop PCs 5 years ago. In fact the iPad2 would have been one of the top ten supercomputers in the country as recently as 1994. ~It’s mobile devices with digital cameras capable of capturing, annotating, and sending very high quality digital photos and video; and it’s devices with easy and inexpensive access to software tools that can be used to create and publish high-quality and compelling rich media content. ~~Source for supercomputer quote: http://www.tuaw.com/2011/05/09/ipad-2-would-have-bested-1990s-era-supercomputers/
  6. Closely related to this is the trend towards the consumerization of IT. In the past technology innovation happened in the enterprise, then moved to small- and medium-sized organizations, and eventually made its way into consumers’ hands. But today this is turned on its head. It is in the consumer technology space where we are seeing new and interesting technology innovations – from transistor-based flash drives ten years ago to the proliferation of the devices we talked about just now. And certainly the entire social media space has been driven by end users and consumers and enterprises are only just starting to pay any attention to it. ~One more point about those devices – as of 2012 the devices employees use are often devices they purchased, and which are more powerful than what they have at work. This trend, often referred to as “bring your own device” or BYOD, is becoming a tidal wave as devices get cheaper and more powerful. And as we noted they come in a wide variety of shapes, sizes, operating systems, and configurations.~At the same time, these devices come with their own “app stores” filled with free to relatively cheap software that is available to users to download on their dime and according to their interests. ~This makes it challenging for IT to support – or prohibit – these devices and applications. Sure, IT can prevent the devices from accessing network resources, but part of the reason these devices are so prevalent lies in their ability to circumvent many IT restrictions. A user can’t get a license for project management software or design software? She can pull out her iPad2, go to the App Store, and download either or both for less than $10 each and simply route around IT. Don’t want to put these devices on the enterprise Wi-Fi? Many of them are 3G- or 4G-enabled. ~From a governance perspective the combination of BYOD and app stores means that IT needs to rethink some things around support, security, etc. IT can choose to support certain types of functionality, or restrict certain information repositories to devices that meet certain requirements, but attempting to completely restrict them is almost certainly an exercise in futility both technologically and politically. After all, how many CIOs are willing to tell the CEO that she can’t connect her tablet to the network?
  7. Another significant difference in the way content is created today is how much of it is done by third parties. For most organizations most of their content is created internally; where there is substantial interaction with outside parties it’s often in the form of fairly standardized things like invoices, checks, and the like. ~But social media is, well, social. A wiki with one author is just Microsoft Word with a bad user interface. Social tools work when and because they provide a mechanism to interact with other content creators. In many cases this is through the same tool or page – your wiki with their edits, your Twitter stream when they include you by mention, your blog and their comments. But it’s not always so – someone could comment on your blog post with a post of their own on their own blog (and with comments at neither, one, or both).
  8. And all of this content creation happens on a website that in all likelihood is not under your control. That is, you can set up your Facebook page, and decide whether to allow comments to your blog; but the content is stored outside the firewall in a datacenter that might not be in the same country you are. ~This has profound information governance implications. If Facebook decides to keep everything posted to it forever, disposition policies become somewhat of a moot point. On the other hand, if Facebook decides to keep content posted for only 30 days, retention becomes a critical issue. ~It also complicates the ability to demonstrate compliance with regulatory requirements and requests to produce information in response to litigation or audits – what is “native format” for Twitter? It’s *not* screenshots, at least in most jurisdictions. How do you authenticate the content outside of Twitter.com or a Twitter client? And so forth.
  9. All of this also contributes to a blurring of professional and personal lives. Consider two cases. First, Rick Sanchez was a journalist working for CNN. As part of his professional life he developed contacts and created and developed a pretty impressive Twitter presence, @ricksanchezcnn, with some 140,000 followers at one point. He was subsequently fired, which raises some interesting governance questions: Who owns the account? It says CNN in the title, but Twitter, like most social media sites, assigns ownership of the account and all content related to it to the individual who created the account. Who owns the contacts? The individual followers can’t be forced to stop following Rick’s account (since renamed to @ricksancheznews); if this were a Facebook account could Rick be forced to stop following other people? Who owns the content? The internet doesn’t forget….~Now consider another case. An individual employee gets a smart phone paid for by the organization and is expected to be available after hours. The organization is smart and allows flexible working hours. The employee uses the smart phone to check into a bar at 11 am (but through his personal Foursquare account) and then uses his personal iPad and the bar’s Wi-Fi to log into Facebook and post some unflattering remarks about the bar, the meal, and his (unspecified) job. Some of the questions raised: Could his remarks reflect badly on the organization, or even contradict its acceptable usage policy? Is that policy applicable to any, some, or all of the content he created? If the bar decides to sue, is there any liability for the organization? And probably lots more. ~The broader point here is that as the lines between professional and personal lives continue to blur and overlap, so do many of the elements of the governane framework so carefully crafted and implemented in many organizations. It’s not always easy to tell who has the right to speak on behalf of the organization. And many commercial social media services forbid users from creating multiple accounts (such as a personal and professional account). ~Organizations have to be smart and balance the legitimate concerns of the organization with those of the individual employees and take into account how the tools actually work.
  10. The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
  11. Moving into mainstream
  12. Roles and responsibilities are still required to manage social content in the context of the governance program – whether in the enterprise or using commercial services. Proliferation of SharePoint collaboration sites or uncoordinated Twitter accounts is no better for the organization than proliferation of file shares or content repositories. ~In other words, employees still need training on governance concerns. If using enterprise solutions IT still has to deploy and maintain them. For any business use of social media records, legal, compliance, risk, etc. should be involved. HR needs to consider how employment law affects the use of social media services for hiring – and for disciplinary actions. Senior management needs to consider how to measure the effectiveness of the organization’s usage of social media, which services best support its goals, and whether to use commercial sites or enterprise solutions.
  13. Technology changes much faster than the law or policies can keep up with. That’s why it’s better to use a comprehensive policy that can cover new technologies as they appear.
  14. Governance exists but needs to be tweaked. Apply what can be applied: roles & responsibilities (inc. new ones); general policy framework; training as we discuss shortlyExtrapolate from what has worked: job aids & guidelines; managing wikis instead of email for collab and the relative ease of managing wikis for compliance; use the tools appropriately (e.g. not for business if can’t manage it)Create new stuff where required: classification, declaring as record (managing in place?), etc.
  15. The dell model we already mentioned; demographic considerations (it will be used), SM 101, how to use the tools, how to use the tools well, how to use the tools in support of the business, how to keep the business safe
  16. Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it. [twitter]Consider implementing enterprise versions. FB is FB, but internal tools might be more appropriate.[/twitter]
  17. At this point I’d be pleased to entertain your questions.