Download presentation
Presentation is loading. Please wait.
Published byMartin Anthony Modified over 9 years ago
1
1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult
2
2 Who am I? Boris Agranovich: Founder at GlobalRisk community helping clients master risk, adviser, Building Bridges Globally http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult more than 25 years of global experience in working with large & medium corporations in West & East Europe, Middle East, Asia Pacific across multiple sectors including Financial Services, IT, Consulting, Manufacturers and Distributors. Recently founded GlobalRisk Community – http://globalriskcommunity.com one of the world’s premier risk community http://globalriskcommunity.com Founder at GlobalRiskConsult, http://globalriskconsult.com http://globalriskconsult.com Providing services in the area of risk management, business social networking and marketing
3
3 Agenda http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Risks of social media IT/security risks Social media compliance policies, and some case studies. The need for effective strategies and policies Regulatory requirements on the use of social media. Where to start?
4
4 Social media means: http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Loss of brand ownership. Can you cope? Technology available – but figure out strategy than pick right tools Educate internally, encourage behavioural shifts before going external Threads can create opportunities and new ways of engaging with people
5
5 Legal liability: http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Third Party Statements Defamation and False Light False Advertising and Online Disclosures Privacy and Publicity Cyberstalking Intellectual Property Trade Secrets Recommendations and References
6
6 IT/Security related risks http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult 1.Viruses/malware Phishing Click-jacking 2.Data Loss 3.Bandwidth Consumption 4.Productivity Loss 5.Non-compliance with record management regulations. 6.Brand hijacking and lack of control over content
7
7 Employee monitoring and pre- employment screening http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Employers must strike a careful balance to avoid violating privacy rights What you know can also hurt you. Companies should obtain employee acknowledgment of policies dictating the extent to which activities may be monitored
8
8 Reputation risk http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult
9
9 Reputation risk http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult
10
10 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Case study. How private is your email? Based on the recent cases, your corporate policies including your employee manual, should include the following language: Email communication is not private; Email is to be used only for company business; Email communication is randomly and periodically monitored to ensure compliance;
11
11 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Case study continued. The email policy should inform the employee that the company policy: Specifically covers the use of cloud based email providers; Specifically covers social media companied that have internal email; Informs the employee that such communications may be monitored by the company
12
12 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult The need for strategies and policies Don’t prohibit but mitigate: Security risks; Risk of misrepresentation; Infringement of intellectual property; Unauthorized disclosure of confidential information; Data privacy; Data leakage and identity theft.
13
13 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Compliance requirements
14
14 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Regulatory requirements on the use of social media Supervisory policies, procedures, systems and internal controls to monitor all electronic communications technology used by the party and its associated persons to conduct the business. Regulated parties are required to make and keep records of such use and consequently of all content sent or received regardless of the tools that are used to send it. There is no reason to exclude archiving of posts to social networking sites from this requirement.
15
15 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult What to do next? A real-time Web Defence Selective Social networking Controls Caching Policy Flexibility
16
16 Where to start (2). Collaborate & Share knowledge http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult
17
17 Social media compliance policies, some samples. http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult ● British Telecom - http://www.box.net/shared/static/llarpa9dnh.pdf ● Int. Fed. of Red Cross (IFRC) - http://www.box.net/shared/static/hrjk0nln59.pdf ● The Coca Cola Company - http://www.box.net/shared/static/1ifmdpdzb2.pdf ● UK CIPR - http://www.box.net/shared/static/fudf5fx1je.pdf ● WOMMA - http://www.box.net/shared/static/qxqj2zrd9v.pdf ● US FTC - Principles for Online Behavioral Advertising - http://www.box.net/shared/static/ssrv55sedo.pdfhttp://www.box.net/shared/static/llarpa9dnh.pdfhttp://www.box.net/shared/static/hrjk0nln59.pdfhttp://www.box.net/shared/static/1ifmdpdzb2.pdfhttp://www.box.net/shared/static/fudf5fx1je.pdfhttp://www.box.net/shared/static/qxqj2zrd9v.pdfhttp://www.box.net/shared/static/ssrv55sedo.pdf ● US CIO Council - SN Use by Federal Departments - http://www.box.net/shared/static/89149s00yu.pdf http://www.box.net/shared/static/89149s00yu.pdf Isaca Social Media: Business Benefits and Security, Governance and Assurance Perspectives http://www.isaca.org/Knowledge-Center/Research/Documents/Social- Media-Wh-Paper-26-May10-Research.pdf http://www.isaca.org/Knowledge-Center/Research/Documents/Social- Media-Wh-Paper-26-May10-Research.pdf
18
18 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Regulatory requirements on the use of social media ● Osterman - The Impact of New Communications Tools - http://www.box.net/shared/static/exvkqvcleu.pdf ● Osterman - The Need to Archive SN Content - http://www.box.net/shared/static/byobpxpzi7.pdf ● US - FINRA - Supervision of Electronic Communications - http://www.box.net/shared/static/odja4zxt08.pdf ● US - FINRA - Guidance on Social Media Web Sites - http://www.box.net/shared/static/75ytdooycl.pdf ● US - FINRA - Communications with the Public - http://www.box.net/shared/static/s16c8jzigp.pdf http://www.box.net/shared/static/exvkqvcleu.pdfhttp://www.box.net/shared/static/byobpxpzi7.pdf http://www.box.net/shared/static/odja4zxt08.pdfhttp://www.box.net/shared/static/75ytdooycl.pdf http://www.box.net/shared/static/s16c8jzigp.pdf
19
19 http://www.globalriskcommunity.com info@globalriskconsult.com Copyright © 2011 Global Risk Consult Questions?? Resources: RIMS magazine Rob van Alphen’s presentation Blue Coat. Solution brief: The Top Four Business Risks of Social media How private is your e-mail by Lawyers RMKB
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.