1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich Copyright.

Slides:



Advertisements
Similar presentations
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Advertisements

EuroCRIS Conference Brussels Legal Issues Heather Weaver Business & Information Technology Department Legal & Ethical Issues Heather Weaver (Internet Legal.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
San Mateo County, CA  FAST FACTS:  Founded: 1856  Size: 455 sq miles  Coastline: 57 miles  Population: 718,451  Cities: 20  County Employees: more.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
1 © 2008 Venable LLP Top 5 Technology Legal Traps for Associations Venable LLP August 24, :45 AM – 12:00 PM ASAE Annual Meeting Los Angeles, CA.
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Developing a Records & Information Retention & Disposition Program:
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Internal Auditing and Outsourcing
The Miller Group Social Media Proposal. Goals for The Miller Group Would like to attract new clients Wishes to better serve its client group UWSMB Team.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Chapter 5 E-environment
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
Law as an enterprise skill: ‘Intellectual property and project commercialisation in engineering enterprise’ Professor Jim Roach Design Computing & Engineering.
© Hogan & Hartson LLP. All rights reserved. Affiliate Marketing: How To Ensure Your Third Parties Are Meeting Privacy Obligations Mary Ellen Callahan,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Social Media: Marketing and the Legal Risks Training Session One: The Social Media Playbook Matthew Spanovich & Eric Wiechman December 2, 2011 Spanovich.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Middle College Social Media Committee Arizona State University Team Leader: Trudy Grantsen Team Members: Evan Saperstein and Stephanie Quintero Leading.
Staying Safe Online A Practical Guide for Middle School Students.
The Cloud and the Law Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Monitoring Employees on Networks: Unethical or Good Business?
Hosted by Employee Monitoring Balancing Best Practices and Privacy by Kevin Beaver, CISSP founder and principal consultant Principle Logic, LLC
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
Practice Management Quality Control
GIOA Conference – March “Facebook Me” TRUST THEN WHY CARE?
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
ELC 200 Day 21. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #7 ed to you in WebCt –Due April 9 at the beginning.
INTERNET SAFETY.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Social Media Audit: Labor, Advertising and Corporate Law.
Protecting your Managed Services Practice: Are you at Risk?
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
An Overview THE AUDIT PROCESS. MAJOR PHASES IN AN AUDIT Client acceptance and retention Establish terms of the engagement Plan the audit Consider internal.
IT auditing in practice Marc Verdonk Eindhoven, November 27 th 2008.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Charity Finance Directors’ Group Online Fundraising Risks James Tarleton, Head of Fundraising Finance Kirit Naik, Head of Risk & Assurance July 2012.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Hot Topics in Technology Transactions Presented by: Robert J. Scott
The National Insulation Association Vanda Bell- Preston BSH National Sales Manager.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
Social Media Compliance in the Financial Services Industry
Ogletree, Deakins, Nash, Smoak & Stewart PC
Chapter 10 Cyberlaw, Social Media, and Privacy
6 October 2016 Social media: do you have the right social media strategy that will impact your business’ growth? - Legal and Regulatory Issues William.
Privacy and Security in the Employment Relationship
Cyber Trends and Market Update
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Internet law Business law.
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Presentation transcript:

1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich Copyright © 2011 Global Risk Consult

2 Who am I? Boris Agranovich: Founder at GlobalRisk community helping clients master risk, adviser, Building Bridges Globally Copyright © 2011 Global Risk Consult more than 25 years of global experience in working with large & medium corporations in West & East Europe, Middle East, Asia Pacific across multiple sectors including Financial Services, IT, Consulting, Manufacturers and Distributors. Recently founded GlobalRisk Community – one of the world’s premier risk community Founder at GlobalRiskConsult, Providing services in the area of risk management, business social networking and marketing

3 Agenda Copyright © 2011 Global Risk Consult Risks of social media IT/security risks Social media compliance policies, and some case studies. The need for effective strategies and policies Regulatory requirements on the use of social media. Where to start?

4 Social media means: Copyright © 2011 Global Risk Consult Loss of brand ownership. Can you cope? Technology available – but figure out strategy than pick right tools Educate internally, encourage behavioural shifts before going external Threads can create opportunities and new ways of engaging with people

5 Legal liability: Copyright © 2011 Global Risk Consult Third Party Statements Defamation and False Light False Advertising and Online Disclosures Privacy and Publicity Cyberstalking Intellectual Property Trade Secrets Recommendations and References

6 IT/Security related risks Copyright © 2011 Global Risk Consult 1.Viruses/malware Phishing Click-jacking 2.Data Loss 3.Bandwidth Consumption 4.Productivity Loss 5.Non-compliance with record management regulations. 6.Brand hijacking and lack of control over content

7 Employee monitoring and pre- employment screening Copyright © 2011 Global Risk Consult Employers must strike a careful balance to avoid violating privacy rights What you know can also hurt you. Companies should obtain employee acknowledgment of policies dictating the extent to which activities may be monitored

8 Reputation risk Copyright © 2011 Global Risk Consult

9 Reputation risk Copyright © 2011 Global Risk Consult

10 Copyright © 2011 Global Risk Consult Case study. How private is your ? Based on the recent cases, your corporate policies including your employee manual, should include the following language: communication is not private; is to be used only for company business; communication is randomly and periodically monitored to ensure compliance;

11 Copyright © 2011 Global Risk Consult Case study continued. The policy should inform the employee that the company policy: Specifically covers the use of cloud based providers; Specifically covers social media companied that have internal ; Informs the employee that such communications may be monitored by the company

12 Copyright © 2011 Global Risk Consult The need for strategies and policies Don’t prohibit but mitigate: Security risks; Risk of misrepresentation; Infringement of intellectual property; Unauthorized disclosure of confidential information; Data privacy; Data leakage and identity theft.

13 Copyright © 2011 Global Risk Consult Compliance requirements

14 Copyright © 2011 Global Risk Consult Regulatory requirements on the use of social media Supervisory policies, procedures, systems and internal controls to monitor all electronic communications technology used by the party and its associated persons to conduct the business. Regulated parties are required to make and keep records of such use and consequently of all content sent or received regardless of the tools that are used to send it. There is no reason to exclude archiving of posts to social networking sites from this requirement.

15 Copyright © 2011 Global Risk Consult What to do next? A real-time Web Defence Selective Social networking Controls Caching Policy Flexibility

16 Where to start (2). Collaborate & Share knowledge Copyright © 2011 Global Risk Consult

17 Social media compliance policies, some samples. Copyright © 2011 Global Risk Consult ● British Telecom - ● Int. Fed. of Red Cross (IFRC) - ● The Coca Cola Company - ● UK CIPR - ● WOMMA - ● US FTC - Principles for Online Behavioral Advertising - ● US CIO Council - SN Use by Federal Departments Isaca Social Media: Business Benefits and Security, Governance and Assurance Perspectives Media-Wh-Paper-26-May10-Research.pdf Media-Wh-Paper-26-May10-Research.pdf

18 Copyright © 2011 Global Risk Consult Regulatory requirements on the use of social media ● Osterman - The Impact of New Communications Tools - ● Osterman - The Need to Archive SN Content - ● US - FINRA - Supervision of Electronic Communications - ● US - FINRA - Guidance on Social Media Web Sites - ● US - FINRA - Communications with the Public

19 Copyright © 2011 Global Risk Consult Questions?? Resources: RIMS magazine Rob van Alphen’s presentation Blue Coat. Solution brief: The Top Four Business Risks of Social media How private is your by Lawyers RMKB