Internal social media: risks and added value
-
Upload
jacques-folon-edge-consulting -
Category
Education
-
view
1.601 -
download
3
description
Transcript of Internal social media: risks and added value
![Page 1: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/1.jpg)
Risks & added value of an internal digital social network
COMMnetkernportail
Jacques FolonPartner Edge Consulting
![Page 2: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/2.jpg)
www.aliaz.com/jacques-folon [email protected]
![Page 3: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/3.jpg)
Cette présentation est sur
www.slideshare.net/folon
elle est à votre disposition
![Page 4: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/4.jpg)
First part :Risks
1. Data privacy2. Data security3. Intellectual property4. What about an internal
community manager?
![Page 5: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/5.jpg)
1.0 Data privacy
![Page 6: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/6.jpg)
1.1.Data privacy basics• Basic principles: the Data
controller (i.e. the Belgian state i.e. the
Minister)– collect and process personal data
only when this is legally permitted – respect certain obligations
regarding the processing of personal data (details on next slide) ;
– respond to complaints regarding breaches of data protection rules;
– collaborate with national data protection supervisory authorities
Source: http://ec.europa.eu/justice/data-protection/index_en.htm
![Page 7: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/7.jpg)
1.2. Data privacy rules for data controllers
• Personal Data must be– processed legally and fairly; – collected for explicit and legitimate
purposes and used accordingly; – adequate, relevant and not excessive in
relation to the purposes for which it is collected and/or further processed;
– accurate, and updated where necessary; – kept any longer than strictly necessary; – rectified, removed or blocked by the data
subject if incorrect; – Protected against accidental or unlawful
destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks.
Source: http://ec.europa.eu/justice/data-protection/index_en.htm
![Page 8: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/8.jpg)
1.3. Data privacy & internal social media questions
• Which precise purpose ?• What kind of personal data will be stored?• Are data stored in Europe ?• Are they in the « Cloud »?• Data privacy commission advice needed?• What will be the security policy?• What about the content of ex-employees?• Is a code of conduct enough?
SO IT ’S AN IMPORTANT ISSUE !!!
![Page 9: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/9.jpg)
2.0. Data security
SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
![Page 11: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/11.jpg)
How many information?
67
![Page 12: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/12.jpg)
Employees share (too) many information and also with third parties
![Page 13: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/13.jpg)
![Page 14: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/14.jpg)
![Page 15: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/15.jpg)
Where do one steal data?
•Banks•Hospitals•Ministries•Police•Newspapers•Telecoms•...
Which devices are stolen?
•USB •Laptops•Hard disks•Papers•Binders•Cars
![Page 16: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/16.jpg)
TELEWORKING
![Page 17: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/17.jpg)
What are Control limitations? CC/COA 81 !
![Page 18: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/18.jpg)
3.0. INTELLECTUAL PROPERTY
Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
![Page 19: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/19.jpg)
Copyright infringment
Source: http://en.wikipedia.org/wiki/File:Plagiarism_vs_Copyright_Infringement.png
![Page 20: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/20.jpg)
Employer’s responsibility !• What about external protected works?• What about creation by employees?• What about import of protected works
by employees?• What about sub-contractors protected
works?• What about advertising campaign?• What about press clipping?• What about external trademarks• What about employee’s images?• …
• What do you think of a code of conduct?
http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
![Page 21: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/21.jpg)
4.0. INTERNAL COMMUNITY MANAGER
PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
![Page 22: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/22.jpg)
Who’s in charge if …?
http://www.capreseaux.fr/community-management/
![Page 23: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/23.jpg)
Second part: Added value
http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
![Page 24: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/24.jpg)
![Page 25: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/25.jpg)
Reading and answering e-mail. Approximately 28%, or about 11.2 hours, of the average interaction worker’s workweek is spent reading and answering e-mails. The study indicates that because of private social media’s ability to make searchable content out of all posted messages, the amount of time spent with e-mail can be reduced by as much as 35%, or about 4 hours.
![Page 26: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/26.jpg)
Searching and gathering information. 19%, about 7.6 hours, of the average interaction worker’s work hours are spent searching for internal information only certain employees possess. Again, because of enterprise social media’s ability to store all messages as searchable content, this figure can be reduced by nearly 35% to about 4.9 hours per week, which amounts to a savings of 2.7 hours per week per interaction worker.
![Page 27: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/27.jpg)
Communicating and collaborating internally. Using phones, e-mail, and in-person interaction to communicate consumes about 5.6 hours of the average interaction worker’s workweek. Because you can directly message anyone in the organization without cluttering up an e-mail inbox with a collaboration tool, your organization can realize up to a 35% time savings, or about 2.0 hours per interaction worker.
![Page 28: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/28.jpg)
Role-specific tasks. Tasks specific to a particular job consume the most amount of time for any role, averaging out to about 15.6 hours per week. Internal social media increases the productivity of these tasks by about 15%, or approximately 2.3 hours per week. One way they enhance job-specific productivity lies in their ability to centralize all job functions at one hub, so your employees begin using all other applications there.
![Page 29: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/29.jpg)
![Page 30: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/30.jpg)
Other added value
• KM• Collective intelligence• Co-working• Network management
• BUT
• The vendors already told you, is ‘nt it?
![Page 31: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/31.jpg)
Some test cases
http://www.journaldunet.com/solutions/reseau-social-d-entreprise/reseau-social-d-entreprise-et-cac40/
![Page 32: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/32.jpg)
Conclusion
• Do not forget privacy issues• CC/CO 81 • Control or not control• IPR regulation s/b reminded• Internal code of conduct• BUT• There are some important added value
![Page 33: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/33.jpg)
Internal code of conduct main rules
• Define the internal and external social media • Intellectual property rules• Data privacy explanations• Confidential information• Anonimity is forbidden• Penalties • And• Which communication for the code of conduct?• How to have it approved?
![Page 34: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/34.jpg)
GOOD LUCK
![Page 35: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/35.jpg)
Jacques [email protected]
![Page 36: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/36.jpg)
36
Any questions ?
Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/
![Page 37: Internal social media: risks and added value](https://reader034.fdocuments.us/reader034/viewer/2022051816/54558014af795994188b492c/html5/thumbnails/37.jpg)