breathe: alleviating security privacy concerns of social media

Post on 14-Apr-2017

59 Views

Category:

Marketing

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

+

Breathe: Alleviating Security/Privacy Concerns of Social Media

By: Taylor HulykSocial Media Director, re:groupFollow me! @taylorhulyk @regroupinc

+You want me to what?

http://www.flickr.com/photos/tripphotogallery/4059486159/in/photostream/

+A couple of ounces of validity to that fear…With opportunity always comes risk. The key is proving the following equation to upper management:

OPPORTUNITY > RISK

1) Conduct a risk assessment

2) Create a social media policy

3) Adopt a workflow/response strategy

4) Train competent people in social media management

5) Monitor!

+

RiskNounExposure to the chance of injury or loss; a hazard or dangerous choice.

Risk is comprised of tangible threats that will challenge the integrity of your social media program.

http://www.flickr.com/photos/27594459@N04/6183976450/

Social Media Super Hero

+Example of Risk Assessment

+Policies, guidelines, codes of conduct

http://www.flickr.com/photos/36831886@N03/4453152488/ http://www.flickr.com/photos/34726560@N00/1665461391/http://www.flickr.com/photos/57574984@N00/76138988/ http://www.flickr.com/photos/70945771@N00/433993382/

+

SM Policy Contents• What you can do• What you can’t do• When you can do it• What you’re encouraged to do • What you should defer to the

social media representative• Organization’s perception of

social media• Disciplinary actions if violation

occursFor tons of social media policy examples, head to www.socialmediagovernance.com/policies

+ Workflow

Identify who will comprise your social media team. Even if they aren’t actually the people who will be interacting with customers online, they will be accountable for assisting the social media manager in issue remediation and content development.

STEP 1: Identify your social media team.

STEP 2: Cement the infrastructure.

+

Who’s going to do what, when?Your customers will keep you on your toes. Every day, they’ll come up with a different issue, a different compliment, a different way to shoot the breeze. And, as a social media manager, it’s your job to be ready for all of them.

ENTER: SOCIAL MEDIA RESPONSE STRATEGY

http://www.flickr.com/photos/52505823@N05/5486331834/

http://www.flickr.com/photos/7171548@N04/2035853550/ http://www.flickr.com/photos/36739893@N00/3036674240/

Happy

Confused

Angry

+

Air Force Social Media Response AssessmentYou might have seen this before. That’s because it’s probably the best visual social media response diagram out there.

*Notice the shading in the background. Each shade indicates a different phase of the assessment: Discovery, Evaluate and Respond.

+

TrainingYou’ve got everything in place. Your policy, workflow and response strategy, and you’re almost ready to start building a content strategy. But before you dig in deep, you need to tell everyone how the heck they work this thing called social media.

+Monitorin

g• Who’s talking

about you?• Who’s talking

about your industry?

• Who’s talking about your competitors?

+Monitoring Options

These are aggregation tools that organize all of your social media subscriptions in one place.

Examples: iGoogle, NetVibes, Google Reader, Bloglines, etc.

These are automated search tools, in which the software automatically performs preset searches without the manual search time. Some also include social media management and measurement. (Beware, these can be pricey!)

Examples: Radian6, Sysomos, Engage121, Awareness, Meltwater Buzz, Sprout, etc.

RSS Dashboards Monitoring Software

+SWITCHING GEARS:Social Media Privacy Tips for Personal Use

+

Facebook Privacy SettingsFacebook privacy settings are probably the trickiest of the bunch…especially because they get changed so frequently. To the left is the page where you can control your privacy to the extent that Facebook allows you to.

Access by clicking the tiny arrow on the upper right-hand portion of your screen and then clicking “Privacy Settings.”

+

Twitter Privacy SettingsTwitter privacy settings are rather straight forward. You can access them by clicking the person icon on the top right-hand side of your screen and then selecting “Settings.”

In this menu, you have the option of “protecting your tweets,” which means making them visible only to people you give access to.

+

LinkedIn Privacy SettingsLinkedIn is very straight forward in terms of tweaking privacy settings. You can control which people can see your profile when they search, the visibility of your activity feed, your public profile, etc.

You can access your privacy settings in the top right-hand menu labeled with your name. Then select “Settings.”

+

CookiesNounMessages, or segments of data, containing information about a user, sent by a Web server to a browser and sent back to the server each time the browser requests a Web page.

http://www.flickr.com/photos/roboppy/115562673/in/photostream/

+Google & YouOn March 1, Google combined 60 owned privacy policies into one.

http://nypress.com/google-steady-privacy-policy/

Questions?@taylorhulyk@regroupinctaylor.hulyk@regroup.us

top related