Operations 102 Communications, Class 8. Operations 102—Communications 1.Strategy: The Culture of Your Church. 2.Strategy: Parsing the Preaching Pastor.

Slides:



Advertisements
Similar presentations
Cellular Telephone Use Guidelines AA Roundup June 27, 2007.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
A Strategic Plan to Address Key Result Areas (KRAs) from the Port Kells Assessment.
Operations 102 Communications. Operations 102—Communications 1.Strategy: The Culture of Your Church. 2.Strategy: Parsing the Preaching Pastor 3.Web 4.Hardware.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Uintah School District Acceptable Use for Computer and Network Access.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Network security policy: best practices
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
E-rate Audits/Reviews Be prepared!! Prepared by Judy Jones, State Library of Iowa.
Operations 103 Finances: Class 4. Operations 103—Finances 1. Cash & Fungible Assets 2. Income 3. Expenses 4. Budgets 5. Reporting 6. Audits & Financial.
Protect the ACN Opportunity. Getting It Right It is every Independent Representative’s responsibility to enforce all of ACN’s Policies and Procedures.
Copyright © 2012 by United Space Alliance, LLC. Copyright © 2012 by United Space Alliance, LLC. TeleWork October 2012 Implementing TeleWork from an Industry.
Financial Resource Management Recommended Best Practices Training for Volunteers and Support Groups.
CPS Acceptable Use Policy Day 2 – Technology Session.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Operations 102 Communications. Operations 102—Communications 1.Strategy: The Culture of Your Church. 2.Strategy: Parsing the Preaching Pastor 3.Web 4.Hardware.
EDMR Electronic data submittal system Jeffrey A. Ewick, Section Chief Data and Information Services Section Electronic Discharge Monitoring Report.
Computer Jobs 2013 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Electronic Use Policies.   Social Media  Internet.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Computer Jobs 2014 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Human Resources Administration Department of Social Services 1 Eligibility Data and Image Transfer System EDITS November 6, 2008.
Chapter 1 Introduction to the Help Desk Introduction to Help Desk Concepts & Skills Mike Meyers’ Computer Skills.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Operations 102 Communications, Class 5. Operations 102—Communications 1.Strategy: The Culture of Your Church. 2.Strategy: Parsing the Preaching Pastor.
Craig Mintz, CFO Cornelia Kent, Controller Finance Overview & Risk Management New Professionals Orientation August 2012.
Operations 102 Communications, Class 6. Operations 102—Communications 1.Strategy: The Culture of Your Church. 2.Strategy: Parsing the Preaching Pastor.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
What is MediaCAST. MediaCAST is an on-demand learning platform purchased by the CCSD to enhance the delivery of lessons in the classroom. The system provides.
11 CHAPTER INFORMATION TECHNOLOGY, THE INTERNET, AND YOU.
Operations 102 Comunications. Level 1: Certificate in Operations  Operations 101—Staffing  Operations 102—Communications  Operations 103—Finances 
EXPLORING PATHWAYS: Marketing Communications Created for the Marketing Career Exploration Module Copyright © Texas Education Agency, All rights reserved.
Role of Montana State Fund. Montana State Fund is committed to the health and economic prosperity of Montana through superior service, leadership and.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Compliance Monitoring and Enforcement Audit Program - The Audit Process.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Paul Kelly Facility Research Compliance Officer for the Ralph H. Johnson VA Medical Center.
Operations 104 Class 7—Finance Policy. Class 6—Financial Policy Most churches have some sort of collection of policies on Finances. Often these come from.
Position Proposal: Digital Communications Coordinator.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
May 5, 2016 May 5, Reporting obligations for  Investment banks,  Stockbrokers and dealers  FM and Investment advisers 2. Publication financial.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
MODULE 3 Policies, Procedures & Supervisor Responsibilities.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Information Technology (IT) Audits
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Red Flags Rule An Introduction County College of Morris
IS4550 Security Policies and Implementation
AUP, EDP, & Centralized Printing
Position descriptions
Presentation transcript:

Operations 102 Communications, Class 8

Operations 102—Communications 1.Strategy: The Culture of Your Church. 2.Strategy: Parsing the Preaching Pastor 3.Web 4.Hardware & IT 5.Productivity Tools 6.Multisite & Cutting Edge Issues 7.Advertising 8.Policy & Practice 9.Multi-Site, continued 10.Communications Team

Today’s Topic Let’s look at communications polices and practices in a local church. This week we will talk with Concord Church of Dallas, a thriving church of 6,000 in worship. Staff and volunteer teams need to deal with editing rights and quality control of the website. How does a local church design or redesign a new logo? We need to explore how these churches use consultants and vendors in their communications departments.

Today’s Topic, cont. Every Sunday there are issues of copyright in print, music and video. With creative types abounding, how does a church handle Intellectual Property issues and Work for Hire agreements. With pastors and directors, issues of personal use of computers, printers & copiers need to be considered. What is the role of the church to prevent pornography viewing on its computers?

Kason Branch Kason Branch began his career with AT&T as a member of the prestigious AT&T Leadership Development Program. He is the Chief Operating Officer of Concord Church in Dallas under the leadership of Sr. Pastor Bryan Carter. He is responsible for leading a staff of 40 full-time employees as well as providing leadership to church-wide initiatives such as capital campaigns and facility expansion. Under his leadership is the Ministry Operations of the church as well as the Operations Support, which includes: Finance, Human Resources, Facilities Management, Security, Multimedia, and Marketing.

Communications Policy & Practice at Concord Church

External Communications Policy  All outside media contacts, television, radio or print media should be routed directly to the Chief Operating Officer and/or Director of Marketing. No action, appointments or discussions should be planned or given until they have an opportunity to evaluate the contact. The receptionist is provided with written appropriate verbiage.

Marketing Policy  Website editing and quality control is done by the Director of Marketing after approval for major changes has been given by the Chief Operating Officer.  Ministry logos are requested by Ministry Leaders and approved by their staff leader. That leader submits a request to the Director of Marketing for design to begin. The DOM then works one on one with the ministry leader for logo approval.  Copyright infringement is prevented by obtaining a yearly CLLI license that allows us to use certain videos and songs in our weekly services and webcasts.

Computer Systems Policy  Designated Use Employees must understand that there will be no tolerance for accessing pornographic or morally questionable Internet sites, including any other information or images incongruous with a Christian lifestyle. Failure to comply with this policy will subject the employee to disciplinary action up to, and including, dismissal.  Personal Software The use of personal software is not allowed. Valid software licenses are required for all software loaded onto the Church computer network. If there is a software package an employee desires to have available on the network, the employee should notify the IT, and if approved, it will be purchased from church funds and installed by the IT Department.  Home Computer Use Computer software purchased by Concord Church is owned by the Church. Church documents, spreadsheets, or data cannot be loaded on any computer not owned by Concord Church without prior approval. All Church computer data and information belongs to the Church, and should not be copied or given to any person.  Audits All computers owned by Concord Church will be subject to periodic inspection for compliance with these guidelines. Failure to comply with these guidelines could result in immediate termination.

Computer Systems Policy  Purchases All purchases and installation of computer-related technology that affect the computer network of Concord Church must be reviewed and approved through the Chief Operating Officer and the Chief Financial Officer. This includes desktop computers, laptop computers, printers, mice, keyboards, scanners, PDA devices, and any other device that directly attaches to a computer or the network. This also includes software. Every device that attaches to a computer or the network requires support and maintenance. The IT Department can provide information and recommendations about various products and software before purchasing.  Helpdesk If an employee experiences problems with a computer or related equipment, and requires assistance, they should call the Help Desk at with a description of the problem Computer Privacy Statement  Network and internet access are provided as tools for Concord Church. Concord reserves the rights to monitor, inspect, copy, review, and store, at any time and without prior notice, any and all materials, files, information, software, communications, and other content transmitted, received, or stored in connection with this usage. All such information, content, and files, shall be and remain the property of Concord Church, and you should not have any expectation of privacy regarding those materials. The Chief Financial Officer may review files and intercept communications for any reason for purposes of maintaining system integrity and ensuring that users are abiding with this policy.

Communications Strategy

Example

Q & A Send Questions via Chat to Tami

Chapter 8, “Yes, You Can” Cracking Your Church’s Culture Code by Sam Chand Opening lines of communication to talk about the things people have longed to discuss builds trust for the future.  What is required of leadership to make this happen?  How do we initiate this in our environments? The conundrum of leadership is this: people want improvement, but they resist change.  Are we providing compelling vision and clear pathways to our staff and congregation to achieve the desired outcomes? All change is a critique of the past and we need to be sensitive and wise as we talk about the past our people treasure.  How do we build on the previous vision and strategies even if/when they appear to be contrary to new vision and strategy? Jon Wright