SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential1
98% of businesses in U.S. are using Social Media
22% of U.S. internet time is spent on Social Media
An introduction to your
Social Media
Compliance Requirements
From Julian Ranger
Chairman & Founder
Nielson NetView June 2010Software & Information Industry Association Report Feb 2013
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential2
For any one of these reasons you need:
• a Social Media Policy defining best
practice for your organisation
• a record of all social media activity
undertaken by or on behalf of your
business
• to anticipate legal & regulatory
requests
• to monitor internal activities too
#susanalbumparty
Some of the potential legal issues with SocialMedia use:
• Regulated industry compliance with regulations
• Confidentiality breaches, data protection
• Inc early release of protected information (e.g. Netflix, M&S)
• Inc customer data
• Copyright, Trademark & IP infringement
• Use of data gathered from social networks
• Privacy, defamation security, IP, employment practices
• Inappropriate use
• Libel, offensive, defamation, harassment (sexual & other),
discrimination
• Regulated inappropriate use
• Inc. Unfair promotional claims/advertising activities & disclosing
company you work for when tweet promotion or someone endorses
you for money
• CAP code & Legislation
• Sweepstakes/competition re T&Cs needed, & ensure not contravene
gambling laws
• Negligence
• Assuming a duty, not following through
• Contract implication - ending up in inadvertent enforceable contract
Example non-legal internal issues with SocialMedia use:
• Ownership of brand profiles, contacts and tome of brand
• Information leaks, confidential and sensitive
• Password security
• Rants, swearing, inappropriate comments
• Company/personal account boundaries & rules
Why is Social Media Compliance an issue you need to be aware of?
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential3
Send out messages
People engage
You respond
ASocialMediaWorkflow
Transmit Mentions Engagement
People mention you
or talk about you
You respond
What affect does this
engagement have on
you?
Record
Meet your legal
social media
archiving needs
• SMEs have a variety of tools to use to Transmit social media messages and to
monitor what others are saying about subjects of interest/their company
• However, for Engagement Monitoring there are few that cover all channels
• Those that do are generally complex and costly
• For Recording most do not provide ability to actually look at recorded data
?
?
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential4
Use SocialSafe to simplifyyourdispersed SocialMediaWorkflow
Send out messages
People engage
You respond
Transmit Mentions Engagement
People mention you
or talk about you
You respond
What effect does this
engagement have on
you?
Record
Meet your legal
social media
archiving needs
• SocialSafe creates your Business’ social media library for each user
• Every tweet, post, friend, follower, like, comment ...
• Aggregated into one private offline archive and library that you own and control
• Browsable, searchable, accessible - do more!
• Currently supports Facebook, Facebook Pages, Twitter, LinkedIn, Google+,
RSS (Blogs), Instagram, Pinterest and Viadeo
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential5
HowSocialSafeworks
Users’ content is ONLY stored on their own
PCs or Macs making SocialSafe the only
solution that fully adheres to all social
network terms of use and provides 100%
user privacy
Consolidated
library view of
all your social
network profiles
All data organised into
separate accounts/media
types and aggregated for
display & interaction
Search across
multiple social
network profiles
instantly
Plus: Insights & Collections to provide efficient tracking and
organisational tools
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential6
Calendar Journal Photos Contacts
Centralise and record allyoursocialnetwork data
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential7
Most engagement Most active Reach Export
Get Insights and monitorengagement
In our world every business can own, control
and do more with their social interactions
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential8
SocialSafewillbecomeyoursocialmedia libraryforyou andyourbusiness
Recording and engagement monitoring
foryourdispersed socialmedia users
Donna Serdula,
Founder of Vision Board Media
The mere fact that it aggregates all of your
social networks is amazing. I really love
SocialSafe for its search .. it's so hard to find
anything on Facebook
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential9
We've secured hundreds ofthousands ofsocialnetwork accounts
and are loved bythousands ofsocialmedia experts
Michelle Dear, Editor, Richmond Publishing
I honestly don't understand why your
product isn't listed as "best of the best" in
social media backup utilities
David Blumenstein,
Founder & Director of Tekworks
Thanks for helping me round up all my
social media data, its like herding cats, but
you guys let me do it economically #relief
DocMurdock, CEO of DocMurdock.com &
Former PIXAR Macintosh Systems Engineer
First Impression: HOLY CRAP!!! This ROCKS!
More later in a full review. Quick, easy...Very
COOL. Definitely DocMurdock Approved!
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential10
• You must record your social media activities and engagement
• Most tools are complex, expensive
• SocialSafe is an essential app for all social media users
• Enables assurance and compliance monitoring & enforcement
• Adheres to social network terms & condition
• Cost effective, and minimal training requirement
In Summary
• Creates an archive record of all interactions
• consolidated across multiple accounts
• available off-line
• Creates an address book of fans, followers, contacts
• Provides a search capability across all data
• Provides smart export options for analysis
Incredibly cost effective! £20 per user, per year
Recording and engagement monitoring foryoursocialmedia users

Más contenido relacionado

La actualidad más candente

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceUnified Communications Online
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlookPeter Hewer
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 

La actualidad más candente (20)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
SOX: A Short Guide to Compliance
SOX: A Short Guide to ComplianceSOX: A Short Guide to Compliance
SOX: A Short Guide to Compliance
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
 
HIPAA Compliance: What you need to know
HIPAA Compliance: What you need to knowHIPAA Compliance: What you need to know
HIPAA Compliance: What you need to know
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 

Similar a SocialSafe for SMEs/SMBs - V1

SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesJulian Ranger
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Social Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media Performance Group
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stackNexgate
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF Social Media World Forum
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCloudIDSummit
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the BadXavier Mertens
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxT Tanujha
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011iohann Le Frapper
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseJay McLaughlin
 
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]CanadaHelps / MyCharityConnects
 
MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]CanadaHelps / MyCharityConnects
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
 

Similar a SocialSafe for SMEs/SMBs - V1 (20)

SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Social Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and Implications
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stack
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social media-assessment
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
 
MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT Professionals
 

Último

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

SocialSafe for SMEs/SMBs - V1

  • 1. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential1 98% of businesses in U.S. are using Social Media 22% of U.S. internet time is spent on Social Media An introduction to your Social Media Compliance Requirements From Julian Ranger Chairman & Founder Nielson NetView June 2010Software & Information Industry Association Report Feb 2013
  • 2. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential2 For any one of these reasons you need: • a Social Media Policy defining best practice for your organisation • a record of all social media activity undertaken by or on behalf of your business • to anticipate legal & regulatory requests • to monitor internal activities too #susanalbumparty Some of the potential legal issues with SocialMedia use: • Regulated industry compliance with regulations • Confidentiality breaches, data protection • Inc early release of protected information (e.g. Netflix, M&S) • Inc customer data • Copyright, Trademark & IP infringement • Use of data gathered from social networks • Privacy, defamation security, IP, employment practices • Inappropriate use • Libel, offensive, defamation, harassment (sexual & other), discrimination • Regulated inappropriate use • Inc. Unfair promotional claims/advertising activities & disclosing company you work for when tweet promotion or someone endorses you for money • CAP code & Legislation • Sweepstakes/competition re T&Cs needed, & ensure not contravene gambling laws • Negligence • Assuming a duty, not following through • Contract implication - ending up in inadvertent enforceable contract Example non-legal internal issues with SocialMedia use: • Ownership of brand profiles, contacts and tome of brand • Information leaks, confidential and sensitive • Password security • Rants, swearing, inappropriate comments • Company/personal account boundaries & rules Why is Social Media Compliance an issue you need to be aware of?
  • 3. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential3 Send out messages People engage You respond ASocialMediaWorkflow Transmit Mentions Engagement People mention you or talk about you You respond What affect does this engagement have on you? Record Meet your legal social media archiving needs • SMEs have a variety of tools to use to Transmit social media messages and to monitor what others are saying about subjects of interest/their company • However, for Engagement Monitoring there are few that cover all channels • Those that do are generally complex and costly • For Recording most do not provide ability to actually look at recorded data ? ?
  • 4. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential4 Use SocialSafe to simplifyyourdispersed SocialMediaWorkflow Send out messages People engage You respond Transmit Mentions Engagement People mention you or talk about you You respond What effect does this engagement have on you? Record Meet your legal social media archiving needs • SocialSafe creates your Business’ social media library for each user • Every tweet, post, friend, follower, like, comment ... • Aggregated into one private offline archive and library that you own and control • Browsable, searchable, accessible - do more! • Currently supports Facebook, Facebook Pages, Twitter, LinkedIn, Google+, RSS (Blogs), Instagram, Pinterest and Viadeo
  • 5. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential5 HowSocialSafeworks Users’ content is ONLY stored on their own PCs or Macs making SocialSafe the only solution that fully adheres to all social network terms of use and provides 100% user privacy Consolidated library view of all your social network profiles All data organised into separate accounts/media types and aggregated for display & interaction Search across multiple social network profiles instantly Plus: Insights & Collections to provide efficient tracking and organisational tools
  • 6. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential6 Calendar Journal Photos Contacts Centralise and record allyoursocialnetwork data
  • 7. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential7 Most engagement Most active Reach Export Get Insights and monitorengagement
  • 8. In our world every business can own, control and do more with their social interactions your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential8 SocialSafewillbecomeyoursocialmedia libraryforyou andyourbusiness Recording and engagement monitoring foryourdispersed socialmedia users
  • 9. Donna Serdula, Founder of Vision Board Media The mere fact that it aggregates all of your social networks is amazing. I really love SocialSafe for its search .. it's so hard to find anything on Facebook your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential9 We've secured hundreds ofthousands ofsocialnetwork accounts and are loved bythousands ofsocialmedia experts Michelle Dear, Editor, Richmond Publishing I honestly don't understand why your product isn't listed as "best of the best" in social media backup utilities David Blumenstein, Founder & Director of Tekworks Thanks for helping me round up all my social media data, its like herding cats, but you guys let me do it economically #relief DocMurdock, CEO of DocMurdock.com & Former PIXAR Macintosh Systems Engineer First Impression: HOLY CRAP!!! This ROCKS! More later in a full review. Quick, easy...Very COOL. Definitely DocMurdock Approved!
  • 10. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential10 • You must record your social media activities and engagement • Most tools are complex, expensive • SocialSafe is an essential app for all social media users • Enables assurance and compliance monitoring & enforcement • Adheres to social network terms & condition • Cost effective, and minimal training requirement In Summary • Creates an archive record of all interactions • consolidated across multiple accounts • available off-line • Creates an address book of fans, followers, contacts • Provides a search capability across all data • Provides smart export options for analysis Incredibly cost effective! £20 per user, per year Recording and engagement monitoring foryoursocialmedia users