Presented by: Dan Landsberg August 12, 2011. Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Northside I.S.D. Acceptable Use Policy
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Woodland Hills School District Computer Network Acceptable Use Policy.
Social Media Policy ADM – E 21. CHS Social Media Policy Social media = media designed to be disseminated through social interaction, created using highly.
Copyright © 2009, IMRE, LLC SETTING SOCIAL MEDIA POLICY Novemeber 5, 2009.
1 The Health Insurance Portability and Accountability Act (HIPAA) A guided tutorial for GVSU employees.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health information security & compliance
Social Networking & Bar Association Communication -- What You Should Know About How to Use it to Your Advantage.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Network security policy: best practices
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
Social Media & the Law Video 4 Social Media Training for Business Teachers #socialmedialaw.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
HIPAA PRIVACY AND SECURITY AWARENESS.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Employee Guidelines for Acceptable Use of Technology Resources.
Betsy Overkamp-Smith, APR York County School Division Navigating the Social Media Landscape.
1.8 vs. 5.3 Benefits and Risks of Social Media in Healthcare Andy Malinoski Director of Risk Management Andy Malinoski Director of Risk Management.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Facebook 101: What Dance Studio Owners Need To Know Presented By: Jill Tirone facebook.com/dancefitmarketing
1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich Copyright.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Social Media Training and Information Session Marissa Sollows - FCNB.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
The Wire: Connecting the Middle College Community One Click at a Time Jessica Greenwood Jenny Guerra Ashley Gomez Florida International University.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
©2012, Mika Meyers Beckett & Jones PLC All Rights Reserved Michigan Association of Educational Data Systems Presented by: Jennifer A. Puplava Mika Meyers.
INTERNET SAFETY.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
13 Social Media and Networking. Introduction Social Media Types of Social Media Benefits and Challenges Measuring Social Media Performance.
Privacy & Security Inservice Protected Health Information, Personal Electronic Devices & Social Media.
HIPAA PRIVACY & SECURITY TRAINING
Privacy & Confidentiality
6 October 2016 Social media: do you have the right social media strategy that will impact your business’ growth? - Legal and Regulatory Issues William.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
CompTIA Security+ Study Guide (SY0-401)
HIPAA & PHI TRAINING & AWARENESS
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
From Baby Boomers to Millennials
School of Medicine Orientation Information Security Training
Presentation transcript:

Presented by: Dan Landsberg August 12, 2011

Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory Risks and Concerns  Social Media Risks and Concerns  Reputational and Financial Risks  Information Security Risks  Legal Risks  Business Risks  Social Media Risks Controls  UWMC Social Media Policy

What is Social Media  Facebook 500 million users in every 13 people on earth 48% of 18 – 34 check Facebook daily  Twitter 200,000,000+ registered users 460,000 new sign-ups daily 155,000,000 Tweets per day  YouTube 100 million + users 24 hours of video are uploaded every minute

Social Media’s Professional Side  Linkedin 100 million + members, March ,800,000 members in Groups Groups – Education, finance, healthcare, etc.  Plaxo 50 million users Electronic address book

Benefits of Social Media  Marketing Selling and promoting the university to students Academics, research, sports  Brand recognition University accomplishments Selling and promoting the university to alumni, businesses and potential donors  Human resources Job postings

Benefits of Social Media  Communication tool  Direct customer communication  Speed of feedback/results  Low cost  Reach  Credibility  Customer service

Regulatory Risks and Concerns  FERPA, Family Educational Rights and Privacy Act  HIPAA, Health Insurance Portability and Accountability Act Require the non-disclosure of personal private student and patient data. Require notification if personal private data is disclosed

Regulatory Risks and Concerns  Section 230 of the Communications Decency Act of 1996 Section 230(c)(1) provides immunity from liability for providers and users of an "interactive computer service" who publish information provided by others: This means your ISP or the social media provider is not responsible for anything that is posted on their web site (except for what provider posts).

Social Media Risks and Concerns  Reputational and financial risks  Information security risks  Legal risks

Reputational and financial risks  Making the news for all the wrong reasons Security breaches Posting of personal private data Posting of embarrassing information (data, reports, photos, videos) Re-posting of data: s, memos, reports, employee rants can be resent by recipients to a much larger and unintended audiences. “Name squatting” or “Brand hijacking” when a third party uses your company name or logos without your permission in social media.

Reputational and financial risks  Consequences Cost of corrective actions and damage control Loss of donations, grants Lawsuits

Information security risks  Introduction of viruses/malware to the corporate network  Security breaches  Loss of productivity / downtime  Consequences Reputational damage Regulatory fines

Legal risks  Disclosure of sensitive or protected information: An employee could unwittingly click on links to spam or phishing schemes or download malicious code on to the university network  Regulatory violations  Discovery and preservation issues: Ensure that data can be preserved, retrieved and produced if required Just because an attorney is cc’d, does not make it privileged If a privilege exists, it can be lost: ○ Once communications are shared with others, any privilege of confidentiality will be lost.

Business Risks  Here are five primary business risks associated with the use of social media: Introduction of viruses/malware to the corporate network; Brand hijacking, such as a brand being impersonated on Twitter; Unclear or undefined content rights to information posted on social media sites; Unrealistic customer expectations of service through the ability to communicate with companies online 24/7; and Noncompliance with record management regulations because of mismanagement of electronic communications.

Social Media Risk Controls  Policies and procedures address at least: What is social media Acceptable and authorized use of social media Posting rules/requirements for data, videos What is not allowed (rants, threatening, hateful or sexual content, bad mouthing employees, etc.) Rules for friending between employees, supervisors, students and faculty Regulatory requirements Copyright rules Intellectual property rules

Social Media Risk Controls  Communications: Communicate to all personnel (and students) the social media policies and procedures Periodic communications regarding social media acceptable use ○ i.e. if an employee uses the university’s name for a personal post are they required to include a disclaimer. Communicate when and how to notify management of policy violations.

Social Media Risk Controls  Training Social media use training for users that will use social media as part of their job function or for research purposes Provide a webinar on social media use, risks, and your policies and procedures Social media use and regulatory requirements / restrictions (clearly defining that posting private patient or student is not allowed)

Social Media Risk Controls  Information Technology Controls Antivirus/malware software Firewalls Logging and monitoring Security controls implemented on your social media site Scanning the social media sites for your data ○ You can set up Google for “Social Mention” alerts when your university or president name is used

UWMC Social Media Policy UW MEDICINE SOCIAL NETWORKING POLICY AND GUIDELINES May 24, COM-03SocialMedia.pdf

SOCIAL MEDIA BENEFITS AND RISKS Questions