SlideShare una empresa de Scribd logo
1 de 37
Risks&added value
of an internal digital social network

           COMMnetkernportail




               Jacques Folon
          Partner Edge Consulting
www.aliaz.com/jacques-
folonjacques.folon@edge-
Cetteprésentationestsur
www.slideshare.net/folon

elleestàvotre disposition
First part :Risks

1.   Data privacy
2.   Data security
3.   Intellectualproperty
4.   What about an
     internalcommunity
     manager?
1.0 Data privacy
1.1.Data privacy basics
• Basic principles: the Data
   controller
(i.e. the Belgian state i.e. the
   Minister)
   – collect and processpersonal data
     onlywhenthisislegallypermitted
   – respect certain
     obligationsregarding the
     processing of personal data (details
     on nextslide) ;

   – respond to
     complaintsregardingbreaches of
     data protection rules;
   – collaboratewith national data
            Source: http://ec.europa.eu/justice/data-protection/index_en.htm
     protection supervisory authorities
1.2. Data privacyrules for data
               controllers
• Personal Data must be
   – processed legally and fairly;
   – collected for explicit and legitimate
     purposes and used accordingly;
   – adequate, relevant and not excessive in
     relation to the purposes for which it is
     collected and/or further processed;
   – accurate, and updated where necessary;
   – kept any longer than strictly necessary;
   – rectified, removed or blocked by the
     data subject if incorrect;
   – Protected against accidental or unlawful
     destruction, loss, alteration and
     disclosure, particularly when processing
     involves data transmission over
     networks.

          Source: http://ec.europa.eu/justice/data-protection/index_en.htm
1.3. Data privacy&
    internal social media questions

•   Whichprecisepurpose ?
•   Whatkind of personal data willbestored?
•   Are data stored in Europe ?
•   Are they in the « Cloud »?
•   Data privacy commission adviceneeded?
•   Whatwillbe the securitypolicy?
•   What about the content of ex-employees?
•   Is a code of conductenough?

             SO IT ’S AN IMPORTANT ISSUE !!!
2.0. Data security




SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
Source : https://www.britestream.com/difference.html.
How many information?




                        67
Employees share (too) many information and
          also with third parties
Where do one steal     Which devices are
       data?                stolen?

•Banks                •USB
•Hospitals            •Laptops
•Ministries           •Hard disks
•Police               •Papers
•Newspapers           •Binders
•Telecoms             •Cars
•...
TELEWORKING
What are Control limitations? CC/COA 81 !
3.0. INTELLECTUAL PROPERTY




  Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
Copyright infringment




Source: http://en.wikipedia.org/wiki/File:Plagiarism_vs_Copyright_Infringement.png
Employer’sresponsibility !
• What about
  externalprotectedworks?
• What about creation by employees?
• What about import of
  protectedworks by employees?
• What about sub-
  contractorsprotectedworks?
• What about advertisingcampaign?
• What about pressclipping?
• What about externaltrademarks
• What about employee’s images?
• …

• What do youthink of a code of
  conduct?                   http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
4.0. INTERNAL COMMUNITY MANAGER




PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
Who’s in charge if …?




http://www.capreseaux.fr/community-management/
Second part: Added value




http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
Reading and answering e-mail. Approximately 28%, or about 11.2 hours,
of the average interaction worker’sworkweekisspentreading and
answering e-mails. The studyindicatesthatbecause of private social
media’sability to makesearchable content out of all posted messages, the
amount of time spentwith e-mail canbereduced by as much as 35%, or
about 4 hours.
Searching and gathering information. 19%, about 7.6 hours, of the
average interaction worker’sworkhours are spentsearching for internal
information only certain employeespossess. Again, because of enterprise
social media’sability to store all messages as searchable content, this
figure canbereduced by nearly 35% to about 4.9 hours per week,
whichamounts to a savings of 2.7 hours per week per interaction worker.
Communicating and collaboratinginternally. Using phones, e-mail, and
in-person interaction to communicate consumes about 5.6 hours of the
average interaction worker’sworkweek. Becauseyoucandirectly message
anyone in the organizationwithoutcluttering up an e-mail inboxwith a
collaboration tool, yourorganizationcanrealize up to a 35% time savings,
or about 2.0 hours per interaction worker.
Role-specifictasks. Tasksspecific to a particular job consume the
mostamount of time for anyrole, averaging out to about 15.6 hours per
week. Internal social media increases the productivity of thesetasks by
about 15%, or approximately 2.3 hours per week. One
waytheyenhancejob-specificproductivity lies in theirability to centralize al
job functionsat one hub, soyouremployeesbeginusing all other
applications there.
Otheradded value
•   KM
•   Collective intelligence
•   Co-working
•   Network management

• BUT

• The vendorsalreadytoldyou, is ‘nt it?
Some test cases




http://www.journaldunet.com/solutions/reseau-social-d-entreprise/reseau-social-d-entreprise-et-cac40/
Conclusion
•   Do not forgetprivacy issues
•   CC/CO 81
•   Control or not control
•   IPR regulation s/b reminded
•   Internal code of conduct
•   BUT
•   There are some important added value
Internal code of conduct main
                 rules
•   Define the internal and external social media
•   Intellectualpropertyrules
•   Data privacyexplanations
•   Confidential information
•   Anonimityisforbidden
•   Penalties
•   And
•   Which communication for the code of conduct?
•   How to have itapproved?
GOOD LUCK
Jacques Folon
Jacques.folon@ichec.be
Any questions ?




Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/
                                                                                         36
Internal social media: risks and added value

Más contenido relacionado

La actualidad más candente

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2AVISHITYAGI
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 

La actualidad más candente (20)

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Review questions
Review questionsReview questions
Review questions
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 

Destacado (10)

visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
visage humain pour nouvelles technologies - menselijk gelaat van het digitale...visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
visage humain pour nouvelles technologies - menselijk gelaat van het digitale...
 
Ichec pme média sociaux 2011
Ichec pme média sociaux 2011Ichec pme média sociaux 2011
Ichec pme média sociaux 2011
 
Auteursrechten
AuteursrechtenAuteursrechten
Auteursrechten
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
L'entreprise et le monde 2.0
L'entreprise et le monde 2.0L'entreprise et le monde 2.0
L'entreprise et le monde 2.0
 
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
 
RH 2.0 : 1/ le monde a changé
RH 2.0 : 1/ le monde a changéRH 2.0 : 1/ le monde a changé
RH 2.0 : 1/ le monde a changé
 
Start Academy 2014 - Valider et tester ses hypothèses
Start Academy 2014 - Valider et tester ses hypothèsesStart Academy 2014 - Valider et tester ses hypothèses
Start Academy 2014 - Valider et tester ses hypothèses
 
Culture d'entreprise et storytelling
Culture d'entreprise et storytelling Culture d'entreprise et storytelling
Culture d'entreprise et storytelling
 
De la stratégie à la gestion de projets
De la stratégie à la gestion de projetsDe la stratégie à la gestion de projets
De la stratégie à la gestion de projets
 

Similar a Internal social media: risks and added value

Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinFranco Coin
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security RulesKai Roer
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsCarl Brown
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationSophos Benelux
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in PracticeTomppa Järvinen
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionStephen Cobb
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and designRai University
 

Similar a Internal social media: risks and added value (20)

Réseaux sociaux d'entreprise
Réseaux sociaux d'entrepriseRéseaux sociaux d'entreprise
Réseaux sociaux d'entreprise
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.Coin
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
Information security
Information securityInformation security
Information security
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
 

Más de Prof. Jacques Folon (Ph.D)

Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTProf. Jacques Folon (Ph.D)
 

Más de Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Último

4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 

Último (20)

4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 

Internal social media: risks and added value

  • 1. Risks&added value of an internal digital social network COMMnetkernportail Jacques Folon Partner Edge Consulting
  • 4. First part :Risks 1. Data privacy 2. Data security 3. Intellectualproperty 4. What about an internalcommunity manager?
  • 6. 1.1.Data privacy basics • Basic principles: the Data controller (i.e. the Belgian state i.e. the Minister) – collect and processpersonal data onlywhenthisislegallypermitted – respect certain obligationsregarding the processing of personal data (details on nextslide) ; – respond to complaintsregardingbreaches of data protection rules; – collaboratewith national data Source: http://ec.europa.eu/justice/data-protection/index_en.htm protection supervisory authorities
  • 7. 1.2. Data privacyrules for data controllers • Personal Data must be – processed legally and fairly; – collected for explicit and legitimate purposes and used accordingly; – adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed; – accurate, and updated where necessary; – kept any longer than strictly necessary; – rectified, removed or blocked by the data subject if incorrect; – Protected against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks. Source: http://ec.europa.eu/justice/data-protection/index_en.htm
  • 8. 1.3. Data privacy& internal social media questions • Whichprecisepurpose ? • Whatkind of personal data willbestored? • Are data stored in Europe ? • Are they in the « Cloud »? • Data privacy commission adviceneeded? • Whatwillbe the securitypolicy? • What about the content of ex-employees? • Is a code of conductenough? SO IT ’S AN IMPORTANT ISSUE !!!
  • 9. 2.0. Data security SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
  • 12. Employees share (too) many information and also with third parties
  • 13.
  • 14.
  • 15. Where do one steal Which devices are data? stolen? •Banks •USB •Hospitals •Laptops •Ministries •Hard disks •Police •Papers •Newspapers •Binders •Telecoms •Cars •...
  • 17. What are Control limitations? CC/COA 81 !
  • 18. 3.0. INTELLECTUAL PROPERTY Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
  • 20. Employer’sresponsibility ! • What about externalprotectedworks? • What about creation by employees? • What about import of protectedworks by employees? • What about sub- contractorsprotectedworks? • What about advertisingcampaign? • What about pressclipping? • What about externaltrademarks • What about employee’s images? • … • What do youthink of a code of conduct? http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
  • 21. 4.0. INTERNAL COMMUNITY MANAGER PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
  • 22. Who’s in charge if …? http://www.capreseaux.fr/community-management/
  • 23. Second part: Added value http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
  • 24.
  • 25. Reading and answering e-mail. Approximately 28%, or about 11.2 hours, of the average interaction worker’sworkweekisspentreading and answering e-mails. The studyindicatesthatbecause of private social media’sability to makesearchable content out of all posted messages, the amount of time spentwith e-mail canbereduced by as much as 35%, or about 4 hours.
  • 26. Searching and gathering information. 19%, about 7.6 hours, of the average interaction worker’sworkhours are spentsearching for internal information only certain employeespossess. Again, because of enterprise social media’sability to store all messages as searchable content, this figure canbereduced by nearly 35% to about 4.9 hours per week, whichamounts to a savings of 2.7 hours per week per interaction worker.
  • 27. Communicating and collaboratinginternally. Using phones, e-mail, and in-person interaction to communicate consumes about 5.6 hours of the average interaction worker’sworkweek. Becauseyoucandirectly message anyone in the organizationwithoutcluttering up an e-mail inboxwith a collaboration tool, yourorganizationcanrealize up to a 35% time savings, or about 2.0 hours per interaction worker.
  • 28. Role-specifictasks. Tasksspecific to a particular job consume the mostamount of time for anyrole, averaging out to about 15.6 hours per week. Internal social media increases the productivity of thesetasks by about 15%, or approximately 2.3 hours per week. One waytheyenhancejob-specificproductivity lies in theirability to centralize al job functionsat one hub, soyouremployeesbeginusing all other applications there.
  • 29.
  • 30. Otheradded value • KM • Collective intelligence • Co-working • Network management • BUT • The vendorsalreadytoldyou, is ‘nt it?
  • 32. Conclusion • Do not forgetprivacy issues • CC/CO 81 • Control or not control • IPR regulation s/b reminded • Internal code of conduct • BUT • There are some important added value
  • 33. Internal code of conduct main rules • Define the internal and external social media • Intellectualpropertyrules • Data privacyexplanations • Confidential information • Anonimityisforbidden • Penalties • And • Which communication for the code of conduct? • How to have itapproved?
  • 36. Any questions ? Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/ 36