Jesse Wilkins, CIP, CRM
AIIM International
February 8, 2012
   Director, Research and Development, AIIM
   Background in electronic records management,
    ECM, digital preservation, and social business
   ARMA Int’l Board of Directors, 2007-2010
   AIIM Int’l Board of Directors, 2004-2005
   Frequent industry speaker and author
   AIIM Social Business Expert Blogger
   Co-Author, AIIM Social Business Roadmap
   Author, AIIM Social Media Governance
    Certificate Program


                                                 2
 Social media governance challenges
 Social media policy statements
 Capturing and managing social
  content




                                       3
10. I am not a lawyer.
9. I am not a lawyer.
8. I am not a lawyer.
7. I am not a lawyer.
6. I am not a lawyer.
5. I am not a lawyer.
4. I am not a lawyer.
3. I am not a lawyer.
2. I am not a lawyer.

                         4
I am an IT geek, a records manager, a business
  guy, a trainer, a former Marine Corps Drill
  Instructor, and sometimes even a princess.




                                             5
20120208 ARMA Detroit Social Media Governance
Does your organization keep its own history record or searchable archive of
what has been published or communicated on the following sites or
communications channels?
                                      0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
                                                                                  Generally less
                               Emails                                                than half
                       Press articles
                                                                                   keeping their
                             Intranet
      Public presentations or videos
                                                                                  own record of
                    External website                                              internal social
           Old SharePoint team sites                                              media content
          Internal blogs and forums
                                                                                      types...
  Other internal social sites or systems
                      Instant messages
               Public blogs and forums                                                     …and even less
    Micro-blog/electronic notice board                                                      for external
 Company Facebook or Linked In pages                                                         networks.
                                Twitter

                                           Yes   No
                                                      N=335, “N/A Don’t Know” make up to             7
                                                                    100%
By the end of 2013, half of all
companies will have been asked
to produce material from social
media websites for e-discovery.

  Source: “Social Media Governance: An Ounce of
Prevention”, Gartner



                                                  8
When is “social” a Federal
“record?”
   Is the information unique
    and not available anywhere
    else?
   Does it contain evidence of
    an agency’s
    policies, business, mission, e
    tc.?
   Is the tool being used in
    relation to an agency’s work?
   Is there a business need for
    the information?
   Does it document a
    transaction or decision?
                                     9
If the answers to
ANY of the
above questions
are yes, then the
content is likely to
be a Federal
record.
              Source = http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html




                                                                                  10
Is a Facebook “like” a record?




                                 11
12
13
14
   Drug companies lose protections on
    Facebook, some decide to close pages
    -- Washington Post, August 13, 2011

   New Facebook Policy Spurs Big Pharma to
    Rethink Social Media Strategy
   Major Marketers Fear that Enabling
    Comments Will Attract FDA Ire
    -- Adage.com, June 2, 2011


                                              15
Systems of Engagement
  Era      Mainframe      Mini        PC       Internet    ???

                           Systems of Record
            1960-        1975-      1992-      2001-      2010-
 Years
            1975         1992       2001       2009       2015


 Typical    A batch
                        A dept         A       A web
  thing    transactio                                      ???
                        process    document    page
managed        n

  Best                   Digital
 known        IBM       Equipmen   Microsoft   Google      ???
company                     t

Content
                         Image       Doc       Content
 mgmt      Microfilm                                       ???
                         Mgmt       Mgmt        Mgmt
 focus
                                                                 16
Records, meet engagement.
Systems of Engagement
                                                         Social and
  Era      Mainframe     Mini        PC       Internet
                                                           Cloud

                           Systems of Record

            1960-       1975-      1992-      2001-       2010-
 Years
            1975        1992       2001       2009        2015


 Typical                             A                       An
            A batch    A dept                 A web
  thing                           documen                interactio
             trans     process                page
managed                              t                        n

  Best                  Digital
 known       IBM       Equipmen   Microsoft   Google     Facebook
company                    t

Content                                                   Social
                        Image     Documen     Content
 mgmt      Microfilm                                     Business
                        Mgmt       t Mgmt      Mgmt
 focus                                                   Systems
                                                             18
The enterprise goes social




                             19
   Stuff stored outside the control of the
    organization
    ◦ No ready way to get at most of it
    ◦ Co-creation, aggregation, fragmentation

   Stuff accessed by and published from
    personal/mobile devices (BYOD, security)

   The law always lags the technology


                                                20
20120208 ARMA Detroit Social Media Governance
   Disparagement of the organization – or of
    competitors or others
   Slander or libel
   Sexual content
   Solicitations of commerce
   Threats
   Illegal activity
   Violation of copyright
   Etc.

                                                22
Official vs. unofficial
Link to social media policy
                              23
Creation of official accounts




                                24
   Account details
    ◦   User name
    ◦   Picture
    ◦   Corporate logo usage
    ◦   Bio
    ◦   Contact information
   Friends/buddies/contacts
   Groups/fans/likes



                               25
   Whether posts will require approval
   Pictures and video
    ◦ By the organization
    ◦ By third parties
   Links (i.e. “sharing”)
   Applications and widgets
   Likes, retweets, etc.




                                          26
   Access to personal accounts using
    organizational resources
    (time, computers, network, etc.)
   Access to sites using personal devices
    (iPhone, tablet, etc.)




                                             27
   Acceptable and unacceptable groups
   Perception of approval




                                         28
   Personnel-related information
   Financial information
   Confidential information
   Health information
   If you wouldn’t post it to your website or
    send via email, don’t post to FB or send via
    Twitter.




                                               29
   Whether comments are allowed
    ◦ And monitored




                                   30
Monitoring and reviewing comments
                                31
32
Response to comments
   Whether the account is monitored for
    actionable content (screenshot)




             Public records
       Monitoring for public safety        33
20120208 ARMA Detroit Social Media Governance
 Is there a business need for the
  information?
 Does it document a transaction or
  decision?
 Is the information unique and not
  available anywhere else?



                                      35
36
   Blog post
    ◦ Comments?
    ◦ Updates?
   Individual Tweet
    ◦ Links and shortened URLS?
   Wiki article
    ◦ The article?
    ◦ Its changes over time?
   It depends….


            Prepare for production
                                     37
38
   Commercial and hosted sites store
    information outside the firewall
    ◦ Little control over how it is stored
    ◦ Little control over how long it is stored
    ◦ Geographic and jurisdictional issues
   First step is to save content locally




                                                  39
Take a screenshot of content
                               40
   Archive selected items locally
    ◦ Use search queries and monitoring




      Store selected items locally
      using search queries or RSS         41
Store locally using built-in tools
                                     42
Store locally using third-party service
                                     43
Store locally using APIs
                           44
   Use Word or Notepad to draft content
    updates and save *that*




                                       45
46
• And many others

                    47
48
Jesse Wilkins, CIP, CRM, CDIA+, ermm
Director, Research and Development
AIIM International
      +1 (303) 574-0749 direct
      jwilkins@aiim.org
      http://www.twitter.com/jessewilkins
      http://www.linkedin.com/in/jessewilkins
      http://www.facebook.com/jessewilkins
      http://www.slideshare.net/jessewilkins
      http://www.govloop.com/profile/jessewilkins

                                                    49
   2-day instructor-led or online course
   Includes:
    ◦ Specific governance elements for
      Facebook, Twitter, other social business tools
    ◦ Commercial vs. enterprise social technologies
    ◦ Capturing and managing social content
    http://www.aiim.org/Training/Essential%20Trainin
    g/Social-Media/Course%20Descriptions




                                                       50
PROFESSIONAL CERTIFICATION covering the broad
                       based body of knowledge that every information
                       professional needs to understand.

                       www.aiim.org/certification

                       Enterprise search, Business intelligence, Master
    Access/ Use
                       data management, Text analytics
                       Information capture, BPM, KM, Email
 Capture/Manage
                       management, Content management
                       Collaboration, Social media, Info
Collaborate/Deliver
                       workplace, IM, Telecommuting support, Web
                       conferencing
                       Security, RM, Data
  Secure/Preserve
                       privacy, DRM, Archiving, eDiscovery
                       Info architecture, Technical architecture, Cloud
Architecture/Systems
                       computing, Mobile apps, Websites and portals
                       Strategic planning, Building business case, Impl
  Plan/Implement
                       planning, Req def, Solution design, Change mgmt
                                                                          51
20120208 ARMA Detroit Social Media Governance

More Related Content

PDF
What every product manager needs to know about security
PDF
Tweet, Tweet, Youre Fired
PDF
Tweet Tweet Youre Fired
PPTX
#EuropeanSP--SharePoint's Social Media Scorecard
PDF
Occupy IT Manifesto
PDF
Whats In It For Me - Web2.0
PDF
The Social Web (Version2)
PDF
What every product manager needs to know about security
What every product manager needs to know about security
Tweet, Tweet, Youre Fired
Tweet Tweet Youre Fired
#EuropeanSP--SharePoint's Social Media Scorecard
Occupy IT Manifesto
Whats In It For Me - Web2.0
The Social Web (Version2)
What every product manager needs to know about security

What's hot (20)

PPTX
Tacoma Keynote (4-17-09)
PPTX
What is Web 3.0?
PPTX
Social Business Introdcution - Oracle Social CRM Event
PDF
20111102 TIVIT Business Forum Helsinki
PDF
Information opportunities in social, mobile, and cloud technologies
PDF
Social CRM - 2011
PDF
Top 10 need-to-knows_about_social_networking_and_where_it_is_headed
PPT
Digital Literacy: Internet Misconceptions
PPTX
More than words, The changing face of reading | The advent of algorithmic & c...
PPT
BIM: Data Everywhere
PPT
Getting Social in construction
PPTX
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
PDF
Info360 Keynote by AIIM President John Mancini
PDF
Noah Lang's Presentation
PDF
Michael Buschmann - Head of Search & Online Marketing, Products & Innovation ...
PDF
Digital Philippines 2011 Yahoo - Nielsen Net Index Highlights
PPTX
Intro to Web 3.0 and the Internet of Things
PPTX
Your Digital Dossier
PPT
What's next in digital communications for construction marketing
Tacoma Keynote (4-17-09)
What is Web 3.0?
Social Business Introdcution - Oracle Social CRM Event
20111102 TIVIT Business Forum Helsinki
Information opportunities in social, mobile, and cloud technologies
Social CRM - 2011
Top 10 need-to-knows_about_social_networking_and_where_it_is_headed
Digital Literacy: Internet Misconceptions
More than words, The changing face of reading | The advent of algorithmic & c...
BIM: Data Everywhere
Getting Social in construction
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Info360 Keynote by AIIM President John Mancini
Noah Lang's Presentation
Michael Buschmann - Head of Search & Online Marketing, Products & Innovation ...
Digital Philippines 2011 Yahoo - Nielsen Net Index Highlights
Intro to Web 3.0 and the Internet of Things
Your Digital Dossier
What's next in digital communications for construction marketing
Ad

Viewers also liked (20)

PPTX
Prueba recetario
PPTX
Fan value of renren nielsen 精简版
PDF
Enel Green Power in the Turkey Geothermal Market
PDF
CCUS 18 Questions for China
PPT
2010年广东移动校园市场营销方案
PPS
Les Filles Vous êTes Superbes
PDF
Caso - Orizonia Corporación
PPT
FACTS ABOUT SOFTDRINKS....
PDF
News Release: Commerce Resources Corp. Initiates Pilot Plant for the Ashram ...
PDF
Carré Rive Gauche - Communiqué de presse - Septembre des Vernissages 11/09
PDF
Affinity Engine - Recommandations personnalisées - Offre Affinity Items
PDF
SHARE Network
PDF
educación
PDF
CCIP Séminaire Plan De Relance Americain 26 Janvier (2)
DOCX
Apresentação wakeupnow
PPSX
New Business Presentation Telexfree USA 2013
PPT
01李成蒙货代航线介绍
PPT
中石油Lng全国加气站规划
PDF
Wakeupnow Colombia
PPT
信息化引领新经济
Prueba recetario
Fan value of renren nielsen 精简版
Enel Green Power in the Turkey Geothermal Market
CCUS 18 Questions for China
2010年广东移动校园市场营销方案
Les Filles Vous êTes Superbes
Caso - Orizonia Corporación
FACTS ABOUT SOFTDRINKS....
News Release: Commerce Resources Corp. Initiates Pilot Plant for the Ashram ...
Carré Rive Gauche - Communiqué de presse - Septembre des Vernissages 11/09
Affinity Engine - Recommandations personnalisées - Offre Affinity Items
SHARE Network
educación
CCIP Séminaire Plan De Relance Americain 26 Janvier (2)
Apresentação wakeupnow
New Business Presentation Telexfree USA 2013
01李成蒙货代航线介绍
中石油Lng全国加气站规划
Wakeupnow Colombia
信息化引领新经济
Ad

Similar to 20120208 ARMA Detroit Social Media Governance (20)

PPTX
20111206 AIIM Cornhusker Social Media Governance
PDF
In the social, mobile and cloud era, what does it take to be an Information P...
PPTX
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
PDF
How can social technologies be used to drive processes and innovation?
PPTX
Content Opportunities in Revolutionary Times
PDF
Social business and innovation
PDF
Enterprise Access to Skills, Collaboration and Information using Lotus Connec...
PDF
Extreme Information - 8 Charts That Tell You Everything You Need to Know
PDF
Information Management on Mobile Steroids
PDF
Thinking about Technology, Risk, and Change Management Through a Social Lens
PDF
KMA Insights Webinar Aug 2009 Enterprise Social Computing
PDF
Company 2.0 - Solvay Entrepreneurs May 2012
PDF
Business Gets Social, BGS2012, Sofia
PDF
Lotusphere 2012 AD105
PDF
Big data and big content
PDF
Getting Started with business social networking
PDF
Why Should Consultants and Systems Integrators Become Certified Information P...
PDF
1109 siit jfriedrich v02
PDF
Marshall Sponder - Social Media Monitoring Analytics - Measure13
PPTX
Social media in local government
20111206 AIIM Cornhusker Social Media Governance
In the social, mobile and cloud era, what does it take to be an Information P...
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
How can social technologies be used to drive processes and innovation?
Content Opportunities in Revolutionary Times
Social business and innovation
Enterprise Access to Skills, Collaboration and Information using Lotus Connec...
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Information Management on Mobile Steroids
Thinking about Technology, Risk, and Change Management Through a Social Lens
KMA Insights Webinar Aug 2009 Enterprise Social Computing
Company 2.0 - Solvay Entrepreneurs May 2012
Business Gets Social, BGS2012, Sofia
Lotusphere 2012 AD105
Big data and big content
Getting Started with business social networking
Why Should Consultants and Systems Integrators Become Certified Information P...
1109 siit jfriedrich v02
Marshall Sponder - Social Media Monitoring Analytics - Measure13
Social media in local government

More from Jesse Wilkins (20)

PPTX
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
PPTX
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
PPTX
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
PPTX
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
PPTX
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
PPTX
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
PPTX
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
PPTX
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
PPTX
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
PPTX
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
PPTX
20230719 ARMA Canada Professional Development.pptx
PPTX
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
PPTX
20230816 6 Most Common Mistakes in Records Modernization.pptx
PPTX
20230919 ARMA New England Keynote on IG Industry Trends.pptx
PPTX
20230117 ARMA MHD Building Your RM Playbook.pptx
PPTX
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
PPTX
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
PPTX
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
PPTX
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
PPTX
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20230719 ARMA Canada Professional Development.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx

Recently uploaded (20)

PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Decision Optimization - From Theory to Practice
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
SaaS reusability assessment using machine learning techniques
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Rapid Prototyping: A lecture on prototyping techniques for interface design
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
4 layer Arch & Reference Arch of IoT.pdf
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Decision Optimization - From Theory to Practice
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Data Virtualization in Action: Scaling APIs and Apps with FME
Advancing precision in air quality forecasting through machine learning integ...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
SaaS reusability assessment using machine learning techniques
Presentation - Principles of Instructional Design.pptx
EIS-Webinar-Regulated-Industries-2025-08.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
Build Real-Time ML Apps with Python, Feast & NoSQL
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Connector Corner: Transform Unstructured Documents with Agentic Automation

20120208 ARMA Detroit Social Media Governance

  • 1. Jesse Wilkins, CIP, CRM AIIM International February 8, 2012
  • 2. Director, Research and Development, AIIM  Background in electronic records management, ECM, digital preservation, and social business  ARMA Int’l Board of Directors, 2007-2010  AIIM Int’l Board of Directors, 2004-2005  Frequent industry speaker and author  AIIM Social Business Expert Blogger  Co-Author, AIIM Social Business Roadmap  Author, AIIM Social Media Governance Certificate Program 2
  • 3.  Social media governance challenges  Social media policy statements  Capturing and managing social content 3
  • 4. 10. I am not a lawyer. 9. I am not a lawyer. 8. I am not a lawyer. 7. I am not a lawyer. 6. I am not a lawyer. 5. I am not a lawyer. 4. I am not a lawyer. 3. I am not a lawyer. 2. I am not a lawyer. 4
  • 5. I am an IT geek, a records manager, a business guy, a trainer, a former Marine Corps Drill Instructor, and sometimes even a princess. 5
  • 7. Does your organization keep its own history record or searchable archive of what has been published or communicated on the following sites or communications channels? 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Generally less Emails than half Press articles keeping their Intranet Public presentations or videos own record of External website internal social Old SharePoint team sites media content Internal blogs and forums types... Other internal social sites or systems Instant messages Public blogs and forums …and even less Micro-blog/electronic notice board for external Company Facebook or Linked In pages networks. Twitter Yes No N=335, “N/A Don’t Know” make up to 7 100%
  • 8. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner 8
  • 9. When is “social” a Federal “record?”  Is the information unique and not available anywhere else?  Does it contain evidence of an agency’s policies, business, mission, e tc.?  Is the tool being used in relation to an agency’s work?  Is there a business need for the information?  Does it document a transaction or decision? 9
  • 10. If the answers to ANY of the above questions are yes, then the content is likely to be a Federal record. Source = http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html 10
  • 11. Is a Facebook “like” a record? 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. Drug companies lose protections on Facebook, some decide to close pages -- Washington Post, August 13, 2011  New Facebook Policy Spurs Big Pharma to Rethink Social Media Strategy  Major Marketers Fear that Enabling Comments Will Attract FDA Ire -- Adage.com, June 2, 2011 15
  • 16. Systems of Engagement Era Mainframe Mini PC Internet ??? Systems of Record 1960- 1975- 1992- 2001- 2010- Years 1975 1992 2001 2009 2015 Typical A batch A dept A A web thing transactio ??? process document page managed n Best Digital known IBM Equipmen Microsoft Google ??? company t Content Image Doc Content mgmt Microfilm ??? Mgmt Mgmt Mgmt focus 16
  • 18. Systems of Engagement Social and Era Mainframe Mini PC Internet Cloud Systems of Record 1960- 1975- 1992- 2001- 2010- Years 1975 1992 2001 2009 2015 Typical A An A batch A dept A web thing documen interactio trans process page managed t n Best Digital known IBM Equipmen Microsoft Google Facebook company t Content Social Image Documen Content mgmt Microfilm Business Mgmt t Mgmt Mgmt focus Systems 18
  • 19. The enterprise goes social 19
  • 20. Stuff stored outside the control of the organization ◦ No ready way to get at most of it ◦ Co-creation, aggregation, fragmentation  Stuff accessed by and published from personal/mobile devices (BYOD, security)  The law always lags the technology 20
  • 22. Disparagement of the organization – or of competitors or others  Slander or libel  Sexual content  Solicitations of commerce  Threats  Illegal activity  Violation of copyright  Etc. 22
  • 23. Official vs. unofficial Link to social media policy 23
  • 24. Creation of official accounts 24
  • 25. Account details ◦ User name ◦ Picture ◦ Corporate logo usage ◦ Bio ◦ Contact information  Friends/buddies/contacts  Groups/fans/likes 25
  • 26. Whether posts will require approval  Pictures and video ◦ By the organization ◦ By third parties  Links (i.e. “sharing”)  Applications and widgets  Likes, retweets, etc. 26
  • 27. Access to personal accounts using organizational resources (time, computers, network, etc.)  Access to sites using personal devices (iPhone, tablet, etc.) 27
  • 28. Acceptable and unacceptable groups  Perception of approval 28
  • 29. Personnel-related information  Financial information  Confidential information  Health information  If you wouldn’t post it to your website or send via email, don’t post to FB or send via Twitter. 29
  • 30. Whether comments are allowed ◦ And monitored 30
  • 33. Whether the account is monitored for actionable content (screenshot) Public records Monitoring for public safety 33
  • 35.  Is there a business need for the information?  Does it document a transaction or decision?  Is the information unique and not available anywhere else? 35
  • 36. 36
  • 37. Blog post ◦ Comments? ◦ Updates?  Individual Tweet ◦ Links and shortened URLS?  Wiki article ◦ The article? ◦ Its changes over time?  It depends…. Prepare for production 37
  • 38. 38
  • 39. Commercial and hosted sites store information outside the firewall ◦ Little control over how it is stored ◦ Little control over how long it is stored ◦ Geographic and jurisdictional issues  First step is to save content locally 39
  • 40. Take a screenshot of content 40
  • 41. Archive selected items locally ◦ Use search queries and monitoring Store selected items locally using search queries or RSS 41
  • 42. Store locally using built-in tools 42
  • 43. Store locally using third-party service 43
  • 45. Use Word or Notepad to draft content updates and save *that* 45
  • 46. 46
  • 47. • And many others 47
  • 48. 48
  • 49. Jesse Wilkins, CIP, CRM, CDIA+, ermm Director, Research and Development AIIM International +1 (303) 574-0749 direct [email protected] http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins http://www.govloop.com/profile/jessewilkins 49
  • 50. 2-day instructor-led or online course  Includes: ◦ Specific governance elements for Facebook, Twitter, other social business tools ◦ Commercial vs. enterprise social technologies ◦ Capturing and managing social content http://www.aiim.org/Training/Essential%20Trainin g/Social-Media/Course%20Descriptions 50
  • 51. PROFESSIONAL CERTIFICATION covering the broad based body of knowledge that every information professional needs to understand. www.aiim.org/certification Enterprise search, Business intelligence, Master Access/ Use data management, Text analytics Information capture, BPM, KM, Email Capture/Manage management, Content management Collaboration, Social media, Info Collaborate/Deliver workplace, IM, Telecommuting support, Web conferencing Security, RM, Data Secure/Preserve privacy, DRM, Archiving, eDiscovery Info architecture, Technical architecture, Cloud Architecture/Systems computing, Mobile apps, Websites and portals Strategic planning, Building business case, Impl Plan/Implement planning, Req def, Solution design, Change mgmt 51

Editor's Notes

  • #10: The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
  • #17: During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
  • #18: The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
  • #23: Pretty straightforward
  • #24: Official vs. unofficial includesDisclaimers (this is or is not official; disclaimer of responsibility if it isn’t)Also includes a link to his social media policy
  • #25: Whether approval is required to create an account (official only)It’s also useful, as CSU does, to list all the official accounts somewhere on the website.
  • #26: This includes things like:What user names are appropriate, and whether to use the organization as part of it (e.g. Dell_JeffW)Pictures – same thingBio – same thing, plus things like official account, name (and sometimes personal Twitter handle) of the person behind the account, etc. Different types of contact informationIt’s also valuable to have guidelines for what types of contacts are appropriate. An official federal government account could “friend” Barack Obama on Twitter, but probably shouldn’t friend his re-election campaign or the Democratic Party (and even if it did the Republican Party as well, it’s still problematic). Similarly, it might look a bit odd for an energy company account to “friend” a parody account like BPGlobalPR, or a competitor, or an unsavory group, etc.
  • #27: Pretty straightforward here. Three main points:If third party content is allowed, it should be reviewed so people don’t upload pornography, etc. If it is reviewed, the organization may have some responsibility to remove things that are inappropriate. This should be spelled out clearly and adhered to rigorously – all goes back to transparency. If an official account “likes” something on Facebook, or retweets something on Twitter, this could be considered approval or even recommendation – and if it’s something offensive, or illegal, or otherwise inappropriate, this could cause serious issues.
  • #29: The policy should outline what types of groups are appropriate and what types of groups should be out of bounds. This is especially important for official commercial accounts but could be applicable even to personal accounts where the connection could be made to the organization because of the employee’s visibility. For example, it would be inappropriate for an official in charge of elections to be a member of a Facebook group focused on reelecting one candidate or another. Moreover, there are any number of groups dedicated to patently offensive or illegal causes; having accounts associated with these types of groups could bring significant risk to the organization and its brand. ~Another related area involves conveying a perception of approval of content that might be controversial, offensive, or illegal. For example, both a Facebook “like” and retweeting content on Twitter are often perceived as approval of that content. If an official account or the personal account of a senior manager retweets a sexist joke or something that condones illegal drug use, that could also cause serious issues for the organization.
  • #31: These are specific to government. It’s always a good idea to link back to the organization’s home website and vice versa so it’s clear that the account is an official one. Because of public records and sunshine laws, it’s important for the agency to be open about whether comments are allowed or monitored and whether it believes them to be covered under such legislation. And for public safety accounts in particular, such as fire departments or police, the account should note whether it’s monitored and what the “official” mechanisms are to report safety issues.
  • #33: This is an example of a guideline for how to engage those that comment on your social media, and those that post or comment on third party sites. This triage chart from the American Society of Chemical Engineers is not for every user in the organization, but it can be quite useful for those responsible for monitoring and engaging comments about the organization such as public affairs.
  • #34: Here’s an example of this from the Seattle Fire Dept – it clearly says “This site is not monitored. Call 911 for emergencies.” It also notes the applicability of public records laws and has a link to the main website.
  • #36: The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
  • #38: Prepare for discovery. This means having the same type of data map you have in place inside the organization, but with listings of all the services you use, the accounts used there, etc. At a minimum you should list any official use of services and official accounts. It also means understanding the process for getting at that information in the event of litigation, FOIA request, etc. The time to put that process in place is before the subpoena is received. For hosted tools, such as FB or Twitter, it may mean taking periodic snapshots of what is posted to them. Right now there aren’t a lot of tools that do this; one way that can be effective is to capture the RSS feeds generated by these tools. As updates are made, they are published through the RSS feed, which can be saved locally. It might also require working with the third-party vendor in the event that some information or some updates are not available through RSS – for example, web-based email. It’s also important to note that at least for commercial solutions there is very little ability to put or enforce legal holds or to prevent a user from deleting an account, at least without a subpoena and without doing it before the user knows to delete it. [twitter]Prepare for discovery in advance, including listing official use of services and accounts.[/twitter]
  • #39: As we just noted, the records management or communications policies (or both) should address the use of these tools. We’ll look at some examples of policies over the next few slides. At a minimum, the policy should address: Identity, relationship, and transparency – is the account official or unofficial?Security, confidentiality, and sensitive informationComments and responses to commentsResponding to others’ posts on commercial sitesAccuracy and ethicsMonitoring and auditing[twitter]Address these tools in the records or communications policies (or both). [/twitter]
  • #40: How to capture content will depend first on one key variable: where is it stored? The vast majority of social media sites are either hosted solutions or commercial ones – that is, users’ data is not stored inside the organization’s firewall, but on some third party data center outside the control of the organization. This can present a significant issue because how and how long the data is stored is almost entirely dependent on the site’s Terms of Service. If the Terms are changed from retention for 7 years to retention for 2 weeks, or to permanently, it presents a real problem for the records program. And depending on the site this is almost certainly non-negotiable with the exception of governmental entities with the force of the law behind them. ~It’s also the case that some regulatory regimes have geographical aspects that, for example, require particular content to be stored inside a country’s boundaries, or prohibit it from being stored in certain countries’ boundaries. This can present issues for services that store information in the cloud and that might have numerous data centers spread around the world. ~Once the organization has determined what to capture, the next step then is to save that information locally. This is almost always a copy – in other words, saving social content from Facebook does *not* delete it from there. There are a number of ways to accomplish this that we will review over the rest of this module.
  • #47: Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it. [twitter]Consider implementing enterprise versions. FB is FB, but internal tools might be more appropriate.[/twitter]
  • #49: At this point I’d be pleased to entertain your questions.