1 / 24

Privacy, Security, Compliance

Privacy, Security, Compliance. Your Social Network. London Friends. Alice. Maidenhead Friends. Work Colleagues. Family. www.thinkoutsidein.com/blog. London Friends. Maidenhead Friends. Work Colleagues. Family.

Télécharger la présentation

Privacy, Security, Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy, Security, Compliance

  2. Your Social Network London Friends Alice Maidenhead Friends Work Colleagues Family www.thinkoutsidein.com/blog

  3. London Friends Maidenhead Friends Work Colleagues Family In London some of her friends work in a gay bar. They miss her being around and she misses them… www.thinkoutsidein.com/blog

  4. http://www.flickr.com/photos/seeminglee/1388762305/ ..so they share photos on Facebook whenever they can.

  5. London Friends Maidenhead Friends Work Colleagues Family Alice loves these photos and often comments on them www.thinkoutsidein.com/blog

  6. London Friends Maidenhead Friends Work Colleagues Family A number of work colleagues and family are on Facebook and they have ‘friended’ Alice www.thinkoutsidein.com/blog

  7. London Friends Maidenhead Friends Work Colleagues Family Alice was asked about her usage of Facebook and she was showing us the things that she does. Only then did she realise that her 10 year old daughter and many of her work colleagues could see the photos from the gay bar. She was not happy! www.thinkoutsidein.com/blog

  8. London Friends Maidenhead Friends Work Colleagues Family Facebook is not the actual problem. The problem is that these are different parts of Alice’s life that would not normally come together off-line, but are now joined together on-line. www.thinkoutsidein.com/blog

  9. Online Off-Line London Friends Maidenhead Friends Work Colleagues Family The problem is that the social networks we’re creating online don’t match the social networks we’re creating off-line.

  10. Identity and Personans • Managing our identity offline is relatively easy as the different groups in our life rarely overlap in time and space. We see our families at home and act one way; we go to work and act another way; and we meet our college friends in a bar an act a third way. • Managing identity online is much harder, as groups can easily overlap. People have workarounds to manage this, including multiple email accounts, multiple Facebook accounts, and by using certain tools with specific audiences www.thinkoutsidein.com/blog

  11. Personal vs. Private

  12. Social Media in the Public Sector

  13. Facebook Disclaimer North Carolina State Government http://www.records.ncdcr.gov/

  14. Blog Disclaimer North Carolina State Government http://www.records.ncdcr.gov/

  15. Flickr Disclaimer North Carolina State Government http://www.records.ncdcr.gov/

  16. Twitter Disclaimer

  17. Privacy and Posting Social media accounts created and used by or on behalf of public sector organisations should set all privacy settings to public. In general, comments should not be deleted although exceptions can be made for profane or obscene comments Configure settings in the profile to allow open access. Public sector organisation account holders should set all privacy settings to public and not disable any public comment function North Carolina State Government http://www.records.ncdcr.gov/

  18. Guidelines (Public Sector) Blogging sites allow the account holder to manage the interaction on the site. For instance, whether users will be allowed to comment, whether the comments will be moderated, whether the user must be registered to comment, etc. In general, comments should not be moderated because all points of view should be heard. The exception is that all profane or obscene comments should be removed. To limit spam comments it is perfectly acceptable to require some type of word verification as part of the commenting process if the software allows it. North Carolina State Government http://www.records.ncdcr.gov/

  19. Privacy Settings - Facebook

  20. Privacy Settings - Blogger

  21. Privacy Settings - Twitter

  22. Questions?

  23. Acknowledgements • Some slides inspired by original ideas from Paul Adams • Compliance slides based on original ideas from www.thinkoutsidein.com/blog North Carolina State Government http://www.records.ncdcr.gov/

More Related